⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ntsec.html

📁 黑客培训教程
💻 HTML
📖 第 1 页 / 共 5 页
字号:
<html>

<head>

<title>Networking and NT Security Issues</title>

<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">

</head>



<body bgcolor="#000000" text="#ffffff" link="#ffffff" vlink="#ffffff">

<div align="center"> 

  <table width="680" border="0" cellspacing="2" cellpadding="2" align="center">

    <tr> 

      <td width="693"> 

        <pre>

                        :::::::::   ::::::::  :::::::::  ::::::::::

                        :+:    :+: :+:    :+: :+:    :+: :+:

                        +:+    +:+ +:+        +:+    +:+ +:+

                        +#++:++#+  +#++:++#++ +#++:++#:  :#::+::#

                        +#+    +#+        +#+ +#+    +#+ +#+

                        #+#    #+# #+#    #+# #+#    #+# #+#

                        #########   ########  ###    ### ###



              	             <a href="http://blacksun.box.sk" target="_blank">http://blacksun.box.sk</a>

                           _____________________________

    ______________________I       <b>   Topic:</b>             I_____________________

   \                      I                             I                    /

    \     HTML by:        I     <b>Networking and NT</b>       I   Written by:     /

    >                     I      <b>Security Issues</b>        I                  <

   /      <a href="mailto:black_mesa@hacktik.org">Martin L.</a>       I_____________________________I   <i>&lt;log-file&gt;</i>      \

  /___________________________>                    <_________________________\</pre>

      </td>

    </tr>

  </table>

<p>&nbsp;</p></div>

<p><font color="#ff0000">====[ START ]=====</font></p>

<p><b>&lt;Cypher&gt;</b> ============== Networking and NT Security Issues =================<br>

  <b>&lt;Cypher&gt;</b> first things first, so i'll start with a little story about NetBIOS,

  oki?<br>

  <b>&lt;m0ded&gt;</b> k go<br>

  <b>&lt;Cypher&gt;</b> as probably most of u know NetBIOS (aka Network Input/Output

  System) was originally developed to be<br>

  <b>&lt;Cypher&gt;</b> an API (app programming interface)<br>

  <b>&lt;Cypher&gt;</b> for the client (software) to be able to use and access resources

  of the LAN<br>

  <b>&lt;Cypher&gt;</b> actually, NetBIOS is the interface for accessing networking services<br>

  <b>&lt;Cypher&gt;</b> its a software (layer) to connect a network system with the hardware<br>

  <b>&lt;Cypher&gt;</b> computers on a NetBIOS-compatible LAN talk to each other by establishing

  a session, a NetBIOS session, or by<br>

  <b>&lt;Cypher&gt;</b> datagrams or broadcasting methods<br>

  <b>&lt;Cypher&gt;</b> questions so far?<br>

  <b>&lt;Sub&gt;</b> no<br>

  <b>&lt;QX-Mat&gt;</b> .<br>

  <b>&lt;m0ded&gt;</b> go on<br>

  <b>&lt;Freezer&gt;</b> nope<br>

  <b>&lt;Cypher&gt;</b> ok<br>

  <b>&lt;Cypher&gt;</b> there is a thing in NT called the IPC<br>

  <font color="#ff0000">*** DR_CooL has joined #bsrf</font><br>

  <b>&lt;Cypher&gt;</b> which is an &quot;InterProcess Communication&quot;<br>

  <b>&lt;Cypher&gt;</b> used for Server-to-Server communications<br>

  <b>&lt;Cypher&gt;</b> this is actually a default NT share<br>

  <font color="#ff0000">*** TTT has joined #bsrf</font><br>

  <b>&lt;Cypher&gt;</b> hey DR_CooL, TTT<br>

  <b>&lt;m0ded&gt;</b> a hidden NT share?<br>

  <b>&lt;Olaf&gt;</b> Hi TTT<br>

  <b>&lt;TTT&gt;</b> Hi, cypher!<br>

  <b>&lt;Cypher&gt;</b> m0ded, yes kinda<br>

  <b>&lt;TTT&gt;</b> You already started?<br>

  <font color="#ff0000">*** elad sets mode: +m</font><br>

  <font color="#ff0000">*** elad sets mode: +v Cypher</font><br>

  <b>&lt;elad&gt;</b> now lecture.<br>

  <b>&lt;Cypher&gt;</b> :)<br>

  <font color="#ff0000">*** elad sets mode: +o Cypher</font><br>

  <font color="#ff0000">*** ChanServ sets mode: -o Cypher</font><br>

  <b>&lt;Cypher&gt;</b> so<br>

  <b>&lt;Cypher&gt;</b> anyhow, the IPC is a hidden NT share, as m0ded sayed<br>

  <font color="#ff0000">*** elad sets mode: -m</font><br>

  <b>&lt;DR_CooL&gt;</b> that's better<br>

  <b>&lt;Cypher&gt;</b> a malicious ;-) user could connect to it<br>

  <b>&lt;Cypher&gt;</b> and gather information about the system<br>

  <b>&lt;Cypher&gt;</b> this is done by an NT command (yep, microsoft gave us that)<br>

  <b>&lt;Cypher&gt;</b> the NBTSTAT command<br>

  <b>&lt;Cypher&gt;</b> it establishes a NULL Session (no credentials required) to the

  targer system<br>

  <b>&lt;Cypher&gt;</b> target<br>

  <b>&lt;Cypher&gt;</b> its syntax is simple (from the prompt of course):<br>

  <b>&lt;Cypher&gt;</b> nbtstat -a 123.123.123.123<br>

  <b>&lt;Cypher&gt;</b> nbtstat -a &lt;IP&gt;<br>

  <font color="#ff0000">*** _sniper_on_moon- has joined #bsrf</font><br>

  <b>&lt;Cypher&gt;</b> by using this command u'll get the ....wait... let me quote this<br>

  <b>&lt;DR_CooL&gt;</b> and what indormation does it give ?<br>

  <b>&lt;Cypher&gt;</b> &quot;NetBIOS Remote Machine Name Table&quot;<br>

  <b>&lt;Cypher&gt;</b> this is actually the first step to gathering information the

  remote machine<br>

  <b>&lt;Cypher&gt;</b> and, btw, i didn't mention this before, but info gathering is

  about 60% (if not more) of the job<br>

  <font color="#ff0000">*** FrEEkY[cooking] is now known as FrEEkY</font><br>

  <b>&lt;Cypher&gt;</b> now lets try to establish that NUll session<br>

  <b>&lt;Cypher&gt;</b> there is another &quot;kewl&quot; command<br>

  <b>&lt;Cypher&gt;</b> the &quot;net&quot; command<br>

  <b>&lt;Sub&gt;</b> net use<br>

  <b>&lt;m0ded&gt;</b> use is a parameter<br>

  <b>&lt;Cypher&gt;</b> yep<br>

  <b>&lt;Cypher&gt;</b> it has many useful features (read the manual) but we'll mostly

  focus on &quot;net use&quot; and &quot;net view&quot;<br>

  <b>&lt;Cypher&gt;</b> net view lets us see the<br>

  <b>&lt;Cypher&gt;</b> shares on the machine (depending on its security policy of course)<br>

  <b>&lt;Cypher&gt;</b> net view \\IP_ADDRESS might get us ether the shares or the &quot;Access

  is denied&quot; msg<br>

  <b>&lt;Cypher&gt;</b> if it gives us the shares, then...well... this part is done<br>

  <b>&lt;Cypher&gt;</b> but if not<br>

  <b>&lt;Cypher&gt;</b> we will try the next thing:<br>

  <b>&lt;Cypher&gt;</b> net use \\IP_ADDRESS\ipc$ &quot;&quot; /user:&quot;&quot;<br>

  <b>&lt;Cypher&gt;</b> which means, connect to the IPC share (ipc$ - the default share)

  with a &quot;&quot; (blank) password<br>

  <b>&lt;Cypher&gt;</b> and with the &quot;&quot; (blank) user name<br>

  <b>&lt;TTT&gt;</b> and now?<br>

  <b>&lt;Cypher&gt;</b> as i said, the IPC needs no credentials<br>

  <b>&lt;Cypher&gt;</b> if we get the &quot;The Command completed successfully&quot;

  msg<br>

  <b>&lt;Cypher&gt;</b> then we have established the null session and now we can get

  that list of shares<br>

  <b>&lt;Cypher&gt;</b> meaning issue the &quot;net view \\IP&quot; command<br>

  <b>&lt;Cypher&gt;</b> so, actually the list of shares is usually unavailable until

  u establish the null session<br>

  <b>&lt;Cypher&gt;</b> questions?<br>

  <b>&lt;m0ded&gt;</b> yeah<br>

  <b>&lt;Sub&gt;</b> can you establish a null session any other way?<br>

  <b>&lt;m0ded&gt;</b> what u mean a null session?<br>

  <font color="#ff0000">*** TTT has joined #bsrf</font><br>

  <b>&lt;_zach-&gt</b>; where no credntilas are required<br>

  <b>&lt;_zach-&gt</b>; from you<br>

  <font color="#ff0000">*** Esamurai has joined #bsrf</font><br>

  <b>&lt;Cypher&gt;</b> Sub, the null session can be established by the built-in &quot;net

  use&quot; command or any other &quot;null session establishment&quot; tools

  (there are plenty)<br>

  <b>&lt;_zach-&gt</b>; to conenct<br>

  <b>&lt;FrEEkY&gt;</b> I have an addition<br>

  <b>&lt;_zach-&gt</b>; to the target<br>

  <b>&lt;Cypher&gt;</b> m0ded, null session<br>

  <b>&lt;Cypher&gt;</b> right zach<br>

  <b>&lt;_zach-&gt</b>; :)<br>

  <b>&lt;Cypher&gt;</b> m0ded answer = zach<br>

  <b>&lt;FrEEkY&gt;</b> if you turn your filesharing on and then after your in you turn

  it off, it can get the neccesary files on your computer to mask you as a part

  of the network<br>

  <b>&lt;Cypher&gt;</b> its a connection throught the IPC share<br>

  <b>&lt;_zach-&gt</b>; w00t<br>

  <b>&lt;Sub&gt;</b> so, what packets would you have to send to establish a null session,

  if you were coding an exploit for instance?<br>

  <b>&lt;Cypher&gt;</b> Sub, i haven't actually tryed &quot;raw&quot; connection to ipc

  yet...<br>

  <b>&lt;tcg&gt;</b> whats an ipc share<br>

  <b>&lt;Cypher&gt;</b> tcg, its a default (hidden) NT share (one of them, at least)<br>

  <b>&lt;QX-Mat&gt;</b> Can we carry on?<br>

  <b>&lt;Cypher&gt;</b> QX-Mat, of course<br>

  <font color="#ff0000">*** DR_CooL has quit IRC (Ping timeout)</font><br>

  <font color="#ff0000">*** _sniper_on_moon- is now known as sniper</font><br>

  <b>&lt;TTT&gt;</b> Has anyone a log from beginning of the lesson?<br>

  <b>&lt;m0ded&gt;</b> yes me<br>

  <b>&lt;Sub&gt;</b> me<br>

  <b>&lt;FrEEkY&gt;</b> I do<br>

  <b>&lt;Cypher&gt;</b> lets now move to a bit different direction - securing NT<br>

  <b>&lt;tcg&gt;</b> why nt got that?<br>

  <b>&lt;TTT&gt;</b> okay<br>

  <b>&lt;Cypher&gt;</b> tcg, inner communications</font><br>

  <font color="#ff0000">*** Samcon has joined #bsrf</font><br>

  <b>&lt;Cypher&gt;</b> now, the basic steps/checklist<br>

  <b>&lt;tcg&gt;</b> what is it good for?<br>

  <b>&lt;Cypher&gt;</b> to &quot;start&quot; securing an NT machine<br>

  <b>&lt;FrEEkY&gt;</b> securing an NT machine, orignall idea<br>

  <b>&lt;QX-Mat&gt;</b> )<br>

  <b>&lt;Cypher&gt;</b> first thing, and the obvious one<br>

  <b>&lt;Cypher&gt;</b> is Passwords<br>

  <b>&lt;Cypher&gt;</b> (duh) ;)<br>

  <b>&lt;Cypher&gt;</b> unfortunatly, many admins neglect password policies, for some

  reason<br>

  <b>&lt;dr3x&gt;</b> min_password_length = 12 :)<br>

  <b>&lt;tcg&gt;</b> but I can't telnet an nt box<br>

  <b>&lt;tcg&gt;</b> so who cares<br>

  <b>&lt;Cypher&gt;</b> putting passwords, such as &quot;john&quot; on a &quot;john&quot;

  user account<br>

  <b>&lt;Sub&gt;</b> tcg: there is a telnetd for NT<br>

  <b>&lt;Cypher&gt;</b> dr3x, good, but can the &quot;dumb&quot; user remember it?<br>

  <b>&lt;tcg&gt;</b> password guessing is out of fashion<br>

  <b>&lt;elad&gt;</b> tcg; you can install some ssh server and ssh to it, yeah :)<br>

  <b>&lt;dr3x&gt;</b> nope<br>

  <b>&lt;elad&gt;</b> why would a sane person want to use telnet? :)<br>

  <b>&lt;tcg&gt;</b> haha<br>

  <font color="#ff0000">*** sniper has quit IRC (Ping timeout)</font><br>

  <b>&lt;TTT&gt;</b> you can do interesting things with telnet, which you can't do with

  ssh<br>

  <b>&lt;FrEEkY&gt;</b> tcg: you can get into NBTSTAT in a whole other way, to get info

  on the computer so you can access it better with telnet<br>

  <b>&lt;elad&gt;</b> hahahha!<br>

  <b>&lt;elad&gt;</b> ok lets let cypher go on with his lecture<br>

  <b>&lt;Olaf&gt;</b> whith telnet we can do everything!!!<br>

  <b>&lt;Cypher&gt;</b> good idea, elad...<br>

  <b>&lt;QX-Mat&gt;</b> Olaf: true!<br>

  <b>&lt;Cypher&gt;</b> shall we continue??<br>

  <b>&lt;Sub&gt;</b> yes<br>

  <b>&lt;m0ded&gt;</b> yeah<br>

  <b>&lt;Slayer[reading_eating]&gt;</b> yes<br>

  <b>&lt;m0ded&gt;</b> <b>&lt;Cypher&gt;</b> putting passwords, such as &quot;john&quot; on

  a &quot;john&quot; user account<br>

  <b>&lt;tcg&gt;</b> say<br>

  <b>&lt;Cypher&gt;</b> so obviously, the admin has to put proper password policies,

  which include (mostly):<br>

  <b>&lt;tcg&gt;</b> a password that is like the username isn't good right?<br>

  <b>&lt;Cypher&gt;</b> tcg, yeah :)<br>

  <b>&lt;Cypher&gt;</b> password age:<br>

  <b>&lt;tcg&gt;</b> ??<br>

  <b>&lt;Cypher&gt;</b> the amount of time the password remains valid<br>

  <b>&lt;Cypher&gt;</b> this is sometimes not set, or disabled on some accounts<br>

  <b>&lt;FrEEkY&gt;</b> I've never thought of microsoft passwords as being a problem

  <br>

  <b>&lt;Cypher&gt;</b> causing one password to last &quot;a lifetime&quot;<br>

  <b>&lt;Cypher&gt;</b> so its better to put a password age as something about 30 days<br>

  <b>&lt;tcg&gt;</b> all these stuff are right both for nt4 and win2k?<br>

  <b>&lt;Cypher&gt;</b> tcg, yes<br>

  <b>&lt;tcg&gt;</b> my password is complex. its my username backwards. :)<br>

  <b>&lt;tcg&gt;</b> and nt3.51?<br>

  <b>&lt;Olaf&gt;</b> I'm using a secure unix which acepts guest!!!!<br>

  <b>&lt;_zach-&gt</b>; ./dns Olaf<br>

  <b>&lt;_zach-&gt</b>; lol<br>

  <b>&lt;m0ded&gt;</b> heh<br>

  <b>&lt;elad&gt;</b> like<br>

  <b>&lt;Slayer[reading_eating]&gt;</b> :)<br>

  <b>&lt;elad&gt;</b> shut the fuck up and let him get to the questions part<br>

  <b>&lt;elad&gt;</b> or i will rape your mothers<br>

  <b>&lt;tcg&gt;</b> hahaha<br>

  <b>&lt;elad&gt;</b> to death<br>

  <b>&lt;Cypher&gt;</b> besides the password also has to be good, meaning a combination

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -