COMP1321 Digital Infrastructures Richard Henson University of Worcester April 2016.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
System Security Scanning and Discovery Chapter 14.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
IS 247 Introduction to Web Application Development Tim Wu.
The Internet Useful Definitions and Concepts About the Internet.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
EC-Council’s Certified Ethical Hacker (CEH) Richard Henson May 2012.
Mr C Johnston ICT Teacher
Forensic and Investigative Accounting
IT 210 The Internet & World Wide Web introduction.
Copyright © Texas Education Agency, All rights reserved.1 Web Technologies Web Administration.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Chapter 6: Packet Filtering
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Honeypot and Intrusion Detection System
Network Services Networking for Home & Small Business.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
CIS 450 – Network Security Chapter 3 – Information Gathering.
COMP1321 Digital Infrastructure Richard Henson February 2014.
TCP/IP fundamentals Unit objectives Discuss the evolution of TCP/IP Discuss TCP/IP fundamentals.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Cisco – Chapter 15 Application Layer closest to you as an end-user, when you are interacting with software.
Mr C Johnston ICT Teacher
COMP3371 Cyber Security Richard Henson University of Worcester November 2015.
COMP3371 Cyber Security Richard Henson University of Worcester November 2015.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
Footprinting and Scanning
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
CITA 352 Chapter 2 TCP/IP Concepts Review. Overview of TCP/IP Protocol –Language used by computers –Transmission Control Protocol/Internet Protocol (TCP/IP)
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Network Devices and Firewalls Lesson 14. It applies to our class…
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Modern information gathering Dave van Stein 9 april 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
COMP3371 Cyber Security Week 10
Instructor Materials Chapter 5 Providing Network Services
Footprinting and Scanning
Networking for Home and Small Businesses – Chapter 6
Footprinting and Scanning
Networking for Home and Small Businesses – Chapter 6
Chapter 4 Core TCP/IP Protocols
Topic 5: Communication and the Internet
Firewalls Routers, Switches, Hubs VPNs
COMP1321 Digital Infrastructures
COMP3371 Cyber Security Week 8
Presentation transcript:

COMP1321 Digital Infrastructures Richard Henson University of Worcester April 2016

Week 21: Web Communications - Securing Web Pages n Objectives:  Explain the principles of hacking ethically  Access and exploit a “test” client site  Explain “Footprinting” and reconnaissance from a penetration testers perspective  “Passively” scan networks from the outside

Ethical Hacking Principles n Hacking is a criminal offence in the UK  covered through The Computer Misuse Act (1990)  tightened by further legislation (2006) n It can only be done ”legally” by a trained (or trainee) professional  a computing student would be considered in this context under the law

Ethical Hacking principles n Even if it is legal…  doesn’t mean it is ethical! n Professionals only hack without owner’s permission if there is reason to believe a law is being broken  if not… they must ask permission  otherwise definitely unethical (and possibly illegal)

Ethical Hacking Principles n What is “hacking”?  breaching a computer system without permission n How is it done?  using software tools to get through the security of the system  also called penetration testing (again… if done with permission…)

Penetration Testers Toolkit n Many penetration testing tools available n Also a body of knowledge that shows how to use them… n Together, provide the expertise to penetration test a client’s site  but this should only be undertaken with the client’s permission…

Preparing to use a Toolkit n Ethical Hacking Professionals need to be familiar with both Windows Server, and Linux To fully engage with principles of penetration testing,install the following as virtual machines on your own computer: To fully engage with principles of penetration testing,install the following as virtual machines on your own computer:  Windows 2008 Server  Linux, with Backtrack (as VM) …  Remember: this should only be used ethically! n Instead, you may wish to just take an overview (plenty of excellent youtube videos)

Reminder of Virtualisation… n The use of software to allow hardware to run multiple operating system images at the same time  Possible to run Windows OS under Mac OS  run multiple versions of Windows OS on the same PC n Enables the creation of a “virtual” (rather than actual) version of any software environment on the desktop, e.g. Operating Systems, a server, a storage device or networks, an application

What and Why of “Footprinting” n Definition:  “Gathering information about a “target” system” n Could be passive (non-penetrative) or active  Find out as much information about the digital and physical evidence of the target’s existence as possible »need to use multiple sources… »may (e.g. “black hat” hacking) need to be done secretly

Useful Info to Gather about a network n Domain Names n User/Group names n System Names n IP addresses n Employee Details/Company Directory n Network protocols used & VPN start/finish n Company documents n Intrusion detection system used

Rationale for “passive” Footprinting n The ethical hacker can gather a lot of information from publicly available sources  organisation needs to know what is “out there” n Methodology:  start by finding the URL (search engine) »e.g.  from main website, find other external-facing names »e.g. staffweb.worc.ac.uk

Website Connections & History n History: use  The Wayback Machine n Connections: use robtex.com n Business Intelligence:  sites that reveal company details  e.g.

More Company Information… n “Whois” & CheckDNS.com:  lookups of IP/DNS combinations  details of who owns a domain name  details of DNS Zones & subdomains n Job hunters websites:  e.g.   n IT technicians “blog entries”

People Information n Company information will reveal names n Use names in  search engines  Facebook  LinkedIn n Google Earth reveals:  company location(s)

Physical Network Information (“active” footprinting or phishing) n External “probing”  should be detectable by a good defence system… (could be embarrassing!) n e.g. Traceroute:  Uses ICMP protocol “echo” »no TCP or UDP port  reveals names/IP addresses of intelligent hardware: »e.g. Routers, Gateways, DMZs

Footprinting n Using the system to find the organisation’s names structure  “passive” monitor s sent »IP source address »structure of name  “active” sending programs : »test whether addresses actually exist »test restrictions on attachments

Utilizing Google etc. (“passive”) n Google: Advanced Search options: n Uses [site:] [intitle:] [allintitle:] [inurl:]  In each case a search string should follow  e.g. “password” n Maltego  graphical representations of data

Network Layers and Hacking n Schematic TCP/IP stack interacting at three of the 7 OSI levels (network, transport, application): TELNETFTP NFSDNS SNMP TCP UDP IP SMTP X XX X X X ports

TCP & UDP ports n Hackers use these to get inside firewalls etc. n Essential to know the important ones:  20, 21 ftp80 http389 Ldap  22 ssh88 Kerberos443 https  23 telnet 110 pop3636 Ldap/SSL  25 smtp135 smb  53 dns137-9 NetBIOS  60 tftp161 snmp

Reconnaissance/Scanning n Three types of scan:  Network (already mentioned) »identifies active hosts  Port »send client requests until a suitable active port has been found…  Vulnerability »assessment of devices for weaknesses that can be exploited

A “Scanning” Methodology for Ethical Hackers… n Check for Live Systems n Check for open ports n “Banner Grabbing”  e.g.  e.g. bad html request n Scan for vulnerabilities n Draw Network diagram(s) n Prepare proxies…

Proxy Hacking (or Hijacking) n Attacker creates a copy of the targeted web page on a proxy server n Now uses methods like:  keyword stuffing  linking to the copied page from external sites… n Artificially raises search engine ranking  authentic page will rank lower… »may even be seen as duplicated content, in which case a search engine may remove it from its index

Lots more “tricks” ethically available!

Now you try it! n Download software tools first… n Try out the tools on an informal basis without infringing “ethical hacking” rules n Gather evidence documenting your activities  after Campbell Murray’s presentation (27 th April) n Present evidence for assignment 2, guidance 4/11 th May…

Thanks for Listening Thanks for Listening