Presentation is loading. Please wait.

Presentation is loading. Please wait.

How do hackers do it?.

Similar presentations


Presentation on theme: "How do hackers do it?."— Presentation transcript:

1 how do hackers do it?

2 1. gather info on the target host

3 whois Organization: Fiji ABCDEFG Inc. Admin-Name: Josese Bula Admin-Mailbox: Tech-Name: Maciu Vinaka Tech-Mailbox: NS1-Hostname: dns1.somenetwork.com.fj NS1-Netaddress:

4 Google Find vulnerabilities, revealing error messages, usernames and sometimes even passwords on your target host, all without ever connecting to it see

5 2. scan/sniff to find a way in

6 nmap superscan

7 tcpdump wireshark (formerly ethereal) dsniff

8 nessus

9 3. exploit vulnerabilities

10 metasploit framework

11 john the ripper cain and abel thc-hydra

12 4. cover your tracks

13 nc -L -d -t -p 23 -e cmd.exe rootkits

14 edit logs

15 help! what can i do?

16 . remove all unnecessary services
. firewall services that do not need remote access . actively patch vulnerabilities . use strong passwords most importantly: . educate your users again and again and again

17 chris hammond-thrasher, cissp


Download ppt "How do hackers do it?."

Similar presentations


Ads by Google