Ethical Hacking Presentation October 2006

98
 Ethical Hacking for Ethical Hacking for Educators Educators Presented By Presented By Regina DeLisse Hartley, Ph.D. Regina DeLisse Hartley, Ph.D. Caldwell Community College & Caldwell Community College & Technical Institute Technical Institute

Transcript of Ethical Hacking Presentation October 2006

Page 1: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 1/98

 

Ethical Hacking for Ethical Hacking for 

EducatorsEducators

Presented ByPresented By

Regina DeLisse Hartley, Ph.D.Regina DeLisse Hartley, Ph.D.

Caldwell Community College & Caldwell Community College & 

Technical InstituteTechnical Institute

Page 2: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 2/98

 

OverviewOverview

Old School Hackers: History of HackingOld School Hackers: History of Hacking Ec-Council: Certified Ethical HackerEc-Council: Certified Ethical Hacker Learning CompetenciesLearning Competencies Teaching Resources: Ethical HackingTeaching Resources: Ethical Hacking

TextbooksTextbooks Hacking ToolsHacking Tools Hacker Challenge WebsitesHacker Challenge Websites Additional Web SitesAdditional Web Sites Questions and AnswersQuestions and Answers

Page 3: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 3/98

 

Old School Hackers:Old School Hackers:

History of HackingHistory of Hacking

Page 4: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 4/98

 

PREHISTORYPREHISTORY 1960s: The Dawn of 1960s: The Dawn of 

HackingHacking

Original meaning of theOriginal meaning of theword "hack" started atword "hack" started atMIT; meant elegant, wittyMIT; meant elegant, wittyor inspired way of doingor inspired way of doingalmost anything; hacksalmost anything; hackswere programmingwere programming

shortcutsshortcutsELDER DAYS (1970-1979)ELDER DAYS (1970-1979) 1970s: Phone Phreaks1970s: Phone Phreaks

and Cap'n Crunch:and Cap'n Crunch: OneOnephreak, John Draper (akaphreak, John Draper (aka

"Cap'n Crunch"), discovers"Cap'n Crunch"), discoversa toy whistle inside Cap'na toy whistle inside Cap'nCrunch cereal gives 2600-Crunch cereal gives 2600-hertz signal, and canhertz signal, and canaccess AT&T's long-access AT&T's long-

distance switching system.distance switching system.

DraperDraper builds a "bluebuilds a "bluebox" used with whistlebox" used with whistleallows phreaks to makeallows phreaks to makefree calls.free calls.

Steve WozniakSteve Wozniak andandSteve Jobs, futureSteve Jobs, futurefounders of Applefounders of AppleComputer, make and sellComputer, make and sellblue boxes.blue boxes.

THE GOLDEN AGETHE GOLDEN AGE(1980-1991)(1980-1991) 1980: Hacker Message1980: Hacker Message

Boards and GroupsBoards and GroupsHacking groups form;Hacking groups form;

such as Legion of Doomsuch as Legion of Doom(US), Chaos Computer(US), Chaos ComputerClub (Germany).Club (Germany).

1983: Kids' Games1983: Kids' GamesMovie "War Games"Movie "War Games"

introduces public tointroduces public tohacking.hacking.

Page 5: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 5/98

 

THE GREAT HACKER WAR THE GREAT HACKER WAR  Legion of DoomLegion of Doom vsvs

Masters of Deception;Masters of Deception;

online warfare; jammingonline warfare; jammingphone lines.phone lines.

1984: Hacker 'Zines1984: Hacker 'ZinesHacker magazine 2600Hacker magazine 2600publication; online 'zinepublication; online 'zine

Phrack.Phrack.CRACKDOWN (1986-CRACKDOWN (1986-

1994)1994) 1986:1986: Congress passesCongress passes

Computer Fraud and AbuseComputer Fraud and Abuse

Act; crime to break intoAct; crime to break intocomputer systems.computer systems. 11988: The Morris Worm988: The Morris Worm

Robert T. Morris, Jr.,Robert T. Morris, Jr.,launches self-replicatinglaunches self-replicating

worm on ARPAnet.worm on ARPAnet.

1989: The Germans ,the KGB and KevinMitnick.

German Hackers arrested for breakinginto U.S. computers;sold information toSoviet KGB.

Hacker "The Mentor“ arrested; publishesHacker's Manifesto.

Kevin Mitnick convicted; first person

convicted under lawagainst gaining accessto interstate networkfor criminal purposes.

Page 6: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 6/98

 

1993: Why Buy a Car1993: Why Buy a CarWhen You Can HackWhen You Can HackOne?One?Radio station call-inRadio station call-in

contest; hacker-fugitivecontest; hacker-fugitiveKevin Poulsen and friendsKevin Poulsen and friendscrack phone; theycrack phone; theyallegedly get two Porsches,allegedly get two Porsches,$20,000 cash, vacation$20,000 cash, vacationtrips; Poulsen now atrips; Poulsen now afreelance journalistfreelance journalistcovering computer crime.covering computer crime.

First Def ConFirst Def Con hackinghackingconference in Las Vegasconference in Las Vegas

ZERO TOLERANCE (1994-ZERO TOLERANCE (1994-

1998)1998) 1995: The Mitnick1995: The Mitnick

Takedown:Takedown: ArrestedArrestedagain; charged withagain; charged withstealing 20,000 credit cardstealing 20,000 credit card

numbers.numbers.

1995: Russian Hackers Siphon $10 million fromCitibank; Vladimir Levin,leader.

Oct 1998 teenager hacksinto Bell Atlantic phonesystem; disabledcommunication at airportdisables runway lights.

1999 hackers attackPentagon, MIT, FBI websites.

1999: E-commercecompany attacked;

blackmail threats followedby 8 million credit cardnumbers stolen. (www.blackhat.info; www.h2k2.net;www.slais.ubc.ca/; www.sptimes.com;www.tlc.discovery.com) 

Page 7: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 7/98

 

Ec-Council: Certified EthicalEc-Council: Certified Ethical

Hacker Hacker 

Page 8: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 8/98

 

EC-Council has certified ITEC-Council has certified IT

professionals from the followingprofessionals from the followingorganizations as CEH:organizations as CEH:

Novell, Canon, Hewlett Packard, US Air ForceNovell, Canon, Hewlett Packard, US Air ForceReserve, US Embassy, Verizon, PFIZER, HDFCReserve, US Embassy, Verizon, PFIZER, HDFCBank, University of Memphis, MicrosoftBank, University of Memphis, MicrosoftCorporation, Worldcom, Trusecure, USCorporation, Worldcom, Trusecure, USDepartment of Defense, Fedex, Dunlop, BritishDepartment of Defense, Fedex, Dunlop, British

Telecom, Cisco, Supreme Court of the Philippines,Telecom, Cisco, Supreme Court of the Philippines,United Nations, Ministry of Defense, UK, NortelUnited Nations, Ministry of Defense, UK, NortelNetworks, MCI, Check Point Software, KPMG, FleetNetworks, MCI, Check Point Software, KPMG, FleetInternational, Cingular Wireless, Columbia DailyInternational, Cingular Wireless, Columbia DailyTribune, Johnson & Johnson, Marriott Hotel,Tribune, Johnson & Johnson, Marriott Hotel,Tucson Electric Power Company, Singapore PoliceTucson Electric Power Company, Singapore Police

ForceForce

Page 9: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 9/98

 

PriceWaterhouseCoopers, SAP, Coca-Cola

Corporation, Quantum Research, US Military, IBMGlobal Services, UPS, American Express, FBI,Citibank Corporation, Boehringer Ingelheim,Wipro, New York City Dept Of IT & Telecom –DoITT, United States Marine Corps, ReserveBank of India, US Air Force, EDS, Bell Canada,SONY, Kodak, Ontario Provincial Police, HarrisCorporation, Xerox, Philips Electronics, U.S.Army, Schering, Accenture, Bank One, SAIC,Fujitsu, Deutsche Bank

(Cont.)(Cont.)

Page 10: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 10/98

 

Hackers are here. Where areHackers are here. Where are

you?you?  The explosive growth of the Internet hasThe explosive growth of the Internet has

brought many good things…As with mostbrought many good things…As with mosttechnological advances, there is also a darktechnological advances, there is also a darkside: criminal hackers.side: criminal hackers.

The term “hacker” has a dual usage in theThe term “hacker” has a dual usage in thecomputer industry today. Originally, the termcomputer industry today. Originally, the termwas defined as:was defined as:

HACKER HACKER noun.noun. 1. A person who enjoys1. A person who enjoys

learning the details of computer systems andlearning the details of computer systems andhow to stretch their capabilities…. 2. One whohow to stretch their capabilities…. 2. One whoprograms enthusiastically or who enjoysprograms enthusiastically or who enjoysprogramming rather than just theorizing aboutprogramming rather than just theorizing about

programming.programming.

Page 11: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 11/98

 

What is a Hacker?What is a Hacker?

Old School Hackers:Old School Hackers: 1960s style Stanford or MIT1960s style Stanford or MIThackers. Do not have malicious intent, but do havehackers. Do not have malicious intent, but do havelack of concern for privacy and proprietarylack of concern for privacy and proprietaryinformation. They believe the Internet wasinformation. They believe the Internet wasdesigned to be an open system.designed to be an open system.

Script Kiddies or Cyber-Punks:Script Kiddies or Cyber-Punks: Between 12-30;Between 12-30;predominantly white and male; bored in school; getpredominantly white and male; bored in school; getcaught due to bragging online; intent is tocaught due to bragging online; intent is tovandalize or disrupt systems.vandalize or disrupt systems.

Professional Criminals or Crackers:Professional Criminals or Crackers: Make aMake aliving by breaking into systems and selling theliving by breaking into systems and selling theinformation.information.

Coders and Virus Writers:Coders and Virus Writers: See themselves as anSee themselves as anelite; programming background and write code butelite; programming background and write code butwon’t use it themselves; have their own networkswon’t use it themselves; have their own networkscalled “zoos”; leave it to others to release theircalled “zoos”; leave it to others to release their

code into “The Wild” or Internet.code into “The Wild” or Internet. ((www.tlc.discovery.comwww.tlc.discovery.com))

Page 12: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 12/98

 

What is Ethical Hacking?What is Ethical Hacking? 

Ethical hackingEthical hacking – defined “methodology– defined “methodologyadopted by ethical hackers to discover theadopted by ethical hackers to discover thevulnerabilities existing in informationvulnerabilities existing in informationsystems’ operating environments.” systems’ operating environments.” 

With the growth of the Internet, computerWith the growth of the Internet, computersecurity has become a major concern forsecurity has become a major concern forbusinesses and governments.businesses and governments.

In their search for a way to approach theIn their search for a way to approach theproblem, organizations came to realizeproblem, organizations came to realize

that one of the best ways to evaluate thethat one of the best ways to evaluate theintruder threat to their interests would beintruder threat to their interests would beto have independent computer securityto have independent computer securityprofessionals attempt to break into theirprofessionals attempt to break into their

computer systems.computer systems.

Page 13: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 13/98

 

Who are Ethical Hackers?Who are Ethical Hackers?  ““One of the best ways to evaluate the intruder One of the best ways to evaluate the intruder 

threat is to have an independent computer threat is to have an independent computer  security professionals attempt to break their  security professionals attempt to break their computer systems” computer systems” 

Successful ethical hackers possess a variety of Successful ethical hackers possess a variety of 

skills. First and foremost, they must be completelyskills. First and foremost, they must be completelytrustworthy.trustworthy. Ethical hackers typically have very strongEthical hackers typically have very strong

programming and computer networking skills.programming and computer networking skills. They are also adept at installing and maintainingThey are also adept at installing and maintaining

systems that use the more popular operatingsystems that use the more popular operatingsystems (e.g., Linux or Windows 2000) used onsystems (e.g., Linux or Windows 2000) used ontarget systems.target systems.

These base skills are augmented with detailedThese base skills are augmented with detailedknowledge of the hardware and software providedknowledge of the hardware and software provided

by the more popular computer and networkingby the more popular computer and networkinghardware vendors.hardware vendors.

Page 14: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 14/98

 

What do Ethical Hackers do?What do Ethical Hackers do? 

An ethical hacker’s evaluation of a system’sAn ethical hacker’s evaluation of a system’s

security seeks answers to these basic questions:security seeks answers to these basic questions:

• What can an intruder see on the targetWhat can an intruder see on the target

systems?systems?

• What can an intruder do with that information?What can an intruder do with that information?

• Does anyone at the target notice the intruder’sDoes anyone at the target notice the intruder’s

at tempts or successes?at tempts or successes?

• What are you trying to protect?What are you trying to protect?• What are you trying to protect against?What are you trying to protect against?

• How much time, effort, and money are youHow much time, effort, and money are you

willing to expend to obtain adequatewilling to expend to obtain adequate

protection?protection?

Page 15: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 15/98

 

How much do Ethical HackersHow much do Ethical Hackers

get Paid?get Paid? Globally, the hiring of ethical hackers is onGlobally, the hiring of ethical hackers is on

the rise with most of them working withthe rise with most of them working with

top consulting firms.top consulting firms. In the United States, an ethical hacker canIn the United States, an ethical hacker can

make upwards of $120,000 per annum.make upwards of $120,000 per annum. Freelance ethical hackers can expect toFreelance ethical hackers can expect to

make $10,000 per assignment.make $10,000 per assignment. Some ranges from $15,000 toSome ranges from $15,000 to

$45,000 for a standalone ethical$45,000 for a standalone ethical

hack.hack.

Page 16: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 16/98

 

Certified Ethical Hacker (C|EH)Certified Ethical Hacker (C|EH)

TrainingTraining

InfoSec AcademyInfoSec Academy

http://www.infosecacademy.comhttp://www.infosecacademy.com

• Five-dayFive-day Certified Ethical Hacker (C|EH)Certified Ethical Hacker (C|EH) Training Camp Certification Training ProgramTraining Camp Certification Training Program

• (C|EH)(C|EH) examinationexamination

• C|EH Certified EthicalC|EH Certified Ethical

Hacker Training CampHacker Training Camp(5-Day Package)(5-Day Package)$3,595$3,595

($2,580 training only)($2,580 training only)

(Source: www.eccouncil.org)

Page 17: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 17/98

 

Learning CompetenciesLearning Competencies

Page 18: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 18/98

 

Required Skills of an EthicalRequired Skills of an Ethical

Hacker Hacker 

Routers:Routers: knowledge of routers, routingknowledge of routers, routingprotocols, and access control listsprotocols, and access control lists

Microsoft:Microsoft: skills in operation, configuration andskills in operation, configuration andmanagement.management.

Linux:Linux: knowledge of Linux/Unix; securityknowledge of Linux/Unix; securitysetting, configuration, and services.setting, configuration, and services.

Firewalls:Firewalls: configurations, and operation of configurations, and operation of intrusion detection systems.intrusion detection systems.

MainframesMainframes Network Protocols:Network Protocols: TCP/IP; how they functionTCP/IP; how they function

and can be manipulated.and can be manipulated. Project Management:Project Management: knowledge of leading,knowledge of leading,

planning, organizing, and controlling aplanning, organizing, and controlling apenetration testing team.penetration testing team.

(Source: http://www.examcram.com)

Page 19: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 19/98

 

Modes of Ethical HackingModes of Ethical Hacking

Insider attackInsider attack

Outsider attackOutsider attack

Stolen equipment attackStolen equipment attack Physical entryPhysical entry

Bypassed authentication attackBypassed authentication attack

(wireless access points)(wireless access points) Social engineering attackSocial engineering attack

(Source: http://www.examcram.com)

Page 20: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 20/98

 

Anatomy of an attack:Anatomy of an attack:

• ReconnaissanceReconnaissance – attacker gathers– attacker gathers

information; can include socialinformation; can include socialengineering.engineering.• ScanningScanning – searches for open ports (port– searches for open ports (port

scan) probes target for vulnerabilities.scan) probes target for vulnerabilities.

• Gaining accessGaining access – attacker exploits– attacker exploitsvulnerabilities to get inside system; usedvulnerabilities to get inside system; usedfor spoofing IP.for spoofing IP.

• Maintaining accessMaintaining access – creates backdoor– creates backdoorthrough use of Trojans; once attackerthrough use of Trojans; once attackergains access makes sure he/she can getgains access makes sure he/she can getback in.back in.

• Covering tracksCovering tracks – deletes files, hides– deletes files, hidesfiles, and erases log files. So that attackerfiles, and erases log files. So that attacker

cannot be detected or penalized.cannot be detected or penalized.(Source: www.eccouncil.org)

Page 21: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 21/98

 

Hacker classesHacker classes

• Black hatsBlack hats – highly skilled,– highly skilled,

malicious, destructive “crackers” malicious, destructive “crackers” • White hatsWhite hats – skills used for– skills used for

defensive security analystsdefensive security analysts

• Gray hatsGray hats – offensively and– offensively and

defensively; will hack for differentdefensively; will hack for different

reasons, depends on situation.reasons, depends on situation. HactivismHactivism – hacking for social and– hacking for social and

political cause.political cause. Ethical hackersEthical hackers – determine what– determine what

attackers can gain access to, what theyattackers can gain access to, what theywill do with the information, and can theywill do with the information, and can they

be detected.be detected. (Source: www.eccouncil.org)

Page 22: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 22/98

 

Teaching Resources: EthicalTeaching Resources: EthicalHacking TextbooksHacking Textbooks

Page 23: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 23/98

 

Ec-CouncilEc-Council

Certified Ethical HackerCertified Ethical Hacker

www.eccouncil.org

ISBN 0-9729362-1-1

Page 24: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 24/98

Page 25: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 25/98

 

Ec-Council (Cont.)Ec-Council (Cont.)

Web Application VulnerabilitiesWeb Application Vulnerabilities Web Based Password Cracking TechniquesWeb Based Password Cracking Techniques SQL InjectionSQL Injection Hacking Wireless NetworksHacking Wireless Networks VirusesViruses Novell HackingNovell Hacking

Linux HackingLinux Hacking Evading IDS, Firewalls and HoneypotsEvading IDS, Firewalls and Honeypots Buffer OverflowsBuffer Overflows CryptographyCryptography

Page 26: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 26/98

 

Certified Ethical Hacker ExamCertified Ethical Hacker Exam

PrepPrep

http://www.examcram.comISBN 0-7897-3531-8

Page 27: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 27/98

 

Certified Ethical Hacker ExamCertified Ethical Hacker Exam

PrepPrep

The Business Aspects of PenetrationThe Business Aspects of PenetrationTestingTesting

The Technical Foundations of HackingThe Technical Foundations of Hacking Footprinting and ScanningFootprinting and Scanning Enumeration and System HackingEnumeration and System Hacking Linux and automated Security AssessmentLinux and automated Security Assessment

ToolsTools Trojans and BackdoorsTrojans and Backdoors Sniffers, Session Hyjacking, and Denial of Sniffers, Session Hyjacking, and Denial of 

ServiceService

Page 28: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 28/98

 

Certified Ethical Hacker ExamCertified Ethical Hacker Exam

Prep (Cont.)Prep (Cont.) Web Server Hacking, Web Applications,Web Server Hacking, Web Applications,

and Database Attacksand Database Attacks

Wireless Technologies, Security, andWireless Technologies, Security, and

AttacksAttacks

IDS, Firewalls, and HoneypotsIDS, Firewalls, and Honeypots

Buffer Overflows, Viruses, and WormsBuffer Overflows, Viruses, and Worms Cryptographic Attacks and DefensesCryptographic Attacks and Defenses

Physical Security and Social EngineeringPhysical Security and Social Engineering

Page 29: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 29/98

 

Hands-On Information SecurityHands-On Information Security

Lab Manual, Second EditionLab Manual, Second Edition

http://www.course.com/

ISBN 0-619-21631-X

1. Footprinting

2. Scanning and Enumeration

3. Operating System Vulnerabilities

and Resolutions4. Network Security Tools and

Technologies

5. Security Maintenance

6. Information SecurityManagement

7. File System Security and

Cryptography

8. Computer Forensics

Page 30: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 30/98

 

Hacking Tools: Footprinting andHacking Tools: Footprinting and

ReconnaissanceReconnaissance 

Page 31: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 31/98

 

WhoisWhois

Page 32: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 32/98

 

Whois (cont.)Whois (cont.)

http://www.allwhois.com/

Page 33: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 33/98

 

Whois (cont.)Whois (cont.)

Page 34: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 34/98

 

Sam SpadeSam Spade

Page 35: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 35/98

 

Sam Spade (Cont.)Sam Spade (Cont.)

Page 36: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 36/98

 

NslookupNslookup

Page 37: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 37/98

 

Nslookup OptionsNslookup Options

Page 38: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 38/98

 

TracerouteTraceroute

Page 39: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 39/98

 

PingPing

Page 40: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 40/98

 

Ping OptionsPing Options

Page 41: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 41/98

 

Hacking Tools: Scanning andHacking Tools: Scanning and

EnumerationEnumeration

Page 42: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 42/98

 

nmapnmap

Page 43: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 43/98

 

NMapWinNMapWin

Page 44: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 44/98

 

SuperScanSuperScan

Page 45: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 45/98

 

SuperScan (Cont.)SuperScan (Cont.)

Page 46: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 46/98

 

IP Scanner IP Scanner 

Page 47: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 47/98

 

HyenaHyena

Page 48: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 48/98

 

RetinaRetina

Page 49: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 49/98

 

LANguardLANguard

Page 50: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 50/98

 

Hacking Tools: System HackingHacking Tools: System Hacking

Page 51: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 51/98

 

telnettelnet

S db

Page 52: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 52/98

 

SnadboySnadboy

P d C ki ithP d C ki ith

Page 53: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 53/98

 

Password Cracking withPassword Cracking with

LOphtcrackLOphtcrack

Page 54: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 54/98

 

Keylogger Keylogger 

Page 55: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 55/98

 

Hacking Tools: Trojans andHacking Tools: Trojans and

BackdoorsBackdoors

Page 56: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 56/98

 

NetBusNetBus

G C t B kd fG C t B kd f

Page 57: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 57/98

 

Game Creates Backdoor for Game Creates Backdoor for 

NetBusNetBus

Page 58: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 58/98

 

SubSevenSubSeven

Page 59: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 59/98

 

Hacking Tools: SniffersHacking Tools: Sniffers

S fi MAC ddSpoofing a MAC address

Page 60: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 60/98

 

Spoofing a MAC addressSpoofing a MAC address

Original ConfigurationOriginal Configuration

Page 61: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 61/98

 

Spoofed MacSpoofed Mac

Page 62: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 62/98

 

EtherealEthereal

Page 63: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 63/98

 

IrisIris

Page 64: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 64/98

Page 65: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 65/98

 

Hacking Tools: Web BasedHacking Tools: Web Based

Password CrackingPassword Cracking

Page 66: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 66/98

 

Cain and AbelCain and Abel

Page 67: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 67/98

 

Cain and Abel (Cont.)Cain and Abel (Cont.)

Page 68: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 68/98

 

Cain and Abel (Cont.)Cain and Abel (Cont.)

Page 69: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 69/98

 

LegionLegion

Page 70: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 70/98

 

BrutusBrutus

Page 71: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 71/98

 

Hacking Tools: Covering TracksHacking Tools: Covering Tracks

ImageHideImageHide

Page 72: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 72/98

 

ImageHideImageHide

Page 73: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 73/98

 

ClearLogsClearLogs

Page 74: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 74/98

 

ClearLogs (Cont.)ClearLogs (Cont.)

Page 75: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 75/98

 

Hacking Tools: Google HackingHacking Tools: Google Hacking

and SQL Injectionand SQL Injection

Page 76: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 76/98

 

Google HackingGoogle Hacking

G l Ch Sh

Page 77: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 77/98

 

Google Cheat SheetGoogle Cheat Sheet

SQL I j tiSQL I j ti

Page 78: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 78/98

 

SQL InjectionSQL Injection

Allows a remote attacker toAllows a remote attacker toexecute arbitrary databaseexecute arbitrary database

commandscommands Relies on poorly formed database queriesRelies on poorly formed database queries

and insufficientand insufficientinput validationinput validation

Often facilitated, but does not rely onOften facilitated, but does not rely onunhandledunhandled

exceptions and ODBC error messagesexceptions and ODBC error messages Impact: MASSIVE. This is one of the mostImpact: MASSIVE. This is one of the most

dangerousdangerous

vulnerabilities on the web.vulnerabilities on the web.

Page 79: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 79/98

 

Common Database QueryCommon Database Query

Problem: Unvalidated InputProblem: Unvalidated Input

Page 80: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 80/98

 

Problem: Unvalidated InputProblem: Unvalidated Input

Piggybacking Queries withPiggybacking Queries with

Page 81: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 81/98

 

Piggybacking Queries withPiggybacking Queries with

UNIONUNION

C

Page 82: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 82/98

 

Hacker Challenge WebsitesHacker Challenge Websites

Page 83: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 83/98

  http://www.hackr.org/mainpage.php

Page 84: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 84/98

 

H k hi iH kthi it

Page 85: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 85/98

 

Hackthissite.orgHackthissite.org

http://www.hackthissite.org

A l d i dA l d i d

Page 86: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 86/98

 

Answers revealed in codeAnswers revealed in code

H kitH kit

Page 87: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 87/98

 

HackitsHackits

http://www.hackits.de/challenge/

Additi l W b SitAdditi l W b Sit

Page 88: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 88/98

 

Additional Web SitesAdditional Web Sites

L i f Ethi l H kiL i f Ethi l H ki

Page 89: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 89/98

 

Legion of Ethical HackingLegion of Ethical Hacking

L i f Ethi l H ki (C t )L i f Ethi l H ki (C t )

Page 90: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 90/98

 

Legion of Ethical Hacking (Cont.)Legion of Ethical Hacking (Cont.)

Hacker HighschoolHacker Highschool

Page 91: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 91/98

 

Hacker HighschoolHacker Highschool

http://www.hackerhighschool.org/

Hacker HighschoolHacker Highschool

Page 92: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 92/98

 

Hacker HighschoolHacker Highschool

j h ih k t ff /johnny ihackstuff com/

Page 93: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 93/98

 

 johnny.ihackstuff.com/ johnny.ihackstuff.com/

H H kHappyHacker org

Page 94: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 94/98

 

HappyHacker.orgHappyHacker.org

F d tFoundstone

Page 95: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 95/98

 

FoundstoneFoundstone

Insecure orgInsecure org

Page 96: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 96/98

 

Insecure.orgInsecure.org

SANS InstituteSANS Institute

Page 97: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 97/98

 

SANS InstituteSANS Institute

Page 98: Ethical Hacking Presentation October 2006

8/14/2019 Ethical Hacking Presentation October 2006

http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 98/98

Questions & AnswersQuestions & Answers