Ethical Hacking and Penetration Testing. Review of the obligatory litterature

Size: px
Start display at page:

Download "Ethical Hacking and Penetration Testing. Review of the obligatory litterature"

Transcription

1 Ethical Hacking and Penetration Testing Review of the obligatory litterature

2 Chptr 2 reconnaissance

3 Definition Active vs. passive Stage 1 Stage 2 Active tools Passive tools DNS server Social Engineering Practicing reconnaissance

4 Definition Recconoissance Information Gathering Must be equal parts; Hacker, Social Engineer and Private Investigator

5 Active vs. passive Active rec. interacts with the target Passive does not Use search engine, cached sites, phone books, written material, public info on the web, etc. Be careful of the tools you use Know what they do and how they do it

6 Stage 1 Search public information Goal 1: Gather intel Goal 2: Sort and analyze the intel ID services in the network Generate list of attackable IPs ID personell/employees Phone, , Soc.Med., tax records ID physical layout Rooms, inventory, surrounding area

7 Stage 1 Locate targets website( active ) Review closely HTTrack the site for offline viewing Higly active interaction with target Look for; location, phone, , srvices, hours of operation, business relation, employees, Soc.Med, news, RSS-feed, job listing Look for job-listing on public sites, as well

8 Stage 1 Passive rec. of target in search engine Check out cached websites Find old, discarded and erased information Reduce footprints Passive as long as you don t click on the links Follow strategic key personell on Soc.Med.

9 Stage 2 Review the recovered intel Create Separate lists of all IP-addresses, s, host names, and URLs Separate list of employees and information Separate list of services running on the network

10 Active Tools HTTrack: mirror site nslookup: queries DNS-servers for stored IP/ host mappings dig: Easy to perform a DNS zone transfer MetaGooFil: extract metadata from files, could be used for offline scanning too

11 Passive tools Search Engines: google, yahoo theharvester: use search engines and to gather , subdomains and user names Whois: gqet IP-address, hostnames og DNS, contact info. Check out the info in the referred URL. netcraft: Searches it s stored information for info. on a URL. host: translate host-name to IP-address and vice versa

12 DNS Like finding a bluebprint to the system Enumerate all IP-addresses DNS servers function for syncing is a zone transfer. DNS sends all host/ip mappings to another server.

13 server Contains significant pieces of information Send a mail which will be rejected and examine the corresponding Internet Header gives: IP-address, software vers. and brand of server The returned message gives: Antivirus used to scan the mail

14 Social Engineering Make people reveal information willingly Physical contact, phishing, social interaction, and interaction via telephone.

15 Practicing recconnaissance Find a newspaper and choose an unknown corporate initiative Start performin PASSIVE recconnaissance Use search engines Try SEAT(Search Engine Assessment Tool) Try Google Hacking Database Try Paterva s Maltego CE

16 Chptr 3 Scanning

17 Overview Stage 1 Stage 2 Stage 3 Ping And Ping Sweeps Port Scanning Vulnerability Scanning Practising Port Scanning

18 Stages of scanning Stage 1: Determine if the system is alive Poor reliability Stage 2: Port/service scan the system Find open/vulnerable services and ports on the system Stage 3: Scan the system for vulnerabilities ID vulnerable services and hosts

19 Stage 1 Determine if the system is turned on Determine if the system is capable of communication with our host Continue with stage 2 and 3 no matter what

20 Stage 2 Port scanning Ports are a way for services to communicate with HW Scan the host list for ports ID running services Pay attention to open ports

21 Stage 3 Vulnerability scanning Locate and ID known vulnerabilities in the services running on a target machine Begin by scanning the perimiter devices The intel gathered is from perimiter hosts Not allways possible to gain internal access Conquer a perimiter device, then jump to internal host

22 Ping and Ping Sweep Ping ICMP Echo packet Tells if the host is up and running, may not reply anyway Ping sweep Automatic sending ICMP echo packets to a range of hosts to see which is up Automatic tools, or simple scripting

23 Port Scanning ID which ports and services is available Port range: , either TCP or UDP Determine purpose of the host Creates a packet and send it to the hosts port Different type of port scans can produce different results nmap or its GUI, zenmap -st TCP scan: Completes the TCP hanshake -ss SYN scan: Faster only completes 2/3 of the TCP handshake -su UDP scan: Send a UDP packet to the host, slow but needed Xmas scan: Scans for RFC-documented vulnereabilities and loopholes Null scan: Packets which violate standard TCP communication

24 Vulnerability scanning Scan hosts for vulnerabilities on dedicated ports Nessus Read the intro in the book

25 Practicing port scanning Set up a virtual machine network One BT5 and one Damn Vulnerable Linux, WinXP SP2/SP1 without upgrades Work through the scanning techniques in the book Work through the vulnerability scanning Try other tools for port scanning and vulnerability scanning

26 Chptr 4 Exploitation

27 Definition Medusa Metasploit John The Ripper Password resetting Network sniffing macof; MAC flooding Fast-track autopawn Practice

28 Definition Process of gaining control over a system You need to expand the knowledge of systems and exploits when you re becoming more experienced Eventually you will learn to develop exploits

29 Medusa Pay attention to remote access SSH, Telnet, FTP, PC Anywhere, VNC Brute force uname/passwd gathered from recon Medusa and Hydra; learn Hydra too Medusa Parallell brute force Cracks login of remote services: AFP, FTP, HTTP, IMAP, MySQL, POP3, SMTP-AUTH, SNMP, SSHv2, Telnet, VNC, Web Forum, and more Dictionary Attacks

30 Metasploit Based on an exploit framework Structured to develop and launch exploits Exploits: Functions to exploit vulns. Payloads: Tasks to do upon a successfull exploit General use Decide target -> Select exploit -> Choose payload -> Exploit Newbies get lost in Metasploits abilities

31 Metasploit Select target based on Nessus output Search metasploit for specific vulnerabilities Select corresponding exploit with high rank/dependability Set parameters for exploits View payloads Select payload Set parameters Run exploitation If all is right you will have control

32 Metasploit payload Bind: Sends an exploit, and makes connection to the target Reverse: Sends an exploit, and forces the target to connect back to the attacker Meterpreter: Provides a powerful command line shell that can interact with their target. Runs with privileges of the exploited process A complete shell with powerful features

33 John The Ripper Password/Hash cracking Speed depends on algorithm Escalating privileges with higher accounts Cracking Select hashing alg. Select plaintext word Encrypt the plaintext using hashing alg. Brute force or dictionary Compare generated hash with retrieved hash If equal you have found the password

34 John The Ripper SAM password file, Windows Cracking Shut down the host Boot into BT5 and mount local HD Go to the C:/windows/sytem32/config folder Use Samdump2 to extract the hashes Samdump2 uses the file system to decrypt and return the password hashes Upload cracked file to an available location Utilize John to crack the passwords

35 John The Ripper LM hashes(lan Manager) Microsoft Windows Utilized by SamDump2 Not casesensitive, it converts all chars to upper case before hashing LM passwords is 14 chars if under 14 chars it is appended with NULL values Split in half and stored as 2 passwords of 7 chars

36 John The Ripper shadow password file Linux password hashes /etc/passwd and /etc/shadow./unshadow function extracts the hashes Crack hashes with John Use multiple types of hashing alg.

37 Password Resetting Used instead of password cracking Sets off alarms People will know you where there when their password doesn t work Blanks out the passwords in the password file No restoration of original passwords Requires physical access to the host

38 Password resetting Get physical access to host Re-boot into BT5 Mount local HDs Run the chntpw program in /pentest/passwords/ chntpw Follow the menu driven interface for changing a users password When password is cleared, reboot into original OS Log on to the host with username and a clear password

39 Network sniffing Capturing and viewing packets transmitted on the network Promiscuous mode The NIC must be set to promiscuous Accepts all packets that arrives to the NIC Non-Promiscuous mode Default mode for NIC Passes only on traffic sent to the NIC WLAN-sniffinge Monitor mode Captures all packets captured by the NIC Managed mode Captures only packets sent addressed to the NIC

40 Macof, MAC flooding Switches Limited MAC-address storage Fails open by default when flooded open : Sends the packet to everyone closed : Causes DOS-attack macof Generates packets with different MAC-addresses Floods the network Easily detectable Wireshark; network analyzer

41 Fas-track autopown Nuke the hosts based on IP-address(es), built on Metasploit Automates the process of of finding vulnerabilities and match exploits Should lead to multiple shells Easiest way is to start the Web-GUI

42 Practice Set up a virtual pentest lab BT5, metasploitable, WinXP SP1/SP2, Linux Ubuntu 9.04/8.04, Damn Vulnerable Linux Test the different topics discussed Start with a known vulnerable host to not be discouraged when trying exploitation Don t use cheat sheets

43 Chptr 5 Web-Based Exploitation

44 Nikto WebSecurify Spidering: WebScarab InterceptioN: WebScarab Code Injection XSS Practice

45 Nikto Web server vulnerability scanner Out-of-date/missing patches and dangerous files Command Line tool Use Nikto when open ports on 80 or 443 is found

46 WebSecurify Automates web vulnerability scanning GUI-app Presents a report of the findings

47 Spidering: WebScarab WebScarab A modular framework and expandable with plug-ins A program which catalogs the target website and finds links, files, etc. GUI-app

48 Interception: WebScarab Proxy server feature Intercept data via the proxy Set up WebScarab with proxy feature Switch to Intercept tab All requests will be stopped before you allow them to pass Change its integrity or view its content between targets

49 Code Injection Many types SQL-injection Inject variables which alter the original SQLquery Add, delete or view information in the DB Comment signs: #, -- True states: OR 1 = 1

50 XSS Injection scripts into the web-app Stored on the website everyone is attacked JavaScript Use input fields input scripts Forms, login, etc Store them in the DB

51 Practice Test all softwares in described Download OWASPs WebGoat project Vulnerable web server Install on a virtual machine Command line server interface Misconfigured and exploitable Access the WebGoat from browser on /webgoat/attack Includes 30 lessons

52 Chptr 6 Maintaining Access with Backdoors and Rootkits

53 Definition NetCat CryptCat Netbus Rootkits Hacker Defender (Rootkit) Detect/Defend against Rootkits Practice

54 Definition Backdoor: Piece of software that resides on the target host which allows the attacker to reconnect at will

55 NetCat Allows communication between hosts listen, send, transmit files between hosts Can be set to listen for connection from the attacker and auto-run on boot Does not respond when transactions is finished Use NetCat to interact with unknown open ports NetCat can be binded with existing processes and communicate over network

56 CryptCat NetCat transmits info in clear text CryptCat transmits encrypted info with twofish Same commands as NetCat

57 Netbus The server is installed on the target The client connects to the server and controls it Sets up program for autorun

58 Rootkits Stealthy and wast amount of possibillities Uploaded to system after exploitation Used for hiding files and programs and main backdoor accesss

59 hacker Defender (rootkit) Three main files Hxdef100.exe: Runs the program on the target Hxdef100.ini: config file for the program by setting parameters in this file bdcli100.exe: Runs the program on the attackers computer Read the guide on page

60 Detect/Defend against Rootkits Steps Monitor intel put online Config FWall and other ACL Patch the system Install and use antivirus SW Make use of IDS Installing RK requires admin-privs and it will open ports Disable admin-privs for users Monitor network traffic against a correct baseline Run port scans Rootkit scanner

61 Practice Learn setting up NetCat connections between computers Binding to processes, and so on Sending files On multiple OS-es Making it start on boot Try out other rootkits as well

62 Chptr 7 Wrapping up pentesting

63 Report writing Exec Summary Detailed Report Raw output Next step Wrap up

64 Report writing One of the most critical tasks in Pentesting The face of your work and reputation Showcase results and your talent Good report takes practice Report is broken into several pieces Makes up a complete report Every piece should work as a stand-alone report Includes at minimum; Exec sum, detailed report and a raw output of the gathered intel

65 Report writing Distribute the report securely as a digital document May require instructing the employers Clearly label the sections Front page and table of contents Each page header and footer Each section, part Emphasize the fact that the pentest was only wiable at the time of testing Write, check, edit, re-read and finalize the report Sanitize tool output for comments by hackers Set off time afterwards to answer questions by the employers

66 Exec summary Brief overview of the major findings in a high-level fashion Absolute maximum size is two pages Only highlights of the penetration test Exploitable vulnerabilities Describe how the impact affects the business functionality Reference the technical aspects of the exploit/vulnerability No technical details or terminology Written for the employers/executive officers Basically your grandmother should be able to understand what happened under the pentest

67 Detailed report Comprehensive list of all findings and technical details For each finding refer to technical output Audience is IT-managers, sec.experts, net.admin, and other with significant tech. skills Used to fix the issues presented in the report Order vulnerabilities, descendingly, by which poses the most danger to the network/system Some tools provides default ranking systems If you have an exploited host without significant valuable data, but you re unable to exploit a vulnerable border router. The border router is a far more valuable target than the host and should therefore be displayed before the exploited host Just report the facts and not emphasize any particular item over another

68 Detailed report Never falsify data or reuse proof-of-concepts Provide proof-of-concepts screenshots for exploits Include mitigating actions addressing the issue/ vulnerability at hand Vital part of the report Helps with repeat business When pentest ends up with no vulns Raw output of tools will provide the intel of your report

69 Raw output The technical details and raw output from each of the tools used Problem 1: Raw output could be several hundred pages Problem 2: Could reveal the nature of the pentest and the trade secrets of the pentesting, especially when using custom code/tools Could be as simple as outputting the out from tools Be sure to create reference point to be used in the detailed report Decides wether to include the output as a stand-alone report

70 Next Step Master the basic information and techniques previously described Move on to more advanced tasks Create custom tools/code and harder tasks Learn the tools of the trade Join forums, groups and fellow comrades to OWASP, BackTrack, InfraGuard Join security conferences DefCon, BlackHat Diving into specialized areas of PenTesting Check out syngresses catalog of specific topics Check out boot-camps; expensive, but worth it Education: NSA-accredited Center if Academic Excellence Check out PenTesting methodologies

71 Other stuff Extra stuff

72 WiFi Physical pentesting Other tools Setting up pentest lab

73 WiFi Check out the aircrack-ng suite Needs the use of Atheros wifi card Check out other tools Kismet, netstumbler, Learn to perform WiFi coverage

74 Physical pentesting Read the book No-Tech Hacking by Johnny Long Superb information on physical pentesting How to crack million dollar systems for 10$ Lockpicking Check out TOOOL DealExtreme has cheap lockpicks and exercise material Spyshop.no has lockpicks too, but expensive and has the same quality

75 Other tools Wireshark EtterCap AngryIP Scanner Maltego TrueCrypt nmap BackTracker

76 Setting up pentest lab Check out the guide in Metasploit: The Penetration Testers Guide The Basics of Hacking and penetration testing Online guides

77 Learn to crack

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration

More information

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests

More information

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or

More information

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat. 1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers

More information

1. LAB SNIFFING LAB ID: 10

1. LAB SNIFFING LAB ID: 10 H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB

More information

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network

More information

Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts)

Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts) Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts) Course Module: 1. Introduction to Ethical Hacking 2. Footprinting a. SAM Spade b. Nslookup c. Nmap d. Traceroute

More information

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning

More information

Build Your Own Security Lab

Build Your Own Security Lab Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Ethical Hacking Course Layout

Ethical Hacking Course Layout Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type

More information

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem

More information

Learn Ethical Hacking, Become a Pentester

Learn Ethical Hacking, Become a Pentester Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information

Client logo placeholder XXX REPORT. Page 1 of 37

Client logo placeholder XXX REPORT. Page 1 of 37 Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company

More information

Kerem Kocaer 2010/04/14

Kerem Kocaer 2010/04/14 Kerem Kocaer 1 EHLO Kerem is: a graduate from ICSS a security consultant at Bitsec Consulting AB a security enthusiast Kerem works with: administrative security security standards and frameworks, security

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad Vulnerability Assessment and Penetration Testing CC Faculty ALTTC, Ghaziabad Need Vulnerabilities Vulnerabilities are transpiring in different platforms and applications regularly. Information Security

More information

Introduction to Network Penetration Testing

Introduction to Network Penetration Testing Introduction to Network Penetration Testing James Shewmaker [email protected] Intro to Penetration Testing - 2008 James Shewmaker 1 Outline Definitions and Concepts Key Tools Targets and Scenarios Intro

More information

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --

More information

Information Security. Training

Information Security. Training Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin

More information

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance

More information

Deciphering The Prominent Security Tools Ofkali Linux

Deciphering The Prominent Security Tools Ofkali Linux www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 1 January 2015, Page No. 9907-9911 Deciphering The Prominent Security Tools Ofkali Linux Talatam.Durga

More information

VMware: Advanced Security

VMware: Advanced Security VMware: Advanced Security Course Introduction Course Introduction Chapter 01 - Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge ESX Networking Components How Virtual Ethernet Adapters

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The

More information

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab

More information

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you

More information

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder. CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files

More information

IDS and Penetration Testing Lab ISA 674

IDS and Penetration Testing Lab ISA 674 IDS and Penetration Testing Lab ISA 674 Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible Use

More information

Penetration Testing Walkthrough

Penetration Testing Walkthrough Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...

More information

SCP - Strategic Infrastructure Security

SCP - Strategic Infrastructure Security SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character

More information

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li 60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop

More information

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London

More information

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Five Steps to Improve Internal Network Security. Chattanooga ISSA Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

Penetration Testing Workshop

Penetration Testing Workshop Penetration Testing Workshop Who are we? Carter Poe Nathan Ritchey Mahdi Shapouri Fred Araujo Outline Ethical hacking What is penetration testing? Planning Reconnaissance Footprinting Network Endpoint

More information

Lab 10: Security Testing Linux Server

Lab 10: Security Testing Linux Server Lab 10: Security Testing Linux Server 10.1 Details Aim: Security Assessment and Penetration of a Linux Web Server, using the BackTrack5 Linux Security distribution and some of its security assessment tools.

More information

IceWarp to IceWarp Server Migration

IceWarp to IceWarp Server Migration IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Ethical Hacking as a Professional Penetration Testing Technique

Ethical Hacking as a Professional Penetration Testing Technique Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996

More information

WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)

WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them) WEB APPLICATION HACKING Part 2: Tools of the Trade (and how to use them) Jonathan Eddy September 27, 2013 Last Updated September 27, 2013 MAPPING THE APPLICATION 4 2 ENUMERATING CONTENT AND FUNCTIONALITY

More information

IDS and Penetration Testing Lab ISA656 (Attacker)

IDS and Penetration Testing Lab ISA656 (Attacker) IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible

More information

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed Venue Nairobi Kenya (exact hotel name to be confirmed before course) Dates March 31, 2014 April 4, 2014 Inovatec College Certified Ethical Hacker (CEH) boot camp The Certified Ethical Hacker (CEH) Certification

More information

Virtual Learning Tools in Cyber Security Education

Virtual Learning Tools in Cyber Security Education Virtual Learning Tools in Cyber Security Education Dr. Sherly Abraham Faculty Program Director IT and Cybersecurity Dr. Lifang Shih Associate Dean School of Business & Technology, Excelsior College Overview

More information

Attacks and Defense. Phase 1: Reconnaissance

Attacks and Defense. Phase 1: Reconnaissance Attacks and Defense Phase 1: Reconnaissance Phase 2: Port Scanning Phase 3: Gaining Access Using Application and Operating System Using Networks Phase 1: Reconnaissance Known as information gathering.

More information

Audience. Pre-Requisites

Audience. Pre-Requisites T R A N C H U L A S W O R K S H O P S A N D T R A I N I N G S Hands-On Penetration Testing Training Course About Tranchulas Tranchulas is a multinational information security company having its offices

More information

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration

More information

Creation of Pentesting Labs

Creation of Pentesting Labs Creation of Pentesting Labs By Kyle Barta Submitted to The Faculty of the Department of Information Technology In Partial Fulfillment of the Requirements for The Degree of Bachelor of Science In Information

More information

EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER

EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER Vulnerability scanners are indispensable both for vulnerability assessments and penetration tests. One of the first things a tester does when faced with a network is fire up a network scanner or even several

More information

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008 Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit

More information

040020305-Penetration Testing 2014

040020305-Penetration Testing 2014 Comprehensive Questions/Practical Based :- 040020305-Penetration Testing 2014 1. Demonstrate the installation of BackTrack using Live DVD. Also list all the steps. 2. Demonstrate the installation of BackTrack

More information

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security 560.2. Sans Mentor: Daryl Fallin

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security 560.2. Sans Mentor: Daryl Fallin Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing SANS Security 560.2 Sans Mentor: Daryl Fallin http://www.sans.org/info/55868 Copyright 2010, All Rights Reserved Version 4Q10

More information

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Black Box Penetration Testing For GPEN.KM V1.0 Month dd #$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;! Sample Penetration Testing Report Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$%&'#)*)&'+,-./0.-121.030045.5675895.467:;83-/;0383; th, yyyy A&0#0+4*M:+:#&*#0%+C:,#0+4N:

More information

Description: Objective: Attending students will learn:

Description: Objective: Attending students will learn: Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of

More information

June 2014 WMLUG Meeting Kali Linux

June 2014 WMLUG Meeting Kali Linux June 2014 WMLUG Meeting Kali Linux "the quieter you become, the more you are able to hear" Patrick TenHoopen Kali Linux Kali Linux is a free and open source penetration testing Linux distribution designed

More information

Metasploit Unleashed. Class 2: Information Gathering and Vulnerability Scanning. Georgia Weidman Director of Cyberwarface, Reverse Space

Metasploit Unleashed. Class 2: Information Gathering and Vulnerability Scanning. Georgia Weidman Director of Cyberwarface, Reverse Space Metasploit Unleashed Class 2: Information Gathering and Vulnerability Scanning Georgia Weidman Director of Cyberwarface, Reverse Space Information Gathering Learning as much as possible about targets Ex:

More information

Post Exploitation. n00bpentesting.com

Post Exploitation. n00bpentesting.com Post Exploitation n00bpentesting.com Prerequisites Hardware Software Topics Covered A Note Before You Begin Lab 0ne Post Exploitation What s Next? 3 3 3 4 4 4 5 8 2 Prerequisites Thank you for downloading

More information

by Penetration Testing

by Penetration Testing BackTrack 4: Assuring Security by Penetration Testing Master the art of penetration testing with BackTrack Shakeel Ali Tedi Heriyanto rpafktl Pen I I llv. I\ 1 J community expe PUBLISHING- - BIRMINGHAM

More information

Armitage. Part 1. Author : r45c4l Mail : [email protected]. http://twitter.com/#!/r45c4l

Armitage. Part 1. Author : r45c4l Mail : infosecpirate@gmail.com. http://twitter.com/#!/r45c4l Armitage H acking Made Easy Part 1 Author : r45c4l Mail : [email protected] http://twitter.com/#!/r45c4l Greetz and shouts to the entire ICW team and every Indian hackers Introduction When I started

More information

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24 Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:

More information

Appendix D: Configuring Firewalls and Network Address Translation

Appendix D: Configuring Firewalls and Network Address Translation Appendix D: Configuring Firewalls and Network Address Translation The configuration information in this appendix will help the network administrator plan and configure the network architecture for Everserve.

More information

Security Considerations White Paper for Cisco Smart Storage 1

Security Considerations White Paper for Cisco Smart Storage 1 Security Considerations White Paper for Cisco Smart Storage An open network is like a bank s vault with windows Bill Thomson Network-Attached Storage (NAS) is a relatively simple and inexpensive way to

More information

Automation of Post-Exploitation

Automation of Post-Exploitation Automation of Post-Exploitation (Focused on MS-Windows Targets) Mohammad Tabatabai Irani and Edgar R. Weippl Secure Business Austria, Favoritenstr. 16, A-1040 Vienna, Austria {mtabatabai,eweippl}@securityresearch.at

More information

Vulnerability analysis

Vulnerability analysis Vulnerability analysis License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents License Contents

More information

McAfee Certified Assessment Specialist Network

McAfee Certified Assessment Specialist Network McAfee Certified Assessment Specialist Network Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 4 Recommended Exam Preparation 4 Exam Objectives 4 Sample

More information

Attack Frameworks and Tools

Attack Frameworks and Tools Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet

More information

Firewalls and Software Updates

Firewalls and Software Updates Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General

More information

ANTI-HACKER TOOL KIT. ourth Edition

ANTI-HACKER TOOL KIT. ourth Edition ANTI-HACKER TOOL KIT i ' Mm. i m Fm ourth Edition m CONTENTS Acknowledgments Introduction xvii xix The Best of the Basics 1 Managing Source Code and Working with Programming Languages 3 SCM Concepts 4

More information

Chapter 11 Phase 5: Covering Tracks and Hiding

Chapter 11 Phase 5: Covering Tracks and Hiding Chapter 11 Phase 5: Covering Tracks and Hiding Attrition Web Site Contains an archive of Web vandalism attacks http://www.attrition.org/mirror/attrition Most attackers, however, wish to keep low profile

More information

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

SONDRA SCHNEIDER JOHN NUNES

SONDRA SCHNEIDER JOHN NUNES TECHNOLOGY TRANSFER PRESENTS SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM THE ONLY WAY TO STOP A HACKER IS TO THINK LIKE ONE MAY 21-25, 2007 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS 1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University [email protected] Abstract

More information

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. http://bechtsoudis.com abechtsoudis (at) ieee.

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. http://bechtsoudis.com abechtsoudis (at) ieee. Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING Anestis Bechtsoudis http://bechtsoudis.com abechtsoudis (at) ieee.org Athena Summer School 2011 Course Goals Highlight modern

More information

Network Security. Network Packet Analysis

Network Security. Network Packet Analysis Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1 Network Packet Analysis Definition: Examining network packets to determine

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

General Network Security

General Network Security 4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those

More information

Firewalls. Chapter 3

Firewalls. Chapter 3 Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border

More information

Web Application Vulnerability Testing with Nessus

Web Application Vulnerability Testing with Nessus The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information

More information

Introduction to Network Security Lab 2 - NMap

Introduction to Network Security Lab 2 - NMap Introduction to Network Security Lab 2 - NMap 1 Introduction: Nmap as an Offensive Network Security Tool Nmap, short for Network Mapper, is a very versatile security tool that should be included in every

More information

Ethical Hacking and Attack Tools

Ethical Hacking and Attack Tools Ethical Hacking and Attack Tools Kenneth Ingham September 29, 2009 1 Course overview Attackers have at their disposal a large collection of tools that aid their exploiting systems. If you plan to defend

More information

gathering Dave van Stein 9 april 2009

gathering Dave van Stein 9 april 2009 Modern information gathering Dave van Stein 9 april 2009 Who Am I Dave van Stein 34 years Functional tester > 7 years Specializing in (Application) Security Testing Certified Ethical Hacker Agenda Goal

More information

QuickStart Guide for Managing Computers. Version 9.2

QuickStart Guide for Managing Computers. Version 9.2 QuickStart Guide for Managing Computers Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002

More information

STABLE & SECURE BANK lab writeup. Page 1 of 21

STABLE & SECURE BANK lab writeup. Page 1 of 21 STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

Overview. Packet filter

Overview. Packet filter Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview Security Type of attacks Firewalls Protocols Packet filter Security Security means, protect information (during

More information

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT Network Security s Access lists Ingress filtering s Egress filtering NAT 2 Drivers of Performance RequirementsTraffic Volume and Complexity of Static IP Packet Filter Corporate Network The Complexity of

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

Installing and Configuring Nessus by Nitesh Dhanjani

Installing and Configuring Nessus by Nitesh Dhanjani Unless you've been living under a rock for the past few years, it is quite evident that software vulnerabilities are being found and announced quicker than ever before. Every time a security advisory goes

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical

More information

8 steps to protect your Cisco router

8 steps to protect your Cisco router 8 steps to protect your Cisco router Daniel B. Cid [email protected] Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention

More information