-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathsystemhacking
279 lines (201 loc) · 3.85 KB
/
systemhacking
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
system hacking::
Recon & footprinting:
ip name
namespace
public data
scanning:
id targets
id services
id o/s
enumaration:
userlist
secuirty flaws
resources
gain access
maintain access
covering your tracks
gaining access password access:::
revellin a password from locally strored data or via transmission
CAC cards
complaxicity:
password recovery time simulator(tools)
password stored
SAM databases
c/windows/system32/config/sam
mount as HKLM/SAM
c/windows/repair
active dir::ntds.dit
C/windows/NTDS/ntds.dit
Linux::
etc/shadow/
apple::
/var/db/dslocal/nods/default/users
<user>.plist=>ShadowHashData Property
Hash Value
one way algo
opcrack(tools)
rainbow table(tools)
tech used::
dictonay attack
brute force
syllable attacks
hybrid attacks
rule based attack
guessing attack
brute force attack
syllable attack
hybrid attack
rule based attack
types of attacks::
passive online::
sniffing
man in middle
side jecking
firesheep(tools)
Active online::
hash injection
trojen/keylogger
guessing
offline attack::
rainbow
distributed n/w
pre computed hashes
non electronic::
dumster diving
shoulder surfing
social engineering
The Hash::
LM Hash/NTLM stores password up to 14 character
more cracking 3::
NTLM authentication
Kerberos authentication
salting
rainbow table and other options
NTLM authentication LM hash::(defautl auth) usages::
there is no kerberos trust between two diff forests
auth. is attempted by IP
if ur firewall blocking kerberos
password are not transimitted
Kerberos auth::
ticket based
fast
time based
domain controller(key distu center)
TGT(tikcet granting transmission)
John the ripper
salting::
rainbow tablew::
precomputed hash table
freerainbowtables.com(website)
lookup tables
NI7(multiple core)
tools::
cain & abel(tools)
john the ripper(tools)
windows/system32/config/SAM (copy SAM,SYSTEM)
windows =>regedit=>HKEY_LOCAL_MACHINE=>SAM=>SAM
windows=>cmd(admin)=>type c:\ reg save hklm\sam c>\sam\sam
c:\ reg save hklm\system c>\sam\system
outpost9.com(website)
tobtu.com(website)
rainbowtable.it64.com
gain2 escalating privileges:::
pwn the admin/root acc.
www.exploit-db.com(website)
mataspolit(tools)
types of escalation::
vertical escalation:
user gets admin level access
create user
configure system setting
extract data
offline access
windows
computer managment
counter measures::
total pawns::
spyware
backdoor
keylogger
level of spyware
backdoors(creating evel code inside legimate code)
backdoor
keylogger
crackers
spyware backdoors::
spyware::
capture keylogger
screenshots
auth
emails
web forms
habits
whos spying
backdoors::
remote admin utility
types of backdoors::
back orifice
sercom(router companey backdoor was in there router)
nsa inside
remoteexec(tools)
install apps
execute scripts
and copy/modify/delete
keyloggers::
s/w and h/w based
monitor every keylogs
capture sceenshots
websits etc
wifi keylogger
bluetooth keylogger
acoustic keylogger(based on sound)
rootkit logger(running inside GPU of processor)
driver keylogger
hypervisor keylooger(reside on malware)
maintaing and accessing your tools::
rootkit::
remote control
eavesdropping
polymorphism
types of rootkit::
user mode
kernel mode
hybrid
firmware
virtual
bluepill(rootkit example)
alernate data stream::
machintosh file system hir.
data fork+resource fork
dir /r(in windows show hidden files)
symbolic link
mklink (in windows)
stengnograpy classification::
technical
linguistic
image based
document based
folder based
audio based
web based
white space based
dvd rom based
natural text based
hidden os
cover our tracks and clear logs:
cover tracks:
basic method::
a good attacker
clear browser history
delete cookies
download del
cler password
del private data
clear logs
Advanced methods::
disable auditing
do damage
enable auditing
ntsecurity.nu/toolbox/winzapper(tools /website)
winzapper(tools)
auditpol /?(tools in windows) for policies