behind enemy lines administrative web application attacks rafael dominguez vega 12 th of march 2009

56
Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

Upload: maximillian-montgomery

Post on 04-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

Behind Enemy Lines

Administrative Web Application Attacks

Rafael Dominguez Vega

12th of March 2009

Page 2: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

2

Main Objectives

• Insecurities

• Impact

• Attack Techniques

Page 3: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

3

A little about me ...

Page 4: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

4

What this talk will cover

• Intro

• DHCP Script Injection Attack

• SSID Script Injection Attack

• Scanning for Webmin Servers Attack

• Recommendations, Summary & QA

Page 5: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

5

Introduction

Page 6: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

6

Administrative Web Interfaces

• Administer Systems and Networks

• Help Administrators

• Most Network Systems have One

Page 7: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

7

Why should they be secured?

• Vulnerable as any other Web Application

• Highly Privileged Access

• Different Services, Systems and Protocols

• Used in “Trusted Environment”

Page 8: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

8

Today’s Web Application Attacks

• User Input Validation

• Security Best Practice

• Out of Band Channels

Page 9: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

9

DHCP Script Injection Attack

Page 10: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

10

DHCP “HandShake”

Page 11: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

11

DHCP Request Packet

Page 12: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

12

DHCP Script Injection Attack

• Active DHCP Leases List

• Attacker located in same LAN

• To Be Vulnerable

Page 13: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

13

DHCP Script Injection Attack

Page 14: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

14

DHCP Script Injection Attack

Page 15: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

15

DHCP Script Injection Attack

Page 16: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

16

DHCP Script Injection Attack

Page 17: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

17

DHCP Script Injection Attack - DEMO

• pfSense

• Tool

• Remote Command Execution

Page 18: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

18

SSID Script Injection Attack

Page 19: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

19

SSID Script Injection Attack

• 802.11 Protocol

• Management Beacon Frames

• Malicious Code in SSID

Page 20: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

20

SSID Script Injection Attack

• “Scan for Neighbours AP” Functionality

• Attacker located in Wireless Range

• Max. SSID length = 32 Characters

• SSID1/** **/SSID2 = 64 Characters

• Access to Internet Attacker Server

Page 21: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

21

SSID Script Injection

Page 22: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

22

SSID Script Injection

Page 23: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

23

SSID Script Injection

Page 24: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

24

SSID Script Injection

Page 25: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

25

SSID Attack - DEMO

• Linksys – DD-WRT firmware

• Tool

• Disable Wireless Encryption

Page 26: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

26

Scanning for Webmin Servers Attack

Page 27: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

27

Webmin

Page 28: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

28

Scanning for Webmin Servers

Page 29: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

29

Scanning for Webmin Servers Attack

• Attacker located in same Network

• Redirect user to fake Webmin Server

• Obtain Administrator Credentials

• CSRF

Page 30: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

30

Scanning for Webmin Servers Attack

Page 31: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

31

Scanning for Webmin Servers Attack

Page 32: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

32

Scanning for Webmin Servers Attack

Page 33: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

33

Demo

Page 34: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

34

Webmin Web Based Attack Propagation

Page 35: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

35

Webmin Web Based Attack Propagation

Page 36: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

36

Webmin Web Based Attack Propagation

Page 37: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

37

Webmin Web Based Attack Propagation

Page 38: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

38

Webmin Web Based Attack Propagation

Page 39: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

39

Webmin Web Based Attack Propagation

Page 40: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

40

Webmin Web Based Attack Propagation

Page 41: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

41

Webmin Web Based Attack Propagation

Page 42: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

42

Webmin Web Based Attack Propagation

Page 43: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

43

Webmin Web Based Attack Propagation

Page 44: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

44

Webmin Web Based Attack Propagation

Page 45: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

45

Webmin Web Based Attack Propagation

Page 46: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

46

Webmin Web Based Attack Propagation

Page 47: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

47

Webmin Web Based Attack Propagation

Page 48: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

48

Webmin Web Based Attack Propagation

Page 49: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

49

Webmin Web Based Attack Propagation

Page 50: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

50

Webmin Web Based Attack Propagation

Page 51: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

51

Recommendations

Page 52: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

52

Recommendations

Page 53: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

53

Recommendations

• Assess Deployment

• Do not Trust your Internal Network

• Penetration Testing

• Strict Security Policy

• Risk Management

Page 54: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

54

Summary

• Vulnerable as any other Web Application

• Additional Attack Vectors

• “Scanning”, “Detecting “ ,“Finding” Functionality

• Risks Increased

• Used in “Trusted Environment”

Page 55: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

55

References & Further Reading

Project Web Site:

http://labs.mwrinfosecurity.com/

Contact Me

rafael.dominguez-vega( )mwrinfosecurity!com

Page 56: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

56