Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Lab Exercise: Windows Penetration and Hacking Techniques, Lab Reports of Cryptography and System Security

A lab exercise for penetration testing and hacking techniques on a windows system. The exercise covers various methods for exploiting system vulnerabilities, including storing admin passwords, clearing passwords, installing keyloggers and backdoors, modifying the registry, rootkitting, and clearing logs. The goal is to gain unauthorized access to a target system and maintain persistent access via a backdoor.

Typology: Lab Reports

Pre 2010

Uploaded on 08/16/2009

koofers-user-l92-1
koofers-user-l92-1 šŸ‡ŗšŸ‡ø

10 documents

1 / 30

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
LAB #19LAB #19
Your assignment,Your assignment,
Should you choose to Should you choose to
accept it…accept it…
12/20/2007 LAB 19 1
Exploitation: Store the admin password using BartPE; clear the
admin password using Chntpw; install a keylogger (Ardamax)
and backdoor (Netcat); modify the Registry; rootkit the
backdoor using HackerDefender; clear the logs; restore the
admin password using BartPE; connect remotely via backdoor
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e

Partial preview of the text

Download Lab Exercise: Windows Penetration and Hacking Techniques and more Lab Reports Cryptography and System Security in PDF only on Docsity!

LAB #19LAB

Your assignment,Your assignment,Should you choose toShould you choose toaccept it…accept it…

12/20/

LAB 19

Exploitation: Store the admin password using BartPE; c

lear the

admin password using Chntpw

; install a keylogger (Ardamax)

and backdoor (Netcat

); modify the Registry; rootkit the

backdoor using HackerDefender;

clear the logs; restore the

admin password using BartPE

; connect remotely via backdoor

LAB #19LAB

Scenario

You have physical access of the target box.You ā€œstoleā€ the SYSTEM and SAM files, but you wereunable to crack any passwords (using SamInside) back at theoffice. So, you must take another tack…Return to target. Boot the target using a (Windows) BartPE bootable CD. Save the SAM file to a fob. Reboot, this time

12/20/

LAB 19

bootable CD. Save the SAM file to a fob. Reboot, this time using

chntpw

. Clear the admin password. Boot normally

using the target’s (Windows) OS, log in as admin (nopassword). Install your keylogger and backdoor.Modify the Registry so the backdoor loads on boot. Rootkitthe backdoor. Clear the logs. Reboot with the BartPE CDand replace the SAM file. Test to make you can access thebackdoor remotely.

LAB #19LAB

Potential Show Stoppers 1.

Must have physical access.

The port you have Netcat listen on must be allowedthrough any firewall.

12/20/

LAB 19

How You Should

**- Repeat: Should

  • Do It - Outline**

Never log onto a computer if you can avoid it; it’s nearlyimpossible to erase all your tracks!

Use

ERD Commander

($) to:

Copy a keylogger onto the target hard drive

Copy

Netcat

onto the target hard drive (a backdoor,

allowing you to maintain access to the target via the

LAB #19LAB

12/20/

LAB 19

allowing you to maintain access to the target via the Internet)

Copy

Hacker Defender

onto the target hard drive (used to

rootkit the keylogger,

Netcat

, and

HackerDefender

Modify the target Registry, so the keylogger,

Netcat

, and

HackerDefender

run on boot.

Clear the logs. Reboot the target.

Use

Netcat

to connect remotely & download the keylogger file.

LAB #19LAB

1. Store a copy of the target’s SAM file on a memory fob a.

Your computer MUST be OFF.

b.

Insert a USB fob in a USB port of the target.–

You must

do this before

booting to BartPE!

c.

Insert the

BartPE

CD in the drive and boot the target.

d.

When asked if you want network support, click

No

e.

Click on

GO

> programs

> A43 File Management Utility

12/20/

LAB 19

e.

Click on

GO

> programs

> A43 File Management Utility

Using the window on the left, navigate to:

c:\windows\system32\config

f.

Click on

GO -> programs -> A43 File Management Utility

This time navigate to the USB fob.

g.

Drag the SAM file to your fob and close both windows.

h.

Click

Go-> Shut down -> Restart

i.

Remove the

BartPE

CD and the USB fob

Note!

2. Clear the admin password -

Insert the (Linux)

Chntpw

boot CD (did you remove the fob

Power the target completely down! Reboot!

NOTE:

Usually, the defaults are what you want:

If the boot process hangs…If the boot process hangs…If the boot process hangs…If the boot process hangs…

PressPress

ā€˜dā€™ā€˜d’

  • This reloads the drivers….

Step ONEStep ONEStep ONEStep ONE

Select disk where Windows installation is

LAB #19LAB

12/20/

LAB 19

8

Step ONEStep ONEStep ONEStep ONE

Select disk where Windows installation is

  • Select: [1]

PressPress

Step TWOStep TWOStep TWOStep TWO

:::: Select PATH and registry files

  • [windows/system32/config]:

If XP, pressIf XP, press

If using W2k, enter WINNT/system32/config

  • Select which part of registry to load• [1]:

PressPress

LAB #19LAB

2. Clear the administrator password

(cont.)

Remove the boot CD. Power down.

Power up, booting the target to Windows.

  • You will get ā€œdisk checkā€ message

Stop the check – it might fix itself

Log in as Administrator

No password needed!

12/20/

LAB 19

Log in as Administrator

No password needed!

  • NOTE: If the target PC OS is XP, and it is using Fast

User Switching (with its vertical stack of user nameswith icons, and the Administrator user is not shown),the attacker must press Ctrl-Alt-Delete to get a logonwindow.

If you cannot log in as Administrator, do it again

  • Occasionally,

Chntpw

does not work...

LAB #19LAB

3. Double-click on the AKL icon in the

task tray to load the Viewer.

See the next slide…

If the icon is not there,

AKL might

be installed, but not running! To runit:

  • Click Start/All Programs/Ardamax

Keylogger/Ardamax Keylogger

Right-click on the trayicon to bringup a menu ofoptions –

See

next slide…

12/20/

LAB 19

Keylogger/Ardamax Keylogger

If it is NOT installed

, install it

  • Navigate to

c:\tools\keylogger

and…

  • Double click on akl.exe (Ardamax

Keylogger) to install.

  • Accept the defaults (next

install

finish

etc.) Go through the

ā€œQuick Tourā€ if you like.

LAB #19LAB

Ardamax Key LoggerAKL

can be

ā€œrootkittedā€ by selecting

Hidden

12/20/

LAB 19

selecting

Hidden

Mode

Ctrl-Alt-Shift-H willthen bring the tray iconbackSelecting

Options

takes you to the

next

slide…

LAB #19LAB

ArdamaxKey Logger Selecting Invisibility

12/20/

LAB 19

Invisibility takes you tothe

next

slide…

LAB #19LAB

Ardamax KeyLogger Here, you can direct AKL to

Thismeans Ican’t actually

12/20/

LAB 19

direct AKL to send you thelog file viaFTP or emailor both – ifyou haveregistered AKL.

actually do anyof this

LAB #19LAB

4. Install a backdoor (Netcat) •

Lucky for you, Netcat is already on your target – remember?

c:\tools\netcat\nc.exe

12/20/

LAB 19

LAB #19LAB

6. Install the Hacker Defender rootkit -

Well, the keylogger hides itself.

But now we need to hide Netcat! We do

not

want any:

  • Directory listings (

dir

  • Connection listings (

netstat

  • Process listings (

Ctrl-Alt-Delete

ā€œCustomā€ Registry keys

12/20/

LAB 19

ā€œCustomā€ Registry keys

Navigate to: c:\tools\Hacker Defender\hxdef

LAB #19LAB

6. Install the Hacker Defender rootkit -

Note there might

be two .ini files:

  • hxdef100.ini• hxdef100.2.ini

If there is a

hxdef100.2.ini

file, the

hxdef100.ini

file will

have extra stuff to fool anti

virus software. (Open it with

Notepad

WHEW!)

12/20/

LAB 19

have extra stuff to fool anti

virus software. (Open it with

Notepad

WHEW!)

  • Delete hxdef100.ini• Rename hxdef100.2.ini to hxdef100.ini. You can do

this in Explorer or, in a DOS window:

del hxdef100.ini> rename hxdef100.2.ini hxdef100.ini

If there is no

hxdef100.2.ini

file, just move on…