Download presentation
Presentation is loading. Please wait.
Published byPosy Winifred Knight Modified over 8 years ago
1
Project S.N.U.P.E( ) By Patrick D. Cook
2
Introduction Background Why this topic and what is S.N.U.P.E () Purpose Look for vulnerabilities within a networkLook for vulnerabilities within a network Analyze and Mitigate the riskAnalyze and Mitigate the risk Topic Area Penetration TestingPenetration Testing White hat hackingWhite hat hacking
3
Staging Purpose Tools CyberarmyCyberarmy http://www.cyberarmy.com Whois http://www.networksolutions.comWhois http://www.networksolutions.com http://www.networksolutions.com WS_ Ping Pack Pro http://www.ipswitch.comWS_ Ping Pack Pro http://www.ipswitch.com http://www.ipswitch.com Layers of the OSI model
4
Neutralizing Purpose Tools File WranglerFile Wrangler http://www.tucows.com http://www.tucows.comhttp://www.tucows.com PowerDesk's ExplorerPlusPowerDesk's ExplorerPlus http://www.mijenix.com/powerdesk98.asp RevelationRevelation http://www.snadboy.com http://www.snadboy.comhttp://www.snadboy.com Layers of the OSI model
5
Unarming Purpose Tools Cygwin Win32Cygwin Win32 http://www.cygnus.com http://www.cygnus.comhttp://www.cygnus.com WipeWipe ftp://ftp.technotronic.com/unix/log-tools/wipe-1.00.tgz ZapZap ftp://ftp.technotronic.com/unix/log-tools/zap.c Layers of the OSI model
6
Penetration Purpose Tools L0phtcrack's Reads mb http://www.l0pht.com/L0phtcrack's Reads mb http://www.l0pht.com/ http://www.l0pht.com/ LegionLegion http://www.rhino9.com http://www.rhino9.comhttp://www.rhino9.com Layers of the OSI model
7
Exploiting Purpose Tools PortfuckPortfuck http://www.stargazer.net UnhideUnhide http://www.webdon.com Layers of the OSI model
8
Real World Examples Microsoft Security Flaw http://money.cnn.com/2003/05/09/tech nology/msft_passport.reut/http://money.cnn.com/2003/05/09/tech nology/msft_passport.reut/http://money.cnn.com/2003/05/09/tech nology/msft_passport.reut/http://money.cnn.com/2003/05/09/tech nology/msft_passport.reut/ High School Student teaches school http://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker021225.htmlhttp://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker021225.htmlhttp://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker021225.htmlhttp://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker021225.html
9
Summary The majority of the tools attack a similar area from the Transport layer to the Application layer (as indicated by the following diagram) is the most vulnerable to attacks.
10
References Stuart McClure, Joel Scambra, and George Kurtz, Hacking Expose: Network Security Threats and Solutions ( California: Osborne/McGraw-Hill, 2001) The biggest virus encyclopedia: Virus List.com http://www.viruslist.com/ http://www.viruslist.com/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.