Inetsecurity.in Ethical Hacking presentation

35
Presented By: Joshua Prince G (Information Security Expert and Security Consultant ) [email protected] INFORMATION SECURITY AND ETHICAL HACKING

Transcript of Inetsecurity.in Ethical Hacking presentation

Page 1: Inetsecurity.in Ethical Hacking presentation

Presented By:

Joshua Prince G

(Information Security Expert and Security Consultant )

[email protected]

INFORMATION SECURITY AND ETHICAL HACKING

Page 2: Inetsecurity.in Ethical Hacking presentation

CONTENTS

• Overview of Hacking

• Types of hacking

• Hacker

• Types of Hacker

• Why do hackers hack?

• What does a script kid know?

• Hackers language

• How to translate the hackers’ language

Page 3: Inetsecurity.in Ethical Hacking presentation

CONTENT CONTINUED…

• Ethical Hacking

• Ethical Hacking – Process

• What hackers do after hacking?

• Why can’t defend against hackers?

• How can protect the system?

• What should do after hacked?

• Some Major reports and analysis

Page 4: Inetsecurity.in Ethical Hacking presentation

OVERVIEW OF HACKING

• Hack• Examine something very minutely

• the rapid crafting of a new program or the making of changes to existing, usually complicated software

• Hacker• The person who hacks

• Cracker• System intruder/destroyer

Page 5: Inetsecurity.in Ethical Hacking presentation

TYPES OF HACKINGNormal

data transfer

Interruption

Interception

Modification

Fabrication

Page 6: Inetsecurity.in Ethical Hacking presentation

HACKER :

• Someone who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers

• Person who is totally immersed in computer technology and programming, and who likes to examine the code of programs to see how they work … then uses his or her computer expertise for illicit purposes such as gaining access to computer systems with permission and tampering with programs and data. At that point, this individual would not steal information and install backdoors, virus and Trojans

• Hacker means cracker nowadays.

Page 7: Inetsecurity.in Ethical Hacking presentation

TYPES OF HACKER

• White Hat Hackers:• who specializes in penetration testing and in other testing methodologies

to ensure the security of an organization's information systems.

• Black Hat Hackers:• A black hat is the villain or bad guy, especially in a western movie in

which such a character would stereotypically wear a black hat in contrast to the hero's white hat.

• Gray Hat Hackers:• A grey hat, in the hacking community, refers to a skilled hacker whose

activities fall somewhere between white and black hat hackers on a variety of spectra

Page 8: Inetsecurity.in Ethical Hacking presentation

TYPES OF HACKER CONTINUED…

• Script Kiddies:• who use scripts or programs developed by others to attack computer

systems and networks and deface websites. [

• Phreak• Person who breaks into telecommunications systems to [commit] theft

• Cyber Punk• Recent mutation of … the hacker, cracker, and phreak

Page 9: Inetsecurity.in Ethical Hacking presentation

WHY DO PEOPLE HACK??

• To make security stronger ( Ethical Hacking )

• Just for fun

• Show off

• Hack other systems secretly

• Notify many people their thought

• Steal important information

• Destroy enemy’s computer network during the war

Page 10: Inetsecurity.in Ethical Hacking presentation

HACKERS LANGUAGE :1 -> i or l

3 -> e

4 -> a

7 -> t

9 -> g

0 -> o

$ -> s

| -> i or l

|\| -> n

|\/| -> m

s -> z

z -> s

f -> ph

ph -> f

x -> ck

ck -> x

Page 11: Inetsecurity.in Ethical Hacking presentation

HACKERS WAY OF SETTING UP A PASSWORD

• 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1 h4ck3d 1n

• I did not hack this page, it was like this when I hacked in

• Can you guess my password :P ????

• My9m@!lp@55w0rd!553cur3d :)

• My gmail password is secured :)

Page 12: Inetsecurity.in Ethical Hacking presentation

WHAT IS ETHICAL HACKING

• It is Legal

• Permission is obtained from the target

• Part of an overall security program

• Identify vulnerabilities visible from Internet at particular point of time

• Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner

• Also Called – Vulnerability Testing & Penetration Testing,

Page 13: Inetsecurity.in Ethical Hacking presentation

HACKING - PROCESS

1. Preparation

2. Foot printing

3. Enumeration & Fingerprinting

4. Identification of Vulnerabilities

5. Attack – Exploit the Vulnerabilities

6. Gaining Access

7. Escalating privilege

8. Covering tracks

9. Creating back doors

Page 14: Inetsecurity.in Ethical Hacking presentation

1. PREPARATION

• Identification of Targets – company websites, mail servers, extranets, etc.

• Signing of Contract• Agreement on protection against any legal issues

• Contracts to clearly specifies the limits and dangers of the test

• Specifics on Denial of Service Tests, Social Engineering, etc.

• Time window for Attacks

• Total time for the testing

• Prior Knowledge of the systems

• Key people who are made aware of the testing

Page 15: Inetsecurity.in Ethical Hacking presentation

2. FOOT PRINTINGCollecting as much information about the target

DNS Servers

IP Ranges

Administrative Contacts

Problems revealed by administrators

Information Sources

• Search engines

• Forums

• Databases – whois,

• Tools – PING, whois, Traceroute, nslookup

Page 16: Inetsecurity.in Ethical Hacking presentation

3. ENUMERATION & FINGERPRINTING• Specific targets determined

• Identification of Services / open ports

• Operating System Enumeration

Methods Banner grabbing Responses to various protocol (ICMP &TCP) commands Port / Service Scans – TCP Connect, TCP SYN, TCP FIN, etc.

Tools

• Nmap, FScan, Hping, Firewalk, netcat, tcpdump, ssh, telnet, SNMP Scanner

Page 17: Inetsecurity.in Ethical Hacking presentation

4. IDENTIFICATION OF VULNERABILITIES

Vulnerabilities:

It is a weakness which allows an attacker to reduce a system's information assurance.

• Insecure Configuration

• Weak passwords

• Unpatched vulnerabilities in services, Operating systems, applications

• Possible Vulnerabilities in Services, Operating Systems

• Insecure programming

• Weak Access Control

Page 18: Inetsecurity.in Ethical Hacking presentation

IDENTIFICATION OF VULNERABILITIES CONT..ToolsVulnerability Scanners - Nessus, ISS, SARA, SAINT

Listening to Traffic – Ethercap, tcpdump

Password Crackers – John the ripper, LC4, Pwdump

Intercepting Web Traffic – Achilles, Whisker, Legion

Page 19: Inetsecurity.in Ethical Hacking presentation

5. ATTACK – EXPLOIT THE VULNERABILITIES

Network Infrastructure Attacks Connecting to the network through modem

Weaknesses in TCP / IP, NetBIOS

Flooding the network to cause DOS

Operating System Attacks Attacking Authentication Systems

Exploiting Protocol Implementations

Exploiting Insecure configuration

Breaking File-System Security

Page 20: Inetsecurity.in Ethical Hacking presentation

6. GAINING ACCESS:

• Enough data has been gathered at this point to make an informed attempt to access the target

• Techniques• Password eavesdropping

• File share brute forcing

• Password file grab

• Buffer overflows

Page 21: Inetsecurity.in Ethical Hacking presentation

7. ESCALATING PRIVILEGES

• If only user-level access was obtained in the last step, the attacker will now seek to gain complete control of the system

• Techniques• Password cracking

• Known exploits

Page 22: Inetsecurity.in Ethical Hacking presentation

8. COVERING TRACKS• Once total ownership of the target is secured, hiding this fact from system administrators

becomes paramount, lest they quickly end the romp.

• Techniques

• Clear logs

• Hide tools

Page 23: Inetsecurity.in Ethical Hacking presentation

9. CREATING BACK DOORS

• Trap doors will be laid in various parts of the system to ensure that privileged access is easily regained at the whim of the intruder

• Techniques• Create rogue user accounts

• Schedule batch jobs

• Infect startup files

• Plant remote control services

• Install monitoring mechanisms

• Replace apps with trojans

Page 24: Inetsecurity.in Ethical Hacking presentation

WHAT DO HACKERS DO AFTER HACKING? (1)

• Patch security hole

• The other hackers can’t intrude

• Clear logs and hide themselves

• Install rootkit ( backdoor )

• The hacker who hacked the system can use the system later

• It contains trojan virus, and so on

• Install irc related program

• identd, irc, bitchx, eggdrop, bnc

Page 25: Inetsecurity.in Ethical Hacking presentation

WHAT DO HACKERS DO AFTER HACKING? (2)

• Install scanner program

• mscan, sscan, nmap

• Install exploit program

• Install denial of service program

• Use all of installed programs silently

Page 26: Inetsecurity.in Ethical Hacking presentation

WHY CAN’T A NORMAL PERSON DEFEND AGAINST HACKERS?

• There are many unknown security hole

• Hackers need to know only one security hole to hack the system

• Admin need to know all security holes to defend the system

Page 27: Inetsecurity.in Ethical Hacking presentation

HOW CAN PROTECT THE SYSTEM? Patch security hole oftenEncrypt important data

Ex) pgp, sshDo not run unused daemonRemove unused setuid/setgid programSetup loghost

• Backup the system oftenSetup firewallSetup IDS

Ex) snort

Page 28: Inetsecurity.in Ethical Hacking presentation

WHAT SHOULD DO AFTER HACKED?

• Shutdown the system

• Or turn off the system

• Separate the system from network

• Restore the system with the backup

• Or reinstall all programs

• Connect the system to the network

Page 29: Inetsecurity.in Ethical Hacking presentation

HACKING PRONE AREAS

Page 30: Inetsecurity.in Ethical Hacking presentation

WEB VULNERABILITIES

Page 31: Inetsecurity.in Ethical Hacking presentation
Page 32: Inetsecurity.in Ethical Hacking presentation
Page 33: Inetsecurity.in Ethical Hacking presentation
Page 34: Inetsecurity.in Ethical Hacking presentation
Page 35: Inetsecurity.in Ethical Hacking presentation

CONTACT US FOR CAMPUS WORKSHOPS!!

• Many topics of hacking is still remain to cover

• People who are interested can contact me for Workshop or can mail me at

[email protected]

For further details please contact.Joshua – 98418 71147

INetSecurity.IN