Week 5-1 Week 5: System Hacking Administrator Password Guessing.

Slides:



Advertisements
Similar presentations
Module V System Hacking
Advertisements

Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
FootprintingScanningEnumeration Hacking Gaining Access Privilege Escalation Hiding Files Cover Tracking.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security.
OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats.
Hacking Exposed 7 Network Security Secrets & Solutions Chapter 4 Hacking Windows 1.
Password CrackingSECURITY INNOVATION © Sidebar – Password Cracking We have discussed authentication mechanisms including authenticators. We also.
Cryptography and Network Security Chapter 20 Intruders
Aktueller Status How Hackers Cover Their Tracks ECE 4112 May 1st, 2007 Group 1 Chris Garyet Christopher Smith Introduction Lab Content Conclusions Questions.
Forces that Have Brought the world to it’s knees over the centuries.
Hacking Linux Based on Hacking Linux Exposed Hatch, Lee, and Kurtz ISBN
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Time Passes, Security Changes… Christian Huitema Monday, August 1, 2005 IETF, Application Area Meeting.
Chapter 7 HARDENING SERVERS.
Chapter 3 Passwords Principals Authenticate to systems.
Windows Security and Rootkits Mike Willard January 2007.
Password Attacks Mike. Guessing Default Passwords Many applications and operating systems include built-in default passwords. Lazy administrators Database.
Hacking and Network Defense. Introduction  With the media attention covering security breaches at even the most tightly controlled organization, it is.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Hands-on: Capturing an Image with AccessData FTK Imager
Passwords, Encryption Forensic Tools
Nothing is Safe 1. Overview  Why Passwords?  Current Events  Password Security & Cracking  Tools  Demonstrations Linux GPU Windows  Conclusions.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Hacking Windows 2K, XP. Windows 2K, XP Review: NetBIOS name resolution. SMB - Shared Message Block - uses TCP port 139, and NBT - NetBIOS over TCP/IP.
Hacking Windows Justin Bell Department of Computer Science University of Wisconsin, Platteville
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
The Truth About Protecting Passwords COEN 150: Intro to Information Security Mary Le Carol Reiley.
Chapter 4 System Hacking: Password Cracking, Escalating Privileges, & Hiding Files.
System Hacking Techniques
Chapter 4 Hacking Windows Last modified: Reasons for Windows Security Problems Popularity & Complexity Backward Compatibility –Very important.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
CIS 450 – Network Security Chapter 8 – Password Security.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
Hiding Data in “Plain Sight” Computer Forensics BACS 371.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
System Hacking Active System Intrusion. Aspects of System Hacking System password guessing Password cracking Key loggers Eavesdropping Sniffers Man in.
Chapter 4 Hacking Windows Last modified: Reasons for Windows Security Problems Popularity & Complexity Backward Compatibility –Very important.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 12 Network Security Policy.
Hacking Windows and Windows Security Lesson 10. Windows 9X/Me/NT There are still some folks out there using Windows 95 and 98, ME, 2000, and NT. Remote.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Chapter 4 Hacking Windows Part 2. Authenticated Attacks Privilege Escalation Pilfering –Grabbing the Password Hashes –Cracking Passwords –LSADump –Previous.
TCOM Information Assurance Management System Hacking.
K EAMANAN J ARINGAN P ASSWORD C RACKING A TTACK Defiana Arnaldy,M.Si
Announcements RSA Security Conference (extra credit) RSA Security Conference (extra credit) –April 7 through April 11, San Francisco –Visit the Forum for.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Асоциация за информационна сигурност Мрежова сигурност 1 изборен курс във ФМИ на СУ понеделник, зала 325, ФМИ, 19:00 четвъртък, зала 200,
LM/NTLMv1 Retirement Hosted by LSP Services.
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
Filip Chytrý Everyone of you in here can help us improve online security....
Understanding Security Policies Lesson 3. Objectives.
Privilege Escalation Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
Password Cracking COEN 252 Computer Forensics. Social Engineering Perps trick Law enforcement, private investigators can ask. Look for clues: Passwords.
11 CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY Chapter 8.
Hacking Windows.
COEN 252 Computer Forensics
Hacking Demo Part 2 Attack Phases
I have edited and added material.
Kennesaw State University
SEC 420 StrCompetitive Success/tutorialrank.com
Lesson 16-Windows NT Security Issues
Bethesda Cybersecurity Club
Intrusion.
Presentation transcript:

Week 5-1 Week 5: System Hacking Administrator Password Guessing

Week 5-2 Week 5: System Hacking Performing Automated Password Guessing Legion NTInfoScan

Week 5-3 Week 5: System Hacking Defending Against Password Guessing Monitoring Event Viewer Logs VisualLast Eavesdropping on Network Password Exchange

Week 5-4 Week 5: System Hacking Hacking Tool: L0phtCrack Hacking Tool: KerbCrack

Week 5-5 Week 5: System Hacking Privilege Escalation Hacking Tool: GetAdmin Hacking Tool: hk

Week 5-6 Week 5: System Hacking Manual Password Cracking Algorithm Automatic Password Cracking Algorithm Password Types

Week 5-7 Week 5: System Hacking Types of Password Attacks Dictionary Attack Brute Force Attack Distributed Brute Force Attack

Week 5-8 Week 5: System Hacking Password Change Interval Hybrid Attack Cracking Windows 2000 Passwords

Week 5-9 Week 5: System Hacking Retrieving the SAM file Redirecting SMB Logon to the Attacker SMB Redirection

Week 5-10 Week 5: System Hacking Hacking Tool: SMBRelay Hacking Tool: SMBRelay2

Week 5-11 Week 5: System Hacking SMBRelay Man-in-the-Middle (MITM) SMBRelay MITM Countermeasures

Week 5-12 Week 5: System Hacking Hacking Tool: SMBGrinder Hacking Tool: SMBDie Hacking Tool: NBTDeputy

Week 5-13 Week 5: System Hacking NetBIOS DoS Attack Hacking Tool: nbname Hacking Tool: John the Ripper

Week 5-14 Week 5: System Hacking LanManager Hash Password Cracking Countermeasures

Week 5-15 Week 5: System Hacking Keystroke Logger Hacking Tool: Spector AntiSpector keyloggers.com/

Week 5-16 Week 5: System Hacking Hacking Tool: eBlaster Hacking Tool: SpyAnywhere Hacking Tool: IKS Software Logger

Week 5-17 Week 5: System Hacking Hardware Tool: Hardware Key Logger Hacking Tool: Rootkit Planting Rootkit on Windows 2000 Machine

Week 5-18 Week 5: System Hacking _rootkit_ embedded TCP/IP Stack Rootkit Countermeasures

Week 5-19 Week 5: System Hacking MD5 Checksum utility Tripwire

Week 5-20 Week 5: System Hacking Covering Tracks Disabling Auditing Auditpol Clearing the Event Log

Week 5-21 Week 5: System Hacking Hacking Tool: Elsave Hacking Tool: Winzapper Hacking Tool: Evidence Eliminator

Week 5-22 Week 5: System Hacking Hiding Files NTFS File Streaming Hacking Tool: makestrm NTFS Streams Countermeasures: LADS, sfind can detect ADS (alternative data streams) LNS

Week 5-23 Week 5: System Hacking Steganography (covered writing) Hacking Tool: ImageHide Hacking Tool: MP3Stego Hacking Tool: Snow Hacking Tool: Camera/Shy

Week 5-24 Week 5: System Hacking Steganography Detection StegDetect Encrypted File System Hacking Tool: dskprobe Hacking Tool: EFSView

Week 5-25 Week 5: System Hacking Buffer Overflows Creating Buffer Overflow Exploit Outlook Buffer Overflow Hacking Tool: Outoutlook

Week 5-26 Week 5: System Hacking Summary