CYBS Penetration Testing and Vulnerability Assessments. Mid Term Exam. Fall 2015
|
|
|
- Ashley Hood
- 9 years ago
- Views:
Transcription
1 CYBS Penetration Testing and Vulnerability Assessments Mid Term Exam Fall 2015 NAME: James Konderla STUDENT ID: Questions Total Instructions: Save your exam with the file name CYBS 7355 Mid Term Exam - Name. Once you are finished, post your exam to the Unit 6 Drop Box on the ecollege website. Review the questions carefully as some are worth more than others. You will want to allocate proper time to complete all of the questions. All questions will be graded for full, half, or no credit. Please limit your responses to two pages per question. I certify that this is my own work and I have cited all work that is not mine by quotes and citation or by paraphrasing with citations using APA. I understand that if I have plagiarized or copied materials that are not my own work that I will fail this exam with a grade of zero and be subject to academic review. This includes cutting and pasting. Do not use endnotes or footnotes as this is not the APA method. NAME: James Konderla DATE: 9/30/2015 CYBS 7355 Penetration Testing & Vulnerability Assessments Mid Term Exam, Summer 2015 Page 1
2 Points - In Lab #4 Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation you were able to compromise a remote Linux host using the VSFTP_234_backdoor vulnerability. Review the Victim Vulnerability Scan report you submitted in Unit 4. The vulnerability report identified several High severity vulnerabilities, which could allow a hacker to gain remote access. Repeat the steps in Part 3 (ignore Part 1 and Part 2!).of Lab #4 to search Metasploit for an exploit associated with an additional vulnerability (there are at least six), and then use that exploit to gain remote access and compromise the Linux machine again using a new exploit (e.g. do not use the VSFTP_234_Backdoor exploit you used in Unit #4). Briefly explain the exploit you used and insert the screenshot showing you have gained "root" access using the ifconfig, whoami or userid command on the remote target (NOTE: Getting root access on the VM you are logged on to locally to launch the attack from is not an acceptable answer. You must gain access to the remote machine). Extra Credit: 10 bonus points if you can get a Meterpreter session onto the remote machine (screenshot required) Extra Extra Credit: 15 more bonus points if you send me a.txt file of the password hashes from the remote machine! (Upload to Unit 6 dropbox with exam) Answer: I chose to use the distcc vulnerability and the associated unix/misc/distcc_exec exploit for this exercise. I chose this exploit due to the vulnerability scan s description into its ease of install. In my experience, if an application is easy to install a user will accept all defaults, will rarely check for updates during the install (to get things up and running faster) and will be in a rush to get the app up and running so will typically not check for vulnerabilities. This particular exploit targets a distributed compiler, distcc, which trusts its clients completely by default. CYBS 7355 Penetration Testing & Vulnerability Assessments Mid Term Exam, Summer 2015 Page 2
3 CYBS 7355 Penetration Testing & Vulnerability Assessments Mid Term Exam, Summer 2015 Page 3
4 2. 50 Points - Penetration testing requires a very deliberate approach, in order to provide a thorough and safe result. Your textbook describes one methodology, but there are several more widely used methodologies such as the Open Source Security Testing Methodology Manual (OSSTMM) and the increasingly popular Penetration Testing Execution Standard (PTES). Discuss the importance of using a testing methodology. Clearly define what occurs in each phase and the significance of each phase. Be sure to provide supporting evidence for your selection. Answer: Testing methodology provides a way to standardize both the steps and documentation of testing. I have seen this first hand at work with development methodologies: by using a development methodology we standardize not only the documentation of our software but the way we test and develop the software, enabling a new person to take over or enter the development process at any point as well as enabling out managers to tell how we develop and what we are doing at a given development point. A testing framework also establishes the rules of a test, as well as the parameters and scope, protecting both the tester and the systems being tested while also establishing the goals of the test. After looking at the book s example and both OSSTMM and PTES I have decided that PTES is my preferred methodology due to its addition and emphasis placed on communication and pre-engagement interactions. This standard consists of the following: Pre-Engagement Interactions This phase includes the establishment of the scope, start and end dates, goals and the rules of engagement including which locations, times and systems are off limits. This is probably the most important phase of the test as it establishes the boundaries and puts in place protections for both the testers and the organization. Intelligence Gathering This includes selecting a target and gathering information that includes but is not limited to infrastructure, documents, financial, organizational structure, network and identity protection mechanisms and foot printing. Though some consider these pre-test practices, I believe this is when the test actually starts. Threat Modeling The PTES standard defines threats in 2 areas: assets and attackers. Of course both areas have further divisions but the main focus in this phase is using tools to define and model the threats that both areas possess through use of various tools, including a SWOT (Strength, Weakness, Opportunity and Threat) analysis. This process can go as deep as the business or the testers feel necessary. Vulnerability Analysis In this phase the system is actively probed for vulnerabilities and these vulnerabilities are outlined. This phase should heavily rely on the scope and breadth of the exercise, as analyzing systems outside of these can result in legal, regulatory or even business issues and fines. Scans can be automated and it is highly suggested that they be. At the conclusion of this phase several high-value targets should be identified. Exploitation This phase has 1 focus: establishing access to the system or a resource. This can include computer systems, buildings or company assets. Using the results of the vulnerability analysis, high-value targets should be attacked within the scope and boundaries of the exercise. Evidence should also be collected starting in this phase to prove a successful exploitation. Post Exploitation Following a successful exploit, each target or compromised system should be cataloged to determine its value in terms of what sensitive data could be exposed, what is the relationship of this asset to other CYBS 7355 Penetration Testing & Vulnerability Assessments Mid Term Exam, Summer 2015 Page 4
5 network resources and what communication channels does a system open up, to name a few. Exploited systems should also be compromised in such a way to allow later access within the bounds of the exercise. It is highly suggested that documentation on patching the exploit also be presented. Reporting This phase focuses on the reporting of the findings of the exercise. The PTES standard suggests the use of an Information Security Risk Rating Scale to define the overall risk of each system, as well as the network inside the exercise scope as a whole. Reports should not only summarize the data, but provide a user-friendly readout for executives and managers that should include graphs to summarize the data. Recommendations and strategic roadmaps on patching/removing vulnerabilities should also be presented as well as a technical report of all information gathered, systems exploited and data exposed during the attack. I consider this the second most important phase of the test as it is the presentation of not only the information exposed, but of the entire exercise in a readable format. Citations: Main Page. (2014, August 16). Retrieved October 3, 2015, from Oriyano, S. (2014). Hacking: The Next Generation. In Hacker techniques, tools, and incident handling, second edition (2nd ed., pp ). Burlington, MA: Jones & Bartlett Learning. CYBS 7355 Penetration Testing & Vulnerability Assessments Mid Term Exam, Summer 2015 Page 5
6 3. 50 Points - During the last 5 weeks, you have been exposed to numerous testing tools, as well as the phases in which the tools would be used. Describe five (5) of the tools that you would be using during a penetration test. Explain what the tool is intended to do, why it is used, and how the tool, if used by a hacker, could disrupt the target s business. Do not just list tools! Explain the purpose and risk! Answer: The tools I have chosen to cover out of our labs are Maltego, Metasploit, Sam Spade, Wireshark and Nmap. I purposely did not pick Kali/Backtrack since it is more like a toolbox than just a tool. Maltego Maltego is an information gathering and data mining tool. What makes this tool unique is the fact that you can program in a domain name and gather information about that domain including formats, exposed addresses, registration information and even location and company information. I plan on playing with this tool a lot when I do a vulnerability assessment on the DFWHDI.org domain later this year. This tool can disrupt a target s business by providing target information without the need to interact with the target (at least in the initial stages). Metasploit Metasploit is the most interesting tool I have ever seen. This tool is a framework that provides the ability to analyze a target and determine its vulnerabilities. The tool goes farther than this, though, by allowing the use of payloads and vulnerabilities themselves to compromise a system with the possibility of gaining a persistent remote console via Meterpreter (though I have been unsuccessful in this so far). Metasploit also provides an easy to use GUI and update capabilities to expand the initial database of vulnerabilities and payloads. The risk of this program to a target is very high, as its database actively contains vulnerabilities and payloads that include viruses, worms remote executables and plenty of other toys for a penetration tester or hacker. The tool s risk is increased by providing a comprehensive wiki that includes documentation on how to use almost every aspect of the framework including installation on windows, linux, apple, and unix environments. Sam Spade Sam Spade is an interesting tool that I discovered was actually abandoned as a project (though I have experimented with some of its functionality and can very easily re-create some of it in C#). This tool has the ability to run several command-prompt diagnostics from a central console, such as nslookup, whois and even traceroute. The tool itself doesn t have a whole lot of uses in an attack but does allow the ability to mine information about a network s infrastructure by analyzing TCP blocks, registrar information, route steps (using traceroute to find each step in a route between localhost and the target domain) and even the ability to view and parse headers. The risks of this tool are minimal but allow the central use of a lot of tools in 1 place, cutting down intelligence gathering and network analysis times considerably. Wireshark Wireshark, which I first used as Ethereal to perform a few basic network diagnostics, has the capability of intercepting and analyzing network traffic. The most interesting capability of this tool is something I learned a few years ago: promiscuous mode. By placing the network interface Wireshark uses into this mode, you are able to see all traffic and analyze where it is going, what it contains and where it came from. Of course Wireshark can also understand what protocol was used when transmitting traffic which makes it even more useful. The risk of this tool to a target is that it can passively capture unencrypted traffic on a network without being noticed, possibly providing a man-in-the-middle attack by allowing the injection of information into a packet with use of other tools. CYBS 7355 Penetration Testing & Vulnerability Assessments Mid Term Exam, Summer 2015 Page 6
7 Nmap Nmap is a scanning software whose primary use is discovering ports and exposed services on a remote computer. Nmap can also discover a host s operating system if the host is not properly configured (which does not happen by default). Of course Nmap has much more functionality but by far its most useful functions are service and OS discovery. Nmap itself can disrupt a target s business by providing a list of exposed services and operating systems used on a target s network. CYBS 7355 Penetration Testing & Vulnerability Assessments Mid Term Exam, Summer 2015 Page 7
8 4. 50 Points As someone who has had the opportunity to use a very popular social engineering tool (e.g. SpoofCard ) you realize the potential danger that social engineering presents to users in your company or school. Now the CIO of your company is growing concerned regarding the risks this presents to the company. He knows that you are taking a course on hacking so he calls you in and asks what can be done to help limit the risk to the company. What are some things that can be done on a corporate level to help reduce the risk of social engineering? Be as detailed as possible. Do not exceed 2 pages. Answer: The first thing that comes to mind is training. By providing training to the company as a whole you can inform them of not only the risks of social engineering but even of some examples of the techniques. PepsiCo conducts an annual, mandatory, security training that must be taken by all employees and contractors as well as third parties who have systems access. Of course training can only go so far and it is easy to forget your training when you are the target of an attack. I would suggest the implementation of more extensive training to personnel who are particularly at risk for social engineering attacks, such as the service desk. While at the service desk I have seen many attempts, a few successful, at social engineering and I can say that, even with the same base training as the rest of the company the service desk is not prepared. By providing an enhanced training that includes verification prior to trusting an individual, the service desk can not only gain the ability to better identify attacks but also gain insight into how to better defend the company even when an attack is not happening. One example I often use is verification questions: the service desk at PepsiCo is now required to ask our customers where an individual is based (city and state) and what the phone number on record in our CMS system is. This system feeds from HR but also has a lag of 48 hours, which enables a further defense. Beyond these verification questions, if a customer requires assistance resetting a password, more verification is required, though I will not reveal that here. I would also recommend the separation of credentials. Even though it is best practice to not allow administrator access to a computer, I have too often seen it at companies. I recommend separating admin and basic user credentials for all users and requiring users to request access to administrative credentials with both manager and security team approval to ensure that administrative access is provided on a need-only basis. In the case temporary access is needed, I recommend the creation of a script to give time-limited access to a specific user for administrative access. I remember hearing about this capability when I had first started at the service desk (though it has since been removed to the dismay of the security team and is in the process of being reimplemented): this script has the capability of giving a user an hour or 2 of administrative access (3 was the maximum). After the user logs off and back on the user s access takes place and the access can be revoked 1 of 2 ways: the user logs off before the allotted time or the allotted time passes and the user is forcibly logged off with the script disabling the administrative access during the logoff process. This would be essential in limiting the impact of an attack if a social engineer does gain access to a system. My last recommendation is one that I recently learned at PepsiCo: regular access audits. In this a specialized system is put into place to regularly (every 90 days in our case) look at a particular access (our system is set up for almost every access that could grant system or financial access) and alert the user s manager to verify that they need the access. The user s manager has 1 week from that point to approve the access before the manager s manager is alerted. That senior manager has 1 more week to verify and, in the event they fail to verify CYBS 7355 Penetration Testing & Vulnerability Assessments Mid Term Exam, Summer 2015 Page 8
9 the access or in the event an access verification is declined, the access is immediately revoked. Of course a few systems, such as time tracking, have the ability for the employee themselves to complete mandatory training as well. No company is fully securable but I believe with these things in place I believe the company can be defended a lot better. CYBS 7355 Penetration Testing & Vulnerability Assessments Mid Term Exam, Summer 2015 Page 9
IDS and Penetration Testing Lab ISA 674
IDS and Penetration Testing Lab ISA 674 Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible Use
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
IDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS
1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University [email protected] Abstract
Footprinting and Reconnaissance Tools
Footprinting and Reconnaissance Tools Topic 1: Common Port Scanning Techniques Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)
Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The
Vulnerability analysis
Vulnerability analysis License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents License Contents
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts)
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts) Course Module: 1. Introduction to Ethical Hacking 2. Footprinting a. SAM Spade b. Nslookup c. Nmap d. Traceroute
Intelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:
PENETRATION TESTING A SYSTEMATIC APPROACH INTRODUCTION: The basic idea behind writing this article was to put forward a systematic approach that needs to be followed to perform a successful penetration
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Analyze. Secure. Defend. Do you hold ECSA credential?
1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can
EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access
The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Penetration Testing Workshop
Penetration Testing Workshop Who are we? Carter Poe Nathan Ritchey Mahdi Shapouri Fred Araujo Outline Ethical hacking What is penetration testing? Planning Reconnaissance Footprinting Network Endpoint
Penetration Testing Walkthrough
Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology Xiaoqin Song 1
International Conference on Informatization in Education, Management and Business (IEMB 2015) Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
NCS 430 Penetration Testing Lab #2 Tuesday, February 10, 2015 John Salamy
1 NCS 430 Penetration Testing Lab #2 Tuesday, February 10, 2015 John Salamy 2 Item I. (What were you asked to do?) Complete Metasploit: Quick Test on page 88-108 of the Penetration Testing book. Complete
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
ITS425: Ethical Hacking and Penetration Testing
ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. http://bechtsoudis.com abechtsoudis (at) ieee.
Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING Anestis Bechtsoudis http://bechtsoudis.com abechtsoudis (at) ieee.org Athena Summer School 2011 Course Goals Highlight modern
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Penetration Testing - a way for improving our cyber security
OWASP EU Tour Bucharest 2013 The OWASP Foundation http://www.owasp.org Penetration Testing - a way for improving our cyber security Adrian Furtunǎ, PhD, OSCP, CEH [email protected] Copyright The OWASP
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01
How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
Sample Report. Security Test Plan. Prepared by Security Innovation
Sample Report Security Test Plan Prepared by Security Innovation Table of Contents 1.0 Executive Summary... 3 2.0 Introduction... 3 3.0 Strategy... 4 4.0 Deliverables... 4 5.0 Test Cases... 5 Automation...
A Study on the Security aspects of Network System Using Penetration Testing
A Study on the Security aspects of Network System Using Penetration Testing 1 Shwetabh Suman, 2 Vedant Rastogi 1,2 Institute of Engineering and Technology, Alwar, India 1 [email protected] 2 [email protected]
CIS 4204 Ethical Hacking Fall, 2014
CIS 4204 Ethical Hacking Fall, 2014 Course Abstract: The purpose of this course is to provide a basic understanding of computing, networking, programming concepts, and exploitation techniques, as they
External Network Penetration Test Report
External Network Penetration Test Report Jared Doe [email protected] C O N F I D E N T I A L P a g e 2 Document Information Assessment Information Assessor Kirit Gupta [email protected]
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks
CIT 480: Securing Computer Systems Vulnerability Scanning and Exploitation Frameworks Vulnerability Scanners Vulnerability scanners are automated tools that scan hosts and networks for potential vulnerabilities,
Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking
Hacking Book 1: Attack Phases Chapter 1: Introduction to Ethical Hacking Objectives Understand the importance of information security in today s world Understand the elements of security Identify the phases
Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008
Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
Penetration Testing //Vulnerability Assessment //Remedy
A Division Penetration Testing //Vulnerability Assessment //Remedy In Penetration Testing, part of a security assessment practice attempts to simulate the techniques adopted by an attacker in compromising
86-10-15 The Self-Hack Audit Stephen James Payoff
86-10-15 The Self-Hack Audit Stephen James Payoff As organizations continue to link their internal networks to the Internet, system managers and administrators are becoming increasingly aware of the need
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security 560.2. Sans Mentor: Daryl Fallin
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing SANS Security 560.2 Sans Mentor: Daryl Fallin http://www.sans.org/info/55868 Copyright 2010, All Rights Reserved Version 4Q10
Firewall Design Principles Firewall Characteristics Types of Firewalls
Firewall Design Principles Firewall Characteristics Types of Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for these slides. Fall 2008
Intrusion Detection Systems. Darren R. Davis Student Computing Labs
Intrusion Detection Systems Darren R. Davis Student Computing Labs Overview Intrusion Detection What is it? Why do I need it? How do I do it? Intrusion Detection Software Network based Host based Intrusion
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur
Demystifying Penetration Testing for the Enterprise Presented by Pravesh Gaonjur Pravesh Gaonjur Founder and Executive Director of TYLERS Information Security Consultant Certified Ethical Hacker (CEHv8Beta)
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Security-as-a-Service (Sec-aaS) Framework. Service Introduction
Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency
The Nexpose Expert System
Technical Paper The Nexpose Expert System Using an Expert System for Deeper Vulnerability Scanning Executive Summary This paper explains how Rapid7 Nexpose uses an expert system to achieve better results
Virtual Learning Tools in Cyber Security Education
Virtual Learning Tools in Cyber Security Education Dr. Sherly Abraham Faculty Program Director IT and Cybersecurity Dr. Lifang Shih Associate Dean School of Business & Technology, Excelsior College Overview
PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com
PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure
During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24
Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
WHITE PAPER. An Introduction to Network- Vulnerability Testing
An Introduction to Network- Vulnerability Testing C ONTENTS + Introduction 3 + Penetration-Testing Overview 3 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.
Running head: UNIT 3 RESEARCH PROJECT 1 Unit 3 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/07/2014 UNIT 3 RESEARCH PROJECT 2
Kerem Kocaer 2010/04/14
Kerem Kocaer 1 EHLO Kerem is: a graduate from ICSS a security consultant at Bitsec Consulting AB a security enthusiast Kerem works with: administrative security security standards and frameworks, security
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center
Client logo placeholder XXX REPORT. Page 1 of 37
Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company
Network Connect Performance Logs on MAC OS
Network Connect Performance Logs on MAC OS How-to Juniper Networks, Inc. 1 Table of Contents Introduction Part 1: Client Prerequisites... 3 Step 1.1: Packet Sniffer... 3 Step 1.2: Output IPs, Routes, Ping,
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Network Security Monitoring: Looking Beyond the Network
1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT [email protected] [email protected] February 8, 2011 2 Abstract Network security monitoring
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
