Presentation is loading. Please wait.

Presentation is loading. Please wait.

JMU GenCyber Boot Camp Summer, 2015. Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.

Similar presentations


Presentation on theme: "JMU GenCyber Boot Camp Summer, 2015. Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning."— Presentation transcript:

1 JMU GenCyber Boot Camp Summer, 2015

2 Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning – Modems/Wireless Access Points – Hosts – Network hardware – Services – Vulnerabilities JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 2

3 Reconnaissance – Step 1 Information gathering – investigate the target using publicly-available information Analogy: a bank robber “casing the joint” – Visit the bank – Note times employees (especially security guard) arrive and leave – Note location of security cameras, guards, safe, etc. – Determine make and model of alarm system and safe; Research them – Plan the robbery – Plan getaway route JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 3

4 Information Gathering Prior to launching an attack, skilled computer attackers often try to learn as much as possible about: – The systems and networks they plan to attack Hardware and software Topology Typical operation – Owners, users, and administrators JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 4

5 Tools for Information Gathering JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 5 The Web – Target organization’s web site may contain: Employee contact information and phone numbers Business partners Technologies in use – Other information about the target: Search engines Customers and business partners Whois databases ARIN DNS servers

6 Goals of Information Gathering Determine: – What is available to steal/deface/shutdown? – What avenue of attack is most likely to succeed? – What are the chances of getting caught? – Etc. JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 6

7 Social Engineering Deceiving people into revealing sensitive/useful information May be attempted: – In person or remotely (e.g. phone, e-mail, etc.) – Once or over a period of time Can result in: – Sensitive information – Unauthorized access – Passwords – Etc. JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 7

8 Social Engineering from The Master  The Art of Deception by Kevin Mitnick JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 8

9 Social Engineering - Examples A “new employee” calls the help desk to get help with a particular task An “angry manager” calls a lower-level employee because the manager’s password has suddenly stopped working An “administrator” calls an employee because there is something wrong with the employee’s account An “employee” in the field calls to get a remote access phone number JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 9

10 Defenses Against Social Engineering Policies – Information that should never be divulged over the phone – Procedures for maintenance, password resets, etc. User education JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 10

11 Social Engineering Examples Lottery Tickets Inheritance from Africa I Love You Virus Disk Space Over Quota Bank Account Suspicious Activity Bank Account updating system JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 11

12 Physical Break-ins An attacker might show up at an organization and attempt to: – Physically access computer systems – Install malicious hardware or software – Steal sensitive documents, storage media, or a computer system – Etc. JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 12

13 Defenses Against Physical Break-ins Policy – Locks – Alarms – Badges – Guards User education JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 13

14 Dumpster Diving What might an attacker be able to find by going through the trash? – Old versions of sensitive documents or e-mail – Discarded disks, tapes, and other media – Post-it note with a username and password – Etc. JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 14

15 Defenses Against Dumpster Diving Policy – Paper shredders – Media cleansers – Special trash cans for sensitive material User education JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 15

16 Reconnaissance – Step 2 Scanning – many tools are available to automate the search for: – Modems – Hosts – Network hardware – Services – Vulnerabilities JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 16

17 War Dialers Obtain a range of phone numbers used by the target organization – Phone book – Web – Social engineering A war dialer is a program that will dial each number and record whether or not a modem answers (ever seen War Games?) JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 17

18 War Dialers (cont) Once modems are found: – Nudging – send characters to modem and note the reply (hopefully a banner) – Look for modems which do not require passwords – For those that do require passwords, try some guesses Finding modems can be very valuable: – Can give remote (sometimes privileged) access to networks and systems PCanywhere, LapLink, ControlIT – Completely bypass Internet gateways and firewalls JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 18

19 Defenses Against War Dialers Policies – Who can have a modem? – How will it be secured? – How can employees remotely access their systems? Periodic checks for compliance User education JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 19

20 WarDriving/WarBiking/WarWalkin g Search for accessible wireless networks Examples: – Kismet (http://www.kismetwireless.net/ )http://www.kismetwireless.net/ – NetStumbler (http://www.stumbler.net/ )http://www.stumbler.net/ Defenses – Policy – Periodic compliance checks – User education JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 20

21 Reconnaissance - Summary Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning – Modems – Wireless Access Points User Education! JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 21


Download ppt "JMU GenCyber Boot Camp Summer, 2015. Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning."

Similar presentations


Ads by Google