Download presentation
Presentation is loading. Please wait.
Published byJuliet Knight Modified over 8 years ago
2
COMP1321 Digital Infrastructures Richard Henson University of Worcester April 2016
3
Week 21: Web Communications - Securing Web Pages n Objectives: Explain the principles of hacking ethically Access and exploit a “test” client site Explain “Footprinting” and reconnaissance from a penetration testers perspective “Passively” scan networks from the outside
4
Ethical Hacking Principles n Hacking is a criminal offence in the UK covered through The Computer Misuse Act (1990) tightened by further legislation (2006) n It can only be done ”legally” by a trained (or trainee) professional a computing student would be considered in this context under the law
5
Ethical Hacking principles n Even if it is legal… doesn’t mean it is ethical! n Professionals only hack without owner’s permission if there is reason to believe a law is being broken if not… they must ask permission otherwise definitely unethical (and possibly illegal)
6
Ethical Hacking Principles n What is “hacking”? breaching a computer system without permission n How is it done? using software tools to get through the security of the system also called penetration testing (again… if done with permission…)
7
Penetration Testers Toolkit n Many penetration testing tools available n Also a body of knowledge that shows how to use them… n Together, provide the expertise to penetration test a client’s site but this should only be undertaken with the client’s permission…
8
Preparing to use a Toolkit n Ethical Hacking Professionals need to be familiar with both Windows Server, and Linux To fully engage with principles of penetration testing,install the following as virtual machines on your own computer: To fully engage with principles of penetration testing,install the following as virtual machines on your own computer: Windows 2008 Server Linux, with Backtrack (as VM) … Remember: this should only be used ethically! n Instead, you may wish to just take an overview (plenty of excellent youtube videos)
9
Reminder of Virtualisation… n The use of software to allow hardware to run multiple operating system images at the same time Possible to run Windows OS under Mac OS run multiple versions of Windows OS on the same PC n Enables the creation of a “virtual” (rather than actual) version of any software environment on the desktop, e.g. Operating Systems, a server, a storage device or networks, an application
10
What and Why of “Footprinting” n Definition: “Gathering information about a “target” system” n Could be passive (non-penetrative) or active Find out as much information about the digital and physical evidence of the target’s existence as possible »need to use multiple sources… »may (e.g. “black hat” hacking) need to be done secretly
11
Useful Info to Gather about a network n Domain Names n User/Group names n System Names n IP addresses n Employee Details/Company Directory n Network protocols used & VPN start/finish n Company documents n Intrusion detection system used
12
Rationale for “passive” Footprinting n The ethical hacker can gather a lot of information from publicly available sources organisation needs to know what is “out there” n Methodology: start by finding the URL (search engine) »e.g. www.worc.ac.uk from main website, find other external-facing names »e.g. staffweb.worc.ac.uk
13
Website Connections & History n History: use www.archive.org: The Wayback Machine n Connections: use robtex.com n Business Intelligence: sites that reveal company details e.g. www.companieshouse.co.uk www.companieshouse.co.uk
14
More Company Information… n “Whois” & CheckDNS.com: lookups of IP/DNS combinations details of who owns a domain name details of DNS Zones & subdomains n Job hunters websites: e.g. www.reed.co.uk www.reed.co.uk www.jobsite.co.uk www.jobsite.co.uk www.totaljobs.com www.totaljobs.com n IT technicians “blog entries”
15
People Information n Company information will reveal names n Use names in search engines Facebook LinkedIn n Google Earth reveals: company location(s)
16
Physical Network Information (“active” footprinting or phishing) n External “probing” should be detectable by a good defence system… (could be embarrassing!) n e.g. Traceroute: Uses ICMP protocol “echo” »no TCP or UDP port reveals names/IP addresses of intelligent hardware: »e.g. Routers, Gateways, DMZs
17
Email Footprinting n Using the email system to find the organisation’s email names structure “passive” monitor emails sent »IP source address »structure of name “active” email sending programs : »test whether email addresses actually exist »test restrictions on attachments
18
Utilizing Google etc. (“passive”) n Google: Advanced Search options: n Uses [site:] [intitle:] [allintitle:] [inurl:] In each case a search string should follow e.g. “password” n Maltego graphical representations of data
19
Network Layers and Hacking n Schematic TCP/IP stack interacting at three of the 7 OSI levels (network, transport, application): TELNETFTP NFSDNS SNMP TCP UDP IP SMTP X XX X X X ports
20
TCP & UDP ports n Hackers use these to get inside firewalls etc. n Essential to know the important ones: 20, 21 ftp80 http389 Ldap 22 ssh88 Kerberos443 https 23 telnet 110 pop3636 Ldap/SSL 25 smtp135 smb 53 dns137-9 NetBIOS 60 tftp161 snmp
21
Reconnaissance/Scanning n Three types of scan: Network (already mentioned) »identifies active hosts Port »send client requests until a suitable active port has been found… Vulnerability »assessment of devices for weaknesses that can be exploited
22
A “Scanning” Methodology for Ethical Hackers… n Check for Live Systems n Check for open ports n “Banner Grabbing” e.g. e.g. bad html request n Scan for vulnerabilities n Draw Network diagram(s) n Prepare proxies…
23
Proxy Hacking (or Hijacking) n Attacker creates a copy of the targeted web page on a proxy server n Now uses methods like: keyword stuffing linking to the copied page from external sites… n Artificially raises search engine ranking authentic page will rank lower… »may even be seen as duplicated content, in which case a search engine may remove it from its index
24
Lots more “tricks” ethically available!
25
Now you try it! n Download software tools first… n Try out the tools on an informal basis without infringing “ethical hacking” rules n Gather evidence documenting your activities after Campbell Murray’s presentation (27 th April) n Present evidence for assignment 2, guidance 4/11 th May…
26
Thanks for Listening Thanks for Listening
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.