Intro to Ethical Hacking

Slides:



Advertisements
Similar presentations
Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
Advertisements

System Security Scanning and Discovery Chapter 14.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Intrusion Detection Systems and Practices
IT Security Doug Brown Jeff Bollinger. What is security? P.H.P. People Have Problems Security is the mitigation and remediation of human error in information.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
07 December 2009Slide 1 of 1207 December 2009Slide 1 of 12 SQL Injection Primer By Nicole Gray, Cliff McCullough, Joe Hernandez.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
07 December 2009Slide 1 of 9 SQL Injection Primer By Nicole Gray, Cliff McCullough, Joe Hernandez.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 5 Network Defenses.
Department Of Computer Engineering
MIS Week 3 Site:
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Welcome to the Southeastern Louisiana University’s Online Employment Site Applicant Tutorial!
GOOGLE HACKING FOR PENETRATION TESTERS Chris Chromiak SentryMetrics March 27 th, 2007.
Classroom User Training June 29, 2005 Presented by:
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 2 This material was developed by Oregon Health.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 6: Name Resolution.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
MIS Week 3 Site:
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Copyright Security-Assessment.com 2005 GoogleMonster Using The Google Search Engine For Underhand Purposes by Nick von Dadelszen.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Footprinting and Scanning
CS3695 – Network Vulnerability Assessment & Risk Mitigation – Supplemental Slides to Module #2 Footprinting and Reconnaissance Intelligence Gathering CEH.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Google Hacking University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Microsoft Windows 7 - Illustrated Unit G: Exploring the Internet with Microsoft Internet Explorer.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Modern information gathering Dave van Stein 9 april 2009.
Google Hacking: Tame the internet Information Assurance Group 2011.
Tools We Are Going To Use
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Web and Proxy Server.
ArcGIS for Server Security: Advanced
Penetration Testing Reconnaissance 2
Chapter 7: Using Windows Servers
Core ELN Training: Office Web Apps (OWA)
CompTIA Security+ Study Guide (SY0-401)
Footprinting and Scanning
Security Testing Methods
CONNECTING TO THE INTERNET
Browsing and Searching the Web
Intro to Ethical Hacking
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
Footprinting and Scanning
CompTIA Security+ Study Guide (SY0-401)
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
DHCP, DNS, Client Connection, Assignment 1 1.3
Intro to Ethical Hacking
Intro to Ethical Hacking
Learning objectives By the end of this unit you should: Explain
Firewalls Jiang Long Spring 2002.
Acknowledgement Content from the book:
Intrusion Detection system
The Art of Passive Recon
Windows Name Resolution
Designing IIS Security (IIS – Internet Information Service)
Protection Mechanisms in Security Management
Presentation transcript:

Intro to Ethical Hacking MIS 5211.001 Week 3 Site: http://community.mis.temple.edu/mis5211sec001fall17/

Tonight's Plan Network Components (Continued) Google Hacking Reconnaissance MIS 5211.001

Proxies Intermediary between client machines and the rest of the network or internet Can function as a NAT device May be an embedded function of a firewall or may be stand alone Uses Content filtering Logging and/or monitoring Can obfuscate internal network details

Reverse Proxies Similar to proxy, but typically sits in front of servers Uses Hides details of server infrastructure Can perform SSL termination function Can reduce server load by caching Can be embedded in a load balancer or firewall, or may be a stand-alone device

DNS Domain Name System Basically the phone book for the internet Consists of a tree of domain names Example Root -> .edu -> temple.edu Basically the phone book for the internet

Servers Examples File Web Application Database Log

Typical Web Arrangement

Security Technologies Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS) Network Behavioral Anomaly Detection (NBAD) Data Loss Prevention (DLP) Host Intrusion Detection (HIDS) Host Intrusion Prevention (HIPS) Baseline and Host File Integrity

IDS and IPS Analyzes packets and matches to known signatures to either alert or block traffic Basically a burglar alarm for the network

NBAD Network Flow Analysis Flow is metadata about network traffic passing through the infrastructure System profiles “Normal” behavior and alerts on deviation from normal

DLP Monitors for activity against “sensitive” data. Can be on servers and hosts Can be on network Typically knows what confidential or personally identifiable information PII looks like Format of Social Security Numbers Format of account numbers Key words like Confidential, Account, etc…

HIDS and HIPS Similar to IDS and IPS, but resides on individual servers or workstations Augments AV software Can generate a lot of noise Can interfere with Scanning and Penetration Testing

Baseline and Host File Integrity Establishes a baseline configuration for servers and monitors for deviation Develops signature for key files on systems and monitors for change Can help ensure systems stay configured as desired. Last line of defense to detect compromise of a system.

Google Hacking Search Bar Commands - Site: Filetype: Inurl: Intitle: Intext: Allinurl: Allintext: Search Terms MIS 5211.001

- Simple one that tells google to not include items that match what comes directly after “-” Example: Hacking –ethical – gives all results that include information about hacking as long as they do not include the term “ethical” MIS 5211.001

Site: Site: restricts searches to a specific site Examples Site:edu – Restricts searches to only sites ending in .edu Site:temple.edu – Restricts searches to a specific top level site Site:mis.temple.edu –Restricts searches to a sub-site MIS 5211.001

Filetype: Restricts searches to a specific file type Examples Filetype:pdf – Only responds with sites linked to Adobe documents with file extension of pdf Filetype:xls – Only responds with sites linked to Microsoft spreadsheets documents with file extension of xls Filetype:xlsx – Only responds with sites linked to Microsoft spreadsheets documents with file extension of xlsx – Excel’s newer file format MIS 5211.001

Inurl: Restricts searches to sites where specific word or phrase is in the url Examples inurl:"/root/etc/passwd“ inurl:admin inurl:j2ee/examples/jsp inurl:backup MIS 5211.001

Intitle: Restricts searches to sites where specific words are used in the title of a page Examples intitle:index.of intitle:"Test Page for Apache" intitle:"Apache Status" intitle:"PHP Explorer" MIS 5211.001

Intext: Restricts results to documents containing term in the text Examples intext:"root:x:0:0:root:/root:/bin/bash" intext:"SteamUserPassphrase=" intext:"SteamAppUser=" -"username" -"user" intext:"Usage Statistics for” MIS 5211.001

Allinurl: Restricts results to those containing all the query terms you specify in the URL Examples allinurl:/hide_my_wp= allinurl:"/main/auth/profile.php" allinurl:"owa/auth/logon.aspx" allinurl:forcedownload.php?file= MIS 5211.001

Allintext: Restricts results to those containing all the query terms you specify in the text of the page Examples: allintext: /iissamples/default/ allintext: "Please login to continue..." allintext:"Browse our directory of our members top sites or create your own for free!" allintext:"fs-admin.php" MIS 5211.001

Search Terms Key search terms “index of /” “Please re-enter your password it must match” MIS 5211.001

Google Hacking References GoogleGuide http://www.googleguide.com/advanced_operators_reference.html Exploit Database http://www.exploit-db.com/ Wikipedia http://en.wikipedia.org/wiki/Google_hacking Google Hacking Volume 3 https://www.amazon.com/Google-Hacking-Penetration-Testers-Third/dp/0128029641/ref=dp_ob_title_bk MIS 5211.001

Reconnaissance Attacker gathers publicly available data People Corporate culture Technologies in use Terminology This is an important step as it will help focus later activities MIS 5211.001

Inventory Maintain an inventory of what you find Keep a log bog Create a spreadsheet Whatever works for you Record key information IP Addresses Target names Search queries used OSs in use Known vulnerabilities Any passwords found MIS 5211.001

More on Inventory Leave room to annotate future information that may be discovered as you go Examples: Open ports from port scanning Search from compromised hosts Etc… MIS 5211.001

Competitive Intelligence Think like a business competitor Lines of business Major products or services Who’s in charge Officers VPs Press Releases Where are their physical locations Who are the major competitors in there market place The same kind of information you would gather for a job interview. MIS 5211.001

Search Engines Don’t just use Google Bing Yahoo Ask DuckDuckGo All search engines filter data, but they don’t all filter the same way MIS 5211.001

Google w/ “-” Combine techniques from Google Hacking Site:temple.edu -www.temple.edu MIS 5211.001

Older Versions of Websites WayBack Machine http://archive.org/web/web.php MIS 5211.001

Open Job Posting Job requirements can often provide insight into technologies in use, and where staffing shortages may result in weaknesses Check multiple sites Monster.com Dice.com Organizations site http://www.temple.edu/hr/departments/employment/jobs_within.htm Local job sites http://regionalhelpwanted.com/philadelphia-jobs/?sn=83 MIS 5211.001

People LinkedIn Facebook MIS 5211.001

Don’t Forget About Maps Google Maps MapQuest Google Earth MIS 5211.001

Whois Whois Database to lookup domain name, IP address and who registered the address Web based or Command Line whois google.com http://www.networksolutions.com/whois/index.jsp MIS 5211.001

ARIN American Registry for Internet Numbers Regional Internet Registry for US, Canada, and many Caribbean islands ARIN is one of five regional registries Provides services related to the technical coordination and management of Internet number resources MIS 5211.001

ARIN Results MIS 5211.001

ARIN MIS 5211.001

DNS Querying DNS Server Examples By domain name Interactive Nslookup temple.edu OR nslookup ns1.temple.edu Interactive Nslookup Followed by prompts See next slide Type exit to get out of interactive mode MIS 5211.001

DNS MIS 5211.001

Dig (Domain Information Groper) The Dig command is used to gather additional DNS information May also be used to make zone transfers. Zone transfers may include details around other assets within an organization. CAUTION, don’t go further then basic dig command on the next page as you may start triggering alerts in more security focused organizations. MIS 5211.001

Dig Example: MIS 5211.001

More on Dig http://www.thegeekstuff.com/2012/02/dig-command-examples/ http://www.cyberciti.biz/faq/linux-unix-dig-command-examples-usage-syntax/ MIS 5211.001

Windows Dig Dig is available for windows 7 Site: http://www.isc.org/downloads/bind/ MIS 5211.001

DNS Query Websites http://www.dnsstuff.com/tools http://dnsquery.org/ http://network-tools.com/nslook/ MIS 5211.001

More Tools Sensepost https://github.com/sensepost BiLE-Suite – The Bi-directional Link Extractor A suite of perl scripts to find targets related to a given site MIS 5211.001

Google Cache The little green down arrow MIS 5211.001

Google Cache &strip=1 – It’s magic Right click the cache button and copy shortcut Paste short cut into notepad and append &strip=1 to the end Copy and paste into URL Now you get Google’s cache without leaving a footprint in the target servers logs MIS 5211.001

Google Cache (Example) Without &strip=1 MIS 5211.001

With &strip=1 MIS 5211.001

Due for Next Week 1st formal assignment From Syllabus (student presentations) Reconnaissance exercise using only publicly available information, develop a profile of a public company or organization of your choosing You may work in teams, or separately One to two page Executive Summary Short (no more then three slides, no welcome slide) presentation See “Exercise Analysis” tab for more details MIS 5211.001

Next Week Scanning MIS 5211.001

Questions ? MIS 5211.001