Chapter 1: Session Hijacking
- Case Example
- Introduction to Session Hijacking
- What is Session Hijacking
- Understanding Session Hijacking
- Spoofing vs. Hijacking
- Packet Analysis of a Local Session Hijack
- Steps in Session Hijacking
- Session Hijacking Process
- Session Hijack Attack Scenario
- Types of Session Hijacking
- Session Hijacking Levels
- Spoofing Versus Hijacking
- Network Level Hijacking
o The Three-Way Handshake
o TCP Concepts 3-Way Handshake
o Sequence Numbers
o Sequence Number Prediction
o TCP/IP Hijacking
o IP Spoofing: Source Routed Packets
o RST Hijacking
o RST Hijacking Tool: hijack_rst.sh
o # ./hijack_rst.sh
o Blind Hijacking
o Man-in-the-Middle Attack using Packet Sniffer
o UDP Hijacking
- Application Level Hijacking
- Session Hijacking Tools
o IP Watcher
o Remote TCP Session Reset Utility
o Paros HTTP Session Hijacking Tool
o Dnshijacker Tool
o Hjksuite Tool
o Protecting against Session Hijacking
o Methods to Prevent Session Hijacking (To be Followed by Web Developers)
o Methods to Prevent Session Hijacking: (To be Followed by Web Users)
o Defending against Session Hijack Attacks
o Session Hijacking Remediation
o IPSec
· Modes of IPSec
· IPSec Architecture
· Components of IPSec
· IPSec Authentication and Confidentiality
· IPSec Protocol:
§ AH
§ ESP
· IPSec Implementation
Chapter 2: Hacking Web Servers
- Case Example
- Introduction to Hacking Web Servers
- Sources of Security Vulnerabilities in Web Servers
- Web Attack Impacts
- Web Site Defacement
- How are Web Servers Defaced
- Attacks Against IIS
o IIS 7 Components
o Unicode Directory Traversal Vulnerability
o IIS Directory Traversal (Unicode) Attack
- Hacking Tool: IISxploit.exe
- Msw3prt IPP Vulnerability
- RPC DCOM Vulnerability
- ASP Trojan (cmd.asp)
- IIS Logs
- Tools
o Network Tool: Log Analyzer
o Hacking Tool: CleanIISLog
o IIS Security Tool: Server Mask
o ServerMask ip100
o CacheRight
o HttpZip
o LinkDeny
o ServerDefender AI
o ZipEnable
o W3compiler
o Yersinia
o Metasploit Framework
o KARMA
o Karmetasploit
· Prerequisites for Karmetasploit
· Running Karmetasploit
o Immunity CANVAS Professional
o Core Impact
o MPack
o Neosploit
- Patch Management
- Vulnerability Scanners
Chapter 3: Web Application Vulnerabilities
§ Introduction to Web Application Vulnerabilities
§ Web Applications
§ Web Application Architecture Components
§ Web Application Vulnerability Characteristics
§ Top Web Application Vulnerabilities
§ Common Web-Based Applications Attacks
§ Unvalidated Input
§ Broken Access Control
o Broken Account and Session Management
§ Web Application Hacking
§ Anatomy of an Attack
§ Web Application Threats
§ Cross-Site Scripting/XSS Flaws
o An Example of XSS
o Countermeasures
§ SQL Injection
§ Command Injection Flaws
o Countermeasures
§ Cookie/Session Poisoning
o Countermeasures
§ Parameter/Form Tampering
§ Hidden Field
§ Buffer Overflow
o Countermeasures
§ Directory Traversal/Forceful Browsing
o Countermeasures
§ Cryptographic Interception
§ Cookie Snooping
§ Authentication Hijacking
o Countermeasures
§ Log Tampering
§ Error Message Interception
§ Attack Obfuscation
§ Platform Exploits
§ DMZ Protocol Attacks
§ DMZ
o Countermeasures
§ Security Management Exploits
§ Web Services Attacks
§ Zero-Day Attacks
§ Network Access Attacks
§ TCP Fragmentation
§ DNS Poisoning
§ Web Application Hacking Tools
o Wget
· GUI for Wget
o WebSleuth
o BlackWidow
o SiteScope
o WSDigger :Web Services Testing Tool
o CookieDigger
o SSLDigger
o WindowBomb
· WindowBomb: Report
o Burp:
· Positioning Payloads
· Configuring Payloads and Content Enumeration
· Password Guessing
o Burp Proxy:
· Intercepting HTTP/S Traffic
· Hex-editing of Intercepted Traffic
· Browser Access to Request History
o Burpsuite cURL
Chapter 4: Web-Based Password-Cracking Techniques
§ Introduction to Web-Based Password-Cracking Techniques
§ Authentication
o Authentication – Definition
o Authentication Mechanisms
· HTTP Authentication
§ Basic Authentication
§ Digest Authentication
o Integrated Windows (NTLM) Authentication
o Negotiate Authentication
o Certificate-based Authentication
o Forms-Based Authentication
o RSA SecurID Token
o Biometrics Authentication
· Types of Biometrics Authentication
§ Fingerprint-Based Identification
§ Hand Geometry-Based Identification
§ Retina Scanning
§ Afghan Woman Recognized After 17 Years
§ Face Recognition
§ Face Code: WebCam Based Biometrics Authentication System
§ Password Cracking
§ Password Cracking Tools
o L0phtcrack (LC4)
o John the Ripper
o Brutus
o Obiwan
o Authforce
o Hydra
o Cain & Abel
o RAR
o Gammaprog
o WebCracker
o Munga Bunga
o PassList
o SnadBoy
o MessenPass
o Wireless WEP Key Password Spy
o RockXP
o Password Spectator Pro
o WWWhack
o SamInside
o Lm2ntcrack
o Windows Password Cracker
o MDB Password Cracker
o Password Recovery Bundle 2009
o Advanced FTP Password Recovery
o Kernel SQL Password Recovery
o AirGrab Password PRO
o Visual Zip Password Recovery Processor
o Email Password Hacking Software
o Passwordstate
Chapter 5: Hacking Web Browsers
- Introduction
- How Web Browsers Work
§ Hacking Firefox
o Firefox Proof of Concept Information Leak Vulnerability
o Firefox Spoofing Vulnerability
o Password Vulnerability
o Firefox Command Line URI Handling Vulnerability
o Firefox Code Execution Vulnerability
o Concerns With Saving Form or Login Data
o Cleaning Up Browsing History
o Cookies
o Internet History Viewer: Cookie Viewer
· Firefox Security
o Blocking Cookies Options
o Tools For Cleaning Unwanted Cookies
o Tool: CookieCuller
o Getting Started
o Main Setting
o Privacy Settings
o Security Settings
o Content Settings
o Clear Private Data
o Mozilla Firefox Security Features
- Hacking Internet Explorer
o Redirection Information Disclosure Vulnerability
o Window Injection Vulnerability
o Internet Explorer Vulnerabilities
§ Internet Explorer Security
o Getting Started
o Security Zones
o Custom Level
o Trusted Sites Zone
o Privacy
o Overwrite Automatic Cookie Handling
o Per Site Privacy Actions
o Disable Third-party Browser Extensions
o Specify Default Applications
o Internet Explorer Security Features
o JavaScript Invalid Pointer Vulnerability
o BitTorrent Header Parsing Vulnerability
o Torrent File Handling Buffer Overflow Vulnerability
o URL Handling Code Execution Vulnerability
o Opera Stored Cross Site Scripting (XSS) Vulnerability
o Opera Security and Privacy Features
- Hacking Safari
- Securing Safari
Chapter 6: SQL Injection
§ Case Example
§ Introduction to SQL Injection
§ SQL Injection Techniques
o SQL Manipulation
o Code Injection
o Function Call Injection
o Buffer Overflows
o Exploiting Web Applications
o What Attackers Look For
o OLE DB Errors
o Input Validation Attack
o SQL Injection Techniques
§ How to Test for an SQL Injection Vulnerability
§ How It Works
- SQL Injection in Different Databases
o SQL Injection in Oracle
o SQL Injection in MySql Database
o Attacks Against Microsoft SQL Server
§ Tools for Automated SQL Injection
§ Blind SQL Injection
§ SQL Injection Countermeasures
§ Preventing SQL Injection Attacks
- SQL Injection Defense and Detection Tools
o SQL Block
o Acunetix Web Vulnerability Scanner
Chapter 7: Hacking Database Servers
§ Introduction to Hacking Database Servers
- Hacking Oracle Database Server
o Attacking Oracle
o Security Issues in Oracle
o Types of Database Attacks
o How to Break into an Oracle Database and Gain DBA Privileges
§ Hacking an SQL Server
o How an SQL Server Is Hacked
§ Security Tools
§ Security Checklists