By Brandon Barton & Eric Van Horn. What is Backtrack 4? Operating system Collection of many security tools world’s leading penetration testing and information.

Slides:



Advertisements
Similar presentations
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
Advertisements

By Skyler Onken.  Who am I?  What is Fuzzing?  Usual Targets  Techniques  Results  Limitations  Why Fuzz?  “Fuzzing the Web”?  Desired Solution.
Software Fault Injection for Survivability Jeffrey M. Voas & Anup K. Ghosh Presented by Alison Teoh.
The Intelligent Fuzzing in TTCN-3 Xu Luo, Wu Ji, Liu Chao Software Engineering Institute Beihang University
Biswajit Mazumder Rohit Hooda Arpan Chowdhary.  What is Fuzzing?  Fuzzing techniques  Types of Fuzzing  Fuzzing explained  Case study and changes:
Copyright © Microsoft Corp 2006 Introduction to Security Testing Shawn Hernan Security Program Manager Security Engineering and Communication.
1 Testing the OPN Language: Rule Coverage and Fuzz Testing Wujie Zheng.
Cryptography and Network Security Chapter 20 Intruders
Fuzzing Dan Fleck CS 469: Security Engineering Sources:
Network Security Testing Techniques Presented By:- Sachin Vador.
SOFTWARE SECURITY TESTING IS IMPORTANT, DIFFERENT AND DIFFICULT Review by Rayna Burgess 4/21/2011.
Leveraging User Interactions for In-Depth Testing of Web Applications Sean McAllister, Engin Kirda, and Christopher Kruegel RAID ’08 1 Seoyeon Kang November.
Leveraging User Interactions for In-Depth Testing of Web Application Sean McAllister Secure System Lab, Technical University Vienna, Austria Engin Kirda.
The Business of Penetration Testing
1 Joe Meehean. 2 Testing is the process of executing a program with the intent of finding errors. -Glenford Myers.
MSDN Webcast - SDL Process. Agenda  Fuzzing & The SDL  Integration of fuzzing  Importance of fuzzing Michael Eddington Déjà vu Security
MICHAEL EDDINGTON Advanced Fuzzing with Peach 2.
Presentation By Anil Kumar Marikukala, Syed Khaja Najmuddin Ahmed.
CSCE 548 Secure Software Development Risk-Based Security Testing.
Software Quality Assurance Lecture #8 By: Faraz Ahmed.
ConfidentialPA Testing Mobile Applications A Model for Mobile Testing.
Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Department of Computer Science & Engineering College of Engineering.
Penetration Testing James Walden Northern Kentucky University.
Project Proposal Interface Design Website Coding Website Testing & Launching Website Maintenance.
Comparison of Blackbox and Whitebox Fuzzers in Finding Software Bugs
SATAN Presented By Rick Rossano 4/10/00. OUTLINE What is SATAN? Why build it? How it works Capabilities Why use it? Dangers of SATAN Legalities Future.
Software Security Testing Vinay Srinivasan cell:
FORESEC Academy FORESEC Academy Security Essentials (III)
Engineering Secure Software. Vulnerability of the Day  Each day, we will cover a different type of code-level vulnerability Usually a demo How to avoid,
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
TaintScope Presented by: Hector M Lugo-Cordero, MS CAP 6135 April 12, 2011.
CSCE 548 Secure Software Development Taxonomy of Coding Errors.
Module 3 – Information Gathering  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
 Data Fuzzing with TTCN-3 Stephan Pietsch, Bogdan Stanca-Kaposta, Dr. Jacob Wieland, Dirk Tepelmann, Ju ̈ rgen Großmann, Martin Schneider TTCN-3 User.
WEEK INTRODUCTION CSC426 SOFTWARE ENGINEERING.
jFuzz – Java based Whitebox Fuzzing
Security Development Life Cycle Baking Security into Development September 2010.
Finding Errors in.NET with Feedback-Directed Random Testing Carlos Pacheco (MIT) Shuvendu Lahiri (Microsoft) Thomas Ball (Microsoft) July 22, 2008.
GET CONNECTED Information Technology Career Cluster.
Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
CSCE 201 Secure Software Development Best Practices.
Open Source Robotics Vision and Mapping System Craig Schroeder June 1, 2005.
Module 6 – Penetration  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification ○ Penetration.
Books Visualizing Data by Ben Fry Data Structures and Problem Solving Using C++, 2 nd edition by Mark Allen Weiss MATLAB for Engineers, 3 rd edition by.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Defensive Programming. Good programming practices that protect you from your own programming mistakes, as well as those of others – Assertions – Parameter.
Exploitation Development and Implementation PRESENTER: BRADLEY GREEN.
Filip Chytrý Everyone of you in here can help us improve online security....
Modern information gathering Dave van Stein 9 april 2009.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Input Validation vulnerabilities in Android System Services Sukwon Choi scho668.
Published: USENIX HotBots, 2007 Presented: Wei-Cheng Xiao 2016/10/11.
Fuzzing Machine By Nikolaj Tolkačiov.
CSCE 548 Secure Software Development Risk-Based Security Testing
Security Testing Methods
Nessus Vulnerability Scan
Role of the Systems Analyst
Network Exploitation Tool
Fuzzing fuzz testing == fuzzing
Introduction to Information Security
Presented by Mahadevan Vasudevan + Microsoft , *UC-Berkeley
Open Source Robotics Vision and Mapping System
برنامه‌ريزي منابع انساني
Metadata The metadata contains
The role of the test organization in a Security Sensitive project
CULLEN ACHESON Samuel Garcia Zachary Blum
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
© Oxford University Press All rights reserved.
FOT: A Versatile, Configurable, Extensible Fuzzing Framework
Defensive Programming
Presentation transcript:

By Brandon Barton & Eric Van Horn

What is Backtrack 4? Operating system Collection of many security tools world’s leading penetration testing and information security auditing distribution Comes with hundreds of preinstalled tools

Information Gathering Backtrack comes with a number of tools for information gathering Number of search engine and data harvesting tools for developing a large database on any target Metagoofil Netmask

Network mapping Network mapping is study of the physical connectivity of the network Backtrack comes with numerous network mapping tools Amap Fping

Vulnerability identification Fuzzers Fuzz testing or fuzzing is a software testing technique that provides invalid, unexpected, or random data to the inputs of a program. If the program fails (for example, by crashing or failing built-in code assertions), the defects can be noted. Bunny the fuzzer Fuzzgrind