,Cyber Defense Competitions Club

Slides:



Advertisements
Similar presentations
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Advertisements

For further information computersecurity.wlu.ca
Honeypots Presented by Javier Garcia April 21, 2010.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
SIS - Security Lab Introductory Session University of Pittsburgh 2006.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Copyright 2010 Justin C. Klein Keane Using Kojoney Open Source Low Interaction Honeypot to Develop Defensive Strategies and Fingerprint Post-Compromise.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Computer Security and Penetration Testing
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
13Computer Intrusions Dr. John P. Abraham Professor UTPA.
Penetration Testing Training Day Capture the Flag Training.
C & Unix Final Session Review (… because I, too, can do PowerPoint …)
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
How to setup Genesis LC1 and Genesis Flex with the Buffalo Access Point to maximize wireless performance…
Network Security: Lab#4-2 Packet Sniffers J. H. Wang Dec. 2, 2013.
Honeypot and Intrusion Detection System
KFSensor Vs Honeyd Honeypot System Sunil Gurung
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
How to Deploy and Configure the Smart Net Total Care CSPC Collector
Chapter 9 Intruders.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
CNIT 125: Honeypot and Malware Presentation Alan Wennersten Jeffrey Tom.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
CACI Proprietary Information | Date 1 PD² v4.2 Increment 2 SR13 and FPDS Engine v3.5 Database Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead.
CACI Proprietary Information | Date 1 Upgrading to webMethods Product Suite Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8,
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
linkedIn Profile:
GNU and Linux.
Mininet and Openflow Labs
Virtual Machine and VirtualBox
Traffic Analysis– Wireshark Simple Example
Chapter 9 Intruders.
Penetration Testing Scanning
Leading Controls and Tools: Small Teams who can do more with little or no budget Jeremy Mio – Security and Research Manager.
Click to edit Master subtitle style
Introduction to Operating Systems
Linux Security Presenter: Dolev Farhi |
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Modern Honey Net An Introduction.
VMWare Workstation Installation
Hacking Unix/Linux.
Metasploit a one-stop hack shop
ECE544: Software Assignment 3
Sweetening Your Threat Intelligence with Automated Honeypots
6. Operating Systems Finger printing & Scanning
Chapter 27: System Security
12/6/2018 Honeypot ICT Infrastructure Sashan
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
Chapter 4: Protecting the Organization
Chapter 9 Intruders.
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
Traffic Analysis– Wireshark Simple Example
Virtual Machine and VirtualBox
Install MySQL Community Server and MySQL Workbench
Virtual Machine and VirtualBox
Virtual Machine and VirtualBox
Basic Dynamic Analysis VMs and Sandboxes
Penetration Testing & Network Defense
Honeyd Build it Create a script/program to simulate one
Intro Cyber Security Labs on GENI
Bethesda Cybersecurity Club
Presentation transcript:

,Cyber Defense Competitions Club Author: Alexander A. Rodriguez-Vargas Disclaimer: This club meeting and presentation is only provided for educational purposes and in no way do we recommend or encourage offensive activity outside of a sandboxed environment. We also own the devices that were used as targets in these scenarios.

Honeypots Decoy servers or systems setup to gather information regarding an attacker or intruder into your system. The Honey Pot system should appear as generic as possible. (example: Microsoft NT based system) You will want to make your Honey Pot an interesting site by placing "Dummy" information. Expect to spend some time making your Honey Pot appear legitimate so that intruders will spend enough time investigating and perusing the system so that you are able to gather as much forensic information as possible. https://www.sans.org/security-resources/idfaq/honeypot3.php

Honeypots http://www.windowsecurity.com/articles-tutorials/windows_os_security/Securing_Windows_2000_DNS_by_design_Part_1.html

Honeypot Selections The ULTIMATE Honeypot Distro: HONEYDRIVE3 Honeyd (very configurable) Kippo-Graph (ssh, collects scripts) Conpot (SCADA) Dionaea (Malware collector) LaBrea Kfsensor (Commercial Windows product) HoneyBot (Windows based) product The ULTIMATE Honeypot Distro: HONEYDRIVE3 https://bruteforce.gr/honeydrive

Kippo Download the ova file from sorceforge and import the VM into VirtualBox http://sourceforge.net/projects/honeydrive/ Boot the VM Follow instructions from the README.txt on the Desktop to start kippo In the command prompt, find your ipaddress Ifconfig Replace the ip address below with honeydrive’s. Browse to https://192.168.1.XXX/kippo-graph/ to view statistics: Top 10 ip addresses Top 10 passwords attempted to login etc

Scans & Attacks Scan the IP to check for open ports etc. nmap –sS –O --reason --max-retires=2 –T4 -sV –Pn –sC 192.168.1.XXX > nmap.txt Unzip your password list gzip –d /usr/share/wordlists/rockyou.txt.gz Bruteforce the ssh password with hydra hydra –v -l root –P /usr/share/wordlists/rockyou.txt 192.168.1.XXX ssh Login to the honeypot with ssh! Ssh root@192.168.1.XXX Then type the password you found through bruteforcing.

Honeypot References http://null-byte.wonderhowto.com/how-to/hack-like-pro-set-up-honeypot-avoid-them-0153391/ https://zeltser.com/modern-honey-network-experiments/ http://www.information-age.com/technology/security/123458520/how-set-cybersecurity-honeypot-your-business https://bruteforce.gr/honeydrive