CEH Lesson 3 - Enumeration and System Hacking
CEH Lesson 3 - Enumeration and System Hacking
Lesson 3
Enumeration and System
Hacking
Lesson 4
Objectives
After reading this lesson you will be able to:
Understand enumeration
Become familiar with enumeration tools
Explain the architecture of Windows systems
Discuss Windows users and groups
Understand the steps involved in Windows hacking
Explain the Linux file structure and basic Linux
commands
Understand the steps involved in hacking Linux
systems
Enumeration
SMB:
– Enables remote access of shared directories and
files
– Makes it possible for user to create shares
InterProcess Communication (IPC):
– Offers a default share on Windows system – IPC$
• A hidden share.
• Enables anonymous connection using the net view and net
use command in Windows XP/2003.
• IPC$ can be used to enumerate user details, account
information, and weak passwords.
NetBIOS Enumeration Tools
Methods:
– Nontechnical password attacks:
• Dumpster diving
• Social engineering
• Shoulder surfing
– Technical password attacks:
• Password guessing
• Automated password guessing
• Password sniffing
• Keyloggers
– Exploit a vulnerability.
Password Guessing
LM authentication:
– Used by Windows 95/98/Me
– Based on DES
– Easy to crack
– Could still be used for backward compatibility
NTLM authentication:
– Used by Windows NT before service pack 3
– Based on DES and MD4
NTLM v2:
– Based on MD5 and MD5
Kerberos:
– Windows 2000 and later
Password Cracking
L0phtcrack:
– Can extract hashes from local or remote machines
– Can sniff passwords from local network if used with
an admin account
Pwdump:
– Command-line tool that can bypass SYSKEY
encryption
– Needs admin rights
Three basic types of password cracks:
– Dictionary attack
– Hybrid attack
– Brute force attack
Covering Tracks
Disable logging:
– Auditpol command-line tool
Clear the log file:
– Winzapper, Evidence Eliminator, and Elsave
Use rootkits:
– FU and Vanquish
File Hiding
– Locate hidden attribute.
– Use Alternative Data Streams (ADS).
– Hide in slack space.
Linux File Structure
Gaining access
– Remote attacks
• Exploit a process or program.
• Exploit a TCP or UDP listening service.
• Exploit vulnerabilities in a system providing routing or
security services.
• Exploit the user.
– Local attacks
Privilege escalation
– Usually a local attack is used.
– Objective is to gain full control over the application or system.
Hacking Linux cont.