C:\Fakepath\Ethical Hacking

52
1 G lim p s e on ComputerSecurity A presentation by – Sumit Dimri

Transcript of C:\Fakepath\Ethical Hacking

1

G lim p s e o n C o m p u t e r S e c u r it y

A presentation by –Sumit Dimri

AGENDA

SECURITY GOOGLE HACKING SNIFFERS ARP SPOOFING STEGANOGRAPHY SOCIAL ENGINEERING HACKING WEB SERVER

2

3

Net work Securi t y

A Br i ef Hi st ory of t he Wor l d

4

Overvi ew

What is security? Why do we need security? Who is vulnerable?

5

What i s “Secur i t y”

Dictionary.com says: 1. Freedom from risk or danger; safety. 2. Freedom from doubt, or fear; confidence. 3. Something that gives or assures safety, as:

1. A group or department of private guards: Call building security if a visitor acts suspicious.

2. Measures adopted by a government to prevent attack. 3. Measures adopted, as by a business or homeowner, to

prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.

…etc.

6

Why do we need secur i t y?

Protect vital information while still allowing access to those who need it Trade secrets, medical records, etc.

Provide authentication and access control for resources

7

Who i s vul nerabl e?

Financial institutions and banks Internet service providers Government and defense agencies Contractors to various government

agencies Multinational corporations ANYONE ON THE NETWORK

8

Secur i t y rel at ed URLs

http://www.robertgraham.com/pubs/network-intrusion-detection.html http://online.securityfocus.com/infocus/1527 http://www.snort.org/ http://www.cert.org/ http://www.nmap.org/ http://grc.com/dos/grcdos.htm http://lcamtuf.coredump.cx/newtcp/

9

Googl e Hacki ng

Plays a very important role in collecting information about the target.

Google has a variety of special search syntaxes.

List of employees, their personal details. Sometimes simple searches yield personal

pages and non authorized information. Google can assist an ethical hacker in many

ways.

What i s Googl e ? A powerful full-text search engine that

indexes over 10 billion websites A tool A site that has launched a vocabulary all its

own

How doe s Googl e TM ?work

The speci al synt axes

INTITLEintitle: restricts your search to the titles

of web pages.Intitle: “HACKING”

I NURL

inurl: restricts your search to the URLs of web pages. This syntax tends to work well for finding search and help pages because they tend to be rather regular in composition.

Inurl: hacking

SI TE

Site: allows you to narrow your search by either a site or a top-level domain.

Site:edu

LI NK

Link: returns a list of pages linking to the specified URL. Enter link:www.orkut.com and you’ll be returned a list of pages that link to Orkut.

FI LETYPE

Filetype: searches the suffixes or filename extensions.

Filetype:ppt google hacking

15-441 Networks Fall 2002 23

15-441 Networks Fall 2002 24

What are Sni f f ers?

Sniffers monitor network data. A sniffer usually act as network probes or

“snoops”-examining network traffic but not intercepting or altering them.

Ettercap is the best tool for sniffer.

ARP Spoof i ng

Getting max internet speed using ARP spoofing.

ARP POI SONI NG : arp -a

15-441 Networks Fall 2002 30

15-441 Networks Fall 2002 31

What i s Steganography?

The process of hiding data in images is called Steganography.

Attackers can embed information such as: Source code for hacking tool. List of compromised servers. Plans for future attacks.

What I s Soci al Engi neer i ng Social engineering is the human side of

breaking into a corporate network. An employee may unwittingly give away key

information in an email or by answering questions over the phone with someone they don’t know.

Art Of Mani pul at i on

The goal of a social engineer is to trick someone into providing valuable information or access to that information.

It preys on qualities of human nature, such as the desire to be helpful, the tendency to trust people and the fear of getting in trouble.

Human Weakness

People are usually the weakest link in the security chain.

Social engineering is the hardest form of attack to defend against because it cannot be defended with hardware or software alone.

Human Based Soci al Engi neer i ng

Human based social engineering can be broadly categorized into:

Technical support Third person approach Dumpster Diving Shoulder Surfing

Comput er Based Soci al Engi neer i ng

These can be divided into the following categories:

Mail attachments Websites Spam Mail

Reverse Soci al Engi neer i ng More advanced method of gaining illicit

information is known as “reverse social engineering”.

This is when the hacker creates a persona that appears to be in a position of authority so that employees will ask him for information, rather than the other way around.

Hacki ng Web Servers

Popular web servers Apache web server IIS Web server Sun ONE web server

I nvadi ng PHP server

Sites with PHP 4.4 have a SQL injection vulnerability in them which makes their Admin control panel easily accessible . This tutorial is applicable on PHP4.4 machines with Apache running in parallel with them.

St eps f or web hacki ng

1. Search the server Make a Google dork to find sites running Apache

and PHP4.4 .

2. Scan the server Start by scanning them using Nmap,Do

and intense scan and find the open ports. If you find port 2000 open, then you have almost got it. Most websites running

PHP4.4 have this port for admin login.

Now just login using port 2000 http://www.website.com:2000And you will be comfortably login into admin Page like this-

3.Hack the siteNow in the fields, you have to type-Username – adminPassword – a’ or 1=1 or ‘bDomain - a’ or 1=1 or ‘bAnd press go , you will login into admin.

Now you have hacked into admin. Actually sitesbased on PHP4.4 have the vulnerability in themthat they are vulnerable to SQL injection. It will Literally take 20 seconds.

Thanks For your t i me

52