Computer Security and Penetration Testing

Slides:



Advertisements
Similar presentations
Unit 1: Module 1 Objective 10 identify tools used in the entry, retrieval, processing, storage, presentation, transmission and dissemination of information;
Advertisements

Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
CIT In this chapter you will learn how to:  Explain the threats to your computers and data  Describe key security concepts and technologies.
SYSTEM ADMINISTRATION Chapter 19
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
System Security Scanning and Discovery Chapter 14.
Social Engineering Networks Reid Chapman Ciaran Hannigan.
Security Issues and Challenges in Cloud Computing
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Chapter 5 Phase 1: Reconnaissance. Reconnaissance  Finding as much information about the target as possible before launching the first attack packet.
Computer Security and Penetration Testing
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Authorization and Policy. Is principal P permitted to perform action A on object O? – Authorization system will provide yes/no answer Authorization.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Project Proposal: Academic Job Market and Application Tracker Website Project designed by: Cengiz Gunay Client: Cengiz Gunay Audience: PhD candidates and.
Forensic and Investigative Accounting
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
Invitation to Computer Science 5th Edition
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Communication, Networks, The internet and the Worldwide Web.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Topic 5: Basic Security.
ROAD TO EXPLOITATION Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Computer Security Sample security policy Dr Alexei Vernitski.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Application Software Chapter 6.
IT Security  .
Social Engineering Charniece Craven COSC 316.
Secure Software Confidentiality Integrity Data Security Authentication
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
I S P S loss Prevention.
Phishing is a form of social engineering that attempts to steal sensitive information.
Robert Leonard Information Security Manager Hamilton
Learning objectives By the end of this unit you should: Explain
Computer Security and Penetration Testing
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
LO3 – Understand Business IT Systems
What is Phishing? Pronounced “Fishing”
Presentation transcript:

Computer Security and Penetration Testing Chapter 2 Reconnaissance

Objectives Identify various techniques for performing reconnaissance Distinguish and discuss the methods used in social engineering Discuss the importance of dumpster diving in reconnaissance Identify a variety of phases of Internet footprinting Computer Security and Penetration Testing

Reconnaissance Reconnaissance Act of locating targets and developing the methods necessary to attack those targets successfully May be extremely flexible and creative Reconnaissance is not by definition illegal Many reconnaissance techniques are completely legal Computer Security and Penetration Testing

Computer Security and Penetration Testing

Some Legal Reconnaissance Legal activities Looking up all of the information about a company available on the Internet Calling with a problem requiring customer service assistance Interviewing a member of the staff for a school project Physical entry of a facility, including attending a tour of the facility Making friends with somebody who works there or used to work there Computer Security and Penetration Testing

Some Questionable Reconnaissance Questionable activities Performing a passive port scan Reading the names on the mail sitting on a mail cart Scanning the document lying loose on a desk Picking up trash in the parking lot Picking up a copy of the employee newsletter Asking for a phone list, business card or product specs Looking through a garbage can War driving Computer Security and Penetration Testing

Some Illegal Reconnaissance Illegal activities Developing a “front” company for the purpose of robbing or defrauding Stealing garbage Entering a home or office to look for information Dropping a keylogger Leaving a sniffer Computer Security and Penetration Testing

Social Engineering Social engineering works, for the most part, because people are trusting and helpful The weakest link in any security scheme is the user The success or failure of social engineering Depends on the ability of hackers to manipulate human psychology, contacts, and physical workstations Computer Security and Penetration Testing

Social Engineering Techniques Impersonation Could be at an instance level (impersonating someone) Could be on a role or function level (dressing like a service person) Bribery Hacker can pit a person’s greed and ignorance against his loyalty to the organization Blackmail is a common tactic to keep a target employee fruitful Computer Security and Penetration Testing

Social Engineering Techniques (continued) Deception Achieve access to information by joining the company As an employee or a consultant Conformity Hacker convinces the victim that they have a lot in common and that they share the same values Hacker becomes the victim’s good friend Reverse social engineering Hacker projects herself as an authority vested with the power to solve peoples’ problems Computer Security and Penetration Testing

Physical Intrusion Foremost traditional technique of social engineering Requires Learning the schedules of the organization Knowing the floor plan of the building or buildings “Baselining” the security procedures Hacker can develop fake identification cards Last step is to acquire useful or valuable information Computer Security and Penetration Testing

Physical Intrusion (continued) Avoiding suspicion Never collect all the required information from a single user or source Never hold a position after the value of the position has ended The more valuable the information is, the more likely hackers are working with a team When physical intrusion is not a possibility, hackers use communication media Computer Security and Penetration Testing

Communication Media Postal Mail E-mail Powerful tool for social engineers Typical attack Victim receives a letter announcing that he or she has won a prize Mailer asks for tax information, phone numbers, e-mail addresses, and other information Greed leads the victim to happily surrender all sorts of information E-mail Used in a variety of scams and false offerings Computer Security and Penetration Testing

Communication Media (continued) E-mail Attacks Hacker sends an e-mail purported to be from a legitimate IT e-mail account Asks for user’s password to help solve a problem Hacker sends e-mail message invitations to join online competitions for receiving prizes Joining requires sending sensitive information Phishing User is tricked into giving private information about his or her account with a known large organization Computer Security and Penetration Testing

Computer Security and Penetration Testing

Communication Media (continued) Instant Messaging Social engineer attempts to befriend the victim To gather information or send the victim to a Web link she might be likely to visit Telephone Communication Social engineers may manipulate background sounds and their own voice to produce a required effect Help desk personnel are vulnerable targets Social engineers often impersonate technicians Computer Security and Penetration Testing

Countering Social Engineering Steps to counter social engineering attempts: Do not provide any information to unknown people Do not disclose any confidential information to anyone over the telephone Do not type passwords or other confidential information in front of unknown people Do not submit information to any insecure Web site Do not use same username/password for all accounts Verify credentials of persons asking for passwords Computer Security and Penetration Testing

Countering Social Engineering (continued) Steps to counter social engineering attempts: Keep confidential documents locked Lock or shut down computers when away from the workstation Instruct help desk employees to provide information only after they have gained proper authentication Computer Security and Penetration Testing

Dumpster Diving Dumpster diving Often the mother lode of sensitive information as well as actual hardware and software Hackers look specifically for sales receipts and paperwork That contain personal data or credit card information Shredded documents can lead to data leaks Drafts of letters are routinely left whole in the trash Company directory sheets, catalog lists, unused or misprinted labels, and policy manuals Computer Security and Penetration Testing

Importance of Proper Discarding of Refuse Security policy must carefully address what is sensitive information And decide how to treat refuse Best solution to theft of trash paper Crosscut-shred it and keep it in locked trash receptacles Hackers search for outdated hardware There are tools that can restore data from damaged data-storage devices Computer Security and Penetration Testing

Prevention of Dumpster Diving Guidelines that help preventing dumpster diving Develop a written recycling and trash-handling policy Use the policy to develop a consistent, systematic method for handling trash The trash-handling policy should state that all papers be shredded Erase all data from tapes, floppies, and hard disks Simply breaking CD-ROMs is not sufficient, place them in a microwave and heat them Computer Security and Penetration Testing

Internet Footprinting A technical method of reconnaissance Hackers like this method because it is clean, legal, and safe Four methods used in Internet footprinting Web searching Network enumeration Domain Name System (DNS)–based reconnaissance Network-based reconnaissance Computer Security and Penetration Testing

Web Searching Search Engines HTML Source Code Can be used to collect information about any subject or organization Companies’ basic information are available through search engines Any company or organization is vulnerable to innocent searches HTML Source Code You can view the source code of any Web page Area of interest in an HTML source code is its comment entries and the hints of the organization of the site Computer Security and Penetration Testing

Web Searching (continued) HTML Source Code (continued) Knowing the format of usernames or passwords can be useful You should have a default or an index page in every subdirectory Newsgroups Text-based online groups in which users discuss subjects that interest them Part of an online bulletin board system called USENET Hackers read postings in newsgroups to discover information and documents relating to targeted systems Computer Security and Penetration Testing

Web Searching (continued) Security-Related Web Sites Hackers study these Web sites to learn about new developments in information security Especially about new exploits Newsletters Provide cutting-edge developments to hackers Most of the time are available free of charge Automatically e-mailed to individuals Computer Security and Penetration Testing

Network Enumeration Process of identifying domain names as well as other resources on the target network WHOIS Search WHOIS Internet tool that aids in retrieving domain name–specific information from the NSI Registrar database Allows the InterNIC database to be queried Displays the information about the searched item Hackers use the WHOIS tool first to extract critical data about their target system And then to conduct hacking activities Computer Security and Penetration Testing

Computer Security and Penetration Testing

Network Enumeration (continued) whois CLI Command WHOIS Web application is also available at the command-line interface (CLI) Of POSIX systems like UNIX, Solaris, and Linux Computer Security and Penetration Testing

Computer Security and Penetration Testing

Domain Name System (DNS)–Based Reconnaissance DNS Lookup Tools help Internet users discover the DNS names of target computers Web sites that provide DNS lookup tools www.dnsstuff.com www.network-tools.com www.networksolutions.com DNS Zone Transfer Every DNS server has a name space, known as a zone A zone stores data about domain names Computer Security and Penetration Testing

Domain Name System (DNS)–Based Reconnaissance (continued) DNS Zone Transfer (continued) Zone transfer is a DNS feature that lets a DNS server update its database With the list of domain names in another DNS server An incorrectly configured DNS server may allow any Internet user to perform a zone transfer Commands to perform a DNS zone transfer nslookup Allows anyone to query a DNS server for information host Program that permits you to perform DNS lookup Computer Security and Penetration Testing

Domain Name System (DNS)–Based Reconnaissance (continued) Computer Security and Penetration Testing

Computer Security and Penetration Testing

Computer Security and Penetration Testing

Domain Name System (DNS)–Based Reconnaissance (continued) DNS Zone Transfer (continued) Commands to perform a DNS zone transfer dig Domain information groper (dig) Used to collect DNS-related data Computer Security and Penetration Testing

Network-Based Reconnaissance ping Part of the Internet Control Message Protocol (ICMP) Helps to verify whether a host is active Command is available for all platforms There are two ping utilities available for a Linux or Unix machine: ping and ping6 traceroute A request for a Web page that resides on a remote server must pass through several servers on its way Command can track all of the intermediate servers Computer Security and Penetration Testing

Computer Security and Penetration Testing

Computer Security and Penetration Testing

Network-Based Reconnaissance (continued) traceroute In UNIX-based operating systems use traceroute command In Windows operating systems use tracert command Computer Security and Penetration Testing

Computer Security and Penetration Testing

Network-Based Reconnaissance (continued) netstat Allows all the transmission Control Protocol (TCP), User Datagram Protocol (UDP), and IP connections on a computer to be viewed Also helps to locate IP address of computers IP addresses of the hosts connected to the computers Port of the host to which a computer is connected Computer Security and Penetration Testing

Computer Security and Penetration Testing

Summary Reconnaissance is the act of locating targets and developing the methods necessary to attack those targets successfully Social engineering works because people are, for the most part, trusting and helpful To counter social engineering, organizations must establish known security policies and conduct mandatory security training Dumpster diving can provide hackers with sensitive information, as well as hardware and software Computer Security and Penetration Testing

Summary (continued) Four methods of Internet footprinting: Web searching, network enumeration, Domain Name System (DNS)-based reconnaissance, and network-based reconnaissance During Web searching, hackers collect information about a target organization by reading Web pages produced by that organization Network enumeration is the process of identifying domain names and other resources on the target network Computer Security and Penetration Testing

Summary (continued) DNS-based reconnaissance uses information available from DNS servers about the IP addresses of target network domain names Network-based reconnaissance is the process of identifying active computers and services on a target network via tools such as ping, traceroute, and netstat Computer Security and Penetration Testing