Creation of Two Modules for the Network Authentication Cracking
Total Page:16
File Type:pdf, Size:1020Kb
Creation of two modules for the Network Authentication Cracking Tool Ncrack Ilias Panagiotis SID: 3306150004 SCHOOL OF SCIENCE & TECHNOLOGY A thesis submitted for the degree of Master of Science (MSc) in Mobile and Web Computing OCTOBER 2015-2016 THESSALONIKI – GREECE Ilias Panagiotis SID: 3306150004 Supervisor: Prof. Papadopoulos Apostolos Supervising Committee Members: SCHOOL OF SCIENCE & TECHNOLOGY A thesis submitted for the degree of Master of Science (MSc) in Mobile and Web Computing OCTOBER 2015-2016 THESSALONIKI – GREECE Contents CONTENTS........................................................................................................ 1 INTRODUCTION ................................................................................................ 4 INFORMATION SECURITY..................................................................................... 4 NCRACK OVERVIEW .......................................................................................... 5 PROBLEM ANALYSIS ...................................................................................... 6 ANALYSIS OF NCRACK ARCHITECTURE...................................................... 7 OPERATING SYSTEM OF CHOICE ............................................................... 11 ARCH LINUX .................................................................................................. 11 ARCH LINUX ADVANTAGES ....................................................................................... 12 Simplicity......................................................................................................... 12 Modernity ........................................................................................................ 12 Pragmatism ..................................................................................................... 12 User centrality ................................................................................................ 12 Versatility ........................................................................................................ 13 KALI LINUX .................................................................................................... 14 CREATING A MODULE .................................................................................. 15 MODULE DEVELOPMENT PROCESS ANALYSIS .................................................... 15 TOOLS ANALYSIS .......................................................................................... 16 NMAP ........................................................................................................... 16 NCAT ............................................................................................................ 17 WIRESHARK ................................................................................................... 19 GNU DEBUGGER ............................................................................................ 20 GIT – GITHUB ................................................................................................ 21 IMAP MODULE DEVELOPMENT .................................................................... 24 WHAT IS A IMAP? .......................................................................................... 24 IMAP: The Basics ............................................................................... 25 1 | P a g e Mail Servers, Email Clients and IMAP ................................................ 25 IMAP versus POP ............................................................................... 25 Using IMAP ......................................................................................... 25 Main Advantages of IMAP .................................................................. 25 IMAP Server Configuration ................................................................. 26 DOVECOT IMAP SERVER ................................................................................ 26 Dovecot server Configuration.............................................................. 28 Authentication ..................................................................................... 28 MAILSTORE SERVER ...................................................................................... 28 How to install....................................................................................... 29 Logging on as Administrator ............................................................... 29 Install Test License ............................................................................. 29 Change Password ............................................................................... 29 Create Users ....................................................................................... 29 Create Users Manually ................................................................................... 30 ARCHIVING MANAGEMENT BASED ON PROFILES ......................................................... 31 Overall Concept .............................................................................................. 31 Archiving Your First Email ............................................................................. 31 User Access to the Archive ................................................................. 32 Using MailStore Client ........................................................................ 32 Using the MailStore Outlook Add-In .................................................... 32 Using Other Email Clients ................................................................... 32 Via an Internet Browser (MailStore Web Access) .......................................... 32 Using Smartphone (iPhone, Android, Windows Phone, etc.) .............. 32 DEVELOPMENT PROCEDURE ............................................................................ 33 Ncat Authentication Attempt................................................................ 37 BUILDING A MODULE ....................................................................................... 38 IMAP protocol packets ........................................................................ 40 IMAP module Source-code Analysis: .................................................. 41 CASSANDRA MODULE DEVELOPMENT ...................................................... 47 APACHE CASSANDRA ...................................................................................... 47 NOSQLDATABASE .................................................................................................... 48 FEATURES OF CASSANDRA ......................................................................................... 48 INSTALLING CASSANDRA .................................................................................. 49 PREREQUISITES .......................................................................................................... 49 2 | P a g e INSTALLATION PROCEDURE ......................................................................................... 49 Configuration....................................................................................... 49 Main runtime properties ...................................................................... 50 Changing the location of directories .................................................... 50 CQLSH ....................................................................................................... 50 Description .......................................................................................... 51 Using CQL commands ........................................................................ 51 Saving CQL output in a file ................................................................. 52 Using files as input .............................................................................. 52 The cqlsh environment variables ........................................................ 52 CQLSH Authentication ........................................................................ 53 CQLSH failed authentication ............................................................... 54 Cassandra Wireshark authentication Packet ...................................... 55 Cassandra Server Reply - Positive ..................................................... 56 Cassandra Server Reply - Negative .................................................... 57 Cassandra Packet Analysis ................................................................ 58 CASSANDRA MODULE SOURCE-CODE ANALYSIS ................................... 59 MODULE FINAL TOUCHES ............................................................................ 66 MERGING OF THE TWO NEW MODULES ............................................................... 68 EMAIL TO NMAP’S DEVELOPERS TEAM ............................................................... 71 GENERAL NCRACK SCAN ................................................................................ 72 NCRACK SCAN USING THE IMAP MODULE ......................................................... 73 NCRACK SCAN USING THE CASSANDRA MODULE ................................................. 75 CONCLUSIONS ............................................................................................... 77 BIBLIOGRAPHY .............................................................................................. 78 3 | P a g e Introduction Information security Information security or cybersecurity is a field that becomes more and more popular. Information security or infosec, is several strategies we use in order to control