Download presentation
Presentation is loading. Please wait.
Published byWhitney Parrish Modified over 8 years ago
1
Filip Chytrý chytry@seculu.com
2
Everyone of you in here can help us improve online security....
3
Let's start with terminology.... Hacker The person who hack Cracker System intruder /destroyer
6
Why do people hack? To make security stronger ( Ethical Hacking ) Steal important information Destroy enemy’s computer network Just for fun!
7
Hackers need to know only one security hole to hack the system vs. Admin need to know all security holes to defend the system
8
9 steps of white hacking....
9
1. Preparation Identification of Targets Signing of Contract Specific attacks Time window Prior Knowledge of the systems Key people
10
2. Footprinting Collecting as much information about the target... Search engines Forums Databases – whois, ripe, arin, apnic Tools – PING, whois, Traceroute, DIG, nslookup
11
3. Enumeration & Fingerprinting Identification of Services / open ports Operating System Enumeration Banner grabbing Responses to various protocol (ICMP &TCP) commands Port / Service Scans – TCP Connect, TCP SYN, TCP FIN
13
4. Identification of Vulnerabilities Social engeneering Insecure Configuration Unpatched vulnerabilities Brute force
15
5. Attack – Exploit the Vulnerabilities Network Infrastructure Attacks Operating System Attacks Application Specific Attacks Exploits
17
6. Gaining access Enough data has been gathered at this point to make successful access/intrusion to the target Techniques Password eavesdropping Password file grab Buffer overflows
19
7. Escalating Privileges If only user-level access was obtained in the last step, the attacker will now seek to gain complete control of the system Techniques Password cracking Known exploits
20
8. Covering Tracks Once total ownership of the target is secured, hiding this fact from system administrators becomes priority. Otherwise there will be no long term fun! Techniques Clear logs Hide tools
21
9. Creating Back Doors Trap doors will be laid in various parts of the system to ensure that privileged access is easily gained Techniques Infect startup files Plant remote control services Replace apps with trojans
22
How many attacks you can expect in Czech republic within 24 hours?
25
MOBILE DIVECES IoT DEVICES (*source IDC) IoT DEVICES (*source Cisco) 212 B Connected devices by 2020 201020152020 9 B 50 B 212 B 1.2 per person MOBILE DEVICES 6.6 per person IoT DEVICES 27.9 per person IoT DEVICES
26
90% of devices collecting one piece of personal information IoT Six out of ten devices are vulnerable to known attack 60% of devices using unencrypted network 50% of devices using unsecure way to storing data
27
It´s almost impossible for one solution to protect them all…
28
IoT vs IIoT
29
Seculu.com/sign
34
Filip Chytrý chytry@seculu.com seculu.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.