are your students ready to play the (ethical) hacking game?

56
Are Your Students Ready To Play The (Ethical) Hacking Game?

Upload: willis-hicks

Post on 18-Dec-2015

223 views

Category:

Documents


6 download

TRANSCRIPT

Page 1: Are Your Students Ready To Play The (Ethical) Hacking Game?

Are Your Students Ready To Play The (Ethical) Hacking Game?

Page 2: Are Your Students Ready To Play The (Ethical) Hacking Game?

Welcome!

Presenter: Steven Graham | Senior Director, EC-Council

> About EC-Council> Global, Member Based Information Security Certification

Body> 320+ partners in over 70 Countries> 60,000 Trained Professionals over 21,000 Certified

> Primary Certifications:> Network Security Administrator (E|NSA)> Certified Ethical Hacker (C|EH)> Computer Hacking Forensic Investigator (C|HFI)> Certified Security Analyst/ Licensed Penetration Tester (E|

CSA/L|PT)> 27 total industry certifications. More info at www.eccouncil.org

Page 3: Are Your Students Ready To Play The (Ethical) Hacking Game?

Agenda

> Why Information Security is Important> Oops, I gave my Visa to a Hacker! (Heartland Breach)> Cyber War on our own soil? Is it Possible? (Bot-Nets)> Individual Responsibilities tied to National Security and our

responsibility as educators (DOD-National Strategy to Secure Cyberspace)

> Understanding IT Security Roles and Responsibilities, and educating to them.

> Incorporating Information Security into existing Education programs with the EC-Council | Press

> The Ethical Hacking Game – and introduction to Ethical Hacking – overview & Phase 1 - Reconnaissance

> Discussion

Page 4: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Oops, I gave my Visa to a Hacker! (the Heartland Breach Exposed)> January of 2009 Heartland Payment Systems,

responsible for the processing of 100 Million Credit Card Transactions for 175,000 unique Merchants every month, announced their compromise.

> Bob Carr, CEO sells 80,000 Shares for 1.4 million right before public announcement of the breach

> Stock Plummets

Page 5: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Oops, I gave my Visa to a Hacker! (the Heartland Breach Exposed)

January 6th, 2009Price: 18.83Volume: 329k January 21st, 2009

Price: 14.11Volume: 839k

January 22nd, 2009Price: 8.18Volume: 4 Million

1 day marked a 43% Drop in Stock Value with SharesJumping from 839K To over 4 million

Page 6: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Oops, I gave my Visa to a Hacker! (the Heartland Breach Exposed)> In a recent USA TODAY interview, Heartland’s

President and CFO, Robert Baldwin Noted, in late 2008, hackers had access for “longer than weeks”, no specific information was released.

> Visa & MasterCard Notified Heartland of suspicious transactions stemming from their accounts, then investigators found a “Data-Stealing” program.

> 3 weeks access, potentially 750 million credit card transactions exposed!

Page 7: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Oops, I gave my Visa to a Hacker! (the Heartland Breach Exposed)> Lessons Learned

> End-to-end encryption was not in place> Intrusion Detection, Intrusion Prevention systems were

insufficient> Proactive Scanning for anomalies failed or was not present.> Cyber criminals Exploited Vulnerabilities in Heartland Systems

compromising the financial Data of millions of customers. > Preventative security measures were insufficient despite best

efforts and compliance to standard industry regulations.

Page 8: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Cyber War on our own soil? Is it Possible? (Bot-Nets)> The simple answer, YES AND IT’S HAPPENING NOW!> 2008 attacks against SecureWorks managed clients

originating countries:> #10 Canada originated 107,483 Attacks> #9 Germany originated 110,493 Attacks> #8 Taiwan originated 124,997 Attacks> #7 Russia originated 130,572 Attacks> #6 Japan originated 142,346 Attacks> #5 Poland originated 153,205 Attacks> #4 South Korea originated 162,289 Attacks> #3 Brazil originated 166,987 Attacks

Page 9: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Cyber War on our own soil? Is it Possible? (Bot-Nets)> The simple answer, YES AND IT’S HAPPENING NOW!> 2008 attacks against SecureWorks managed clients originating

countries:

>#2 China originated 7,700,000 Attacks

>#1 United States of America originated 20,600,000 Attacks emanating from Computers inside US Borders

Page 10: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Cyber War on our own soil? Is it Possible? (Bot-Nets)> What is prompting these attacks?> “Owned computers” by large become a part of various

“BotNets” and can be remotely controlled.> Hackers gain access to combined computing resources

through distribution of passive Malware, Virus’, and Trojans.

> Compromised/unprotected Personal Computers, Library Networks, School Networks, Govt. Networks, and Corporate Networks contribute to the proliferation of BotNets.

Page 11: Are Your Students Ready To Play The (Ethical) Hacking Game?

Example Workings of a BotNet• Stage 1, Stage 2:

The Bot Master sends malicious trojan/botnet client over the Internet and infects a victim

• Stage 3:

The bot client connects to the Command Centre( Malicious Server)and informs the status of being infected

• Stage4:

Command Centre informs the Bot Master about the victim

• Stage 5:

The attacker sends attack information to the command centre

• Stage6,

The command centre triggers the victim with the set of instructions sent by the Bot Master to search for other victim computers with similar vulnerabilities

• Stage 7:

The compromised computer scans the Internet for other similar systems and infects them with malicious code

• Stage 8:

This way the attacker creates a huge network of bots that are ready to act based on the instructions sent by the attacker.

The network of bots is referred to as botnet

Page 12: Are Your Students Ready To Play The (Ethical) Hacking Game?

Example Workings of a BotNet

INTERNET

1 Creates a vicious Trojan/ Bot Client

Bot Master

Victim

2

Command Centre

3

4

5

6

Victim

Victim

Victim

Victim

7

7

7

7

8

8

88

EC-Council

Page 13: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> How does this apply to me as an educator?– According to the DOD’s National Strategy to Secure Cyber

Space: “Each American who depends on cyberspace, the network of information networks, must secure the part that they own or for which they are responsible.”

– To further explain, Threats & Vulnerabilities a 5 Level Problem. Consider where your graduates go.

1. Home Users/Small Business

2. Large Enterprises

3. Critical Sectors/Infrastructures

4. National Issues

5. Global

Page 14: Are Your Students Ready To Play The (Ethical) Hacking Game?

Typical Security Job Roles and responsibilities

Job Level Typical Roles Corresponding EC-Council Certifications & Designations

IT/IS Executive

Information Assurance, Design, and Compliance

MSS/ECSO (Coming Soon)

IT/IS Manager

Information Assurance

oversight and Personnel

management

IT/IS Specialist

Specialization roles including Pen Testing, Forensics,

Disaster Recover, Voice over IP,

Secure Programming,

etc.

Penetration Testing Specialist

Forensics SpecialistDisaster Recovery

SpecialistVOIP Specialist

Secure Programmer

IT/IS Admin

Network Installation,

Configuration, maintenance, Information Assurance

IT/IS Technician

Standard Network installation & configuration

Information Worker

Access to Computing

systems

Page 15: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Information Security Job Roles/Responsibilities.> Front Line (Receptionist, secretaries, Information Workers, HR,

Accounting, Non-IT personnel)> Responsibilities – Protect Corporate information

> Vulnerable to – Social Engineering attacks leaking sensitive information, or portions of the “big Picture” allowing attackers to gain access. Computer Virus/Worms/Trojans, Etc.

> 1st Level IT, Help Desk, Support Specialists, Network Administrators.> Responsibilities – Adhere to Security/General IT Policy. Standard

Configurations and supporting roles to superiors, internal and external clients.> Vulnerable to – Social Engineering, Mis-configurations, Common mistakes

exposing serious vulnerability

Page 16: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Information Security Job Roles/Responsibilities.> 2nd Level IT Network Engineers, Managers, Auditors,

Specialists> Responsibility – System Design and maintenance, constant

assessment, Security Patching, Hardware/software break-fix upgrade. Typically first line contact with outsourced firms/consultants. E-Discovery/Preservation. DR/BC

> Vulnerabilities – Mis-configuration, Policy Gaps, Outsource mistakes/decisions/assessment. Admin Level Access.

> Executives – Director of IT, CIO, CISO, CEO> Responsibility – Compliance, Compliance, Compliance

> Vulnerability - ALL VULNERABILITIES END UP HERE.

Page 17: Are Your Students Ready To Play The (Ethical) Hacking Game?

Incorporating Information Security Titles in existing Education Programs.

EC-Council | PressSecurity Fundamentals – General Education – entry level Computer ScienceSecurity | 5 Titles

• Social Site and Online Behavior• Cyber Dangers• ID Theft

Security Essentials – Entry Level Computer ScienceE|NSA Network Defense Titles:

• Network fundamentals and protocols • Network threats and security policy • Perimeter defense mechanisms • Securing network devices, operating system and troubleshooting • Patch Management and Log Analysis

Page 18: Are Your Students Ready To Play The (Ethical) Hacking Game?

Incorporating Information Security Titles in existing Education Programs.

EC-Council | PressEthical Hacking & Counter Measures – Computer

Science/Security – entry level to advanced Computer ScienceC|EH Ethical Hacking Titles

• The CEH Hacking cycle and Penetration Testing • Threats and defensive mechanisms • Hacking Web applications • Securing Linux and Defense against Buffer Overflows

• Securing Network Infrastructure

Page 19: Are Your Students Ready To Play The (Ethical) Hacking Game?

Incorporating Information Security Titles in existing Education Programs.

EC-Council | PressComputer Forensics – Computer Science/Security – entry level to

advanced Computer ScienceC|HFI Computer Forensics Titles:

• Investigating procedures and role of an expert witness • Computer Forensic Lab Requirements Ethical Hacking: Hacking Web

applications • Investigating file systems, hard disks and operating systems for evidence • Investigating data and image files for evidence • Investigating network intrusions and cyber attacks • Investigating attacks on wireless network and devices

Page 20: Are Your Students Ready To Play The (Ethical) Hacking Game?

Incorporating Information Security Titles in existing Education Programs.

EC-Council | PressPenetration Testing – Computer Science/Security – Advanced

Computer Science

E|CSA Computer Security Analyst/ Advanced Penetration Testing Titles:

• Security analysis and advanced tools • Customer agreements and reporting procedures Penetration Testing

Methodologies • Network Perimeter Testing Procedures • Communication Media Testing Procedures • Network Threat Testing Procedures

Page 21: Are Your Students Ready To Play The (Ethical) Hacking Game?

Now, It’s time to play!

EC-Council

Slides extracted from EC-Council’s Intro to Ethical Hacking

Here comes the part you all came for

Page 22: Are Your Students Ready To Play The (Ethical) Hacking Game?

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 23: Are Your Students Ready To Play The (Ethical) Hacking Game?

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 24: Are Your Students Ready To Play The (Ethical) Hacking Game?

ECC Fulfills the Need

• Ethical Hacking and Countermeasures (C|EH)– CEH understand tools and techniques

used• Attack tools – by those outside the network• Compromise tools – by those inside the

network

– “Thinking like a hacker”

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 25: Are Your Students Ready To Play The (Ethical) Hacking Game?

Problem Definition – Why Security?

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 26: Are Your Students Ready To Play The (Ethical) Hacking Game?

What Does a Malicious Hacker Do?

Clearing Tracks

Maintaining Access

Gaining Access

Scanning

Reconnaissance

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 27: Are Your Students Ready To Play The (Ethical) Hacking Game?

Phase 1 - Reconnaissance

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 28: Are Your Students Ready To Play The (Ethical) Hacking Game?

Reconnaissance Types

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 29: Are Your Students Ready To Play The (Ethical) Hacking Game?

Step 1: Reconnaissance

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 30: Are Your Students Ready To Play The (Ethical) Hacking Game?

Part 1: Footprinting

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 31: Are Your Students Ready To Play The (Ethical) Hacking Game?

Revisiting Reconnaissance

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 32: Are Your Students Ready To Play The (Ethical) Hacking Game?

Defining Footprinting

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 33: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why is Footprinting Necessary

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 34: Are Your Students Ready To Play The (Ethical) Hacking Game?

Unearthing Initial Information

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 35: Are Your Students Ready To Play The (Ethical) Hacking Game?

Finding a Company’s URL

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 36: Are Your Students Ready To Play The (Ethical) Hacking Game?

Tool: WebFerret

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 37: Are Your Students Ready To Play The (Ethical) Hacking Game?

Extracting Archive 0f a Website

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 38: Are Your Students Ready To Play The (Ethical) Hacking Game?

www.archive.org

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 39: Are Your Students Ready To Play The (Ethical) Hacking Game?

www.archive.org (cont’d)

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 40: Are Your Students Ready To Play The (Ethical) Hacking Game?

Anonymity with Caches

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 41: Are Your Students Ready To Play The (Ethical) Hacking Game?

Yahoo People Search

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 42: Are Your Students Ready To Play The (Ethical) Hacking Game?

Footprinting Through Job Sites

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 43: Are Your Students Ready To Play The (Ethical) Hacking Game?

• Industry trade associations may provide information about the target network as well

Footprinting Through Industry Sites

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 44: Are Your Students Ready To Play The (Ethical) Hacking Game?

Passive Information Gathering

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 45: Are Your Students Ready To Play The (Ethical) Hacking Game?

Competitive Intelligence Gathering

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 46: Are Your Students Ready To Play The (Ethical) Hacking Game?

Tool: HTTrack Web Site Copier

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 47: Are Your Students Ready To Play The (Ethical) Hacking Game?

Tool: SpiderFoot

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 48: Are Your Students Ready To Play The (Ethical) Hacking Game?

Tool: Expired Domains

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 49: Are Your Students Ready To Play The (Ethical) Hacking Game?

Tool: Maltego

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 50: Are Your Students Ready To Play The (Ethical) Hacking Game?

E-Mail Spiders

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 51: Are Your Students Ready To Play The (Ethical) Hacking Game?

Part 2: Google Hacking

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 52: Are Your Students Ready To Play The (Ethical) Hacking Game?

What is Google Hacking

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 53: Are Your Students Ready To Play The (Ethical) Hacking Game?

What a Hacker Can Find With Google Hacking

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 54: Are Your Students Ready To Play The (Ethical) Hacking Game?

SiteDigger Tool

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 55: Are Your Students Ready To Play The (Ethical) Hacking Game?

C|EH Cont.

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Source Decks continue on with complete presentations of:

•Scanning

•Gaining Access

•Maintaining Access

•Covering Your Tracks

Over 3500 Tools, virus;, malware, robo-demo videos recorded in our advanced hacking lab, and examples included in curriculum.

Page 56: Are Your Students Ready To Play The (Ethical) Hacking Game?

Conclusion

Thank you for your Time. Discussion is now open.

Contact:

EC-Council:

Steven GrahamSenior Director | [email protected] Osuna NE,Albuquerque, NM 87109Web: http://iclass.eccouncil.org/US Office: 505.341.3228 x102

Presentation Sources:EC-Councilwww.eccouncil.orgiclass.eccouncil.orgUSA Today:http://www.usatoday.com/money/perfi/credit/2009-01-20-heartland-credit-card-security-breach_N.htmHeartland Processing Systemswww.2008breach.comSecure Workshttp://www.secureworks.com/media/press_releases/20080922-attacks/EC-CouncilCertified Ethical Hacker Curriculum Version 6.0 – BotnetsDepartment of Defense (US)http://www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdf

Cengage:

Elizabeth SuggSenior Curriculum Services Manager, Digital Solutions GroupCengage LearningPO Box 563, Nyack, New York 10960 c 845-337-0253(o) 845-358-4836| (e) [email protected] | www.cengage.com