Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:



Similar documents
Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

Ethical Hacking Overview

2011 Course Technology, Cengage Learning

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Penetration Testing in Romania

Hackers are here. Where are you?

Hackers are here. Where are you?

Scoping Questionnaire for Penetration Testing

About Effective Penetration Testing Methodology

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

SCOPING QUESTIONNAIRE FOR PENETRATION TESTING

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

EC-Council. Certified Ethical Hacker. Program Brochure

Application Backdoor Assessment. Complete securing of your applications

InfoSec Academy Pen Testing & Hacking Track

Hackers: Detection and Prevention

InfoSec Academy Forensics Track

EC-Council Certified Security Analyst (ECSA)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Introduction to Penetration Testing Graham Weston

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

EC-Council. Program Brochure. EC-Council. Page 1

Certified Ethical Hacker (CEH)

Analyze. Secure. Defend. Do you hold ECSA credential?

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

SECURITY. Risk & Compliance Services

LINUX / INFORMATION SECURITY

Access FedVTE online at: fedvte.usalearning.gov

VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

ASK PC Certified Information Systems Security Expert - CISSE

of Highly Effective Security Professionals By Sondra Schneider CEO Security University

Ethical Hacking and Penetration Testing Presented by: Adam Baneth Managing director

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

Vinny Hoxha Vinny Hoxha 12/08/2009

Penetration tests Risk of security loopholes in IT networks

The Information Security Problem

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Penetration Testing Workshop

Penetration testing & Ethical Hacking. Security Week 2014

Forensic Certifications

CISO's Guide to. Penetration Testing. James. S. Tiller. A Framework to Plan, Manage, and Maximize Benefits. CRC Press. Taylor & Francis Group

Learn Ethical Hacking, Become a Pentester

PKF Avant Edge. Penetration Testing. Stevie Heong CISSP, CISA, CISM, CGEIT, CCNP

Network Incident Report

Information Security Specialist Training on the Basis of ISO/IEC 27002

Cyber R &D Research Roundtable

Web App Security Audit Services

locuz.com Professional Services Security Audit Services

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

State of South Carolina InfoSec and Privacy Career Path Model

CS Ethical Hacking Spring 2016

Career Paths in Information Security v6.0

Topic 1 Lesson 1: Importance of network security

InfoSec Academy Application & Secure Code Track

Exam 1 - CSIS 3755 Information Assurance

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D.

Computer Networks & Computer Security

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8

EC Council Certified Ethical Hacker V8

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

IQware's Approach to Software and IT security Issues

Information Security Principles and Practices

Information Systems Security Certificate Program

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Brandman University. School of CCNA

The Vision of the OSSTMM

WHITE PAPER. An Introduction to Network- Vulnerability Testing

A Systems Engineering Approach to Developing Cyber Security Professionals

Penetration Testing. Presented by

Acceptable Use Policy

Application Intrusion Detection

Certification Programs

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Department of Computer Science and Technology, UTU 2014

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Transcription:

Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical hacker Describe what you can do legally as an ethical hacker Describe what you can t do as an ethical hacker Who are the Players? Introduction to Ethical Hacking Who are Ethical Hackers Hired by companies to perform penetration tests Penetration test Authorized attempt to break into a company s network to find the weakest link Security test More than a break in attempt; includes analyzing company s security policy and procedures Vulnerabilities are reported The Role of Security and Penetration Testers Hackers Crackers Tiger box Access computer system or network without authorization Breaks the law; can go to prison Break into systems to steal or destroy data U.S. Department of Justice calls both hackers Collection of tools Used for conducting vulnerability assessments and attacks The Role of Security & Penetration Testers (cont)

Script kiddies or Packet Monkeys Younger, inexperienced hackers who copy code from knowledgeable hackers See Leet speak (http://en.wikipedia.org/wiki/leet) Programming Skills Languages used by experienced penetration testers Script What is a Script? Practical Extraction and Report Language (Perl) C language Set of instructions Runs in sequence to perform tasks Definition: A script is a set of instructions used by a computer to execute a set of pre-determined instructions. Once the computer executes the instructions, it returns data (a value) which could be a number, a string, a list, or another data type. A very simple script does nothing but return a value. To return a value, it uses the "return" keyword of the script to provide the request data to the script that called it. A very simple script might look like this: return ("This is a string."). The return keyword is usually followed by open and close parentheses. Javascript Example: window.open ("http://www.javascript-coder.com","mywindow") Penetration-Testing Methodologies White Box model Tester is told about network topology and technology Tester is permitted to interview IT personnel and company employees

Black Box model Hands-On Ethical Hacking and Network Defense - Second Edition Makes tester s job a little easier Staff does not know about the test Tester is not given details about technologies used Burden is on tester to find details Tests security personnel s ability to detect an attack Gray Box model Hybrid of white and black box models Company gives tester partial information (e.g., OSs are used, but no network diagrams) Certification Programs - Network Security Personnel Minimum certification: Security+: Comptia (or equivalent knowledge) Industry Standard: Certified Ethical Hacker (CEH): EC Council Based on 22 domains (subject areas) Certified Information System Security Professional (CISSP): International Information Systems Security Certification Consortium (ISC2), CISSP Consists of ten domains Certification Programs - Network Security Personnel (cont) Professional Security Tester Designated by the Institute for Security and Open Methodologies (ISECOM) Based on Open Source Security Testing Methodology Manual (OSSTMM) Written by Peter Herzog Five main topics (i.e., professional, enumeration, assessments, application, and verification)

Red Team Internal to organization Conducts penetration tests Composed of people with varied skills Unlikely that one person will perform all tests SANS Institute SysAdmin, Audit, Network, Security (SANS) Institute Top 20 list Offers training and certifications through Global Information Assurance Certification (GIAC) One of the most popular SANS Institute documents Details most common network exploits Suggests ways of correcting vulnerabilities Web site: www.sans.org Which Certification Is Best? Penetration and Security Testers Both need technical skills to perform duties effectively Good understanding of networks Role of management in an organization Skills in writing and verbal communication Desire to continue learning Danger of certification exams What You Can Do Legally Some participants simply memorize terminology Laws involving technology change Don t have a good grasp of subject matter

Keep abreast of what s happening in your area Find out what is legal for you locally Be aware of what is allowed and what you should not or cannot do Laws of the Land Laws vary from state to state and country to country Some hacking tools on your computer might be illegal Contact local law enforcement agencies before installing hacking tools Laws are written to protect society Written words are open to interpretation Government is getting more serious about cybercrime punishment Is Port Scanning Legal? Some states deem it legal Not always the case Be prudent before using penetration-testing tools Federal government does not see it as a violation Allows each state to address it separately Research state laws Read your ISP s Acceptable Use Policy IRC bot Program that sends automatic responses to users Gives the appearance of a person being present AUP Comparisons Federal Laws Getting more specific in areas of: Cybercrimes

Intellectual property issues Computer hacking and intellectual property (CHIP) New government branch Addresses computer hacking and intellectual property crimes What You Cannot Do Legally Illegal actions: Accessing a computer without permission Destroy data without permission Copy information without permission Installing worms or viruses Denying users access to network resources Be careful your actions do not prevent client s employees from doing their jobs! Get It in Writing Contracts: Using a contract is good business (CYA) May be useful in court Check internet for free modifiable templates Have an attorney review contracts before signing (CYA) Books on working as an independent contractor The Computer Consultant s Guide by Janet Ruhl Getting Started in Computer Consulting by Peter Meyer Ethical Hacking in a Nutshell Skills needed to be a security tester Knowledge of network and computer technology Ability to communicate with management and IT personnel

An understanding of the laws in your location Ability to use necessary tools