Intro to Ethical Hacking

Slides:



Advertisements
Similar presentations
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions April 14, 2015 DRAFT1.
Advertisements

ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Introducing the Command Line CMSC 121 Introduction to UNIX Much of the material in these slides was taken from Dan Hood’s CMSC 121 Lecture Notes.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Computer Security and Penetration Testing
Front end GUI for PsExec, A fast and easy remote deployment utility.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
MIS Week 7 Site:
Port Scanning.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
Squiggle Lan Messenger.
Penetration Testing Training Day Capture the Flag Training.
MIS Week 13 Site:
HTTP HTTP stands for Hypertext Transfer Protocol. It is an TCP/IP based communication protocol which is used to deliver virtually all files and other.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Bonrix SMPP Client. Index Introduction Software and Hardware Requirements Architecture Set Up Installation HTTP API Features Screen-shots.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Port Scanning and Enumeration (NMAP)
Pipes and Redirection in Linux ASFA Programming III C. Yarbrough.
Lab 2: TCP /IP communication Southern Methodist University Bryan Rodriguez.
Trinity Uses Nmap, shouldn’t you?. From “The Art of War” "... knowing your enemy 100% of the time, you will win your battle 100% of the time, knowing.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Backdoors and Rootkits.
An Introduction to Designing, Executing and Sharing Workflows with Taverna Katy Wolstencroft myGrid University of Manchester IMPACT/Taverna Hackathon 2011.
Practice 4 – traffic filtering, traffic analysis
Basic Systems and Software. Were we left off Computers are programmable (formal) machines. Digital information is stored as a series of two states (1.
MIS Week 7 Site:
Agenda The Bourne Shell – Part I Redirection ( >, >>,
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
Monitoring Dynamic IOC Installations Using the alive Record Dohn Arms Beamline Controls & Data Acquisition Group Advanced Photon Source.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Internet Control Message Protocol (ICMP)
Protection (tools).
Intro to Ethical Hacking
How to convert a Demo to Multi-user
Port Scanning James Tate II
Development Environment
Sockets and Beginning Network Programming
Network Commands 2 Linux Ubuntu A.S.
Backdoor Attacks.
Java on the LEGO Mindstorms EV3
MCA – 405 Elective –I (A) Java Programming & Technology
Metasploit a one-stop hack shop
Remote Control and Advanced Techniques
Intro to Ethical Hacking
stdin, stdout, stderr Redirection
Tips to Manually Uninstall Norton Antivirus 2012.
Intro to Ethical Hacking
Cookies BIS1523 – Lecture 23.
Multi-host Internet Access Portal (MIAP) Enhancement Guide
Internet Control Message Protocol (ICMP)
Topic 5: Communication and the Internet
Files I/O, Streams, I/O Redirection, Reading with fscanf
Intro to Ethical Hacking
Intro to Ethical Hacking
A Distributed DoS in Action
Setting Up Firewall using Netfilter and Iptables
Building Web Applications
Configuring Internet-related services
Backtrack Metasploit and SET
Radoslaw Jedynak, PhD Poland, Technical University of Radom
More advanced BASH usage
Penetration Testing & Network Defense
Presentation transcript:

Intro to Ethical Hacking MIS 5211.001 Week 6 http://community.mis.temple.edu/itacs5211fall16/

Tonight's Plan NetCat DOS Batch Files MIS 5211.001

Netcat Netcat is a utility used by Penetration Tester and Hackers to establish network connections over UDP or TCP. Takes “Standard In”, and sends it across the network as data Receives network data and puts it on “Standard Out” Messages from netcat itself go on “Standard Error” MIS 5211.001

A Word About stdin, stdout, and stderror These are terms from programming that refer to expected streams in software As an example stdin would be the keyboard Stdout would be the screen Stderror may be dropped or sent to logging From: http://en.wikipedia.org/wiki/Standard_streams#Standard_error_.28stderr.29 MIS 5211.001

Netcat in Linux and Windows In Linux netcat is typically installed and can be activate simply by typing “nc” at the command line In Windows, the file is not installed A version can be downloaded from: http://nmap.org/ncat/ Once downloaded and extracted type “ncat” at the command line to get started Note – AV will likely automatically remove it MIS 5211.001

Simple Demo MIS 5211.001

Netcat Structure Basic format is Link to SANS Cheat Sheet Send Receive $nc [Target IP] [Remote Port] Receive $nc [flag(s)] [Local Port] Assumes TCP unless –u flag is set forcing to UDP Link to SANS Cheat Sheet URL: http://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf MIS 5211.001

Pipes So, netcat can send what I type to another machine. So what! The pipe commands “|”, “>”, and “<“ let you do more interesting things For example, transfer a file between systems $nc –l –p [Local Port] > [Out File] Listen on local port and store result in file $nc –w3 [TargetIP] [Port] < [In File] Push file to target IP on port See SANS Cheat Sheet on previous page for more examples MIS 5211.001

Port Scanning You can even use netcat as a simple port scanner Example $nc –v –n –z –w1 [Target IP] [Starting Port] – [Ending Port] Systematically attempts to connect on each port within the defined range Note: -v – Verbose -n – Do not resolve names -z – Do not send data -w1 – Wait no more then one second to connect MIS 5211.001

DOS Batch Scripting First off, almost everything I present here started at: http://blog.commandlinekungfu.com/ MIS 5211.001

Reading Files w/o Editor Similar to Linux, try these: “type test.txt” Or “type *.txt” MIS 5211.001

Finding Other Machines Try: “ipconfig /displaydns I added “| more” to avoid overflow MIS 5211.001

Finding Other Machines Try “arp –a” MIS 5211.001

Find “Running” Services Try “sc query” MIS 5211.001

Find “All” Service Try “sc query state=all” MIS 5211.001

Details on a Service Try “sc qc [service_name] MIS 5211.001

Start/Stop Services Try “sc start [service_name]” or “sc stop [service_name] Remember, you can use “sc query state= all” to find the service names If you have access to a similar machine, you could also look at the GUI MIS 5211.001

Basic Coding For Loops FOR /L -> Counter FOR /F - > Iterates through a file MIS 5211.001

FOR /L -> Counter Example FOR /L %i in ([Start],[Step],[Stop]) do [command] Translates to FOR /L %i in (1,1,5) do echo %i MIS 5211.001

FOR /F - > Iterates through a file FOR /F (“options”) %i in ([text_file]) do [command] Translates to: FOR /F %i in count.txt do echo %i MIS 5211.001

Sending to Outfile Can add “ >> output.txt” to redirect to an output file Try “FOR /F %i in (count.txt) do echo %i >> output.txt” MIS 5211.001

Reference Lots more at: http://blog.commandlinekungfu.com/ MIS 5211.001

Questions ? MIS 5211.001