Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail.

Slides:



Advertisements
Similar presentations
Creating a Digital Picture Frame John Martin Summer 2006 EDIT 6000.
Advertisements

Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
OWASP Broken Web Applications (OWASP BWA): Beyond 1.0
December, 2008 CS-591 Securing Servers: International Capture the Flag 1 Nadine Sundquist CS591-F2008 University of Colorado, Colorado Springs Dr. C. Edward.
Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail.
Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail.
IPv6: The Next Generation Internet Protocol Luke Simpson and Martin Bouts ECE 4112 Spring 2005 May 2nd, 2005.
Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail.
Red Hat Linux Network. Red Hat Network Red Hat Network is the environment for system- level support and management of Red Hat Linux networks. Red Hat.
The OWASP Foundation AppSec DC Learning by Breaking A New Project for Insecure Web Apps Chuck Willis Technical Director MANDIANT
Computer Security and Penetration Testing
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
Objectives  Understand the purpose of the superuser account  Outline the key features of the Linux desktops  Navigate through the menus  Getting help.
The Business of Penetration Testing
A crash course in njit’s Afs
TOPIC 1 – SERVER SIDE APPLICATIONS IFS 234 – SERVER SIDE APPLICATION DEVELOPMENT.
Downloading & Installing Software Chapter 13. Maintaining the System Yum Pirut BitTiorrent Rpm Keeping Software Up To Date Up2date Red Hat Network Wget.
EC-Council’s Certified Ethical Hacker (CEH) Richard Henson May 2012.
DTS Web Hosting, Rates And Services Web Hosting Internet Services Unit May 2006.
bWAPP – Bee Bug – Installation
1 John Magee 9 November 2012 CS120 Lecture 17a: Publishing Web pages.
Nov 1, 2000Site report DESY1 DESY Site Report Wolfgang Friebel DESY Nov 1, 2000 HEPiX Fall
Linux Installation and Administration Lesson 3 Tutor: George Papamarkos.
A Practical Guide to Fedora and Red Hat Enterprise Linux Unit 8: Installing Software in Linux Chapter 13: Downloading and Installing Software By Fred R.
Network Security: Lab#3 Transport-Level Security Tools J. H. Wang May 12, 2011.
Hands on with BackTrack Information gathering, scanning, simple exploits By Edison Carrick.
How to setup a Linux Web Server and use it to monitor your home SPEAKER: JESSICA DEEN – SYSTEMS INTEGRATION ENGINEER – SPK AND ASSOCIATES,
Malware Dynamic Analysis Veronica Kovah vkovah.ost at gmail See notes for citation1
Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail.
1 PUPPET AND DSC. INTRODUCTION AND USAGE IN CONTINUOUS DELIVERY PROCESS. VIKTAR VEDMICH PAVEL PESETSKIY AUGUST 1, 2015.
Lab 11 Overview Windows Server Last Labs Lab 12  Cisco Firewall.
Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
Linux Operations and Administration
{ Kali Linux Pen testing to ensure your security.
Installing Applications in FreeBSD lctseng. Computer Center, CS, NCTU 2 Before we start  Permission issue root: the super user Like administrator in.
Introduction to Linux Server Setup Jonathan Hood CSE 4000 Practical Issues in Software Engineering.
Explore GNOME The easy way, using a live CD By Carl Weisheit.
Windows Administration How to protect your computer.
Microsoft Virtual Academy Module 12 Managing Services with VMM and App Controller.
XAMPP.
“Build that Virtual Lab you always wanted” Information Assurance Group 2011.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
Lab 11 Overview Windows Server Last Labs wk14
Hacking Techniques & Intrusion Detection
Hacking Techniques & Intrusion Detection
Linux Basics Part 2. VIM Editor vi improved Installed on most Linux machines Can be a bit confusing at first... o Cheat sheets FTW Other popular editors:
[blank page for bug work-around]
Version Control Systems
Installing Applications in FreeBSD
CONTENT MANAGEMENT SYSTEM CSIR-NISCAIR, New Delhi
Chapter 5 Linux Services
Lab experience teaching System Software
Vulnerability Scanning With 'lynis'
Version Control Systems
Lab 1 introduction, debrief
Configuring Kali Machine
CompTIA Server+ Certification (Exam SK0-004)
Malwarebytes Configuration Support Number
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
Synthesizing knowledge During Project
University of Texas Rio Grande Valley Systems Administration CSCI 6175
Managing Services with VMM and App Controller
SAP R/3 Installation on WIN NT-ORACLE
The Linux Command Line Chapter 14
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Fetching datasets from the Internet
Hacking Linux and MacOS
Ethical Hacker Pro IT Fundamentals Pro
Presentation transcript:

Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail

All materials is licensed under a Creative Commons “Share Alike” license. 2

# whoami Ali Al-Shemery Ph.D., MS.c., and BS.c., Jordan More than 14 years of Technical Background (mainly Linux/Unix and Infosec) Technical Instructor for more than 10 years (Infosec, and Linux Courses) Hold more than 15 well known Technical Certificates Infosec & Linux are my main Interests 3

<< backtrack more the quieter you become, the more you’re able to hear !!!

5

Backtrack 5 R3 About BackTrack Installing BackTrack 5 R3 I Know Your Password! Starting X Configuring Network (DHCP|Static) Configuring Basic Network Services Exploring the Pentest Directory Keeping Your Arsenal up2date Knowing Your Toolbox Backtrack 5 R3 Toolbox Other Useful CLI’s 6

About BackTrack First release was The evolution of BackTrack spans many years of development, penetration tests, and unprecedented help from the security community. BackTrack originally started with earlier versions of live Linux distributions called Whoppix, WHAX, and Auditor. When BackTrack was developed, it was designed to be an all in one live cd used on security audits and was specifically crafted to not leave any remnants of itself on the laptop. It has since expanded to being the most widely adopted penetration testing framework in existence and is used by the security community all over the world. 7

Installing BackTrack BackTrack can be installed in different ways, I recommend you installing it using Virtualbox (Open Source). By using Virtualbox, its easy to copy, replicate and clone the whole system in case something wrong happens. No need to dedicate a machine for the system, use resources already available (only if you want to pay the price of getting a new machine). 8

I Know Your Password!!! Change your Password, before some1 does! Imagine getting into war and your own machinery store is played with by someone behind your lines, “ the enemy! ” Before doing any security tests for people, you must protect yourself. Start that by changing the BackTrack’s default password (root/toor): # passwd 9

Starting X You prefer to work in a GUI environment with windows and a mouse? All you need is to start the X Window System: # startx Just as simple as that !!! 10

Configuring Network (DHCP|Static) Dynamic Configuration (DHCP): # dhclient OR # /etc/init.d/networking restart Manual Configuration (Static) # ifconfig eth0 up # ifconfig eth0 [youripaddress] netmask [your netmask] # route add default gw [your gateway] eth0 # echo nameserver [yourDNS]> /etc/resolv.conf 11

Configuring Basic Network Services Sometimes you need to test stuff locally, or import data to a database, or even copy files. That’s why Backtrack comes with a different set of services we can use for such scenarios: SSH (OpenSSH) FTP (vsftpd) Web (Apache) Database (MySQL, Postgress) TFTP 12

Exploring the Pentest Directory Going to battles without knowing what arsenal you’re carrying can lead to failure ! Lets take a walk through the BackTrack penetration testing tools directory. # cd /pentest 13

Keeping Your Arsenal up2date It is very important to keep your tools up to date, New features and enhancement are added, Bugs are fixed, New tools maybe added! # apt-get update # apt-get upgrade OR # apt-get dist-upgrade 14

Knowing Your Toolbox You want to know nearly all your toolbox? # dpkg --list You want to know if a specific tool is installed? # dpkg --list | grep 15

Backtrack 5 R3 Toolbox Backtrack’s main toolbox categories: Information Gathering Analysis Vulnerability Assessment Exploitation Tools Privilege Escalation Maintaining Access Reverse Engineering RFID Tools Stress Testing Forensics Reporting Tools Doesn’t end here !!! 16

Other Useful CLI’s Getting Help – man – info – --help – GNOME Help Searching – find – locate – GNOME Search Creating and Editing Files – GNOME gedit – vim – nano Fetching File From Internet – wget -c Installing new software/packages – apt-cache – apt-get install 0.1% of what’s out there !!! 17

Appendix – Linux Ref. 18 Taken from: Linux Arab Community,

Appendix – The Lab What is Needed? Virtualbox BackTrack 5 R3 OWASP Broken Web Applications Project (1 NIC’s needed) Slackware VM for Software Exploitation (1 NIC’s needed) Windows XP/2003 (2 NIC’s needed) Exploit KB, grab vulnerable software Use a Host-only Network! 19

SUMMARY What is Backtrack and howto prepare it for pentesting, Available Backtrack Toolbox, Backtrack basic usage, Creating a simple lab for security testing. 20

References [-] Backtrack Linux Distro., [-] Slackware Exploitation VM, [-] OWASP Broken Web Applications VM, ASP_Broken_Web_Apps_VM_1.0.7z 21