Hacking Techniques & Intrusion Detection

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Work-based learning Click on the speaker on each slide to learn more!
 Acceptance testing is a user-run test that demonstrates the application’s ability to meet the original business objectives and system requirements and.
Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail.
Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail.
1 SOFTWARE TESTING Przygotował: Marcin Lubawski. 2 Testing Process AnalyseDesignMaintainBuildTestInstal Software testing strategies Verification Validation.
Project Management Shuffle Directions: take the definitions from the following cards and write a song using the tune from “Cupid Shuffle”
Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail.
Contractor Safety Management
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Vulnerability Assessment & Penetration Testing By: Michael Lassiter Jr.
Audit Planning and Documentation
Vulnerability Assessment Course Terms, Methodology, Preparation, Obstacles, and Pitfalls.
Network security policy: best practices
Introduction to Network Defense
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
S/W Project Management
Information Systems Security Computer System Life Cycle Security.
BUSINESS COMMUNICATION AND NEGOTIATION Radu RĂDUCAN.
7 - 1 Copyright  2003 Pearson Education Canada Inc. CHAPTER 7 Audit Planning and Documentation.
ISO 9001: 2000 Certified Audit Process What to do.
FCS - AAO - DM COMPE/SE/ISE 492 Senior Project 2 System/Software Test Documentation (STD) System/Software Test Documentation (STD)
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
VULNERABILITY ASSESSMENT FOR THE POLICE DEPARTMENT’S NETWORK.
2  Mission Statement.  Company’s overall purpose and direction, products, services and values.  Goals.  That accomplish the mission. E.g. 5 year plan.
Penetration Test
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
IT 499 Bachelor Capstone Week 4. Adgenda Administrative Review UNIT Four UNIT Five Project UNIT Six Preview Project Status Summary.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
WEC MADRID 18 TH MARCH 2004 ASTRAZENECA’S APPROACH TO SUPPLIER RISK MANAGEMENT.
Information System Project Management Lecture three Chapter one
The techniques involved in systems analysis Explanation of a feasibility study:Explanation of a feasibility study: –economic, –legal, –technical, –time.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
UNIVERSITY OF DAR ES SALAAM t Selection and Employment of Consultants Negotiations with Consultants; Monitoring Performance of Consultants; Resolving Disputes.
An Overview THE AUDIT PROCESS. MAJOR PHASES IN AN AUDIT Client acceptance and retention Establish terms of the engagement Plan the audit Consider internal.
Objectives Who I Am The Company I Interned With The Projects I Worked On Project Details How The Experience Relates To My Education Conclusions Drawn.
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
Planning meetingCertification audit, stage 1 Pre-audit (optional) Document review Prior to every certification audit a planning meeting is conducted where.
Hacking Techniques & Intrusion Detection
CHAPTER 2 SYSTEM PLANNING DFC4013 System Analysis & Design.
Headquarters U.S. Air Force
Proactive Incident Response
IT Service Transition – purpose and processes
Topic 5 Penetration Testing 滲透測試
Risk management.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Question 4-1 Which of the following statements concerning noncompliance by clients is correct?    A.  An auditor's responsibility to detect noncompliance.
Design and modeling 10 step design process
Systems Analysis and Design in a Changing World, 4th Edition
planning AICPA auditing standards state:
Ten-Stage Design Process
Audit Planning, Types of Audit Tests and Materiality
Fundamentals of Information Systems, Sixth Edition
CHAPTER 7 Audit Planning and Documentation
PREPARATION FOR GMP INSPECTION
Ten-Stage Design Process
The ORR/RA Pre-Visit and Other Prior Planning Items May 2005 Revision
Chapter 4 Systems Planning and Selection
Department of Community Development
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Project Management Chapter 11.
TECHNOLOGY ASSESSMENT
Management of Change GROUP HSE RULE (CR-GR-HSE-302)
Emergency & Crisis Management​ GROUP HSE RULE (CR-GR-HSE-701)
Presentation transcript:

Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail

# whoami Ali Al-Shemery Ph.D., MS.c., and BS.c., Jordan More than 14 years of Technical Background (mainly Linux/Unix and Infosec) Technical Instructor for more than 10 years (Infosec, and Linux Courses) Hold more than 15 well known Technical Certificates Infosec & Linux are my main Interests

What good is your firewall or IDS/IPS if I can grab your box? Physical Pentesting What good is your firewall or IDS/IPS if I can grab your box?

Outline – Physical Pentesting Intro. The Process Techniques

Overview A Physical Penetration Test identifies the security weaknesses and strengths of the client's physical security. The goal of the test is to demonstrate the existence or absence of deficiencies in operating procedures concerning physical security.

Continue… Did You Know? Physical Security is often overlooked in an organization Physical Security breaches can have the same impact as computer breaches Physical Security Attack & Penetration Tests should be conducted on high value facilities and locations annually Physical Security Attack & Penetration Tests should be conducted by qualified personnel with years of experience

The Process Building an Operating Team Project Planning Rules of Engagement Conducting Preliminary Research Evaluating Risk The Test Plan Legal Issues and Documentation

Building an Operating Team Operator – all are operators Team Leader – onsite/HQ Coordinator or Planner – offsite/HQ Social Engineer Computer Intrusion Specialist Physical Security Specialist Surveillance Specialist

Project Planning Plan your project, create a workflow to be sure that you cover all aspects of the assignment. A recommended approach (Wil Sopp): Receiving the assignment – contracts signed and certain legal formalities observed. Negotiating the Rules of Engagement – Define what you can and can’t do during testing and their purpose is usually to limit testers to a certain scope. Performing Preliminary Research – Pursue the initial IG phase. Determining Risk – Very important to accurately gauge the risk a project poses both to the company and to the team members executing it. Writing a Test Plan – A formal (but flexible) test plan is a good idea from both project management and legal perspectives. Gathering Equipment – Important for the team to take gear that’s appropriate to the test without being over encumbered. Providing documentation and legal requirements – Once the planning stage is complete you will have a not insignificant amount of documentation.

Rules of Engagement Determine areas of security the client considers to be weak and wants tested. Determine areas of testing the client wishes to avoid for legal reasons, such as close surveillance of staff. Agree on team members that will carry out testing (Clearances might not be given to all). Agree on test duration, or the maximum time permitted. Agree about the information given in advance {white, grey, black} box testing. Agree on the target assets (overall goals): something the team must acquire, identify, gain access to, or photograph. Examples include network operation centers, passwords or target personnel. Agree on test success, failure, and abortion circumstances. Agree on the actions to be taken directly following successful, failed and aborted tests. Determine a schedule for presentation and post testing report. After agreement is reached, document the RoE to be added to the project documentation.

Conducting Preliminary Research Human Intelligence (HUMINT). Signals Intelligence (SIGINT). Open Source Intelligence (OSINT). Imagery Intelligence (IMINT).

Evaluating Risk Team leader’s responsibility to determine what constitutes an acceptable level of project risk. If level of risk is too high then the RoE should be reassessed or the test should not be carried out. RISK acronym – COLE: Contractual Risks Unable to complete assingment Operational Risks Inexperienced team members, technical communication failure Legal Risks Getting arrested Environmental Risks Presence of machinery or high voltage Climbing and falling Guard dogs Extremes of heat or cold Confronting armed security

The Test Plan Strategic: Tactical: Operational: High-level view of the project that details the goals, assets, team members, potential COLE risks, and necessary equipment. Tactical: List of milestones and the order of completion. Operational: Requirements to complete each milestone and how its completion will affect the whole engagement.

Legal Issues and Documentation Includes but not limited to: RoE Test plan Signed contracts Copies of ‘get out of jail free’ cards Scan of official ID of operating team members (passport, driving license)

Techniques Practical physical security testing Site exploration Tactical approaches Tailgating to Gain Entry Clothes Maketh the Man Visiting a Nonexistent Employee Badge security Security mechanisms

SUMMARY The importance of physical penetration testing, and why it must not be overseen, Howto prepare for a physical pentesting, Techniques used for physical pentesting, Countermeasures, Mitigation, and Remediation for physical pentesting.

References [-] Lock picking info., http://www.lockwiki.com/index.php/Main_Page [-] Lock picking tools, http://toool.us/ [-] Learn Lock Picking, http://www.learnlockpicking.com [-] Video on Lock picking, http://video.google.com/videoplay?docid=- 8536478434720082857&ei=8sKpSrG0J5jqqwK4tsytAw&q=lock+picking+physica l+security&hl=en [-] Journal of Physical Security (JPS), http://jps.anl.gov/ [-] Hardware Tools for Physical Pentesting, http://www.darkreading.com/vulnerability- management/167901026/security/vulnerabilities/231600749/tech-insight- three-hardware-tools-for-physical-penetration-testing.html