Project S.N.U.P.E( ) By Patrick D. Cook. Introduction  Background Why this topic and what is S.N.U.P.E ()  Purpose Look for vulnerabilities within a.

Slides:



Advertisements
Similar presentations
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
Advertisements

SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Troubleshooting Accessing the WAN – Chapter 8.
Information Networking Security and Assurance Lab National Chung Cheng University Network Security (I) 授課老師 : 鄭伯炤 Office: Dept. of Communication Rm #112.
The Uses of White Hat Hacking Tyler Schumacher
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Practical Training of Information Security Masahito Gotaishi, R & D Initiative, Chuo Universty.
August 1, 2006 Software Security. August 1, 2006 Essential Facts Software Security != Security Features –Cryptography will not make you secure. –Application.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Information Security Risk.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
“Today over 70% of attacks against a company’s network come at the ‘Application Layer’ not the Network or System layer.” - Gartner Is Your Web Application.
Software Security Course Course Outline Course Overview Introduction to Software Security Common Attacks and Vulnerabilities Overview of Security.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
An Introduction to Internet Explorer DLL Vulnerability and Damage Analysis Bo Sun, Dawei Su {sun,
Ethical Hacking of Wireless Routers Faizan Zahid CS-340 Nida Noor CS-378.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Network Troubleshooting
IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Module 6: Designing Security for Network Hosts
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Enterprise Network Security Accessing the WAN – Chapter 4.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
NetTech Solutions Supporting Users and Troubleshooting Desktop Applications on Microsoft Windows XP Instructor Richard Fredrickson.
South Wales Cyber Security Cluster A networking group with a purpose Membership Open to anyone with an interest in Cyber Security.
Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.
Introduction to Security Dr. John P. Abraham Professor UTPA.
CIT 380: Securing Computer SystemsSlide #1 CIT 380 Securing Computer Systems Threats.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
Risk Assessment What is good about the Microsoft approach to threat modeling? What is bad about it? OCTAVE…  Advantage: ___________  Disadvantage: ___________.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Full Disclosure: Is It Beneficial? Project Based Information Systems Tim Schultz 12/02/02.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
CSCE 548 Secure Software Development Penetration Testing.
Topic 5 Penetration Testing 滲透測試
Seminar On Ethical Hacking Submitted To: Submitted By:
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
CompTIA Security+ SY0-401 Real Exam Question Answer
Calvin Wilson Craig Delzangle
Security Risk Profiles – Tips and Tricks
Pertemuan 19 Introduction to TCP/IP
The Impact Of ICT “Hacking”
Ethical hacking
CIS 333 RANK Perfect Education/ cis333rank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
SEC 572 Teaching Effectively-- snaptutorial.com
2003 RET Program Computer Science
Systems of Inequalities
Azure Cloud Solution Enables a More Powerful, Robust Multilayer Security for Client Web Assets “Microsoft Azure’s cloud technologies allow us to provide.
Networking for Home and Small Businesses – Chapter 8
Security Overview: Honeypots
Network Traffic and Cybersecurity
Network Troubleshooting
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Engineering Secure Software
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Chapter 1 Key Security Terms.
Presentation transcript:

Project S.N.U.P.E( ) By Patrick D. Cook

Introduction  Background Why this topic and what is S.N.U.P.E ()  Purpose Look for vulnerabilities within a networkLook for vulnerabilities within a network Analyze and Mitigate the riskAnalyze and Mitigate the risk  Topic Area Penetration TestingPenetration Testing White hat hackingWhite hat hacking

Staging  Purpose  Tools CyberarmyCyberarmy Whois WS_ Ping Pack Pro Ping Pack Pro  Layers of the OSI model

Neutralizing  Purpose  Tools File WranglerFile Wrangler PowerDesk's ExplorerPlusPowerDesk's ExplorerPlus RevelationRevelation  Layers of the OSI model

Unarming  Purpose  Tools Cygwin Win32Cygwin Win WipeWipe ftp://ftp.technotronic.com/unix/log-tools/wipe-1.00.tgz ZapZap ftp://ftp.technotronic.com/unix/log-tools/zap.c  Layers of the OSI model

Penetration  Purpose  Tools L0phtcrack's Reads mb Reads mb LegionLegion  Layers of the OSI model

Exploiting  Purpose  Tools PortfuckPortfuck UnhideUnhide  Layers of the OSI model

Real World Examples  Microsoft Security Flaw nology/msft_passport.reut/ nology/msft_passport.reut/ nology/msft_passport.reut/ nology/msft_passport.reut/  High School Student teaches school /TechTV/techtv_HS_hacker htmlhttp://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker htmlhttp://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker htmlhttp://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker html

Summary  The majority of the tools attack a similar area from the Transport layer to the Application layer (as indicated by the following diagram) is the most vulnerable to attacks.

References  Stuart McClure, Joel Scambra, and George Kurtz, Hacking Expose: Network Security Threats and Solutions ( California: Osborne/McGraw-Hill, 2001)  The biggest virus encyclopedia: Virus List.com