- check out the stylin' NEW Collusion haxor gear at Jinx Hackwear!!! -
- sign up on the Collusion Syndicate's infotainment discussion lists!!! -

Volume 18
Dec 2000


 HOME

 TechKnow
 Media Hack
 Parallax
 Reviews
 Fiction
 Humor
 Events
 Offsite

 Mission
 Responses
 Discussion
 #Collusion
 NEW!

 Submit a Story
 Collusioneers
 © & TM Info
 Contact Us


SETI@Home

Join the
Collusion
SETI Team!




Tools of the Trade (Part II)
 by Characterdisorder & Oubug

Tools of the Trade (Part II)

Introduction

What are your tools of the trade? This article focuses on some tools that can help you analyze a targeted system on the Internet, Intranet, Extranet, or through remote access. My first article Tools of the Trade (Part I) was a very general article stating the importance of the command shell, an editor and a programming language, some of the basic tools you need to understand in order to progress to the "next step". For example, if you understand the command shell and a basic programming language, say Perl, then you could easily automated many painstaking processes involved in analysis of a system. The tools that you use depend upon the targeted system (listen to what this is saying!). Assume for the sake of this article, that the system includes everything (network, firewall, OS, etc) because every piece of the puzzle is very important.

Let’s get started to add some fun and interesting tools to your toolbox, not to mention providing you with a systematic approach to analyzing target systems. Good luck!

Case da Joint

Casing da joint is the process of gathering as much information about your target as you can in order to make educated decisions in your attack plan. I mean analysis of the target. It allows you to know the lay and feel of the land, and in some cases will allow you to know your target better then the administrators do of the target. You want to learn everything you can about your target, right? What tools can you use to clearly case da joint? The following tools can be used:

Tool

 

Usenet

http://www.deja.com

EDGAR

http://www.sec.gov/edgarhp.htm

Search engines

Any search engine on the World Wide Web.

Whois

http://www.networksolutions.com/

http://www.arin.net

http://whois.ripe.net

http://whois.apnic.net

http://whois.nic.mil

http://whois.nic.gov

Nslookup

This diagnostic tool displays information from Domain Name System (DNS) name servers.

Traceroute (UNIX)

This diagnostic utility determines the path a packet takes between two hosts. This information allows someone to determine network topology and routers on the network.

Tracert (NT)

This diagnostic utility determines the route taken to a destination by sending Internet Control Message Protocol (ICMP) echo packets with varying Time-To-Live (TTL) values to the destination.

Usenet is a good starting point because people are always posting questions and in these questions they are giving away free information that makes their systems vulnerable. "Hey I just installed this brand name firewall software using the default settings and my question is…" joeh@Kr*ft.com. The EDGAR database is another great place to start. The idea here is when a company buys out another company they work to get the buyout company on there corporate network thus there could be lack of security leaving a couple of doors and windows open in the process. Whois is another starting-point in figuring out a range of IP addresses and network blocks associated with your target. Another word to keep in your mind is stealth. You really don’t want to give away you intentions about what you are going to do, right? If you don’t get my point then you need to read the book the Art of War.

Scanning for Life

Scanning is really simple because you simply want to perform ping sweeps on a range of IP addresses and network blocks to determine what systems are alive. The following tools can be used:

Tool

 

Ping

This diagnostic command verifies connections to one or more remote hosts.

Fping

http://www.stanford.edu/~schemers/docs/fping/fping.html

Hping

http://www.eaglenet.org/antirez/

PingER

http://www-iepm.slac.stanford.edu/pinger/tools/tools.html

Icmpquery

http://www.securiteam.com/tools/ICMPQuery__remote_host-type_detection.html

WS_Ping ProPack

http://www.ipswitch.com

Nmap

http://www.insecure.org/nmap/

Netcat

http://www.l0pht.com/~weld/netcat/

PortPro

http://www9.50megs.com/commited/TOOLz.html

Portscan

http://www.ameth.org/~veilleux/portscan.html

Cheops

http://www.marko.net/cheops/

BindView

http://www.bindview.com

Chknull

http://www.nmrc.org/files/netware/chknull.zip

Strobe

http://www.hack-net.com/cgibin/download.cgi?strobe-1_03.tgz

NTInfoScan

http://www.infowar.co.uk/mnemmonix

Find Some Valid Users

Finding some valid users is the process of probing to identify valid user accounts or poorly protected resource sharing. The following tools can be used:

Tool

 

Net view

View a list of computer or network resources.

Windows NT Resource Kit

CD-ROM of Useful Stuff!

Dump ACL

http://www.somarsoft.com

User2sid

http://www.chem.msu.su/~rudnyi/NT/

http://www.hackersclub.com/km/library/hack99/wardoc.txt

Sid2user

http://www.chem.msu.su/~rudnyi/NT/

http://www.hackersclub.com/km/library/hack99/wardoc.txt

Null sessions

http://packetstorm.securify.com/NT/docs/null.sessions.html

Finger

This connectivity command displays information about a user on a specified system running the finger service.

Rpcbind

http://uw7doc.sco.com/SDK_netapi/xdrD.rpcbind.html

Showmount

Lists all the clients that have remotely mounted a filesystem from host.

Banner grabbing

Just grab a banner!

Rpcinfo

http://uw7doc.sco.com/SDK_netapi/rpcpD.rpcinfo.html

Legion

http://www.rhino9.com

Netcat

http://www.l0pht.com/~weld/netcat/

Gain Access!

Gaining access is just what it means, we are looking to gain access to a system and we don’t care at what level the access is at this time. Root access would be nice but sometimes you have to take what you can get. The following tools can be used:

Tool

 

Tcpdump

http://netgroup-serv.polito.it/windump/

http://www.tcpdump.org/

L0phtcrack readsmb

http://www.l0pht.com/l0phtcrack/

Tftp

http://www.weird-solutions.com/

Pwdump2

http://www.webspan.net/~tas/pwdump2/

Ttdb

http://www.tinaa.com/TTdb/

eEye

http://www.eeye.com/html/

IISHack

http://www.datafellows.com/v-descs/iishack.htm

Legion

http://www.rhino9.com

NwpCrack

http://www.nmrc.org/files/netware/nwpcrack.zip

SNMPsniff

http://www.anitcode.com/archives/network-sniffers/snmpsniff-1_0.tgz

Doing Some Crack

Below is a list of some tools available when you are doing some password cracking. What it always comes down to is brute force cracking.

L0phtcrack

http://www.l0pht.com/l0phtcrack/

NTFSDOS

http://www.sysinternals.com

Pwdump2

http://www.webspan.net/~tas/pwdump2

John the Ripper

http://www.false.com/security/john

Chknull

http://www.nmrc.org/files/netware/chknull.zip

NDSsnoop

ftp://ftp.iae.univ-poitier.fr/pc/netware/util/ndssnoop.exe

Crypto and Crypot2

http://www.nmrc.org/pandora/

IMP

http://www.wastelands.gen.nz/

brute_web.c

http://sunshine.sunshine.ro/fun/new/

pop.c

http://sunshine.sunshine.ro/fun/new

middlefinger

http://www.njh.com/latest/9709/9709-05.html

Give Yourself Some ROOT

In the previous step we were looking to gain access on the targeted system, now we need to escalate the privileges. The beauty at this step is once you have some access it’s a matter of time before you get root access and own the house. The following tools can be used:

Tool

 

L0phtcrack

http://www.l0pht.com/l0phtcrack/

Rdist

Program to maintain identical copies of files over multiple hosts.

Getadmin

http://cmp.phys.msu.su/ntclub/pub/code.htm

http://www.cmpsoft.com/getadmin.htm

Sechole

http://www.ntsecurity.net/security/sechole.htm

Stealing and Looking to Branch Out

Stealing is different then gaining access to a target because in this step you are looking to expand your horizons to other trusted systems. Stealing is such a bad word to use to describe what you are doing, but I guess the only word to use. The following tools can be used:

Tool

 

.rhost file

The .rhost file specifies which remote system or users can assess a local account using rsh or rcp.

LSA Secrets

http://www.insecure.org/sploits/NT.LSA.secrets.html

User Data

Found on the target system.

Configuration files

Found on the target system.

Registry

Found on the target system.

File Wrangler

http://www.tucows.com

PowerDesk

http://www.mijenix.com/powerdesk98.asp

Revelation

http://www.snadboy.com

Cover Your Ass

Once you have obtained total ownership of the target... hide! If they detect you then your fun and games could come to an end. The following tools can be used:

Tool

 

Event Logs

Found on target system.

Elsave

http://www.ibt.ku.dk/jesper/ELSave/default.htm

http://www.networkshareware.com/audit.html

Hidden directories

Found on target system.

Cygwin

http://www.cygnus.com

Wipe

ftp://ftp.technotronic.com/unix/log-tools/wipe-1.00.tgz

Zap

ftp://ftp.technotronic.com/unix/log-tools/zap.c

Back Doors

Back doors are important because they will ensure that privileged access can be easily regained again and again. This is what’s so scary when you realize your system has been compromised. The administrator starts thinking where are all the back doors, hidden treats, and surprises? It’s the administrator’s worst nightmare come true. The following tools can be used:

Tool

 

Cron

http://users.erols.com/graysteel/wincron.html

http://hegel.ittc.ukans.edu/topics/linux/man-pages/man8/cron.8.html

Startup folder

Found on target system.

Registry keys

Found on target system.

Netcat

http://www.l0pht.com/~weld/netcat/

Keystroke loggers

http://www.spaceports.com/~command/keylog.html

Fpnwclnt.dll.

Windows NT Security Issue – anyone who is logged on locally or who has write access to a write-permissible share that includes the SystemRoot%\System32 folder can place a "Trojan horse" version of Fpnwclnt.dll in the System32 folder.

Elitewrap

http://www.multimania.com/trojanbuster/elite.zip

Getadmin

http://www.ntsecurity.net/security/getadmin.htm

Hunt

http://www.genocide2600.com/tattoman.scanners/hunt-1.3.tgz

John the Ripper

http://www.false.com/security/john

Revelation by Snadboy

http://snadboy.com

Sechole

http://www.ntsecurity.net/security/sechole.htm

Unhide

http://www.webdon.com

Back Orifice

http://www.cultdeadcow.com

Conclusion

There are many more tools that can be found out there on the Internet that have not been mentioned in this article. I hope that this article provided you with a good strong start point, and a guide to a more systematic approach to analyzing a system. Now it’s up to you to start applying, learning and progressing in the use of your new tools. You should now categorize your toolbox, label each step in the process of analysis of a system, and identify the tools for each category.

A topic that I didn’t talk about much is remote access and the tools that can be used to compromise a target. Investment and banking institution have tons of clients that access their systems via remote access such as modems. You might want to check this out for clients are lazy people, given simple usernames and passwords. Even if the clients are accessing a Metaframe Server via an ICA Client over the Internet. Strong username and password protections... forget it! If users would be a little more creative then we’d have a little tougher time cracking and hacking around.

Things just don’t happen. Evolution does not exist, everything happens out of designed or failure of the design. Nothing is coincidental in our world. The best thing to do is start hacking and cracking around with the different tools. If you find more tools that could help please drop me an email.

Characterdisorder & Oubug

For a really good book check out "Hacking Exposed – Network Security Secrets & Solutions" by Stuart McClure & Joel Scambray & George Kurtz. It’s a really good book that goes beyond listing the tools that I have in this article!