Professional Documents
Culture Documents
Module 05
System H acking
Module 05
CEH
i. /
P n!
Ethical Hacking and Countermeasures Copyright by EC-C0linCil All Rights Reserved. Reproduction is Strictly Prohibited.
Security News
\m -
(itifwtf
CEH
itkMl lUclwt
http://www.kitguru.net
Copyright by EC-Caind. All Rights Reserved. Reproduction is Strictly Prohibited.
Security N ew s
IE E E Hack Confirm ed, 100k Plain Text Passwords Vulnerable
Source: http://www.kitguru.net After details were revealed by Radu Dragusin over at IEEEIog.com recently that passwords and user details for some 100,000 members of the Institute of Electrical and Electronics Engineers had been made publicly available on the company's FTP server for at least a month, the organization confirmed this in a communication to members, advising them to change their details immediately. The IEEE is an organization that is designed to advance technology and has over 400,000 members worldwide, many of those including employees at Apple, Google, IBM, Oracle, and Samsung. It is responsible for globally used standards like the IEEE 802.3 Ethernet standard and the IEEE 802.11 Wireless Networking standard. At an organization like this, you'd expect security to be high. Still, this hack was no hoax. The official announcement of it reads: "IEEE has become aware of an incident regarding inadvertent access to unencrypted log files containing user IDs and
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
passwords. This matter has been addressed and resolved. None of your financial information was made accessible in this situation." The company continued saying though, that it was technically possible that during the time this information was available, that someone could have used it to access a user's account and therefore, as a "precautionary measure," the IEEE recommended all users change their account information. Until that time, users were not be able to access their account at all. In what seems like quite a bold move, the organization went on to explain to users that one of the best ways to protect themselves is to use a strong, unique password for their login. Considering it was an IEEE security blunder that caused the hack, advising other people on password strength seems a bit hypocritical. That said, in Mr Dragusin's reveal of the hacked information, he produced a graph detailing some of the most commonly used passwords. Almost 300 people used "123456" and other variations of numbers in that same configuration, while hundreds of others used passwords like "admin," "student," and "ieee2012." Considering the involvement of IEEE members in pushing the boundaries of current technology, you'd assume we wouldn't need to turn to Eugene "The Plague" Belford to explain the importance of password security.
http://www.kitguru.net/channel/ion-rnartindale/ieee-hack-confirmed-100k-plain-textpasswords-vulnerable/
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
M odule O bjectives
J J J J J J J J J
r
UrtilM
CEH
itkKJl Nm Im
J J J J
System Hacking: Goals CEH Hacking Methodology (CHM) Password Cracking Stealing Passwords Using Keyloggers Microsoft Authentication How to Disable LM HASH How to Defend against Password Cracking Privilege Escalation Executing Applications
^
Types of Keystroke Loggers and Spywares Anti-Keylogger and Anti-Spywares Detecting Rootkits Anti-Rootkits NTFS Stream Manipulation Classification of Steganography Steganalysis Methods/Attacks on Steganography Covering Tracks Penetration Testing
J J J J J
M odule O bjectives
The preceding modules dealt with the progressive intrusion that an attacker makes towards his or her target system(s). You should bear in mind that this does not indicate a culmination of the attack. This module familiarizes you with: System Hacking: Goals CEH Hacking Methodology (CHM) Password Cracking Stealing Passwords Using Keyloggers Microsoft Authentication Howto Disable LM HASH How to Defend against Password Cracking Privilege Escalation Executing Applications Types of Keystroke Loggers and Spywares Anti-Keylogger and Anti-Spywares Detecting Rootkits Anti-Rootkits NTFS Stream Manipulation Classification of Steganography Steganalysis Methods/Attacks on Steganography Covering Tracks Penetration Testing
Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
(rtifwtf
C EH
itkitjl
Footprinting M odule
Footprinting is the process of accumulating data regarding a specific network environment. Usually this technique is applied for the purpose of finding ways to intrude into the network environment. Since footprinting can be used to attack a system, it can also be used to protect it. In the footprinting phase, the attacker creates a profile of the target organization, with the information such as its IP address range, namespace, and employee web usage. Footprinting improves the ease with which the systems can be exploited by revealing system vulnerabilities. Determining the objective and location of an intrusion is the primary step involved in footprinting. Once the objective and location of an intrusion is known, by using nonintrusive methods, specific information about the organization can be gathered. For example, the web page of the organization itself may provide employee bios or a personnel directory, which the hacker can use it for the social engineering to reach the objective. Conducting a Whois query on the web provides the associated networks and domain names related to a specific organization.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Scanning M odule
Scanning is a procedure for identifying active hosts on a network, either for the purpose of network security assessment or for attacking them. In the scanning phase, the attacker finds information about the target assessment through its IP addresses that can be accessed over the Internet. Scanning is mainly concerned with the identification of systems on a network and the identification of services running on each computer. Some of the scanning procedures such as port scans and ping sweeps return information about the services offered by the live hosts that are active on the Internet and their IP addresses. The inverse mapping scanning procedure returns the information about the IP addresses that do not map to the live hosts; this allows an attacker to make suppositions about feasible addresses.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
(>1fw4
C EH
itkMjl IlMhM
Hacking-Stage
| |
A np
Goal
To collect enough information to gain access T o create a privileged user account if the user level is obtained To create and maintain backdoor access
Technique/Exploit Used
Password eavesdropping, brute forcing Password cracking, known exploits
Gaining Access
Escalating Privileges
15 h *# 1
Hiding Files
Trojans
Rootkits
Clearing logs
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Hacking-Stage
Gaining Access
Goal
To collect enough information to gain access To create a privileged user account if the user level is obtained To create and maintain backdoor access
Technique/Exploit Used
Password eavesdropping, brute forcing Password cracking, known exploits
s
A
ao
Escalating Privileges
Executing Applications
Trojans
Hiding Files
Rootkits
Covering Tracks
Clearing logs
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH Hacking Me
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Covering Tracks
Executing Applications
Penetration Testing
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
(It'fwd
CEH
ttkujl M a ck *
Attackers use password cracking techniques to gain unauthorized access to the vulnerable system
Attacker Victim
Most of the password cracking techniques are successful due to weak or easily guessable passwords
Password Cracking
Password cracking is the process of recovering passwords from the data that has been transmitted by a computer system or stored in it. The purpose of password cracking might be to help a user recover a forgotten or lost password, as a preventive measure by the system administrators to check for easily crackable passwords or it can also be used to gain unauthorized access to a system. Many hacking attempts start with password cracking attempts. Passwords are the key piece of information necessary to access a system. Consequently, most attackers use password cracking techniques to gain unauthorized access to the vulnerable system. Passwords may be cracked manually or with automated tools such as a dictionary or brute-force method. The computer programs that are designed for cracking passwords are the functions of the number of possible passwords per second that can be checked. Often users, while creating passwords, select passwords that are predisposed to being cracked such as using a pet's name or choosing one that's simple so they can remember it. Most of the passwords cracking techniques are successful due to weak or easily guessable passwords.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
bob@&ba
Passwords that contain only special characters .......... I and numbers 123@$45 *
A+D+u =
Copyright by EC-Cauactl. All Rights Reserved. Reproduction is Strictly Prohibited.
Password C om plexity
Password complexity plays a key role in improving security against attacks. It is the important element that users should ensure while creating a password. The password should not be simple since simple passwords are prone to attacks. The passwords that you choose should always be complex, long, and difficult to remember. The password that you are setting for your account must meet the complexity requirements policy setting. Password characters should be a combination of alphanumeric characters. Alphanumeric characters consist of letters, numbers, punctuation marks, and mathematical and other conventional symbols. See the implementation that follows for the exact characters referred to: 0 0 0 0 0 0 0 Passwords that contain letters, special characters, and numbers: apl@52 Passwords that contain only numbers: 23698217 Passwords that contain only special characters: & *# @ !(%) Passwords that contain letters and numbers: meetl23 Passwords that contain only letters: POTHMYDE Passwords that contain only letters and special characters: bob@&ba Passwords that contain only special characters and numbers: 123@$4
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
UrtifW itkH il lUckw
This attack is used when the attacker gets some information about the password
Dictionary Attack
B ru te Forcing A ttacks
H y b rid A tta ck
j
Copyright by EC-Cauactl. All Rights Reserved. Reproduction is Strictly Prohibited.
D ictionary Attacks
In a dictionary attack, a dictionary file is loaded into the cracking application that runs against user accounts. This dictionary is the text file that contains a number of dictionary words. The program uses every word present in the dictionary to find the password. Dictionary attacks are more useful than brute force attacks. But this attack does not work with a system that uses passphrases. This attack can be applied under two situations: Q In cryptanalysis, it is used to find out the decryption key for obtaining plaintext from ciphertext.
In computer security, to avoid authentication and access the computer by guessing passwords.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Methods to improve the success of a dictionary attack: 0 Use the number of dictionaries such as Technical dictionaries and foreign dictionaries which helps to retrieve the correct password
Use the string manipulation on the dictionary, means if dictionary contain the word "system" then try string manipulation and use "metsys" and others
Q P
Hybrid Attack
This type of attack depends upon the dictionary attack. There are chances that people might change their password by just adding some numbers to their old password. In this type of attack, the program adds some numbers and symbols to the words from the dictionary and tries to crack the password. For example, if the old password is "system," then there is a chance that the person will change it to "systeml" or "system2."
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
S yllable A ttack
A s y lla b le a t t a c k is t h e c o m b i n a t i o n o f b o t h a b r u t e f o r c e a t t a c k a n d t h e d ic t io n a r y a tta c k . This c r a c k in g t e c h n i q u e is used w h e n t h e p a s s w o r d is n o t an e x is t in g w o r d . A t t a c k e r s use t h e d i c t i o n a r y a n d o t h e r m e t h o d s t o c ra c k it. It also uses t h e p o s s ib le c o m b i n a t i o n o f e v e r y w o r d p r e s e n t in t h e d ic t io n a r y .
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
1. Passive Online Attacks Attacker performs password hacking without communicating with the authorizing party
tJ e
e e
4. Non-Electronic Attacks Attacker need not posses technical knowledge to crack password, hence known as non-technical attack
2. Active Online Attacks Attacker tries a list of passwords one by one against the victim to crack password
3. Offline Attack Attacker copies the target's password file and then tries to crack passwords in his own system at different location
a w
it
u sed f o r le g a l p u r p o s e s r e c o v e r s t h e f o r g o t t e n p a s s w o r d o f a u se r; if it is u sed b y i l l e g i t i m a t e users, it can ca use t h e m t o g a in u n a u t h o r i z e d p r i v i le g e t o t h e n e t w o r k o r s y s te m . P a s s w o rd a tta c k s a re c la s s ifie d b ase d o n t h e a t t a c k e r 's a c tio n s t o c ra c k a p a s s w o r d . U s u a lly t h e r e a re o f f o u r ty p e s . T h e y are:
A 111A
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
O ffline A ttacks
O f f l i n e a t t a c k s o c c u r w h e n t h e i n t r u d e r ch e c k s t h e v a l i d i t y o f t h e p a s s w o r d s . He o r sh e o b s e rv e s h o w t h e p a s s w o r d is s t o r e d in t h e t a r g e t e d s y s t e m . If t h e u s e r n a m e s a n d t h e p a s s w o r d s a re s t o r e d in a file t h a t is r e a d a b le , it b e c o m e s easy f o r t h e i n t r u d e r t o g a in access t o t h e s y s te m . In o r d e r t o p r o t e c t y o u r p a s s w o r d s list t h e y s h o u ld a lw a y s be k e p t in an u n r e a d a b l e f o r m , w h i c h m e a n s t h e y h a v e t o be e n c r y p t e d . O ff li n e a tta c k s a re o f t e n t i m e c o n s u m in g . T h e y a re su c ce ssfu l b e c a u s e t h e L M h a s h e s are v u ln e r a b l e due to a s m a lle r keyspace and sh o rte r le n g t h . D iffe re n t p assw ord c r a c k in g
------ ------------------------------------------------ k n o w n as n o n - t e c h n ic a l a tta c k s . This k in d o f a t t a c k d o e s n ' t r e q u ir e a n y te c h n ic a l k n o w le d g e a b o u t t h e m e t h o d s o f i n t r u d i n g i n t o a n o t h e r 's s y s te m . T h e r e f o r e , it is c a lle d a n o n - e l e c t r o n i c a tta c k . T h e r e a re t h r e e ty p e s o f n o n - e l e c t r o n i c a tta c k s . T h e y are: 0 0 0 S h o u ld e r s u rfin g Social e n g in e e r in g D u m p s t e r d iv in g
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
The captured data may include sensitive information such as passwords (Telnet, FTP, rlogin sessions, etc.) and emails Sniffed credentials are used to gain unauthorized access to the target system
Copyright by E&Cauactl. All Rights Reserved. Reproduction isStrictly Prohibited.
M m
---------- -
o n l y in a c o m m o n c o llis io n d o m a i n . C o m m o n c o ll i s i o n d o m a i n s a re n o t c o n n e c t e d b y a s w it c h o r b rid g e . All t h e h o s ts o n t h a t n e t w o r k a re a lso n o t s w i t c h e d o r b r id g e d in t h e n e t w o r k s e g m e n t. As s n if fe r s g a t h e r p a c k e ts a t t h e D a ta L in k L a ye r, t h e y can g ra b all p a c k e ts o n t h e LAN o f th e m a c h in e t h a t is r u n n i n g t h e s n i f f e r p r o g r a m . T his m e t h o d is r e l a t iv e l y h a r d t o p e r p e t r a t e a n d is c o m p u t a t io n a lly c o m p lic a te d . T his is b e c a u s e a n e t w o r k w i t h a h u b i m p l e m e n t s a b r o a d c a s t m e d i u m t h a t all s y s te m s s h a re o n t h e LAN. A n y d a ta s e n t acro ss t h e LAN is a c tu a lly s e n t t o e a c h a n d e v e r y m a c h in e c o n n e c t e d t o t h e LAN. If an a t t a c k e r r u n s a s n if f e r o n o n e s y s te m o n t h e LAN, he o r she can g a t h e r d a ta s e n t t o a n d f r o m a n y o t h e r s y s te m o n t h e LAN. T h e m a j o r i t y o f s n i f f e r t o o l s a re id e a lly s u it e d t o s n if f d a ta in a h u b e n v i r o n m e n t . T h e se t o o l s a re c a lle d p assive s n if fe r s as t h e y p a s s iv e ly w a i t f o r d a ta t o be s e n t, b e f o r e c a p t u r i n g t h e i n f o r m a t i o n . T h e y a re e f f i c i e n t a t i m p e r c e p t i b l y g a t h e r i n g d a t a f r o m t h e LAN. T h e c a p t u r e d d a ta m a y in c lu d e p a s s w o r d s s e n t t o r e m o t e s y s te m s d u r in g T e l n e t , FTP, r lo g i n se s s io n s , a nd e le c t r o n i c m a il s e n t a n d r e c e iv e d . S n i f f e d c r e d e n t i a l s a re used t o g ain u n a u t h o r i z e d access t o t h e t a r g e t s y s te m . T h e r e a re a v a r i e t y o f t o o ls a v a ila b le o n t h e I n t e r n e t f o r p a s s iv e w i r e s n if f i n g .
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Victim
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Victim
Web Server
Attacker
Considerations
In a MITM attack, the attacker acquires access to the communication channels between victim and server to extract the information
Relatively hard to perpetrate Must be trusted by one or both sides Can sometimes be broken by invalidating traffic
In a replay attack, packets and authentication tokens are captured using a sniffer. After the relevant info is extracted, thetokens are placed back on the network to gain access
W h e n t w o p a r tie s a re c o m m u n i c a t i n g , t h e m a n - i n - m i d d l e a t t a c k can ta k e p la ce. In t h is case, a t h i r d p a r t y i n t e r c e p t s t h e c o m m u n i c a t i o n b e t w e e n t h e t w o p a r tie s , a s s u rin g t h e t w o p a r tie s t h a t t h e y are c o m m u n i c a t i n g w i t h e a ch o t h e r . M e a n w h i l e , t h e t h i r d p a r t y a lt e r s t h e d a ta o r e a v e s d r o p s a n d passes t h e d a ta a lo n g . T o c a r r y o u t th is , t h e m a n in m id d l e has t o s n i f f f r o m b o t h sides o f t h e c o n n e c t i o n s i m u l t a n e o u s ly . T his t y p e o f a t t a c k is o f t e n f o u n d in t e l n e t and w ir e le s s t e c h n o l o g i e s . It is n o t easy t o i m p l e m e n t such a tta c k s d u e t o t h e TCP s e q u e n c e n u m b e r s a n d s p e e d . This m e t h o d is r e l a t iv e l y h a r d t o p e r p e t r a t e a n d can be b r o k e n s o m e t i m e s by in v a lid a tin g th e tra ffic . In a r e p la y a tta c k , p a c k e ts a re c a p t u r e d u sin g a s n if fe r . A f t e r t h e r e l e v a n t i n f o r m a t i o n is
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Original Connection r
.................... O ................
...................
............................ >
Victim
Sniff
W eb Server
FIGURE 5.4: Passive Online Attack by Using Man-in-the-Middle and Replay Attack
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
Network
Server
Network
Considerations
Network
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Attacker FIGURE 5.5: Active Online Attack by Using Password Guessing Method
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
W ith the help o f a Trojan, an attacker gets access to the stored passwords in the attacked com puter and is able to read personal documents, delete files, and display pictures
A Keylogger is a program th a t runs in the background and allows rem ote attackers to record every keystroke
vv/
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
A hash injection attack allows an attacker to inject a compromised hash into a local session and use the hash to validate to network resources
The attacker finds and extracts a logged on domain admin account hash
The attacker uses the extracted hash to log on to the domain controller
1 1 .
I k
Attacker
Victim Computer
Attacker
if
FIGURE 5.6: Active Online Attack by Using Hash Injection Attack
Victim Computer
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Convert huge word lists like dictionary files and brute force lists into password hashes using techniques such as rainbow tables
Compute the hash for a list of possible passwords and compare it with the precomputed hash table. If a match is found then the password is cracked
It is easy to recover passwords by comparing captured password hashes to the precomputed tables
\\
O f f lin e a tta c k s o c c u r w h e n t h e i n t r u d e r ch e cks t h e v a l i d i t y o f t h e p a s s w o r d s . He o r sh e o b s e rv e s h o w t h e p a s s w o r d is s t o r e d . If t h e u se r n a m e s a n d t h e p a s s w o r d s a re s t o r e d in a file t h a t is r e a d a b l e , it b e c o m e s easy f o r h im o r h e r t o g ain access t o t h e s y s te m . H e n ce , t h e p a s s w o r d s list m u s t be p r o t e c t e d a n d k e p t in an u n r e a d a b l e f o r m , such as an e n c r y p t e d f o r m . O ff li n e a tta c k s a re t i m e c o n s u m in g . T h e y a re su cce ssfu l b e c a u s e t h e L M h a s h e s a re v u ln e r a b l e d u e t o s m a lle r k e y s p a c e a nd s h o r t e r le n g t h . a v a ila b le o n t h e I n t e r n e t . T h e r e a re t w o t y p e s o f o f f l i n e a tta c k s t h a t an a t t a c k e r can p e r f o r m t o d is c o v e r t h e p a s s w o r d , e 0 R a in b o w A t ta c k s D i s t r i b u t e d n e t w o r k A t ta c k s D iffe re n t p a ssw ord c r a c k in g t e c h n i q u e s are
___
R ainbow A ttacks
A r a i n b o w a t t a c k is t h e i m p l e m e n t a t i o n o f t h e c r y p t a n a l y t i c t i m e - m e m o r y t r a d e - o f f t e c h n i q u e . C r y p t a n a l y t i c t i m e - m e m o r y t r a d e - o f f is t h e m e t h o d t h a t r e q u ir e s less t i m e f o r c ry p ta n a ly s is . It uses a lr e a d y c a lc u la te d i n f o r m a t i o n s t o r e d in t h e m e m o r y t o c ra c k t h e c r y p t o g r a p h y . In t h e
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
*Z
R ainbow T ab le
A r a i n b o w t a b l e is a lo o k u p t a b l e s p e c ia lly u sed in r e c o v e r i n g t h e p l a i n t e x t p a s s w o r d
C o m p u ted H ash es
th e A n a t t a c k e r c o m p u t e s t h e hash f o r a list o f p o s s ib le p a s s w o r d s a n d c o m p a r e s it w i t h p re -c o m p u te d hash t a b l e ( r a i n b o w ta b le ) . If a m a t c h is f o u n d , t h e n t h e p a s s w o r d is
cracked.
C o m p are th e H ash es
It is easy t o r e c o v e r p a s s w o r d s b y c o m p a r i n g c a p t u r e d p a s s w o r d h as h e s t o t h e p r e c o m p u t e d t a b le s .
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Winrtgen is a graphical Rainbow Tables Generator that supports LM, FastLM, NTLM, LMCHALL, HalfLMCHALL, NTLMCHALL, MSCACHE, MD2, MD4, MD5, SHA1, RIPEMD160, MySQL323, MySQLSHAl, CiscoPIX, ORACLE, SHA-2 (256), SHA-2 (384), and SHA-2 (512) hashes
1 lnbow ta b le n t 1_lo1w1*dlu)Ml-y_0_lUUx4UUlKWO_tt.rt param eters iMch a lg o r ith m : n t ln Itash le n g th : 16 :h a r o e t: ahcdof gh i.ih lm n o p a rc tu v u x v c . hnr.net in he x : 61 62 63 64 65 G G G7 68 69 6 a 6h 6c 6d 6e 6 f 78 71 74 7S 76 77 78 77 7a cha rset le n g th : 26
| k h a
[#>6COFQHIJW.MNOPQRSrUWvW2 Key *oocf 8353C82502 keys DW. : 610 :5 M 3 Succfzi tr lI.Uy 0 978333 |978(K|
loq uo nt 141 3 t a r t in tf p o in t b o gin from 0 <0x0090000000000000 < > k!!3fc o f 1MHHHHH ra in h o u r.h n in .1 ge ne rate d <H n 7 .6 a I 111 vr: I 1M M W W M U r nhou f l w i n i <U n V . 6 < : 7M.HH o f 4W M M M M W rn in h n u c ho i n i y r > r . r .l <8 it 7 .7 s tfc2144 o f 48W8888 m iu lw u ch in :! ra te d < 11 n 7 .6 < ( o f 4080090 rainb ow c ha lnu ge ne rate d <0 1 7 .6 v 27680 <
41 .
>tp .pd arte prt(n r 1r* 1pn hmr T0Ui (ccirpuUlun in;
Oplitnil 0 4
M B e re * w a rk
rim -
http://project-rainbowcrack.com
W in rtg en
v S o u rc e : h t t p : / / w w w . o x i d . i t W i n r t g e n is a g ra p h ic a l R a in b o w T a b le s G e n e r a t o r t h a t h e lp s a tt a c k e r s t o c r e a t e r a i n b o w ta b le s f r o m w h i c h t h e y can c ra c k t h e h a s h e d p a s s w o r d . It s u p p o r t s L M , F a stL M , N T L M , LMCHALL, H alfL M C H A L L , N TLM C H A LL, MSCACHE, MD2, MD4, MD5, SHA1, R IP E M D 1 6 0 , M ySQL323,
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
in
N* of tables
Charset
|a lp h a
[ABCDEFGHUKLMNOPQRSTUVWXYZ Table properties Key space: 8353082582 keys Disk space: 810.35 MB Success probab*ty: 0.978038 (97.80*) Benchmark Hash speed Step speed Table precomputation time Total precomputation time: Max cryptanalysis time: Benchmark Optional parameter !Administrator
Edit
jj
Cancel
Syntax: r tg e n h a s h _ a lg o r i t h m c h a r s e t p la i n t e x t _ l e n _ m i n p l a i n t e x t _ l e n _ m a x t a b l e j n d e x
c h a i n j e n c h a in _ n u m p a r t j n d e x
Administrator: Command Prompt - rtgen ntlm loweralpha 1 7 0 1000 4000000 0
_ X
nistrator\Downloads\rainbowcrackl.5win64>rtgen ntln loweralpha 1 MUM 0 ntlm_loweralphattl1000_0_7x4000000_0.rt parameters n: ntln 16 abcdefghijklnnopqrstuvwxyz x: 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 78 79 7a h: 26 gth range: 1 - 7 : 0x00000000 al: 8353082582 arting point begin fron 0 <0x0000000000000000) 000 rainbow chains generated <0 n 0000 rainbow chains generated <0 0000 rainbow chains generated <0 0000 rainbow chains generated <0 0000 rainbow chains generated <0 0000 rainbow chains generated <0 7.6 s> n 7.6 s) n 7.7 s) n 7.6 s) n 7.6 s) n 7.6 s)
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
protected files using the unused processing pow er of m achines across th e ne tw o rk to decrypt passwords In this attack, a DN A m anager is installed in a central location w here machines running DN A clients can access it o v e rth e network
f
DNA Manager
^ coordinates th e attack and allocates small p o rtions o f th e key search to machines th a t are d is trib u te d over th e n e tw o rk
f
D N A C lie n t ru ns in th e b a c k g ro u n d , c o n s u m in g o n ly
^ The program com bines th e processing capabilities o f all the clients connected to n e tw o rk and uses it to pe rfo rm key search to de crypt th e m
j
un u se d p ro ce sso r tim e
o v e r th e n e tw o rk
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C o n tr o ls t h e c lie n ts a n d id e n t if ie s w o r k d o n e b y c lie n ts
D N A is d iv id e d i n t o t w o m o d u le s :
N etw ork M a n a g e m e n t
The N e t w o r k T r a ffic a p p li c a t i o n in W i n d o w s is u sed f o r t h e purpose o f n e tw o rk m a n a g e m e n t . T he N e t w o r k T r a ffic d ia lo g b o x is u sed t o f i n d o u t t h e n e t w o r k s p e e d t h a t D N A uses a n d e a ch w o r k u n i t le n g t h o f t h e D N A c l i e n t . U sing t h e w o r k u n i t le n g t h , a D N A c l i e n t can w o r k w i t h o u t c o n t a c t i n g t h e D N A s e rv e r. T h e D N A c l i e n t a p p li c a t i o n has t h e a b i l it y t o c o n t a c t t h e D N A s e r v e r a t t h e b e g in n in g a nd e n d in g o f t h e w o r k u n i t le n g t h . T h e u s e r can m o n i t o r t h e j o b s ta tu s q u e u e a nd t h e DNA. W h e n t h e d a ta is c o lle c te d f r o m t h e N e t w o r k T r a ffic d ia lo g box, m o d i f i c a t i o n t o t h e c l i e n t w o r k u n i t can be m a d e . W h e n t h e size o f t h e w o r k u n i t le n g t h in c re a se s, t h e s p e e d o f t h e n e t w o r k t r a f f i c d e cre a s e s . If t h e t r a f f i c has been decreased, th e c lie n t w o r k on th e jo b s w o u ld re q u ire a lo n g e r a m o u n t o f tim e . T h e re fo re , f e w e r r e q u e s ts t o t h e s e r v e r can be m a d e d u e t o t h e r e d u c t i o n in t h e b a n d w i d t h o f n e t w o r k tra ffic .
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Distributed password recovery over LAN, Internet, or both Plug-in architecture allows for additional file formats Schedule support for flexible load balancing Install and remove password recovery clients remotely Encrypted network communications
[-!a
v * -
tm
1 1 a f
MM<j +
< f
LU
Elcomsoft Distributed Password Recovery breaks complex passwords, recovers strong encryption keys, and unlocks documents in a production environment
n = n
keys, a nd u n lo c k d o c u m e n t s in a p r o d u c t i o n e n v i r o n m e n t . It a llo w s t h e
e x e c u t i o n o f m a t h e m a t i c a l l y i n t e n s i v e p a s s w o r d r e c o v e r y c o d e o n t h e e n o r m o u s l y p a ra lle l c o m p u t a t i o n a l e le m e n t s f o u n d in m o d e r n g r a p h i c a c c e le r a t o r s . T his e m p lo y s an i n n o v a t i v e t e c h n o l o g y t o a c c e le r a te p a s s w o r d r e c o v e r y w h e n a c o m p a t i b l e ATI o r N V ID IA g r a p h ic s c a rd is p r e s e n t in a d d i t i o n w i t h t h e C P U -o n ly m o d e . W h e n c o m p a r e d w i t h t h e p a s s w o r d r e c o v e r y m e t h o d s t h a t o n l y use t h e c o m p u t e r ' s m a in CPU, t h e GPU a c c e le r a tio n u sed b y t h is t e c h n o l o g y m a k e s p a s s w o r d r e c o v e r y fa s te r . T his s u p p o r t s p a s s w o r d r e c o v e r y o f a v a r i e t y o f a p p li c a t i o n s a n d file f o r m a t s . F ea tu res & B en e fits Q Q Q Q Q R ed uc e s p a s s w o r d r e c o v e r y t i m e D i s t r i b u t e d p a s s w o r d r e c o v e r y o v e r LAN, I n t e r n e t , o r b o t h S o lace m a n a g e m e n t f o r f l e x i b l e c o n t r o l f r o m a n y n e t w o r k e d PC P lu g-in a r c h i t e c t u r e a llo w s f o r a d d it io n a l f ile f o r m a t s F le xib le q u e u e c o n t r o l a llo w s easy j o b m a n a g e m e n t In sta ll a n d r e m o v e p a s s w o r d r e c o v e r y c lie n ts r e m o t e l y
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
& ie fcdrt ^ y!w Agent Server tjelp Start II 1 Apply Sr Add Files | filenam e S Testl.&x C STest2.>Jsx M Test3.rfsx TcsM.xbx & TestS. >lcx 5 Reva.xisx 6 CSoft.&x
- L fJ
(!) Enable (5 Doable dapsed tme 1rwi. lrwv Inn. 121w. current speed average speed 4S 6 423 219 470 42 ? 263 status recovered recovered recovered recovered notavpted recovered
Files
Connection
Alerts m Cache And Log , not recovered: 0, net crypted : 1 total: 7, not started : 1 , paused : 1, wartng : 0, ecovered : S Attack dictionary [Er^lish
Prefix /Suffix s
object
Result
y M utatton
1 0 Bask
l l
) Length
no acttve tasks
tocalmt
onlne
.!|
II | S
Lq
F i l e s
*
Agents
s
Connection
AJens
m
Cache And log
t o t a l :7 ,n o t *Ur t e d: 1 , Cu9cd :1, rt1ng:0, r e c o v e r e d :5 . nore c o v e r e d:0 , notcrrpcd:l stuck mm | o b j e c t | ReaJt ] Comment
A n o a c f r v t to*s
l o c a h o i t
< * orine
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Non-Electronic Attacks
Looking at either the user's keyboard or screen while he/she is logging in
Searching for sensitive information at the user's trash-bins, printer trash bins, and user desk for sticky notes
Copyright by E&Coincil. All Rights Reserved. Reproduction isStrictly Prohibited.
I I
d o e s n 't re q u ire
|1
D u m p ste r D iving
D u m p s t e r d iv in g is a k e y a t t a c k m e t h o d t h a t t a r g e t s u p o n a s u b s t a n t i a l f a i l u r e in
c o m p u t e r s e c u r it y : t h e v e r y i n f o r m a t i o n t h a t p e o p le c ra ve , p r o t e c t , a n d d e v o t e d l y s e c u re can be a t t a in e d b y a lm o s t a n y o n e w i l l i n g t o s c r u t i n iz e g a r b a g e . It a llo w s y o u t o g a t h e r i n f o r m a t i o n a b o u t t h e t a r g e t 's p a s s w o r d s by l o o k in g t h r o u g h t h e tr a s h . This l o w - t e c h a t t a c k t y p e has m a n y i m p lic a t io n s . D ue t o less s e c u r it y t h a n t h e r e is t o d a y , d u m p s t e r d iv in g w a s a c t u a l ly q u i t e p o p u l a r in t h e 1 980s. T h e t e r m d u m p s t e r d iv i n g " r e fe r s t o a n y u s e fu l, g e n e r a l i n f o r m a t i o n t h a t is f o u n d a nd ta ke n fr o m a re as w h e r e it has b e e n d is c a r d e d . T h e se a re a s i n c lu d e tr a s h cans, c u r b s id e
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
S im p ly , t h e e x a m i n a t i o n o f w a s t e p r o d u c t s t h a t h a ve b e e n d u m p e d i n t o t h e d u m p s t e r a re a s m a y be h e l p f u l t o a tta c k e r s , a n d t h e r e is a m p le i n f o r m a t i o n t o s u p p o r t t h is c o n c e p t . Such u s e fu l i n f o r m a t i o n w a s d u m p e d w i t h n o t h o u g h t t o w h o s e h a n d s it m a y e n d u p in. T his d a ta can be u tiliz e d b y t h e a t ta c k e r s t o g a in u n a u t h o r i z e d access o n o t h e r s ' c o m p u t e r s y s te m s , o r t h e o b je c t s f o u n d can p r o m p t o t h e r ty p e s o f a tta c k s such as th o s e based o n so c ia l e n g in e e r in g .
T H
S h o u ld er Surfing
s u r fin g is w h e n an in tru d e r is s t a n d in g in c o n s p ic u o u s ly , but near a
'41 S h o u ld e r
l e g i t i m a t e user, w a t c h i n g as t h e p a s s w o r d is e n t e r e d . T h e a t t a c k e r s i m p l y lo o k s a t e i t h e r t h e u s e r's k e y b o a r d o r s c re e n w h i l e he o r she is lo g g in g in, a n d w a t c h e s t o see if t h e u se r is s ta r in g a t t h e d e s k f o r a p a s s w o r d r e m i n d e r o r t h e a c tu a l p a s s w o r d . T his can be p o s s ib le o n l y w h e n t h e a t t a c k e r is p h y s ic a lly close t o t h e t a r g e t . This t y p e o f a t t a c k can also o c c u r in a g r o c e r y s to r e c h e c k o u t lin e w h e n a p o t e n t i a l v i c t i m is s w i p i n g a d e b i t ca rd a n d e n t e r i n g t h e r e q u i r e d PIN. M a n y o f th e s e P e r s o n a l I d e n t i f i c a t i o n N u m b e r s a re o n l y f o u r d ig its lon g. E a v e s d r o p p i n g r e fe r s t o t h e a c t o f s e c r e tly lis te n in g t o s o m e o n e 's c o n v e r s a t i o n . P a s s w o rd s can be d e t e r m i n e d by s e c r e tly lis te n in g t o t h e p a s s w o r d e x c h a n g e s . If t h e h a c k e r fa ils t o g e t y o u r p a s s w o r d b y g u e ssin g , t h e r e are o t h e r w a y s he o r she can t r y t o g e t it. " P a s s w o r d s n i f f i n g " is an a lt e r n a t i v e used b y t h e h a c k e rs t o g e t t h e i r t a r g e t p a s s w o r d s . M o s t o f t h e n e t w o r k s use b r o a d c a s t t e c h n o l o g y , w h i c h m e a n s t h a t e v e r y m e ssa g e t h a t a c o m p u t e r o n t h e n e t w o r k t r a n s m i t s can be re a d b y e a c h a n d e v e r y c o m p u t e r c o n n e c t e d o n t h a t n e t w o r k . In p r a c tic e , e x c e p t t h e r e c i p i e n t o f t h e m essa ge , all o t h e r c o m p u t e r s w i ll n o tic e t h a t t h e m e s s a g e is n o t i n t e n d e d f o r t h e m , a n d i g n o r e it. H o w e v e r , c o m p u t e r s can be p r o g r a m m e d t o lo o k a t e v e r y m e s s a g e t r a n s m i t t e d by a s p e c ific c o m p u t e r o n t h e n e t w o r k . In t h is w a y , o n e can lo o k a t m essa ge s t h a t a re n o t in t e n d e d f o r t h e m . H a c ke rs h a v e t h e p r o g r a m s t o d o th is , a n d t h e n scan all t h e m essa ge s t r a v e r s e d o n t h e n e tw o rk lo o k in g fo r th e p assw ord. You m a y e n d u p g iv in g y o u r p a s s w o r d t o t h e a t t a c k e r if y o u a re lo g g in g i n t o a c o m p u t e r acro ss a n e tw o rk , and so m e c o m p u te rs on th e n e tw o r k have b een c o m p ro m is e d th is w ay. U sing t h is p a s s w o r d s n i f f i n g t e c h n i q u e , h a c k e rs h a v e c o lle c te d th o u s a n d s o f p a s s w o r d s b y b r e a k in g i n t o t h e c o m p u t e r s t h a t a re c o n n e c t e d o n a h e a v ily u sed n e t w o r k .
Social E n g in e e rin g
In c o m p u t e r s e c u r ity , social e n g in e e r in g is t h e t e r m t h a t r e p r e s e n ts a n o n - t e c h n i c a l k in d o f i n t r u s io n . T y p ic a lly , t h is re lie s h e a v ily o n h u m a n i n t e r a c t i o n a n d o f t e n in v o lv e s
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Social e n g in e e r in g is t h e r u n - t h r o u g h o f p r o c u r i n g c o n f i d e n t i a l i n f o r m a t i o n b y d e c e iv in g o r s w a y in g p e o p le . A n a t t a c k e r can m i s r e p r e s e n t h im s e l f as a u s e r o r s y s te m a d m i n i s t r a t o r in o r d e r t o o b t a i n t h e p a s s w o r d f r o m a user. It is n a t u r a l f o r p e o p le t o be h e l p f u l a n d t r u s t i n g . A n y p e r s o n g e n e r a lly m a k e s an e f f o r t t o b u ild a m i c a b l e r e la t io n s h ip s w i t h his o r h e r f r i e n d s a nd c o lle a g u e s . Social e n g in e e r s t a k e a d v a n ta g e o f t h is t e n d e n c y . A n o t h e r t r a i t o f social e n g in e e r in g relie s o n t h e i n a b i l i t y o f p e o p le t o k e e p u p w i t h a c u lt u r e t h a t r e lie s h e a v i l y o n i n f o r m a t i o n t e c h n o l o g y . M o s t p e o p le are n o t a w a r e o f t h e v a lu e o f t h e i n f o r m a t i o n t h e y possess a n d f e w a re ca re le ss a b o u t p r o t e c t i n g it. A t t a c k e r s t a k e a d v a n ta g e o f t h is fa c t fo r th e i n t r u s io n . H a b itu a lly , social e n g in e e r s s e a rch d u m p s te rs fo r v a lu a b le i n f o r m a t i o n . A social e n g in e e r w o u l d h a ve a t o u g h e r t i m e g e t t i n g t h e c o m b i n a t i o n t o a safe, o r e v e n t h e c o m b i n a t i o n t o a h e a lt h c l u b lo c k e r , t h a n a p a s s w o r d . T h e b e s t d e f e n s e is t o e d u c a te , t r a i n , a n d c r e a te a w a re n e s s .
K ey b o ard Sniffing
I
in te rp re t th e
p a s s w o r d as t h e t a r g e t e n t e r s t h e
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Default Passwords
J A default password is a password supplied by the m anufacturer w ith new equipm ent that is password protected
Online tools to search default passwords: http://cirt.net http://default-password.info
h ttp :/ / w w w .d e fa u ltp a s s w o rd .u s
The Default Password List
http://www.passwordsdatabase.com https://w3dt.net
h t tp :/ / w w w .v iru s .o rg
*ccrv.8***: 000 B 8I *!'Connect * wm < doscic < 8 0000/4007
NtowlHinib( : d a \n d * jrM 0 2 9
'
D efault P assw o rd s
S o u rc e : h t t p : / / s e c u r i t y o v e r r i d e . o r g
D e f a u lt p a s s w o r d s a re p a s s w o r d s s u p p lie d b y m a n u f a c t u r e r s w i t h n e w e q u i p m e n t . U s u a lly t h e d e f a u l t p a s s w o r d p r o v id e d by t h e m a n u f a c t u r e r s f o r p a s s w o r d p r o t e c t e d d e v ic e s a llo w s t h e d e v ic e t o be a ccessed d u r in g its in itia l s e tu p . O n l in e t o o l s t h a t can be used t o s e a rch f o r d e f a u l t p a s s w o r d s in c lu d e : 0 0 0 0 0 0 0 0 0 0 h ttp ://c irt.n e t h ttp ://d e fa u lt-p a s s w o rd .in fo h ttp ://w w w .d e fa u ltp a s s w o rd .u s h ttp ://w w w .p a s s w o rd s d a ta b a s e .c o m h ttp s ://w 3 d t.n e t h ttp ://w w w .v iru s .o rg h ttp ://o p e n -s e z .m e h ttp ://s e c u rity o v e rrid e .o rg h ttp ://w w w .ro u te rp a s s w o rd s .c o m h ttp ://w w w .fo rty p o u n d h e a d .c o m
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Vendor 3COM 3COM 3COM 3COM 3COM 3COM Huawei 3COM 3COM 3COM 3COM 3COM 3COM
M odel CoreBuilder CoreBuilder HiPerARC LANplex LANplex LinkSwitch E960 NetBuilder N e tbu ild er Office Connect ISDN Routers SuperStack II Switch SuperStack II Switch OfficeConnect 812 ADSL
SNMP M u lti 5x0 2200 2700 Telnet Telnet Telnet M u lti A dm in n/a debug tech a d m in ttd
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
r Eu
1 E !!
The failure rate is high
a
M anual passw ord c r a c k in g
I
encom passes
M an u al P assw o rd C ra c k in g (G u essin g )
p a s s w o r d s . G u e s sin g is t h e k e y e l e m e n t o f m a n u a l p a s s w o r d c ra c k in g . T h e p a s s w o r d is t h e key v a lu e o f d a ta t h a t is n e e d e d t o access t h e s y s te m . M o s t p a s s w o r d s can be c r a c k e d u sin g d iffe re n t e s c a l a t io n p r iv ile g e s , e x e c u t in g a p p lic a tio n s , h id in g file s, a nd c o v e r in g tra c k s .
A t t a c k e r s t r y m a n y a t t e m p t s t o c ra c k p a s s w o r d s t o i n t r u d e i n t o a t a r g e t 's s y s te m . P a s s w o rd s can be c ra c k e d m a n u a l ly o r u sin g s o m e a u t o m a t e d t o o l s , m e t h o d s , a n d a l g o r i t h m s . P a s s w o rd c ra c k in g can be a u t o m a t e d u sin g a s im p le FOR lo o p also. M a n u a l p a s s w o r d c ra c k in g in v o lv e s d i f f e r e n t a t t e m p t s t o log in t h e f o l l o w i n g w a y s : 0 0 0 0 Find a v a lid u se r C re a te a list o f p o s s ib le p a s s w o r d s Rank p a s s w o r d s f r o m h igh p r o b a b i l i t y t o l o w Key in e ach p a s s w o r d , u n til t h e c o r r e c t p a s s w o r d is d is c o v e r e d
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
M an u a l P assw o rd C ra c k in g A lgorithm
In its s i m p l e s t f o r m , p a s s w o r d g u e s s in g can be a u t o m a t e d u sin g a s im p le FOR lo o p . In t h e e x a m p le t h a t f o l lo w s , an a t t a c k e r c r e a te s a s im p le t e x t file w i t h u s e r n a m e s a n d p a s s w o r d s t h a t a re i t e r a t e d u s in g t h e FOR l o o p . T h e m a in FOR lo o p can e x t r a c t t h e u s e r n a m e s a n d p a s s w o r d s f r o m t h e t e x t f i l e t h a t se rv e s as a d i c t i o n a r y as it i t e r a t e s t h r o u g h e v e r y line :
c:\>FOR /F 1 1tokens=l,2* %i in (credentials .txt) A More? do net use \\victim.com\lPC$ %j /u:victim.com\%iA More? 2 n u l A More? && echo %time% %date% outfile.txtA outfile.txt
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
T h e r e a re p a s s w o r d lists t h a t can be fe d t o th e s e c ra c k e rs t o c a r r y o u t a d i c t i o n a r y a t t a c k . In its s i m p l e s t f o r m , a u t o m a t i o n in v o lv e s f i n d i n g a v a lid u s e r a n d t h e p a r t i c u l a r e n c r y p t i o n a l g o r i t h m b e in g used , o b t a i n i n g e n c r y p t e d p a s s w o r d s , c r e a t in g a list o f all p o s s ib le p a s s w o r d s , e n c r y p t i n g e ach w o r d , a n d c h e c k in g f o r a m a t c h f o r e ach u s e r ID k n o w n . T his p ro c e s s is r e p e a t e d u n t i l t h e d e s ire d re s u lts a re o b t a i n e d o r all o p t i o n s a re e x h a u s t e d . A u t o m a t i c p a s s w o r d c r a c k in g a l g o r i t h m s s h o u ld in c lu d e t h e f o l l o w i n g s te p s: e e 0 Q Q Find a v a lid u se r Find e n c r y p t i o n a l g o r i t h m used O b t a in e n c r y p t e d p a s s w o r d s C re a te a list o f p o s s ib le p a s s w o r d s E n c r y p t e ach w o r d See if t h e r e is a m a tc h f o r e ach u s e r ID
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
U rtifM
c EH
itkMjl IlMhM
Attacker
User
Passwords
PassView is executed in th e background and passwords w ill be stored in th e .TXT files in th e USB drive
W z J
sto re d
a p p lic a tio n s . P e o p le w h o h a ve m u l t i p l e o n l i n e a c c o u n ts u s u a lly s to r e t h e i r u s e r n a m e s and p a s s w o r d s as a b a c k u p t o use if t h e y f o r g e t t h e m . You can r e c o v e r o r s te a l such c r e d e n t i a l s u sin g a USB d riv e . T h e p h y s ic a l a p p r o a c h m a t t e r s a l o t f o r h a c k in g p a s s w o r d s . O n e can ste a l p a s s w o r d s u sin g a USB d r iv e a n d a p p lic a tio n s . This m e t h o d is a p p lic a b le f o r h a c k in g s t o r e d p a s s w o r d s in a n y c o m p u t e r . M o s t o f t h e p e o p le s ig n in g u p f o r a la rg e n u m b e r o f w e b s i t e s u s u a lly s to r e t h e i r passw ords on th e c o m p u te r in o r d e r t o re m e m b e r th e m . O n e can t r y re c o v e rin g th e m
a u t o m a t i c a l l y u sin g a USB d riv e . T his r e q u ir e s p lu g g in g t h e USB in a n y p o r t o f t h e c o m p u t e r in w h i c h t h e p a s s w o r d s h a v e b e e n s t o r e d . T his t r i c k is a p p lic a b le f o r W i n d o w s XP, W i n d o w s 7, W i n d o w s V is ta , a n d W i n d o w s 2 0 0 0 . All t h e a p p li c a t i o n s i n c lu d e d a re p o r t a b l e a n d l ig h t e n o u g h t h a t t h e y can be d o w n l o a d e d in th e USB d is k in f e w se c o n d s . You can also h a c k s t o r e d M e s s e n g e r p a s s w o r d s . U sing t o o l s a n d a USB p e n d r i v e y o u can c r e a te a r o o t k i t t o h a c k p a s s w o r d s f r o m t h e t a r g e t c o m p u t e r . S te a lin g p a s s w o r d s u s in g a USB d e v ic e is c a r r ie d o u t w i t h t h e h e lp o f t h e f o l l o w i n g s te p s : 1. You n e e d a p a s s w o r d h a c k in g t o o l
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
2. 3.
4.
5. 6.
In s e r t t h e USB
d r i v e a n d t h e a u t o r u n w i n d o w p o p - u p ( if e n a b le d ) .
In t h i s sto re d
th e
p e r s o n . This
p ro c e s s ta k e s o n l y a f e w s e c o n d s t o r e t r i e v e p a s s w o r d s .
Attacker
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Keyloggers provide an easiest and most effective means of stealing a all victinVs user names and passwords
If an attacker is successful in infecting a victim's machine with a Trojan that have keylogging features he can instruct the Trojan server to log and send back all user credentials to his machine
Attacker
................... >
.........&
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Domain Server
Attacker gains access to domain server
W hen
s te a lin g p a s s w o r d s , t h e
a t t a c k e r f i r s t i n f e c ts t h e v i c t i m ' s local
PC w i t h
a s o ftw a re
k e y lo g g e r . W h e n t h e v i c t i m
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Microsoft Authentication
SAM Database
Windows stores user passwords in the Security Accounts Manager database (SAM), or in the Active Directory database in domains. Passwords are never stored in clear text; passwords are hashed and the results are stored in the SAM
Windows Security Enter netw ork password
Enter y o u r p assw o'd t o c o n n e c t to :
(rtifwd
CEH
itkitjl
Remember my credentials
NTLM Authentication
Use another account
The NTLM authentication protocol types: 1. NTLM authentication protocol 2. LM authentication protocol These protocols stores user's password in the SAM database using different hashing methods
OK
Cancel
Kerberos
Microsoft has upgraded its default authentication protocol to Kerberos which provides a stronger authentication for client/server applications than NTLM
Windows 8
Copyright by EC-Cauactl. All Rights Reserved. Reproduction is Strictly Prohibited.
M icrosoft A u th en ticatio n
SAM D a ta b a se
T h e a c r o n y m S A M d a ta b a s e is t h e S e c u r ity A c c o u n ts M a n a g e r d a ta b a s e . T his is used b y W i n d o w s t o m a n a g e u s e r a c c o u n ts a n d p a s s w o r d s in t h e h a s h e d f o r m a t ( o n e - w a y hash). P a s s w o rd s a re n e v e r s t o r e d in p la i n t e x t f o r m a t . T h e y a re s t o r e d in t h e h a s h e d f o r m a t t o p r o t e c t t h e m f r o m a tta c k s . T h e S A M d a t a b a s e is i m p l e m e n t e d as a r e g i s t r y f i l e a n d t h e W i n d o w s k e r n e l o b t a in s a n d k e e p s an e x c lu s iv e fil e s y s t e m lo c k o n t h e S A M file . As t h is file is p r o v id e d w i t h a fil e s y s t e m lock, t h is p r o v id e s s o m e m e a s u r e o f s e c u r it y f o r t h e s to r a g e o f t h e p a s s w o r d s . It is n o t p o s s ib le t o c o p y t h e S A M file t o a n o t h e r l o c a t io n in t h e case o f o n l i n e a tta c k s . Since t h e S A M f ile is lo c k e d w i t h an e x c lu s iv e f i l e s y s t e m lock, it c a n n o t be c o p ie d o r m o v e d w h i l e W i n d o w s is r u n n i n g . T h e lo c k w i ll n o t re le a s e u n til t h e b lu e s c re e n e x c e p t i o n has b e e n t h r o w n o r o p e r a t i n g s y s te m has s h u t d o w n . H o w e v e r , m a k in g t h e p a s s w o r d h a s h e s a v a ila b le f o r o f f l i n e b r u t e - f o r c e a t t a c k s , t h e o n - d is k c o p y o f t h e c o n t e n t s o f t h e S A M file can be d u m p e d u sin g v a r io u s t e c h n i q u e s . M i c r o s o f t i n t r o d u c e d t h e SYSKEY f u n c t i o n in W i n d o w s NT 4 .0 in an a t t e m p t t o i m p r o v e t h e s e c u r it y o f t h e S A M d a ta b a s e a g a in s t o f f l i n e s o f t w a r e c r a c k in g . T h e o n - d is k c o p y o f t h e S A M file
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
is p a r t i a l l y e n c r y p t e d w h e n t h e SYSKEY is e n a b le d . In t h is w a y t h e p a s s w o r d hash v a lu e s f o r all local a c c o u n ts s t o r e d in t h e S A M a re e n c r y p t e d w i t h a key. Even if its c o n t e n t s w e r e d is c o v e r e d b y s o m e s u b t e r f u g e , t h e keys a re e n c r y p t e d w i t h a o n e w a y hash, m a k in g it d i f f i c u l t t o b re a k . A lso , s o m e v e r s io n s h a ve a s e c o n d a r y ke y , m a k in g t h e e n c r y p t i o n s p e c ific t o t h a t c o p y o f t h e OS.
NTLM A u th en ticatio n
NTLM (NT LAN M a n a g e r ) is a p r o p r i e t a r y p r o t o c o l e m p l o y e d by m a n y M ic ro s o ft p r o d u c t s t o p e r f o r m c h a l l e n g e / r e s p o n s e a u t h e n t i c a t i o n , a n d it is t h e d e f a u l t a u t h e n t i c a t i o n s c h e m e t h a t M i c r o s o f t f i r e w a l l a n d p r o x y s e r v e r p r o d u c t s use. This s o f t w a r e w a s d e v e lo p e d t o a d d re s s t h e p r o b l e m o f w o r k i n g w i t h Java te c h n o l o g i e s in a M i c r o s o f t - o r i e n t e d e n v i r o n m e n t . Since it d o e s n o t r e ly o n a n y o ffic ia l p r o t o c o l s p e c ific a t io n , t h e r e is n o g u a r a n t e e t h a t it w o r k s c o r r e c t l y in e v e r y s i t u a t i o n . It has b e e n o n s o m e W i n d o w s in s t a lla tio n s , w h e r e it w o r k e d s u c c e s s fu lly . N T L M a u t h e n t i c a t i o n c o n s is ts o f t w o p r o t o c o l s : N T L M a u t h e n t i c a t i o n p r o t o c o l a nd LM a u t h e n t i c a t i o n p r o t o c o l . T h e se p r o t o c o l s use d i f f e r e n t hash m e t h o d o l o g y t o s to r e u s e rs ' p a s s w o r d s in t h e S A M d a ta b a s e .
K erb ero s
K e r b e ro s is a n e t w o r k a u t h e n t i c a t i o n p ro to c o l. It is d e s ig n e d t o p r o v id e s t r o n g a u t h e n t i c a t i o n f o r c l i e n t / s e r v e r a p p li c a t i o n s b y u sin g s e c r e t - k e y c r y p t o g r a p h y . T his p r o v id e s m u t u a l a u t h e n t i c a t i o n . B o th t h e s e r v e r a n d t h e u s e r v e r i f y t h e i d e n t i t y o f e a ch o t h e r . M e s s a g e s s e n t t h r o u g h K e r b e ro s p r o t o c o l a re p r o t e c t e d a g a in s t r e p la y a tta c k s a n d e a v e s d r o p p in g . K e r b e ro s m a k e s use o f K e y D i s t r i b u t i o n C e n t e r (KDC), a t r u s t e d t h i r d p a r ty . T his c o n s is ts o f t w o lo g ic a lly d is t in c t p a rts : an A u t h e n t i c a t i o n s e r v e r (AS) a n d a T i c k e t G r a n t i n g S e r v e r (TGS). K e r b e ro s w o r k s o n t h e basis o f " t i c k e t s " t o p r o v e t h e u s e r's i d e n t it y .
Module
05 Page 566
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Windows Security
Remember my credentials
OK
Cancel
Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
c :\windows\system32\config\SAM
H a c k e rs:1 0 0 3 :37035B1C4AE2B0C5B75E0C8D76954A50: 7773C08920232397CAE081704964B786::: Admin:1 0 0 4 :NO PASSWORD*********************:NO PASSWORD*********************: : : M a r tin :1 0 0 5 :624AAC4137 95CDC1AAD3B435B51404EE:C5A237B7E9D8E708D8436B6148A25FA1: : :
John:1006:624AAC413795CDC1FF17365FAF1FFE89:3B1B47E42E0463276E3DED6CEF349F93::: Jason:1007:624AAC413795CDC14E835F1CD90F4C76:6F585FF8FF6280B59CCE252FDB500EB8::: [smitH: [I00i): [624AAC413795CDC14E835FlCD90F4C761: |6F585FF8FF6280B59CCE252FDB500EB^:::
y
LM Hash
V
NTLM H ash
U ser n am e U se r ID
"LM hashes have been disabled in Windows Vista and later Windows operating systems, LM will be blank in those systems.'
Copyright by E&Cauactl. All Rights Reserved. Reproduction isStrictly Prohibited.
T h e h ash e s a re s t o r e d in c : \ w i n d o w s \ s y s t e m 3 2 \ c o n f i g \ S A M . A d m in i s t r a t o r : 5 0 0 : 5 9 8 D D C E 2 6 6 0 D 3 1 9 3 A A D 3 B 4 3 5 B 5 1 4 0 4 E E :2 D 2 0 D 2 5 2 A 4 7 9 F 4 8 5 C D F 5 E 1 7 1 D 9 3 9 85 B F ::: Gu e s t 5 0 1 NO p / \ 5 5 \ / \ / 0 R D * * * * * * * * * * * * * * * * * * * * * N O P A S S W O R D * * * * * * * * * * * * * * * * * * * * * H e l p A s s i s t a n t : 1 0 0 0 : B 9 9 1 A l D A 1 6 C 5 3 9 F E 4 1 5 8 4 4 0 8 8 9 B E l F F A : 2 E 8 3 D B lA D 7 F D lD C 9 8 1 F 3 6 4 1 2 8 6 3 6 0 4 E 9 ::: SU P PO R T _3 88 9 45 a0 :10 C )2 :N O P A S S W O R D ***** ****** ******* ***:F 5 C lD 3 8 1 4 9 5 9 4 8 F 4 3 4 C 4 2 A EE04DE990C::: A t ta c k e r s : 1 0 0 3 :3 7 0 3 5 B 1 C 4 A E 2 B 0 C 5 B 7 5 E 0 C 8 D 7 6 9 5 4 A 5 0 :7 7 7 3 C 0 8 9 2 0 2 3 2 3 9 7 C A E 0 8 1 7 0 4 9 6 4 B 7 8 6 :::
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
A d m i n ,1 0 0 4 N O P A S S W O R D * * * * * * * * * * * * * * * * * * * * * N O P A S S W O R D * * * * * * * * * * * * * * * * * * * * * *
M a r tin : 1 0 0 5 :6 2 4 A A C 4 1 3 7 9 5 C D C lA A D 3 B 4 3 5 B 5 1 4 0 4 E E :C 5 A 2 3 7 B 7 E 9 D 8 E 7 0 8 D 8 4 3 6 B 6 1 4 8 A 2 5 F A 1::: J o h n :1 0 0 6 :6 2 4 A A C 4 1 3 7 9 5 C D C lF F 1 7 3 6 5 F A F lF F E 8 9 :3 B lB 4 7 E 4 2 E 0 4 6 3 2 7 6 E 3 D E D 6 C E F 3 4 9 F 9 3 : :: Jason :1 0 0 7 :6 2 4 A A C 4 1 3 7 9 5 C D C 1 4 E 8 3 5 F 1 C D 9 0 F 4 C 7 6 :6 F 5 8 5 F F 8 F F 6 2 8 0 B 5 9 C C E 2 5 2 F D B 5 0 0 E B 8 ::: S m ith :1 0 0 8 :6 2 4 A A C 4 1 3 7 9 5 C D C 1 4 E 8 3 5 F 1 C D 9 0 F 4 C 7 6 :6 F 5 8 5 F F 8 F F 6 2 8 0 B 5 9 C C E 2 5 2 F D B 5 0 0 E B 8 ::: W h e n t h e u s e r c h a n g e s his o r h e r p a s s w o r d , t h e c r e a t i o n a n d s to r a g e o f v a lid L M h a s h e s is d is a b le d in m a n y v e r s io n s o f W i n d o w s . T his is t h e d e f a u l t s e t t i n g f o r W i n d o w s V ista a nd W i n d o w s 7. T h e LM hash can be b la n k in t h e v e rs io n s in w h i c h d is a b le d LM hash is t h e d e f a u l t s e ttin g . S e le c tin g t h e o p t i o n t o r e m o v e LM h ash e s e n a b le s an a d d it io n a l c h e c k d u r in g p a s s w o r d c h a n g e o p e r a t i o n s , b u t d o e s n o t c le a r LM hash v a lu e s f r o m t h e S A M i m m e d i a t e l y . A c t i v a t i n g th e o p tio n a d d it io n a l c h e c k s to re s a "d u m m y" v a lu e in t h e SA M d a ta b a s e and has no
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
W h at Is LAN M a n a g e r H a sh ?
UrtifM
CEH
itkiul l u ll
LM hash or LAN Manager hash is the primary hash format that Microsoft LAN Manager and Microsoft Windows use to store user passwords of up to 14 characters length
When this password is encrypted with the LM algorithm, all the letters are converted to uppercase: 123456QWERTY
The password is padded with null (blank) characters to make it 14 characters in length: 123456QWERTY_
Before encrypting this password, 14 character string is split in half: 123456Qand WERTY_, each string is individually encrypted and the results concatenated:
M icrosoft
Note: LM hashes have been disabled in Windows Vista and later Windows operating systems
Copyright by E&Cauactl. All Rights Reserved. Reproduction isStrictly Prohibited.
a d m in i s t r a t o r s . M i c r o s o f t W i n d o w s NT s to re s t w o t y p e s o f p a s s w o r d s : a LAN M a n a g e r (L M ) p a s s w o r d a n d a W i n d o w s NT p a s s w o r d . For e x a m p le , le t's a s s u m e y o u r p a s s w o r d is '1 2 3 4 5 6 q w e r t y ' . W h e n th is passw ord is e n c ry p te d w ith th e LM a lg o rith m , it is f i r s t c o n v e rte d to all uppercase:
,1 2 3 4 5 6 Q W E R T Y 1 . If t h e p a s s w o r d is n o t o f 14 c h a r a c te r s in le n g t h , t h e n it is p a d d e d w i t h n u ll ( b la n k ) c h a r a c te r s t o m a k e it 14 c h a r a c te r s in le n g t h . A t t h is sta g e t h e a s s u m e d p a s s w o r d b e c o m e s '1 2 3 4 5 6 Q W E R T Y _ \ B e fo re e n c r y p t i n g , t h e 14 c h a r a c te r s o f t h e p a s s w o r d s a re s p lit i n t o t w o s e v e n b y te h alves. T h a t m e a n s o n e s e v e n b y te s tr in g w i t h 1 2 3 4 5 6 Q' a n d t h e s e c o n d se ven b y te s t r in g w ith W E R TY _ . Each s tr in g is e n c r y p t e d i n d i v id u a l l y and th e re s u lts
WERTY_ = F1E9FFDCC75575B15
T h e r e s u lt in g hash is 6bf11e04afab197ff1e9ffdcc75575b15
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
W h at Is LAN M a n a g e r H a sh ?
(C o n td)
The first 8 bytes are derived from the first 7 characters of the password and the second 8 bytes are derived from characters 8 through 14 of the password
CEH
Urt.fi* | ttk.ul M m Im
1
&
IT
If the password is less than 7 characters, the second half will always be 0xAAD3B435B51404EE
Suppose, for this example, the user's password has an LM hash of 0xC23413A8AlE7665f AAD3B435B51404EE
NTLMv2 is a challenge/response authentication protocol, that offers improved security over the obsolete LM protocol
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
LM Hash Generation
(rtifwd
C EH
itkitjl
* LM H a sh G en e ra tio n
T h e LM hash also ca lle d as t h e LAN m a n a g e r hash u sed by m a n y v e r s io n s o f W i n d o w s f o r s t o r i n g p a s s w o r d s less t h a n 15 c h a r a c te r s . T h e f o l l o w i n g f i g u r e e x p la in s t h e "c e h p a s s l" . In t h e LM hash g e n e r a t io n p ro ce ss, f i r s t t h e p a s s w o r d in lo w e r c a s e is c o n v e r t e d t o u p p e r c a s e ; in t h is e x a m p le , t h is o p e r a t i o n r e s u lts in "C EHPASS1". T h e n , t h e u p p e r c a s e p a s s w o r d , i.e., "C EHPASS1", is d iv i d e d i n t o t w o s e v e n c h a r a c t e r s trin g s ; in t h e e x a m p le , t h e r e s u lt in g s trin g s a re "CEHPASS" a n d * * * * * * ! . As t h e s e c o n d s t r in g c o n ta in s o n l y o n e c h a r a c te r , t o m a k e t h e s e c o n d s t r in g a s e v e n - c h a r a c t e r s tr in g , i t is le n g t h e n e d p a d d in g . T h e t w o s e v e n - c h a r a c t e r s tr in g s a re t h e n used w ith n u ll ( b la n k ) c h a r a c te r s , i.e., e n c ry p tio n keys f o r t h e p ro c e s s o f g e n e r a t in g an LM hash f o r a u s e r p a s s w o r d
as t h e
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
cehp assl
CEHPASS
?1
Constant DES
II
Constant
\
Concatenate
7
LM Hash
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
LM
N TLM vl
YES
NTLMv2
YES
56bit + 56bit
MD4
MD5
64bit + 64bit
128bit
128bit
128bit
HMAC_MD5
V " n / n / n / n /
128bit
a u th e n tic a tio n m e th o d s . A ttrib u te P assw o rd Case S en sitive Hash Key Length P assw o rd Hash A lg o rith m Hash V a lu e Length C /R Key Length C /R A lg o rith m C /R V a lu e Length 5 6 b it + 5 6 b it DES (ECB m o d e ) 6 4 b i t + 6 4 b it 5 6 b it + 5 6 b i t + 1 6 b i t DES (ECB m o d e ) 6 4 b it + 6 4 b i t + 6 4 b i t
-
LM
No
N TLM vl
YES
NTLMv2
YES
MDS 1 28 b it 1 28 b it HMAC_M DS 1 28 b it
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
I
M a rtin
Aa r8 ppq
Hash Algorithm
DC compares computers response with the response it created with its own hash If they match, the logon is a success
kgj89 pqr
Note: Microsoft has upgraded its default authentication protocol to Kerberos, which provides strong authentication for client/server applications than NTLM.
Copyright by EC-Cauactl. All Rights Reserved. Reproduction is Strictly Prohibited.
NTLM A u th en ticatio n P ro c e ss
N T L M in c lu d e s t h r e e m e t h o d s o f c h a l l e n g e - r e s p o n s e a u t h e n t i c a t i o n : L M N T L M v l , a n d N T L M v 2 . T h e a u t h e n t i c a t i o n p ro c e s s f o r all t h e m e t h o d s is t h e s a m e . T h e o n l y d i f f e r e n c e a m o n g t h e m is t h e leve l o f e n c r y p t i o n . In N T L M a u t h e n t i c a t i o n , t h e c l i e n t a n d s e r v e r n e g o t i a t e an a u t h e n t i c a t i o n p r o t o c o l . This is a c c o m p l i s h e d t h r o u g h t h e M i c r o s o f t n e g o t i a t e d S e c u r i t y S u p p o r t P r o v id e r (SSP). T h e p ro c e s s a nd t h e f l o w o f t h e c l i e n t a u t h e n t i c a t i o n t o a d o m a i n c o n t r o l l e r u sin g a n y o f th e N T L M p r o t o c o l s is d e m o n s t r a t e d in t h e f o l l o w i n g s te p s: Q e T h e c l i e n t ty p e s t h e u s e r n a m e a n d p a s s w o r d in t o t h e lo g o n w i n d o w . W i n d o w s r u n s t h e p a s s w o r d t h r o u g h a h a s h a l g o r i t h m a n d g e n e r a t e s a hash f o r th e p a s s w o r d t h a t has b e e n e n t e r e d in t h e lo g o n w i n d o w . Q T h e c l i e n t c o m p u t e r s e n d s a lo g in r e q u e s t a lo n g w i t h d o m a i n n a m e t o t h e d o m a i n c o n tro lle r. Q T h e d o m a i n c o n t r o l l e r g e n e r a t e s a 1 6 - b y t e r a n d o m c h a r a c t e r s tr in g c a lle d a " n o n c e " a n d se nd s it t o t h e c l i e n t c o m p u t e r . Q T h e c l i e n t c o m p u t e r e n c r y p t s t h e n o n c e w i t h a hash o f t h e u s e r p a s s w o r d a n d s e n d s it back to th e d o m a in c o n tro lle r.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
4 * 0
User types password into logon window
Client Computer
Martin **********
Hash Algorithm
@
Aa r8
pq ppq kg kg;)85
DC compares computer's response with the response it created with its own hash
Aa r8 ppq
pqr
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Kerberos Authentication
User request to the authentication server
CE H
......
Reply of the TGS to the client's request
(TGS)
Application Server
Copyright by E&Cauactl. All Rights Reserved. Reproduction isStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Key D i s t r i b u t i o n C e n te r (KDC)
User request to the authentication server
Database
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Salting
Salting technique prevents deriving passwords from the password file Stored representation differs
C EH
171
Advantage: Defeats pre-computed hash attacks
S alting
S a ltin g is a w a y o f m a k in g p a s s w o r d s m o r e s e c u re by a d d in g r a n d o m s tr in g s o f c h a r a c te r s t o p a s s w o r d s b e f o r e t h e i r m d 5 h a s h is c a lc u la te d . This m a k e s c r a c k in g p a s s w o r d s h a r d e r . T h e l o n g e r t h e r a n d o m s tr in g , t h e h a r d e r it b e c o m e s t o b r e a k o r c ra c k t h e p a s s w o r d . T h e r a n d o m s tr in g o f c h a r a c te r s s h o u ld be a c o m b i n a t i o n o f a l p h a n u m e r i c c h a r a c te r s . T he s e c u r it y leve l o r t h e s t r e n g t h o f p r o t e c t i o n o f y o u r p a s s w o r d s a g a in s t v a r io u s p a s s w o r d a tta c k s d e p e n d s o n t h e le n g t h o f t h e r a n d o m s t r i n g o f c h a r a c te r s . This d e fe a t s p r e - c o m p u t e d hash a tta c k s . In c r y p t o g r a p h y , a s a lt co n s is ts o f r a n d o m b its t h a t a re used as o n e o f t h e i n p u t s t o a o n e - w a y f u n c t i o n a n d t h e o t h e r i n p u t is a p a s s w o r d . In s t e a d o f p a s s w o r d s , t h e o u t p u t o f t h e o n e - w a y f u n c t i o n can b e s t o r e d a n d u sed t o a u t h e n t i c a t e users. A s a lt can also be c o m b i n e d w i t h a p a s s w o r d b y a k e y d e r i v a t i o n f u n c t i o n t o g e n e r a t e a k e y f o r use w i t h c r y p to g ra p h ic a lg o r ith m . W i t h t h is t e c h n i q u e d i f f e r e n t h ash es can be g e n e r a t e d f o r t h e s a m e p a s s w o r d . This m a k e s th e a t t a c k e r 's j o b o f c r a c k in g t h e p a s s w o r d s d if f i c u l t . In t h is e x a m p le , t h e t w o users A lic e a n d Cecil h a v e t h e s a m e p a s s w o r d s b u t w i t h d i f f e r e n t hash v a lu e s . Since a r a n d o m hash is g e n e r a t e d f o r e ach in d iv id u a l user: A lic e :ro o t:b 4 e f2 1 :3 b a 4 3 0 3 c e 2 4 a 8 3 fe 0 3 1 7 6 0 8 d e 0 2 b f3 8 d a c ip h e r o r o th e r
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
p w d u m p 7 .exe
PWDUMP extracts LM and NTLM password hashesof local user accounts from the
3
ruitrjtof. Conrrond f*ro#rpl
L = 1 e
p w d u m p 7 an d fg d u m p
p w d u m p 7 is an a p p li c a t i o n t h a t d u m p s t h e p a s s w o r d h ash e s (O W Fs) f r o m NT's SA M d a ta b a s e , p w d u m p e x tr a c ts L M a n d N T L M p a s s w o r d h ash e s o f local u s e r a c c o u n ts f r o m t h e S e c u r ity A c c o u n t M a n a g e r (S A M ) d a ta b a s e . T his a p p li c a t i o n o r t o o l r u n s b y e x t r a c t i n g t h e b in a r y S A M a n d SYSTEM File f r o m t h e f ile s y s t e m a n d t h e n t h e h ash es a re e x t r a c t e d . O n e o f t h e p o w e r f u l f e a t u r e s o f p w d u m p 7 is t h a t it is also c a p a b le o f d u m p i n g p r o t e c t e d files. Usage o f t h is p r o g r a m r e q u ir e s a d m i n i s t r a t i v e p r i v i le g e s o n t h e r e m o t e s y s te m .
Administrator C:\Windows\system32\cmd.exe
E:\CEH-Tools\CEHuR Nodule 05 System Hacking\Password CrackingM-Jindous Password C rackers\pudump?:*pwdunp7 .exe Pudunp v7.1 - raw password extractor )uthor: Andres Tarasco Acuna
iv l: h t t p :/ / o w u .5 1 4 .e s r : G 0 0 :N O B E 40C 450 A D 9 9 7 1 3 D r1 E D C G B 4 0 C 2 5 n
PflSSWKDW H H H H H H m H H H H H H H W I t ;;:
- B F 4 Q C 4 5 0 flB 9 9 7 1 3 B F 1 E B C 5 B 4 0 C 2 R A D 4 7 : : :
*:C25510219F66F9F12FC9BE662 LANGUAKD_11_USER:1006 :NO PASSWORD ****************** **** :C25519219 F66F9FI2FC9 BE662 }67B960:: :
* r im in : 1 0 0 7 : NO
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Failed servers:
m 0 H E
fg d u m p
is b a s ic a lly a u t i l i t y f o r d u m p i n g
passw ords on W in d o w s
N T /2 0 0 0 /X P /2 0 0 3 /V is ta
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
LOphtCrack
EH
LOphtCrack is a password auditing and recovery application packed with features such as scheduling, hash extraction from 64-bit Windows versions, multiprocessor algorithms, and networks monitoring and decoding
LO phtC rack
S o u rc e : h t t p : / / w w w . I O p h t c r a c k . c o m L O phtC rack is a t o o l d e s ig n e d t o a u d i t p a s s w o r d a n d r e c o v e r a p p lic a tio n s . It is used t o r e c o v e r lo s t M i c r o s o f t W i n d o w s p a s s w o r d s w i t h t h e h e lp o f d ic t io n a r y , h y b r id , r a i n b o w t a b le , a n d b r u t e f o r c e a tta c k s a n d it is also used t o c h e c k t h e s t r e n g t h o f t h e p a s s w o r d . T h e s e c u r it y d e f e c t s t h a t a re i n h e r e n t in w i n d o w s p a s s w o r d a u t h e n t i c a t i o n s y s te m can be d is c lo s e d e a s ily w i t h t h e h e lp o f L O p h tC ra c k . W in d o w s o p e ra tin g s y s te m s , b a se d on th e LAN M anager n e tw o rk in g p r o t o c o ls , use an
a u t h e n t i c a t i o n s y s te m t h a t c o n s is ts o f an 8 - b y t e c h a lle n g e r e t u r n i n g a 2 4 - b y t e re s p o n s e across t h e n e t w o r k f r o m c l i e n t t o s e r v e r in a c h a l l e n g e / r e s p o n s e f o r m a t . T h e s e r v e r m a tc h e s t h e r e s p o n s e a g a in s t its o w n i n d e p e n d e n t c a lc u la tio n o f t h e 2 4 - b y t e re s p o n s e e x p e c t e d a n d th e m a t c h r e s u lts in a u t h e n t i c a t i o n . T h e a l g o r i t h m se g m e n ts and th e n d iv id e s t h e passw ord in to s e v e n -c h a ra c te r re s tric t th e passw ord h ash es i n d iv id u a lly . T his a llo w s t h e a t t a c k e r t o
c ra c k in g t o s e v e n l e t t e r s a nd m a k e s t h e p ro c e s s e a sie r. T h e w e a k n e s s o f t h e p a s s w o r d hash, c o u p le d w i t h t h e tr a n s m is s i o n o f t h e hash acro ss t h e fo rm a t, m akes LM -based s y s te m s h ig h ly s u s c e p tib le n e t w o r k in t h e c h a l l e n g e / r e s p o n s e to c h a lle n g e /re s p o n s e in te rc e p tio n
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
u
Run Import Import Wizard Hashes From Sniffer Begin
w
Pause
u
Stop
a
Session Options Schedule Scheduled Audit Tasks
< 1 Doman
Run ,
Loc
A WIN-LXQN3...
A. WIN-MSSaC... Admitstrator
-m si
IN - M S S a C ...
-MSSaC... Guest
__h a s h
ta b le s
0 of 0 _fisst!ss_.fe1|0g
_ t i ! ! S _ S i a E I S f l
__
2 J
Messages
0 8 /3 1 /2 0 1 2 0 8 /3 1 /2 0 1 2 0 8 /3 1 /2 0 1 2 0 8 /3 1 /2 0 1 2 0 4 :3 6 : 5 9 s i n g l e - c o r e o p e r a t i o n . 0 4 :3 7 :0 1 Im p o r te d 2 a c c o u n t s fr o m t h e 0 4 :3 7 :0 1 A u d it s t a r t e d . 0 4 :3 7 :0 1 A u d i t i n g s e s s i o n c o m p le t e d . lo c a l m a c h in e
Od Oh Ora Os
S U fijliC S L U S S C g
LOphtCrack 6 [ U ntifedl ] r
C raved Accounts Weak Passwords Begin Pause Stop Session Options Schedule Schedjled A u c it Tasks Expired Accounts
View ^ Help X
j
to ta l 29156
Empty: 5.56%
__ words done
____2 _ d a !e
0 .0 3 Q V
_ _ h a s h _ - j ] jls s Hiah Rsk: 83.33% 1 15 2 0 Empty Hgh Risk Medium Risk Low Risk 5.56 % 83.33 % 11.11% 0.00 % 17 0 0 0 Alpha Alphanumeric Alphanumeric/Symbol Alphanumeric/Symbol. International 100.00 % 0.00 % 0.00 % 0.00 %
0 of 0
____S -d zis 0 .0 0 %
.t in e
0 of 0
Od OhlSm
e la p s e d 4s
t im s _ le f i.
1 n , 10 3 8 (
Lfim g
_current_tet
C ZXUL
Messages
0 5 /2 2 /2 0 0 9 1 3 :2 3 :1 8 c ra c k e d f i r s t h a l f o f LH password f o r \s e v e n a w it h 8 r u te Force
c ra c k .
0 5 /2 2 /2 0 0 9 1 3 :2 3 :1 8 c ra c k e d f i r s t h a l f o f LM password f o r \ e i g h t a w it h s r u t e Force c ra c k .
Module
05 Page 584
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ophcrack
J and runs on multiple platforms
CEH
Ophcrack is a Windows password cracker based on rainbow tables. It comes with a Graphical User Interface
U kcr tu t* * * C lTK M pan r*pp kgrn ptrfttouf tVMtff tfoM fnw knob* tplum. p*yv**un tmcn#y* ktowtfr, ***worth
V Kan
LMNuh tt69def9cd6ec622Md)643)6)l40l fc29bc7r9)f1a2SlMd)64tt6)M04 l97W97a7c679l3M]b43*5MM kbUdlOAl 01fcMb7bc6V9Md)MbSlMM fa))*fe46670Md)64))6)t404 di<dc7M)lHMd)64))6)1Mm )706cfc*90b4)OMd)64})6)i4O4M 4fc6d4rt461ffdOMd)64})6)1404 ** 1 #*S1dl d1 ?d)641)6) 1404m <M6td90a97t147Md)64))6)1404 57WOMI0M6c4^1MI%H4O4w 60tfWd)<2)<ft:Md)64))6)i404 4d6 ' 7 k 1)6 1 d6*Md)64))6) 1404m 77M)k)7)4W0)M4)641)6)1404 4SWkk4T)6k7cMd)64n6)1404M M N M 12Uin+1t M N M n I cU4fafd4fc64?6<2)6;)7)40dK
6 6
NT Hath 9669cM2c( 7cU66M*97)JfcJdi7M 66c4t8U11(f67)}Ml9C1Ml*43f 479cf1299a6^670b4'961M6^ *44kO7t |7<f) 1 ) 1)UcrfT) 0{tWIHWr9121K>07y3bl17 tta0d61<4C7<)c4nd0c60KM?D* *066 9( * *66*>(**%(*64: 66f53a)a60MC''*l('499)M64M904 M96WOfc^U002)M)0)6ttU<* S O I 1d)61< ka)f<6Maf3d6)0) ffdMUc*6l6k4aK4)W 4 1 1 *7 *4*<44| 9*** <'* :)V 1 0 I * dl 14141Mct206Ml6r71 c4*3 Mm4u0dr#4uo4c?cxun17f M < )44*41Ml)0.vf06.'l464r)6d044 n0UdNM41:72(*4]4M )61 <1H6HtlK)4<f|><> Kit>IW lll ))Qf199?l4)74*40))0)14M1t)7W
LM M 1 zxc OflMK PANDA COIAj N TiST OOOU MAKS WHO KONAftO AlTftU G OAT UNIT QUAIITV NI14M TAJtGA) *o n ^mcMMV.Inc*Ha > < ,
LMPw.d2 empty mpty empty tmpty mpty mpty mpty empty mpty mpty mpty mpty mpty mpty mpty mpty
16 9 0 6 61
n*14W ray
16
161
0 1f*Ctoy
SUtwt
http://ophcrack.sourceforge.net
Copyright by B - C m
m
O p h c ra c k
S o u rc e : h t t p : / / o p h c r a c k . s o u r c e f o r g e . n e t O phcrack is a W i n d o w s passw ord c r a c k in g to o l th a t uses ra in b o w t a b le s fo r c r a c k in g
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
opfKiac*
L r .. n L *
i
load *ogreaa w Uiet tKhc.bc cmeal pm gietpp kgrail* plefebjre tsnetcf igold*mar roboa tplum ptysenen tmcnayr kbutby hjmswerth ijv r jo t rfrvtmg .qaKjn cerniglu
t!
Delete SUtatxs
t!
Save | *efaente
1
Tabes
Crad>
O
Mdp
Cut
C
About
IM Hash 29b9dacd6e<b22a.d3M3SbS1404 fc29be7W5Ma28U*d3M3Sb5:4Mee 97W97a7ecC798Jad3b*J5b5HWe S<b38d1Dd9114e69M43b43SbS1OUe Dlfcia6te7bc6929Md36435b21404ee ea53*6e4bb7e0ead3b435b51404et dlcde97a8afie1flaa<M*Sb514&4e* 57X<afe8SeCb435ead3W3505iJOief 49ca6d4e94b1ffd0Md3M3SbS1Me f66u1tf6S1d1d12Md3b4?SbS14Mt ceeb8d90a97314e7aad3b435b514We 57fecM6109ad6<4ad3W3SbS14a1e bOd99deic 3dt2<c*dd3bJ3Sbb1AC4ee 4db?a7ete&3b 1dbdaad3W3Sb5 -*Wcc 778853<3734baC3aad3b43!to5140iee 4i3aOd<4f56k8<wd3b4J505l*>4e< Oe<S6M2e1126d}Tef3^8<Jb5a6 c924JUfd4a9<b47bc226Sb?3734Odac
MT Heah M<S02ec:c S2b6aeK7S3fc3d3S*S4 Mfbc4888d21d6 5Jea>91jbSe3e43r <'9ef12t9. S0a37Cto4 J61e6eSa6f UkOa7ct7eOl6#2ft>^e313S2ca673 Oct>bW83C5<7S7MiA2IO'9? 3b29i3' 99e0d&1c:c5c*8<J&c0cJd7D7$ 9aeO>b>9r76dbk1nad5de76eiO bbf*3<3abC6rek74?93tt643&Ot 649b9f09c2580C2384M58b9S22ct? 501 J8eddSbl<5<A<bM1#288dbJ ff ed6cf92c9ebb3f*SIW3W17e*11 *402(44S1$7f67cd99l2aSeS<ftMc3 Wcd8UU1 *cS2Ctxfc68b 71c6Ma3 ddeb39c46d3dfddM32G4<20Q2f$e37F 9ScS84ei19S3SeC22f>?8i6IIS6dCii 9X32edea6dt<KZf'2cdb4jO*fe<363 dia*>8c#d3U<f9c?8dc6*e*94 53091f9J7f4J74e4C33051WaW7W
LM Pwd 1 ZXC OCIMR PANDA COtAIN TEST DOOM2 MARS WIND LECfiARO ALTMA GOAT RAfiftT QUALITY NEM TARGAS ROXY s^mactwCdY'lr. CI<C(M<1 t V O i,
LM Pwd2 empty empty empty empty empty empty empty empty empty empty empty empty empty empty empty empty
NTRwd S M C deliver pinda <obam test doom2 man wnd leonard altima goa! rabbit quality nc1469 targat roxy i
lble
Directory
Status
,
ng ford: 74/*2 Tre dapaed: 0 *0 0a
N u t |
19
ute *orct: |
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
It allows recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force, and cryptanalysis attacks, recording Vol P conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords, and analyzing routing protocols
|I= U
hte Vie* Confgj-e Tools Help ,e I II! S i + y >i 1 ,S | B s i? 0 o ^ 5 ? 11 1*CCJ 1- | .* . raess ] J} quety
sfr Network | S$j snffe- \ j * c 1 adc a l f i m Hash. & NTLMv2 Hashes (0) ) MS-Cade Haetee {> \ fc PWl flies (0) T O H CO-OlOS-MDSHSSt fB P1X M D 5Hast : AP0P-WD5 hashes $ CRAM M35 Hoohes 4 OSPFWDShajheH RIPv2 MDS Hsdxc 4 VRRP-HMAC j g VNC*3GC5(0) "i? M02 Mddtfs (0) MD4 iVri'cs (0) " f f05 haohes (0) J* 5 1 1 4 *1 hashes (0) 'J* SI1A-2 hashes (0) j ,R RtPEMD 16 0 Hashe: : 0 Kerb5FreAuth *teat Radus Shared-Key <5 IKE FSK Hashes (0) ) MS0L Hashes (0) ) MySQL Hashes (0) -
I>
. -* *
IM Hashes chaKnxe NT1MHashes m u Hashes fchalenge r n M Sm Ux Secirlty Hashes
Rortcvo&d Oninc
dorfttvh1Teteanb
ReanoNC <1 Export
I if
passw ords
d ic t io n a r y ,
b ru te -fo rc e ,
c ry p ta n a ly s is
a tta c k s ,
re c o rd in g
c o n v e r s a tio n s , d e c o d i n g s c r a m b le d
p a s s w o r d s , r e c o v e r i n g w ir e le s s n e t w o r k keys, r e v e a lin g
p a s s w o r d b o xe s, u n c o v e r i n g c a c h e d p a s s w o r d s , a n d a n a ly z in g r o u t i n g p r o t o c o ls . W i t h t h e h e lp o f t h is t o o l , p a s s w o r d s a n d c r e d e n t i a l s f r o m v a r io u s s o u r c e s can be r e c o v e r e d easily. It co n s is ts o f APR (A rp Po ison R o u tin g ) t h a t e n a b le s s n if fin g o n s w i t c h e d LAN s a n d m a n - i n m i d d l e a tta c k s . T h e s n if f e r in t h is t o o l is also c a p a b le o f a n a ly z i n g e n c r y p t e d p r o t o c o l s s u ch as HTTP a nd SSH-1, and c o n t a in s filte rs to ca p tu re c re d e n tia ls fro m a w id e ran ge of
a u t h e n t i c a t i o n m e c h a n is m s .
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
^JxJ
file View Configure Tools Help
Decoders Cracker * ^
| j 1 Network | '
Sniffer | ! /
Cracker | Q
Traceroute
Wireless
LM & NTLM Hash! NTLMv2 Hashes (0) MS-Cache Hashes (1 PWL files (0)
IB
n B
Cryptanalysis Attack Rainbowcrack-Ontne ActiveSync Select A Note Test password Add to kst Remove Remove Machine Accounts Remove Al Export Insert Delete >
LM Hashes + challenge NTLM Hashes NTLM Hashes + challenge NTLM Session Security Hashes
:lL
Lost packets: 0 %
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
S o u rc e : h t t p : / / p r o j e c t - r a i n b o w c r a c k . c o m R a in b o w C r a c k c racks h ash e s w i t h r a i n b o w ta b le s . It uses a t i m e - m e m o r y t r a d e o f f a l g o r i t h m t o c ra c k hashes. A t r a d i t i o n a l b r u t e f o r c e c r a c k e r cra ck s h ash es d i f f e r e n t l y w h e n c o m p a r e d t o a t i m e - m e m o r y t r a d e o f f h a s h c ra c k e r. T h e b r u t e f o r c e hash c r a c k e r w ill t r y all p o s s ib le p la in t e x t s one by o n e d u r in g c ra c k in g , w h e r e a s R a in b o w C ra c k p re -c o m p u te s all p o s s ib le p la i n t e x t c i p h e r t e x t p a irs in a d v a n c e a n d s to r e s t h e m in t h e " r a i n b o w t a b l e " file . It m a y ta k e a lo n g t i m e t o p r e - c o m p u t e t h e ta b le s , b u t o n c e t h e p r e - c o m p u t a t i o n is fin is h e d , y o u w i ll be a b le t o cra c k t h e c i p h e r t e x t in t h e r a i n b o w ta b le s e a s ily a n d q u i c k l y .
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
RainbowCrack 1.5
File Edit Rainbow Table Help
Hash
0
0
0 0 0
>
Messages time of alarm check: time of wait: time of other operation: time of disk read: hash t reduce calculation of chain traverse: hash s reduce calculation of alarm check: number of alarm: speed of chain traverse: speed of alarm check: 2.14 s 0.00 s 0.17 s 0.59 s 14388000 35916894 57632 11.11 million/s 16.82 million/s -
E
V
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
0 S i
\
1
PasswordsPro
1 , ,,
i s
http://w w w .insidepro.com
LSASecretsView
h ttp ://w w w . nirsoft. net
LCP
h ttp ://w w w . Icps oft.com
WinPassword
h ttp ://la s tbit, com
Password Cracker
h ttp ://w w w . am ipage s. com
P assw o rd C ra c k in g Tools
P a s s w o rd c r a c k in g to o ls a ll o w you to reset unknown or lo s t W in d o w s loca l a d m i n i s t r a t o r , d o m a i n a d m i n i s t r a t o r , a n d o t h e r u s e r a c c o u n t p a s s w o r d s . It e v e n a llo w s users t o g e t access t o t h e i r lo c k e d c o m p u t e r i n s t a n t l y w i t h o u t r e i n s t a l l i n g W i n d o w s , in case o f f o r g o t t e n p a s s w o r d s . A f e w p a s s w o r d s c r a c k in g t o o l s a re lis te d as f o l lo w s : 0 0 0 0 0 0 0 0 0 0 P a s s w o rd U n l o c k e r B u n d le a v a ila b le a t h t t p : / / w w w . p a s s w o r d u n l o c k e r . c o m P r o a c tiv e S y s te m P a s s w o rd R e c o v e r y a v a ila b le a t h t t p : / / w w w . e l c o m s o f t . c o m J o h n t h e R ip p e r a v a ila b le a t h t t p : / / w w w . o p e n w a l l . c o m W i n d o w s P a s s w o rd C ra c k e r a v a ila b le a t h t t p : / / w w w . w i n d o w s - p a s s w o r d - c r a c k e r . c o m W i n P a s s w o r d a v a ila b le a t h t t p : / / l a s t b i t . c o m P a ssw a re Kit E n te r p r is e a v a ila b le a t h t t p : / / w w w . l o s t p a s s w o r d . c o m P a s s w o rd s P ro a v a ila b le a t h t t p : / / w w w . i n s i d e p r o . c o m L S A S e c re tsV ie w a v a ila b le a t h t t p : / / w w w . n i r s o f t . n e t LCP a v a ila b le a t h t t p : / / w w w . l c p s o f t . c o m P a s s w o rd C ra c k e r a v a ila b le a t h t t p : / / w w w . a m l p a g e s . c o m
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
krbpwguess
h ttp ://w w w . cqure. net
Hash Suite
h ttp://hashs uite. open wall, net
THC Hydra
h ttp ://w w w . the. org
SAMInside
h ttp ://w w w . insidepro. com
!0
IP J
S A M I n s id e a v a ila b le a t h t t p : / / w w w . i n s i d e p r o . c o m W i n d o w s P a s s w o r d R e c o v e r y a v a ila b le a t h t t p : / / w w w . p a s s c a p e . c o m P a s s w o rd R e c o v e r y B u n d le a v a ila b le a t h t t p : / / w w w . t o p - p a s s w o r d . c o m K r b p w g u e s s a v a ila b le a t h t t p : / / w w w . c q u r e . n e t THC H y d ra a v a ila b le a t h t t p : / / w w w . t h c . o r g W i n d o w s P a s s w o rd B r e a k e r E n te rp ris e a v a ila b le at h ttp ://w w w .re c o v e rw in d o w s p a s s w o rd .c o m
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
Windows 2000-based servers and Windows Server 2003-based servers can authenticate users who connect with computers that are running the earlier versions of Windows
For backward compatibility, Windows 2000 and Windows Server 2003 support:
r r
LAN Manager (LM) authentication Windows NT (NTLM) authentication NTLM version 2 (NTLMv2) authentication
>
A n NT hash ( u n ic o d e hash) is u sed in N T L M 1 , N T L M v 2 , a n d K e rb e ro s . T h e L M a u t h e n t i c a t i o n p r o t o c o l uses t h e " L M h a s h . " Do n o t s to r e t h e LM hash, i f it is n o t n e ce ss a ry , f o r b a c k w a r d c o m p a tib ility . If LM h ash e s a re s t o r e d , W i n d o w s 9 5 , W i n d o w s 9 8 , o r M a c in to s h c lie n ts o f
n e t w o r k s m a y e x p e r ie n c e t h e b a c k w a r d c o m p a t i b i l i t y p r o b l e m .
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
m
Implementthe NoLMHash Policy by editingthe registry
Locate the following key:
9
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Control\Lsa
9 Add key, ty p e N oLM H ash
I?
T o d is a b le t h e s to r a g e o f LM hash in t h e S A M d a t a b a s e s b y a p p ly in g t h e lo c a l g r o u p p o l i c y , use t h e s te p s as f o l lo w s : In G ro u p Policy, s e le c t C o m p u te r C o n fig u ra tio n S ettin g s Q In t h e Local Policies > S e cu rity O p tio n s . list o f a v a ila b le p o lic ie s , d o u b l e - c l i c k N e tw o rk s ecu rity: Do n o t s to re LAN W in d o w s S ettin g s S e cu rity
M e th o d 2: I m p l e m e n t t h e N o L M H a s h P o licy b y E d itin g t h e R e g is tr y L oca te t h e f o l l o w i n g key: H K E Y _ L O C A L _ M A C H IN E \S Y S T E M \C u rre n tC o n tro lS e t\C o n tro l\L s a A d d t h e key, a n d t y p e N o L M H a s h M e th o d 3: Use a P a s s w o rd t h a t is a t Least 15 C h a ra c te rs Long W in d o w s s to r e s an LM hash v a lu e th a t cannot be used to a u th e n tic a te th e user.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
Do not use cleartext protocols Avoid storing passwords in an unsecured location Do not use any system's default passwords Set the password change policy to 30 days
Copyright by EC -C auactl. All Rights Reserved. Reproduction is Strictly Prohibited.
Enable security auditing to help monitor and track password attacks. Do not use passwords that can be found in a dictionary. Q Do not use cleartext protocols and protocols with weak encryption.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Q Q
Set the password change policy as often as possible, i.e., for every 30 days. Avoid storing passwords in an unsecured location because passwords that are stored in places such as in a computer files are easily subjected to attacks. Do not use any system's default passwords.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Ensure that applications neither store passwords to memory nor write them to disk
Use a random string (salt) as prefix or suffix with the password before encrypting
Enable SYSKEY with strong password to encrypt and protect the SAM database
Never use passwords such as date of birth, spouse, or child's or pet's name
Monitor the server's logs for brute force attacks on the users accounts
stored in the SAM data against password-cracking software using strong encryption techniques. It is more difficult to crack encrypted password information than nonencrypted password information. Q Never use personal information as your passwords such as date of birth, spouse, or child's or pet's name. If you use such passwords, it becomes quite easy for the people who are close to you to crack those passwords. 0 Monitor the server's logs for brute-force attacks on user accounts. Though brute-force attacks are difficult to stop, they can easily be detected by monitoring the web server log. For each unsuccessful login attempt, an HTTP 401 status code gets recorded in your web server logs. Lock out an account subjected to too many incorrect password guesses. This provides protection against brute-force attacks and guessing.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Urtrn*
c El
ltK4l IlM kw
Em ployee Nam e
Em ployee ID
Em ployee Address
Em ployee SSN
*
J
Em ployee Designation
D ep artm ent
M anager ID
N otice Period
IS
Benefits Continuation
fT
S e ve ran ce
Refusal to abide by security policy Sending unsolicited e nuil Allowing kids to use company computer Disabling virus scanner Running P2P file sharing Unauthorized file/web serving Annoying the System Admin
IT * n j
Termination Reason
Port scanning Attempted unauthorised access Surfing porn Installing shareware Possession of hacking tools
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
e 4 v >
9
\A
Termination Reason
Opening unsolicited e mail Sending spam Emanating Viruses Port scanning Attempted unauthorized access Sliding porn Installing shareware Possession ol hacking tools
Relus.1 l to abide by security policy Sending unsolicited e-mail Allowing kids to use company computet Disabling virus scanner Running P2P T ile sharing Unauthorized file/web serving Annoying the System Admin
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
v' y
Escalating privileges is the second stage of system hacking. In this stage, an attacker uses cracked passwords to gain higher level privileges in order to carry out highly privileged operations in the target system. The various tool and techniques that are used by attackers to esca ate the privileges are explained clearly in the following slides. IS 1 fc Cracking Passwords Escalating Privileges Hiding Files
Covering Tracks
Executing Applications
Penetration Testing
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
T y p e s of P rivilege Escalation
V ertical Privilege Escalation
Requires to grant higher privileges or higher level of access than administrator This is accomplished by doing kernel-level operations that permit to run unauthorized code
User
I can access the network using John's user account but I need "Adm in" privileges?
Copyright by
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Vertical Privilege Escalation: In vertical privilege escalation, the unauthorized user tries to gain access to the resources and functions of the user with higher privileges, such as application or site administrators. For example, someone performing online banking can access the site with administrative functions.
Attacker
I can access the network using John's user account but I need "Admin" privileges?
User
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Features
e Recovers passwords from multiple partitions and hard disk drives Detects and displays all Microsoft Security Databases (SAM ) Displays full account information for any local user
ers in SAN hve file at path: C:\W1ndows\SYSTEM32\CONFIG\SAM drive C: 0, size 98.23GB, File System: NTFS Total U3 er: DOM [ RID &55525I j X nCOOITQ 1 I User Name Administrator MGSCFT-S#rviee Gutct BvS9h_VirtuaU3er 1 Built-in *:count tor gu*ct accecc to tr># comp.. Bitvisc SSH Server automatically managed o c ... Descrpfon Built-in a:count tor admnistema the comcut..
i: ocoooifs
0C000XB
<Back
Next >
cancel
http://www.password<hanger.com
Copyright by
Active@Password Changer is a password recovery tool that resets or recovers the local administrator and the user passwords when the administrator has lost or forgotten his or her password or if the administrator's user account was locked out or disabled. Its main features includes recovering passwords from multiple partitions and hard disk drives, displaying and detecting all the Microsoft Security Databases, resetting administrator's/user's password, displaying complete account information for any local user, etc.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
User Name
Description
i H
A 000003E9 000001F5
Built-in account for administering the comput... Built-in account for guest access to the comp... Bitvise SSH Server automatically managed ac...
is 000003E3
< Back
Next >
Cancel
Help
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
PasswordLastic
http://www.passwordla5tic.com
?.5|
Copyright
Q Trinity Rescue Kit available at http://trinityhome.orR Q Windows Password Recovery Bootdisk available at http://www.rixler.com
Password Lastic available at http://www.passwordlastic.com 0 Stellar Phoenix Password Recovery available at http://www.stellarinfo.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Windows Password Recovery Personal available at http://www.windowspasswordrecoverv.com Windows Administrator Password Reset available at http://www.systoolsgroup.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Copyright by
Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
Q Test operating system and application coding errors and bugs thoroughly Q Patch the systems regularly
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
vulnerability to execute arbitrary code with higher privileges than they would otherwise have been allowed. By executing malicious applications, the attacker can steal personal information, gain unauthorized access to the system resources, crack passwords, capture screenshots, install a backdoor for maintaining easy access, etc. Detailed explanation about executing applications is as follows. 15 m Cracking Passwords Escalating Privileges Hiding Files
Q j ^ j Covering Tracks
Executing Applications
I^^JU
Penetration Testing
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ex^cutiitg A pplications
J J Attackers execute malicious applications in this stage. This is called "owning" the system Attacker executes malicious programs remotely in the victim's machine to gather information that leads to exploitation or loss of privacy, gain unauthorized access to system resources, crack the password, capture the screenshots, install backdoor to maintain easy access, etc.
ytacke/.
Spyware
Backdoors
*
Crackers
Spyware - Spy software may capture the screenshots and send them to a specified location defined by the hacker. The attacker has to maintain the access to the victim's computer until his or her purpose is fulfilled. After deriving all the requisite information
Module 05 Page 611 Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
from the victim's computer, the attacker installs several backdoors to maintain easy access to the victim's computer in the future.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
EEC!
RemoteExec remotely installs applications, executes programs/scripts, and updates files and folders on It allows attacker to modify the registry, change local admin passwords, disable local accounts, and copy/ update/delete files and folders
*. * !* * w o
MSI installation
* * " * >. _
MSI wktatlon
*XU
^ *t
r M ka
-1 / n l *.
* * 'w >r~--
___________________ _
Copyright by
Ilsl 11/i
RemoteExec allows you to remotely install applications and execute programs/scripts all over the network. Any file and folder can be updated, copied, as well as deleted instantaneously on Windows systems. With the help of this the attacker can change the Local Administrator Password remotely and can disable all other local accounts for reinforcing security. In addition, it can also reboot, shut down, wake up, and power off a computer remotely.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Hie
Tods
&incbv
Help
r3t#td
^ RemoteExec ;,- a Remote jobs B f l B New remote job ! C^, Rle executcn I
<
MSI installation
Rem0 teExec5 \orote p 35 /Ncw erocte xx>f4Hl rv.d k ten ^ Q* 1 [? MS: file Product name Operation ^ rn5fbtm Log level Arguments) v ] use sysiem account Don't te M o ogjng tostal [v VMW-fXS^LCK-K41VCD1T0cfcVCEHv8 NcdJe 05 System hadur Save in Ny Target Comp... Launch Launch in a new tab SchediJe Save in Ny Remote Jobs Save mNy Remote Actons
!s z a
j {r]P o p u p
l Ndtble dctlors My Remote 33 bs My Remote Actions ~^ My Target computers -:-,J, Reporter 0 Hj]| Repcrb
jsl
SemoceExec 0 Remote jobs l< Nsa remote job l-C J Fie execution .. i ! Update insta
MSI installation
RemoteEyer/ieroote jobsff leureno* po.NSI ratals ton
i-iEiam m ] {%
System action [ _ } ' Fie Operation \-Q i Local account ... ! !51 Popup : 5 M jfoe actons
W3ri5t2toan
v HebreA
Z- -
f 0 J Ny Remote Jobs EJk Ny Remote Acton* ^ O Trg#t Compu.. Reporter Rcpofb gt-jjrTl Tnhkc . Sdwduler ^ Optiore Don't
a c
h y tr on a a n o jw vrfw# tt* r*0 r k
y mwufwl
ramsaina
4 V/2NDOWS3 j | W fU C SB O M H l 4 V/lNUir85eKHQP ( amputm
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
PDQ Deploy is a software deploymenttool that allows admins to silently install almost any application or patch
1 -1
C 3 3 */
** Installti % C*ploymsnts j, Stheduki
i d
w , E d itIn s ta lle r D e p lo yN o w wN e wS c h e o u le
ID J 7
Created
Bapied me
Comput 1
Failed 0
Success.
Installer 1 Skypt
User Adminstrattx
[w i b T i l i5 4 PM 21 stcoreJs
1 ftL------------------J 1
PDQ Deploy is a software deployment tool with which you can easily install almost any application or patch to your computer. MSI, MSP, MSU, EXE and batch installers can be remotely deployed to numerous Windows computers at the same time using this tool. You can easily and quickly deploy a packaged program to the selected or to all computers on your network quickly. The features of PDQ Deploy include that it integrates with Active Directory, Spiceworks, PDQ Inventory, and installs to multiple computers simultaneously, as well as realtime status, etc.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Fil Edit View Help
L=J
al
Edit Installer
Deploy Now
New
0*
^
u
Installer "]
^ ^
Skype
ID
Elapsed Time
* $f 7
21 seconds
WIN-LXQN3WR3R9M
Computers
| Details
0 Running Deployments
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
r CU I
Copyright by
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
% 4^%
Browser
Active Directory ^ No AD Membership ( j | Microsoft Windows Network - <0 WORKGROUP - O : N0PDC Servers (4)
oo m
> ? x
Processes lA IN D 3 iMfttHl9e4l T0!aiServ1c#j:|14fi Status |C3r*.lde Services Device Drivers S f 1w (WIN*Oi9MKbH19(:4J X
S ta tu e
Running Stepped Funning
Startup Manual Manual Automatic Automatic Manual Manual Manual Manual Manual Manual Manual Automatic
Account LocalSystem LocalSystem LocalSystem LocalSystem LocalSystem localS/stem localS/stcm localS/stem localS/stem NT Authority. localS/stem NT AUTHOR..
Binary
Ia J
C:\Wi ndows\system32\sYchost C:\Windows\system32\svchost C:\Wi ndo ws\system32\svchost C:\W1ndows\Sysrem 32\spoclsv C:\Wi ndows\system32\svchoet C:\Wi ndows\System 32\s/chost C:\Wi ndows\System 32\svchost C:\Wi ndowsXSystem32\svchost C:\W1ndows\Sysrem 32' s/chost C:\Windows\System 32\cvchost C:\Wi ndowsXSystem 32'svchost C:\Wi ndows\systern32\svchost
ffl 0 W1N-D39MR5HL9E4
{^Portable DeviceEnumerator Se vk
(a ^ P o r v e i
(^ P ro b le m
Remote
Printer E >
ft { > % &
Start Sen/ice
s I
j s 9 v ^ Q
v - 5 | WIND0WS8 Computers
$ $
Remote Remote
t ft t
Pause Service...
ontnue Service...
J 1
.nstall Service... Jnstal DNTU Service... nstal DWMRC Service.. Remove Service.. Shovi Scrvice Name /i#w Sr/ic Dpnd<rctts.Service Properties
Batch
lire Type
J Browcr
us
Information
y t* *
5 * 3!3% ?
LAP NUM SCKL 9/4/2012 3:27:38 PM
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
K eylogger
T
Keystroke loggers are programs or hardware devices that monitor each keystroke as user types on a keyboard, logs onto a file, or transmits them to a remote location
CEH
Keyloggers are placed between the keyboard hardware and the operating system
Legitimate applications for keyloggers include in office and industrial settings to monitor employees computer activities and in home environments where parents can monitor and spy on children's activity
Keystroke logger allows attacker to gather confidential information about victim such as email ID, passwords, banking details, chat room activity, IRC, instant messages, etc.
K ey lo g g ers
Keyloggers, also called keystroke logging, are software programs or hardware devices that record the keys struck on the computer keyboard of an individual computer user or network of computers. You can view all the keystrokes that are typed at any time in your system by installing this hardware device or programs. It records almost all the keystrokes that are typed by a user and saves the recorded information in a text file. As it is convert, the person does not know that their activities are being monitored. It is mostly used for positive purposes such as in offices and industrial settings for monitoring the employees' computer activities and in home environments where parents can monitor what their children are doing on the Internet. A keylogger, when associated with spyware, helps to transmit your information to an unknown third party. It is used illegally by attackers for malicious purposes such as for stealing sensitive and confidential information about victims. The sensitive information includes email IDs, passwords, banking details, chat room activity, IRC, instant messages, bank and credit card numbers, and other information that is typed by people every day. The data, i.e., transmitted over the encrypted Internet connection, is also vulnerable to keylogging because the keylogger tracks the keys struck before they are encrypted for transmission. The keylogger program is installed onto the user's system invisibly through email attachments or through "drive-by" downloads when users visits certain websites. Keystroke loggers are
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
stealth software that sits between keyboard hardware and the operating system, so that they can record every keystroke. A keylogger can: Q Q Record each keystroke, i.e., typed by the user, on his or her computer keyboard. Capture screenshots at regular intervals of time showing user activity such as when he or she types a character or clicks a mouse button. Track the activities of users by logging Window titles, names of launched applications, and other information. Monitor online activity of users by recording addresses of the websites that they have visited and with the keywords entered by them, etc.
Record all the login names, bank and credit card numbers, and passwords including hidden passwords or data that are in asterisks or blank spaces. Q Q Record online chat conversations. Make unauthorized copies of both outgoing email messages and incoming email messages.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Copyright by
Hardware L oggers
Hardware keyloggers are hardware devices look like normal USB drives. It is connected between a keyboard plug and USB socket. All the recorded keystrokes that are typed by the user are stored within a hardware unit. Attackers retrieve this hardware unit for accessing the keystrokes that are stored in it. The primary advantage of these loggers is that
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
they cannot be detected by antispyware, antivirus, or desktop security programs. disadvantage is that its physical presence can be easily discovered. Hardware keystroke loggers are classified into three main types: PC/BIOS Embedded
Its
Physical and/or admin-level access is necessary to the computer, and the application loaded into the computer's BIOS must be made for the particular hardware that it will be running on. BIOS-level firmware that manages keyboard actions can be modified to capture these events as they are processed. Keylogger Keyboard These keyloggers are used for recording keyboard events by attaching a hardware circuit with the keyboard's cable connector. It records the all the keyboard strokes to its own internal memory that can be accessed later. The main advantage of a hardware keylogger over a software keylogger is that it is not operating system dependent and hence, it will not interfere with any applications running on the target computer and it is impossible to discover hardware keyloggers by using any anti-keylogger software. External Keylogger External keyloggers are attached between a usual PC keyboard and a computer. They record each keystroke. External keyloggers do not need any software and work with any PC. You can attach them to your target computer and can monitor the recorded information on your PC to look through the keystrokes. There are four types of external keyloggers: Q PS/2 and USB Keylogger - Completely transparent to computer operation and requires no software or drivers for the functionality. Record all the keystrokes that are typed by the user on the computer keyboard, and store the data such as emails, chat records, applications useds, IMs, etc. Acoustic/CAM Keylogger - Makes use of either a capturing receiver capable of converting the electromagnetic sounds into the keystroke data or a CAM that is capable of recording screenshots of the keyboard. Bluetooth Keylogger - Requires physical access to the target computer only once, at the time of installation. Once this is installed on the target PC, it stores all the keystrokes and you can retrieve the keystrokes information in real time by connecting through a Bluetooth device. Wi-Fi Keylogger - Operates completely stand alone. Unlike a Bluetooth keylogger, this kind of keylogger doesn't require it be near the computer on which the dongle (recording device in Bluetooth keylogger) is installed to retrieve the keystroke information. This keylogger requires no software or drivers and is completely undetectable; it works on any PC. This records the keystrokes and sends the information by email over a predefined time interval.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
A hypervisor-based keylogger is built within a malware hypervisor operating underneath the operating system and cannot be physically seen or touched. They are the same as virtual machines. FormGrabber-Based Keylogger In a form-grabbing-based keylogger, the web form data is recorded first and then after it is submitted over the Internet, it bypasses https encryption. Form-grabbing-based keyloggers log web form inputs by recording web browsing on the Submit event function.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Keyboard Injection
Application Application
f -------1
Kcyboard-sys
\ Driver
| mouse.sys
1 j
usb.sys
>------------
1J
-------\ Windows Kernel
HAL
L
User Keyboard <
__>
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Keyboard
Injection
2
Hacker
User types ^ on a keyboard V \
passw o rd
Keylogger Injection
Driver Injection
Kernel Injection
User
Keyboard
I I S * Ik
Windows Kernel
mm
Ethical Hacking and Countermeasures Copyright by EC-COUIlCil All Rights Reserved. Reproduction is Strictly Prohibited.
Acoustic/CAM Keylogger
Acoustic Keylogger CAM Keylogger
CEH
m
Capturing Receiver Electromagn -etic Waves O Typed Alphabet
Camera
A coustic/C A M K ey lo g g ers
Acoustic keyloggers work on the principle of converting electromagnetic sound waves into data. The concept is that each key on the keyboard makes a slightly different sound when it is pressed. There are listening devices that are capable of detecting the subtle variations between the sounds of each keystroke and use this information to record what is being typed by the user. The acoustic keylogger requires a "learning period" of 1,000 or more keystrokes to convert the recorded sounds into the data. This is done by applying a frequency algorithm to the recorded sounds. To determine which sound corresponds to which key, the acoustic keylogger uses statistical data based on the frequency with which each key is used because some letters will be used much more than others.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
A c o u s tic K e y lo g g e r
A CAM keylogger makes use of the webcam to record the keystrokes. The cam installed takes screenshots of the keystrokes and the monitor and sends the recorded screenshots to the attacker account at periodical intervals. The attacker can retrieve the keystroke information by probing the screen shots sent by the CAM keylogger.
C A M K e y lo g g e r
Camera
%
Transmit to the Hacker
Takes Screenshot
Hacker
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
K eyloggers
PS/2 Keylogger
USB Keylogger
Wi-Fi Keylogger
11r I
rn n H
Bluetooth Keylogger
Hardware Keylogger
Copyright by
K ey lo g g ers
^ Beside the information discussed previously, acoustic/CAM keyloggers, there are other external keyloggers that you can use to monitor the keystrokes of someone's system. These external keyloggers can be attached between a usual PC keyboard and a computer to record each keystroke.
You can use following external hardware keyloggers to monitor user activity:
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
PS/2 Keylogger
USB Keylogger
Wi-Fi Keylogger
Bluetooth Keylogger
Hardware Keylogger
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
l ;
J J J
See all keystrokes user type Reveals all website visits Records all online searches performed See what programs and apps they use Tracks all file usage and printing Records online chat conversations See every email they send and receive Find out what they upload and download Uncovers secret user passwords
HLjLTI it
G e n e ra l U s e r A c t iv it ie s
K c y ? u & c $ .T y p e d
-4 <eys '.as* Sesso^
l 15 Windows logged
w m dovigflSjS ic B H
Sc.recriSpy Scrccnshots
15 Screenshots Looped
J J J J
<&
Prcgr2rs U sage
25f Apptcetions logged
Clipboard Logs
1 CSpboonis Logged
File/Op( tm cn ts U sage
137 File Events Logged
Event ?Timeline
263 Cverfs Logged
0P|ftPIB9e
5 3esons Logged Record Desktop Activity
In te rn e t A c t iv itie s
E Mails bent;Received
i ' L<^9d
J L
internet Activities
IS Conn*ex!ons loyynd
'A
WcbiHCi Vi&ilCCJ
W ^ t v M iv y -
5 ^ ^ 0 Convcnnbnn* 1 oggeH
Chd'l 'TrJnbLii'pti
View M ost Popular Activities Sum m ary Click here for E a sy Confiqui ation and Setup W izard
Program Options
Log Actions
Reports
Help
http://www.spytech-web.com
Copyright by
IP r
*
Spytech SpyAgent is software keystroke logger that allows you to monitor the keystrokes of the user computer on which it is installed. It can also allow you to monitor following things on a user computer: It can reveal all websites visited 0 0 0 0 0 0 0 It records all online searches performed It monitors what programs and apps are in use It can tracks all file usage and printing information It records online chat conversations It is also able to see every email communication on the user computer It helps you determine what the user is uploading and downloading It uncovers secret user passwords
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
You can download this software keylogger from its home site and install it on the computer you want to monitor, and then just click Start Monitoring. That's it! It will record a number of things for you about user activity on the computer.
Agent
General
Startup Settings and Conftg
Keystrokes Typed
44 K eys Last Session
Windows Viewed
1 5 W in d o w s L o g g e d
Programs Usage
i 258 Applications Logged
ScreenSpy Screenshots
15 Screenshots Logged
Clipboard Logs
1 Clipboards Logged
File/Documents Usage
137 File Events Logged
Advanced Options
Finer Control on Sp y Agent
Events Timeline
263 Events Logged
Computer Usage
5 Sessions Logged
Content Filtering
Filter and Block Acth
Internet A ctivities
ScreenSpy
Record Desktop Deski Activity
E Mails Sent/Received
0 E-Mails Logged
Internet Activities
15 Connections Logged
SmartLogging
Activity Triggered Logging
Websites Visited
0 Websites Logged
Chat Transcripts
0 Conversations Logged
Scheduling
Schedule Monitoring Times
View Most Popular Activities Summary Click here for Easy Configuration and Setup Wizard
P ro g ra m O p tio n s Log A c tio n s
Behavior Alerts
Real-time Activity A l e r l V
! R e p o rts
!! H elp
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
(rtifwtf ttfciul lUilwt
Copyright by
lr|
K eylogger: All In O ne K ey lo g g er
1 Source: http://www.relytec.com All In One Keylogger is invisible keylogger surveillance software that allows you to record keystrokes and monitors each activity of the user on the computer. It allows you to secretly track all activities from all computer users and automatically receive logs to a desired email/FTP/LAN account. The keylogger automatically activates itself when Windows starts and is completely invisible. You can do following things using this software: Q Capture all keystrokes (keystrokes logger)
Record instant messages e e Q e e Monitor application usage Capture desktop activity Capture screenshots Quick search over the log Send reports via email, FTP, network
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
e
0
Log v ie w e r
1 2 1 O i
* 11 u u a ir a 11 x 2 3 2 2 5 2 7
Sr. < a d * r/ /
* M U * ()* V% T Leo VwCkat^g Wt Log v*wvtj Log '/wAulc Lag G To Viiinl I og Hie Ep!j Row* < uoetiag mioi Rscr KTML toper L a s t Auk> Log v tte'iErtwisc >wTe*Callcg swO*L9g
009M12 1 +2M 2 0^V3121e 2M 0MM#12 'CMS* C &O S-K12 C3 0SS CWOVM1 21 6J I 4* OSOV2I2 1 C3 20 1 OM OC/M 12 1 C 94 OdMiZt 1 21 C3 2(M 0Sn512lC.32M CV0^t21CU Clos'd 1C32 11
3 2
| Aavt Wndow Run Prog*m M1 n9#r UiiIiBbO N 0trp4< l L*Vwer (ey 7day. * topurera keeeUVW 4l*SLCK41C41! UMttd > **? UnUW O coQ k Ckion* M 014I* fir 10* Tat SwKtiMg UnliBed Gooulo Chiome lltwliO U}Chrome Best KrvtMMr O oivr bao 1 0C < eyto ffy k o sg o e e -. D Cowcee fiee irttlleybgper Mt ip u M a a u u i] Admln4*trto1's idle time: 0 mineies from I0U1 or. 1 (OS-
wSSm
*Ow
C S n*2* 12 1 34 N
Untitled - Notepad AH in Ore Keytogger software is a 1 Invisible Keylegge (<} {<} (<-) {<} o w r sjrvell! {<-) {<) {<-) !lance sotwara Keystrokes Recof {< } rder. spy {<-} {<-} {< } Spy software tool tt3. l rasters every activity cn your PC to encrypted logs The key I {<-} {< :<[ }[ )-} {-) Keylogger software allows you to secretly tra ck {<} {<} {<} {<} ck all actrflties t a n all cor-^yteis user {<) {<} {<} {<} {<} {<} users and automatically r a w logs to a desne emal {<} /FTP.lAfl accountrg
j[ ] M a r c h C e *
( 1 ? * iV jH fe W c rfO *
Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
jM
Powered Keylogger
http ://w w w . m ykeylogger. com
Advanced Keylogger
h ttp ://w w w . mykeylogger. com
StaffCop Standard
http ://w w w . s taffcop. com
iMonitorPC
SoftActivity Keylogger
h ttp ://w w w .softactivity. com
Elite Keylogger
h ttp ://w w w . wides tep. com
::fnnl B Ih h I
KeyProwler
http ://keyprow ler. com
Copyright by
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Q Q
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
|M
Powered Keylogger
h ttp://w w w .m ykeylogger.com
Advanced Keylogger
http ://w w w .m ykeylogger. com
StaffCop Standard
h ttp ://w w w .staffco p.co m
iMonitorPC
h ttp ://w w w . im onitorpc. com
SoftActivity Keylogger
h ttp ://w w w . softactivity.com
Elite Keylogger
h ttp ://w w w . w idestep. com
: Iml =[bb]
KeyProwler
h ttp://keyprow ler.com
K ey lo g g e rs for W indow s
0 0 0 0 0 0 0 0 0 0 You can also use following keyloggers that runs on the Windows operating system: Keylogger Spy Monitor available at http://ematrixsoft.com REFOG Personal Monitor available at http://www.refog.com Actual Keylogger available at http://www.actualkevlogger.com Spytector available at http://www.spytector.com KidLogger available at http://kidlogger.net PC Spy Keylogger available at http://www.pc-spy-kevlogger.com Revealer Keylogger available at http://www.logixoft.com Spy Keylogger available at http://www.spy-kev-logger.com Actual Spy available at http://www.actualspy.com SpyBuddy 2012 available at http://www.exploreanywhere.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
r C1 1 ! z E5
Q Apply settings to all users with one click Q Q Send logs to email/FTP at preset intervals Password protect keylogger access
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
logkext
https://code.google.com
Mac Keylogger
h ttp://w w w .aw ard-soft.com
fr
Keyboard Spy
http://alphaom ega. 5o ftw a re.free.fr
FreeMacKeylogger
h ttp ://w w w . hwsuite. com
Copyright by
Like keyloggers for Windows, there are also many keyloggers that runs on the Mac operating system. These tools will assist you in recording keystrokes and monitoring the user activity on the target MAC OS computer system. You can download them from their respective home sites and they can be used to spy on a Mac machine to secretly record everything on the Mac. They enable you to record everything the user does on the computer such keystroke logging, recording email communication, chat messaging, taking screenshots of each activity, etc. You can use the following keystroke loggers for Mac OS: 0 Aobo Mac OS X KeyLogger available at http://www.keylogger-mac.com
K ey lo g g ers for M ac
0Perfect Keylogger for Mac available at http://www.blazingtools.com 0 0 0 0 0 Award Keylogger for Mac available at http://www.award-soft.com Mac Keylogger available at http://www.award-soft.com REFOG Keylogger for MAC available at http://www.refog.com KidLogger for MAC available at http://kidlogger.net MAC Log Manager available at http://www.keylogger.in
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Q e Q
logkext available at https://code.google.com Keyboard Spy available at http://alphaomega.software.free.fr FreeMacKevlogger available at http://www.hwsuite.com
Ethical Hacking and Countermeasures Copyright by EC-C0UI1Cil All Rights Reserved. Reproduction is Strictly Prohibited.
A hardware keylogger is a device that is connected in between a keyboard and the computer. It is used to record the keystrokes on the target user computer. Hardware keyloggers log all keyboard activity to their internal memory. The advantage of a hardware keylogger over software keyloggers is they it can log the keystrokes as soon as the computer starts. You can use following hardware keystroke loggers to achieve your goals.
K eyG host
Source: http://www.keyghost.com KeyGhost is a tiny plug-in device that records every keystroke typed on any computer. You can also monitor and record email communication, chatroom activity, instant messages, website addresses, search engine searches, and more with this plug-in keylogger. You do not have to install any software to record or retrieve keystrokes. Features: It is easy to use Installs in seconds; just plug it in Can be unplugged and information retrieved on another PC
Module 05 Page 642 Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Q Q
The KeyGhost
Hardware
Kevkxroor is a tiny
co
9 *Pmn Proirg -
Cfck ktp
SX wrfcK?
Pr*u n k u u
K ^ ,h o tittrrai * a id a o w MoCeK K tA fta in rr* M fw laf.nuQM igaf/ K/Ghcst Stf 312K F a * Wtmoo -SW K*/Ghct P o1 Flw ' S149 KsjQttaiPa Sf ?Mrgfcrtf FUahMemott tw
moM a cu s e k ty c t
KeyGrabber
Source: http://www.keydemon.com KeyGrabber is a hardware device that allows you to log keystrokes from a PS/2 or USB keyboard. A hardware video-logger is a tiny frame-grabber for capturing screenshots from a VGA, DVI, or HDMI video source.
KeyGrabber
Hardware Keylogger
W hat is <1 Imm I*hh k ry lo ijfjr i? A hardwaro kcytog^or it anl*c1rom < 6s.cc <jfablt <f taftjmg Iu>:1r>k1t f w i j H 2 or Lit ktvteard. A hardwuto video !099011; a D ny fan* gratfcer for ca scam 1) t<4 a1kots fro a VCA. CM 0 HOM vuUo ; KtyC*ibi4 1n tho wortfi Icacknj r>jVjctj ef kaiawara I 4 sl > 9^ 1 t ii stiao ik!ioic^.
K e y (r jb b e 1 U S B
NOW S 4 4 .9 9 !
M ntSouM , mtf M m < tl* M W M VITMK1M 5 1 I H -l loutv tor (Kjnrv Quirk *to Ky uamn cvyfeo aae layout .im r m u fiu lr tu w * m v
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Spyw are
J Spyware is a program that records users interaction with the computer and Internet without the a user's knowledge and sends them over the Internet to attacker J It is similar to Trojan horse, which is usually bundled as a hidden component of freeware programs that can be available on the Internet for download
C EH
Spyware is stealthy, and hide its process, files, and other objects in order to avoid removal It allows attacker to gather information about a victim or organization such an email addresses, user logins, passwords, credit card numbers, banking credentials, etc.
f,op a9 at/0
Drive-by download Piggybacked software .. installation
Spyware
41
Masquerading as anti-spyware
JJ r r
Copyright by
f#
E& Caunc!. All Rights Reserved. Reproduction Is Strictly Prohibited.
Spyw are
Spyware is stealthy computer monitoring software that allows you to secretly record all activities of a computer user. It automatically delivers logs to you via email or FTP, including all areas of the system such as email sent, websites visited, every keystroke (including login/password of ICQ, MSN, AOL, AIM, and Yahoo Messenger or Webmail), file operations, and online chat conversations. It also takes screenshots at set intervals, just like a surveillance camera directly pointed at the computer monitor. Spyware is usually bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. Spyware Propagation Installing the spyware on the user's computer doesn't require any consent from the user. You can install the spyware on the user's computer without their knowledge by "piggybacking" the spyware on other software programs. This is possible because spyware uses advertising cookies, which is one of the spyware subclasses. You can also be affected by spyware when you visit a website that distributes spyware. This is sometimes called "drive-by downloading" since it installs itself when you "drive by" the website. Because of a lack of user's attention in downloading and installing applications from the Internet, it is possible that the spyware is installed. The spyware propelled with other programs on the Internet masquerade as antispyware and run on the user's computer without any notice, when the user downloads and installs programs that are bundled with spyware.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
UrtNW4 itkKJl lUckM
Changes web browser's default setting and prevents the userfrom restoring Adds several bookmarks to the web browser's favorites list Decreases overall system security level
Reduces system performance and causes software instability Connects to remote pornography sites Places desktop shortcuts to malicious spyware sites Changes home page and prevents the user from restoring Modifies the dynamically linked libraries (DLLs) and slow down the browser Changes firewall settings Monitors and reports websites you visit Copyright by EC-Caind. All Rights Reserved. Reproduction is Strictly Prohibited.
Monitor users' online activity 0 Display annoying pop-ups and redirect a web browser to advertising sites
Change web browser's default setting and prevent the user from restoring 0 0 0 0 0 0 0 Add multiple bookmarks to the web browser's favorites list Decrease overall system security level Place desktop shortcuts to malicious spyware sites Connect to remote pornography sites Reduce system performance and causes software instability Steal your passwords Send you targeted email
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Q Q Q Q
Change the home page and prevent the user from restoring: Modifie the dynamically linked libraries (DLLs) and slow down the browser Change firewall settings Monitor and report websites you visit
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
) C a p tu rin g
S pyw are
e e e 0
Q Audio Spyware
GPS Spyware Cell Phone and Telephone Spyware
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
D esktop Spyware
Desktop| Spyware
Desktop spyware provides information regarding what network users did on their desktops, how, and when
) t
Live recording of remote desktops Record and monitor Internet activities Record software usage and timings
t
Record activity log and store at one centralized location Logs users' keystrokes
3 n
D esk to p Spyw are
A|
Desktop spyware is software that allows an attacker to gain information about a user's activities or gather personal information about the user and send it via the Internet to third parties without the user's knowledge or consent. It provides information regarding what network users did on their desktops, how, and when. Desktop spyware allows attackers to perform the following: 0 0 0 0 0 Live recording of remote desktops Record and monitor Internet activities Record software usage and timings Record activity log and store at one centralized location Logs users' keystrokes
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
(rtifwd itkitjl
Features
View remote desktops e Record activity log e View communication history Take snapshots of the remote computer
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Record activity log for all workplaces in one centralized location on a main computer with Activity Monitor installed
Store complete history of communications for every user (emails sent and received, IM chats, messages typed in web forums) Q Track any user's keystrokes, even passwords on your screen, in real-time mode Total control over networked computers. Start or terminate remote processes, run commands, copy files from remote systems. You may even turn the computer off or restart it, not to mention logging off the current user Q Deploy Activity Monitor Agent (the client part of the software) remotely from the administrator's PC to all computers in your network
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
D esktop Spyware
Remote Desktop Spy
h ttp ://w w w . global-spy-s oft ware, com
CEH
Net Spy Pro
h ttp ://w w w . net-monitoring-s oft ware, com
SSPro
h ttp ://w w w . gps oftde v. com
OsMonitor
h ttp ://w w w . os monitor, com
LANVisor
h ttp ://w w w . lanvisor. com
NetVizor
h ttp ://w w w . netvizor. net
i_nJ
There is various desktop spyware available in the market that an attacker can use to monitor remote user desktops. This spyware can be used to monitor and record every detail of user PC and Internet activity. An attacker can log keystrokes, websites visited by the user, programs running on the user computer, chat conversations, email communication, downloaded files, opened/closed windows, etc. You can also take snapshots of the remote user desktop and much more. Some of desktop spyware software that attackers may use for monitoring user desktops remotely are listed as follows: Remote Desktop Spy available at http://www.global-spy-software.com e e
SSPro available at http://www.gpsoftdev.com RecoveryFix Employee Activity Monitor available at http://www.recoveryfix.com Employee Desktop Live Viewer available at http://www.nucleustechnologies.com NetVizor available at http://www.netvizor.net Net Spy Pro available at http://www.net-monitoring-software.com REFOG Employee Monitor available at http://www.refog.com OsMonitor available at http://www.os-monitor.com LANVisor available at http://www.lanvisor.com Work Examiner Standard available at http://www.workexaminer.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
if'
I I I I I I I I I I I I I I I I I I I
Internet Spyware
J J J J Internet spyware allows attacker to monitor all the web pages accessed by the users It provides a summary report of overall web usage It records the date/time of visits and the active time spent on each website It blocks access to a particular web page or an complete website
Internet Spyware
Internet spyware is a utility that allows you to monitor all the web pages accessed by the users on your computer in your absence. It makes a chronological record of all visited URLs. This automatically loads at system startup. It runs in stealth mode, which means it runs in the background and the users on your computer can never detect this tool is installed on the computer. All the visited URLs are written into a log file and sent to a specified email address. Using Internet spyware, one can perform web activity surveillance on any computer. It
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
provides a summary report of overall web usage such as websites visited, and the time spent on each website, as well as all applications opened along with the date/time of visits. It also allows you to block access to a specific web page or an entire website by mentioning the URLs or the keywords that you want to block on your computer.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Power Spy secretly monitors and records all activities on your computer It records all Facebook use, keystrokes, emails, web sites visited, chats, and IMs in Windows Live Messenger, Skype, Yahoo Messenger, Tencent QQ, Google Talk, AOL Instant Messenger (AIM), and others
Pow er Spy 1 S a e e n s h o t s
M *
c :ontrol Panel
G
S k y p e
F a c e D O O k
r t e b s it e s V is it e d K e y s t r o k e s 1
M S N M e s s e n g e r
A p p * c a o n s
0
H J e E3 &
Y a h o o M e s s e n g e r D o c u m e n t s C u p b o a r d
Export All Logs
E m a ils
A d m in is t r a t o r
D e le leA ll
lo g s
http://ematrixsoft.com
Copyright by EC-Caind. All Rights Reserved. Reproduction is Strictly Prohibited.
0C
'
Power Spy software allows you to monitor your computer from a remote place whenever you are away from the PC. It records all Facebook use, keystrokes, emails, web sites visited, chats & IMs in Windows Live Messenger (MSN Messenger), Skype, Yahoo Messenger, Tencent QQ, Google Talk, GADU-GADU, ICQ, AOL Instant Messenger (AIM), and more. In addition, it even records clipboard data, passwords typed, documents opened, windows opened, and applications executed. It starts automatically with system startup, runs secretly, and sends log reports to your email or FTP. You can check these reports anywhere you like.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Power Spy
C o n tro l Panel
Buy Now
Screenshots
MSN Messenger
Applications
V o *9 a r
Face book Keystrokes Q ) r . Skype Yahoo Messenger Emails ( f a Documents CiipOoarO Q Export All Logs Delete All Logs
Copyright (c) M#tnxS*fc- IC. 2 0 0 4 -2 0 1 2 All ngKtl r1rv4.
f l
Start Monitoring
Stealth Mode
weositts visited
Configuration
0
O
User Manual
Technical Support
Administrator
Uninstall Me
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
In te rn e t and E m a il Sp yw are
m
C EH
eBLASTER
h ttp ://w w w . spec tors oft. com
Spylab WebSpy
http ://w w w . spylab. org
1r -Pl .3
Personal Inspector
h ttp ://w w w . spyars enal. com
Employee Monitoring
h ttp ://w w w . employeemonitoring. net
CyberSpy
h ttp ://w w w . cyberspysoftw are. com
OsMonitor
h ttp ://w w w . os -monitor, com
#*
=
AceSpy
h ttp ://w w w . acespy. com
f3
Ascendant NFM
h ttp ://w w w . as cendant-s ecurity. com
EmailObserver
h ttp ://w w w . s ofts ecurity. com
Module
05 Page 656
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
UrtifM
CEH
ttfciul Nm Iwt
( f c xi
m W
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
It allows you to see logs of children's Internet activity and instant messages
Setting W indow
http://www.netnanny.com
Copyright by EC-Cauncl. All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
O Add IK e r
Remove IH er
S e t t in g W in d o w
Web
W eb B row sing
Manage keywords
AdJt^atuel*x * d
[S5T3 X A k o h d
(E5T "3 A
1 |
r j
SooHNttworla
I *d 4 6 > *
|*xk j J r 3 HeA**ree P
I *d
|S * ~ 3 n * fwnoflTiphy
P-TU . T b o
|5 5 weapons
h* z i
A
|wjm _J &
lm ge/Wdeo Sea
|**w d
Rt*90u5
F i lt e r W in d o w
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
p !
K9 Web Protection
h ttp ://w w w l. k9webprotection. com
CyberSieve
h ttp :/'/w w w . 5oftforyou. com
Child Control
h ttp ://w w w . 5alfeld. co
D
aaa c
PC Pandora
h ttp ://w w w . pcpandora, com
::fn n l 5 ih h I
KidsWatch
h ttp ://w w w . kids watch, com
Verity Parental Control Software available at http://www.nchsoftware.com Profil Parental Filter available at http://www.profiltechnology.com PC Pandora available at http://www.pcpandora.com KidsWatch available at http://www.kidswatch.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
R ecording
Screen capturing spyware takes screenshots or record screens video in stealth mode (Invisible/hidden to users) of local or remote computers at a predefined interval of time with encryption capability ,
M onitoring
It allowsmonitoringscreensin realtime of all the user activities on the network
C apturing
These spywares may also capture keystrokes, mouse activity, visited website URLs, and printer activity in realtime
Sending
Screen capturing spyware generally saves screenshots to a local disk or sends them to an attacker via FTP or email
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
SoftActivityTS Monitor is terminal server sessions recorder that captures every user action It captures screenshots of user activity such as picture of each visited web page, opened program, sent or received IM message, etc.
x X6iu xos Mott vhltd *wbiltei
by utr John
x 0 xccx xcoa?
5 0!
http://www .softactivity.com
Copyright by E&Cainc!. All Rights Reserved. Reproduction isStrictly Prohibited.
SoftActivity TS Monitor is a terminal-server sessions recorder that captures every user action. It allows you to monitor the remote user's activities on your W indow s terminal server and monitor your employees who work from home or a remote area and during business trips via RDP. This can also monitor what users do on the client's network, without installing any software on your network. It can document server configuration changes by recording remote and local administrative sessions. Secure your corporate data by preventing information theft by insiders. Increase staff productivity and improve security. This terminal server monitoring software is completely invisible to monitored users.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ji 2 to '
Programs Usage Screenshots This month Fron ].un 01 4 ? To: |jn/ 1 4 20 ! 2 t y Custom Rang*
L -/
. W ^
<*>
t OPRESS H V Mn C V PR E S S -H V Peter
B
00:35:59 :03:30 00:03:25 00:05:02 00:01:36 00:00:49 00:00:17 00:00:04
Next
r\
Retordi. 12
Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
IcyScreen
h ttp ://w w w . 16s o ft ware, com
Spector Pro
h ttp ://w w w .spec tors oft. com
1 S r1
g : 'S
PC Tattletale
h ttp ://w w w .p cta ttle ta le . com
HT Employee Monitor
h t tp ://w w w . hide tools. com
e
0
Ethical Hacking and Countermeasures Copyright by EC-C0UllCil All Rights Reserved. Reproduction is Strictly Prohibited.
/] USB Spyware
USB spyware is a program or software designed for spying on the computer and dumping into the USB device. USB spyware copies the spyware files from USB devices on to the hard disk without any request and notification. This runs in a hidden mode so the users of the computer will not be aware of the presence of the spyware on their computer. USB spyware provides a multifaceted solution in the province of USB communications. The USB spyware is capable of monitoring USB devices' activity without creating additional filters, devices, etc., which might damage the driver structure in the system. USB spyware lets you capture, display, record, and analyze the data that is transferred between any USB device connected to a PC and applications. This enables working on device driver or hardware development, which provides a powerful platform for effective coding, testing, and optimization and makes it a great tool for debugging software. It captures all the communications between a USB device and its host and saves it into a hidden file for later review. A detailed log presents a summary of each data transaction along with its support information. The USB spyware uses low system resources of the host computer. This works with its own time stamp to log all the activities in the communication sequence. USB spyware does not contain any adware or spyware. It works with most recent variants of Windows.
Module 05 Page 665 Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
USB spyware copies files from USB devices to your hard disk in hidden mode without any request
It creates a hidden file/directory with the current date and begins the background copying process
It allows you to capture, display, record, and analyze data transferred between any USB device connected to a PC and applications
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
USBSpy
! Hi
[*
Qptnra tjetp
tof i k J i 7
i K l R)*2w 1tw eM u5eurM iM */'! > 1 Root Hue u j Ptt I : No <tevK connected AoatMue W I : No device connected 7 / Port 2: No device corrected D*H(lt)828OlOefl)1US8Urav*rwlHo0 , Root HUB Type 1*8 URB i n URB UR URB IM j URB m URB URB URB IIIB3 1 <* C*unr^Rew*t [ 0*411 Device Object 81CFC0X 81E96310 Service ufbhJb **> *>
USB Device Piopeitiet
Nun... 0 I
2
3 4
S
* 7
a
9 10
H i *!
fe w SUtf-Vtew Device Name 0 0 U5BROO-4 JQ 0000... ^ D rrvtfs
II 1 2
.c * Request Type w . Elapsed... Device Object BUU_OR_INTERRUPT_TRANS... IN 0.030043 U5BPDO-4 (0!81E. BUU.OR.WTtRRURT_TRANS.. IN 0.050072 US6PDO-4 (0<81E . BUU.ORJNTERRUPT TRANS. IN 0M 0N USBPDO-4(0*6IE.. OUU_0R JHTCRR URT_TRANS. IN 0 060006 U58PDO-4 (0*81E . BUU.OR .INTERRUPT _TRANS IN USBPDO-4 (0>81E 0.070101 USBPOO-4 (081E 8UU_0R_INTERRUPT_TRANS.. IN 0.070101 Intd(R) *280IM/WW USB U ve*/0070101 * Ho USBPDO-4 (0!81E BUU.OR JNTERRUPT.TRANS.. IN US6POO-4 (081E.. BUU.OR INTERRUPT .TRANS.. IN 0.070101 BUU _0R .INTERR UPT_TRANS... IN 0.060115 US6ROO-4 (0*B1E.. BUU.OR JNTERRURT TRANS.. IN 0.060115 USBPDO-4 (OxBlE BUU.OR JNTERRUPT.TRANS. IN 0.090130 USBPDO-4 (OxBlE.. BUU.OR JNTERRUPT.TRANS.. IN 0.090130 U$BPOO4( OxBlE.. BUU_OR_INTERRURT_TRANS. IN 0.110156 USBPDO-4 (0x6lE. v
1 0
<
9 X
O ffs e t: 0000
He: 00
Dec:
B in : 00000000
0 0 0 0 0 00 10 0
9 0 0
A tc il
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
USB Spyware
USB Monitor
h ttp ://w w w . hhds o ft ware, com
CEH
USB Monitor Pro
h ttp ://w w w . us b-monitor. com
r r- r a ^
USB Grabber
h ttp://usbgrabber. s ourceforge, net
USBTrace
h ttp ://w w w .s ys nude us. com
USBDeview
h ttp ://w w w . nirs oft. net
USB Spyware
A few of USB spyware tools that are available in the market are listed as follows: 0 0 0 0 0 0 0 0 0 0 USB Monitor available at http://www.hhdsoftware.com USB Grabber available at http://usbgrabber.sourceforge.net USBTrace available at http://www.svsnucleus.com USBDeview available at http://www.nirsoft.net Advanced USB Port Monitor available at http://www.aggsoft.com USB Monitor Pro available at http://www.usb-monitor.com USB Activity Monitoring Software available at http://www.datadoctor.org Stealth iBot Computer Spy available at http://www.brickhousesecurity.com KeyCarbon USB Hardware Keylogger available at http://www.spywaredirect.net USB 2GB Keylogger available at http://diij.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Audio Spyware
records and spies voice cha message of different instant messengers such as MSN voice chat, Skype voice chat, ICQ voice chat, MySpace voice chat, etc.
It saves the recorded sounds into hidden files and transfers them automatically through Internet to attacker
Malicious users use audio spyware to snoop and monitor conference recordings, phone calls, and radio broadcasts
Audio Spyware
Audio spyware is the sound surveillance program that is designed to capture the sound waves or voice onto the computer. The spyware can be installed on the computer without the permission of the computer user. The audio spyware is installed on the computer in a silent manner without sending any notification to the user and runs in the background to record various sounds on the computer secretly. Using audio spyware doesn't require any administrative privileges. Audio spyware monitors and records a variety of sounds on the computer. The recorded sounds are saved into a hidden file on the local disk for later retrieve. Therefore, attackers or malicious users use this audio spyware to snoop and monitor conference recordings, phone calls, and radio broadcasts, which may contain the confidential information. Audio spyware is capable of recording and spying voice chat messages of various popular instant messengers. With this audio spyware people can watch over their employees or children and see who they are communicating with. Audio spyware can be used to monitor digital audio devices such as various messengers, microphones, and cell phones. It can record audio conversations by eavesdropping and monitor all ingoing and outgoing calls, text messages, etc. They allow live call monitoring, audio surveillance, track SMS, logging all calls, and GPRS tracking.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Sound Snooper
Voice activated recording Store records in any sound format Conference recordings Radio broadcasts logging
F ile
Option About
! Sound Snooper
H i |W
Set Options [7 Au:uSt3rt
00:00:27.9
I Hds Tiay [con
Stop
I ... I I
File
Options
Help
S B Live! W a v e D evice
Voice
Rctcrdiry Options
C Rc\.vt 0 iviJ 1 Pi Lyiam 3 la! lup | 1 I 50VC rfca^iinUM r Auto Record Task Managem ent W Auto Record When Skyp Voic Chut Aetvat] r Auto Record VVhfn QQ Voice Chat Activate r Auto Record when Yahoo! Messenger voce Chat Activate I~ Auto Recoid When Voce Chat Room Activate
http://www.sound-snooper.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Spy ?oi . ce R e c o r d e r
F ile Option About
M M
Set Options 5e AutoStart Recording Options
00:00:27.9
I- hide Tray Icon _______
Stop
View
jSave Fles/Minutes
Auto Record Task Management |7 Auto Record When Skype Voice Chat Activate! Auto Record When QQ Voice Chat Activate Auto Record When Yahoo !Messenger Voice Chat Activate I- Auto Record When Voice Chat Room Activate
C Set Hotkey
Exit
Sound Snooper
c S o u r c e : http://www.sound-snooper.com Sound Snooper is computer spy software that allows you to monitor sound and voice recorders on the system. It invisibly starts recording once it detects sound and automatically stops recording when the voice disappears. You can use this in recording conferences, monitoring phone calls, radio broadcasting logs, spying and employee monitoring, etc. It has voice activated recording, can support multiple sound cards, stores records of any sound format, sends emails with recorded attachments, and is supported by W indows.
ES S o u n d
File
Snooper
H lfil E3
Voice
Options
Help
S B Live! W a v e D evice
. . .
f f]
|1f r
J.1
Ji. ,
,,u U h
p jr
i1
.i
510 00 25:23
Pause
50 02:05:32
------------------------------------------------------------------------------- 1
FIGURE 5.45: Sound Snooper Screenshot
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Video Spyware
Video spyware secretly monitors and records webcams and video IM conversions
CEH
Attackers can remotely view webcams via the web or mobile phones
It allows attacker to get live images from all the cameras connected to this system through Internet
User
Hacker
jLr
) Video Spyware
Video spyware is software for video surveillance. With this software, you can record
all video activity with a programmed schedule. This can be installed on the target computer without the user's knowledge. The video spyware runs transparently in the background, and monitors and records webcams and video IM conversions secretly. The remote access feature of video spyware allows the attacker to connect to the remote or target system in order to activate alerts and electric devices and see recorded images in a video archive or even get live images from all the cameras connected to this system using a web browser such as Internet Explorer.
User
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Record wizard
etected im age
Retiy
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Cancel
Back
Next
Finish
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Video Spyware
c WebcamMagic
h ttp ://w w w . robomagic. com
CEH
ID
\
IF !
MyWebcam Broadcaster
h ttp ://w w w . eyespyfx. com
Capturix VideoSpy
h ttp ://w w w . capturix. com
I-Can-See-You
h ttp ://w w w .internetsafetysoftw are.com
WebCam Looker
h ttp://felenas oft. com
Digi-Watcher
h ttp ://w w w . digi-watcher. com
SecuritySpy
h ttp ://w w w . bens oft ware, com
iSpy
h ttp ://w w w . ispy connect, com
Video Spyware
Many video spyware programs are available in the market for secret video surveillance. The attacker can use this software to secretly monitor and record webcams and video IM conversions. An attacker can use video spyware to remotely view webcams in order to get live footage of secret communication. W ith the help of this spyware, attackers can record and play anything displayed on victim's screen. A few of the video spyware programs used for these purposes are listed as follows: Webcam Magic available at http://www.robomagic.com M yWebcam Broadcaster available at http://www.eyespyfx.com l-Can-See-You available at http://www.internetsafetvsoftware.com Digi-Watcher available at http://www.digi-watcher.com NET Video Spy available at http://www.sarbash.com Eyeline Video Surveillance Software available at http://www.nchsoftware.com Capturix VideoSpy available at http://www.capturix.com WebCam Looker available at http://felenasoft.com SecuritySpy available at http://www.bensoftware.com iSpy available at http://www.ispyconnect.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
P rint Spyware
&
CEH
v jjr
X ____Prin ter
Printer spyware facilitates remote printer usage monitoring and used to detect exact print job properties such as number of copies, number of printed pages, and content printed It records all the information related to the printer activities in different formats and saves the information in encrypted logs and also sends the log file to a specified email address over Internet
User
Attacker
Copyright by EC-Caind. All Rights Reserved. Reproduction is Strictly Prohibited.
Print Spyware
Attackers can monitor the printer usage of the target organization remotely by using print spyware. Print spyware is printer usage monitoring software that monitors printers in the organization. Print spyware provides precise information about print activities for printers in the office or local printers, which helps in optimizing printing, saving costs, etc. It records all information related to the printer activities and saves the information in encrypted logs and sends the log file to a specified email address over the Internet. The log report consists of the exact print job properties such as number of pages printed, number of copies, content printed, the date and time at which the print action took place. Print spyware records the log reports in different formats for various purposes such as web format for sending the reports to an email through the web or Internet and in hidden encrypted format to store on the local disk. The log reports generated will help attackers in analyzing printer activities. The log report shows how many documents were printed by each employee or workstation, along with the time period. This helps in monitoring printer usage and to determine how employees are using the printer. This software also allows limiting access to the printer. This log report helps attackers to trace out information about sensitive and secret documents that have been printed.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Attacker
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
UrtifW4 ttkKjl M mh a t
C EH |
Printer Activity M onitor allows you to m onitor and audit printers and find out which documents are printed on
http://www .redline-software.com
Copyright by EfrCainci. All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
P rint Spyware
Print Monitor Pro
w~_ I h ttp ://w w w .spyars enal. com
CEH
Print Job Monitor
h ttp ://w w w . Imonitors oft. com
PrintTrak
http ://w w w .lygil.com
All-Spy Print
h ttp ://w w w . all-spy. com
*j A
l*^
Print Inspector
h ttp ://w w w . soft perfect, com
too
Print365
h ttp ://kra w a so ft. com
4 1 Print Spyware
Attackers can also use the following printer monitoring applications as printer spyware to get information about target printer usage. This printer spyware helps attackers to track printer usage such as content of documents printed, number copies printed, date and time at which the print action took place, and so on. A few print spyware programs are listed as follows: 0 0 0 0 0 0 0 0 0 0 Print Monitor Pro available at http://www.spyarsenal.com Accurate Printer Monitor available at http://www.aggsoft.com Print Censor Professional available at http://usefulsoft.com All-Spy Print available at http://www.all-spy.com O&K Print Watch available at http://www.prnwatch.com Print Job Monitor available at http://www.imonitorsoft.com PrintTrak available at http://www.lygil.com Printer Admin - Copier Tracking System available at http://www.printeradmin.com Print Inspector available at http://www.softperfect.com Print365 available at http://krawasoft.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
T e le p h o n e /C e l l p h o n e S p y w a r e
J J Telephone/cellphone spyware monitors and records phone calls, text messages, and tracks employee cell phone usage Attackers install spyware on the devices they want to track, which secretly sends data such as call history, text message, web browser history, actual location of phone, contacts, etc. to attackers through SMS or email
C EH
Satellite
Transmission Tower
W eb Site History - the entire history of all websites visited through the phone will be recorded to the log report file.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
GPS Tracking - The spyware will show you where the phone is in real time. There is also a log of the cell phone's location so you can see where the phone has been.
Satellite
User
Tower
FIGURE 5.49: Working of Telephone/Cell Phone Spyware
Hacker
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Uplo
(W W !*ln W <
* | | X 1 a ** ^
e H t> > W %wiblt l#v(err, nrrHf non0*P Pg mtyxty&pjnt D & !> < > . (U lC 'O tn( {a
t^tw<c /r*m w 1 /*< jn p > <} 1 > *oll1 > < x rt(< r< *U 4 O w *0
< < * **
^ E ' *
*!
U r**** irccmoj reanftj UJijorc ireoffwv) aeoe ircwnnj ireomnj 0* 9 0 9 urarswrM urarjwfrM 0017 006 unvsrM unvswcrM
0M em H |frtrtrfM o eC
lw , l
O W
,E- l
3SLM6 CONTROL PRMEL HOME VIEW ALL SETTINGS SUPPORT 10GGF'
0 9 iw im m im w c* u
44
Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
T e le p h o n e /C e l l p h o n e S p y w a r e
VRS Recording System FlexiSPY OMNI
h ttp ://w w w .flexisp y. com
C EH
H L J
Modem Spy
h ttp ://w w w . modem spy. com
SpyBubble
h ttp ://w w w .5 p y bubble, com
MOBILE SPY
h ttp ://w w w . mobile-spy. com
SPYPhone GOLD
(3 h ttp://spyera.com
StealthGenie
http://w w w .stealthgenie.com
SpyPhoneTap
t h ttp ://w w w . spy phone tap. com m
CellSPYExpert
h ttp ://w w w . cellspyexpert. com
r i
telephone/cell phone spyware to record all activity on a phone such as Internet usage, text messages and phone calls, etc. The following are some available telephone/cell phone spyware programs: 0 Q Q e 0 Q Q Q Q VRS Recording System available at http://www.nch.com.au Modem Spy available at http://www.modemspy.com MobiStealth Cell Phone Spy available at http://www.mobistealth.com SPYPhone GOLD available at http://spyera.com SpyPhoneTap available at http://www.spyphonetap.com FlexiSPY OMNI available at http://www.flexispy.com SpyBubble available at http://www.spybubble.com MOBILE SPY available at http://www.mobile-spy.com StealthGenie available at http://www.stealthgenie.com CellSPYExpert available at http://www.cellspyexpert.com/
Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
GPS Spyware
GPS spyware is a device or software application that uses the Global PositioningSystemto determ inethe location of a vehicle, mobiles, person, or other asset to which it is attached or installed
CEH
....... 4
Vehicle
Hacker
Transmission Tower
Copyright by EC-Caind. All Rights Reserved. Reproduction is Strictly Prohibited.
GPS Spyware
L = L
GPS spyware is a device or software application that uses the Global Positioning
System (GPS) to determine the location of a vehicle, person, or other asset to which it is attached or installed. An attacker can use this software to track the target person. This spyware allows you to track the phone location points and saves or stores them in a log file and sends them to the specified email address. You can then watch the target user location points by logging into the specified email address and it displays the connected point's trace of the phone location history on a map. This also sends email notifications of location proximity alerts. An attacker traces the location of the target person using GPS spyware as shown in the following figure.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
.:7
> **'
Vehicle
Server
**'A
Hacker
Transmission Tower
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
SPYPhone software have ability to send events (captured data) from target phone to your web account via Wi-Fi, 3G, GPRS, or SM S
F eatu res
Call interception Location tracking Read SMS messages See call history See contact list Read messenger chat Cell ID tracking Web history
SPYERA
IO G C ^ D AS:nOOtfcpyvncoiri ttTTMG Incoming j#
Outgoing(!*)
MKtcd*
SMS
M#t*ngtr
Whats App tc
B6M0
E-mail incoming : Outgoing m Location L0CID! < 1
[f| ' v
ft
__ ^^m i
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
SPYERA
SPYERA
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
GPS Spyware
EasyGPS
http:,//w w w . eas ygps. com
CEH
ALL-in-ONE Spy
h ttp ://w w w . thespyphone.com
FlexiSPY PRO-X
http ://w w w .flexisp y. com
Trackstick
h ttp ://w w w . tracks tick, com
MobiStealth Pro
h ttp ://w w w . mobis tealth. com
MOBILE SPY
h ttp ://w w w . mobile spy. com
mSpy
h ttp ://w w w . buymspy. com
m 15
World-Tracker
h ttp ://w w w . world-tracker. com
j
1 m l
GPS Retriever
h ttp ://w w w . mobile bugs tore, com
GPS Spyware
There are various software programs that can be used as GPS spyware to trace the location of particular mobile devices. Attackers can also make use of the following GPS spyware software to track the location of target mobiles: 0 0 0 0 0 0 0 0 0 0 EasvGPS available at http://www.easygps.com FlexiSPY PRO-X available at http://www.flexispy.com GPS TrackMaker Professional available at http://www.gpstm.com MOBILE SPY available at http://www.mobile-spy.com World-Tracker available at http://www.world-tracker.com ALL-in-ONE Spy available at http://www.thespyphone.com Trackstick available at http://www.trackstick.com MobiStealth Pro available at http://www.mobistealth.com mSpy available at http://www.buymspy.com GPS Retriever available at http://www.mobilebugstore.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
H ow to D e fe n d A g a in st K e y lo g g e r s
CEH
Install anti-spyware/antivirus programs and keeps the signatures up to date Install a host-based IDS, which can monitor yoursystem and disable the installation of keyloggers
' /
Keep your hardware systems secure in a locked environm ent and frequently v check the keyboard cables for the attached connectors Choose new passwords for different online accounts and change them frequently Use software that frequently scans and monitors the changes in the system or network
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Enable firewalls on the computer. Firewalls prevent outside access to the computer. Firewalls prevent the transmission of recorded information back to the attacker.
Keep track of the programs that are running on the computer. Use software that frequently scans and monitors the changes in the system or network. Usually keyloggers tend to run in the background transparently.
Keep your hardware systems secure in a locked environment and frequently check the keyboard cables for the attached connectors, USB port, and computer games such as the PS2 that have been used to install keylogger software.
Recognize and delete phishing emails because most attackers use phishing emails as a medium to transfer software keyloggers to a victim's system.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
(rt<fwd | IthKJl lUilwt
Scan the files before installing them on to the computer and use registry editor or process explorer to check fo rthe keystroke loggers
Use live CD/DVD or write-protected Live USB for rebooting the computer
Use automatic form-filling programs or virtual keyboard to enter user name and password Use keystroke interference software, which inserts randomized characters into every keystroke Use W indow s on-screen keyboard accessibility utility to enter the password or any other confidential information
VII
Do not click on links in unwanted or doubtful emails that may point to malicious sites
Enable pop-up blockers and avoid opening junk emails and their attachments. Antivirus and antispyware software is able to detect anything that gets installed, but it is better to detect these programs before they are installed. Scan the files thoroughly before installing them on to the computer and use a registry editor or process explorer to check for keystroke loggers.
Use live CD/DVD or write-protected Live USB to reboot the computer. Use automatic form-filling programs or a virtual keyboard to enter user names and passwords because they avoid exposure through keyloggers. This automatic form-filling program will remove the use of typing your personal, financial, or confidential details such as credit card numbers and passwords through keyboards.
Use keystroke interference software, which inserts randomized characters into every keystroke.
Use the W indows on-screen keyboard accessibility utility to enter the password or any other confidential information. You can maintain your information confidentially because here the mouse is used for entering any information such as passwords, credit
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
card numbers, etc. into the keyboard instead of typing the passwords using the keyboard. Q Do not click on links in unwanted or suspicious emails that may point you to malicious websites.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
keyloggers. Now we will discuss hardware keyloggers. A hardware keylogger is a hardware device that records each and every keystroke that is typed on the computer keyboard in real time. This device is plugged in between the computer case and keyboard cable connector. A keylogger is used for legitimate applications as well as by attackers for deceitful purposes such as for stealing passwords, bank account numbers, phone numbers and so on. To defend your system against keyloggers, follow the countermeasures listed as follows: e Restrict physical access to sensitive computer systems Periodically check your keyboard interface to ensure that no extra components are plugged to the keyboard cable connector Q Q Lock the server room Periodically check all the computers and check whether there is any hardware device connected to them
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Anti-Keylogger
Anti-key loggers d ete ct and disable so ftw are keyloggers Som e of the anti-keyloggers w ork by matching signatures of keylogger code with a signature database while others protect keyboard drivers and kernels from manipulation by keyloggers Using a virtual keyboard or touch screen makes it difficult for malicious sp yw are and Trojan programs to capture keystrokes
1 1 1 1
1 1
1 1 1 1
1 1 1 1
1 1 | |
| |
II
II
I U U U U U L U U l ___I
1
II I
Anti-K eyloggers
Anti-keyloggers, also called anti-keystroke loggers, are designed especially for detecting and disabling keystroke logger software. Anti-keyloggers are specially designed for the purpose of detecting software keyloggers. Many large organizations, financial institutions, online gaming industries, as well as individuals use anti-keyloggers for protecting their privacy while using systems. This software prevents a keylogger from logging every keystroke that is typed by the victim and thus keeps all personal information safe and secure. An anti-keylogger scans a computer, detects, and removes keystroke logger software. If the software (anti-keylogger) finds any keystroke logging program on your computer, it immediately identifies and removes the keylogger, whether it is legitimate keystroke logging program or an illegitimate keystroke logging program. Some of the anti-keyloggers detect the presence of hidden keyloggers by comparing all files in the computer against a signature database of keyloggers and searching for similarities. Other anti-keyloggers detect the presence of hidden keyloggers by protecting keyboard drivers and kernels from manipulation. A virtual keyboard or touchscreen makes the keystroke capturing job of malicious spyware or Trojan programs difficult.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
. . 1 1 .A T& T3 G
7:21 AM
Landscape
U H B N
O P
space
FIGURE 5.53: Anti-Keylogger Screenshot
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
E @ z e M a N a
These rwxXJes protect your corouter from iraloous prograro such as vruses, spyware and trojans. You can swt C\ nem of! as a group, or ndvtdualy.
----------- j 1 ; ----------- J
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
P ro te c tio n : Enabled These modiies protect your computer from mafcoous programs such as vruses, spyware and trojans. You can switch them off as a group, or ndrvidualy.
Analyzed Stocked
: :
1694 16
s fl
: :
Skype.exe keytog.exe
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Anti-Keylogger
Anti-Keylogger
h ttp ://w w w . anti-keyloggers. com http://w w w .spyshelter.com
CEH
SpyShelter STOP-LOGGER
PrivacyKeyboard
h ttp ://w w w . anti-keylogger. com
DefenseWall HIPS
http://w w w .softsphere.com
PrivacyKeyboard
h ttp ://w w w . privacy key board, com
KeyScrambler
h ttp ://w w w . qfxs oftware. com
I Hate Keyloggers
h ttp ://d e w a so ft. com
CoDefender
https ://w w w . encas sa. com
%
Copyright by E&Coincil. All Rights Reserved. Reproduction is Strictly Prohibited.
Anti-K eyloggers
Anti-keyloggers secure your system from spyware attacks, software keyloggers, and hardware keyloggers. Some of anti-keyloggers that can be used for securing your system against various threats are listed as follows: 0 0 0 0 0 0 0 0 0 0 Anti-Kevlogger available at http://www.anti-kevloggers.com PrivacyKeyboard available at http://www.anti-keylogger.com DefenseWall HIPS available at http://www.softsphere.com KeyScrambler available at http://www.qfxsoftware.com I Hate Keyloggers available at http://dewasoft.com SpyShelter STOP-LOGGER available at http://www.spyshelter.com DataGuard AntiKeylogger Ultimate available at http://www.maxsecuritylab.com PrivacyKeyboard available at http://www.privacvkeyboard.com Elite Anti Keylogger available at http://www.elite-antikeylogger.com CoDefender available at https://www.encassa.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Adjust browser security settings to medium for Internet zone Regularly check task manager report and MS configuration Q manager report
a
'
Try to avoid using any computer system which is , not totally under your control
Update virus definition files and scan the system for spyware regularly
Update the software regularly and use a firewall with outbound protection
Copyright by EC-Cauactl. All Rights Reserved. Reproduction is Strictly Prohibited.
Firewall enhances the security level of your computer. Don't open suspicious emails and file attachments received from unknown senders. There is a great likelihood that you will get a virus, freeware, or spyware on the computer. Don't open unknown websites that are presented in spam mail messages, retrieved by search engines, or displayed in pop-up windows because they may mislead you to download spyware.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Install antispyware software. Antispyware protects against spyware. Antispyware is the first line of defense against spyware. This software prevents spyware from being installed on your system. It periodically scans your system and protects your system from spyware.
Try to avoid using any computer system that is not totally under your control. 0 Update virus definition files and scan the system for spyware on a regular basis.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
<M >
Do not use public term inals for banking and o ther sensitive activities
Do not dow nload free music files, screensavers, or sm iley faces from Internet
<X >
<M >*
0 0
s
Perm anently d ele te cookie, cache, URLs history, and tem p o rary files on the com puter w h en done w e b surfing
Do not store personal inform ation on any com puter system that is not to ta lly under your control
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Beware of pop-up windows or web pages. Never click anywhere on the windows that display messages such as your computer may be infected, or that they can help your computer to run faster. W hen you click on such windows your system may get infected with spyware.
Permanently delete cookies, caches, URLs, history and temporary files on the computer when done web surfing.
Do not store personal or financial information on any computer system that is not totally under your control, such as in an Internet cafe.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
r cu
U tM M tlk .jl M
PC Tools Spyware Doctor delivers simple protection against dangerous spyware It stops and blocks spyware It checks files before they can get on your PC and compromise your computer
Protection Summary
Protection Status
Old you Know? Nw *< d!cov*ftO vt ry 5 m inut* M 1*#$uryou r*pro*et*db)scftoau1 1 r fl daily team.
0 pc tools
bySynumcc
http://www .pctools.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
P ro te ctio n S u m m a ry
P ro te ctio n Statu s
532 15
7,562 20
J
*
Did you Know? New viruses are discovered every 5 minutes Make sure you're protected by scheduling daily scans
0 pc tools
by Symantec
Report Card
My Account
Smart Update
Help
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Anti-Spywares
CEH
Kaspersky Internet Security 2013
h ttp ://w w w . kaspersky. com
SUPERAntiSpyware
http://superantispyware.com
MacScan
http://macscan.securemac.com
SpyHunter
h ttp ://w w w . enigmas oft ware, com &
NIC
W W W
Anti -Spywares
Antispywares scan your system and check for spyware such as malware, Trojans,
dialers, worms, keyloggers, and rootkits and removes them if any are found. Antispyware provides real-time protection by scanning your system at regular intervals, either weekly or daily. It scans to ensure the computer is free from malicious software. A few antispyware programs are listed as follows: 0 0 0 0 0 0 0 0 0 0 SUPERAntiSpyware available at http://superantispyware.com Spyware Terminator 2012 available at http://www.pcrx.com Ad-Aware Free Antivirus+ available at http://www.lavasoft.com Norton Internet Security available at http://in.norton.com SpyHunter available at http://www.enigmasoftware.com Kaspersky Internet Security 2013 available at http://www.kaspersky.com SecureAnywhere Complete 2012 available at http://www.webroot.com MacScan available at http://macscan.securemac.com Spybot - Search & Destroy available at http://www.safer-networking.org Malwarebytes Anti-Malware PRO available at http://www.malwarebytes.org
Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
capable of preventing or detecting and deleting malicious applications. In order to avoid malicious applications being detected by protective applications, attackers hide malicious files e other legitimate files.
!1 * liili 1
Hiding Files
Covering Tracks
Executing Applications
Penetration Testing
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Rootkits
that tim e and also in future security of the target system causing malicious functions to be executed A typical rootkit comprises of backdoor programs, DD0S programs, packet sniffers, log-wiping utilities, IRC bots, etc.
CEH
Rootkits are programs that hide their presence as well as attacker's malicious activities, granting them full access to the server or host at
Rootkits replace certain operating system calls and utilities with its own modified versions o f those routines that in turn undermine the
O
the web t*
O b jectives of rootkit: To root the host system and gain remote backdoor access To mask attackertracksand presence of malicious applications or processes
Wrapping rootkit in a special package like games Installing rootkit on the public computers or corporate computers through social engineering
To gather sensitive data, network traffic, etc. from the system to which attackers might be restricted or possess no access
Launching zero day attack (privilege escalation, buffer overflow, Windows kernel exploitation, etc.)
To store other malicious programs on the system and act as a server resource for bot updates
Rootkits
Rootkits are software programs aimed to gain access to a computer without being
detected. These are malware that can be used to gain unauthorized access to a remote system and perform malicious activities. The goal of the rootkit is to gain root privileges to a system. By logging in as the root user of a system, an attacker can perform any task such as installing software or deleting files, etc. It works by exploiting the vulnerabilities in the operating system and applications. It builds a backdoor login process to the operating system by which the attacker can evade the standard login process. Once root access has been enabled, a rootkit may attempt to hide the traces of unauthorized access by modifying drivers or kernel modules and deserting active processes. Rootkits replace certain operating system calls and utilities with its own modified versions of those routines that in turn undermine the security of the target system causing malicious functions to be executed. A typical rootkit is comprised of backdoor programs, DD0S programs, packet sniffers, log-wiping utilities, IRC bots, etc. All files contain a set of attributes. There are different fields in the file attributes. The first field is used to determine the format of the file, that is, if it is a hidden, archive, or read-only file. The other field describes the time the file was created, when it was accessed, as well as its original length. The functions GetFileAttributesEx() and GetFilelnformationByHandle() enable this. ATTRIB.exe is used to display or change file attributes. An attacker can hide, or even change the attributes of a victim's files, so that attacker can access them.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
An attacker places a rootkit by: 0 0 0 Scanning for vulnerable computers and servers on the web Wrapping rootkit in a special package like games Installing rootkit on the public computers or corporate computers through social engineering 0 Launching zero day attack (privilege escalation, buffer overflow, Windows kernel exploitation, etc.) 0 Means of a link and a bot from IRC, ICQ, etc.
The primary purpose of a rootkit is to allow an attacker repeated unregulated and undetected access to a compromised system. Installing a backdoor process or replacing one or more of the files that run the normal connection processes can help meet this objective. Attackers use rootkits to: 0 0 0 Root the host system and gain remote backdoor access Mask attacker tracks and presence of malicious applications or processes Gather sensitive data, network traffic, etc. from the system to which attackers might be restricted or possess no access 0 Store other malicious applications and act as a server resource for bot updates and so on
Ethical Hacking and Countermeasures Copyright by EC-COUIlCil All Rights Reserved. Reproduction is Strictly Prohibited.
Types of Rootkits
Hypervisor Level Rootkit
Modifies the boot sequence of the computer system to load themselves instead of the original virtual machine or operating system
CEH
Hardware/Firmware Rootkit
Hides in hardw are devices or platform firm w are which is not inspected for code integrity
Boot Loader Level Rootkit Kernel Level Rootkit Adds malicious code or replaces original OS kernel and device driver codes Replaces the original boot loader with one controlled by a remote attacker
i f
Copyright by E&Cauactl. All Rights Reserved. Reproduction is Strictly Prohibited.
a _ Types of Rootkits
c J A rootkit is a type of malware that can hide itself from the operating system and antivirus applications in the computer. This program provides the attackers with root-level access to the computer through the backdoors. These rootkits employ a range of techniques to gain control of a system. The type of rootkit influences the choice of attack vector. Basically there are six types of rootkits available. They are:
H ypervisor-level Rootkit
Hypervisor-level rootkits are usually created by exploiting hardware features such as Intel VT and AMD-V. These rootkits host the operating system of the target machine as a virtual machine and intercept all hardware calls made by the target operating system. This kind of rootkit works by modifying the system's boot sequence and gets loaded instead of the original virtual machine monitor.
K ernel-level Rootkit
The kernel is the core of the operating system. These cover backdoors on the computer and are created by writing additional code or by substituting portions of kernel code with modified code via device drivers in Windows or loadable kernel module in Linux. If the kit's code contains mistakes or bugs, the stability of the system is greatly affected by the kernel-
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
level rootkits. These have the same privileges of the operating system, hence they are difficult to detect and intercept or subvert operations of operating systems.
A pplication-level Rootkit
Application-level rootkit operates inside the victim's computer by replacing the standard application files with rootkits or by modifying present applications with patches, injected code, etc.
a
jj
malware image in hardware, such as a hard drive, system BIOS, or network card. The rootkit hides in firmware because firmware is not usually inspected for code integrity. A firmware rootkit implies the use of creating a permanent delusion of rootkit malware.
Library-level Rootkits
----Library-level rootkits work higher up in the OS and they usually patch, hook, or supplant system calls with backdoor versions to keep the attacker unknown. They replace original system calls with fake ones to hide information about the attacker.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
1
J
1 1
Code section ... Call FindNextFile Import data section FindNextFile: 0x87654321 Kernel32.dil 0x8765432l:FindN extFile Rootkit code: 0x90045123: MyFindNextFile
Process Identifiers
Hooks
0x90045123: MyFindNextFile
Direct Kernel Object Manipulation (DKOM) rootkits are able to locate and manipulate the 'System process in kernel memory structures and patch it. This can also hide processes and ports, change privileges, and misguide the Windows event viewer without any problem by manipulating the list of active processes of the operating system, altering data inside the
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Process 2
Unique process ID ActiveProcesLinks LIST ENTRY{ *FUNK *BLINK Process Identifiers ActiveProcesLinks LIST ENTRY { *FUNK *BLINK Process Identifiers
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Fu operates using direct Kernel object manipulation Components of Fu are dropper (fu.exe) and driver (msdirectx.sys)
8 - %
Rootkit: Fu
Fu is an infection database that operates using Direct Kernel Object Manipulation (DKOM) and comes with two components, the dropper (fu.exe) and the driver (msdirectx.sys). The Fu rootkit modifies the kernel object that represents the processes on the system. All the kernel process objects are linked. W hen a user process such as TaskMgr.exe requests the operating system for the list of processes through an API, Windows walks the linked list of process objects and returns the appropriate information. Fu unlinks the process object of the process it is hiding. Therefore, as far as many applications are concerned, the process does not exist. The Fu rootkit can also allow you to hide and list processes and drivers by using different hooking techniques. It can add privileges to any process token. This can perform many actions in the W indow s event view er and appear as someone else's.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
cv In v it e de c o m m a n d e s C : \ t e n p > f u - p i 30 Process f u . e x e :860 Process :2153091200 Process S ystem :4 Process s n s s . e x e :378 Process c s r s s . e x e :632 Process w in lo g o n .e x e :664 Process s e r u i c e s . e x e :708 I r o c e s ls a s s e x e :732 Process s u e h o s t. e x e :912 Process s u c h o s t.e x e :1004 Process s u e h o s t.e x e :1092 Process s u e h o s t.e x e :1176 Process s u e h o s t.e x e :1284 Process s p o o ls u .e x e :1416 Process UMwareSeru i c e . e :1592 Process a l g . e x e :2036 Process e x p l o r e 1* . e x e : 5 7 2 Process w scntfy.exe:580 Process U M w areT ray.exe:920 Process UMwarellser.exe :1040 Process c t f n o n .e x e :1168 Process e n d .e x e :420 I'roc es s taskn gr.exe:816 jT o t a l n u n b er o f proc ess es * 23
Ethical Hacking and Countermeasures Copyright by EC-COUIlCil All Rights Reserved. Reproduction is Strictly Prohibited.
Rootkit: KBeast
lI
CEH
KBeast (Kernel Beast) is kernel rootkit that loads as a kernel module. It supports kernel 2.6.16,2.6.18,2.6.32, and 2.6.35 It also has a userland component that provides remote access to the computer KBeast gains its control over a computer by hooking the system call table and by hooking the operations structures used to implement the netstat interface to userland
F e a tu r e s
1Hiding loadable 2
kernel modules
Anti-kill process
Hiding files/directory
7
8
Anti-rem ovefiles
Rootkit: KBeast
KBeast (Kernel Beast) is kernel rootkit that loads as a kernel module. It supports kernel 2.6.16, 2.6.18, 2.6.32, and 2.6.35. It provides remote access to the systems by using its userland component. Using the kernel module, the userland backdoor component can be invisible from other userland applications. This can hide files, directories, and processes (ps, pstree, top, Isof) that start with a user-defined prefix. You can use keylogging abilities to capture the user activities. To implement the netstat interface to userland, KBeast obtains access over the system by hooking the system call table and operations structures. The features of this rootkit include: e e 0 Q 0 Hiding this loadable kernel module Hiding files/directory Hiding process (ps, pstree, top, Isof) Hiding socket and connections (netstat, Isof) Keystroke logging to capture user activity Anti-kill process
Anti-remove files
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Q Q Q
Anti-delete this loadable kernel modules Local root escalation backdoor Remote binding backdoor hidden by the kernel rootkit
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Command Prompt
bdc lil00.exe 192.168.8.93 135 v4L connecting server . . . receiving banner . . . opening backdoor . . backdoor found checking backdoor .......... backdoor ready authorization sent, Waiting for reply authorization - s u c c e s s f u l backdoor activated! close shell and all progz to end
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Command Prompt
bdc lil00.exe 192.168.8.93
135 v4L connecting server . . . receiving banner opening backdoor backdoor found checking backdoor ........... backdoor ready authorization sent, Waiting for reply authorization - SUCCESSFUL backdoor activated! close shell and all progz to end session . . . ..
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
D etecting Rootkits
In t e g r it y -B a s e d D e te c tio n
CE H BP
S ig na tu re-B a se d Detection
This technique compares characteristics of all system processes and executable files with a database of known rootkit fingerprints
Mi
m
C ro ss V ie w -B a s e d D etection
Enumerates key elements in the computer system such as system files, processes, and registry keys and compares them to an algorithm used to generate a similar data set that does not rely on the common APIs. Any discrepancies between these two data sets indicate the presence of rootkit
It compares a snapshot of the file system, boot records, or memory with a known trusted baseline
D e te c tin g R ootkits
The rootkit detection techniques are classified as signature, heuristic, integrity, crossview-based, and Runtime Execution Path Profiling.
S ignature-based D etection
Signature-based detection methods work as a rootkit fingerprints. You can compare the sequence of bytes from a file compared with another sequence of bytes that belong to a malicious program. This technique is mostly employed on system files. Rootkits that are invisible can be easily detected by scanning the kernel memory. The success of signature-based detection is less due to the rootkit's tendency to hide files by interrupting the execution path of the detection software.
Heuristic detection works by identifying deviations in normal operating system patterns or behaviors. This kind of detection is also known as behavioral detection. Heuristic detection is capable of identifying new, previously unidentified rootkits. This ability lies in being able to recognize deviants in "normal" system patterns or behaviors. Execution path hooking is one such deviant that causes heuristic-based detectors to identify rootkits.
H euristic D etection
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Follow these steps to detect rootkits: 1. Run "dir /s /b /ah" and "dir /s /b /a-h" inside the potentially infectedOSandsave the results. Boot into a clean CD, run "dir /s /b /ah" and "dir /s /b /a-h" on the same drive, and save the results. Run a clean version of WinDiff from the CD on the two sets ofresultstodetectfilehiding ghostware (e.g., invisible inside, but visible from outside).
2.
3.
Note: There can be some false positives. Also, this does not detect stealth software that hides in BIOS, video card EEPROM, bad disk sectors, Alternate Data Streams, etc.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Staff with ill-defined responsibilities Q Well-documented automated installation procedures need to be keep
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Q Q Q Q
Install network and host-based firewalls Use strong authentication Store the availability of trusted restoration media Harden the workstation or server against the attack
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
UrtiflH
| ItfcKJl
lUilwt
Do not install unnecessary applications and also disable the features and services not in use
t t
Verify the integrity of system files regularly using cryptographically strong digital fingerprint technologies
Q You should avoid logging in an account with administrative privileges Q You should adhere to the least privilege principle
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Anti-Rootkit: Stinger
J
UrtifM
CEH
tUx*l lUckM
Stinger is a standalone utility used to detect and remove specific viruses. By default, Stinger scans rootkits, running processes, loaded modules, registry and directory locations known to be used by malware on the machine to keep scan times minimal
^ Stingy
E1 * b*<p 6*
Scan Now
1 I |
* Scontiesta rg e t
W * "defences L * Viruses
F Poc*s*s
Onvw.1iw.00> .
c Raportoniy
Dectone* scon Add ---Browse u < jrgnf-<u ,fl 4 Caa^nfr |c|2 C 1 1 McAJm Inc Al Rtf* Vj m vl0 0 00 0 0 0 N V 2 0 1 1 '
* 0
R Regrstry
* R Boot sector R Roo*1t
Interlace
Deec*on
Scon subdirectories 7 | r Report opplceeons (7 Scan*K*
Se n sr*vt y* v 1
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
V Stinger
Preferences
Scan N t i targets p Processes On virus d ictio n
H * Help #
S u n Now
w
Directories to scan
C Report only
(S Repair
(7 R egistry
[* Boot sectors |7 RootMs Interface f List all hies scanned Detection
Stng*)^RiVnon 1020 360 but on Nov 42011 CflpjagN k l 2011 McAtor Inc Al R^jN! Rwr^d V w data to vl 000 0000 oe*ed on Nov 4 2011 *can lot 3149 * i w x *cun: and vvurtfs
C Rename
C Delete
f* Scon subdirectories
Report applications
Sens*v1ty level
|Medium
_^J
Module
05 Page 729
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Anti-Rootkit: UnHackMe
J
(crtifwd 1 ttkiul Nm Im
H cE
Features: Q Precise doublechecking for a Windowsbased PC w Instant tracking of malicious code in the system (rootkits, Trojans, worms, viruses and so on) w Does not slow up the PC and it is compatible with antivirus programs
[501
3efitVJue Re8sbvK*y \5Y 51H \Curcen5 consoi. \5Y 5TC W \C u rT n 5 C 0na0l. \SYSTCM \CufrentC0n t10l. \S0ftwafe\M icro9 oft\Wl... \S0 tv< rf^M 1cr0wfnWl... \S0ftwa^M1 cnjwfnW1 ... \i0 ftwr*\M1cr0 wfRV\n... \& 0 IW*\M 1cr0 *tfRWI... \S0 ftwir#\M1r0 ft\WI...
REG.5Z C:\Pr0flQT1 F1ls (x86)\NtCff0r.. L ajo 5 r.c :w r.w HEG_52 C:\Pr0cram F1l* (x86)\EP50N . Ajtc Sr. c 0CMJD5A File < 86\)Sol*... Auto Sav-ca SoUrtWr T . REG.SZ (># 30ttoa Ca APC PEG S? C:\PROGRAM FIES <Xa6)\A0V. C :\ P ro g ra rnf.i* (x86)\6^T0. X:\P-ovrm (t86)\A < fcv9. Kernel Auio REG_5 *C\PfOO vnHl*(x)\Au-T HEG.&2 C:\PR0GRAM F1X5 (XBG)VADV. T 41 Internet E*p| T ( ( Browsers
R g t ry R u 1
" C i 'f i r o q n m
M<rv 0JRRT H<fV_LDOl... *H0 <3 % ... HKEYJ.OOL. MKEr.lOCAl... **K 7 96 ... MKEr.lOCAl... ** 5 :1 HKEY_LOCAl. . 41*0tf 74
K ihxhk/q /v
\SVSTiN\CurffntConttol... MtCEY.lOCAL..
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Reboot
Save Log
a
Internet Expl
x
Item Name Data Type Value REG SZ REG SZ C :\Program Rles (x 8 6 )\H e tw o r... C :\Program Rles (x8 6)\E P S O N ... "C:\Program Rles (x8 6 )'S o la r... C:\PROGRAM FILES (X 8 6 )\A D V ... c:\p ro g ra m Hies (x8 t> )\b ee k1 0... "C:\Program Rles (x 8 6 )'A c tiv e ... "C:\Program Rles (x 8 6 )'A u tD T ... C:\PROGRAM FILES (X 8 6 )\A D V ... C :\W in d o w s\svcn et2\svm et2.exe autocheck a ... Default Value Registry Key \SYS7EM \CurrentControl... \SYSTEM\CurrentControl... \SYSTEM\Cu rrentControl... \S oftw a re\M icroso ft\W i... \b 0 ftw a re\M 1 croso ft\W i... \S oftw a re\M icroso ft\W i... \S oftw a re\M icroso ft\W i... \S oftw a re\M icroso ft\W i... \S oftw a re\M icroso ft\W i. .. Root Key + N o t m ... 83 + N o t m ... 83 + N o t m ... 83 hKEY CURRE... + N o t m ... 96 hKLY LOCAL... + N 0 t m ... yb I-KEY LOCAL... + N o t m ... 96 I-KEY LOCAL... + N o t m ... 96 hKEY LOCAL... + N o t m ... 96 hKEY LOCAL... + N o t m ... 96 31 1' 4! 1 J 6 7 9 H 0 In p l >
02 Browsers /$<
= Network S et Software Co
A uto Servicss SolarW inds 7F... REG SZ Registry Run Registry Kun Registry Run Registry Run Registry Run APC G I W hois rn5.exe dtri.exe APC svcnet2 BootExecute f n n r * A Q 1 r\ -r REG SZ K tG bZ REG SZ REG SZ REG SZ REG SZ
a im !
B - W indDws SI
b
Kernel Auto [ v j
\ C n fh A ra ro \MirrncnfH\A/i
u irc v 1 n r a i
A t uni
The legend:
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Anti-Rootkits
Virus Removal Tool
http://ww w.sophos.com
H CE
p !
Rootkit Buster
http://dow nloadcenter. trendmicro. com
Rootkit Razor
h ttp ://w w w . tizersecure. com
RemoveAny
h ttp ://w w w .free-anti-spy. com
SanityCheck
h ttp ://w w w . resplendence, com
TDSSKiller
i m 3 on 1
Prevx
h ttp ://w w w .pre vx. com
A nti-R ootkits
The following anti-rootkits help you to remove various types of malware such as rootkits, viruses, Trojan, and worms from your system. You can download or purchase antirootkit software from home sites and install it on your PC to be protected from rootkits. A few anti-rootkits are listed as follows: 0 0 0 0 0 0 0 0 0 0 Virus Removal Tool available at http://www.sophos.com Hypersight Rootkit Detector available at http://northsecuritylabs.com Avira Free Antivirus Tool available at http://www.avira.com SanityCheck available at http://www.resplendence.com GMER available at http://www.gmer.net Rootkit Buster available at http://downloadcenter.trendmicro.com Rootkit Razor available at http://www.tizersecure.com RemoveAny available at http://www.free-anti-spy.com TDSSKiller available at http://support.kaspersky.com Prevx available at http://www.prevx.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CE H
NTFS Alternate Data Stream (ADS) is a Windows hidden stream which contains metadata forthe file such as attributes, word count, author name, and access and modification time of the files
ADS is the ability to fork data into existing files without changing or altering their functionality, size, or display to file browsing utilities
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
size of the ADS anyfile.exe. The only indication that the file was changed is the modification time stamp, which can be relatively innocuous.
Hacker
Existing File
N TF S File S y s t e m
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CE H
w Click 'Yes' to create the new file and type other 20 lines of text Save the file
Click Yes to create the new file and type 10 lines of data. Q
9
Save the file. Launch c :\>notepad myfile .t x t :tiger .txt Click Yes to create the new file and type other 20 lines of text Save the file. V ie w th e file s iz e o fm y file .tx t (it should be zero).
Q 0 0
Q To modify the stream data, open the document myfile. txt: tiger .txt in Notepad.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Location c:\
if
Trojan.exe (size:2 M B)
Readme.txt (size: 0)
Move
~ l/ \
Execute
Extract
W m /_\
~7/\
Trojan.exe
Location c:\
R e a d m e .t x t (size: 0)
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Use third-party file checksum application to maintain integrity of an NTFS partition against unauthorized ADS
Use file monitoring software such LAD, as it helps you to detect creation of additional or new data streams
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
mamaaamm
Source: http://securityxploded.com
http://securityxploded.com
Copyright by EC-Ca11actl. All Rights Reserved. Reproduction is Strictly Prohibited.
This tool helps you to detect the hidden Alternate Data Stream (ADS) and remove it from your system completely. Its multithreaded ADS scanner helps you to scan recursively over the entire system and uncovers all the hidden streams from your system. You can easily detect the suspicious data stream from a normal data stream as it displays the discovered specific stream with a specific color pattern. It is also able to detect file the type of stream by using the Advance File type detection mechanism.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CE H
Stream Explorer
h ttp ://w w w . rekenwonder. com
ADS Manager
h ttp ://d m itry b ra n t. com
ADS Scanner
h ttp ://w w w .po in ts tone, com
j#
Streams
h ttp ://te chn e t. micros oft. com G *
s
RKDetector
AlternateStreamView
h ttp ://w w w . nirs oft. net
GMER
h ttp ://w w w . gmer. net
HijackThis
h ttp ://fre e , antivirus.com
ADS Manager available at http://dmitrybrant.com 0 0 0 0 0 0 0 0 Streams available at http://technet.microsoft.com AlternateStreamView available at http://www.nirsoft.net NTFS-Streams: ADS manipulation tool available at http://sourceforge.net Stream Explorer available at http://www.rekenwonder.com ADS Scanner avaialble at http://www.pointstone.com RKDetector available at http://www.rkdetector.com GMER available at http://www.gmer.net HijackThis avaialble at http://free.antivirus.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
What Is Steganography?
J J Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain confidentiality of data Utilizing a graphic image as a cover is the most popular method to conceal the data in files
c| EH
0
[
<>
Copyright by E&Camctl. All Rights Reservfect;Reproduction is Strictly Prohibited.
^ It has been argued that one of the shortcomings of various detection programs is their primary focus on streaming text data. What if an attacker bypasses normal surveillance techniques and still steals or transmits sensitive data? A typical situation would be where an attacker manages to get inside a firm as a temporary or contract employee and surreptitiously seeks out sensitive information. While the organization may have a policy of not allowing electronic equipment to be removed from a facility, a determined attacker can still find a way with techniques such as steganography. Steganography is defined as the art of hiding data behind some other data without the knowledge of the enemy. It replaces bits of unused data into the usual filesgraphic, sound, text, audio, videowith some other bits that have been obtained surreptitiously. The hidden data can be plaintext or ciphertext, or it can be an image. The lure of the steganography technique is that, unlike encryption, steganography cannot be detected. When transmitting an encrypted message, it is evident that communication has occurred, even if the message cannot be read. Steganography is used to hide the existence of the message. An attacker can use it to hide information even when encryption is not a feasible option. From a security point of view, steganography is used to hide the file in an encrypted
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
format. This is done so that even if the file that is encrypted is decrypted, the message will still remain hidden. Attackers can insert information such as: 0 0 0 0 Source code for hacking tool List of compromised servers Plans for future attacks Communication and coordination channel
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
rm
The application of steganography differs in many areas and the area depends on what feature of steganography is utilized. Steganography is applicable to: Access Control System for Digital Content Distribution In the Access Control System for Digital Content Distribution system, the embedded data is "hidden," but is "explained" to publicize the content. In this system, a prototype of an Access Control System for digital content is developed to send data through the Internet. Using folder access keys, the content owner embeds the content in a folder and uploads on the web page. Here the content owner explains the content and publishes the contact details on the World Wide Web to get an access-request from users and they can contact him or her to get the access key. The valuable data can be protected using special access keys. Q Steganography File Systems A Steganography File System has a level of security using which hiding data is done by a series of fixed size files originally consisting of random bits on top of which vectors could be superimposed in such a way as to allow levels of security to decrypt all lower levels. Even the existence of any higher levels, or an entire partition, is filled with random bits and files hidden in it.
Module
05 Page 743
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Media Bridging Using digital steganography, electronic communications can by encrypted in the transport layer, such as a document file, image file, program, or protocol.
Copy Prevention or Control (DVD) In the entertainment industry steganography can be used to protect copyrights for DVDs and CDs. The DVD copy-protection program is designed to support a copy generation management system.
Metadata Hiding (Tracking Information) Metadata can be used to track geo location and to prevent or control copying digital material, i.e., preventing unauthorized duplication of digital data.
Broadcast Monitoring (Gibson, Pattern Recognition) Covert Communication w Q Q Ownership Assertion Fingerprinting (Traitor Tracking) Authentication (Original vs. Forgery)
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
U rtifirt itfciul Nm Im
Steganography !
Linguistic Steganography
Technical Steganography
Semagrams
Open Codes
Visual Semagrams
Covered Ciphers
Text Semagrams
Jargon Code
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Steganography
Linguistic Steganography
Technical Steganography
Sem agram s
H
y j J
O p en Codes
Visual Semagrams
Covered Ciphers
Text
Semagrams
Jargon Code
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
T echnical Steganography
J Technical steganography uses physical or chemical means to hide the existence of a message Technical steganography uses tools, devices, or methods to conceal messages
CE H
T e c h n ic a l S teg an o g rap h y
Technical steganography is a method of securing text messages with the help of physical or chemical methods to hide the existence of the text message. You can use many tools, devices, and methods. Technical steganography has methods to achieve message hiding. Some of them include: 0 Invisible ink This method uses invisible ink for hiding text messages. Microdots It is a method that can be used to hide up to one page in a dot. Q Computer-based methods Use redundant information in texts, pictures, sounds, videos, etc.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
L inguistic Steganography
H id in g M e s s a g e
J Linguistic steganography utilizes w ritten natural language to hide the message in the carrier in som e non-obvious w ays J J
CEH
Sem agram s
It is further categorized into semagrams and open codes Sem agram s utilize visual sym bols or signs to hide secret messages
V isual S e m a g ram s
T y p e s of S e m a g ra m s
Text S e m a g ra m s
Hides a message by modifying the appearance of the carrier text, such as subtle changes in the font size or type, adding extra spaces, or different flourishes in letters or handwritten text
J
Copyright by EC-Cauactl. All Rights Reserved. Reproduction is Strictly Prohibited.
:=nl Semagrams
This technique uses symbols and different signs to hide the data or messages. This is further categorized as visual semagrams and text semagrams. Q Visual Semagrams This method uses unmalicious physical objects to transmit a message such as doodles or the positioning of items on a desk or website. 0 Text Semagrams A text semagrams hides the text message by converting or transforming its look and appearance of the carrier text message, such as changing font sizes and styles, adding extra spaces as white spaces in the document, and different flourishes in letters or handwritten text.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
L inguistic Steganography
(C ontd)
J
O p e n c o d e h id es th e se cre t m essag e in a sp ecifically d esign ed p a ttern on th e d o c u m e n t th a t is u n c le a r to th e a v e ra g e re a d e r
CEH
M
O pen c o d e s te g a n o g ra p h y is d iv id ed into: 1. J a rg o n C o d e
S A null cipher is an ancient form of encryption where the plaintext is mixed with a large amount of noncipher material 5 It can also be used to hide ciphertext
2 . G rille C ip hers
The message is hidden openly in the carrier medium so that anyone who knows the secret of how it was concealed can recover it
abed efqh iiklm n P
a In this technique, a grille is created by cutting holes in a piece of paper - When the receiver places the grille over the text, the intended message can be retrieved
\J
Jargon Codes
Jargon codes are a language that a group of people can understand but is meaningless to others. These codes use signals, terminology, and conversations that have a special meaning that is known to some specific group of people. A subset of jargon codes are cue codes, where certain prearranged phrases convey meaning.
C overed C iphers
The message is hidden openly in the carrier medium so that anyone who knows the secret of how it was concealed can recover it. Covered ciphers are categorized into two types: grille ciphers and null ciphers.
Ethical Hacking and Countermeasures Copyright by EC-C0linCil All Rights Reserved. Reproduction is Strictly Prohibited.
A grille cipher employs a template that is used to cover the carrier message. The words that appear in the openings of the template are the hidden message. A null cipher hides the message by using some prearranged set of rules, such as "read every fifth word" or "look at the third character in every word." It can also be used to hide cipher text.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
S teganography T echniques
Substitution Techniques
Substitute redundant part of the cover-object with a secret message Embed messages by altering statistical properties of the cover objects and use hypothesis methods for extraction
CEH
Statistical Techniques
Distortion Techniques
Store information by signal distortion and in the extraction step measures the deviation from the original cover
Embed secret message in a transform space of the signal (e.g. in the frequency domain)
S teg an o g rap h y T e c h n iq u e s
Steganography techniques are classified into six groups based on the cover modifications applied in the embedding process. They are:
Substitution T echniques
In this technique, the attacker tries to encode secret information by substituting the insignificant bits with the secret message. If the receiver has the knowledge of the places where the secret information is embedded, then they can extract the secret message.
The transform domain technique of steganography hides the information in significant parts of the cover image such as cropping, compression, and some other image processing areas. This makes it tougher for attacks. Transformations can be applied to blocks of images or over the entire image.
S pread S p ectru m T e c h n iq u e s
This technique provides the means for a low probability of intercept and anti-jamming communications. This is a means of communication in which the signal occupies excess of the
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
minimum bandwidth to send the information. The excess band spread is accomplished by means of code (independent of data), and a synchronized reception with the code is used at the receiver to recover the information from the spread spectrum data.
Statistical Techniques
This technique utilizes the existence of " l bit" steganography schemes. This is achieved by modifying the cover in such a way that, when a 1" is transmitted, some of the statistical characteristics change significantly. In other cases the cover remains unchanged. This is done to distinguish between the modified and unmodified covers. The theory of hypothesis from mathematical statistics is used for the extraction.
Distortion Techniques
In this technique, a sequence of modifications is applied to the cover in order to get a stego-object. The sequence of modifications is such that it represents the specific message to be transmitted. The decoding process in this technique requires knowledge about the original cover. The receiver of the message can measure the differences between the original cover and the received cover to reconstruct the sequence of modifications.
Cover-generation Techniques
In this technique, digital objects are developed for the purpose of being a cover to secret communication. When this information is encoded it ensures the creation of a cover for secret communication.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Cover Image
Cover Image
t-----
Embedding function Extracting function
Stego Image
J
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Cover Image
Cover Image
Stego Image
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Types of Steganography
Image Steganography Document Steganography Folder Steganography
(rtifwd
CEH
IU x j I lUckM
Video Steganography
Audio Steganography
WhiteSpace Steganography
Web Steganography
Spam/Email Steganography
DVDROM Steganography
Hidden OS Steganography
Web Steganography
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
e e 0 Q
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
UrtifM
c EH
ItkNjI IU<hM
Administrator C:\Windows\system32\cmd.exe
I I
L^IhJ
D:\CEH-Tools\CEHu8 Module 05 S y s t c n H a c k i n g M J h i t e s p a c e S t e g a n o g r a p h y T o o l \ S n o w \ s 1wdos32>snow -C m " T h i s i s a t e s t f o r W h i t e s p a c e S t e g a n o g r a p h y u s i n g Snow" p 1 1 je lc o n t" t e s t . d o c x s n o u o u t . d o c x Compressed by 41.90X l e s s a g e e x c e e d e d a v a i l a b l e s p a c e by a p p r o x i m a t e l y 3 4 0 . 3 5 Z . ^n e x t r a 7 l i n e s were a d d e d . D:\CEH-Tools\CEHv8 Module 05 S y s te m H a c k i n g \ U h i t e s p a c e S t e g a n o g r a p h y T o o l \ S n o w \ s 11#dos32>
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Image Steganography
J In image steganography, the information is hidden in image files of different formats such as.PNG, .JPG, .BMP, etc. Image steganography tools replace redundant bits of image data with the message in such a way that the effect cannot be detected by human eyes J
CEH
Information
Copyright by E&Cauaci. All Rights Reserved. Reproduction is Strictly Prohibited.
Im a g e S teg an o g rap h y
Image steganography allows you to conceal your secret message within an image. You can take advantage of the redundant bit of the image to conceal your message within it. These redundant bits are those bits of the image that have very little effect on the image if altered. This alteration of bits is not detected easily. You can conceal your information within images of different formats such as .PNG, JPG , .BMP, etc. Images are the popular cover objects used for steganography. Image steganography tools are used to replace redundant bits of image data with the message in such a way that the effect cannot be detected by human eyes. Image steganography techniques can be divided into two groups: Image domain and transform domain. In image (spatial) domain techniques, messages are embedded in the intensity of the pixels directly. In transform domain (frequency) techniques, images are first transformed and then the message is embedded in the image. There are three techniques that you can use to conceal you secret messages in image files: Least Significant Bit Insertion Masking and Filtering Algorithms and Transformation
Module 05 Page 758 Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
The following figure depicts image steganography and the role of steganography tools in the image steganography process.
Information
Information
Module
05 Page 759
Ethical Hacking and Countermeasures Copyright by EC-COUIlCil All Rights Reserved. Reproduction is Strictly Prohibited.
L e a st S ig n ific a n t B it I n s e r tio n
J J The right most bit of pixel is called the Least Significant Bit (LSB) Using this method, the binary data of the hidden message is broken and then inserted into the LSB of each pixel in the image file in a deterministic sequence Modifyingthe LSB does not result in a noticeable difference because the net change is minimal andean be indiscernibleto the human eye
C EH
The letter "H" is represented by binary digits 01001000.To hide this "H " above stream can be changed as: (0 0 1 0 0 1 1 0 00100110 11101001 111 0 1 0 0 1 ) 11001000) (0 0 1 0 0 1 1 0 110 01001 11101000) (1 1 0 0 1 0 0 0
And you want to hide the letter "H" in above 24 -bit image as follows. Now letter "H" is represented by binary digits 01001000. To hide this "H," the previous stream can be changed to:
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
(0 0 1 0 0 1 1 0
11101001
11001000)
(0 0 1 0 0 1 1 0
11001001
11101000)
(1 1 0 0 1 0 0 0
00100110
11101001)
H 0 1 0 0 10 0 0
FIGURE 5.68: Least Significant Bit Insertion Diagram
You just need to replace the LSB of each pixel of the image file as shown in this figure. To retrieve this H at the other side, the person at the receiver side combines all the LSB bits of the image file and thus is able to detect the H at the receiver side.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
The masking technique using a method similarto watermarks on actual paper, and it can be done by modifyingthe luminance of parts of the image
Maskingtechniques hide information in such a way that the hidden message is inside the visible part of the image
Module
05 Page 762
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
J JPEG images use the Discrete Cosine Transform (DCT) technique to achieve
image compression
II
111
W a v e le t transform ation
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
QuickStego hides text in pictures so that only other users of QuickStego can retrieve and read the hidden secret messages
The feet are flexible structures of bones, joints, muscles, and soft tissues that let us stand upright and perform activities like walking, running, and jumping The feet are divided into three sect ons: The forefoot contains the five toes (phalanges) and the five longer bones (metatarsals). The midtoot is a pyramid-like collection ot bones that form the arches of the feet. These include the three cuneiform bones, the cuboid bone, and the navicular bone
h ttp://quickcrypto. com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CYBERNESCENCE
The feet are flexible structures of bones, joints, muscles, and soft tissues that let us stand upright and perform activities like walking, running, and jumping. The feet are divided into three sections: The forefoot contains the five toes (phalanges) and the five longer bones (metatarsals). The midfoot is a pyramid-like collection of bones that form the arches of the feet These include the three cuneiform bones, the cuboid bone, and the navicular bone
||
Open image
Save Image
!steganography
11
Hide Text
1
Get Text ||| Open Text Save Text Upgrade
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Im ag e Steganography Tools
Hide In Picture
h ttp://sourceforge, ne t
CEH
OpenStego
http://opens tego. s ourceforge, net
gifshuffle
s es
PHP-Class StreamSteganography
http://ww w.phpclasses.org
CryptaPix
h ttp ://w w w . briggs oft. com
Red JPEG
h ttp ://w w w . totalcmd.net
BMPSecrets
h ttp ://b m p s ecrets. com
Steganography Studio
& m 1
OpenPuff
, -1-
http://em beddeds w. ne t
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
D o c u m e n t S te g a n o g ra p h y : w b S teg o
CEH
Document Files
Document Files
< ,
StegTool Information
StegTool Information
A I
The wbSleQD 4 Wizard xvill guide you step by step through codiagydecodiag. With wb^togo !you aro able 1 0 hid0 any Mlocm a earner 1 1 1 0 (*BM P. .TXT, *HTM, PD F ) vrfthout changing those earnortleo optically. 1 1you aro tamiliar with tho way tho program workc you can uco trte Flawchan-Mad 10 mate all 1tmqc m an oveiview flowchart
W iz a rd
S e ttin g s
Help
w b S te g ^
Exit : Cor tin jH
http://wbstego.wbailer.com
Copyright by E&C*IHg9. All Rights Reserved. Reproduction is Strictly Prohibited.
D o cu m en t S teg an o g rap h y
Similar to image steganography, document steganography is the technique used to hide secret messages to be transferred in documents. The following diagram illustrates the document steganography process:
=
Document Files Document Files
Steg Tool
3 ,
Steg Tool
L_X
Information
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
WbStego is a document steganography tool. Using this tool, you can hide any type of file within carrier file types such as Windows bitmaps with 16, 256, or 16.7M colors, ASCII or ANSI text files, HTML fields, and Adobe PDF files.
I
The wbSteg04 Wizard will guide you step by step through coding/decoding ' With wbSteg04 you ore able to hide any Ales in a earner Me ( BMP. * TXT. * HTM. *PDF) without changing ihese earner Wes optically Ifyou are familiar with the way the programworks you can use the Flowchart-Mode 1 0make all seltmgs in an overview flowchart tJelp Settings flowchart -Mode
x jf
Continue
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
Merge Streams
h ttp://w w w .ntkernel.com
StegParty
h ttp ://w w w .fa s terlight. com
JU ?
Office XML
h ttp ://w w w . irongeek. com
[ A
^ ^ 4)
Hydan
http://w w w .crazyboy.com
Data Stash
h ttp ://w w w .sky juices o ft ware, com
StegJ
h ttp ://s tegj. source forge, net
FoxHole
http://foxhole.sourceforge. net
StegoStick
http://sourceforge. net
SNOW
h ttp ://w w w . dark side. com. au
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Video Steganography
Video steganography refers to hiding secret information or any kind of files with any extension into a carrier video file
CEH
vw
vw
In video steganography, the information is hidden in video files of different formats such as .AVI, .MPG4, A/VMV, etc.
Discrete Cosine Transform (DCT) manipulation is used to add secret data at the time of the transformation process of video
The techniques used in audio and image files are used in video files, as video consists of audio and images
A large number of secret messages can be hidden in video files since they are a moving stream of images and sound
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
J OmniHide Pro hides a file within another file. Any file can be hidden within common image/music/
Output Filo
|C \U<or$VAdrT1irittrat0f\Do<ktop\hput lmags\tiger_display_Out jp g
V ie w converted filo when complete
Hide Itl
Clear A i
Exit
http://omnihide.com
Copyright by ElrCaiHCi. All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
!*Wide rrr u Ji
Omni Hide
Mask File
C:\Users\Administrator\Desktop\lnput lmages\tiger_display.jpg
A
options ]
File To hide
Output File
Hide Itl
Clear A U .
Exit
Ready.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
U rtM M itfc M jl N M h M
C EH
BDV DataHider
h ttp ://w w w . bdv notepad. com
RT Steganography
h ttp ://rts tegvideo. s ourceforge, net
StegoStick
http://sourceforge. net
<jy yj -i
Masker
h ttp ://w w w .so ft puls. com
OpenPuff
http://em beddeds w. net
Stegsecret
h ttp ://s tegs ecre t. sourceforge, net
E9
MSU StegoVideo
h ttp ://w w w . compression, ru *
*
* * J
PSM Encryptor
http://dem o.pow ersoftm akers.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Audio Steganography
J
(rtifwd
CEH
ithiul UtkM
Audio steganography refers to hiding secret information in audio files such as .MP3, .RM, .WAV, etc. Information can be hidden in an audio file by using LSB or by using frequencies that are inaudible to the human ear (>20,000 Hz)
StegTool
Information
Information
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Information
Information
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
A u dio S teg a n o g ra p h y M e th o d s
Echo Data Hiding
It refers to hiding a message as an echo into an audio signal The sensitive message is encoded in the echo in the form of variations in amplitude, decay rate, and offset An echo cannot be easily resolved because the parameters are set below levels audible to human
(citifwd
c EH
ItkKJl NMkw
J S lL
m u
In the echo data hiding method, the secret information is embedded within the carrier audio signal by introducing an echo into it. It uses three parameters of echo, namely, initial amplitude, decay rate, and offset or delay to hide secret data. When the offset between carrier signal and echo decreases, these two signals get mixed at a certain point of time where it is not possible for the human ear to distinguish between these two signal. At this point, an echo sound can be heard as an added resonance to the original signal. However, this point of undistinguishable sounds depends on factors such as quality of original audio signal, type of sound, and listener.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
To encode the resultant signal in to binary form, two different delay times are used. These delay times should be below human perception. Parameters such as decay rate and initial amplitude should also be set below threshold audible values so that the audio is not hearable at all.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
LSB Coding
0 The low bit encoding techniqueis sim ilarto the least bit insertion method done through image files It replaces the LSB of information in each sampling p o in tw ith a coded binary string
Tone Insertion
It dependson the inaudibility of low pow er tones in the presence of significantly higher spectral components An indirect exploitation of the psychoacoustic masking phenom enon in the spectral domain
Phase Encoding
Phase coding is described as the phase in which an W m is substituted by a reference phase that represents the data It hides secret message as phase shifts in the phase spectrum of a digital signal The phase shifts cannot be easily identified due to low signal-to-noise ratio
! o r
Tone Insertion
This method involves embedding data in the audio signal by inserting low power tones. These low power tones are not audible in the presence of significantly higher audio signals. As it is not audible, it conceals the existence of your secret message. It is very difficult for the eavesdropper to detect the secret message from the audio signal. This method helps to avoid attacks such as low-pass filtering and bit truncation. The audio steganography software implements one of these audio steganography methods to embed the secret data in the audio files.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Phase Encoding
Phase coding is described as the phase in which an initial audio segment is substituted '--- by a reference phase that represents the data. It encodes the secret message bits as phase shifts in the phase spectrum of a digital signal, achieving a soft encoding in terms of signal-to-noise ratio.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
~ L O
DeepSound hides secret data into audio files wave and flac It enables extracting secret files directly from audio CD tracks DeepSound might be used as a copyright marking software for wave, flac, and audio CD It also supports encrypting secret files using AES-256 to improve data protection
J J J
DeeaSouw 13
is?
Settings
S K f l *1l*s n01 Track 1
03 6 6 n d e x iM ftfc g X J'S0 0
0 123 0006 COO?
> 0 * 4
Encode t*a*t ' 1 1 * fi 1TI 0002
03 Track 3.W8
04 Track 4.wov
06 T rack i.wav
08 Dop>oy_1bStoro,wav MonoBbrtwav Mono8bitMdlMB va^ Mono8WtPodiMB.wav SAM_1508WAV S<a1008bit.werv
01 Track 1.wav
f 0_ojlcr1j3her rtgcflac
Output dirwtory: I
http://jpinsoft.net
Copyright by E&Cauaci. All Rights Reserved. Reproduction is Strictly Prohibited.
Module 05 Page
780
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
CHAOS Universal
h ttp ://s afe chaos. com
'
p LmJ
SilentEye
h ttp ://w w w .sile nte ye . org
BitCrypt
h ttp ://b itc ry p t. mos he sz weizer. com
QuickCrypto
h ttp ://w w w . quick crypto, com
MP3Stego
h ttp ://w w w .pe titcola s. net
CryptArkan
h ttp ://w w w . kuskov. com
Hide4PGP
h ttp ://w w w . heinz -repp, online home, de ^
StegoStick
h ttp ://s teqos lick, source forge. net
You can also use the following audio steganography tools to hide your secret information in audio files: 0 0 0 0 0 0 0 0 0 0 Mp3stegz available at http://sourceforge.net MAXA Security Tools available at http://www.maxa-tools.com BitCrypt available at http://bitcrypt.moshe-szweizer.com MP3Stego available at http://www.petitcolas.net Hide4PGP available at http://www.heinz-repp.onlinehome.de CHAOS Universal available at http://safechaos.com SilentEye available at http://www.silenteye.org QuickCrypto available at http://www.quickcrypto.com CryptArkan available at http://www.kuskov.com StegoStick available at http://sourceforge.net
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Select the Hes you want to include in the self-deerypbng package: (You can add files by dropping them on this list). Click NEXT to continue... Name ^)awards.html ^ awards.jpg ^main.dwt.isc mam.dwt main,css ^ main.css. isc support. |pg Type HTML Document ACDSee JPEG I... Crypted File DWT File Cascading Style... Crypted File ACDSee JPEG I... Full Path C \alina\WEBSITE\ C \alina\WEBSITE\ C \alina\WEBSITE\Templates\ \alina\WEBSI TE\Templates\
<
^ Add files
>
j|[
|
Add folders [ |
Cryptboard
( Back
Next )
Help
| I
;< Close
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Invisible Secrets 4
C re a te Self-D ecrypting P a ck a g e
Files Popup M essage
Select the files you want to include in the self-decrypting package: (You can add files by dropping them on this list). Click NEXT to continue... Name ) ^awards.html ^ awards.jpg '^main.dwt.isc 3" main.dwt 3 main, css ^ main. css. isc tfcsupport.jpg < | ^ Add files C j Add folders ^ Remove Type HTML Document ACDSee JPEG I... Crypted File DWT File Cascading Style... Crypted File ACDSee JPEG I... Full Path C:\alina\WEBSITE\ C:\alina\WEBSITE\ C:\alina\WEBSITE\Templates\ C:\alina\WEBSITE\Templates\ C:\alina\WEBSITE\ C:\alina\WEBSITE\ C:\alina\WEBSITE\ l> Cryptboard
| Back
Next >
Help
Close
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
Folder Lock
h ttp ://w w w . newsoftwares.net
Universal Shield
'
Toolwiz BSafe
h ttp ://w w w . tootwiz.com
M = =
sm
E2
QuickCrypto
h ttp ://w w w . quick crypto, com
1
'
steganography tools to hide your secret information in folders: 0 0 Folder Lock available at http://www.newsoftwares.net A+ Folder Locker available at http://www.giantmatrix.com
Toolwiz BSafe available at http://www.toolwiz.com 0 0 0 0 0 0 0 Hide Folders 2012 available at http://fspro.net GiliSoft File Lock Pro available at http://www.gilisoft.com Universal Shield available at http://www.everstrike.com W inM end Folder Hidden available at http://www.winmend.com Encrypted Magic Folders available at http://www.pc-magic.com QuickCrypto available at http://www.quickcrypto.com Max Folder Secure available at http://www.maxfoldersecure.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
lEEHli
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Alternate encodings: Encode as spam with a password Encode as fake PGP Encode as fake Russian B33 Encode as space home | encode | decode | explanation | credits | faq & feedback | terms | Franks
Copyngfat 2000-2010 *pamnunlc.coa), All rtghti r***rv*d
You can copy the message out of the text box and paste it into a mail Launch your mail program How to copy and paste in Windows How to copy and paste in X How to copy and paste on a Mac
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Natural text steganography programs convert sensitive information in to a userdefinable free speech such as a play
Sams bigG play maker
General | Wordlists | Equiv. | |Hi, Corfidential meeting at 5 PM, Must attend. (Phil stutters 1 times) Mike sayi "Mine's a pint" Harold s5ys "H ot steamy grits!" (Adam stutters 1 times] Jason says "Alive" (Jason scratches head 1 times) Jason says 'Y e s thank you." Adam sajs 'W here?'' Harold scys "A t your command?' (Mike strikes Mike 1 times) Phil says W here?" Paul says 'W h a t does MPEG mean?" Paul says "Ah! An earthling!" Kenny says "Hot steamy grits!" (Mike steps forward 1 times) JYA says "Mine's a pint" Mr Honk> 8ayo "Hot rtoamy gritcl" Mike sayi "Hot steamy grits!" Phil says "Did he mean to die jujt then?" Mr H ankj says "I never talk politics." Sam SAV* "Mikft ynu Udyhnvl" Jason says "But I read slash-dot
E a *
h ttp://www.scramdisk.clara.net
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
About Exit
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
L e v e ls of V is ib ility
R o b u s tn e s s v s . P a y lo a d
If the embedding process distorts the cover to the point that it is visually unnoticeable, meaning if the image is visibly distorted, then the carrier is insufficient for the payload. Likewise, if the image is not distorted, then the carrier is adequate
Redundancy is needed for a robust method of embedding the message, but it subsequently reduces the payload Robustness and payload are inversely related. Therefore, the smaller the payload, the more robust it will be
!!*![
1 ^
Copyright by EfrCoincl. All Rights Reserved. Reproduction is Strictly Prohibited.
Is s u e s in In fo rm atio n H iding
The following three sections discuss issues that must be considered when hiding information.
The encrypted blocks are written to the pseudorandom locations using the key acquired from the filename and directory password to hide the file blocks in random data. When
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
the file system continues to be written to, collisions occur and the blocks are overwritten, allowing only a small portion of the disk space to be safely utilized. Q Multiple copies of each block should be written. A method to identify the blocks when they are overwritten is also required.
Levels of V isibility
If the embedding process distorts the cover to the point that it is visually unnoticeable, meaning if the image is visibly distorted, then the carrier is insufficient for the payload. Likewise, if the image is not distorted, then the carrier is adequate. The way a message is embedded will determine whether the data is perceptible or not. To reduce the theft of data, the presence of a watermark is often publicized. However, publicizing the presence of a watermark also allows various methods to be implemented to attempt to alter or disable the watermark. When the visibility of the data is increased, the potential for manipulation of the data also increases.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Challenge of Steganalysis
Some of the suspect signals or files may have irrelevant data or noise encoded into them
Steganalysis is the reverse process of steganography. It hides the data, while steganalysis is used to detect the hidden data. It determines the encoded hidden message, and if possible, it recovers that message. The message can be detected by looking at variances between bit patterns and unusually large file sizes. The first step in steganalysis is to discover an image that is suspected of harboring a message. This is considered to be an attack on the hidden information. There are two other types of attacks against steganography: message attacks and chosen-message attacks. In the former, the steganalyst has a known hidden message in the corresponding stego-image. The steganalyst determines patterns that arise from hiding the message and detecting this message. The steganalyst creates a message using a known stego tool and analyzes the differences in patterns. Cover images disclose more visual clues as compared to stego-images. It is necessary to analyze the stego-images to identify the information that is concealed. The gap between cover image and stego-image file size is the simplest signature. Many signatures are evident using some of the color schemes of the cover image.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Once detected, a stego-image can be destroyed or the hidden message can be modified. Some of the data that is hidden behind the images using the Image Domain Tool can prove to be useless.
Challenges of Steganalysis:
0 0 0 0 Suspect information stream may or may not have encoded hidden data Efficient and accurate detection of hidden content within digital images Encrypts the hidden data before inserted into a file or signal Some of the suspect signals or files may have irrelevant data or noise encoded into them
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Urt1fw4
C EH
ilhiul lUtbM
Reformat
The format of the file is changed. This works because different file formats store data in different ways
The stego-object and the original cover-object are available, which are compared to identify hidden information This attack generates stego objects from a chosen message using specific steganography tools in order to identify the steganography algorithms The stego-object and steganography algorithm are identified
Known-cover
Known-message
Chosen-message
Disabling or Active
J I
Chosen-stego
Stego-only attack
~ The stego-only attack takes place when there is only the stego-medium, which carries out the attack. The only way that this attack can be avoided is by detecting and extracting the embedded message.
R eform at attack
----In this method the format of the file is changed. This works because different file formats store data in different ways
(1 >>
cover-medium. This would enable a comparison to be made between both the mediums so that the change in the format of the medium can be detected.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
jc
Known-Stego attack
In this attack, the steganography algorithm is known and both the original and stegoobject are available.
C hosen-stego attack
The chosen-stego attack takes place when the forensic investigator generates a stegomedium from the message by using a special tool. Searching for signatures that will enable the detection of other steganography mediums can carry out such an attack.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Text Files
For text files, the alterations are made to the character position for hiding the data. These alterations can be detected by looking for text patterns or disturbances, the language used, line height, and unusual number of blank spaces.
Im ag e Files
The information that is hidden in the image can be detected by determining changes in size, file format, last modified, last modified time stamp, and color palette of the file.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Statistical analysis methods can be used when scanning an image. Assuming that the least significant bit is more or less random is an incorrect assumption since applying a filter that shows the LSBs can produce a recognizable image. Therefore, it can be concluded that LSBs are not random. Rather, they consist of information about the entire image. W henever a secret message is inserted into an image, LSBs are no longer random. With encrypted data that has high entropy, the LSB of the cover will not contain the information about the original and is more or less random. By using statistical analysis on the LSB, the difference between random values and real values can be identified.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Urt1fw4
C EH
ilhiul lUtbM
Statistical analysis method can also be used for audio files since the LSB modifications are also used on audio
5 S
The inaudible frequencies can be scanned for information The odd distortions and patterns show the existence of the secret data
Video File
A d m in is tra to r Detection of the secret data in video files includes a com bination of methods used in image and audio files Special code signs and gestures can also be used for detecting secret data
Video File
---In video steganography, confidential information or any kind of files with any extension are hidden in a carrier video file either by using audio steganography or image steganography tools. Therefore, the detection of the secret data in video files includes a combination of methods used in image and audio files. Special code signs and gestures can also be used for detecting secret data.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
EH
Source: http://www.wetstonetech.com Gargoyle Investigator Forensic Pro is a tool that conducts quick searches on a given computer or machines for known contraband and malicious programs. It is possible to find remnants even though the program has been removed because the search is conducted for the individual files associated with a particular program. Its signature set contains over 20 categories, including botnets, Trojans, steganography, encryption, keyloggers, etc. and helps in detecting stego files created by using BlindSide, W eavW av, S-Tools, etc. It has the ability to perform a scan on a stand-alone computer or network resources for known malicious programs, the ability of scan within archive files, etc.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
yj/2lM3 U:U:18AM I j 4/29/2MO U:C4;18AM | j i/29/2000 H.C t;16AM | ] V29/2Q00 11:04:18 AM | |) 9/Uj2CC> 02:33:++AM |
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
StegAlyzerSS
h ttp://w w w .sarc-w v.com
Stego Suite
- h ttp ://w w w . wets tonetech. com
StegMark SDK
h ttp ://w w w . datamark. com. sg
StegAlyzerAS
h ttp ://w w w . sarc-wv. com
Steganography Studio
h ttp ://s tegs tudio. source forge, net
r v
! !
StegAlyzerRTS
h ttp ://w w w . sarc-wv. com
1 W S Z U M -L M i
Stegdetect
h ttp ://w w w . outguess.org
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
ffej
Hiding Files
Coveri ng Tracks
Executing Applications
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
They can cover the tracks to avoid th e ir detection They can install backdoors to gain access in future
t-
4 W hy C over T ra c k s?
The complete job of an attacker involves not only compromising the system successfully but also disabling logging, clearing log files, eliminating evidence, planting additional tools, and covering his or her tracks. The attacker must clear the evidence of having been there and done the damage." Erasing the intrusion logs, tracking files, and attack processes is very crucial for an attacker as the messages can alert the actual owner of the system to change the security settings to avoid attacks in the future. If this happens, then the attacker will be left with no chances for relogging into the system for launching the attack. Hence, an attacker needs to destroy the evidence of intrusion to maintain the access and evasion. If the attacker covers or deletes their tracks, then he or she can re-login to the system and install backdoors. Thus, the attacker can gain users' sensitive information such as user names and passwords of bank accounts, email IDs, etc. The attacker may not wish to delete an entire log to cover his or her tracks as it may require admin previleges. If the attacker is able to delete only the attack event logs, even then the attacker hides himself or herself from being detected. Q 0 The attacker can manipulate the log files with the help of: SECEVENT.EVT (security): failed logins, accessing files without privileges SYSEVENT.EVT (system): Driver failure, things not operating correctly APPEVENT.EVT (applications)
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Covering Tracks
Once intruders have successfully gained administrator access on a system, they will try to cover the tracks to avoid their detection
CEH
Hacker
Gained administrator
" <
Install backdoors
1* 1
Target User
When all the information of interest has been stripped off from the target, the intruder installs several backdoors so that he or she can gain easy access in the future
C overing T ra c k s
Erasing evidence is a requirement for any attacker who would like to remain obscure. This is one method to evade trace back. This starts with erasing the contaminated logins and possible error messages that may have been generated from the attack process. Next, attention is turned to effect any changes so that future logins are not allowed. By manipulating and tweaking the event logs, the system administrator can be convinced that the output of his or her system is correct, and that no intrusion or compromise has actually taken place. Since the first thing a system administrator does to monitor unusual activity is to check the system log files, it is common for intruders to use a utility to modify the system logs. In some cases, rootkits can disable and discard all existing logs. This happens if the intruders intend to use the system for a longer period of time as a launch base for future intrusions, if they remove only those portions of logs that can reveal their presence with the attack. It is imperative for attackers to make the system look like it did before they gained access and established backdoors for their use. Any files that have been modified need to be changed back to their original attributes. There are tools for covering one's tracks with regard to the NT operating system. Information listed, such as file size and date, is just attribute information contained within the file.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Protecting against an attacker who is trying to cover his or her tracks by changing file information can become difficult. However, it is possible to detect if an attacker has changed file information by calculating a cryptographic hash on the file. This type of hash is a calculation that is made against the entire file and then encrypted.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
In W indows 7
Click on the Start button, choose Control Panel > Appearance and Personalization -> Taskbar and Start Menu Click the Start Menu tab, and then, under Privacy, clear the Store and display a list of recently opened programs check box
Ac
P 9
f i f e I V 4 V
W ays to C le a r O n lin e T ra c k s
The Internet is the ultimate resource to search or to gather information related to any topic. Unfortunately, Internet resources are misused by attackers to track others' online activities, which allow them to launch an attack or theft. There are several ways to clear online tracks: Private browsing History in the address field Disable stored history Delete private data Clear cookies on exit Clear cache on exit Delete downloads Disable password manager Clear data in password manager Delete saved sessions
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Q Q Q Q
Delete user JavaScript Set up multiple users Remove Most Recently Used (M RU) Clear Toolbar data from the browsers
In Windows 7
0 Click the Start button, choose Control Panel > Appearance and Personalization >
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
C :\ U serssA d n if 1 is t r a t o r > a u d it p o l / s o t / c a t o j o r y : " s y c t o n " , " a :e n a b le f a i l u r e :e n ab le The comnand was s u c c e s s f u lly e x ecu ted . C :\ U s e rs \ A d n in is t r a t o r > a u d it p o l / g et /category: * S y s te n a u d it p o l ic y C a te g o ry / Su b c a te g o ry S o t t in g S e c u r i t y S y s t e n E x te n s io n IP s e c D1*iue 1 O th er S y s te n Ev en ts S e c u r i t y S t a t e Change ,ogon/Logoff Account Lockout IP s e c Main Mode Su c ce s s and S u ccess F a il Su c ce s s S u ccess S u ccess S u ccess No No No No No No No No No No No No No No No No No No No No No No No No end and and and and F a il F a il F a il F a il F a il
Intruders will disable auditing immediately after gaining administrator privileges At the end of their stay, the intruders will just turn on auditing again using auditpol.exe
Network P o l i c y S e r v e r U s e r / D o vic e C la in o 'b jo c t A ccess F i l e S y s te n R e g is t r y K e r n e l O b ject SAN C e r t i f i c a t i o n S o r v ic e s A p p lic a t io n G en erated H andle M a n ip u la tio n P i l e Sh are F i l t e r i n g P la tf o r m Pa c k e t Drop D e t a ile d F i l e Sh are Rem ovable Sto ra g e C e n t r a l P o l i c y S ta g in g P r i v i l e g e Use Non S e n s it iv e P r i v i l e g e Us O th e r P r i v i l e g e Use E v e n ts S e n s i t i v e P r i v i l e g e Use D e t a ile d T ra ck in g P r o c e s s C r e a tio n P r o c e s s T erm ina tion DPAP1 A c t i v i t y _______________
A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g A u d itin g
http://www.microsoftcom
Copyright by E& C m ci. All Rights Reserved. Reproduction is Strictly Prohibited.
This will reveal the current audit status of the system. He or she can choose to disable the auditing by:
C :\> auditpol \\<ip address of target> /disable
Module
05 Page 808
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
This will make changes in the various logs that might register his or her actions. He or she can choose to hide the registry keys changed later on. The moment the intruders gain administrative privileges, they disable auditing with the help of auditpol.exe. Once their work is done, after logout intruders again turn on the auditing by using same tool: audit.exe.
31 Administrator. Command Prompt . 1 Q 1 x I
C :\ U s e r n \ A d n i n i s t r a t o r > a 11d i t p o I set / c t e g o r y : " 8 y s t s n " # " a :e n a b l e f a i l u r e : e n a b l e rbe c o n n a n d w as s u c c e s s f u l l y e x e c u t e d . C :\ U 8 e r s > v A d m i n i s t r a t o r > a u d i t p o l / ,g e t Systen a u d it p o lic y C a t e g o r y /S u b c a t e g o r y S y stem S e c u r it y S y ste n E xten sio n System I n t e g r i t y 1P s e c D r i v e r O t h e r System Events S e c u r i t y S t a t e Change L o g o n /L o g o f f Logon L og o ff Account Lockout I P s e c h a in H o d e I P s e c Q u i c k Mode IP s e c E x t e n d e d Node S p e c i a l Logon O t h e r L o a o n /L o g o f f E v e n ts N etw ork P o l i c y S e r v e r U s e r / D e v ic e C la im s O b je c t A c c e ss r i l e System Reg i s t r v K ern el O b je c t SAN C e r t i f i c a t io n S e r v i c e s A p p lic a tio n G enerated H and le M a n ip u la tio n P ile Share F i l t e r i n g P l a t f o r m P a c k e t Drop 1 1 It e r in g P latfo r m C o n n e ctio n O th e r O b je c t A ccess Events D e t a ile d P ile Share R e m o v a b le S t o r a n e C e n tra l P o lic y S tag in g P r i v i l e g e Use Non S e n s i t i v e P r i v i l e g e U s e O t h e r P r i v i l e g e Use E ven ts S e n s i t i v e P r i v i l e g e Use [t o t a lle d T r a c k i n g Pro cess C re a t io n P ro cess T e rm in a tio n D P A P I A c t iv it v / 'c a t e g o r y : S e t t in g Success Success Success Success Success No No No No No No No No No No No No No No No No No No No No No No No No and and and and and Pai Pal Pai Pai Pai
A u d i t in g Aud it in g Aud i t i n g A u d it in g A u d it in g A u d it in g A u d it in g A u d i t in g A u d i t in g A u d it in g A u d it A u d it A u d it A u d it A u d it A u d it A u d it A u d it A u d it A u d it A u d it A u d it A u d it A u d it in g in g in g in g in g in g in g in g in g in g in g in g in g in g
No A u d i t in g No A u d i t in g No A u d i t in g No A u d i t in g No A u d i t in g No A u d i t in a
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
f 'M tfiO n n e Sm er
;M *3 1 Vs
JW rrt* C tfefr t*T*0rry ** * * * N E zkter -Wory J Wrr*< Esto* - LocMm t stow Ooamnts f*Sy*>-CatfyRcydftn
C*?
04
t^ n
ttfiim I*****,"*
O Xw
O 0p1 C o Ah
Cotfm
Windows Tasks
Copyright by ElrC lin ci. All Rights Reserved. Reproduction is Strictly Prohibited.
CCleaner is a system optimization, privacy, and cleaning tool. It allows you to remove unused files and cleans traces of Internet browsing details from the PC. It keeps your privacy online, and makes the system faster and more secure. In addition, it frees up hard disk space for further use. With this tool, you can erase your tracks very easily. It also cleans traces of your online activities such as your Internet history.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
ClEAMNtC0*U It (l.*MCS) C.27MB bytes rem oved Detail of M m dewed Internet Ca*e G oogle Chrom e0 Ces Internet r tv v Google Chrome es* C oofces G oogle C hrom e 12 G oogle Ovome Setao* U*B :N*s
OLt+WZ C O fU t (O M ie a ) *30 M Dto be eweved. (Agpro*er1 ate *cel Detail 0/ f*es to be defeted (Note. No Mm h*we beer M m * C
B 0 C B
CS * d? 5 $ 5 * ^
J (.ooqlr f hronir g Internet Catf V Internet rtstcrr
3 3
A c c o u t!
9A d v a n c e d
H O H
Start M enu Shortcuts D OeskloShortcuts 04j Fte/etch data ***- Odar Cache Tray hot/caucn5 Cache WMow Sc ,Vocation Cache
E comk
A p p lic a tio n T r a c k s
FIGURE 5.82: CCIeaner Screenshot
W in d o w s T a s k s
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
C EH
It allows you to clean out your tem porary Internet files and cookies
The olcwrc terns [at user lequert) have teen sriried in thtf section to alew jcu to penranenlM gnore them n scannrg. Any Item that it checked belo/< vvil fce zcarrv=d Ikv/mcA iin tx * v is ? ) h! tvi r jtvm/e; ecawint
P ;rtame cl 0 1er IvpodURLd> 1 lostcr Result* Window Wrdow'Run. "DialogMRU 7 [ Google Todbar History 7 [ | M icrosoft Olfee Recenl" ldde!(f 7 ! 'ota! Items Detected: 378 W Wndow* U0 1A 1 t MRU4 Microsoft Feoedt MRUs 17 oidPuftctMRU l!*rw//, 7 ( W Ccrcl ftoiontatcna MRU Iterw UnowWal Counl WinXP I oyniil 17 MS Vliual Studo 6 0 MRII Iterrvs 17 ?1
f7 M icro vo ltQ fficoM RU Ite m s W WindowStrea mM RU [7 W ind ow sFhj/Seaich M RUs f7 W in d o vvt "Recent ' _ ? J W Vorouj > 4 1 0Sin g leM RU Ite m : _?J (7 WindowN e t!\ 01kheirs |7 Q utt0P 1 0M RU IKnt W Injldl LocationM HU
r CuslcnHr0Ntfiliw*itrnP01.l llwus _?J
_?J
v Win<tow 'Recent' Folder Ifcm C O / Winctows 'Recent holder Hem 39 v Intorro Explao MRU Item Rooont Download Diroctcry / MS lirecJD Most Recent Applcatior!
_7J
http://www.brightfort.com
Copyright by EfrCoincl. All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
S3 Windows 'Recent' Folder Item 38 lxl Windows 'Recent' Folder Item 39 y Internet Explorer M RU Item Recent Download Directory MS Direct3D Most Recent Application y MS DirectDraw Most Recent Application y MS Directlnput Most Recent Application Name < / MS Directl nput Most Recent Application ID 0 Microsoft Management Console R ecent File List Filel 0 Microsoft Management Console R ecent File List - File2 [/] Microsoft Management Console R ecent File List - File3 y ] Microsoft Management Console R ecent File List File4 W in d o w s Explorer RecentDocs Stream M R U - MAIN S3 Windows Explorer RecentDocs Stream M R U -0
M a in M e n u
C le a n N o w
P r o g r a m S e tt in g s
Scan Options The following items (at user request) have been added in this section to allow you to permanently ignore them in scanning Any item that is checked below will be scanned
i/r> c/x?cA n rs/7 fo fr x tn x /* ) s i'& v x r w
wN ntor p0 Exp! orr .T.yP. 9 ? ..!W .f?.^ s' w Windows "Run..." Dialog MRU w Google Toolbar History w Microsoft Office "Recent" folder(s) w Windows UserAssist MRUs w Microsoft Regedit MRUs w WordPerfect MRU Items w Corel Presentations MRU Items w UnreadMail Count (WinXP Logon) w MS Visual Studio 6.0 MRU Items
Plugins
W Windows "Recent" folder(s) \ W Various Extra Single MRU Items \ w Windows Network Items w QuattroPro MRU Items
_?J
R r
w
Install Locations MRU Customize Notifications Past Items Windows OpenWith MRUs
1 [
Any items not on this list can be found on the scan results screen.
MRU-Blaster plug ins provide additional cleaning support tor other items on disk.
G o lo P lu gin s
S a v e S e ttin g s
C lose
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
EvidenceEraser
h ttp ://w w w . es/idenceeraser. com
H
-
WinTools.net Professional
h ttp ://w w w . wintools.net
BleachBit
http://bleachbit.sourceforge. net
AdvaHist Eraser
h ttp ://w w w . advacrypt. cjb. ne t
Clear My History
h ttp ://w w w . hide -my-ip. com
rp n l
Q Tracks Eraser Pro available at http://www.acesoft.net Q BleachBit available at http://bleachbit.sourceforge.net e 0 AbsoluteShield Internet Eraser Pro available at http://www.internet-track-eraser.com Clear My History available at http://www.hide-my-ip.com
Q EvidenceEraser available at http://www.evidenceeraser.com Q WinTools.net Professional available at http://www.wintools.net Q RealTime Cookie & Cache Cleaner (RtC3) available at http://www.kleinsoft.co.za AdvaHist Eraser available at http://www.advacrypt.cjb.net Q Free Internet W indow Washer available at http://www.eusing.com
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
As a pen tester, you should evaluate the security posture of the target network or system. To evaluate the security, you should try to break the security of your system by simulating various attacks on the system, just like an attacker would. There are certain steps that you need to follow to conduct a system penetration test. This section will teach you how to conduct a system hacking penetration test.
151
Hiding Files
Covering Tracks
Executing Applications
^ r U
Penetration Testing
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Password Cracking
START
Perform W ire Sniffing M idd le Attack
C EH
Perform Man-in-the-
A
Perform Rule-based Attack
Load the dictionary file into the cracking application that runs against user accounts Run a program that tries every combination of characters until the password is broken Run packet sniffer tools on the LAN to access and record the raw network traffic that may include passwords sent to remote systems Acquires access to the communication channels between victim and server to extract the information
a--- ^
Perform Dictionary Attack Perform Bru te forcing
KHi
Attack
|****|
>
P assw o rd C ra c k in g
In an attempt to hack a system, the attacker initially tries to crack the password of the system, if any. Therefore, as a pen tester, you should also try to crack the password of the system. To crack the password, follow these steps: S te p l: Identify password protected systems Identify the target system whose security needs to be evaluated. Once you identify the system, check whether you have access to the password, that means a stored password. If the password is not stored, then try to perform various password cracking attacks one after the other on the target system. Step 2: Perform a dictionary attack Perform a dictionary attack by loading the dictionary file into the cracking application that runs against user accounts. Run the cracking application and observe the results. If the application is allowing you to log in to the system, it means that the dictionary file contains the respective password. If you are not able to log in to the system, then try other password-cracking techniques.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
(Cont'd)
Use a Sniffer to capture packets and authentication tokens. After extracting relevant info, place back the tokens on the network to gain access Record every keystroke that an user types using keyloggers Secretly gather person or organization personal information using spyware With the help of a Trojan, get access to the stored passwords in the Trojaned com puter Inject a compromised hash into a local session and use the hash to validate to network resources Recover password-protected files using the unused processing power of machines across the network to decrypt password
X
Perform Password Guessing Perform Social Engineering
T
Perform Trojan/Spyware/ keyloggers
A
Perform Dum pster Diving
A
Perform Hash Injection Attack Perform PreCom puted Hashes
A
Perform Rainbow Attack Perform Distributed N etw o rk Attack
P assw o rd C ra c k in g (C ontd)
Step 9: Perform a replay attack
Try to intercept the data in the communication and retransmit it.
Ethical Hacking and Countermeasures Copyright by EC-COlMCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Privilege Escalation
C EH
Use privilege escalation tools such as Active@ Password Changer, Offline NT Password & Registry Editor, Windows Password Reset Kit, Windows Password Recovery Tool, ElcomSoft System Recovery, Trinity Rescue Kit, Windows Password Recovery Bootdisk, etc.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Executing Applications
START
Urti*W
CEH
itkM l lUikw
V Check if firewall software and anti-keylogging software are installed Check if the hardware systems are secured in a locked environment ;
Use keyloggers such as Spytech SpyAgent, All In One Keylogger, Powered Keylogger, Advanced Keylogger, etc. Use spywares such as SoftActivity TS Monitor, Spy Voice Recorder, WebCam Recorder, Mobile Spy, SPYPhone GOLD, etc.
I...... ..
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
(g) START-:
0
Perform steganalysis
t
Try to install the rootkit in the target system to maintain hidden access Perform Integrity Based Detection, Signature Based Detection, Cross View Based Detection, and Heuristic Detection techniques to detect rootkits Use anti-rootkits such as Stinger, UnHackMe, Virus Removal Tool, Rootkit Buster, etc. to detect rootkits
technique
t> Use NTFS Alternate Data Stream (ADS) to inject malicious code on a breached system and execute them without being detected by the user Use NTFS stream detectors such as StreamArmor, ADS spy, Streams, etc. to detect NTFS-ADS stream message within an ordinary message and extract it at the destination to maintain confidentiality of data Use steganography detection tools such as Gargoyle Investigator" Forensic Pro, Xstegsecret, Stego Suite, Stegdetect, etc. to perform steganalysis
A
P erform Heuristic D ete ction technique
....>
H id in g F ile s
An attacker installs rootkits to maintain hidden access to the system. You should follow pen testing steps for detecting hidden files on the target system.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Covering Tracks
START ^
v
Disable auditing V Tamper log files V
Close all remote connections to the victim machine Remove web activity tracks such as MRU, cookies, cache, temporary files and history
** Disable auditing using tool such as Auditpol Tamper log files such as event log files, server log files and proxy log files by log poisoning or log flooding Use track covering tools such as CCIeaner, MRU-Blaster, Wipe, Tracks Eraser Pro, Clear My History, etc.
C overing T ra c k s
The pen tester should whether he or she can cover the tracks that he or she has made during simulating the attack to conduct penetration testing. To check whether you can cover tracks of your activity, follow these steps: S te p l: Remove web activity tracks First, remove the web activity tracks such as such as MRU, cookies, cache, temporary files, and history. Step2: Disable auditing Try to disable auditing on your target system. You can do this by using tools such as Auditpol. Step3: Tamper with log files Try to tamper with log files such as event log files, server log files, and proxy log files with log poisoning or log flooding. Step4: Use track covering tools Use track covering tools such as CCIeaner, MRU-Blaster, Wipe, Tracks Eraser Pro, Clear My History, etc. Step5: Try to close all remote connections to the victim machine Step6: Try to close any opened ports
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
Module Summary
(itifwd
C EH
IthKJl lUck*
Attackers use a varietyof meansto penetrate systems Password guessing and cracking is one of the first steps Password sniffing is a preferred eavesdroppingtactic
Vulnerability scanningaidsthe attackerin identifyingwhich password cracking technique to use Key stroke logging and other spyware tools are used as they gain entry to systems to keep up the attacks Invariably, attackers destroy evidence of "having been there and donethe damage"
*
p v
M odule S u m m ary
Attackers use a variety of means to penetrate systems. Password guessing and cracking is one of the first steps. Password sniffing is a preferred eavesdropping tactic. Vulnerability scanning aids the technique to use. Keystroke logging and other spyware tools are used to gain entry to systems to keep up attacks. Invariably, attackers destroy evidence of "having been there and done the damage." Stealing files as well as hiding files are the means to sneak out sensitive information. attacker in identifying which password cracking
Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.