KaaShiv InfoTech Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com.

Slides:



Advertisements
Similar presentations
Overview How to crack WEP and WPA
Advertisements

Lecture 10 Sharing Resources. Basics of File Sharing The core component of any server is its ability to share files. In fact, the Server service in all.
Thank you to IT Training at Indiana University Computer Malware.
WARNING ! The system is either busy or has been unstable. You can wait and See if it becomes available again, or you can restart your computer. *
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
For Removal Info: visit
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Security & Ethical Hacking Luke Arntson Central Washington University Winter 2007 Presentation #1 – “Script-Kiddie” Tools & Tricks.
Trojan Horse Program Presented by : Lori Agrawal.
Cyber X-Force-SMS alert system for threats.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Web server security Dr Jim Briggs WEBP security1.
1 GFI LANguard Network Security Scanner. 2 Contents Introduction Features Source & Installation Testing environment Results Conclusion.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
1 Computer Security: Protect your PC and Protect Yourself.
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
Internet safety By Lydia Snowden.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Security & “Ethical” Hacking Luke Arntson Central Washington University Winter 2007 Presentation #2 – Advanced Scanning & Exploitation.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Cyber Patriot Training
Thrive Installation.
SURVEY VIEWER HYPACK Sending SURVEY Windows Across the Network to Non-HYPACK Computers. HYPACK Computer Non-HYPACK Computer Running SURVEY VIEWER.
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
1999 Cabletron Systems. Wireless Networking RoamAbout RoamAbout Installation Installation/Configuration of: Network adapter card on a: Windows 95 system.
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
CERN’s Computer Security Challenge
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Troubleshooting Windows Vista Security Chapter 4.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Security at NCAR David Mitchell February 20th, 2007.
CPT 123 Internet Skills Class Notes Internet Security Session A.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
CHAPTER 9 Sniffing.
Proxy Installer for Windows Squid: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses.
Don’t let them catch your computer!!!!!
W elcome to our Presentation. Presentation Topic Virus.
KaaShiv InfoTech Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website
SURVEY VIEWER Note: SURVEY VIEWER functions are now available from the Remote Viewing that is built into HYPACK SURVEY. SURVEY VIEWER still works, but.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Installing the ALSMS Software on a Windows Platform Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
Steven Geisel Gabe Owens.  Angry IP Scanner is an open-source and cross-platform network scanner  Features include IP Address scanning, port scanning,
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Windows Tutorial 5 Protecting Your Computer
Chapter 40 Internet Security.
What they are and how to protect against them
Common Methods Used to Commit Computer Crimes
Securing A Wireless Network
Wireless Network Security
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Test 3 review FTP & Cybersecurity
6. Application Software Security
Presentation transcript:

KaaShiv InfoTech Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

INTRODUCTION Ethical Hacking Knowledge is Power To Teach is to Defend Hacking is frowned upon For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

Presentation Overview Presentation #1 will be an introduction to tools and tricks used by “script-kiddies”, or those new to the hacker community. Presentation #1 will be an introduction to tools and tricks used by “script-kiddies”, or those new to the hacker community. Many people may have seen or used the following tools and tricks, but most moderate to advanced users frown upon them. Many people may have seen or used the following tools and tricks, but most moderate to advanced users frown upon them. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

Presentation Overview NetBios Hacking – Connect, view, share IP Scanning – Angry IP Scanner Cain – Excellent script-kiddie tool Sub7/Netbus – Remote Admin Tools PuTTy/Token2 – Tools of the trade For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

Windows NetBios Hacking This is one of the most basic file access tricks known to Windows. This is one of the most basic file access tricks known to Windows. Not necessarily hacking, but beginners call it such. Not necessarily hacking, but beginners call it such. Can be used with a samba brute-force password guesser. Can be used with a samba brute-force password guesser. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

NetBios Hacking Protection Disable file sharing! Use a firewall such as ZoneAlarm when you are not sharing files. Password protect your shares. Use a hardware firewall such as a router with built-in firewall. This is an old hack, but it still can compromise an entire system. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

IP Scanning Finding vulnerable targets in the wild. Finding vulnerable targets in the wild. Viruses and bots use IP sweepers, so ISPs will flag this activity. Viruses and bots use IP sweepers, so ISPs will flag this activity. IP Scanning is very common among exploit seeking viruses. IP Scanning is very common among exploit seeking viruses. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

Finding Appropriate IP Range First we must find a range to search. This could be any combination of IP ranges such as *.* Next we must determine what we are searching for. Finally, we decide what tools to use. For now, we will stick to Angry IP Scanner. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

Searching for HTTP Lets find some HTTP servers! In Angry IP Scanner, set IP range and change Ports to [x] Scan Port: port 80 Begin scan…. After scan has completed, to only sort out which IPs have port 80 open, go to Utils>Delete From List>Closed Ports Our list is complete. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

What We Often Find Generally we will find routers and modems. Often if they are default, they also have default passwords (for another day) Sometimes we stumble upon websites, personal projects, etc. This is VERY dangerous as you could be scanning a computer which is illegal to access… For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

Prevention from IP scans? If you’re on the internet, you have an IP. IP scanners will give an ALIVE message. Firewalls are VITAL if you are directly connected to the internet (ZoneAlarm, etc.) HTTP access to routers should be turned off unless absolutely necessary. If enabled, ensure passwords are hard to guess/break. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

Cain & Abel :-D Cain is a very, very evil script-kiddie tool. We can spoof, crack, trace, inject, sniff, poison, and a few other things. This program is dangerous in the wrong hands because it works verywell. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

ARP Poisoning Cain currently only arp poisons through ethernet cards. Broad overview of how to get it to run. First, enable the sniffer and retrieve list of potential victim IPs. Next, click the IP you want to add and press the + sign. Watch the packets come in, and capture EVERYTHING the IP is sending and receiving via ARP poisoning. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

Creative & Powerful Tool Cain is creative, powerful, and has a huge damage potential in the wrong hands. Keep those firewalls up! ARP Poisoning can be prevented by firewalling your connection. Be aware of malicious users on your network, watching for that little Cain program to pop up on their screen. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

Sub7/NetBus Remote Admin Tools, or RAT for short are essentially total control over a computer. RAT tools are servers designed to take complete control without the user’s notice. Sub7 is a well known black-hat RAT used to take over computers without the need for a “server” broadcast. NetBus is also well known, but is a bit noisier and often leaves more traces. Many other RATs out there. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

SUB 7 CONFIGURE First, the hacker configures Sub7 with a configuration exe. This produces a new server with the desired options. Options can include IRC control, broadcast of infection, methods of install, ways to stick server, etc. Sub7 can also be password protected to prevent other hackers access to the victim. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

OUR Sub7 SERVER For now we know the victim will be able to broadcast via port 4000 (radmin port) We want to ensure server sticks. We want a password to prevent other uninvited guests. Only install the minimum, IRC, ICQ, AIM is extra so disable it. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

SEND OUR VICTIM THE EXE This part is difficult to pull off, hackers have many ways to social engineer victims to do this part. This part is difficult to pull off, hackers have many ways to social engineer victims to do this part. User must execute server.exe User must execute server.exe Once executed, server is automatically launched and we are ready to take control. Once executed, server is automatically launched and we are ready to take control. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

Client Side RAT Control We now have total control of our victim machine, so lets view their hard drive. Eject their cd-rom. Ok, enough of this, lets let them know we have taken over with a friendly error. Finally, using Sub7’s fun little Matrix mode, let us remind them that reality is a mere fictional state of mind. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

Prevention of RATs Do not execute anything you do not trust! Do not execute anything you do not trust! Always enable show file extensions to be turned on (Windows defaults them off?!?) Always enable show file extensions to be turned on (Windows defaults them off?!?) Be aware of strange activity. RATs do not need to broadcast to take over, they can use other methods such as AIM messages, IRC bot commands, and other various client messages. Be aware of strange activity. RATs do not need to broadcast to take over, they can use other methods such as AIM messages, IRC bot commands, and other various client messages. Advanced RATs will be covered in a later presentation. Advanced RATs will be covered in a later presentation. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

PUTTY/TOKEN Excellent text based ssh/telnet/ftp/raw TTY clients. Learn how to use these as they become vital later in a hackers life. Token 2 has excellent proxy abilities, so read up on how to use Socks-5 and SSH. Begin learning about potential tunneling via SSH and PuTTy. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

CONCLUSION Keep safe! Just because I teach this does not mean it is legit stuff. Play around on test boxes, use VMWare, give your roomie a scare but not your college professor! I would like to continue this as long as I have an audience. I learn as everyone else learns. Ideas include advanced scanning and penetration, wireless hacking, root kit exploration, shell/exploit writing, web defacing/hacking, virus exploration/writing, maybe some old school hardware hacks (red/blue/beige boxes, credit card readers), and whatever else people want to hear about. For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to

Thank you For Inplant Training / Internship, please download the "Inplant training registration form" from our website Fill the form and send it to