ethical hacking seminar

28
By VIPUL TALARI

Upload: vipul-talari

Post on 16-Apr-2017

161 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ethical Hacking Seminar

By VIPUL TALARI

Page 2: Ethical Hacking Seminar

Abstract▪ Computers around the world are systematically being

victimized by rampant hacking. This is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes.

▪ The Ethical Hacker is an individual who is usually employed within the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker to find out the loop holes and fix them.

Page 3: Ethical Hacking Seminar

Hacking▪ We’ve all heard of hackers. Many of us have even

suffered the consequences of hacker actions. So who are these hackers? Why is it important to know about them?

Page 4: Ethical Hacking Seminar
Page 5: Ethical Hacking Seminar

Ethical Hacking:

▪ It can be defined as penetration testing by a person who knows everything about hacking to find out if there are any loop holes or exploits on the network of an organization and try to apply patches to them and provide the security.

Ethical Hackers are the people who protect systems from being hacked.

Page 6: Ethical Hacking Seminar

Anatomy of a Hack:

Page 7: Ethical Hacking Seminar

Reconnaissance:● Refers to a preparatory phase where an attacker seeks to

gather as much information as possible about the target of evaluation prior to launching an attack.

▪ Passive reconnaissance involves monitoring network data for patterns and clues.

Active reconnaissance involves probing the network for : ▪ Accessible hosts ▪ Open ports ▪ Location of routers ▪ Operating system details (if possible services)

Page 8: Ethical Hacking Seminar

Scanning: ▪ This stage of a hack can be considered to be a logical

extension of active reconnaissance.

▪ Get a single point of entry to launch an attack and could be point of exploit when vulnerability of the system is detected.

Objectives of scanning: ▪ DNS servers ▪ Vulnerabilities ▪ Software or service versions ▪ Vulnerable software versions

Page 9: Ethical Hacking Seminar

Stealth Scan:Hacker Target

192.168.1.2:2342 ------------syn----------->192.168.1.3:80 192.168.1.2:2342 <---------syn/ack------->192.168.1.3:80 192.168.1.2:2342-------------RST---------->192.168.1.3:80

▪ Client sends a single SYN packet to the server on the appropriate port.

▪ If the port is open then the server responds with a SYN/ACK packet. ▪ If the server responds with an RST packet, then the remote port is in

state "closed”

▪ The client sends RST packet to close the initiation before a connection can ever be established.

▪ This scan also known as “half-open” scan.

Page 10: Ethical Hacking Seminar

Gaining Access:

▪ Gaining access is the most important phase of an attack in terms of potential damage. The exploit can occur locally, offline, over a LAN or the internet as a deception or theft.

▪ Different types of techniques used to gain access to the systems.

Page 11: Ethical Hacking Seminar

Maintaining Access:

▪ Maintaining access refers to the phase when the attacker tries to retain his 'ownership' of the system.

Install tools such as: ▪ Rootkits. ▪ Trojans. ▪ Backdoors.

Page 12: Ethical Hacking Seminar

Clearing Tracks:▪ An attacker would like to destroy evidence of his

presence and activities for various reasons such as maintaining access and evading punitive action.

▪ Covering tracks refers to remove the evidence of his presence and activities.

Techniques include: ▪ Tunnelling. ▪ Altering/Clearing log files. ▪ Disabling auditing

Page 13: Ethical Hacking Seminar
Page 14: Ethical Hacking Seminar

Social Engineering:

Page 15: Ethical Hacking Seminar

System Hacking:▪ Password guessing ▪ Man-in-the-middle and replay attacks ▪ Unsecured access to systems ▪ Wire sniffing ▪ Brute force ▪ Dictionary

Page 16: Ethical Hacking Seminar

Trojans:

A Trojan also known as a Remote Administration Tool or RAT for short is a piece of software made for monitoring a system.

Trojans normally comprise of three things, a Client, Build/Edit Server and Server.

Page 17: Ethical Hacking Seminar

Viruses and Worms:

▪ A computer virus is one of thousands of programs that can invade computer systems and perform a variety of functions ranging from annoying to dangerous.

▪ A worm is a malicious program that can infect both local and remote machines. Worms spread automatically by infecting system after system in a network, and even spreading further to other networks.

▪ Ex: Melissa virus is an hybrid of a Trojan, a virus and a worm.

Page 18: Ethical Hacking Seminar

▪ Onel de Guzman – accused of releasing the I LOVE YOU (Love Bug) virus.

Who is this Guy?

Page 19: Ethical Hacking Seminar

▪ Infected 45 million computers in May 2000 ▪ Clogged e-mail world-wide ▪ Destroyed music/graphics files ▪ Damage estimated as high as $10 billion ▪ Replicates itself through: ▫ E-mail ▫ Internet Chat ▫ Shared drives

I Love You Virus:

Page 20: Ethical Hacking Seminar

Sniffers: Sniffers refer to monitoring data like. ▪ Network data. ▪ Operating system data. ▪ Spoofing. ▪ Man in the Middle.

Passive Sniffers: ▪ Through compromising physical security. ▪ Using a Trojan Horse.

Active Sniffing ▪ ARP spoofing. ▪ DNS spoofing.

Page 21: Ethical Hacking Seminar

Phishing▪ Phishing is a combination of "social engineering" and “technical subterfuge”

to steal consumers’ personal identity data and financial account credentials.

Spoofed Websites:

Page 22: Ethical Hacking Seminar

Denial of service:▪ An attack with which an attacker renders a system unusable or

significantly slows down the system. Methods include: ▪ Flood a network. ▪ Protocol attacks. ▪ Software Vulnerability attacks. ▪ Disrupt connections between two machines. ▪ Prevent a particular individual from accessing a service.

Page 23: Ethical Hacking Seminar

Session Hijacking:

▪ The term session hijacking refers to the exploitation of a valid computer session - sometimes also called a session key or Id - to attain unauthorized access to information or services in a computer system.

▪ Many web sites allow users to create and manage their own accounts, logging in using a username and password (which may or may not be encrypted during transit) or other authentication method.

Page 24: Ethical Hacking Seminar

Buffer Overflow:

▪ A buffer overflow occurs when the amount of data is larger than the allocated buffer. When that happens, the data will overwrite memory area that followed the buffer.

▪ If we can submit data more than previously allocated space, we can overflow the dedicated space and if we can overwrite the stack, we call this Stack Based Overflow.

Page 25: Ethical Hacking Seminar

Protecting Your System:

▪ Install Good Antivirus Software. ▪ Keep Operating System Updated. ▪ Get a Firewall system. ▪ Conduct a Vulnerability test - eg: Snort ▪ Security Policy for your Company. ▪ Avoid unnecessary network services and open

ports.

Page 26: Ethical Hacking Seminar

Conclusion:▪ There is an adverse importance of the need for

protecting your computers and computer networks from hackers and other malicious content available on the internet as it can steal sensitive information which can cause varying damages.

▪ Ethical hackers are being given much importance and consideration by the organizations today and every company is having a strict security policy so that no vulnerabilities will be exploited by the hackers.

▪ NEVER use the knowledge for offensive purposes.

Page 27: Ethical Hacking Seminar

References

▪ An Unofficial guide to Ethical Hacking. ▪ Hacking for dummies. ▪ EC Council material CEH 6.0 ▪ www.ankitfadiacertified.com ▪ www.research.ibm.com ▪ www.wikipedia.com ▪ www.eccouncil.org

Page 28: Ethical Hacking Seminar

Protect your computers