Security Testing for entities hosted in cloud

For the applications that are getting migrated to cloud / planned to be hosted in the cloud will need additional security considerations. Failure to ensure proper security protection when using cloud services may potentially result in higher costs and loss to business. Organizations must consider security controls for different services viz. Infrastructures as a service(Iaas), Software as a service (SaaS) or Platform as a service. Which applications should be moved to cloud?     ·         Low to Medium Risk What are the key security risks while hosting in cloud?     ·         Isolation Failure – Multi tenancy is a key thing in cloud. Failure in controls that separate the storage, memory, identity and access control and routing between tenants is a huge risk.     ·         Authentication and Authorization     ·...

SMB - Server Message Block

SMB is very useful for extracting valuable information about your target. SMB runs on 139 and 445 ports. SMB has had a poor security track since long and has been favourite of attackers to gather information about the target system.

Unauthenticated NULL sessions in windows 200 and XP are also due to SMB vulnerabilities.

ok, so if you have a range of target IPs (e.g. 192.168.10.100 to 192.168.10.254) where you want to search for SMB then:

nmap -n -p 139,445 -oG SMBHOSTS.txt 192.168.10.100-254

There are specific tools as well that makes the job more easier:

nbtscan -r <iprange>

NULL session:

Null sessions functionality can be abused by attackers to gain plethora of information like

  • password policy
  • users
  • usernames
  • group names
  • machine names etc.
a useful tool for null session enumeration and gathering information out of this is: enum4linux

usage: enum4linux -a <ip>

Note: null sessions exist in only SMB 1. This is patched by Microsoft in subsequent SMB releases.

SMB can also be utilized to gather exact OS information. NMAP's SMB  NSE script is wonderful.

usage: nmap -v -p 139,445 --script=smb-os-discovery <ip>

To check for SMB vulnerabilities you can use another NSE script:

nmap -v -p 139,445 --script=smb-check-vulns --script-args=unsafe=1 <ip>

To see all available nmap NSE scripts for SMB:

cd /usr/share/nmap/scripts
ls |grep smb

Hope you enjoyed this.

Comments

Popular posts from this blog

Change the default SSH keys in Kali Linux ......One important step post installation

Security Testing for entities hosted in cloud

Keeping logs of your console commands during pentesting