ethical hacking tips

22
PRESENTED BY Mathew jose http://ethicalhacking228.blogspot. in/

Upload: mathewjose228

Post on 07-May-2015

3.941 views

Category:

Technology


2 download

DESCRIPTION

ethicalhacking228.blogspot.inpls logon to this site

TRANSCRIPT

Page 1: ethical hacking tips

PRESENTED BY Mathew jose

http://ethicalhacking228.blogspot.in/pls logon to this site to get tips on

ethical hacking re…..

Page 2: ethical hacking tips

Ethical Hacking - ?

Why – Ethical Hacking ?

Ethical Hacking - Process

Ethical Hacking – Commandments

Reporting

Page 3: ethical hacking tips

Ethical

Hacking

Conforming to accepted professional standards of conduct

What is Ethical Hacking

Process of breaking into systems for:Personal or Commercial GainsMalicious Intent – Causing sever damage to Information & Assets

Also Called – Attack & Penetration Testing, White-hat hacking, Red teaming

White-hat - Good GuysBlack-hat – Bad guys

Page 4: ethical hacking tips

What is Ethical HackingIt is LegalPermission is obtained from the targetPart of an overall security programIdentify vulnerabilities visible from Internet at

particular point of timeEthical hackers possesses same skills, mindset

and tools of a hacker but the attacks are done in a non-destructive manner

Page 5: ethical hacking tips

Why – Ethical HackingJune 01, 2004 to Dec.31, 2004

Domains No of Defacements

.com 922

.gov.in 24

.org 53

.net 39

.biz 12

.co.in 48

.ac.in 13

.info 3

.nic.in 2

.edu 2

other 13

Total 1131

Source: CERT-India

January - 2005

Defacement Statistics for Indian Websites

Page 6: ethical hacking tips

Why – Ethical Hacking

Source: CERT/CCTotal Number of Incidents Incidents

Page 7: ethical hacking tips

Why – Ethical Hacking

Source: US - CERT

Page 8: ethical hacking tips

Why – Ethical Hacking

Viruses, Trojan Horses,

and Worms

SocialEngineering

AutomatedAttacks

Accidental Breaches in

Security Denial ofService (DoS)

OrganizationalAttacks

RestrictedData

Protection from possible External Attacks

Page 9: ethical hacking tips

Ethical Hacking - Process1. Preparation2. Footprinting3. Enumeration & Fingerprinting4. Identification of Vulnerabilities5. Attack – Exploit the Vulnerabilities

Page 10: ethical hacking tips

PreparationIdentification of Targets – company websites,

mail servers, extranets, etc.Signing of Contract

Agreement on protection against any legal issuesContracts to clearly specifies the limits and dangers of

the testSpecifics on Denial of Service Tests, Social Engineering,

etc.Time window for AttacksTotal time for the testingPrior Knowledge of the systemsKey people who are made aware of the testing

Page 11: ethical hacking tips

FootprintingCollecting as much information about the target DNS Servers IP Ranges Administrative Contacts Problems revealed by administrators

Information SourcesSearch enginesForumsDatabases – whois, ripe, arin, apnicTools – PING, whois, Traceroute, DIG, nslookup, sam spade

Page 12: ethical hacking tips

Enumeration & FingerprintingSpecific targets determined Identification of Services / open portsOperating System Enumeration

Methods Banner grabbing Responses to various protocol (ICMP &TCP) commands Port / Service Scans – TCP Connect, TCP SYN, TCP FIN,

etc.

ToolsNmap, FScan, Hping, Firewalk, netcat, tcpdump, ssh,

telnet, SNMP Scanner

Page 13: ethical hacking tips

Identification of VulnerabilitiesVulnerabilities

Insecure ConfigurationWeak passwordsUnpatched vulnerabilities in services, Operating

systems, applicationsPossible Vulnerabilities in Services, Operating

SystemsInsecure programmingWeak Access Control

Page 14: ethical hacking tips

Identification of VulnerabilitiesMethodsUnpatched / Possible Vulnerabilities – Tools,

Vulnerability information WebsitesWeak Passwords – Default Passwords, Brute

force, Social Engineering, Listening to TrafficInsecure Programming – SQL Injection, Listening

to TrafficWeak Access Control – Using the Application

Logic, SQL Injection

Page 15: ethical hacking tips

Identification of VulnerabilitiesToolsVulnerability Scanners - Nessus, ISS, SARA, SAINTListening to Traffic – Ethercap, tcpdumpPassword Crackers – John the ripper, LC4, PwdumpIntercepting Web Traffic – Achilles, Whisker, Legion

Websites Common Vulnerabilities & Exposures – http://cve.mitre.org Bugtraq – www.securityfocus.com Other Vendor Websites

Page 16: ethical hacking tips

Attack – Exploit the vulnerabilitiesObtain as much information (trophies) from the

Target AssetGaining Normal AccessEscalation of privilegesObtaining access to other connected systems

Last Ditch Effort – Denial of Service

Page 17: ethical hacking tips

Attack – Exploit the vulnerabilitiesNetwork Infrastructure Attacks Connecting to the network through modem Weaknesses in TCP / IP, NetBIOS Flooding the network to cause DOS

Operating System Attacks Attacking Authentication Systems Exploiting Protocol Implementations Exploiting Insecure configuration Breaking File-System Security

Page 18: ethical hacking tips

Attack – Exploit the vulnerabilitiesApplication Specific Attacks

Exploiting implementations of HTTP, SMTP protocols

Gaining access to application DatabasesSQL InjectionSpamming

Page 19: ethical hacking tips

Attack – Exploit the vulnerabilitiesExploits Free exploits from Hacker Websites Customised free exploits Internally Developed

Tools – Nessus, Metasploit Framework,

Page 20: ethical hacking tips

ReportingMethodologyExploited Conditions & Vulnerabilities that

could not be exploitedProof for Exploits - TrophiesPractical Security solutions

Page 21: ethical hacking tips

Ethical Hacking - CommandmentsWorking Ethically

TrustworthinessMisuse for personal gain

Respecting PrivacyNot Crashing the Systems

Page 22: ethical hacking tips

QUESTIONS ???