19
HELLO

C0C0N 2013 - OWASP Skanda

Embed Size (px)

DESCRIPTION

Infiltrating the intranet using Skanda

Citation preview

Page 1: C0C0N 2013 - OWASP Skanda

HELLO

Page 2: C0C0N 2013 - OWASP Skanda

SKANDAJayesh Singh Chauhan

@jayeshsch

Page 3: C0C0N 2013 - OWASP Skanda

ABOUT ME

• Author/Project Leader – OWASP Skanda

• Author of CSRF PoC Generator

• Pen Tester, Coder, B33rHead

• Snooker (Crazy Fan !!!)

Page 4: C0C0N 2013 - OWASP Skanda

Port Scan

• Nmap ???

• Firewall/IDS

• NO GAIN

Page 5: C0C0N 2013 - OWASP Skanda
Page 6: C0C0N 2013 - OWASP Skanda

SSRF

• Web Apps

• Scan/Attack

• Enumerate/Attack Services

Page 7: C0C0N 2013 - OWASP Skanda

SSRF

• A class of attack

• XXE, RFI, CRLF Injections

• If opens socket, can be SSRFed

Page 8: C0C0N 2013 - OWASP Skanda

Normal Attack

Page 9: C0C0N 2013 - OWASP Skanda

SSRF Attack

Page 10: C0C0N 2013 - OWASP Skanda

What makes it possible

• HTTP Client -> No Protocol Check

• Invalid packets ->Service doesn’t close

• Protocol that you can forge fit with the protocols .

Page 11: C0C0N 2013 - OWASP Skanda

Let’s dive into Skanda

• Port Scan

• Network Discovery

Page 12: C0C0N 2013 - OWASP Skanda

XSPA/SSRF

• Error based XSPA

• Blind XSPA

• Closed Port

Page 13: C0C0N 2013 - OWASP Skanda

DEMO

• Port Scanning using Skanda

Page 14: C0C0N 2013 - OWASP Skanda
Page 15: C0C0N 2013 - OWASP Skanda

Intranet

Page 16: C0C0N 2013 - OWASP Skanda

Intranet Discovery

• Router -> First IP

• Checks whether any router is up

• If(IP==found):enter subnet

• Analyze every node’s response

Page 17: C0C0N 2013 - OWASP Skanda

DEMO

• Network Discovery using Skanda

Page 18: C0C0N 2013 - OWASP Skanda

Q & A ?

Got ‘em ? Ask ‘em ?

Page 19: C0C0N 2013 - OWASP Skanda

Special Thanks to..

• Lavakumar Kuppan, @lavakumark

• Riyaz Walikar, @riyazwalikar

• Ajith Chandran, @r3dsm0k3

• ONsec Lab, @Onsec_lab