Download presentation
Presentation is loading. Please wait.
Published byHendri Hartanto Modified over 5 years ago
2
How hackers do it Ron Woerner Security Administrator CSG Systems, Inc.
Hacking 101 How hackers do it Ron Woerner Security Administrator CSG Systems, Inc. G:\Dataware\Marketing\Sales Training\August ‘97 Boot Camp\CMS.ppt
3
What do you think when you hear:
Hacker or cracker Melissa, LoveBug (ILOVEYOU) Denial of Service (DoS) attacks Packet sniffing Password cracking Information warfare or Cybercrime Social engineering 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
4
Home Security Analogy Systems Security is like securing your house
Policies are the written understanding Access control and passwords are the keys Window and door locks keep out intruders A security camera watches open doors The intent is to make the environment less inviting to those looking for easy pickings 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
5
The “Crown Jewels” Question: What are your “Crown Jewels”?
What attracts hackers to your company? Why would a hacker take interest in your company? What is your companies biggest vulnerabilities? 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
6
CSG Systems, Inc.Confidential & Proprietary
Security Risks You need to be concerned about: Disclosure of confidential information - The disclosure of personal and private information about individuals can lead to civil or criminal liability for your company. Data loss - Data can be electronically destroyed or altered either accidentally or maliciously. Damage to reputation - Customers, potential customers, investors, and potential investors are all influenced by a security incident. Downtime - A security incident can shut an organization down. 4/30/2019 CSG Systems, Inc.Confidential & Proprietary ©2000, CSG Systems, Inc. All rights reserved
7
Anatomy of a Hack Perimeter / Vulnerability Assessment Exploitation
Footprinting Scanning Enumeration Exploitation Gaining Access Escalating privileges Pilfering Covering Tracks Creating backdoors 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
8
Assessment Footprinting - Information gathering
Open source search on the site Network Solutions ( ARIN whois ( This gives network and contact information DNS lookup (nslookup, Sam Spade) The Domain Name Server gives further network and system information 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
9
Assessment Scanning - System type Enumeration - Getting details
IP Address determination - ping sweep Determines which systems I can access Port Scan (TCP/UDP) Shows what is “open” on those systems Enumeration - Getting details System/application vulnerabilities What’s running on a particular system System users Who is on that system 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
10
Exploitation Gaining access Escalating privilege (gaining root/admin)
Password eavesdropping Buffer overflows Application vulnerabilities Escalating privilege (gaining root/admin) Password cracking Network sniffing 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
11
Exploitation Pilfering - getting the “crown jewels” Covering Tracks
Finding whatever is valuable such as Credit information Personal information Additional system information Covering Tracks Loading a “root kit” Clear log files Hide tools Secure the system Creating back doors - so they can get in again 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
12
Denial of Service (DoS)
Rendering a service offered by a workstation or server unavailable to others - Disabling the target. Reasons: To get a system reboot Hacker covering his/her tracks Malicious intent How it’s done: Ping of death - ICMP techniques Syn (network) vulnerabilities 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
13
Social Engineering An attack based on deceiving users or administrators at the target site to gain information or access. The “old con job” Typically done by telephoning users or operators. The “hackers” pretend to be an authorized user and attempt to gain information about the systems and/or gain illicit access to systems. Requires little technical skill. Relies on people’s “natural” trusting nature. 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
14
What you can do ALL systems/applications are insecure! It’s up to the administrators and users for security. Think Security Secure passwords Physical security Report incidents/anomalies Work with system/application administrators 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.