hakin9_06_2007(1).pdf

(11020 KB) Pobierz
388668236 UNPDF
~ t q w ~
388668236.031.png
~ t q w ~
388668236.032.png
~ t q w ~
388668236.033.png
hakin9
Hacking through the season
In brief
06
N ovember, December; it is cold, wet and rainy. But
Section hosted by Zinho & the www.hackerscenter.com
team. The latest news from the IT security world.
sad and gloomy? Not so. Here are three things
to warm you up: primo, it is holiday time, and
have Christmas and New Year’s eve on the way;
secundo, plenty of spam, intrusions, and security threats that
come with; and last but not least, you are holding a fresh,
new issue of hakin9 magazine in your hands. It is better than
a hot cup of cocoa on winter evenings.
I mentioned New Year’s security vulnerabilities. Every
year, crackers come up with newer, more dangerous, and
more annoying methods to break down our systems, damage
our hard disks, and throw us and the businessmen all over
the world into nervous its. We have had the Happy New
Year! worm and other bothersome surprises prepared by
intelligent and vicious computer geeks. I am wonder what we
can expect this time. If you get excited by any of the crackers’
ideas from 2007 – consider writing a nice article for hakin9.
It might take you some time but then, think of its beneits! Your
paper and your little bio will be read by almost 20,000 people
from all over the world – from South Africa to Sweden, New
York to Australia. Imagine how proud your husband, wife, or
manager would be (not to mention your tech-savvy grandma
and grandpa).
This issue of hakin9 is full of practical and advanced arti-
cles. First, you will get a chance to learn about various tricks
you can do using MD5. We have also prepared an article on
malicious code and some methods employed to analyze it,
as well as two exciting papers on rootkits. In the Defence
section, you will ind useful information on how to use tools
and techniques to monitor large networks (good for network
admins or those who plan on becoming one in future).
I am sure you will notice that our columnist switched to
writing more practical essays - apparently nobody can resist
hakin9’s high level of practicality.
In this, the thirteenth edition of hakin9 Hard Core IT Security
Magazine, we will help out with choosing a virtual machine
for your computer. We gathered some honest opinions of IT
specialists from various places of the globe.
Finally, we present a great interview with professor Tom
Holt regarding Cyber Terrorism & Cyber Crime and Jon
Callas, Chief Technical Oficer of PGP Inc.
We hope you will enjoy reading this issue of the maga-
zine. Should you have any comments, suggestions or com-
plaints, do not hesitate to email me. My goal here is to make
hakin9 as interesting and as reader-friendly as possible.
CD Contents
08
hakin9 team
What's new on the latest hakin9.live CD – a pen drive
option, BackTrack2, and the must-have applications.
Tools
Elcomsoft System Recovery 12
Michael Clough
On using Elcomsoft System Recovery, a special
bootable disk which gives you the access to the com-
puter when you forget the account password.
Kaspersky Internet Security 7.0 13
Steve Lape
Internet Security 7.0 – an integrated tool by Kasper-
sky that includes Firewall, Anti-Virus, Anti-Spam and
Parental Controls.
Paragon Disk Wiper 8.5 14
Aashish Kumar
Paragon Disk Wiper – securely erases your data held
on your hard disk.
Basics
MD5/DES Vulnerabilities for Apache
Web Servers, Linux Passwords &
Beyond
16
Ashish Anand
This article is focused on common implementations of
MD5. Anand explains the importance of choosing the
right combination of passwords for the application.
Attack
HackerDefender Rootkit for the
Masses
22
At your service,
Chris Gates
A how-to on using the HackerDefender rootkit and
hide iles, processes and registry keys. You will also
learn about using a backdoor client.
Rootkits: A State of the Art 34
Magdalena Błaszczyk
magdalena.blaszczyk@hakin9.org
Chico Del Rio
This article presents the state of the art of rootkits and
rootkit-forensics methods. Chico also explains how to
protect against this kind of intrusion.
4
hakin9 6/2007
www.hakin9.org/en
~ t q w ~
388668236.034.png 388668236.001.png 388668236.002.png
 
 
 
388668236.003.png 388668236.004.png 388668236.005.png 388668236.006.png 388668236.007.png
 
 
388668236.008.png 388668236.009.png 388668236.010.png 388668236.011.png 388668236.012.png 388668236.013.png 388668236.014.png
Hard Core IT Security Magazine
Analyzing Malicious Code 50
Editor in Chief: Ewa Dudzic ewa.dudzic@software.com.pl
Executive Editor: Magdalena Błaszczyk magdalena.blaszczyk@hakin9.org
Editorial Advisory Board: Matt Jonkman, Shyaam Sundhar,
Clement Dupuis, Jay Ranade, Terron Williams, Steve Lape
Assistant: Monika Drygulska monika.drygulska@hakin9.org
DTP Director: Sławomir Zadrożny slawomir.zadrozny@ software.com.pl
Prepress technician: Marcin Ziółkowski
marcin.ziolkowski@software.com.pl, Ireneusz Pogroszewski
ireneusz.pogroszewski@software.com.pl
Art Director: Agnieszka Marchocka
agnieszka.marchocka@software.com.pl
CD: Rafał Kwaśny rafal.kwasny@gmail.com
Proofreaders: Jonathan Edwards, Steve Lape, Neil „Pyro” Smith
Top betatesters: Joshua Morin, Michele Orru, Clint Garrison, Shon
Robinson, Brandon Dixon, Justin Seitz, Donald Iverson, Matthew Sabin,
Will Dowling, Stephen Argent, Aidan Carty
Hardik Shah, Anthony L. Williams
The article presents the various techniques and tools
used for analyzing malicious code. Includes a tutorial
on how to examine the NetSky-P worm.
Defence
Intrusion Detection in the Wild 58
Jamie Riden
This article provides you with detailed information on
using common tools and techniques to monitor large
networks by exposing their strong and weak points.
Senior Consultant/Publisher: Paweł Marciniak pawel@software.com.pl
Production Director: Marta Kurpiewska
marta.kurpiewska@software.com.pl
Marketing Director: Ewa Dudzic ewa.dudzic@software.com.pl
Subscription: subscription@software.com.pl
The Bleeding Edge
Writing IPS Rules – Part 2 68
Publisher: Software Media LLC
(on Software Publishing House licence www.software.com.pl/en )
1461 A First Avenue, # 360
New York, NY 10021-2209, USA
Tel: 001917 338 3631
www.hakin9.org/en
Matthew Jonkman
This is the second part of Matthew's new column series
on writing IPS Rules.
Software LLC is looking for partners from all over the World. If you are
interested in cooperating with us,
please contact us by e-mail: cooperation@software.com.pl
Consumers Test
Print: 101 Studio, Firma Tęgi
Printed in Poland
Virtualization and Virtual Machine
Software. We help you to choose
the best VM
70
Distributed in the USA by: Source Interlink Fulfillment Division, 27500
Riverview Centre Boulevard, Suite 400, Bonita Springs, FL 34134
Tel: 239-949-4450.
Dan Kusnetzky, hakin9 team
Consumers tests on Virtual Machines. Our goal is to help
the readers make a right decision when choosing a VM.
Distributed in Australia by: Europress Distributors Pty Ltd, 3/123
McEvoy St Alexandria NSW Australia 2015, Ph: +61 2 9698 4922,
Fax: +61 2 96987675
Whilst every effort has been made to ensure the high quality of the magazine, the
editors make no warranty, express or implied, concerning the results of content usage.
Interview
All trade marks presented in the magazine were used only for informative purposes.
All rights to trade marks presented in the magazine are reserved by the companies
which own them.
Cyber Crime – Cyber Terrorism.
What do you really know about it? 74
To create graphs and diagrams we used program by
company.
Terron Williams
Interview with professor Thomas J. Holt, a leading
authority on Cyber Crime & Cyber Terrorism.
CDs included to the magazine were tested with AntiVirenKit by G DATA
Software Sp. z o.o
The editors use automatic DTP system
Self Exposure
ATTENTION!
Selling current or past issues of this magazine for prices that are different than
printed on the cover is – without permission of the publisher – harmful activity
and will result in judicial liability.
Self Exposure by Jon Callas 78
Monika Drygulska
In this article Jon Callas tells hakin9 readers about his
job, his experience, and the importance of IT security.
hakin9 is also available in: Spain, Argentina, Portugal, France, Morocco,
Belgium, Luxembourg, Canada, Germany, Austria, Switzerland, Poland,
Czech, Slovakia
Books Review
80
The hakin9 magazine is published in 7 language versions:
EN PL ES CZ
IT FR DE
Justin Seitz, Marcin Szczodrak
Coming up
82
DISCLAIMER!
The techniques described in our articles may only be used in private,
local networks. The editors hold no responsibility for misuse of the
presented techniques or consequent data loss.
Monika Drygulska
Here we present topics that will be discussed in the
upcoming hakin9.
www.hakin9.org/en
hakin9 Nr 2/2006
~ t q w ~
5
 
 
388668236.015.png 388668236.016.png 388668236.017.png 388668236.018.png 388668236.019.png
 
388668236.020.png 388668236.021.png 388668236.022.png 388668236.023.png 388668236.024.png 388668236.025.png 388668236.026.png 388668236.027.png 388668236.028.png 388668236.029.png 388668236.030.png
Zgłoś jeśli naruszono regulamin