COMP1321 Digital Infrastructures

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
System Security Scanning and Discovery Chapter 14.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
COEN 252: Computer Forensics Router Investigation.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
EC-Council’s Certified Ethical Hacker (CEH) Richard Henson May 2012.
Forensic and Investigative Accounting
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 6: Packet Filtering
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
COMP1321 Digital Infrastructure Richard Henson February 2014.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
COMP3371 Cyber Security Richard Henson University of Worcester November 2015.
Web Server.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
Footprinting and Scanning
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
COMP1321 Digital Infrastructures Richard Henson University of Worcester April 2016.
COMP1321 Digital Infrastructure Richard Henson March 2016.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Modern information gathering Dave van Stein 9 april 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Defining Network Infrastructure and Network Security Lesson 8.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester December 2009.
VCE IT Theory Slideshows
Security fundamentals
Application Layer Functionality and Protocols Abdul Hadi Alaidi
CompTIA Security+ Study Guide (SY0-401)
COMP3371 Cyber Security Week 10
Instructor Materials Chapter 5 Providing Network Services
Footprinting and Scanning
Systems Security Keywords Protecting Systems
Richard Henson University of Worcester November 2016
Network Wiring and Reference
Unit 4: Transport protocols
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
Networking for Home and Small Businesses – Chapter 6
Introduction to Networking
Footprinting and Scanning
Welcome To : Group 1 VC Presentation
Networking for Home and Small Businesses – Chapter 6
CompTIA Security+ Study Guide (SY0-401)
Richard Henson University of Worcester November 2017
I. Basic Network Concepts
Learning objectives By the end of this unit you should: Explain
Firewalls Routers, Switches, Hubs VPNs
Lecture 2: Overview of TCP/IP protocol
COMP3371 Cyber Security Week 8
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
Computer Networks Protocols
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

COMP1321 Digital Infrastructures Richard Henson University of Worcester April 2018

Week 22: “Offensive” security and ethical hacking Objectives: Explain the principles of hacking ethically Explain “Footprinting” and reconnaissance from a penetration testers perspective Use of vulnerability/penetration testing to passively” scan networks & check access to the organisation’s network (and information about it!) from outside Exploit Known vulnerabilities through specific unguarded TCP ports “

Ethical Hacking Principles Hacking is a criminal offence in the UK covered through The Computer Misuse Act (1990) tightened by further legislation (2006) It can only be done ”legally” by a trained (or trainee) professional a computing student would be considered in this context under the law

Ethical Hacking principles Even if it is legal… doesn’t mean it is ethical! Professionals only hack without owner’s permission if there is reason to believe a law is being broken if not… they must ask permission otherwise definitely unethical (and possibly illegal)

Ethical Hacking Principles What is “hacking”? breaching a computer system without permission How is it done? using software tools to get through the security of the system also called penetration testing (again… if done with permission…)

Penetration Testers Toolkit Many penetration testing tools available Also a body of knowledge that shows how to use them… Together, provide the expertise to penetration test a client’s site but this should only be undertaken with the client’s permission…

Preparing to use a Toolkit Ethical Hacking Professionals need to be familiar with both Windows Server, and Linux To fully engage with principles of penetration testing,install the following as virtual machines on your own computer: Windows 2008 Server Linux, with Backtrack (as VM) … Remember: this should only be used ethically! Instead, you may wish to just take an overview (plenty of excellent youtube videos)

What and Why of “Footprinting” Definition: “Gathering information about a “target” system” Could be passive (non-penetrative) or active Find out as much information about the digital and physical evidence of the target’s existence as possible need to use multiple sources… may (e.g. “black hat” hacking) need to be done secretly

Useful hacker “intelligence” about a network Domain Names User/Group names System Names IP addresses Employee Details/Company Directory Network protocols used & VPN start/finish Company documents Intrusion detection system used

Network Infrastructure Revision Windows networks dependent on active directory large object-orientated database installed on servers that become part of domain log in

Desktop Security Windows desktop security managed through the system registry area of protected memory, thousands of hardware/software settings viewed using regedit utility some settings can be changed using regedit other settings cannot be seen with regedit

System Registry System registry settings stored on local hard disk Loaded into memory during bootup Local log on: system policy files can overwrite settings in memory Network log on: group policy files are downloaded and overwrite files during log on

Group Policy and Resource Access Network resource access also controlled via downloaded registry settings in this way, user access can be controlled through group policy policy files, group membership need to be held securely

Rationale for “passive” Footprinting The ethical hacker can gather a lot of information from publicly available sources organisation needs to know what is “out there” Methodology: start by finding the URL (search engine) e.g. www.worc.ac.uk from main website, find other external-facing names e.g. staffweb.worc.ac.uk

Website Connections & History History: use www.archive.org: The Wayback Machine Connections: use robtex.com Business Intelligence: sites that reveal company details e.g. www.companieshouse.co.uk

More Company Information… “Whois” & CheckDNS.com: lookups of IP/DNS combinations details of who owns a domain name details of DNS Zones & subdomains Job hunters websites: e.g. www.reed.co.uk www.jobsite.co.uk www.totaljobs.com IT technicians “blog entries”

People Information Company information will reveal names Use names in search engines Facebook LinkedIn Google Earth reveals: company location(s)

Physical Network Information (“active” footprinting or phishing) External “probing” should be detectable by a good defence system… (could be embarrassing!) e.g. Traceroute: Uses ICMP protocol “echo” no TCP or UDP port reveals names/IP addresses of intelligent hardware: e.g. Routers, Gateways, DMZs

Email Footprinting Using the email system to find the organisation’s email names structure “passive” monitor emails sent IP source address structure of name “active” email sending programs : test whether email addresses actually exist test restrictions on attachments

Utilizing Google etc. (“passive”) Google: Advanced Search options: Uses [site:] [intitle:] [allintitle:] [inurl:] In each case a search string should follow e.g. “password” Maltego graphical representations of data

Perusing Network Firewall settings Firewall acts between transport layer and application layer each application transfers data using a logical port can restrict entry of packets to the application layer by blocking that port hacker will wish to know wish ports are blocked and which could be exploited

TCP/UDP ports and Hacking Schematic TCP/IP stack interacting at three of the 7 OSI levels (network, transport, application): TELNET FTP SMTP NFS DNS SNMP ports X X X X X X TCP UDP IP

TCP & UDP ports Hackers use these to get inside firewalls etc. Essential to know the important ones: 20, 21 ftp 80 http 389 Ldap 22 ssh 88 Kerberos 443 https 23 telnet 110 pop3 636 Ldap/SSL 25 smtp 135 smb 53 dns 137-9 NetBIOS 60 tftp 161 snmp

Reconnaissance/Scanning Three types of scan: Network (already mentioned) identifies active hosts Port send client requests until a suitable active port has been found… Vulnerability assessment of devices for weaknesses that can be exploited

A “Scanning” Methodology for Ethical Hackers… Check for Live Systems Check for open ports “Banner Grabbing” e.g. bad html request Scan for vulnerabilities Draw Network diagram(s) Prepare proxies…

Proxy Hacking (or Hijacking) Attacker creates a copy of the targeted web page on a proxy server Now uses methods like: keyword stuffing linking to the copied page from external sites… Artificially raises search engine ranking authentic page will rank lower… may even be seen as duplicated content, in which case a search engine may remove it from its index

Now you try it! Download OWASP software tools… Try out the tools on an informal basis without infringing “ethical hacking” rules Gather evidence documenting your activities after Campbell Murray’s presentation (27th April) Present evidence to hand in with assignment 2…

Thanks for Listening 