how a hacker sees your site

52
How a Hacker Sees Your Site Patrick Laverty (@plaverty9) Rapid7 Global Services

Upload: patrick-laverty

Post on 16-Apr-2017

750 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: How a Hacker Sees Your Site

How a Hacker Sees Your Site

Patrick Laverty (@plaverty9)Rapid7 Global Services

Page 2: How a Hacker Sees Your Site

A Web App Pentester’s Checklist?

Patrick Laverty (@plaverty9)Rapid7 Global Services

Page 3: How a Hacker Sees Your Site

Patrick LavertyRapid7 Global [email protected]@plaverty9Organizer of OWASP Rhode IslandOrganizer of BSides Boston (May 21)

Page 4: How a Hacker Sees Your Site

How You See Your Web Site

Page 5: How a Hacker Sees Your Site

How a Hacker Sees Your Site

Page 6: How a Hacker Sees Your Site

Perceived Difficulty To Hack Your Site

Page 7: How a Hacker Sees Your Site

How Hard Is It Really?

Page 8: How a Hacker Sees Your Site

What Is A Hacker Looking For?

Not all that much…

Page 9: How a Hacker Sees Your Site

What Is A Hacker Looking For?

• URL Parameters• Data Inputs• 3rd Party Content• Robots.txt• Redirects• Cookies• Session Data• Administrator Area/CSRF• HTML Source Comments• Weak Passwords• Weak/Broken SSL

• Old Versions of Site• Lack of Data Sanitization• File Uploads• Business Logic Flaws• CMS Frameworks• Company Phone Book• Company Org Chart• OSINT• Outdated Operating System• Unlocked/Open DNS• Unnecessary Services

Page 10: How a Hacker Sees Your Site

Let’s look at ’em!

Page 11: How a Hacker Sees Your Site

Look At A Web Site

Page 12: How a Hacker Sees Your Site

URL Query Parameters

Page 13: How a Hacker Sees Your Site

Data Inputs – SQL Injection

Page 14: How a Hacker Sees Your Site

Data Inputs – SQL Injection

Page 15: How a Hacker Sees Your Site

Data Inputs – SQL Injection

Page 16: How a Hacker Sees Your Site

Data Inputs – SQL Injection

Page 17: How a Hacker Sees Your Site

Data Inputs – SQL Injection

Page 18: How a Hacker Sees Your Site

Data Inputs

Page 19: How a Hacker Sees Your Site

Data Inputs - XSS

Page 20: How a Hacker Sees Your Site

Data Inputs - XSS

Page 21: How a Hacker Sees Your Site

Data Inputs - XSS

http://beefproject.com/ (Included in Kali)

Page 22: How a Hacker Sees Your Site

Data Inputs - XSS

Page 23: How a Hacker Sees Your Site

Data Inputs – OpenBugBounty.com

Page 24: How a Hacker Sees Your Site

3rd Party Content

Page 25: How a Hacker Sees Your Site

3rd Party Content – s0.2mdn.net?

Page 26: How a Hacker Sees Your Site

Robots.txt

• Intended to guide search engines• Show directories/files to not index - Why?• What will attackers look for?

Page 27: How a Hacker Sees Your Site

Robots.txt

• Intended to guide search engines• Show directories/files to not index - Why?• What will attackers look for?

Mitigation Ideas:• Auto-ban at WAF for following• Spider Trap (Ethan Robish)

Page 28: How a Hacker Sees Your Site

Unvalidated Redirect

Usage: http://www.site.com/?goto=http://www.google.com

Page 29: How a Hacker Sees Your Site

Unvalidated Redirect

Usage: http://www.site.com/?goto=http://www.google.com

Example: http://mysite.com/rd/?goto=http://www.evilhackersite.com

Page 30: How a Hacker Sees Your Site

Unvalidated Redirect

Usage: http://www.site.com/?goto=http://www.google.com

Example: http://mysite.com/rd/?dku=%68%74%74%70%3a%2f%2f1249763400

Page 31: How a Hacker Sees Your Site

Unvalidated Redirect

Usage: http://www.site.com/?goto=http://www.google.com

Example: http://mysite.com/rd/?dku=%68%74%74%70%3a%2f%2f1249763400

PHISH!!

Page 32: How a Hacker Sees Your Site

Cookies & Session Data

Use a plugin!

• Firefox: Cookie Manager, Edit Cookies• Chrome: Edit this Cookie, Cookies – app for Chrome• Safari: SafariCookieEditor• Use a Proxy: Burp, ZAP • Do it manually!

Page 33: How a Hacker Sees Your Site

Cookies & Session Data

• Session replays• Authentication Bypass• Secure flag set?

• https://www.owasp.org/index.php/SecureFlag• Ars Technica: “Unsafe cookies leave WordPress accounts open to hijacking,

2-factor bypass” – 5/26/14• https://zyan.scripts.mit.edu/blog/wordpress-fail/

Page 34: How a Hacker Sees Your Site

Administrator Area & Factory Settings

Page 35: How a Hacker Sees Your Site

Administrator Area & Factory Settings

Page 36: How a Hacker Sees Your Site

Administrator Area & Factory Settings

Page 37: How a Hacker Sees Your Site

HTML Source Comments

Or use NerdyData.com: search “ToDo:”

Page 38: How a Hacker Sees Your Site

Weak/Default Passwords

• Try default passwords: http://www.cirt.net/passwords • Try from the large dumps: https://wiki.skullsecurity.org/Passwords • http://resources.infosecinstitute.com/10-popular-password-cracking-tools/• Also in favorite distros (ie. Kali)

Password Re-use• How you doin’, Ashley Madison?• AM Top 100: http://arstechnica.com/security/2015/09/new-stats-show-

ashley-madison-passwords-are-just-as-weak-as-all-the-rest/

Page 39: How a Hacker Sees Your Site

Weak/Broken Secure Communications

• Outdated SSL can be broken (http://www.poodletest.com)• Every secure page must be served via SSL (SSLStrip?)• Files requiring authentication must force authentication

Page 40: How a Hacker Sees Your Site

Old Versions of Site

Custom file extensions: .old, .bak, .tmp, .svn, .tar, .gz, .git

Example: index.php.old

Source: (Tim Medin) http://pen-testing.sans.org/blog/pen-testing/2012/12/06/all-your-svn-are-belong-to-us

Page 41: How a Hacker Sees Your Site

File Uploads

• Usually intended to upload attachments, images, etc. • Specific file type intended

Problems: • Other file types allowed?• Executable file types?• End user control where file goes?

Page 42: How a Hacker Sees Your Site

Business Logic Flaws

• Not scannable• Know how site should work• Usually due to unvalidated user input

Page 43: How a Hacker Sees Your Site

CMS Frameworks

• Wordpress, Drupal, Joomla• Set it and forget it• Easy to set up, requires frequent maintenance/updates• Plugins/modules/custom code• Templates/themes• DRUPALGEDDON! https://www.drupal.org/SA-CORE-2014-005

Page 44: How a Hacker Sees Your Site

Company/Employee Information

• Phone book• Organizational Chart• OSINT (Open Source INTelligence)• Facebook/Twitter/Blogs/Cat pages• Maltego• Social Engineering!

Page 45: How a Hacker Sees Your Site

Company/Employee Information

Page 46: How a Hacker Sees Your Site

Outdated Operating System

• Exploit-DB (exploit-db.com)• CVE Details (cvedetails.com)• Specific to software (ie. Joomla security)• Many others!

Page 47: How a Hacker Sees Your Site

DNS Hijacking

Set locks at two levels:

• Client• ClientTransferProhibited• ClientDeleteProhibited• ClientUpdateProhibited

• Server• ServerTransferProhibited• ServerDeleteProhibited• ServerUpdateProhibited

Page 48: How a Hacker Sees Your Site

Running Unnecessary Services

Page 49: How a Hacker Sees Your Site

Running Unnecessary Services

Page 50: How a Hacker Sees Your Site

Running Unnecessary Services

Page 51: How a Hacker Sees Your Site

Not All Inclusive - Is There More?

Page 52: How a Hacker Sees Your Site

Questions?

Contact:Patrick Laverty

@[email protected]