Project S.N.U.P.E( ) By Patrick D. Cook
Introduction Background Why this topic and what is S.N.U.P.E () Purpose Look for vulnerabilities within a networkLook for vulnerabilities within a network Analyze and Mitigate the riskAnalyze and Mitigate the risk Topic Area Penetration TestingPenetration Testing White hat hackingWhite hat hacking
Staging Purpose Tools CyberarmyCyberarmy Whois WS_ Ping Pack Pro Ping Pack Pro Layers of the OSI model
Neutralizing Purpose Tools File WranglerFile Wrangler PowerDesk's ExplorerPlusPowerDesk's ExplorerPlus RevelationRevelation Layers of the OSI model
Unarming Purpose Tools Cygwin Win32Cygwin Win WipeWipe ftp://ftp.technotronic.com/unix/log-tools/wipe-1.00.tgz ZapZap ftp://ftp.technotronic.com/unix/log-tools/zap.c Layers of the OSI model
Penetration Purpose Tools L0phtcrack's Reads mb Reads mb LegionLegion Layers of the OSI model
Exploiting Purpose Tools PortfuckPortfuck UnhideUnhide Layers of the OSI model
Real World Examples Microsoft Security Flaw nology/msft_passport.reut/ nology/msft_passport.reut/ nology/msft_passport.reut/ nology/msft_passport.reut/ High School Student teaches school /TechTV/techtv_HS_hacker htmlhttp://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker htmlhttp://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker htmlhttp://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker html
Summary The majority of the tools attack a similar area from the Transport layer to the Application layer (as indicated by the following diagram) is the most vulnerable to attacks.
References Stuart McClure, Joel Scambra, and George Kurtz, Hacking Expose: Network Security Threats and Solutions ( California: Osborne/McGraw-Hill, 2001) The biggest virus encyclopedia: Virus List.com