Author Topic: Undetectable Hacking.  (Read 2820 times)

0 Members and 4 Guests are viewing this topic.

Offline mcsquiddy

  • /dev/null
  • *
  • Posts: 5
  • Cookies: -1
    • View Profile
Undetectable Hacking.
« on: January 19, 2014, 03:42:58 pm »
 I am currently working on a project that involves attempting to exploit a target system running Windows XP SP2, and then  attacking another system through said system, and then removing all trace that the first attack occurred, essentially remaining undetectable. My question is this possible?
 
 

I only have spent about a month learning to hack so I do not know all of the  tricks that can be used. but so far I have concluded that short of physically gaining access to the other system  (via breaking in and using the computer to hack) that it is impossible to be completely undetectable. 
The Vulnerability I am using is the MS08-067 vulnerability, and I will attempt to deliver the payload via a dll injection or a shell (if I can delete logs of the new process being made), and keep the entire attack in RAM, avoiding any disk changes that can be investigated.  I will also be conscious of slack space etc. and considered powering down the victim machine after the attack to avoid the RAM persisting.
 
 

If anyone has any information on whether it is in fact possible to attack a system, delete all logs of the connection occurring etc. I would be grateful.

Thanks.

STAFF NOTE: fixed the font size cause it was hard to read
« Last Edit: January 20, 2014, 06:01:29 am by RedBullAddicted »

Offline flowjob

  • Knight
  • **
  • Posts: 327
  • Cookies: 46
  • Pastafarian
    • View Profile
Re: Undetectable Hacking.
« Reply #1 on: January 19, 2014, 04:22:13 pm »
probably possible somehow, but not with a month of knowledge...
Until you have the knowledge how to do this hack, windows 15 is published, and no one will still use Windows XP...
Quote
<phil> I'm gonna DDOS the washing machine with clothes packets.
<deviant_sheep> dont use too much soap or youll cause a bubble overflow

Offline mcsquiddy

  • /dev/null
  • *
  • Posts: 5
  • Cookies: -1
    • View Profile
Re: Undetectable Hacking.
« Reply #2 on: January 19, 2014, 05:58:44 pm »
Windows XP is still the 3rd most used OS as of today, furthermore this is more of a plausible deniability project, so the OS in use is not of importance. if i can prove that this sort of attack can be achieved, then the project would be a success. does no one know of any resources or have any info on how such an attack could be pulled off?? 

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: Undetectable Hacking.
« Reply #3 on: January 19, 2014, 06:19:56 pm »
Windows XP is still the 3rd most used OS as of today, furthermore this is more of a plausible deniability project, so the OS in use is not of importance. if i can prove that this sort of attack can be achieved, then the project would be a success. does no one know of any resources or have any info on how such an attack could be pulled off??
Learn the basics and come back in 6 months only to discover that you could have awnsered this question with some basic knowledge.
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline mcsquiddy

  • /dev/null
  • *
  • Posts: 5
  • Cookies: -1
    • View Profile
Re: Undetectable Hacking.
« Reply #4 on: January 19, 2014, 06:27:53 pm »
I am on a deadline and only have 2 months to conclude the project, I've done alot of research and all i'm asking is resources to point me in the right direction.

Offline b0whunter

  • Serf
  • *
  • Posts: 41
  • Cookies: 11
  • The finest sword plunged into salt water will rust
    • View Profile
    • My journal
Re: Undetectable Hacking.
« Reply #5 on: January 20, 2014, 05:17:59 am »
Im assuming you're using metasploit. If si you will find this article useful: http://www.offensive-security.com/metasploit-unleashed/Event_Log_Management


Btw, are you trying to frame the first target machine or just hide your traces?


Also, any particular reason for the edit?
“Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot anticipate.”
― Sun Tzu, The Art of War

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: Undetectable Hacking.
« Reply #6 on: January 20, 2014, 05:44:30 am »
Also, any particular reason for the edit?
Take a look at the last edited log at the bottom of his post. It wasn't him.
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline b0whunter

  • Serf
  • *
  • Posts: 41
  • Cookies: 11
  • The finest sword plunged into salt water will rust
    • View Profile
    • My journal
Re: Undetectable Hacking.
« Reply #7 on: January 20, 2014, 05:54:07 am »
Yes, I was wondering why, no staff notes, or I could have missed it, on mobile atm
“Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot anticipate.”
― Sun Tzu, The Art of War

Offline mcsquiddy

  • /dev/null
  • *
  • Posts: 5
  • Cookies: -1
    • View Profile
Re: Undetectable Hacking.
« Reply #8 on: January 20, 2014, 12:02:26 pm »
Thanks for the useful replies. Essentially yes I am trying to frame the second computer. The overall goal of the project is to prove that someone could hack me, perform another hack and remove all traces of their attack on me, essentially framing me. This would then provide plausible deniability in that I could claim that I did not perform the attack and that i was in fact attacked by someone else even though no one could prove it, and neither could they.

Z3R0

  • Guest
Re: Undetectable Hacking.
« Reply #9 on: January 20, 2014, 12:15:20 pm »
This would then provide plausible deniability in that I could claim that I did not perform the attack and that i was in fact attacked by someone else even though no one could prove it, and neither could they.
Don't you see the magic in this? Don't you see the magic in any of this? Hacking is unique, in that it is the only way of life where you can do one thing, and make it look like it happened from a different source or out of thin air. Literally, hacking is magical.

You'll find a lot of reluctance in people wanting to give you help for a couple of different reasons...Those of us who live hacking for good are not comfortable talking about it out of suspicion that you will use this knowledge on innocent people. Those of us who live hacking for bad won't teach you, because then you became a threat to their current monopoly.

The Metasploit Unleashed page is a mediocre, but simple place to start, and should be sufficient for your project. Another thing you may want to look into is pivoting, and/or ssh tunnelling (these methods allow you to bridge your attack from one system/network to the next).

http://www.offensive-security.com/metasploit-unleashed/Pivoting

As a small joke: hacking is also the only possible way to blow up a nuclear powerplant from the other side of the planet while simultaneously playing call of duty.
« Last Edit: January 20, 2014, 12:20:39 pm by m0rph »

Offline b0whunter

  • Serf
  • *
  • Posts: 41
  • Cookies: 11
  • The finest sword plunged into salt water will rust
    • View Profile
    • My journal
Re: Undetectable Hacking.
« Reply #10 on: January 20, 2014, 01:53:38 pm »
And some will teach you because they believe in free sharing of software/information, because you should be able to do whatever you want with your OS, prograns, etc ( read this: http://www.gnu.org/gnu/thegnuproject.html)
“Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot anticipate.”
― Sun Tzu, The Art of War

Offline mcsquiddy

  • /dev/null
  • *
  • Posts: 5
  • Cookies: -1
    • View Profile
Re: Undetectable Hacking.
« Reply #11 on: January 20, 2014, 10:57:14 pm »
Thanks! I agree the metasploit unleashed page is highly mediocre, and does not provide much explanation on what is going on.
One thing i have been struggling with is how the MS08_067 module establishes it's connections to the target machine. From what I could deduce (probably incorrect) is that the module establishes a tcp connection through calling the connect() function in the TCP mixin, and then establishes an SMB connection through smb_login(). I know the SMB connection will use a TCP connection, but is it using the TCP connection established? I have found no documentation on how this is done.

Later this piece of code comes up

Code: [Select]
    handle = dcerpc_handle(      '4b324fc8-1670-01d3-1278-5a47bf6ee188', '3.0',      'ncacn_np', ["\\#{datastore['SMBPIPE']}"]    )
I know the exploit works by sending a malformed RPC packet to the server service process that can be identified by the 4b32.. code, and that the protocol used is ncacn_np Which i think is a form of Named Pipes over RPC?  I am completely baffled by how the connections all link in the end as the use of mixins abstracts what is going on. And there isn't much documentation floating around on how connections can be established in metasploit. If you guys have any info or know where i can get some on a deeper level, i'd be very grateful as it's had be stumped for a while.

Thanks.

Edit: Added code for MS08_67 module
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/smb/ms08_067_netapi.rb
« Last Edit: January 20, 2014, 10:59:48 pm by mcsquiddy »

Offline b0whunter

  • Serf
  • *
  • Posts: 41
  • Cookies: 11
  • The finest sword plunged into salt water will rust
    • View Profile
    • My journal
Re: Undetectable Hacking.
« Reply #12 on: January 21, 2014, 12:39:18 am »
If you want a deeper understanding, you'll need to drop metasploit. The best primer on socket programming is beej's guide: http://beej.us/guide/bgnet/output/html/singlepage/bgnet.html


But knowing C will help you understand that guide. So you need to start with the basics.
“Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot anticipate.”
― Sun Tzu, The Art of War

Offline bluechill

  • Cybermancer
  • Royal Highness
  • ****
  • Posts: 682
  • Cookies: 344
  • I am the existence in these walls
    • View Profile
Re: Undetectable Hacking.
« Reply #13 on: January 21, 2014, 11:05:31 pm »
Undetectable hacking.  That's great.  That's rich even.  Good luck with that if you're doing it remotely.
I have dreamed a dream, but now that dream has gone from me.  In its place now exists my own reality, a reality which I have created for myself by myself.

Offline b0whunter

  • Serf
  • *
  • Posts: 41
  • Cookies: 11
  • The finest sword plunged into salt water will rust
    • View Profile
    • My journal
Re: Undetectable Hacking.
« Reply #14 on: January 22, 2014, 04:28:18 pm »
undetectable. Depends your target. I could walk in front of my grandmother undetected. There's always a pareto optimal level. Resources by both parties must be estimated first. For his "project", well...
“Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot anticipate.”
― Sun Tzu, The Art of War