SlideShare uma empresa Scribd logo
1 de 78
[object Object],Identifying Web Servers:  A First-look Into the Future of Web Server Fingerprinting
Introductions Jeremiah Grossman Founder and CEO, WhiteHat Security Bill Pennington Senior Engineer, WhiteHat Security
[object Object],[object Object],[object Object],Agenda
[object Object],[object Object],[object Object],[object Object],Why Fingerprint?
Send the same HTTP request and get different responses Perform a single or standard set of HTTP request towards a web server.  The varied differences in the responses will allow for accurate fingerprinting.
The Common Web Servers January 2003 Source: Netcraft
The Server Banner
Servers with no banner
Servers with no banner
OPTIONS *
IIS 4.0
IIS 5.0
Quick Check IIS 4.0 - Public: OPTIONS, TRACE, GET, HEAD, POST, PUT, DELETE IIS 5.0 - Public: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH We can now differentiate between IIS 4.0 and IIS 5.0 and between Apache and IIS!
Apache 1.3.x
Apache 2.0.x
Quick Check Apache 2.0.x - Allow: GET, HEAD, POST, OPTIONS TRACE Apache 1.3.x - Allow: GET, HEAD, OPTIONS, TRACE We can now differentiate 1.3.x and 2.0.x because of the added POST OPTION.
Take a guess
Netscape 3.6
Netscape 4.1
Netscape 6.0
Adequate Entropy The results from the sampling of HTTP output using only “OPTIONS *” provided enough data to start fingerprinting.
Server Responses Server Response Microsoft-IIS/4.0 Public: OPTIONS, TRACE, GET, HEAD, POST, PUT, DELETE Microsoft-IIS/5.0 Public: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH Allow: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH Apache/1.3.26 (Unix) Allow: GET, HEAD, OPTIONS,TRACE Apache/2.0.41-dev (Unix) Allow: GET,HEAD,POST,OPTIONS,TRACE Oracle9iAS/9.0.2 Oracle HTTP Server Oracle9iAS-Web-Cache/9.0.2.0.0 (N) Allow: GET, HEAD, OPTIONS, TRACE Netscape-Enterprise/3.6 SP2 Public: HEAD, GET, PUT, POST Netscape-Enterprise/4.0 Allow: HEAD, GET, PUT, POST Netscape-Enterprise/4.1 Allow: HEAD, GET, PUT, POST, DELETE, TRACE, OPTIONS, MOVE, INDEX, MKDIR, RMDIR Netscape-Enterprise/6.0 Allow: HEAD, GET, PUT, POST, DELETE, TRACE, OPTIONS, MOVE, INDEX, MKDIR, RMDIR
OPTIONS * Conclusions If the server allows and supports the “OPTIONS” HTTP Request Method, then with a reasonable level of certainty, we can conclude what the major version number is for a popular web server. The “Server” response header is no longer necessary to determine what a web server is running.
Other Request Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Research is not complete! Larger pool of HTTP Requests More requests allow closer and more detailed accuracy of web server fingerprinting.
Fingerprinting Countermeasures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Microsoft IIS URLScan Add the following line to your URLScan.ini file: [options] UseAllowVerbs=0 [Deny Verbs] OPTIONS Caution! Can cause some applications to break. (Frontpage,OWA)
Apache mod_rewrite Add the following to your httpd.conf RewriteEngine on
RewriteCond %{REQUEST_METHOD}  ^OPTIONS
RewriteRule .*   -   [F]
Questions?
[object Object],[object Object],[object Object],Agenda
Cross-Site Tracing A variation of cross-site scripting that increases the threat exposure. What can XST do that XSS cannot? Bypass HTTPOnly Restrictions Access to Basic Authentication Credentials Access to NTLM Credentials A web application is no longer required to cross-site script a user if the web server supports the TRACE request method. Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==
Exploit Requirements Cross Site Scripting  A vulnerable web application A user that clicks on a link or views malicious content. Cross Site Tracing Web server that supports the trace request A place to host the XST code Cross domain bypass bug (if cross domain is required)
Steps of Cross-Site Scripting Attacker inserts code into a site or sends a malicsions HTML link to a user. User views the malicious content or clicks on the malicious link. Malicious code is executed with the hosting domain context, granting access to the cookie data., Cookie data is passed off domain to a third-party.
Steps of Cross-Site Tracing Attacker inserts code into a target site or hosts the code on a controlled web page. User views the web pages and malicious code executes within the browser. Code directs the browser to send a TRACE request to a target domain. Cookie, Basic Authentication, and NTLM credentials are sent back to the browser within the HTML Body. Authentication information is sent to a third-party. Server Attacker Victim Target Domain
XST Points to Remember This is a multi-platform multi-technology issue. Not restricted to ActiveX. Flash, Java, etc.
General Remedies ,[object Object],[object Object],[object Object],[object Object],[object Object],Users have the ability to disable all active scripting and increase the safety of their credentials. However, this may negatively impact the functionality of many web sites.
Server Specific Server Specific (Resolutions should be confirmed by appropriate vendor) IIS - URL Scan   Apache -          Source Code Modification -          Mod_Rewrite Module   RewriteEngine on
RewriteCond %{REQUEST_METHOD}  ^TRACE
RewriteRule .*   -   [F]   (Thank you to Rain Forest Puppy)   ** The Limit or LimitExcept directive in the httpd.conf file does not appear to be able to restrict TRACE. **
Microsoft IIS URLScan Add the following line to your URLScan.ini file: [options] UseAllowVerbs=0 [Deny Verbs] TRACE Caution! Can cause some applications to break. (Frontpage,OWA)
Apache mod_rewrite Add the following to your httpd.conf RewriteEngine on
RewriteCond %{REQUEST_METHOD}  ^TRACE
RewriteRule .*   -   [F]
XST Demo
[object Object],[object Object],[object Object],Agenda
Forensics fo·ren·sics   (f -r nsks, -z ks)  n. (used with a sing. verb)  1. The art or study of formal debate; argumentation.  2. The use of science and technology to investigate    and establish facts in criminal or civil courts of law.
Why? I could not find any good tools I only found one document and it was a marketing document. I was bored...
Typical Web Server Environment (Simplified) Web Server Application Server Database Server Internet Firewall
What are Web Attacks? SQL Injection Cross Site Scripting Parameter Tampering Directory Traversal Various Web Server Flaws Unicode Double Decode SSL Overflows
Avenues of Attack Port 80 - Clear text,  easy to watch with an IDS system Port 443 - SSL encrypted can be watched with an IDS but advanced configuration is required, often not done
HTTP Request Get Request Easy everything is logged POST Request Only the Path is logged bummer...
Traditional Network IDS do not work Yes they will generally detect Nimda/CodeRed (Unicode/double decode) attacks. You could write rules to detect some basic attacks http://www.cgisecurity.com/web-attacks.rules It is almost impossible to detect certain attacks with a NIDS
Log Files IIS Log Files Stored in %winnt%/system32/logs/<servicename> Typically - C:/winnt/system32/logs/w3svc/*.log
IIS Log File Formats IIS log file format UserIP,UserName,Date,Time,Service,Computer Name,ServerIP,Time Taken,Bytes Sent,Bytes Received,Status Code, Windows Status,Request Type,Target,Parameters IIS can log to IIS,W3C Extended and NCSA common file format
File name determines type of log IIS format log files begin with  in W3C extended log files begin with  ex   NCSA log files begin with  nc
Apache Log File Locations ? %apache_home% /log/access.log
Apache Log File Formats By default Apache logs to NCSA common format or the combined log file format clientip,ident,username,date/time,request,status,bytes sent
Performance Tip Separate log files on a separate physical disk from content
Problems with web server logs POST data is rarely logged They are generally very large Contain lots of non-security related entries Many attacks can occur via POST request Some attacks can simply not be determined by log files
Log File Sizes www.whitehatsec.com From Jan 22nd - Feb 19th 466,829 lines eCom/Online Gaming Feb 1 - Feb 7 1,198,140 lines
Analysis of log content 107
What defines a bad request? 401 Response codes - Authentication required 500 Response codes - Server error, SQL injection 200 Response code - could be the worst of all, success
Weird Characters Some things should generally not be in a URL ‘  < > * .. etc...
Odd Request Methods 99% of applications use only GET and/or POST Why is someone HEADing me and should I let them?
Odd Request Methods Head Just returns server header no data. Used to probe for the existence of files Options Used to determine the capabilities of a web server and finger printing Trace Used for diagnostics. A possible attack vector XST Any WebDAV method (PropFind...) Used for managed web content. (Frontpage) and in some more robust web applications (OWA)
Introducing the HillBilly Not really an analysis tool, more of a data reduction tool Searches for odd URLs 500 errors Strange request methods
HillBilly Syntax ./hillbilly.pl -t <common,iis4,iis5> -l <logfile> -f <outputfile> -g (Look for odd GET request) -p (Look for 500 errors) -o (Look for odd request methods)
Odd URL search ./hillbilly.pl -t common -l access_log -g Regex = /[^A-Za-z0-9(%20)=_&-]/ Looks for request that contain characters other than these Will find Unicode,Double Decode, Cross Site Scripting, SQL Injection, Command Execution, Directory Traversal in a GET request.
Weird Character Output
Weird Character Reduction
Ecom log file reduction Log file reduced from 1,198,140 to 285,314
500 Errors Looks for any request method that generates a 500 error Large numbers of 500 errors from a single user over a short period can indicate a attack Check application server and SQL server logs Your time is synced right? ./hillbilly.pl -l access_log -t common -p 500 errors can indicate a SQL injection attack
Ecom odd request types Log file reduced from 1,198,140 to 0
Odd Request types ./hillbilly.pl -l access_log -t common -o Looks for any request type other than GET or POST Can point out probing request or finger printing attempts
Ecom odd request types Log file reduced from 1,198,140 to 2269
Prepare for the worst Configuring web server log files Know where they are! Additional utilities URLScan (IIS) mod_protect (Apache) Code Seeker (Cross platform)
Other logs SQL server logs Make sure they are on and at least logging errors Listen to your DBA whine about performance! Application Server Logs Make sure they are on Make sure you understand them
Time If you can’t sync it at least try to get it close You should really try to sync it, really
Using HillBilly as an IDS Danger this is untested!!! Danger this is probably insecure!!! CustomLog &quot;|/usr/bin/hillbilly.pl -t common -l - -g >> /var/log/hillbilly.log&quot; common  Apache
Future Plans Recognize and automatically parse web server logs Use some sort of magic to profile the log file to look for truly deviant request Pretty output Add option to only look for successful request Write code others can read and use
Questions
Materials: www.whitehatsec.com

Mais conteúdo relacionado

Mais procurados

Web servers – features, installation and configuration
Web servers – features, installation and configurationWeb servers – features, installation and configuration
Web servers – features, installation and configurationwebhostingguy
 
Web server administration
Web server administrationWeb server administration
Web server administrationsawsan slii
 
Web Server - Internet Applications
Web Server - Internet ApplicationsWeb Server - Internet Applications
Web Server - Internet Applicationssandra sukarieh
 
Message queues
Message queuesMessage queues
Message queuesMax Bodnar
 
How to set up a proxy server on windows
How to set up a proxy server on windows How to set up a proxy server on windows
How to set up a proxy server on windows codeandyou forums
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and softwareHumma Rashid
 
Web Hacking series part 2
Web Hacking series part 2Web Hacking series part 2
Web Hacking series part 2Aditya Kamat
 
APACHE WEB SERVER FOR LINUX
APACHE WEB SERVER FOR LINUXAPACHE WEB SERVER FOR LINUX
APACHE WEB SERVER FOR LINUXwebhostingguy
 
Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy ServerSourav Roy
 
HTML5 Server Sent Events/JSF JAX 2011 Conference
HTML5 Server Sent Events/JSF  JAX 2011 ConferenceHTML5 Server Sent Events/JSF  JAX 2011 Conference
HTML5 Server Sent Events/JSF JAX 2011 ConferenceRoger Kitain
 
Apache Web Server Architecture Chaitanya Kulkarni
Apache Web Server Architecture Chaitanya KulkarniApache Web Server Architecture Chaitanya Kulkarni
Apache Web Server Architecture Chaitanya Kulkarniwebhostingguy
 
Server-Side Programming Primer
Server-Side Programming PrimerServer-Side Programming Primer
Server-Side Programming PrimerIvano Malavolta
 
Server Sent Events, Async Servlet, Web Sockets and JSON; born to work together!
Server Sent Events, Async Servlet, Web Sockets and JSON; born to work together!Server Sent Events, Async Servlet, Web Sockets and JSON; born to work together!
Server Sent Events, Async Servlet, Web Sockets and JSON; born to work together!Masoud Kalali
 

Mais procurados (20)

Web servers – features, installation and configuration
Web servers – features, installation and configurationWeb servers – features, installation and configuration
Web servers – features, installation and configuration
 
Web server administration
Web server administrationWeb server administration
Web server administration
 
Apache web server
Apache web serverApache web server
Apache web server
 
Web Server - Internet Applications
Web Server - Internet ApplicationsWeb Server - Internet Applications
Web Server - Internet Applications
 
Message queues
Message queuesMessage queues
Message queues
 
How to set up a proxy server on windows
How to set up a proxy server on windows How to set up a proxy server on windows
How to set up a proxy server on windows
 
Apache ppt
Apache pptApache ppt
Apache ppt
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Java Programming - 07 java networking
Java Programming - 07 java networkingJava Programming - 07 java networking
Java Programming - 07 java networking
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and software
 
Basic Server PPT (THDC)
Basic Server PPT (THDC)Basic Server PPT (THDC)
Basic Server PPT (THDC)
 
Web Hacking series part 2
Web Hacking series part 2Web Hacking series part 2
Web Hacking series part 2
 
APACHE WEB SERVER FOR LINUX
APACHE WEB SERVER FOR LINUXAPACHE WEB SERVER FOR LINUX
APACHE WEB SERVER FOR LINUX
 
Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
 
Apache error
Apache errorApache error
Apache error
 
HTML5 Server Sent Events/JSF JAX 2011 Conference
HTML5 Server Sent Events/JSF  JAX 2011 ConferenceHTML5 Server Sent Events/JSF  JAX 2011 Conference
HTML5 Server Sent Events/JSF JAX 2011 Conference
 
Apache Web Server Architecture Chaitanya Kulkarni
Apache Web Server Architecture Chaitanya KulkarniApache Web Server Architecture Chaitanya Kulkarni
Apache Web Server Architecture Chaitanya Kulkarni
 
Server-Side Programming Primer
Server-Side Programming PrimerServer-Side Programming Primer
Server-Side Programming Primer
 
Proxy
ProxyProxy
Proxy
 
Server Sent Events, Async Servlet, Web Sockets and JSON; born to work together!
Server Sent Events, Async Servlet, Web Sockets and JSON; born to work together!Server Sent Events, Async Servlet, Web Sockets and JSON; born to work together!
Server Sent Events, Async Servlet, Web Sockets and JSON; born to work together!
 

Destaque

Knolx j query-form-validation-slides
Knolx j query-form-validation-slidesKnolx j query-form-validation-slides
Knolx j query-form-validation-slidesKnoldus Inc.
 
Php Security Workshop
Php Security WorkshopPhp Security Workshop
Php Security WorkshopAung Khant
 
OWASP App Sec US - 2010
OWASP App Sec US - 2010OWASP App Sec US - 2010
OWASP App Sec US - 2010Aditya K Sood
 
Web Technology – Web Server Setup : Chris Uriarte
Web Technology – Web Server Setup : Chris UriarteWeb Technology – Web Server Setup : Chris Uriarte
Web Technology – Web Server Setup : Chris Uriartewebhostingguy
 
ClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveDan York
 
Remote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxRemote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxGiuseppe Paterno'
 
Accessible dynamic forms
Accessible dynamic formsAccessible dynamic forms
Accessible dynamic formsDylan Barrell
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingInformation Technology
 
Safety LAMP: data security & agile languages
Safety LAMP: data security & agile languagesSafety LAMP: data security & agile languages
Safety LAMP: data security & agile languagesPostgreSQL Experts, Inc.
 
Anatomy of Fraud (2010 & 2013)
Anatomy of Fraud (2010 & 2013)Anatomy of Fraud (2010 & 2013)
Anatomy of Fraud (2010 & 2013)Jerry Ocampo
 
Zero to Hero, a jQuery Primer
Zero to Hero, a jQuery PrimerZero to Hero, a jQuery Primer
Zero to Hero, a jQuery PrimerMatthew Buchanan
 
Php Security By Mugdha And Anish
Php Security By Mugdha And AnishPhp Security By Mugdha And Anish
Php Security By Mugdha And AnishOSSCube
 
PHP Advanced
PHP AdvancedPHP Advanced
PHP AdvancedNoveo
 
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)Chris Tankersley
 
OWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web MalwareOWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web MalwareAditya K Sood
 
Effective communication
Effective communicationEffective communication
Effective communicationhussulinux
 

Destaque (20)

Knolx j query-form-validation-slides
Knolx j query-form-validation-slidesKnolx j query-form-validation-slides
Knolx j query-form-validation-slides
 
Php Security Workshop
Php Security WorkshopPhp Security Workshop
Php Security Workshop
 
jQuery
jQueryjQuery
jQuery
 
OWASP App Sec US - 2010
OWASP App Sec US - 2010OWASP App Sec US - 2010
OWASP App Sec US - 2010
 
Web Technology – Web Server Setup : Chris Uriarte
Web Technology – Web Server Setup : Chris UriarteWeb Technology – Web Server Setup : Chris Uriarte
Web Technology – Web Server Setup : Chris Uriarte
 
RHCSA
RHCSARHCSA
RHCSA
 
Apache Web Server Setup 2
Apache Web Server Setup 2Apache Web Server Setup 2
Apache Web Server Setup 2
 
ClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin Steve
 
Remote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxRemote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise Linux
 
Accessible dynamic forms
Accessible dynamic formsAccessible dynamic forms
Accessible dynamic forms
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load Balancing
 
Safety LAMP: data security & agile languages
Safety LAMP: data security & agile languagesSafety LAMP: data security & agile languages
Safety LAMP: data security & agile languages
 
Anatomy of Fraud (2010 & 2013)
Anatomy of Fraud (2010 & 2013)Anatomy of Fraud (2010 & 2013)
Anatomy of Fraud (2010 & 2013)
 
Zero to Hero, a jQuery Primer
Zero to Hero, a jQuery PrimerZero to Hero, a jQuery Primer
Zero to Hero, a jQuery Primer
 
Php Security By Mugdha And Anish
Php Security By Mugdha And AnishPhp Security By Mugdha And Anish
Php Security By Mugdha And Anish
 
PHP Advanced
PHP AdvancedPHP Advanced
PHP Advanced
 
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
 
jQuery: Events, Animation, Ajax
jQuery: Events, Animation, AjaxjQuery: Events, Animation, Ajax
jQuery: Events, Animation, Ajax
 
OWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web MalwareOWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web Malware
 
Effective communication
Effective communicationEffective communication
Effective communication
 

Semelhante a BlackHat Seattle Web Server Fingerprinting

Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecuritiesamiable_indian
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersLewis Ardern
 
Waf bypassing Techniques
Waf bypassing TechniquesWaf bypassing Techniques
Waf bypassing TechniquesAvinash Thapa
 
Using Proxies To Secure Applications And More
Using Proxies To Secure Applications And MoreUsing Proxies To Secure Applications And More
Using Proxies To Secure Applications And MoreJosh Sokol
 
Application Security Workshop
Application Security Workshop Application Security Workshop
Application Security Workshop Priyanka Aash
 
Web Exploitation Security
Web Exploitation SecurityWeb Exploitation Security
Web Exploitation SecurityAman Singh
 
DVWA BruCON Workshop
DVWA BruCON WorkshopDVWA BruCON Workshop
DVWA BruCON Workshoptestuser1223
 
Web Fundamentals
Web FundamentalsWeb Fundamentals
Web Fundamentalsarunv
 
Introduction to Mod security session April 2016
Introduction to Mod security session April 2016Introduction to Mod security session April 2016
Introduction to Mod security session April 2016Rahul
 
CTU June 2011 - Things that Every ASP.NET Developer Should Know
CTU June 2011 - Things that Every ASP.NET Developer Should KnowCTU June 2011 - Things that Every ASP.NET Developer Should Know
CTU June 2011 - Things that Every ASP.NET Developer Should KnowSpiffy
 
Applciation footprinting, discovery and enumeration
Applciation footprinting, discovery and enumerationApplciation footprinting, discovery and enumeration
Applciation footprinting, discovery and enumerationBlueinfy Solutions
 
Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008Jeremiah Grossman
 
Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)Susam Pal
 
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009ClubHack
 

Semelhante a BlackHat Seattle Web Server Fingerprinting (20)

gofortution
gofortutiongofortution
gofortution
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
 
Romulus OWASP
Romulus OWASPRomulus OWASP
Romulus OWASP
 
Web Security
Web SecurityWeb Security
Web Security
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript Developers
 
gofortution
gofortutiongofortution
gofortution
 
Waf bypassing Techniques
Waf bypassing TechniquesWaf bypassing Techniques
Waf bypassing Techniques
 
Using Proxies To Secure Applications And More
Using Proxies To Secure Applications And MoreUsing Proxies To Secure Applications And More
Using Proxies To Secure Applications And More
 
Application Security Workshop
Application Security Workshop Application Security Workshop
Application Security Workshop
 
Web Fundamentals
Web FundamentalsWeb Fundamentals
Web Fundamentals
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Web Exploitation Security
Web Exploitation SecurityWeb Exploitation Security
Web Exploitation Security
 
DVWA BruCON Workshop
DVWA BruCON WorkshopDVWA BruCON Workshop
DVWA BruCON Workshop
 
Web Fundamentals
Web FundamentalsWeb Fundamentals
Web Fundamentals
 
Introduction to Mod security session April 2016
Introduction to Mod security session April 2016Introduction to Mod security session April 2016
Introduction to Mod security session April 2016
 
CTU June 2011 - Things that Every ASP.NET Developer Should Know
CTU June 2011 - Things that Every ASP.NET Developer Should KnowCTU June 2011 - Things that Every ASP.NET Developer Should Know
CTU June 2011 - Things that Every ASP.NET Developer Should Know
 
Applciation footprinting, discovery and enumeration
Applciation footprinting, discovery and enumerationApplciation footprinting, discovery and enumeration
Applciation footprinting, discovery and enumeration
 
Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008
 
Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)
 
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
 

Mais de Jeremiah Grossman

All these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterAll these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterJeremiah Grossman
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorJeremiah Grossman
 
The Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryThe Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryJeremiah Grossman
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensJeremiah Grossman
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareJeremiah Grossman
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareJeremiah Grossman
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideJeremiah Grossman
 
Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Jeremiah Grossman
 
Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowJeremiah Grossman
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Jeremiah Grossman
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
 
WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015Jeremiah Grossman
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesJeremiah Grossman
 
WhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedWhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedJeremiah Grossman
 
WhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportWhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportJeremiah Grossman
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)Jeremiah Grossman
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Jeremiah Grossman
 

Mais de Jeremiah Grossman (20)

All these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterAll these vulnerabilities, rarely matter
All these vulnerabilities, rarely matter
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare Sector
 
The Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryThe Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare Industry
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?
 
Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to Know
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
 
WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security Guarantees
 
WhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedWhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report Explained
 
WhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportWhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics Report
 
Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
 

Último

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Último (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

BlackHat Seattle Web Server Fingerprinting

  • 1.
  • 2. Introductions Jeremiah Grossman Founder and CEO, WhiteHat Security Bill Pennington Senior Engineer, WhiteHat Security
  • 3.
  • 4.
  • 5. Send the same HTTP request and get different responses Perform a single or standard set of HTTP request towards a web server. The varied differences in the responses will allow for accurate fingerprinting.
  • 6. The Common Web Servers January 2003 Source: Netcraft
  • 13. Quick Check IIS 4.0 - Public: OPTIONS, TRACE, GET, HEAD, POST, PUT, DELETE IIS 5.0 - Public: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH We can now differentiate between IIS 4.0 and IIS 5.0 and between Apache and IIS!
  • 16. Quick Check Apache 2.0.x - Allow: GET, HEAD, POST, OPTIONS TRACE Apache 1.3.x - Allow: GET, HEAD, OPTIONS, TRACE We can now differentiate 1.3.x and 2.0.x because of the added POST OPTION.
  • 21. Adequate Entropy The results from the sampling of HTTP output using only “OPTIONS *” provided enough data to start fingerprinting.
  • 22. Server Responses Server Response Microsoft-IIS/4.0 Public: OPTIONS, TRACE, GET, HEAD, POST, PUT, DELETE Microsoft-IIS/5.0 Public: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH Allow: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH Apache/1.3.26 (Unix) Allow: GET, HEAD, OPTIONS,TRACE Apache/2.0.41-dev (Unix) Allow: GET,HEAD,POST,OPTIONS,TRACE Oracle9iAS/9.0.2 Oracle HTTP Server Oracle9iAS-Web-Cache/9.0.2.0.0 (N) Allow: GET, HEAD, OPTIONS, TRACE Netscape-Enterprise/3.6 SP2 Public: HEAD, GET, PUT, POST Netscape-Enterprise/4.0 Allow: HEAD, GET, PUT, POST Netscape-Enterprise/4.1 Allow: HEAD, GET, PUT, POST, DELETE, TRACE, OPTIONS, MOVE, INDEX, MKDIR, RMDIR Netscape-Enterprise/6.0 Allow: HEAD, GET, PUT, POST, DELETE, TRACE, OPTIONS, MOVE, INDEX, MKDIR, RMDIR
  • 23. OPTIONS * Conclusions If the server allows and supports the “OPTIONS” HTTP Request Method, then with a reasonable level of certainty, we can conclude what the major version number is for a popular web server. The “Server” response header is no longer necessary to determine what a web server is running.
  • 24.
  • 25. Research is not complete! Larger pool of HTTP Requests More requests allow closer and more detailed accuracy of web server fingerprinting.
  • 26.
  • 27. Microsoft IIS URLScan Add the following line to your URLScan.ini file: [options] UseAllowVerbs=0 [Deny Verbs] OPTIONS Caution! Can cause some applications to break. (Frontpage,OWA)
  • 28. Apache mod_rewrite Add the following to your httpd.conf RewriteEngine on
RewriteCond %{REQUEST_METHOD}  ^OPTIONS
RewriteRule .*   -   [F]
  • 30.
  • 31. Cross-Site Tracing A variation of cross-site scripting that increases the threat exposure. What can XST do that XSS cannot? Bypass HTTPOnly Restrictions Access to Basic Authentication Credentials Access to NTLM Credentials A web application is no longer required to cross-site script a user if the web server supports the TRACE request method. Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==
  • 32. Exploit Requirements Cross Site Scripting A vulnerable web application A user that clicks on a link or views malicious content. Cross Site Tracing Web server that supports the trace request A place to host the XST code Cross domain bypass bug (if cross domain is required)
  • 33. Steps of Cross-Site Scripting Attacker inserts code into a site or sends a malicsions HTML link to a user. User views the malicious content or clicks on the malicious link. Malicious code is executed with the hosting domain context, granting access to the cookie data., Cookie data is passed off domain to a third-party.
  • 34. Steps of Cross-Site Tracing Attacker inserts code into a target site or hosts the code on a controlled web page. User views the web pages and malicious code executes within the browser. Code directs the browser to send a TRACE request to a target domain. Cookie, Basic Authentication, and NTLM credentials are sent back to the browser within the HTML Body. Authentication information is sent to a third-party. Server Attacker Victim Target Domain
  • 35. XST Points to Remember This is a multi-platform multi-technology issue. Not restricted to ActiveX. Flash, Java, etc.
  • 36.
  • 37. Server Specific Server Specific (Resolutions should be confirmed by appropriate vendor) IIS - URL Scan   Apache -          Source Code Modification -          Mod_Rewrite Module   RewriteEngine on
RewriteCond %{REQUEST_METHOD}  ^TRACE
RewriteRule .*   -   [F]   (Thank you to Rain Forest Puppy)   ** The Limit or LimitExcept directive in the httpd.conf file does not appear to be able to restrict TRACE. **
  • 38. Microsoft IIS URLScan Add the following line to your URLScan.ini file: [options] UseAllowVerbs=0 [Deny Verbs] TRACE Caution! Can cause some applications to break. (Frontpage,OWA)
  • 39. Apache mod_rewrite Add the following to your httpd.conf RewriteEngine on
RewriteCond %{REQUEST_METHOD}  ^TRACE
RewriteRule .*   -   [F]
  • 41.
  • 42. Forensics fo·ren·sics   (f -r nsks, -z ks) n. (used with a sing. verb) 1. The art or study of formal debate; argumentation. 2. The use of science and technology to investigate and establish facts in criminal or civil courts of law.
  • 43. Why? I could not find any good tools I only found one document and it was a marketing document. I was bored...
  • 44. Typical Web Server Environment (Simplified) Web Server Application Server Database Server Internet Firewall
  • 45. What are Web Attacks? SQL Injection Cross Site Scripting Parameter Tampering Directory Traversal Various Web Server Flaws Unicode Double Decode SSL Overflows
  • 46. Avenues of Attack Port 80 - Clear text, easy to watch with an IDS system Port 443 - SSL encrypted can be watched with an IDS but advanced configuration is required, often not done
  • 47. HTTP Request Get Request Easy everything is logged POST Request Only the Path is logged bummer...
  • 48. Traditional Network IDS do not work Yes they will generally detect Nimda/CodeRed (Unicode/double decode) attacks. You could write rules to detect some basic attacks http://www.cgisecurity.com/web-attacks.rules It is almost impossible to detect certain attacks with a NIDS
  • 49. Log Files IIS Log Files Stored in %winnt%/system32/logs/<servicename> Typically - C:/winnt/system32/logs/w3svc/*.log
  • 50. IIS Log File Formats IIS log file format UserIP,UserName,Date,Time,Service,Computer Name,ServerIP,Time Taken,Bytes Sent,Bytes Received,Status Code, Windows Status,Request Type,Target,Parameters IIS can log to IIS,W3C Extended and NCSA common file format
  • 51. File name determines type of log IIS format log files begin with in W3C extended log files begin with ex NCSA log files begin with nc
  • 52. Apache Log File Locations ? %apache_home% /log/access.log
  • 53. Apache Log File Formats By default Apache logs to NCSA common format or the combined log file format clientip,ident,username,date/time,request,status,bytes sent
  • 54. Performance Tip Separate log files on a separate physical disk from content
  • 55. Problems with web server logs POST data is rarely logged They are generally very large Contain lots of non-security related entries Many attacks can occur via POST request Some attacks can simply not be determined by log files
  • 56. Log File Sizes www.whitehatsec.com From Jan 22nd - Feb 19th 466,829 lines eCom/Online Gaming Feb 1 - Feb 7 1,198,140 lines
  • 57. Analysis of log content 107
  • 58. What defines a bad request? 401 Response codes - Authentication required 500 Response codes - Server error, SQL injection 200 Response code - could be the worst of all, success
  • 59. Weird Characters Some things should generally not be in a URL ‘ < > * .. etc...
  • 60. Odd Request Methods 99% of applications use only GET and/or POST Why is someone HEADing me and should I let them?
  • 61. Odd Request Methods Head Just returns server header no data. Used to probe for the existence of files Options Used to determine the capabilities of a web server and finger printing Trace Used for diagnostics. A possible attack vector XST Any WebDAV method (PropFind...) Used for managed web content. (Frontpage) and in some more robust web applications (OWA)
  • 62. Introducing the HillBilly Not really an analysis tool, more of a data reduction tool Searches for odd URLs 500 errors Strange request methods
  • 63. HillBilly Syntax ./hillbilly.pl -t <common,iis4,iis5> -l <logfile> -f <outputfile> -g (Look for odd GET request) -p (Look for 500 errors) -o (Look for odd request methods)
  • 64. Odd URL search ./hillbilly.pl -t common -l access_log -g Regex = /[^A-Za-z0-9(%20)=_&-]/ Looks for request that contain characters other than these Will find Unicode,Double Decode, Cross Site Scripting, SQL Injection, Command Execution, Directory Traversal in a GET request.
  • 67. Ecom log file reduction Log file reduced from 1,198,140 to 285,314
  • 68. 500 Errors Looks for any request method that generates a 500 error Large numbers of 500 errors from a single user over a short period can indicate a attack Check application server and SQL server logs Your time is synced right? ./hillbilly.pl -l access_log -t common -p 500 errors can indicate a SQL injection attack
  • 69. Ecom odd request types Log file reduced from 1,198,140 to 0
  • 70. Odd Request types ./hillbilly.pl -l access_log -t common -o Looks for any request type other than GET or POST Can point out probing request or finger printing attempts
  • 71. Ecom odd request types Log file reduced from 1,198,140 to 2269
  • 72. Prepare for the worst Configuring web server log files Know where they are! Additional utilities URLScan (IIS) mod_protect (Apache) Code Seeker (Cross platform)
  • 73. Other logs SQL server logs Make sure they are on and at least logging errors Listen to your DBA whine about performance! Application Server Logs Make sure they are on Make sure you understand them
  • 74. Time If you can’t sync it at least try to get it close You should really try to sync it, really
  • 75. Using HillBilly as an IDS Danger this is untested!!! Danger this is probably insecure!!! CustomLog &quot;|/usr/bin/hillbilly.pl -t common -l - -g >> /var/log/hillbilly.log&quot; common Apache
  • 76. Future Plans Recognize and automatically parse web server logs Use some sort of magic to profile the log file to look for truly deviant request Pretty output Add option to only look for successful request Write code others can read and use