Kennesaw State University

Slides:



Advertisements
Similar presentations
Module XIV SQL Injection
Advertisements

Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Technical Training: DIR-615
Securing a Wireless Network
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Hacking Windows 2K, XP. Windows 2K, XP Review: NetBIOS name resolution. SMB - Shared Message Block - uses TCP port 139, and NBT - NetBIOS over TCP/IP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Honeypot and Intrusion Detection System
Module 14: Configuring Server Security Compliance
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
OS Exam – Domain 4 Networks Fall, Domain 4 Sections 4.1 – Identify the networking capabilities of Windows. Given configuration parameters, configure.
Small Business Security Keith Slagle April 24, 2007.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NetTech Solutions Protecting the Computer Lesson 10.
Footprinting and Scanning
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Windows Administration How to protect your computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Computer Security Keeping you and your computer safe in the digital world.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Hacking Windows.
CITA 352 Chapter 6 Enumeration.
Critical Security Controls
Footprinting and Scanning
Chapter 6 Application Hardening
Backdoor Attacks.
Secure Software Confidentiality Integrity Data Security Authentication
Nessus Vulnerability Scan Report
Wireless Network Security
Chapter 11: It’s a Network
Home Computer Security
Footprinting and Scanning
Security in Networking
Information Security Session November 11, 2004
Information Security Session October 24, 2005
Intro to Ethical Hacking
Intro to Ethical Hacking
Is your computer being used against you while you sleep?
Web Servers / Deployment
Implementing Client Security on Windows 2000 and Windows XP Level 150
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
How hackers do it Ron Woerner Security Administrator CSG Systems, Inc.
6. Application Software Security
Presentation transcript:

Kennesaw State University How To Hack Windows Brent Williams MCSE, CNE, A+, N+, XP-MCP brwillia@kennesaw.edu Kennesaw State University (Atlanta, Georgia)

Agenda Why Talk About Hacking? Hacking Scenarios Utilities, Techniques, and Ideas Preventive Methods New Threats

Hackers Know… They Look for Targets of Opportunity Most System Administrators are Self-Taught Most Don’t Know of Basic Security Issues in Windows Many Systems are Left Vulnerable

Think Like a Hacker (or script-kiddie, if you prefer!)

Hacking Steps Casing the Establishment Public Sources Social Engineering Network Hacking (Attack a Server) Information Retrieval System Damage System Hacking (Attack a PC)

NETWORK ATTACK

Footprinting: Target Acquisition Visit Their Web Site http://www.kennesaw.edu http://its.kennesaw.edu/netsoft/prodnov.shtml http://its.kennesaw.edu/net/net.shtml Open Source Search – People www.allwhois.com www.arin.net (130.218) Sam Spade Nslookup Tracert Visual Route

Scanning Ping sweeps Look for Ping Ultrascan Superscan WS_Ping (Ipswitch) Look for Port 80 Port 139 and 445 Port 21

Protect and Check Firewall Software Shields Up? www.zonealarm.com www.networkice.com www.norton.com Shields Up? www.grc.com www.firewallcheck.com

Decide How to “Break in” Use a Web Browser and Exploit a Weakness Buffer overflow (plant Netcat) Unchecked Data Attach Use a Null Connection Net Use \\ip\ipc$ “” /u:”” Look for Shares \\ip address or \\server name

Example: Windows Enumeration (What You Want) Identify Valid User Accounts Identify Group Membership Find Poorly Protected Shares Tools… Winfingerprint Superscan Dumpsec

Example: Windows Enumeration (Windows Can be Vary Easy!) Get the User IDs, Groups, etc. DumpACL – www.somarsoft.com - Wow! LDAP query – Dump Accounts and Groups on a 2000 Server Tool is on the Windows 2000 Server CD!

Example: Get a Password Brute Force Attack More Elegant Tools L0PHTCRACK LC3/LC4

Easy Hacks Shares Most users don’t know how to use NTFS Default permission in NT/2000 is EVERYONE has FULL CONTROL Changed in XP to EVERYONE has READ

Protecting Windows Servers Get and Run the MS Baseline Security Analyzer Use Policies Latest Service Packs and patches Weekly or automatic http://windowsupdate.microsoft.com Firewall Software Learn how to use NTFS permissions

Wireless Hacking Wireless LANs are everywhere Business, Schools, Homes By Default, they are Open! Easy to Find – Netstumbler Warchalking Protection is limited WEP: Wired Equivalent Privacy – can be hacked - airsnort New Protection Methods 802.1x

WORKSTATION ATTACK

Basic Windows 95/98 PWL file Document Passwords Keystroke Logging Your Admin Password is All-Over-the-Place! Easily copied to a floppy Document Passwords www.lostpassword.com www.lostpasswords.com Keystroke Logging

Workstation Attack Prevention Firewall – especially on cable or DSL Limit Shares - Use Passwords Make Document Passwords LONG Be aware of PWL files

Windows XP Professional Attacks More secure out of the box Use Policies Know how to use NTFS Limit Shares Don’t turn on IIS Use the built in firewall (or other)

SpyWare New threat Visit to Web Site Installs SpyWare Used to Mine Personal Info Destabilizes PC Get SpyBot

Vendors and Politicians Fail Us Why do Email and Web Clients allow software to install (without a prompt)? Why not put network access in a “sandbox”? Why are web sites allowed present misleading “User Agreements” What will we do about HTML?

Web Sites for Tools www.2600.com www.hackersclub.net www.hackingexposed.com

Summary Get Some Training! Hacking Tools are Plentiful Simple to Use Evolving You Must Expect Attacks on All Systems Do the Basics – That Stops 99% of Attacks!

This Presentation Available Visit http://edtech.kennesaw.edu/brent See Our Course Schedule at http://edtech.kennesaw.edu

Add N-stealth Pest Patrol Nessus Retina Check Web Sites Check Edtech2000 server Install LC3/LC4 on laptop Keystroke Logger detection