Page 410 - StudyBook.pdf
P. 410

394    Chapter 6 • Infrastructure Security: Devices and Media

             workstation to be unable to communicate and can also overload the system to the
             point that it becomes non-functional.
                 In addition, workstations using the Windows OS usually have additional ports
             open for using NetBIOS.This introduces vulnerabilities that can allow attackers to
             remotely access files on the workstation.This is more secure under Windows NT
             or Windows 2000/XP Pro using the New Technology File System (NTFS), but can
             present a real problem under Windows 95/98/Me. Even if the shares on a system
             are password-protected, they can be easily hacked.Administrators should always be
             careful of open shares on the system.Workstations are also vulnerable to MITM
             attacks or hijacked sessions.These attacks allow an attacker to monitor or control
             communications between the workstation and another system.
                 Other exploit functions of the operating system are provided through external
             libraries or other software, which is likely to be running on a workstation. For
             example,Windows workstations come with Microsoft Internet Explorer (IE) pre-
             installed. If the user of the workstation uses IE, they are vulnerable to attacks
             against both the Windows OS itself and IE. Some recently exploited vulnerabilities
             focus on the way that the OS or ancillary software handles specific files such as
             images or VML messages.These attacks use vulnerabilities discovered in external
             library files, which cause the OS or application to modify the way they behave due
             to certain data being processed through the library files.An example of this type of
             attack can be seen in Exercise 6.02.


              EXERCISE 6.02


              PERFORMING A SIMPLE METASPLOIT ATTACK
                  For this exercise, you will be using one of the many freely available
                  exploit programs to perform an attack. Metasploit is an excellent pene-
                  tration testing application that allows you to very quickly and easily
                  generate an attack against a vulnerable host. While Metasploit does
                  have the ability to check hosts for specific vulnerabilities, it is generally
                  faster to use a separate scanning tool to find vulnerable systems on your
                  network and then to use Metasploit to test them. Metasploit can be
                  found at www.metasploit.org. For this exercise, we will be using version
                  3.0 beta 3.
                      The specific exploit used in this example uses a vulnerability found in
                  Winamp version 5.12 and uses the IE browser in conjunction with a
                  Winamp playlist. More details on this exploit can be found at www.secu-
                  rityfocus.com/bid/16410.



          www.syngress.com
   405   406   407   408   409   410   411   412   413   414   415