Intro to Ethical Hacking

Slides:



Advertisements
Similar presentations
Assessments, Audits, and Penetration Tests, Oh My Ira Winkler, CISSP
Advertisements

Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Penetration Testing Anand Sudula, CISA,CISSP SSA Global Technologies, India Anand Sudula, CISA,CISSP SSA Global Technologies, India.
Security Issues and Challenges in Cloud Computing
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Vulnerability Assessment & Penetration Testing By: Michael Lassiter Jr.
Vulnerability Assessments
Network security policy: best practices
The Business of Penetration Testing
Penetration Testing.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
Website Hardening HUIT IT Security | Sep
MIS  Wade T Mackey  
SEC835 Database and Web application security Information Security Architecture.
Information Systems Security Computer System Life Cycle Security.
A Framework for Automated Web Application Security Evaluation
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Software Security Testing Vinay Srinivasan cell:
MIS Week 1 Site:
Penetration Test
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
MIS Week 6 Site:
Topic 5: Basic Security.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
MIS Week 1 Site:
Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
MIS Week 1 Site:
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Defining your requirements for a successful security (and compliance
Information Systems Security
Intro to Ethical Hacking
Professionalizing Penetration Testing
Topic 5 Penetration Testing 滲透測試
Seminar On Ethical Hacking Submitted To: Submitted By:
ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya
Security Testing Methods
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
Advanced Penetration Testing
Compliance with hardening standards
MCSA VCE
John Butters Running Tiger Teams
Intro to Ethical Hacking
Everything You Need To Know About Penetration Testing.
CIS 333Competitive Success/tutorialrank.com
CIS 333 RANK Lessons in Excellence-- cis333rank.com.
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
Web Penetration Testing and Ethical Hacking Capture the Flag
Malware, Phishing and Network Policies
Risk Assessment = Risky Business
Intro to Ethical Hacking
Intro to Ethical Hacking
Forensics Week 12.
Validating Your Information Security Program (ISP 3 of 3)
Computer Emergency Response Team
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Test 3 review FTP & Cybersecurity
PT0-001 Exam Questions 2019
ECCouncil v10 Certified Ethical Hacker Exam (CEH V10) Get certified in one attempt!
Presentation transcript:

Intro to Ethical Hacking MIS 5211.001 Week 1 Site: http://community.mis.temple.edu/mis5211sec001fall17/

Introduction Wade T Mackey Wade.mackey@temple.edu 717-682-2925 MIS 5211.001

Passing This Course 20% of the grade is based on participation. Make sure you post and comment in the blog. 30% of the grade is based on assignments. Do them and turn them in. If you have a conflict or issue with meeting a particular deadline, talk to me before hand. MIS 5211.001

Course Plan MIS 5211.001 Week Topic Assignments 1 Full Overview of Course, Philosophy of Ethical Hacking and Penetration Testing, and the hacking process.   2 1 hr TCP/IP and Network Architecture and its impact on the process of hacking. Google Hacking Quiz 3 Reconnaissance – Concepts of reconnaissance used to obtain basic, high level information about a target organization, often considered information leakage, including but not limited to technical and non-technical public contacts, IP address ranges, document formats, and supported systems. 4 Vulnerability scanning and analysis of results Assignment presentation Reconnaissance exercise using only publicly available information, develop a profile of a public company or organization of your choosing. 5 System and User enumeration Scanning exercise targeted against only systems you personally own, develop a profile of the targeted machine or machines. 6 Sniffers 7 NetCat Hellcat Exam 8 Social Engineering, Encoding, and Encryption 9 Malware including Trojans, Backdoors, Zero-days, Virus, Worms, and Polymorphic malware 10 Web application hacking, Intercepting Proxies, and URL Editing 11 SQL injection Intercepting Proxy exercise targeted against a public website of your choice. Only normal website activity is to be profiled. Under no circumstances shall injection techniques be used. 12 Web Services 13 Evasion Techniques 14 Review of all topics and wrap up discussion MIS 5211.001

About the Course Our focus will be to provide you with an understanding of the process involved in penetration test and the primary tools sets used Organized around the workflow of a professional tester Tips for avoiding common pitfalls MIS 5211.001

Caution The tools and techniques discussed and used in this course should only be used on systems you personally own, or have written permission to use. Some of the tools used have the potential to disrupt or break computer systems. MIS 5211.001

Ethical Hacking What is hacking? What is Ethical about Hacking MIS 5211.001

My Definition A hacker explores the difference between how something is supposed to work and how it really works. MIS 5211.001

Wikipedia’s Definition In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. MIS 5211.001

Mindset Successful penetration testers look at the world through a different lens They think outside the box They do things differently They don’t look at the glass as half full or half empty, instead they look at the glass and think “If I hit the glass just right, I can crack it and drain out just what I want. MIS 5211.001

Mindset (Continued) Successful penetration tester also need to have the following work habits Methodical Thorough Careful Ethical habitual note taker and documentation fiend If you can’t duplicate a finding, you didn’t find it! MIS 5211.001

Threat vs. Vulnerability vs. Risk Threat: Any circumstance or event with the potential to adversely impact organizational operations. Vulnerability: Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source. Risk: A measure of the extent to which an entity is threatened by a potential circumstance or event A risk exist when a threat actor (or agent) targets a vulnerability Source: NIST SP 800-30 r1 MIS 5211.001

Threat vs. Vulnerability vs. Risk Continued A penetration tester: identifies vulnerabilities Evaluates likely threats Recommends Mitigation Activities Recommends corrective actions In other words, you don’t just say you found something bad. You also have to explain why it is bad and suggest how to fix it. MIS 5211.001

General Types of Attacks Active vs Passive Attacks violate CIA (Confidentiality, Integrity, or Availability. Active Attack Manipulates or changes systems or information Examples – Malware, Spear Phishing, Man-in-the-Middle Passive Attack No manipulation or Change Monitoring only Example – Sniffing wireless traffic MIS 5211.001

General Types of Attacks Internal vs External Launched from within an organization Typically considered insider threat Could also be a trespasser External From the internet From partners on leased lines From exposed WiFi MIS 5211.001

Penetration Testing Focused on finding vulnerabilities Uses many of the same tools and techniques as criminals Penetration Testing is a subset of Ethical Hacking Penetration Testing and Ethical Hacking are often used interchangeably Penetration Testing usually means going a bit further then Ethical Hacking in order to prove a system can be breached and data obtained MIS 5211.001

Security Assessments Generally focused on identifying vulnerabilities without actually compromising systems Vulnerability Scanning Architectural Reviews Configuration Reviews Code Reviews Audits MIS 5211.001

Benefits of Assessments Unlikely to crash systems Staff performing these evaluations often bring different and unique skill sets to the table Different perspectives on the organization MIS 5211.001

Why Do We Do This Find vulnerabilities before the “Bad” guys do Ensure management understands the risks in their systems Informs Security Operations as to what to look for in their monitoring systems Security Operations is often not informed of work to test if appropriate monitoring is in place MIS 5211.001

What To Do With Findings Document the findings From the client perspective: Document issues Develop action plans Mitigate OR Risk Acceptance MIS 5211.001

Types of Tests Infrastructure (Network) Web Dial-Up (War Driving) Wireless Social Engineering Physical Application MIS 5211.001

Phases Reconnaissance Scanning Exploitation What technology is in use in the target environment Scanning What vulnerabilities exist within the target environment Exploitation Can the vulnerabilities be used MIS 5211.001

Going to Far Malicious attackers go further Maintaining access Covert Channels Exfiltrating Data Covering Tracks MIS 5211.001

Iteration and Following Hunches Phases are not usually this clean Some jumping around is to be expected Skilled testers often get a feel for where vulnerabilities may exist based on their experience in similar systems MIS 5211.001

Limitations Penetration Testing can’t find everything Limited time Limited scope Some vulnerabilities are only exposed in specific conditions that may not exist at the time of testing Testers have different strengths and weaknesses Some techniques will be off-limits due to potential negative impacts on a target environment MIS 5211.001

Limitations Known Vulnerabilities Tool sets only find known vulnerabilities Few tester have the skill set to find unknown vulnerabilities and develop custom attacks Even fewer organizations want to fund this level of investigation May violate terms and conditions of software or hardware licensing MIS 5211.001

Public Methodologies A number of groups publish methodologies for testing systems for vulnerabilities Can be useful as guidelines for establishing how you pursue testing Examples: Open Source Security Testing Methodology Manual (OSSTMM) http://www.isecom.org/research/osstmm.html OWASP Testing Framework https://www.owasp.org/index.php/The_OWASP_Testing_Framework NIST SP800-115 http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf Penetration Testing Framework http://www.pen-tests.com/penetration-testing-framework.html Penetration Testing Framework 0.59 http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html MIS 5211.001

Infrastructure for Penetration Testing Software Tools Hardware Network Infrastructure We will cover some basics Adjust to suite need Dependent on type of targets and tests MIS 5211.001

Operating Systems Penetration Testers need to shift between multiple operating systems Some tools are only available on one platform Some tools may be available on multiple platforms, but work better (or worse) on specific platforms At a minimum, some Linux and Windows proficiency is needed MIS 5211.001

Software for Testing in this Course Kali 2.0 BackTrack Reborn according to Offensive Security, the providers of Kali Available at: http://www.kali.org/downloads/ Kali is large (2.9G), so give yourself some time VMWare Player Free for personal use, scroll down http://www.vmware.com/products/player/ VMWare Workstation is available from Temple’s software repository (Good for 1 year). MIS 5211.001

Other Free Tools Many other tools are available A handful will be required for this class. I will cover them when we get there. If you go on to do penetration testing, you will likely collect a number of tools Be careful Research tool before downloading Run them in a test environment first MIS 5211.001

Some Sources of Tools and Exploits Exploit Database http://www.exploit-db.com/ Packet Storm http://packetstormsecurity.com/ Pentest-Tools https://pentest-tools.com/home Security Audit Systems http://www.security-audit.com/blog/penetration-testing-tools/ I am not endorsing these sites, just making you aware of them. MIS 5211.001

Vulnerability Research US-CERT https://www.us-cert.gov/ National Vulnerability Database http://nvd.nist.gov/home.cfm Mitre CVE http://cve.mitre.org/ Exploit Database http://www.exploit-db.com/ CVE Details http://www.cvedetails.com/ MIS 5211.001

Commercial Tools Many commercial tools are available, for a price Tenable - Commercial version of Nessus Qualys – Vulnerability Scanner (alternative to Nessus) Rapid7 – Commercial Metasploit, Nexpose Vulnerability Scanner Core Security – Core Impact HP – Fortify Code Scanner MIS 5211.001

In House Tools Talk to your developers May have already built scripts and tools May already own some commercial tools that can be leveraged MIS 5211.001

Going Further With Labs Not needed for this course Consider building out a hardware lab Free tools should be tested in a lab before using them in testing Mimic what you expect to test Mix up OSs Does not need to be new equipment, recycle Good environment to continue learning MIS 5211.001

Machines for Testing Dedicated machines for conducting tests Not used for normal activity Do not keep any sensitive information May be tied up for long periods of time doing scanning If you expect to do a great deal of scanning, consider a separate server dedicated to scanning MIS 5211.001

Virtual Test Machines Host Machines VMWare Player VMWare Workstation ESXi ZEN MicroSoft Virtual PC Guest machines may be ideal for testing Can be built for test Can be reset if corrupted Can be deleted after testing Can be duplicated if additional guests are need We will go over setting up VMWare for testing in week three MIS 5211.001

ISPs Many ISPs monitor traffic for malicious activity Inform your ISP prior to starting Pen Testing May need to move to a business account May need to “negotiate” with the ISP MIS 5211.001

Cloud Cloud can be very effective for replicating Distributed Denial of Service attacks Will require permission form cloud provider or your account may be closed Cloud providers are reluctant to host Penetration Testing activities May be possible after some negotiations MIS 5211.001

Next Week Remainder of week 1 TCP/IP and Network Architecture Google Hacking MIS 5211.001

Questions ? MIS 5211.001