Download presentation
Presentation is loading. Please wait.
1
GENI, Pen Testing, & other stories
Dr. X
2
Outline What is GENI… really? Pen testing & ethical hacking Logistics:
Bring at least one computer per team for Tuesday!! Denial of Service lab will be completed in class Download and install Wireshark: URL Or use Kali VM
3
Global Environment for Network Innovations (GENI)
Virtual laboratory for networking and distributed systems research and education. GENI allows experimenters to: Conduct research and create new internet protocols Experiment with cybersecurity concepts Conduct wireless research Educate! Use in classes and perform cool experiments
4
Global Environment for Network Innovation (GENI)
Virtual Lab Obtain compute resources from locations around the United States; Connect compute resources using Layer 2 networks in topologies best suited to their experiments; Install custom software or even custom operating systems on these compute resources; Control how network switches in their experiment handle traffic flows; Run their own Layer 3 and above protocols by installing protocol software in their compute resources and by providing flow controllers for their switches.
5
GENI
6
Simulating Denial of Service
Real machines Small network Attack traffic Regular internet traffic You control all these!
7
What is Denial of Service?
A computer network attack that is designed to deplete resources and prevent legitimate users from accessing a site Can target small and large businesses Traffic flood, large payloads sent slowly, amplification attack Resources: Memory CPU Bandwidth
8
Computer Network Attacks
Passive: Scanning, Reconnaissance Active: Distributed Denial of Service Spoofing Man in the middle
9
Let’s run an attack… next Tuesday!
Observe how fast it is How detrimental it can be to a small network Remember: it is illegal to use any of the tools that create an attack on any machines except the lab machines!
10
Kahoot time!
11
Security as Art No hard and fast rules nor many universally accepted complete solutions No manual for implementing security through entire system Security as Art There are no hard and fast rules regulating the installation of various security mechanisms. Nor are there many universally accepted complete solutions. While there are many manuals to support individual systems, once these systems are interconnected, there is no magic user’s manual for the security of the entire system. This is especially true with the complex levels of interaction between users, policy, and technology controls.
12
Security as Science Dealing with technology designed to operate at high levels of performance Specific conditions cause virtually all actions that occur in computer systems Nearly every fault, security hole, and systems malfunction are a result of interaction of specific hardware and software If developers had sufficient time, they could resolve and eliminate faults Security as Science We are dealing with technology developed by computer scientists and engineers—technology designed to perform at rigorous levels of performance. Even with the complexity of the technology, most scientists would agree that specific scientific conditions cause virtually all actions that occur in computer systems. Almost every fault, security hole, and systems malfunction is a result of the interaction of specific hardware and software. If the developers had sufficient time, they could resolve and eliminate these faults.
13
Security as a Social Science
Social science examines the behavior of individuals interacting with systems Security begins and ends with the people that interact with the system Security administrators can greatly reduce levels of risk caused by end users, and create more acceptable and supportable security profiles Security as a Social Science There is a third view: security as a social science. Social science examines the behavior of individuals as they interact with systems, whether societal systems or in our case information systems. Security begins and ends with the people inside the organization and the people that interact with the system planned or otherwise. End users that need the very information the security personnel are trying to protect may be the weakest link in the security chain. By understanding some of the behavioral aspects of organizational science and change management, security administrators can greatly reduce the levels of risk caused by end users and create more acceptable and supportable security profiles.
14
Penetration Testing Legal and authorized attempt to locate and successfully exploit computer systems for the purpose of making those systems more secure
15
Differences Between attacks and vulnerabilities?
Between pen testing and vulnerability assessment? Attacks are the techniques that attackers use to exploit the vulnerabilities in applications. Attacks are often confused with vulnerabilities, so please try to be sure that the attack you are describing is something that an attacker would do, rather than a weakness in an application.
16
Black vs white hat
17
Black vs white hat Authorization Motivation Intent
18
The cycle of Pen Testing
Reconnaissance Scanning Exploitation Back doors Cover tracks… rinse, repeat
19
Reconnaissance Open Source Intelligence (OS Int)
Google is your friend – more elaborate searches than you have ever thought! Site: Filetype: Boolean logic Google hacking DB Whois Social Networks Job Ads
20
Reconnaissance exercise
Find a company you have never heard before: Charleston local startups Read the news Use the OS Int website and google to gather as much info as possible: What software or Operating System do they use? Who are the administration people: CEO, CFO, CIO etc. Where do the administration people live, what are their interests? What do they use? Who is their Internet Service provider, Domain Name Server (DNS)? Do they have any files online that they should not have?? Any other information about the technical infrastructure of the company?
21
Scanning Open ports Open services Intrusive Informative!
22
Scanning Demo By Dr. X
23
Exploitation Tools Exploits Metasploit Nessus Custom programs
Reverse Shell Elevation of privileges Password file Secret/important information Keylogger Malware: ransomware, virus, spyware
24
Tools of the trade
25
Tools Kali Programming Your brain!
26
Backdoors Vulnerable accounts Open ports & services
27
Covering your tracks Delete any files, history Command line rocks!
28
Summary GENI is awesome Pen testing is not rocket science
Learn how to exploit… in order to know how to defend!
29
Capture the Flag (CTF) Competition: to train future defenders Topics
Cryptography Steganography OS Int Network forensics Web app exploits … and more! Find information, steal password, solve a riddle Wanna play?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.