ISA 330 Introduction to Proactive System Security Philip Robbins – August 31, 2013 Ethical Hacking Information Security & Assurance Program University.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

ETHICAL HACKING.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Introduction to Ethical Hacking, Ethics, and Legality.
Security and Personnel
Chapter 1 Ethical Hacking Overview. Who Am I?  Kevin Riley  Systems / Network Analyst Orange Coast College   Phone
Computer Threats I can understand computer threats and how to protect myself from these threats.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Computer Security and Penetration Testing
System Security Scanning and Discovery Chapter 14.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Security, Privacy, and Ethics Online Computer Crimes.
CMGT/441 Intro. to Information Systems Security Management
Hands-On Ethical Hacking and Network Defense
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Vulnerability Assessment & Penetration Testing By: Michael Lassiter Jr.
Comp 8130 Presentation Security Testing Group Members: U Hui Chen U Ming Chen U Xiaobin Wang.
Penetration Testing Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA 16802
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
SEC835 Database and Web application security Information Security Architecture.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
General Awareness Training
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Information Systems Security Computer System Life Cycle Security.
Cyber crime & Security Prepared by : Rughani Zarana.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Career Opportunities in Information Technology There are four main categories of IT jobs, grouped by the main focus of the job: Sales and support Software.
Assessment Presentation Philip Robbins - July 14, 2012 University of Phoenix Hawaii Campus Fundamentals of Information Systems Security.
Penetration Test
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
First Look at Security and Privacy Jeremiah Burleson.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Topic 5: Basic Security.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
CSCE 548 Secure Software Development Security Operations.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.
Computer Security By Duncan Hall.
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
The Need for Information Security(1) Lecture 2. Slide 2 Business Needs First, Technology Needs Last Information security performs four important functions.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Seminar On Ethical Hacking Submitted To: Submitted By:
ISA 400 Management Information Security
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
Hands-On Ethical Hacking and Network Defense
Penetration Testing Computer Science and Software Engineering
Computer Security Fundamentals
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Presentation transcript:

ISA 330 Introduction to Proactive System Security Philip Robbins – August 31, 2013 Ethical Hacking Information Security & Assurance Program University of Hawai'i West Oahu Week #1 1

2 Ethical Hacking Topics Introductions Syllabus Review Fundamentals of Ethical Hacking Class Discussion Tools Security Resources Review Questions, Q&A

3 Introductions Who am I? Information Systems Authorizing Official Representative -United States Pacific Command (USPACOM) -Risk Management Field -Assessments to USPACOM Authorizing Official / CIO Former Electronics & Environmental Engineer Bachelor of Science in Electrical Engineering Master of Science in Information Systems Ph.D. Student in Communication & Information Sciences Certified Information Systems Security Professional (CISSP) and Project Management Professional (PMP)

4 Syllabus Class Textbook

5 Fundamentals “A locked door keeps an honest man out.”

6 Fundamentals Introduction to Proactive System Security What this class IS about: An introductory course in adopting a proactive (v.s. reactive) stance towards systems security. What this class IS NOT about: An offensive class in hacking. How does one better understand how to defend against system security attacks? By performing and testing against them.

7 Fundamentals In the news: Facebook CEO personal page hacked by Palestinian white hat. Chinese suffers largest internet attack in history. Syrian Electronic Army takes down the New York Times.

8 Fundamentals In the news: Facebook CEO personal page hacked by Palestinian white hat. Chinese suffers largest internet attack in history. Syrian Electronic Army takes down the New York Times.

9 Fundamentals In the news: Facebook CEO personal page hacked by Palestinian white hat. Chinese suffers largest internet attack in history. Syrian Electronic Army takes down the New York Times.

10 Fundamentals What is Hacking? Classical Definition: Seeking to understand computer systems strictly for the love of having that knowledge. Modern Definition: Illegal access to computer or network systems. BEFORE NOW

11 Fundamentals What is a “Hacker”?

12

13 Fundamentals Who/what is a “Cracker”? Term used to describe a hacker with malicious intent. Crackers (cyber criminals) get into all kinds of mischief, including breaking or "cracking" copy protection on software programs, breaking into systems and causing harm, changing data, or stealing.

14 Fundamentals “Hacker” v.s. “Cracker”? - Today there’s no real distinction between the two terms. Hacker = Cracker However… - Some hackers regard crackers as less educated. - Some crackers don’t create their own work; simply steal other people's work to cause mischief, or for personal gain.

15 Fundamentals Who are “Script kiddies”? - Unskilled individuals who use scripts or programs developed by knowledgeable programmers to attack computer systems. - Generally considered “posers” or “kiddies” lacking the ability to write sophisticated scripts or programs on their own. - Usually seeking to gain credit or impress their friends.

16 Fundamentals What is an “Ethical Hacker”? Oxymoron: Honest Criminal - A new breed of network defenders. - Performs the same activities a hacker does but with the owner / company’s permission. - Usually contracted to perform penetration testing.

17 Fundamentals Penetration Testing - Discover vulnerabilities. - Perform attack and penetration assessments. - Perform discovery and scanning for open ports & services. - Apply exploits to gain access and expand access as necessary. - Activities involving application penetration testing and application source review. - Interact with the client as required. - Produce reports documenting discoveries during the engagement. - Report your findings with the client at the conclusion of each engagement. v.s. Security Testing + Participate in research and provide recommendations for improvement. + Participate in knowledge sharing.

18 Fundamentals Why perform Penetration Tests?

19 Fundamentals Steps for a Penetration Test Step #1: Planning Phase - Scope & Strategy of the assignment is determined. - Existing security policies and standards are used for defining the scope. Step #2: Discovery Phase - Collect as much information as possible about the system including data in the system, user names and even passwords (fingerprinting). - Scan and Probe into the ports. - Check for vulnerabilities of the system. Step #3: Attack Phase - Find exploits for various vulnerabilities. - Obtain necessary security Privileges to exploit the system & exploit.

20 Fundamentals Steps for a Penetration Test Step #4: Reporting Phase - Report must contain detailed findings. - Risks of vulnerabilities found and their impact on business - Recommendations for solutions, if any (Security Testing).

21 Fundamentals Penetration Testing Limitations - Can’t find all the vulnerabilities on a system. - Time for tester - Budget - Scope - Skills of testers - Data loss and corruption - Downtime for organization - Increased costs for organization* * How could pen testing decrease costs for an organization?

22 Fundamentals Roles & Responsibilities of the Pen-Tester - Testers should collect required information from the Organization to enable penetration tests (depending on the type of testing model). - Find flaws that could allow hackers to attack a target machine. - Pen Testers should think & act like real hackers (ethically). -Tester should be responsible for any loss in the system or information during the testing. - Tester should keep data and information confidential.

23 Fundamentals Types of Pen-Testing Methodologies White Box Model - Tester is given the company network topology, info on technology used, and permission to interview all employees (including IT personnel). Black Box Model - Tester is not given any information. - Management doesn’t tell staff about the pen test being conducted. - Help determine if company’s security personnel are able to detect attacks. Gray Box Model - Hybrid of the white and black box models. - Tester may get partial information.

24 Class Discussion Which pen-testing category / model closely mimics that of an insider threat? Which type of pen-testing model is better suited for an organization on a extremely limited budget? Which pen-testing model is most accurate? Which can be considered to have the greatest drawback?

25 Class Discussion

26 Fundamentals Types of Hats - White Hats (Ethical / Pen-Testers improving security) - Black Hats (Hackers / Crackers degrading security) - Grey Hats (In-between White and Black) - Red Hat (Enterprise Linux)

27 Fundamentals What can you do Legally? What about: -Port scanning? -Possession of hacking tools? -Photographing? -ISP Acceptable Use Policy (AUP)? -Installing viruses on a computer network denying users? In Hawaii, the state must prove that the person charged with committing a crime on a computer had the “intent to commit a crime.”

28 Fundamentals Federal Laws: - Computer Fraud and Abuse Act, Title 18 Crime to access classified information with authorization. - Electronic Communication and Abuse Act Illegal to intercept any communication, regardless of how it was transmitted. - Stored Wire and Electronic Communications and Transactional Records Act Defines unauthorized access to computers that store classified information.

29 Class Discussion What are the advantages of using a written contract when engaged in a computer consulting job? Why is it important that your attorney read over the contract before you sign it? What is upper management’s role for a penetration test?

30 Class Discussion Why do you think the government does not define a common law for computer-related crimes, rather than allowing each state to address these issues?

31 Fundamentals Ethical Hacking in a Nutshell -Must have a good understanding of networks & computer technology. -Must be able to communicate with management & IT personnel. -Must have an understanding of the laws that apply to your location. -Must be able to apply the necessary tools to perform your tasks.

32 Fundamentals Professional Certifications Certified Ethical Hacker (CEH) Cisco Certified Network Associate (CCNA) Project Management Professional (PMP) Certified Information Systems Security Professional (CISSP)

33 Fundamentals Careers

34 Fundamentals CEH 22 Domains

35 Fundamentals CEH: Domain #1

36 Fundamentals CEH: Domain #2

37 Fundamentals CEH: Domain #3

38 Fundamentals CEH: Domain #4

39 Fundamentals CEH: Domain #5

40 Fundamentals CEH: Domain #6

41 Fundamentals CEH: Domain #7

42 Fundamentals CEH: Domain #8

43 Fundamentals CEH: Domain #9

44 Fundamentals CEH: Domain #10

45 Fundamentals CEH: Domain #11

46 Fundamentals CEH: Domain #12

47 Fundamentals CEH: Domain #13

48 Fundamentals CEH: Domain #14

49 Fundamentals CEH: Domain #15

50 Fundamentals CEH: Domain #16

51 Fundamentals CEH: Domain #17

52 Fundamentals CEH: Domain #18

53 Fundamentals CEH: Domain #19

54 Fundamentals CEH: Domain #20

55 Fundamentals CEH: Domain #21

56 Fundamentals CEH: Domain #22

57 Tools Backtrack 5r3 Ubuntu Linux Distribution providing a comprehensive collection of security-related tools for digital forensics and pen testing use.

58 Tools Kali Linux (a.k.a. Backtrack 6) A debian Linux Distribution rewritten from Backtrack. Preinstalled with numerous penetration- testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), and Aircrack-ng (a software suite for penetration-testing wireless LANs).

59 Tools Metasploitable 2.0 Intentionally vulnerable Linux virtual machine.

60 Tools Damn Vulnerable Linux (DVL) 1.5 Infectious Disease Originally formed from Slackware with the goal of being an intentionally vulnerable system for practice/teaching purposes in regards to Network and Computer Security. Now considered discontinued.

61 General Security Resources Cyber Hui Cyber Hui is a community of Hawaii Cyber security professionals dedicated to sharing skills and knowledge with high school and college students. Join the Hui; check out their resources and discussion forums. SANS Institute Source for information security training and security certification; develops, maintains, and makes available at no cost, a collection of research documents about various aspects of information security. Find whitepapers here that interest you. Symantec Connect Technical community for Symantec customers, end-users, developers, and partners. SearchSecurity Online Information Security Magazine providing immediate access to late breaking industry news, virus alerts, new hacker threats and attacks. Internet Storm Center Community forums, discussions, and daily podcasts on auditing, forensics, network security, pen testing.

62 General Security Resources CyberPatriot Air Force Cyber Defense Competition.

63 General Security Resources IASE Most comprehensive compilation of DoD Policies & Guidance documentation for Information Assurance.

64 Review Questions Question #1 The U.S. Department of Justice defines a hacker as which of the following? a.A person who accesses a computer or network without the owner’s permission. b.A penetration tester. c.A person who uses telephone services without payment. d.A person who accesses a computer or network with the owner’s permission.

65 Review Questions Question #1 The U.S. Department of Justice defines a hacker as which of the following? a.A person who accesses a computer or network without the owner’s permission. b.A penetration tester. c.A person who uses telephone services without payment. d.A person who accesses a computer or network with the owner’s permission.

66 Review Questions Question #2 A penetration tester is which of the following? a.A person who accesses a computer or network without permission from the owner. b.A person who uses telephone services without payment. c.A security professional who’s hired to hack into a network to discover vulnerabilities. d.A hacker who accesses a system without permission but does not delete or destroy files.

67 Review Questions Question #2 A penetration tester is which of the following? a.A person who accesses a computer or network without permission from the owner. b.A person who uses telephone services without payment. c.A security professional who’s hired to hack into a network to discover vulnerabilities. d.A hacker who accesses a system without permission but does not delete or destroy files.

68 Review Questions Question #3 Some experienced hackers refer to inexperienced hackers who copy or use prewritten scripts or programs as which of the following? a.Script Monkey b.Packet Kiddies. c.Packet Monkeys. d.Script Kiddies.

69 Review Questions Question #3 Some experienced hackers refer to inexperienced hackers who copy or use prewritten scripts or programs as which of the following? a.Script Monkey b.Packet Kiddies. c.Packet Monkeys. d.Script Kiddies.

70 Review Questions Question #4 A team composed of people with varied skills who attempt to penetrate a network is referred to as which of the following? a.Green Team b.Blue Team c.Black Team d.Red Team

71 Review Questions Question #4 A team composed of people with varied skills who attempt to penetrate a network is referred to as which of the following? a.Green Team b.Blue Team c.Black Team d.Red Team

72 Review Questions Question #5 What portion of your ISP contract might affect your ability to conduct a penetration test over the internet? a.Scanning Policy b.Port Access Policy c.Acceptable Use Policy d.Warranty Policy

73 Review Questions Question #5 What portion of your ISP contract might affect your ability to conduct a penetration test over the internet? a.Scanning Policy b.Port Access Policy c.Acceptable Use Policy d.Warranty Policy

74 Review Questions Question #6 Which federal law prohibits unauthorized access of classified information? a.Computer Fraud and Abuse Act, Title 18 b.Electronic Communication and Abuse Act c.Stored Wire and Electronic Communications and Transactional Records Act d.Fourth Amendment

75 Review Questions Question #6 Which federal law prohibits unauthorized access of classified information? a.Computer Fraud and Abuse Act, Title 18 b.Electronic Communication and Abuse Act c.Stored Wire and Electronic Communications and Transactional Records Act d.Fourth Amendment

76 Review Questions Question #7 Which federal law prohibits intercepting any communication, regardless of how it was transmitted? a.Computer Fraud and Abuse Act, Title 18 b.Electronic Communication and Abuse Act c.Stored Wire and Electronic Communications and Transactional Records Act d.Fourth Amendment

77 Review Questions Question #7 Which federal law prohibits intercepting any communication, regardless of how it was transmitted? a.Computer Fraud and Abuse Act, Title 18 b.Electronic Communication and Abuse Act c.Stored Wire and Electronic Communications and Transactional Records Act d.Fourth Amendment

78 Review Questions Question #8 Which federal law amended Chapter 119 of Title 18, U.S. Code? a.Computer Fraud and Abuse Act, Title 18 b.Electronic Communication and Abuse Act c.Stored Wire and Electronic Communications and Transactional Records Act d.U.S. Patriot Act, Sec. 217: Interception of Computer Trespasser Communications

79 Review Questions Question #8 Which federal law amended Chapter 119 of Title 18, U.S. Code? a.Computer Fraud and Abuse Act, Title 18 b.Electronic Communication and Abuse Act c.Stored Wire and Electronic Communications and Transactional Records Act d.U.S. Patriot Act, Sec. 217: Interception of Computer Trespasser Communications

80 Review Questions Question #9 To determine whether scanning is illegal in your area, you should do which of the following? a.Refer to the U.S. code b.Refer to the U.S. Patriot Act c.Refer to the state laws d.Contact your ISP

81 Review Questions Question #9 To determine whether scanning is illegal in your area, you should do which of the following? a.Refer to the U.S. code b.Refer to the U.S. Patriot Act c.Refer to the state laws d.Contact your ISP

82 Review Questions Question #10 As a security tester, what should you do before installing hacking software on your computer? a.Check with local law enforcement agencies. b.Contact your hardware vendor. c.Contact your software vendor. d.Contact your ISP.

83 Review Questions Question #10 As a security tester, what should you do before installing hacking software on your computer? a.Check with local law enforcement agencies. b.Contact your hardware vendor. c.Contact your software vendor. d.Contact your ISP.

84 Review Questions Question #11 Before using hacking software over the Internet, you should contact which of the following? a.Your ISP. b.Your vendor. c.Local law enforcement authorities to check for compliance d.The FBI

85 Review Questions Question #11 Before using hacking software over the Internet, you should contact which of the following? a.Your ISP. b.Your vendor. c.Local law enforcement authorities to check for compliance d.The FBI

86 Review Questions Question #12 Which organization issues the Top 20 list of current network vulnerabilities? a.SANS Institute b.ISECOM c.EC-Council d.OPST

87 Review Questions Question #12 Which organization issues the Top 20 list of current network vulnerabilities? a.SANS Institute b.ISECOM c.EC-Council d.OPST

88 Questions? www2.hawaii.edu/~probbins