Wednesday, November 12, 2008

Hacking Intranet + Dialup di Windows


Hacking Intranet + Dialup di Windows

Saya sedang kerja di laptop yang tersambung ke Intranet। Terus saya ingin sambung ke Internet dengan dial-up modem. Ternyata, Intranet-nya jadi macet. Ini pengalaman trouble-shooting saya.

Pertama buat test, saya luncurkan kotak prompt DOS, lalu test ping komputer lain di intranet.

F:prj>ping 192.168.100.64

Pinging 192.168.100.64 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 192.168.100.64:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
Ternyata memang tidak bisa, padahal kalau cuma Intranet biasanya bisa.

Sedikit-sedikit, saya tahu ini pasti masalah routing. Jadi saya panggil "route print"

F:prj>route print

Active Routes:
Network Address Netmask Gateway Address Interface Metric
0.0.0.0 0.0.0.0 100.200.3.189 100.200.3.189 1
0.0.0.0 0.0.0.0 192.168.100.1 192.168.100.63 2
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
192.168.100.0 255.255.0.0 100.200.3.189 100.200.3.189 1
100.200.3.189 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.100.0 255.255.255.0 100.200.3.189 100.200.3.189 1
192.168.100.0 255.255.255.0 192.168.100.63 192.168.100.63 2
192.168.100.63 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.100.255 255.255.255.255 192.168.100.63 192.168.100.63 1
224.0.0.0 224.0.0.0 100.200.3.189 100.200.3.189 1
224.0.0.0 224.0.0.0 192.168.100.63 192.168.100.63 1
255.255.255.255 255.255.255.255 100.200.3.189 100.200.3.189 1
Dalam hal ini:
IP intranet laptop = 192.168.100.63
IP dialup laptop (disamarkan) = 100.200.3.189
Benar kan ... ternyata jalur routing-nya jadi berganda. Ada dua routing ke intranet (192.168.100.0/255.255.255.0) via interface 100.200.3.189 (modem) dan juga via 192.168.100.63 (ethernet). Masalahnya, yang lewat modem metricnya 1, jadi akan dipilih lebih dulu dibanding yang metric-nya 2. Dengan demikian, paket yang mestinya ke intranet, akan dikirim ke internet !!! Bahaya besar. Kalau ketahuan saya akan dimarahi oleh yang mbaurekso Internet.

Buat memperbaikinya, tentu saja routing salah tersebut harus dihapus. Kalau di Linux gampang. Di Windows 98 ternyata tidak bisa-bisa.

F:prj>route delete 192.168.100.0 mask 255.255.255.0 100.200.3.189
The route specified was not found.

F:prj>route delete 192.168.100.0
The route specified was not found.

F:prj>route delete 192.168.100.0 metric 1
The route specified was not found.
Hampir kehabisan akal, saya pergi ke ikon dial-up, buka propertiesnya. Setelah dicari sana sini, ketemu tempatnya, sembunyi jauh sekali:
  • Buka properties dial-up networking.
  • Klik tab "Server Type".
  • Klik tombol "TCP/IP Settings".
  • Hilangkan cek "default gateway on remote network".
  • Klik OK, OK sampai selesai.

Saya coba ulangi dial lagi. Aha ... sekarang bisa jalan. Tabel routingnya ternyata berubah jadi begini:

F:prj>route print

Active Routes:

Network Address Netmask Gateway Address Interface Metric
0.0.0.0 0.0.0.0 192.168.100.1 192.168.100.63 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
192.168.100.0 255.255.0.0 100.200.3.189 100.200.3.189 1
100.200.3.189 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.100.0 255.255.255.0 192.168.100.63 192.168.100.63 1
192.168.100.63 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.100.255 255.255.255.255 192.168.100.63 192.168.100.63 1
224.0.0.0 224.0.0.0 100.200.3.189 100.200.3.189 1
224.0.0.0 224.0.0.0 192.168.100.63 192.168.100.63 1
255.255.255.255 255.255.255.255 100.200.3.189 100.200.3.189 1
Perhatikan sekarang jalur routingnnya sudah tidak berganda.

Itu pengalaman saya hari ini. Mudah-mudahan ada gunanya.

Copyleft Kocil, 2003 under GNU FDL






ARP Guard

ARP Guard - perlindungan dari serangan ARP Spoofing


Melindungi ARP keracunanMelindungi ARP Spoofing
The threat of ARP attacks. External attacks by hackers, viruses, worms and trojans are permanent threats to any progressive company. Ancaman dari serangan ARP. Eksternal serangan oleh hacker, virus, cacing trojans dan ancaman yang permanen untuk setiap perusahaan progresif. What is not widely known, though, is that the major portion of attacks come from within the network. Apa saja yang tidak dikenal secara luas, meskipun, adalah bahwa porsi besar dari serangan datang dari dalam jaringan.

In 2002 KPMG reported that up to 80 % of all intrusions were initiated internally, from inside a company network. Pada tahun 2002 KPMG melaporkan bahwa hingga 80% dari semua intrusions telah dimulai secara internal, dari dalam jaringan perusahaan. Technical ignorance, curiosity and intentional manipulation of data often lead to serious damages for organisations. Teknis ketidaktahuan, keingintahuan dan manipulasi data secara sering mengakibatkan kerusakan serius untuk organisasi.

ARP serangan - ARP spoofing Klik di sini untuk non-teknis keterangan ARP serangan>>
ARP Angriffe - ARP SpoofingHier klicken für Nicht-Technische Erklärung von ARP Angriffen>>

Internal network attacks are typically operated via so called ARP Spoofing or ARP Poisoning attacks. Serangan jaringan internal biasanya dioperasikan melalui disebut ARP Spoofing ARP atau keracunan serangan. Malicious software to run ARP Spoofing attacks can be downloaded on the Internet by everyone. Perangkat lunak untuk menjalankan ARP Spoofing serangan dapat di-download di Internet oleh semua orang. Using fake ARP messages an attacker can divert all communication between two machines with the result that all traffic is exchanged via his PC. Menggunakan palsu ARP pesan penyerang dapat mengalihkan semua komunikasi antara dua mesin dengan hasil yang lalu lintas semua itu adalah komunikasi melalui PC. By means of such a man-in-the-middle attack the attacker can in particular Dengan cara seperti itu seorang laki-laki-dalam-dalam-tengah penyerang dapat menyerang khususnya

These ARP attacks are usually successful even with encrypted connections like SSL, SSH or PPTP. ARP serangan ini biasanya berhasil bahkan seperti sambungan terenkripsi dengan SSL, SSH atau PPTP. ARP belongs to the OSI data link layer (layer 2) . ARP tersebut masuk ke dalam lapisan OSI data link (lapisan 2).



ARP manusia-dalam-dalam-tengah-serangan



The symptoms of ARP spoofing attacks are: Gejala-gejala serangan ARP spoofing adalah:

  • Confidential company information has leaked out and nobody knows how it could have happened. Informasi rahasia perusahaan telah bocor dan tak tahu bagaimana dapat terjadi.
  • Your employees report about intrusion into their online bank account or into their email account. Anda karyawan laporan tentang hal-line mereka ke rekening bank atau ke account email mereka.
  • Inexplicable incidents have compromised the data of applications that can only be accessed via "secure" web interfaces. Yg tak dpt dipahami insiden telah tercemar data dari aplikasi yang hanya dapat diakses melalui "aman" antarmuka web.
  • Strange occurrences in the ARP tables of your network. Kejadian aneh di tabel ARP dari jaringan anda.

ARP spoofing attacks protection. ARP Guard is a system that forms an active protection shield against internal ARP attacks. ARP spoofing serangan perlindungan. ARP Guard adalah sistem yang aktif bentuk perlindungan terhadap perisai internal ARP serangan. The ARP Guard early warning system constantly analyzes all ARP messages , sends out appropriate alerts in real-time and identifies the source of the attack. The ARP Guard sistem peringatan dini terus menganalisis semua ARP pesan, mengirim keluar sesuai alert secara real-time dan mengidentifikasi sumber dari serangan. This protection system from ARP spoofing attacks can be configured not only to raise an alarm, if an ARP attack has been sensed, but even to automatically defend against the attacker. ARP Guard easily integrates with your existing IT security environments, such as firewalls, virus scanners, or intrusion detection systems, and forms an active and reliable shield against ARP spoofing. Ini sistem perlindungan dari serangan ARP spoofing dapat dikonfigurasi tidak hanya untuk meningkatkan alarm, jika sebuah serangan ARP telah sensed, tetapi bahkan secara otomatis untuk mempertahankan terhadap penyerang. ARP Guard mudah mengintegrasikan dengan Anda yang ada TI keamanan lingkungan, seperti firewall, virus scanner, atau sistem deteksi intrusi, dan bentuk yang aktif dan dapat diandalkan perisai terhadap ARP spoofing।

Informasi lebih lanjut

One-page brochure on ARP Spoofing and ARP Guard . Satu-halaman pada brosur dan ARP ARP Spoofing Guard.
Two-page brochure on ARP Spoofing und ARP Guard . Dua-halaman brosur pada ARP Spoofing und ARP Guard.
ARP spoofing and VoIP telephony . ARP spoofing dan VoIP telephony.

Media and press about us Media dan tekan tentang kami

Press and media about us on the topic of ARP-Spoofing and VoIP >> Tekan dan media tentang kami pada topik-ARP Spoofing dan VoIP>>

ARP Guard ready to install. Should you wish to obtain an offer on how to protect the network resources of your company or your organisation against ARP spoofing , please contact us or use this form to obtain a quote for having ARP Guard installed at your premises. ARP Guard siap untuk menginstal. Jika Anda ingin mendapatkan menawarkan cara untuk melindungi sumber daya dari jaringan perusahaan Anda atau organisasi Anda terhadap ARP spoofing, silahkan hubungi kami atau gunakan formulir ini untuk mendapatkan penawaran untuk memiliki ARP Guard diinstal di lokasi Anda.

For more general information about ARP, please click here >> Untuk informasi lebih umum tentang ARP, silakan klik di sini>>

* * * * * * * * * * * *

Interesting articles on ARP spoofing and ARP poisoning Menarik artikel pada ARP spoofing dan ARP keracunan

Angriff von Innen Angriff von Innen
by Gereon Ruetten und Oliver Stutzke (2005) oleh Gereon Ruetten und Oliver Stutzke (2005)
Nicht nur aus dem Internet werden PCs angegriffen, um Trojaner und Spyware zu installieren. Nicht Nur Ran dem Internet werden PC angegriffen, um Trojaner Spyware und zu installieren. Auch im LAN, beispielsweise in der Firma, versuchen bösartige Zeitgenossen Informationen auszuspähen. Selbst geswitchte Netzwerke bieten keinen Schutz, wenn Angreifer die Verbindung mittels ARP-Spoofing über sich umleiten. Auch im LAN, beispielsweise in der Firma, versuchen bösartige Zeitgenossen Informationen auszuspähen. Selbst geswitchte Netzwerke bieten keinen Schutz, wenn Angreifer mati Verbindung mittels-ARP Spoofing Über sich umleiten.

The Insider Threat Study Wawan ancaman studi
by US Secret Service (2005) oleh US Secret Service (2005)
This study [...] is the first of its kind to provide a comprehensive analysis of insider actions by analyzing both the behavioral and technical aspects of the threats. [...] Studi ini adalah pertama kali untuk memberikan sebuah analisis komprehensif oleh Insider tindakan menganalisis kedua-dua aspek teknis dan perilaku dari ancaman. The findings underscore the importance of organizations' technology, policies and procedures in securing their networks against insider threats, as most of the cases showcased in the report were perpetrated by insiders with minimal technical skills. Temuan menekankan pentingnya organisasi 'teknologi, kebijakan dan prosedur pengamanan dalam jaringan mereka terhadap ancaman Insider, karena sebagian besar kasus showcased dalam laporan yang perpetrated oleh insiders dengan sedikit keterampilan teknis. Various proactive practices are among the suggestions offered by the report. Berbagai proaktif antara praktek usulan-usulan yang ditawarkan oleh laporan.

Angriff von Innen Angriff von Innen
by Gereon Ruetten und Oliver Stutzke (2004) oleh Gereon Ruetten und Oliver Stutzke (2004)
Presentation explaining the ARP spoofing threat. Presentasi menjelaskan ARP spoofing ancaman.

Become a merchant for this IT security product Menjadi merchant ini untuk keamanan produk IT

IT companies with a network and security focus can become a merchant for this valuable IT security product . TI perusahaan dengan jaringan keamanan dan fokus dapat menjadi merchant ini berharga untuk TI keamanan produk.


Itelligence AG
ARP spoofing keamanan




vertico software vertico perangkat lunak
ARP VoIP Keamanan
Penjelasan:

ARP attack software can be downloaded for instance from ARP serangan perangkat lunak untuk dapat di-download dari contoh
http://www.oxid.it/projects.html

ARP milik OSI Layer 2 - Data Link

Thank you very much for your interest in our network security division and in our ARP spoofing protection products. Terima kasih banyak atas minat Anda dalam jaringan kami keamanan dan divisi kami di ARP spoofing perlindungan produk.


Sunday, November 9, 2008

Introduction


Packet Sniffing is a fascinating subject. It wears both hats, the good and the evil. It's used by many (including myself) to detect network faults etc...but the same technology allows someone to "sniff" out passwords for your mail account or even your internet account. Now you understand why securing/encrypting your data is so important.

When a file is "deleted" what actually happens? Your operating system removes the reference to that file on the file system. This reference had details such as where on the disk the file was. Whilst marked and available as free space the old data didn't move, its just not seen on the file system but physically exisits on the disk. The entire file remains on the disk until another data is created over the physical area, and even then it may be possible to recover data by studying the magnetic fields on the platter surface.

What's a packet sniffer?


When you make contact with the Internet, data isn't sent in one continuous stream of data; this would be impractical and it would limit the performance of the Internet network. To keep the performance of the Internet as high as possible, the data is cut in slices. Such a slice of data (either inbound or outbound) is called "a packet". Now, you can't see atoms with your naked eye can you? No, I thought so. Sending information on a network means sending "packets" of data. Think of them like the atoms. A lot of packets will create the final information you will see on your screen, be it website or email. To "see" the atoms you would need a special device, some kind of electron microscope, to be able to see the "packets" you've sent or received... you also need a special device. This is a special type of monitoring program called... a packet sniffer. By using a packet sniffer you're able to see any bit of information entering or leaving your computer... even those you normally wouldn't see!

A packet sniffer can be considered as a sort of wire tap device. A device that can "plug" into computer networks and eavesdrops on the network traffic. Just as a telephone wiretap allows the CIA to listen to conversations, the same concept follows a packet sniffer in the sense that it allows someone to listen in on computer conversations.

How packet sniffers work


Packet sniffers capture "binary" data passing through the network, most if not all decent sniffers "decode" this data into a human readable form. To make it even easier (for humans) another step occurs known as "protocol analysis". There is a varying degree of the analysis that takes place, some are simple, just breaking down the "packet" information. Others are more complex giving "detailed" information about what it sees on the packet (i.e., highlights a password for a service).

One very important (and very simple) point to understand is that the sniffer has to be on the same "wire" on which the data is travelling to. In short the "probing" device that "captures" the data has to be on the same wire. The data can then be relayed to a decoding computer on a different network.

Situation: Bob and John are engaged in a internet chat session. You are in a city far apart from where the two men reside. Bob and John are talking top secret details on a cocaine deal. You (the law abiding citizen) decide to sniff their chat session (from your location) to help the feds bust Bob and John.

The simple answer is you CAN'T do that as you don't have access to the path that the data travels from! Of course if you are a good hacker (or well Cracker) then you could install a Trojan on Bob or John's computer and run a sniffer from their system, thus the sniffer it self is on the same wire।
Basically to successfully sniff you have to be on a LAN that is connected with a hub and not a switch. Computers can be physically connected in many ways. If they are connected using a Hub then here is what happens. If there were 4 computers (A, B, C & D) and A wanted to send something to D then it goes through the hub. But the hub doesn't know where D is. So the hub "re-transmits" what A sent to all other computers. Computers B and C should ignore this data since the packet says it's for D. Computer D will obviously accept the data.

You can probably see the security issue here, since other computers nearly have direct access to data that's not meant for them. A packet sniffer can put your network card into promiscuous mode. In this mode the data not meant for that computer will silently pass through the system and thus allows for the packet sniffer to log data!

When computers are connected via a switch and not a hub then things are different. A switch actually knows which computers are connected to it. The switch also knows where the computers are. So when A sends something to D the data goes to the switch and it will send it directly to D without passing by B or C. So you cannot sniff data by installing a sniffer on computer B or C. Thus when functioning as intended a switch provides good sniffer protection!

Switches WON'T prevent sniffing - they make it harder)


There is a super important point to understand with sniffing and "switches". Whilst switches appear to protect against sniffers THERE ARE WAYS to "trick" the switch which can enable you to start sniffing. You can flood the switch with ARP requests which will cause the switch to start behaving like a hub, or you can trick the switch to redirect traffic to the sniffer system.

How do I prevent my data being sniffed?

Many services on the internet send data in the plain text. By default POP mail, SMTP (for sending mail) send data in clear text. The same applies for FTP, Telnet and News clients. ICQ, MSN and AOL Instant messengers send passwords again in clear text. In fact most services send passwords this way.

Ways to secure yourself

  1. When logging into to mail services check to see if your mail client supports encrypted login's. The server has to support this setting too, so check with them.
  2. Even if you login securely (above) any e-mail you send is still in clear text, anyone on the path that the mail travels through can technically read it. Use Encryption to encrypt the message. PGP (www.pgpi.org) is the popular application for this
  3. When shopping on-line make sure the store has a "secure" connection for submitting credit card details. Generally SSL 128bit encryption is the standard.
  4. Telnet sends password and normal data in plain text. If your server supports SSH then use this instead of Telnet since the connection is encrypted.

If possible use a Switch rather than a HUB on a LAN. This provides extremely efficient protection in practice (more work required to successfully sniff). This method is a frontline defence but it shouldn't be a method fully relied upon.

It's near impossible to detect that a packet sniffer is sniffing a connection. This is a passive act, the data is "logged" but unaltered. There are some methods of determining a packet sniffer, however they cannot conclude 100% what they found. A major clue that that sniffing MAY be taking place is the fact that many DNS lookup's are taking place. (i.e., the sniffer is attempting to convert IP addresses to host names) however this is only an indication for there may be other reasons as to why this may occur.

Another, stronger method of detecting if a packet sniffer is operating is to send an ARP request to the device in question to determine if it's in promiscuous mode. A packet which is not destined for your computer will be stopped at the hardware level if promiscuous mode is not on. The "device" in most cases is the network card of the computer running the sniffer.

Sniffer Paket

Dari Wikipedia bahasa Indonesia, ensiklopedia bebas

Langsung ke: navigasi, cari

Sniffer Paket (arti tekstual: pengendus paket — dapat pula diartikan 'penyadap paket') yang juga dikenal sebagai Network Analyzers atau Ethernet Sniffer ialah sebuah aplikasi yang dapat melihat lalu lintas data pada jaringan komputer. Dikarenakan data mengalir secara bolak-balik pada jaringan, aplikasi ini menangkap tiap-tiap paket dan terkadang menguraikan isi dari RFC (Request for Comments) atau spesifikasi yang lain. Berdasarkan pada struktur jaringan (seperti hub atau switch), salah satu pihak dapat menyadap keseluruhan atau salah satu dari pembagian lalu lintas dari salah satu mesin di jaringan. Perangkat pengendali jaringan dapat pula diatur oleh aplikasi penyadap untuk bekerja dalam mode campur-aduk (promiscuous mode) untuk "mendengarkan" semuanya (umumnya pada jaringan kabel).

Sniffer paket dapat dimanfaatkan untuk hal-hal berikut:

  • Mengatasi permasalahan pada jaringan komputer.
  • Mendeteksi adanya penyelundup dalam jaringan (Network Intusion).
  • Memonitor penggunaan jaringan dan menyaring isi isi tertentu.
  • Memata-matai pengguna jaringan lain dan mengumpulkan informasi pribadi yang dimilikanya (misalkan password).
  • Dapat digunakan untuk Reverse Engineer pada jaringan।

Sniffer paket yang terkenal


Pranala luar