Presentation is loading. Please wait.

Presentation is loading. Please wait.

An Introduction to the Basics

Similar presentations


Presentation on theme: "An Introduction to the Basics"— Presentation transcript:

1 An Introduction to the Basics
Pre An Introduction to the Basics

2 Modes of Ethical Hacking
Insider attack Outsider attack Stolen equipment attack Physical entry Bypassed authentication attack Social engineering attack

3

4 The Attacker’s Process

5 The Attacker’s Process
Performing Reconnaissance Scanning and enumeration Gaining access Escalation of privilege Maintaining access Covering tracks and placing backdoors

6

7 Performing Reconnaissance
Systematic attempt to locate, gather, identify, and record information about the target. First step is passive information gathering.

8

9 Passive Info Gathering
Google is your friend!!! Corporate Web Site Job Listings WHOIS/DNS/nslookup Analog/Digital Surveillance Public Records Dumpster Diving for Fun and Profit Social Engineering

10

11 Wikto and Spud

12 http://serversniff.com visual ip trace http://centralops.net

13

14 Macrosoft E-mail Spider
Goog-mail.py

15

16 Nifty Google Search Stuff
MySQL Dumps mysql dump filetype:sql RedHat Config Files # kickstart filetype:cfg Allinurl: tsweb site:.edu

17

18

19

20

21

22

23 Scanning and Enumeration
Considered the second pre-attack phase. Scanning is the active step of attempting to connect to systems to elicit a response. Enumeration is used to gather more in-depth information about the target, such as open shares and user account information.

24

25

26

27

28

29

30 http://www.irongeek.com - nmap tutorials

31

32


Download ppt "An Introduction to the Basics"

Similar presentations


Ads by Google