You have physical access to the machine or virtual console if using a virtual server.
The system is running Ubuntu or a similar Linux distribution.
Step 1: Reboot the System and Access GRUB
Restart your machine and hold down the Shift key as it boots up. This will bring up the GRUB bootloader menu. If GRUB doesn’t appear, it may be hidden by default, so make sure to press the Shift key early during the boot sequence.
Step 2: Enter Recovery Mode
In the GRUB menu, use the arrow keys to highlight the Ubuntu boot option.
Press e to edit the selected boot entry.
Find the line that begins with linux and ends with ro quiet splash. Continue the line with:
rw init=/bin/bash
This modification will boot the system with read/write permissions and open a Bash shell.
Step 3: Boot into Root Shell
After editing the GRUB entry, press Ctrl + X or F10 to boot with the modified settings. This will boot into a root shell without asking for a password.
Step 4: Reset the Admin Password
At the root prompt, type the following command to reset the admin password (replace username with your actual admin username):
passwd username
You will be prompted to enter a new password. Type the new password and confirm it when asked.
Important Note: Ensure the password meets the system’s complexity requirements (e.g., minimum length, special characters).
Step 5: Remount the Filesystem as Read-Only
Before rebooting the system, remount the filesystem as read-only to avoid filesystem corruption. Run the following command:
mount -o remount,ro /
Step 6: Reboot the System
Now reboot the system by typing:
reboot
Your system will restart, and you should now be able to log in with the newly reset admin password. If you are unable to reboot, can just reset the system.
Enumeration is the process of extracting usernames, machine names, network resources, shares, and services from a system or network. In the enumeration phase, an attacker creates active connections with the system and sends directed queries to gain more information about the target.
Target Information
Network resources
Network shares
Routing tables
Audit and service settings
SNMP and FQDN
Machine Names
Users and Groups
Applications and banners
Techniques for Enumeration
Extract usernames using email IDs
Extract information using default passwords
Brute force active directory
Extract information using DNS Zone transfer
Extract user groups
Extract usernames from SNMP
Services and Ports to Enumerate
DNS Zone Transfer
TCP/UDP 53
MS RPC Endpoint Mapper
TCP/UDP 135
NetBIOS Name Service
UDP 137
NetBIOS Session Service
TCP 139
SMB over TCP
TCP 445
NFS
TCP 2049
LDAP
TCP/UDP 389
SNMP
UDP 161
SMTP
TCP 25
SNMP Trap
TCP/UDP 162
IKE (Internet Key Exchange)
UDP 500
SSH
TCP 22
SIP (Session Initiation Protocol)
TCP/UDP 5060
RPC port mapper service
TCP/UDP 111
FTP
TCP 21
Telnet
TCP 23
TFTP
UDP 69
Border Gateway Protocol
TCP 179
Printer
TCP 9100
NetBIOS Enumeration : UDP 137, UDP 138, TCP 139
Attackers use NetBIOS enumeration to obtain the following: – The list of computers that belong to a domain – The list of shares on the individual hosts in a network – Policies and passwords
nbstat Utility
nbtstat -a <ip address> nbtstat -c
Tools
NetBIOS Enumerator – NetBIOS names, usernames, Domain names and MAC address NMAP – nmap -sV -v –script nbstat.nse <target ip> – NetBIOS and MAC address Others : Global Network Inventory, Advance IP scanner, Hyena, Nsauditor Network Security Auditor
Enumerating User Account
Enumerating user accounts using the PsTools suite helps to control and manage remote systems from the command line
Enumerating Shared Resources
Net View list of all the shared resources of a remote host or workgroup – net view \\<computername> – net view /domain:<domain name>
SNMP consist of a manager and an agent. Agents are embedded on every network device, manager is installed on a separate computer
SNMP holds 2 password to access and configure SNMP agent from the management station – Read community string: Public – Read/Write community string: Private
Attackers use these default community strings to extract info
Can extract info of network resources, host, routers, devices and shares and network info like ARP tables, routing tables and traffic
Communication process between manager and agent
Management Information Base (MIB) info that can be retrieved
DHCP.MIB: Monitors network traffic between DHCP servers and remote hosts
HOSTMIB.MIB: Monitors and manages host resources
LNMIB2.MIB: Contains object types for workstation and server services
MIB_II.MIB: Manages TCP/IP-based Internet using a simple architecture and system
WINS.MIB: For the Windows Internet Name Service {WINS)
Manager X uses GetRequest to send a request for active session
Agent Y receives the msg and verifies if the community string is present on its MIB, checks request against list of access permissions and verifies the source IP
if agent does not find the community string or access permission Y MIB database, send authentication failure trap to trap destination Z
In Y the master agent component of the SNMP agent calls the appropriate extension agent to retrieve the requested session info from the MIB
In Y using info retrieved from extension agent, SNMP service forms a return message that contains the requested info and destination IP of SNMP manager X
Y sends the response to X
Tools
SnmpWalk – scan numerous SNMP nodes and identify a set of variables that are available for accessing the target network
NFS – Network File System – centralization of data
Attackers can gather into, exported directories, list of clients connected, IP address and shared data.
showmount -e <Target IP>
Tools
RPCScan – communicates with RPC services and checks misconfigurations of NFS shares – python3 rpc-scan.py <Target IP> –rpc
SuperEnum – script that does basic enumeration of any open port
SMTP and DNS Enumeration : TCP 25, TCP/UDP 53
SMTP 3 built in commands – VRFY – Validates users EXPN – Shows the actual delivery addresses of aliases and mailing lists RCPT TO- Defines the recipients of a message
SMTP servers respond differently to VRFY, EXPN, and RCPT TO commands for valid and invalid users, based on which we can determine valid users on the SMTP server
Attackers can directly interact with SMTP via the telnet prompt and collect a list of valid users on the SMTP server
Metasploit – contains SMTP enumeration module, allow attackers to connect to the target SMTP server and enumerate usernames using a predefined wordlists
NetScan Tools Pro – email generator tool tests the process of sending an email via the SMTP server
smtp-user-enum – OS-level user account on Solaris via SMTP service, inspect responsed to VRFY, EXPN and RCPT TO command
DNS If the target DNS server allows zone transfers, then attackers use this technique to obtain DNS server names, hostnames, machine names, usernames, IP addresses, aliases, etc. assigned within a target domain
Tools
Linux DNS zone transfer using dig command – dig ns <target domain> Windows DNS zone transfer using nslookup – nslookup, set querytype=soa, <target domain> DNSRecon – checks aall NS records of the target domain for zone transfers.
DNS Cache Snooping – DNS cache snooping is a DNS enumeration technique whereby an attacker queries the DNS server for a specific cached DNS record
None-recursive Method – Attackers send a non-recursive query by setting a recursion desired bit in the query. dig @ <IP adddress of DNS> <Target domain> A +norecurse, NOERROR means accepted but not cached
Recursive Method – dig @ <IP adddress of DNS> <Target domain> A +recurse, a high TTL values means that the record is not in the cache
DNSSEC Zone Walking – DNS enumeration technique where an attacker attempts to obtain internal records of the DNS server if the DNS zone is not properly configured
Tools
Tools perform zone enumeration on NSEC and NSEC3 record files
LDNS – enumerates the DNSSEC zone and obtain results on the DNS records
DNSRecon – enumerating DNS records such as A, AAAA, and CNAME.
IPsec provides data security by employing various components such as Encapsulating Security Payload (ESP), Authentication Header (AH), and Internet Key Exchange (IKE) to secure communication between VPN endpoints
Implemented technology for both gateway-to-gateway (LAN-to-LAN) and host-to-gateway (remote access) enterprise VPN solutions.
nmap -sU -p 500 <target IP>
ike-scan – discovering IKE hosts, fingerprint, transform enumeration, user enumeration, pre-shared key cracking
VoIP gateway/servers, IP-PBX systems, client software, (softphones)/VolP phones, User-agent IP addresses, and user extensions
VoIP attacks, such as Denial-of-Service (DoS), Session Hijacking, Caller ID spoofing, eavesdropping, Spamming over Internet Telephony (SPIT), and VoIP phishing (Vishing)
svmap – identifies SIP and PBX servers on a target network.
Metasploit – SIP enumerator to scan numeric/extensions of VoIP phones
RPC Enumeration : Port Mapper Service TCP/UDP 111
RPC allow clients and servers to communicate in distributed client/server programs
Identify any vulnerable services on this service ports
nmap -A <Target IP 10.10.1.0/24>
NetScanPro Tools – port 111
Unix/Linux User Enumeration
rusers – displays a list of users who are logged on to the remote machines or machines on LAN
rwho – displays a list ofusers who are logged on to the LAN
finger – displays info about system users – login name, real name, terminal name, idle time, login time..
After gaining access and escalating privileges on the target system, now attackers try to maintain their access for further exploitation of the target system or make the compromised system a launchpad from which to attack other systems in the network. Attackers remotely execute malicious applications such as keyloggers, spyware, and other malicious programs to maintain their access to the target system and steal critical information such as usernames and passwords. Attackers hide their malicious programs or files using rootkits, steganography, NTFS data streams, etc. to maintain their access to the target system.
Executing Applications
– Attackers use malicious applications to own the system – executes malicious programs remotely in the victim’s machine to gather information that leads to exploitation or loss of privacy, gain unauthorized access to system resources, crack the password, capture screenshot, install backdoor to maintain easy access.
Backdoors
Program designed to deny or disrupt the operation, gather information that leads to exploitation, loss of privacy, gain unauthorized access to system resources
Crackers
Programs designed for cracking code or passwords
Keyloggers
record each key stroke made on the computer keyboard
Spyware
Spy software may do screenshots, send to specified location defined by hacker.
Remote Code Execution Techniques – Backdoor
Exploitation for Client execution
– Unsecure coding practices in software can make it vulnerable to various attacks – targets vulnerabilities in software and exploits with an objective of arbitrary code execution to maintain access Web browser Base exploitation Office Application Based exploitation Third-Party Application Based exploitation
Service execution
– system services that run at the backend of the OS – Run binary files or commands that communicate with the windows system services such as Service Control Manager
Windows Management Instrumentation (WMI)
– features that provides platform for accessing Windows system resources locally and remotely – exploit WMI features to interact with the remote target system and use it to perform information gathering on systems resources, execute code for maintaining access
Window Remote Management (WinRM)
– Window based protocol to allow a user run an executable file, modify system services and registry on a remote system – use winrm to execute payload on remote system
Tools for executing Applications
Dameware Remote Support – Remote control and systems management tool that simplifies remote Windows administration. Other tools – Ninja – Pupy – PDQ Deploy – ManageEngine Desktop Central – PsExec
Keylogger
– Programs that monitor keystroke as the user types on a keyboard, logs onto a file, or transmits them to a remote location – gather confidential information – Physical keyloggers are placed between the keyboard hardware and the OS
Types of Keystroke Loggers
Hardware Keyloggers
PC/BIOS Embedded
BIOs-level firmware that is responsible for managing the keystrokes that are typed
keylogger Keyboard
Attached to the keyboard cable connector, capture keystrokes
External Keylogger
PS/2 / USB keylogger – no software/ OS dependency Acoustic/CAM keylogger – electromagnetic sound waves Bluetooth keylogger – access the target once, using bluetooth Wifi Keylogger – same as USB, Connect via Wifi, can remote access
– can record everything happening within the network
Kernel/Rootkit/Device Driver Keylogger
– Kernel level, difficult to detect, acts as driver driver
Hypervisor Based Keylogger
– works within a malware hypervisor operating on the OS
Form-Grabbing-Based Keylogger
– records web form data and submits over internet, bypassing https encryption. – recording web browsing on the “submit event” function
Javascript-Based Keylogger
– attackers inject malicious javascript tags on the webpage to listen to key events. – mitm, cross site scripting to inject script
Memory-Injection-Based Keylogger
– modify the memory tables associated with the web browser and system functions to log keystrokes.
Windows : Spyrix Keylogger, REFOG Personal Monitor, All in one keylogger, Elite Keylogger, StaffCorp Stardard, Spytector MacOS : Refog Mac keylogger, spyrix keylogger for Mac, Elite Keylogger for Mac, Aobo Mac OS X Keylogger, Perfect Keylogger for Mac, Kidlogger for MAC
Remote Keylogger Attack Using Metasploit – Attackers use Metasploit to launch persistent keylogging do ps -> getpid -> migrate pid of svchost.exe – Use Keyscan_start to initiate the keylogging process – Use Keyscan_dump to sniff the keystroke of the user on the machine – use keyscan_stop to stop sniffing
Automate by using lockout_keylogger exploit
Spyware
– stealthy records user interaction with the computer and the internet – like trojan horse, usually bundled as a hidden component off freeware programs – gather information about the victim and organization
Spyware Propagation – means install without user’s consent
Drive-by download
Piggybacked software installation
Masquerading as anti-spyware
Browser add ons
Web browser vulnerability exploits
Cookies
Spyware Tools: Spytech SpyAgent, Power Spy
Type of Spyware
Desktop Spyware
live recordings of remote desktop internet activities, software usage and timings activity logs, user’s keystrokes
Email Spyware
monitor, records, forwards all incoming and outgoing email.
Internet Spyware
monitor all webpages access by the users, able to block websites
Child Monitoring Spyware
track and monitor children activities on computer, online and offline. able to restrict web
Screen-capturing Spyware
monitor activities by taking snapshots, capture keystrokes, mouse activity, visited URL, etc.
USB Spyware
copies spyware from a USB device to a computer without any request or notification. monitors and captures everything
Audio Spyware
sound surveillance program
Video Spyware
video surveillance program
Print Spyware
monitor printer usage, number of pages printed, date/time, content, etc.
Telephone/Cellphone Spyware
monitor phone and activities
GPS Spyware
device or software using GPS to determine location of vehicle, person, attached/installed asset
Defense against Keyloggers
Use pop-up blockers and avoid opening Junk Mails
Use keystroke interference software that inserts randomized char into every keystroke
install antispyware/ anti virus programs
Scan the files before installing, use registry editor or process explorer to check for keystroke loggers
Install professional firewall software and anti-keylogging software
Use windows on-screen keyboard for password and confidential information
Recognize phishing emails and email them
Install host based IDS
Regularly update and patch system software
Use automatic form filling password manager or virtual keyboard
Do not click on this unsolicited/dubious emails
Frequently scan and monitors the changes in the system or network
Restrict physical access to sensitive computer systems
Check keyboard interface for no extra component are plugged into the keyboard cable connector
use encryption between keyboard and driver
use anti keylogger that detects the presence of hardware keylogger
use on-screen keyboard
check monitor cables to hardware keyloggers
setup video surveillance around the computer desk
disable USB ports or setup advanced BIOS authentication to enable BIOS
Avoid using any computer systems you do not have control over
use anti spyware
Browser security settings to medium or high
perform web surfing safely
Suspiuous emails and websites
avoid administrative mode
firewall to enhance security level
OS patching on the date
update firewall with outbound protection
avoid free music files, screensavers or emoticons from internet
Check task manager and MS configuration manager reports
Beware of pop-up windows or webpages, never click anywhere on these windows
update virus definition files
Read disclosures, license agreement and privacy statement before installing any applications
Anti-Spyware : SUPERAnti Spyware, Kaspersky Total Security, SecureAnywhere Internet Security, Adaware Antivirus, MacScan, Norton Antivirus
Rootkits
Rootkits are programs that hide their presence as well as attacker’s malicious activities, granting them full access to the server or host at that time, and in the future
Rootkits replace certain operating system calls and utilities with their own modified versions of those routines that, in turn, undermine the security of the target system causing malicious functions to be executed
Attacker places a rootkit by
objectives
– Scanning for vulnerable devices – wrapping in special package – installing on public machine through social engineering – zero day attack
– root the host system and gain remote backdoor – mask attacker tracks – gather sensitive data, network traffic from the system – store other malicious programs
Hypervisor level rootkit – act as hypervisor and modifies the boot sequence of the computer system to load the host operating system as a vm
Hardware/Firmware rootkit – Hides in hardware devices or platform firmware that are not inspected for code integrity
Kernel Level rootkit – adds malicious code or replaces the original OS kernel and device driver codes
Boot Loader Level rootkit – replaces the original boot loader with the one controlled by a remote attacker
Application Level/User mode rootkit – replaces regular application binaries with a fake trojan or modifies the behavior of the existing applications by injecting malicious code
Library Level rootkit – replaces the original system calls with fake ones to hide information about the attacker
How a Rootkit works
System hooking is the process of changing and replacing the original function pointer with a pointer provided by the rootkit in stealth mode. The incline function hooking is a technique in which a rootkit changes some of the bytes of a function inside the core system DLLs, replacing an instruction so that any process calls hit the rootkit first.
Direct kernel object manipulation (DKOM) rootkits can locate and manipulate the “system” process in the kernel memory structures and patch it. This can also hide processes and ports change privileges, and misguide the windows event viewer without any problem by manipulating the list of active processes of the OS.
Tools
purplefox – distributed via a fake malicious telegram installer, can both 32-bit and 64-bit windows version trojan can be used for hiding within the system and maintaining persistence.
MoonBounce – concealed within UEFI firmware in the SPI flash that is schedule to execute as a specific time. Inject malicious driver into the windows kernel during the boot process.
Dubbed Demodex Rootkit – can survive OS reinstallation. Conceal malware fingerprints such as file, registry keys and network traffic.
Others: Moriya, iLOBleed, Netfilter, Skidmap
Detecting Rootkits
Integrity-Based detection – compares snapshot of the file system, boot records or memory with a known trusted baseline
Signature-Based detection – compares the characteristics of all system processes and executable files with a database of known rootkit fingerprints
Heuristic/ Behavior-Based detection – Deviations in the systems normal activity indicates the presence of a rootkit
Runtime execution path profiling – compares runtime execution paths of all the system processes before and after rootkit infection
Cross View-Based Detection -enumerates key elements in the computer system such as system files, processes ad registry keys and compares them to an algorithm used to generate a similar data set that does not rely on the common APIs. Discrepancies between the two data sets indicates a presence of a root kit
Alternative trust medium – the infected system is shut down and then booted from an alternative trusted media to find traces of the rootkit
Analyzing Memory Dumps – the RAM of the suspected system is dumped analyzed to detect the rootkit in the system
Steps for detecting rootkits
Step 1 – Run “dir /s /b /ah” and “dir /s /b /a-h” inside the potentially infected OS and save the results
Step 2 – Boot into a clean CD, run “dir /s /b /ah” and “dir /s /b /a-h” on the same drive and save the results
Step 3 – Run the latest version of WinMerge on the two sets of results to detect file-hiding ghostware.
There will be some false positive, Also does not detect stealth software that hides in BIOS, video card, EEPROM, bad sectors, alternate data streams.
Defense against Rootkits
Reinstall OS/application from a trust source
update and patch OS, application and firmware
Maintain well documented automated installation procedures
Regularly verify integrity of system files using cryptographically strong digital fingerprint tech
Perform kernel dumps analysis to determine the presence of rootkits
Update antivirus and anti-spyware
harden the workstation or server
Avoid logging with administrative privileges
educate staff to avoid downloading any files from untrusted sources
principal of least privilege
install network and host based firewalls
antivirus software with rootkit protection
Ensure the availability of trusted restoration media
avoid installing unnecessary application, disable features/services if not used
Tools
GMER-detect and removes rootkits by scanning processes, threads, modules, services etc. Others: stinger, Avast One, TDSSKiller, Malwarebytes Anti Rootkit, Rootkit Buster
NTFS Data Streams
NTFS is a filesystem that stores file with the help of two data streams, called NTFS data streams, along with the file attributes. First data stream stores the security descriptor for the file to be stored, such as permissions, the second stores the data within a file. ADS are another type of named data stream that can be present in each file.
An ADS refers to any type of data attached to a file, but not in the file on an NTFS system. ADS is not contained in the master file table but attached to it through the file table.
How to create NTFS streams
Step 1 – Launch c:\>notepad myfile.txt:lion.txt click “yes” to create the new file, enter some data and save the file
Step 2 – Launch c:\>notepad myfile.txt:tiger.txt click “yes” to create the new file, enter some data and save the file
Step 3 – View the size of the myfile.txt (it should be zero)
Step 4 – To view or modify the stream data hidden in step 1 and 2, use the following commands respectively – notepad myfile.txt:lion.txt, notepad myfile.txt:tiger.txt
NTFS streams Manipulation
Step 1 – To move the contents of Trojan.exe to Readme.txt(stream): c:\type c:\Trojan.exe > c:\readme.txt:Trojan.exe the type command hides a file in an alternative data stream
Step 2 – To create a link to the Trojan.exe stream inside the readme.txt file c:\mklink backdoor.exe Readme.txt:Trojan.exe
Step 3 – To execute the Trojan.exe inside the Readme.txt(stream) c:\backdoor
Defense against NTFS Streams
To delete NTFS streams, move the suspected files to the FAT partition
file integrity checker
Stream detector or GMER to detect streams
Enable real-time antivirus scanning against execution of malicious streams in the system
up to date antivirus software
Countermeasure for NTFS streams
LADS – searches for streams and reports the presence of ADS
Move the file to FAT partition and move back. FAT does not support ADS, this effectively removes ADS from files.
Stream Armor – discovers hidden ADS and cleans them completely
Technique of hiding a secret message within an ordinary message and extracting it at the destination.
Utilizing a graphic image as a cover
Classification of Steganography
Technical Steganography – Uses physical or chemical methods to hide the existence of a message. – invisible ink – colorless liquid that can later be made visible – microbots – text or image considerable condensed in size, fitting up to one page in a single dot, to avoid detection by unintended recipients – Computer-Based method – makes changes to digital carriers to embed information foreign to the native carriers. Communication can be in the form of text, binary files, disk and storage devices, network protocols. — Substitution Techniques – tries to encode secret info by substituting the insignificant bits with the secret message — Transform Domain Techniques – hides the info in significant parts of the cover image, such as cropping, compression etc — Spread spectrum Techniques – The sender increases the band spread by means of code (independent of data), and the receiver uses a synchronized reception with the coder to recover the information from the spread spectrum data — Statistical Techniques – utilizes the existence of ‘1-bit’ steganography schemes by modifying the cover in such a way that, when transmission of a 1 occurs, some of the statistical characteristics change significantly. Some unchanged, to distinguish between the modified and unmodified covers — Distortion Techniques – implements a sequence of modification the cover to obtain a stego-object. The sequence of modifications represents the transformation of a specific message. decoding the process requires knowledge about the original cover. — Cover Generation Techniques – digital objects are developed specifically to cover secret communication. When this information is encoded, it ensures that creation of a cover for the secret communication
Linguistic Steganography – Semagrams – hides information with the help of signs or symbols. — visual semagrams – hides infomation in a drawing, painting, letter, music or a symbol — text semagras – hides text message by converting or transforming the appearance of the carrier text message, such by change the font size, styles, adding extra spaces as whitespaces in a doc.
Open Codes – hides the secret message in a legit carrier message specially designed in a pattern on a document that is unclear to the average reader. Carrier message is known as a overt communication, the secret message is covert communication. — Jargon codes – language used that can be understood by the particular group — Covered Cipher – hides the message in a carrier medium visible to everyone. This type of message can be extracted by any person with the knowledge of the method used to hide it — Null cipher – hide the message within a large amount of useless data. the original data are mixed with the unused data in any order so that no one can understand it other than those who knows the order. — Grille cipher – encrypt plaintext by writing it onto a sheet of paper through a pierced (stenciled) sheet.
Types of Steganography based on Cover Medium
Image steganography — least-Significant Bit Insertion — Masking and filtering — Algorithms and Transformation – Openstego – Data hiding, watermarking, – StegOnline, Coagula, QuickStego, SSuite Picsel, CryptaPix
Document steganography – StegoStick – hide file in any other file, image, audio, video – SNOW, StegJ, Data Stash, Texto
Folder steganography – hiding secret information in folders – GiliSoft File Lock Pro – Folder Lock, Hide Folder 5, InvisibleSecrets, QuickCrypto
Video steganography – Omnihide Pro – hide any file within an image, video, music file
Audio steganography – Echo Data Hiding – by adding echo into audio – Spread Spectrum Method — Direct-Sequence Spread Spectrum DSSS – frequency modulation technique, spread a signal of low bandwidth over a broad frequency range to enable sharing of a single channel between multiple users. transposes the secret messages in radio wave frequencies. — Frequency Hopping Spread Spectrum FHSS – alters the audio files frequency spectrum so that it hops rapidly between frequencies. Used in secured communications commercial, military. — LSB Coding – inserts a secret binary message in the least significant bit of each sampling point of the audio signal — Tone Insertion – embedding data in the audio signal by inserting low-power tones. — Phase Encoding – initial audio segment is substituted by a reference phase that represents the data. – DeepSound – BitCrypt. Stegostick, MP3Stego, QuickCrypto, spectrology
White Space steganography – SNOW – for whitespace steganography
Web steganography – Hides web objects behind other objects and uploads them to a webserver
Spam/email steganography – Sending of secret message by embedding them and hiding the embedded data in spam emails. – Spam Mimic- encodes secret messages into innocent looking emails
DVD-Rom steganography – the user embeds the content in audio and graphical data
Natural text steganography – process of converting sensitive information into user-definable free speech as such as a play
Hidden OS steganography – hiding one OS in another
C++ source-code steganography – Users hides a set of tools in the files
For mobile phones – Segais, SPY PIX, PixelKnot, NoClue, Photo Hidden Data
Steganalysis
Reverse process of Stegnography – art of discoverying and rendering covert messages using stegnography – detects hidden messages embedded in images, text, audo, and video carrier mediums
Challenges of Steganalysis
suspect information stream may or may not have encoded hidden data
efficient and accurate detection of hidden content within digital images is difficult
the message could be encrypted before being inserted into a file or signal
some of the suspect signals or files may have irrelevant data or noise encoded into them
Steganalysis Methods/Attacks on Steganography
Stego-only – only stego object is available for analysis
Known-stego – attacker has access to the stego algorithm, cover medium and stego-object
Known-message – attacker has access to the hidden message and the stego object
Known-cover – compares the stego-object and the cover medium to identify the hidden message
Chosen-message – generates stego-objects from a known message using tools in order to identify the algorithm
Chosen-stego – attacker has access to the stego0object and stego algorithm
Chi-Square – probability analysis to test whether the stego object and original data are the same or not
Distinguishing statistical – analyzes the embedded algorithm, used to detect distinguishing statistical changes along with the length of the embedded data
Blind Classifier – blind detector is fed with the original unmodified data to learn the resemblance of the original data from multiple prespectives.
Detecting Steganography
Text file
– alteration are made to the character positions to hide the data – alterations are detected by looking for text patterns or disturbances and unusual amount of blank spaces
Image file
– hidden data in an image can be detected by determining changes in size, file format, last mod time-stamp pointing to the existence of hidden data – statistical analysis method is used for image scanning
Audio file
– use steganalysis method for detecting LSB modifications – inaudible frequencies – odd distortions and patterns
Video file
– Detection fo secret data in video files includes a combination of methods used in image and audio files
Steganography Detection Tools
zsteg – detect stegano-hidden data in PNG and BMP files others : StegoVeritas, Stegextract, StegoHUNT MP, Steganography Studio, virtual steganographic laboratory.
Maintaining Persistence by Abusing Boot or Logon AutoStart execution
Attackers abuse the system boot or logon autostart program for escalating privileges and maintaining persistence by applying custom configuration settings on the compromised machine
Registry run keys – Enumerating Assign permission using winPEAS
Startup files – abusing startup folder using icacls – using accesschk.exe for identifying permissions
Domain Dominance Through Different Paths
Domain dominance is a process of taking control over critical assets such as domain controllers on a target systems and gain access to other networks resources.
Domain Dominance Techniques
Remote code execution – Attackers attempt to execute malicious code on the target domain controller through CLI to launch a domain dominance attack — WIMC, PsExec.exe
Abusing Data Protection API – The Windows domain controllers contain a master key to decrypt DPAPl-protected files, attackers will want to obtain the master key — Mimikatz
Malicious replication – enables attackers to create an exact copy of user data using the admin credentials. such as krbtgt
Skeleton key attack – skeleton key is a form of malware that attackers use to inject false credentials into domain controllers to create a backdoor password. It is a memory-resident virus that enables an attacker to obtain a master password to validate themselves as a legitimate user in the domain
Golder ticket attack – A golden ticket attack is a post-exploitation technique implemented by attackers to gain complete control over the ent i re Active Directory (AD) Attackers forge Ticket Granting Tickets (TGTs) by compromising a Key Distribution Service account (KRBTGT) to access various AD resources
Silver ticket attacks- A silver ticket attack is a post-exploitation technique implemented by an attacker to steal legitimate users’ credentials and create a fake Kerberos Ticket Grant ing Service (TGS) ticket To initiate this attack, the attacker must have access to the credentials gathered from a local service account or the system’s SAM database
The attacker creates a forged Kerberos TGS ticket using the mimikatz tool to establish a connection with the target service