foca training hackcon6

91
FOCA Pro Chema Alonso

Upload: chema-alonso

Post on 23-Dec-2014

6.325 views

Category:

Education


3 download

DESCRIPTION

Foca slides

TRANSCRIPT

Page 1: Foca training hackcon6

FOCA Pro Chema Alonso

Page 2: Foca training hackcon6

What’s a FOCA?

Page 3: Foca training hackcon6

FOCA on Linux?

Page 4: Foca training hackcon6

FOCA + Wine

Page 5: Foca training hackcon6

Previously on FOCA….

Page 6: Foca training hackcon6

FOCA 0.X

Page 7: Foca training hackcon6

A document is

What you see… And what you don´t

• Template paths• Users worked in it.• Departments.• File & Printing Servers• Version History• Embedded files• …

Page 8: Foca training hackcon6

What kind of data can be found?

• Metadata:– Information stored to give information about the document.

• For example: Creator, Organization, etc..

• Hidden information:– Information internally stored by programs and not editable.

• For example: Template paths, Printers, db structure, etc…

• Lost data:– Information which is in documents due to human mistakes or

negligence, because it was not intended to be there.• For example: Links to internal servers, data hidden by format, etc…

Page 9: Foca training hackcon6

Metadata Risks

• “Secret” relationships– Government & companies– Companies & providers

• Piracy• Reputation• Social engineering attacks• Targeting Malware

Page 10: Foca training hackcon6

2003 – MS Word bytes Tony Blair

Page 11: Foca training hackcon6

Targeting Malware

Page 12: Foca training hackcon6

Targeting Malware

Page 13: Foca training hackcon6

Electing the entry point

Page 14: Foca training hackcon6

Social Engineering Attack

Page 15: Foca training hackcon6

Anonim0us case

Page 16: Foca training hackcon6

Metadata created by Google

Page 17: Foca training hackcon6

Lost Data

Page 18: Foca training hackcon6

Lost data everywhere

Page 19: Foca training hackcon6

Metadata in Search Engines

Page 20: Foca training hackcon6

Pictures with GPS info..

EXIFREADER

http://www.takenet.or.jp/~ryuuji/

Page 21: Foca training hackcon6

Even Videos with users…

http://video.techrepublic.com.com/2422-14075_11-207247.html

Page 22: Foca training hackcon6

OLE Streams

• In MS Office binary format files• Store information about the OS• Are not cleaned with these Tools• FOCA finds this info

Page 23: Foca training hackcon6

FOCA: File types supported

• Office documents:– Open Office documents.– MS Office documents.– PDF Documents.• XMP.

– EPS Documents.– Graphic documents.• EXIFF.• XMP.

– Adobe Indesign, SVG, SVGZ (NEW)

Page 24: Foca training hackcon6

What can be found? • Users:

– Creators.– Modifiers .– Users in paths.

• C:\Documents and settings\jfoo\myfile

• /home/johnnyf

• Operating systems.• Printers.

– Local and remote.• Paths.

– Local and remote.• Network info.

– Shared Printers.– Shared Folders.– ACLS.

• Internal Servers.– NetBIOS Name.– Domain Name.– IP Address.

• Database structures.– Table names.– Colum names.

• Devices info.– Mobiles.– Photo cameras.

• Private Info.– Personal data.

• History of use.• Software versions.

Page 25: Foca training hackcon6

Demo:Single files

Page 26: Foca training hackcon6

Sample: FBI.gov

Total: 4841 files

Page 27: Foca training hackcon6

Are they cleaned?

Page 28: Foca training hackcon6

FOCA 1 v. RC3

• Fingerprinting Organizations with Collected Archives– Search for documents in Google and Bing– Automatic file downloading– Capable of extracting Metadata, hidden info and

lost data– Cluster information – Analyzes the info to fingerprint the network.

Page 29: Foca training hackcon6

Metadata tracing

Page 30: Foca training hackcon6

Alternative Domains

Page 31: Foca training hackcon6

Alternative Domains

Page 32: Foca training hackcon6

Sample: Printer info found in odf files returned by Google

Page 33: Foca training hackcon6

Types of Engineers

Page 34: Foca training hackcon6

DNS Prediction

Page 35: Foca training hackcon6

Google Sets Prediction

Page 36: Foca training hackcon6

IP Scanning

Page 37: Foca training hackcon6

Manually-added Data

Page 38: Foca training hackcon6
Page 39: Foca training hackcon6

Demo:Mda.mil

Page 40: Foca training hackcon6

What’s new in FOCA 2.5+?

• Network Discovery• Recursive algorithm• Information Gathering• Sw Recognition• DNS Cache Snooping• Reporting Tool

Page 41: Foca training hackcon6

FOCA 2.5: Exalead

Page 42: Foca training hackcon6

Huge domains case

Page 43: Foca training hackcon6

DNS Search Panel

Page 44: Foca training hackcon6

Búsqueda de URLS en buscadores

Page 45: Foca training hackcon6

DNS Search & Zone Transfer

• IP resolution• Well-Known records– NS– TXT (SPF)– MX– SOA (Primary.master)

• Zone Transfer• Diccionary search

Page 46: Foca training hackcon6

Bing IP

Page 47: Foca training hackcon6

PTR Scannig

Page 48: Foca training hackcon6

Network Discovery Algorithmhttp://apple1.sub.domain.com/~chema/dir/fil.doc

1) http -> Web server 2) GET Banner HTTP3) domain.com is a domain4) Search NS, MX, SPF records for domain.com5) sub.domain.com is a subdomain6) Search NS, MX, SPF records for sub.domain.com7) Try all the non verified servers on all new domains

1) server01.domain.com2) server01.sub.domain.com

8) Apple1.sub.domain.com is a hostname9) Try DNS Prediction (apple1) on all domains10) Try Google Sets(apple1) on all domains

Page 49: Foca training hackcon6

Network Discovery Algorithmhttp://apple1.sub.domain.com/~chema/dir/fil.doc

11) Resolve IP Address12) Get Certificate in https://IP13) Search for domain names in it14) Get HTTP Banner of http://IP15) Use Bing Ip:IP to find all domains sharing it16) Repeat for every new domain 17) Connect to the internal NS (1 or all)18) Perform a PTR Scan searching for internal servers19) For every new IP discovered try Bing IP recursively20) ~chema -> chema is probably a user

Page 50: Foca training hackcon6

Network Discovery Algorithmhttp://apple1.sub.domain.com/~chema/dir/fil.doc

21) / , /~chema/ and /~chema/dir/ are paths22) Try directory listing in all the paths23) Search for PUT, DELETE, TRACE methods in every path24) Fingerprint software from 404 error messages25) Fingerprint software from application error messages26) Try common names on all domains (dictionary)27) Try Zone Transfer on all NS28) Search for any URL indexed by web engines related to the hostname29) Download the file30) Extract the metadata, hidden info and lost data31) Sort all this information and present it nicely32) For every new IP/URL start over again

Page 51: Foca training hackcon6
Page 52: Foca training hackcon6

PC/Servers view

Page 53: Foca training hackcon6

How Foca found a data

Page 54: Foca training hackcon6

Role Oriented View

Page 55: Foca training hackcon6

Vulnerabilites View

Page 56: Foca training hackcon6

DNS Version.bind

Page 57: Foca training hackcon6

Primary Master

Page 58: Foca training hackcon6

Demo: fbi.govwhitehouse.gov

Page 59: Foca training hackcon6

Customizable Search

Page 60: Foca training hackcon6

FOCA + Spidering

Page 61: Foca training hackcon6

FOCA + Spidering

Page 62: Foca training hackcon6

Demo : Foca + Spidering

Page 63: Foca training hackcon6

Internal PTR Scanningusing FOCA

Page 64: Foca training hackcon6

Internal PTR Scanning

Page 65: Foca training hackcon6

Fingerprinting Options

• 404 Not Found messages– Domain names and software

• Aspx Error Messages• HTTP Banner– Hostname– IP Addres

• SMTP Banner• Digital Certificates• Shodan

Page 66: Foca training hackcon6

Digital Certificates

Page 67: Foca training hackcon6

FOCA 2.5 & Shodan

Page 68: Foca training hackcon6

FOCA 2.5 URL Analysis

Page 69: Foca training hackcon6

.listing

Page 70: Foca training hackcon6

Unsecure Http Methods

Page 71: Foca training hackcon6

Search & Upload

Page 72: Foca training hackcon6

Searching for Server-Side Technologies

Page 73: Foca training hackcon6

Proxy

Page 74: Foca training hackcon6

Fuzzing options

Page 75: Foca training hackcon6

Backup discovery

Page 76: Foca training hackcon6

Playing with URLs

Page 77: Foca training hackcon6

DNS Cache Snooping

Page 78: Foca training hackcon6

DNS Cache Snooping

Page 79: Foca training hackcon6

DNS Cache Snooping• Internal Software– Windows Update– Gtalk

• Evilgrade– Detecting vulnerable software to Evilgrade attacks

• AV evassion– Detecting internal AV systems

• Malware driven by URL– Hacking a web site ussually visited by internal

users

Page 80: Foca training hackcon6

DNS Cache detection

Page 81: Foca training hackcon6

Demo: DNSCache Snooping

Page 82: Foca training hackcon6

Log filter

Page 83: Foca training hackcon6

FOCA Reporting Module

Page 84: Foca training hackcon6

FOCA Reporting Module

Page 85: Foca training hackcon6

Demo: Log & Reporting

Page 86: Foca training hackcon6

Fear The FOCA

Page 87: Foca training hackcon6

FOCA Onlinehttp://www.informatica64.com/FOCA

Page 88: Foca training hackcon6

Cleaning documents• OOMetaExtractor

http://www.codeplex.org/oometaextractor

Page 89: Foca training hackcon6

IIS MetaShield Protector

http://www.metashieldprotector.com

Page 90: Foca training hackcon6

Buy a FOCA T-Shirt

And be «Sexy» }:))

Page 91: Foca training hackcon6

Questions?- Chema Alonso

- [email protected] http://www.informatica64.com - http://www.elladodelmal.com - http://twitter.com/chemaalonso- http://www.forefront-es.com- http://www.seguridadapple.com - http://www.windowstecnico.com- http://www.puntocompartido.com

- Working on FOCA:- Chema Alonso- Alejandro Martín- Francisco Oca- Manuel Fernández «The Sur»- Daniel Romero- Enrique Rando- Pedro Laguna- Special Thanks to: John Matherly [Shodan]