Presentation is loading. Please wait.

Presentation is loading. Please wait.

Project S.N.U.P.E( ) By Patrick D. Cook. Introduction  Background Why this topic and what is S.N.U.P.E ()  Purpose Look for vulnerabilities within a.

Similar presentations


Presentation on theme: "Project S.N.U.P.E( ) By Patrick D. Cook. Introduction  Background Why this topic and what is S.N.U.P.E ()  Purpose Look for vulnerabilities within a."— Presentation transcript:

1 Project S.N.U.P.E( ) By Patrick D. Cook

2 Introduction  Background Why this topic and what is S.N.U.P.E ()  Purpose Look for vulnerabilities within a networkLook for vulnerabilities within a network Analyze and Mitigate the riskAnalyze and Mitigate the risk  Topic Area Penetration TestingPenetration Testing White hat hackingWhite hat hacking

3 Staging  Purpose  Tools CyberarmyCyberarmy http://www.cyberarmy.com Whois http://www.networksolutions.comWhois http://www.networksolutions.com http://www.networksolutions.com WS_ Ping Pack Pro http://www.ipswitch.comWS_ Ping Pack Pro http://www.ipswitch.com http://www.ipswitch.com  Layers of the OSI model

4 Neutralizing  Purpose  Tools File WranglerFile Wrangler http://www.tucows.com http://www.tucows.comhttp://www.tucows.com PowerDesk's ExplorerPlusPowerDesk's ExplorerPlus http://www.mijenix.com/powerdesk98.asp RevelationRevelation http://www.snadboy.com http://www.snadboy.comhttp://www.snadboy.com  Layers of the OSI model

5 Unarming  Purpose  Tools Cygwin Win32Cygwin Win32 http://www.cygnus.com http://www.cygnus.comhttp://www.cygnus.com WipeWipe ftp://ftp.technotronic.com/unix/log-tools/wipe-1.00.tgz ZapZap ftp://ftp.technotronic.com/unix/log-tools/zap.c  Layers of the OSI model

6 Penetration  Purpose  Tools L0phtcrack's Reads mb http://www.l0pht.com/L0phtcrack's Reads mb http://www.l0pht.com/ http://www.l0pht.com/ LegionLegion http://www.rhino9.com http://www.rhino9.comhttp://www.rhino9.com  Layers of the OSI model

7 Exploiting  Purpose  Tools PortfuckPortfuck http://www.stargazer.net UnhideUnhide http://www.webdon.com  Layers of the OSI model

8 Real World Examples  Microsoft Security Flaw http://money.cnn.com/2003/05/09/tech nology/msft_passport.reut/http://money.cnn.com/2003/05/09/tech nology/msft_passport.reut/http://money.cnn.com/2003/05/09/tech nology/msft_passport.reut/http://money.cnn.com/2003/05/09/tech nology/msft_passport.reut/  High School Student teaches school http://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker021225.htmlhttp://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker021225.htmlhttp://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker021225.htmlhttp://abcnews.go.com/sections/scitech /TechTV/techtv_HS_hacker021225.html

9 Summary  The majority of the tools attack a similar area from the Transport layer to the Application layer (as indicated by the following diagram) is the most vulnerable to attacks.

10 References  Stuart McClure, Joel Scambra, and George Kurtz, Hacking Expose: Network Security Threats and Solutions ( California: Osborne/McGraw-Hill, 2001)  The biggest virus encyclopedia: Virus List.com http://www.viruslist.com/ http://www.viruslist.com/


Download ppt "Project S.N.U.P.E( ) By Patrick D. Cook. Introduction  Background Why this topic and what is S.N.U.P.E ()  Purpose Look for vulnerabilities within a."

Similar presentations


Ads by Google