A Discussion In Penetration Testing Marcial White.

Slides:



Advertisements
Similar presentations
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
Advertisements

 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 1 Implementing Secure Converged Wide Area Networks (ISCW)
Cryptography and Network Security Chapter 20 Intruders
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Common network diagnostic and configuration utilities A ‘toolkit’ for network users and managers when ‘troubleshooting’ is needed on your network.
Computer Security and Penetration Testing
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Hacking Unix/Linux.
Penetration Testing.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Hacking Windows 2K, XP. Windows 2K, XP Review: NetBIOS name resolution. SMB - Shared Message Block - uses TCP port 139, and NBT - NetBIOS over TCP/IP.
Hacking Windows Justin Bell Department of Computer Science University of Wisconsin, Platteville
Information Gathering Lesson 4. Steps for Gathering Information Find out initial information Open Source Whois Nslookup Find out address range of the.
13Computer Intrusions Dr. John P. Abraham Professor UTPA.
VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.
Hands-On Ethical Hacking and Network Defense
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
System Hacking Active System Intrusion. Aspects of System Hacking System password guessing Password cracking Key loggers Eavesdropping Sniffers Man in.
(c) University of Technology, Sydney Firewall Architectures.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
Hacking Windows and Windows Security Lesson 10. Windows 9X/Me/NT There are still some folks out there using Windows 95 and 98, ME, 2000, and NT. Remote.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Cracking Techniques Onno W. Purbo
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
TCOM Information Assurance Management System Hacking.
Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Footprinting and Scanning
Ethical Hacking Keith Brooks CIO and Director of Services
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
Filip Chytrý Everyone of you in here can help us improve online security....
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Hacking Windows.
Topic 5 Penetration Testing 滲透測試
Seminar On Ethical Hacking Submitted To: Submitted By:
ETHICAL HACKING Presentation By: FATHIMA SHIMNA S3 ECE ROLL NO: 31 1.
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Footprinting and Scanning
Calvin Wilson Craig Delzangle
Onno W. Purbo Cracking Techniques Onno W. Purbo
An Introduction to the Basics
Hacking Unix/Linux.
Kennesaw State University
Remote Control and Advanced Techniques
Footprinting and Scanning
How hackers do it Ron Woerner Security Administrator CSG Systems, Inc.
Presentation transcript:

A Discussion In Penetration Testing Marcial White

Introduction Definition of “Hacker” White Hat vs. Black Hat Open Source Methodologies

Penetration Testing Concepts What is a penetration test? –Public Image –Border Networks –Interior Networks What do they produce? –What don’t they produce? How extensive are they? White Box vs. Black Box

Methodology Overview Footprinting –Search Engine Hacking –Social Engineering –White Box Footprinting –Black Box Footprinting Network Enumeration Gaining Access to the Network Escalating Privileges Covering Your Tail Retaining Control –Rogue User Accounts If All Else Fails … Some Defenses

Google Hacking Zero-footprint profiling of the target Start with the simple stuff –Company Name Do popularity searches on the people you find in the first search Look for important looking people A full list of operators available at – For example, “ filetype:txt inurl:robots site:whitehouse.gov “

Social Engineering “The practical application of sociological principles to particular social problems” ( “the practice of obtaining confidential information by manipulation of legitimate users” (Wikipedia)Wikipedia Examples: Lord Nikon and Cereal Killah from Hackers (the most realistic hacking movie ever). Relying on people not reading the EULAs – the Microsoft PLUS! Scheme. Kevin Mitnick: The Art of Deception & The Art of Intrusion

White Box Footprinting Consult the existing network diagram Scan the network Compare results –Find running services –Find live hosts fping, ICMPenum, Ethereal –Record hops between an interior host and the border of the network (traceroute) WhoIs

Black Box Footprinting What do you know? –Most get a single IP to start with Find out what you can on that IP WhoIs it? – – –NSLookup –Visual Route – Tracker PRO (wooptyfriggindo) Often times more systems will be found than were reported. Document everything.

Enumerate the Network Overlaps a bit of the footprinting … NMap is your friend –XMAS Scan nmap –sX host.com –A successful XMAS scan will find one of two things »A closed port on a host will reply with RST »Open ports will lay conspicuously silent. –Fe3d for documentation nmap –oX filename.xml host.com

Nmap XMAS Scan

Fe3d

Gaining Access … Sniff passwords with a protocol analyzer Ethereal Etherpeek TCPDump Snort Nessus NASL NT Info Scan ReadSMB

Escalating Privileges Be SILENT! Brute Force Tools John The Ripper Cain and Abel L0phtCrack Trojan\Back doors Netbus “Remote Administration and Spy Tool” Man in the Middle Attacks Inherent TCP/IP flaws –Three Way Handshakes –Packet Headers –ARP »Ettercap

Unix\Linux rhosts files Usually located at ~/.rhosts »Recommended permissions: HostName -HostName Also of interest: /etc/host.equiv »Allows remote machines to execute commands on the local machine Windows LSA Secrets Older Windows machines (NT 3.51 – 4.0) Dumps various LSA secrets such as service passwords (plain text), cached password hashes of the last users to login to a machine, FTP, WEB, etc. plaintext passwords, RAS dial up account names, passwords etc, workstation passwords for domain access, etc.

Covering your tail It’s all in the configuration Command history ftp/telnet/ssh/etc logs Dynamically generated routing tables Logging daemons klogd metalog »Look in /var/log/, /etc/, /usr/bin Hide your tools Hidden files Obscure naming convention *nix »/.rootkits »Veto files »Burying the files *doze: »Hidden system files »Burying the files

Keeping your doors open Creating rogue user accounts Permissions »RWXRWXRWX »Groups »Creating accounts called “tty” Windows Administrator Retaining control cron jobs Keyloggers »Regload »LKL

Still can’t get in? Denial of service? »Yes! …. I mean, no! Resource Consumption »Attempts to use finite resources (memory, CPU, file handling) Poor programming »Vulnerable variables, which usually lead to more serious vulnerabilities »Ex: “The Register” HTML variables (exposed to phishing attacks

Conclusion … people suck. Do your homework. Be cool. Stay in school. Questions?