Open Source Security Tools alek rollyson. DISCLAIMER DON'T BE STUPID...SERIOUSLY USE OF THESE TOOLS ON MACHINES NOT LEGALLY OWNED BY YOU COULD END UP.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module VII Sniffers.
Advertisements

Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon.
Man in the Middle Attack
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
System Security Scanning and Discovery Chapter 14.
Hacking Linux Based on Hacking Linux Exposed Hatch, Lee, and Kurtz ISBN
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Computer Security and Penetration Testing
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University
Lab #2 CT1406 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
COEN 252 Computer Forensics
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Network Security: Lab#4-2 Packet Sniffers J. H. Wang Dec. 2, 2013.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Security Scanners Mark Shtern. Popular attack targets Web – Web platform – Web application Windows OS Mac OS Linux OS Smartphone.
Linux Networking and Security
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
Wireless Networking & Security Greg Stabler Spencer Smith.
CHAPTER 9 Sniffing.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
G CITRIXHACKIN. Citrix Presentation Server 4.5 New version is called XenApp/Server Common Deployments Nfuse classic CSG – Citrix Secure Gateway Citrix.
Penetration Testing 101 (Boot-camp)
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Social Engineering Toolkit Computer Science Innovations, LLC.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
CNIT 124: Advanced Ethical Hacking Ch 10: Client-Side Exploitation.
Joseph Owen.  Aims:  To look at types of hackers  To look at different types of attacks  How to protect your network  Objectives  You will know.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Packet Sniffing Hans Kokx
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Unit 2: Cyber Security Part 3 Monitoring Tools & other Security Products.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
[blank page for bug work-around]
CSCE 548 Student Presentation By Manasa Suthram
Penetration Testing: Concepts,Attacks and Defence Stratagies
Introduction to Network Scanning
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Penetration Test Debrief
Chris D Hicks Director of IT MCSE, MCP + Internet Security
Network Exploitation Tool
Advanced Penetration testing
CIT 480: Securing Computer Systems
Advanced Penetration testing
Intro to Ethical Hacking
Advanced Penetration testing
Network hardening Chapter 14.
6. Application Software Security
EVAPI - Enumeration Auburn Hacking club
Advanced Penetration testing
Presentation transcript:

Open Source Security Tools alek rollyson

DISCLAIMER DON'T BE STUPID...SERIOUSLY USE OF THESE TOOLS ON MACHINES NOT LEGALLY OWNED BY YOU COULD END UP PUTTING A NASTY MARK ON YOUR CRIMINAL RECORD

please ask questions. in the interest of time i'm going to automatically assume you're keeping up if you don't say anything

Talk Overview Protocol Analyzing, Sniffers, Interceptors, Port Scanning o Wireshark, Ettercap, Nmap Vulnerability Assessment o OpenVAS (nessus replacement) Pen Testing Tools o metasploit framework Password Crackers o john the ripper, ophcrack Wireless Security Tools o aircrack-ng, kismet Honeypots o kippo Security Focused Distributions Notes on Hardening Dispelling some bullshit

protocol analysis capture and analyze network traffic o promiscuous mode Wireshark is extremely popular and powerfulWireshark o uses pcap to capture packets o capture ethernet, , PPP and loopback traffic o "knows" about different networking protocols and can display useful information about each o use filters to find relevant data o used to need special privileges, can run as normal user on most platforms now o CLI interface Tshark

Sniffing, Intercepting MITM - man in the middle Ettercap is highly regarded and very powerfulEttercap o use in promiscuous mode o four modes (IP, MAC, ARP, PublicARP) o can sniff encrypted traffic (SSH, HTTPS) o Password collectors for tons of protocols o inject into an established connection o hijack dns o alter/drop packets o can detect other poisoners on the network

port scanning self descriptive, designed to probe and scan for open ports Nmap is THE port scanner. Just use itNmap o very comprehensive and smart  accounts for network conditions during the scan o turned into a swiss army knife due to excellent community  OS fingerprinting  names and versions of running services  estimated uptime  presence of firewall  type of device  new scripting engine (SoC project)  ZenWalk gui available (also SoC project)

Vulnerability Assessments meant to be a one stop shop for discovering vulnerabilities in systems o port scanning, enumerator, web app scanner, exploit checks, default accounts and passwords, misconfigurations, DoS checks, etc Nessus is huge in the industry (OpenVAS is the open source implementation)NessusOpenVAS o exploits published regularly as a "feed" o attacks are written in NASL (nessus attack scripting language)

Penetration Testing Tools often used in conjunction with vulnerability scans to actively attempt to penetrate a system very broad term Metasploit Framework is becoming the de facto standard for vulnerability developmentMetasploit Framework o largest ruby project in existence o often times new exploits will include a Metasploit module that includes full details of the exploit o choose exploit -> check if exploit applies -> configure payload -> configure encoding to evade IDS -> execute the exploit o includes an extensive shell code and opcode database with full source code

password crackers two main modes o dictionary (rainbow tables) o brute force John The Ripper probably most popularJohn The Ripper o can auto detect password type  DES flavors, LM Hash (MD5), SHA, Blowfish, Kerberos AFS o can be fed rainbow tables o pretty simple to use Ophcrack o Cracks windows LM hash passwords via rainbow tables  some basic tables provided o livecd available

Honeypots valuable recon tool set up to look like a vulnerable machine, really used to divert attacks and possibly gather information o distraction tool o research attack methods o watch skiddies try and fail over and over sometimes turn out to be pretty entertaining Kippo is a simple open source honeypot with recording capabilitiesKippo

security distros backtrack linux o includes most of the tools we'll talk about tonight o one of the best (most up to date) security live cd o latest release is 4r2 knoppix std o used to be an excellent security live cd o now stagnant unfortunately damn vulnerable linux o pretty much exactly what it sounds like o designed to be easy to break, good for learning about vulnerabilities almost all of these tools are available in distribution repositories

notes on hardening mandatory vs. discretionary access control intrusion detection systems reduce your attack surface o close unneeded ports (port knocking) o disable unneeded services open source vs. proprietary o aka: security through obscurity = FAIL intrusion detection systems regular security auditing always be aware of social engineering use key login for ssh, disable password login o use a password for you key and protect it! o disable root login via ssh disable smtp open relays

dispelling some bullshit upping password change frequency not really that helpful, false sense of security good idea to write down passwords? o argument still going on about this o bruce schneier seems to think it's ok changing default ports doesn't really do much o auto scanners are patient b/c they're, well, machines hashing != encryption not broadcasting SSID doesn't really do much o neither does MAC black/whitelisting DON'T USE DICTIONARY WORDS IN PASSWORDS o use different passwords for sites! physical access = root

dispelling more bullshit beware of unencrypted access points o free public wifi pay attention to those messages about server keys changing phishing can get anyone, even smart people Linux and OSX do have nasty attacks out there o just a matter of time people o don't assume you're automatically secure DO NOT rely on tor for confidentiality o malicious nodes are not unheard of Don't let anyone convince you that they are omniscient just because they have a CISSP as mentioned before...security via obscurity == FAIL don't connect LOIC via hivemind, regardless of what people on the anonops irc channel tell you