Presentation is loading. Please wait.

Presentation is loading. Please wait.

Topic 5: Communication and the Internet

Similar presentations


Presentation on theme: "Topic 5: Communication and the Internet"— Presentation transcript:

1 Topic 5: Communication and the Internet
Identifying Vulnerabilities

2 Identifying Vulnerabilities
We’ve looked at the different vulnerabilities we could come across in a network Physical, digital, and social However, even if a vulnerability is present, how can hackers work out the vulnerability is there? There exists a lot of tools available on the Internet for testing for vulnerabilities Communication and the Internet: Identifying Vulnerabilities

3 Identifying Vulnerabilities
These tools aren’t just used by hackers though A lot of system administrators will actually use these tools on their own networks To test to see if they are fully secure There are also ethical hackers (known as white hat hackers, or white-hats) who perform these tests on networks of organisations And well send a report to the organisation Communication and the Internet: Identifying Vulnerabilities

4 Identifying Vulnerabilities
We are going to look at four different ways we can identify vulnerabilities on a network They each tackle the aspect of finding vulnerabilities in different ways Some technically (penetration testing) And some socially (policy reviews) Penetration Testing Ethical Hacking Commercial Analysis Tools Network/User Policy Reviews Communication and the Internet: Identifying Vulnerabilities

5 Communication and the Internet: Identifying Vulnerabilities
Penetration Testing A penetration test (also known as a pen test) is a test employed by an individual or organisation It’s used to assess the level of security on their devices and networks Also includes things like websites and FTP servers Only if they host those on their network The test involves simulating a full-on attack by someone looking for vulnerabilities and exploits on that network Those vulnerabilities and exploits may let the hacker access some aspects of the network Communication and the Internet: Identifying Vulnerabilities

6 Communication and the Internet: Identifying Vulnerabilities
Penetration Testing Note that this is just simulating an attack from a hacker This is not an actual attack These tests are either set up by the administrator of the network their testing Or contracted out to a company to perform the test The results of the test are entirely informational Given to the administrators of the network so they can implement more security To protect against the vulnerabilities/exploits found during the test Communication and the Internet: Identifying Vulnerabilities

7 Communication and the Internet: Identifying Vulnerabilities
Penetration Testing The person performing the penetration test will often used specialised tools to do so We will look at those later on in the Commercial Analysis Tools section What is important is pen-tests often come in two types White-box tests and Black-box tests Communication and the Internet: Identifying Vulnerabilities

8 Communication and the Internet: Identifying Vulnerabilities
Penetration Testing White-box tests involve providing the tester with all relevant information about the network This could include, but isn’t limited to The type of network being used (i.e. physically cabled or wireless) The devices on the network (operating systems, hardware specs, etc.) Any hosted servers on the network (HTTP, FTP, etc.) Any database tables This kind of test simulates a malicious attacker gaining inside information on the system And using it to exploit any potential vulnerabilities Communication and the Internet: Identifying Vulnerabilities

9 Communication and the Internet: Identifying Vulnerabilities
Penetration Testing Block-box tests are very much the opposite of white-box tests With these, the tester is given no information at all on the type of network they are testing The testers here start with simple tests and work up to more specific tests As they find more and more vulnerabilities Communication and the Internet: Identifying Vulnerabilities

10 Commercial Analysis Tools
So what kind of tools do these testers have access to? There are a lot of tools available on the World Wide Web that cater to pen-testers Some free, but most paid for The pen-testers themselves may also create their own tools for the job A common occurrence for contracted pen-testers Communication and the Internet: Identifying Vulnerabilities

11 Commercial Analysis Tools
Tools for penetration testing are often split into categories For what they are aimed at For example, we can get tools that assist in the following Analysing HTTP requests coming/going from a network Examining a network for any available and open ports Injecting a payload (pre-written executable programs) into a device on a network Identifying SQL databases on a network, and testing their input verification for SQL Injection Fully mapping a network (including listing all devices found on a network and showing their IP addresses) Sending phishing attacks on any WiFi connected device (with the aim of retrieving SSID and password information on that network) Communication and the Internet: Identifying Vulnerabilities

12 Commercial Analysis Tools
One fairly common tool for analysing TCP/IP traffic is Wireshark It lets you hook onto a network-enabled device and eavesdrop on any TCP traffic that it sends or receives This is best used when the user has access to one of the devices on the network Can use Wireshark to listen to TCP traffic on that device Can then get that device to talk to any servers on that network That gives the tester information about those servers Communication and the Internet: Identifying Vulnerabilities

13 Commercial Analysis Tools
Wireshark comes with both command line tools and a GUI The list at the top is every TCP communication the device has managed Includes both outbound and inbound requests The other two panels give information about that communication Communication and the Internet: Identifying Vulnerabilities

14 Commercial Analysis Tools
Another common tools is Metasploit Can be used for listening to traffic coming in/going out of a network However, it’s more widely used for its ability to inject payloads onto a device on a network Where the payload is a program or function the device will run Once a vulnerability has been found on a network, testers use Metasploit to inject some executable code on the device Which then opens up more vulnerabilities to exploit Communication and the Internet: Identifying Vulnerabilities

15 Commercial Analysis Tools
Metasploit works via a HTTP server (accessed from a webpage). This is a screenshot of the network-mapping command run. This is only one part of what Metasploit can di. Communication and the Internet: Identifying Vulnerabilities

16 Communication and the Internet: Identifying Vulnerabilities
Ethical Hacking Although hacking itself has a negative connotation behind it (as networks are being exploited after all), not all hackers are like that In fact, there are three common terms for three different types of hacker Black-Hats: what we commonly understand as a ‘hacker’ Also known as crackers Will test networks/software for vulnerabilities and exploit them Often trying to get sensitive information for personal gain White-Hats: the official/unofficial testers of vulnerabilities Will perform pen-tests (after permission is given) Help organisations keep their networks secure Grey-Hats: a little mix of both May perform pen-test without permission But can give the results to the organisation Communication and the Internet: Identifying Vulnerabilities

17 Communication and the Internet: Identifying Vulnerabilities
Ethical Hacking There is one really important thing to note about hacking any computer system or network Without prior permission, it is illegal to exploit a vulnerability on a computer network and obtain private information This is covered in the Computer Misuse Act 1990 Legislation that was introduced in the UK parliament In response to a criminal case against Robert Schrifteen involving hacking Prince Phillip’s So all white-hat hackers are entirely legal As they obtain permission from the network administrator beforehand Communication and the Internet: Identifying Vulnerabilities

18 Communication and the Internet: Identifying Vulnerabilities
Ethical Hacking The simplest guide to hacking ethically is to stick to the white-hat ways Always ask for permission from the network administrator beforehand Log any and all tests that you perform Do not copy or retrieve any sensitive or private information stored on the network Report all findings to the network administrator after the test is complete The EC Council (The International Council of Electronic Commerce Consultants) started a scheme which lets user apply for a certified White Hat status Found at ethical-hacker-ceh/ Communication and the Internet: Identifying Vulnerabilities

19 Network/User Policy Reviews
On almost all networks, network administrators will write a policy Applies to all users on that network Policies are simple a list of dos and don’ts of what users can do on that network For example, policies on a network could specify That no USB devices be plugged in to any device on the network Users should not provide their password to anyone at any time Users should not download any file from the Internet onto their device And so on… Communication and the Internet: Identifying Vulnerabilities

20 Network/User Policy Reviews
If someone is performing a white-box pen-test, these list of policies is actually an important thing to consider Although humans do tend to make mistakes, if something is listed in a policy then the tester can consider that as an avenue to avoid If no USBs are allowed, then the pen-tester can either forget about testing with a malicious USB drive, or perform that test later as a lower priority However, the inverse is also true If something isn’t listed in the policies, then it’s fair game for the tester Communication and the Internet: Identifying Vulnerabilities

21 Network/User Policy Reviews
In fact, not having something listed in the policies is often a bad thing As most policies have some legal wait to them within the company So if a pen-tester spots a vulnerability not listed in the policies, they’ll often make a recommendation of including it Such is the case with not using USB devices on any device on the network As USB devices aren’t something you can stop (either physically or virtually) Including an objection to them in the policy covers the company legally If a fault happens with the USB device being the case, they have legal basis for any action they commit to Communication and the Internet: Identifying Vulnerabilities

22


Download ppt "Topic 5: Communication and the Internet"

Similar presentations


Ads by Google