Hacking: Information Gathering and Countermeasures



Similar documents
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Attacks and Defense. Phase 1: Reconnaissance

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

An Introduction to Network Vulnerability Testing

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Hackers: Detection and Prevention

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

CIS 4204 Ethical Hacking Fall, 2014

Computer Networks & Computer Security

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Build Your Own Security Lab

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Hacker Perspectives. Advanced Computer Networks SS 2007 Franz Sommerauer. ACN SS 07 - Hacker Perspectives

CIT 380: Securing Computer Systems

Certified Ethical Hacker (CEH)

How-to: DNS Enumeration

Linux Network Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

A Study on the Security aspects of Network System Using Penetration Testing

CRYPTUS DIPLOMA IN IT SECURITY

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Penetration Testing: Creating A Hacking Lab

Penetration Testing Workshop

Installing and Configuring Nessus by Nitesh Dhanjani

Stop that Big Hack Attack Protecting Your Network from Hackers.

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Securing Your Network. The Art of Attack & Penetration

Penetration Testing Service. By Comsec Information Security Consulting

Computer Security and Penetration Testing. Chapter 2 Reconnaissance

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Web App Security Audit Services

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Vulnerability Assessment and Penetration Testing

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

Penetration Testing with Kali Linux

ETHICAL HACKING. By REAL TIME FACULTY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Payment Card Industry (PCI) Executive Report. Pukka Software

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

Network-based vulnerability assessment. Pier Luigi Rotondo IT Specialist IBM Tivoli Rome Laboratory

Norton Personal Firewall for Macintosh

TIME TO LIVE ON THE NETWORK

Course Content: Session 1. Ethics & Hacking

NETWORK PENETRATION TESTING

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Penetration Testing //Vulnerability Assessment //Remedy

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Metasploit The Elixir of Network Security

An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie

Learn Ethical Hacking, Become a Pentester

Analysing Port Scanning Tools and Security Techniques

Security: Attack and Defense

Demystifying Penetration Testing

Security Considerations White Paper for Cisco Smart Storage 1

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Worms, Trojan Horses and Root Kits

Ethical Hacking Course Layout

4. Getting started: Performing an audit

Host Discovery with nmap

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

SONDRA SCHNEIDER JOHN NUNES

Information Security Attack Tree Modeling for Enhancing Student Learning

Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.

10 Application and Network Security and security testing. IT Governance CEN 667

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

Network Security: Introduction

For more information or call

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Rapid Vulnerability Assessment Report

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

locuz.com Professional Services Security Audit Services

Network Security Audit. Vulnerability Assessment (VA)

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Information Security. Training

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

Information Security Organizations trends are becoming increasingly reliant upon information technology in


Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Tools for penetration tests 1. Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus.

Network Penetration Testing

HP Security Assessment Services

Cisco Security Optimization Service

Malicious Network Traffic Analysis

Course Title: Penetration Testing: Security Analysis

EC Council Security Analyst (ECSA)

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Transcription:

Hacking: Information Gathering and Countermeasures Presenter: Chin Wee Yung

Hacking: Content Hacking terminology History of hacking Information gathering and countermeasures Conclusion

What is a Hacker? Refers to people skilled in computer programming, administration and security with legitimate goals Famous hackers: Linus Torvalds, Larry Well Person able to exploit a system or gain unauthorized access through skill and tactics Famous hackers: Kevin Mitnick, David L Smith

Type Of Hackers White hat hacker : attempt to break into systems or networks to help the system owners aware of security flaws Black Hat hacker (cracker) : exploits the vulnerabilities of systems or networks for private advantage Grey Hat hacker (hybrid) : compromise the security of systems or networks with no evil intentions

Hacker Ethics belief that it is an ethical duty of hackers to share their expertise by writing free software and facilitating access to information and computing resources belief that system hacking for fun and exploration is ethically acceptable as long as the hacker commits no theft, vandalism, or breach of confidentiality.

Hacking: History 1972 John Draper( Captain Crunch) used a toy whistle to make free call 1983 The internet was formed Wargames, a movie about hacking, inspired many hackers 1984 Fred Cohen develops the first PC viruses 1989 Kevin Mitnick is convicted for stealing software from Digital Equipment

Hacking: History 1994 Russian hackers broke into Citibank and got away with $10 million 1995 Kevin Mitnick was arrested for a second time for stealing 20,000 credit card numbers 1999 David L Smith arrested for writing the Melissa virus 2000 ILOVEYOU virus spreading worldwide 2004 the author of the NetSky and Sasser Internet worms, was arrested in northern Germany

Hacking Information Gathering 1) Footprinting 2) Scanning 3) Enumeration

Footprinting

Hacking: Footprinting What is footprinting? Art of gathering information Profile of internet, remote access and intranet/extranet Determine the security posture of the target

Hacking: Footprinting Critical information Domain name Network blocks IP address reachable via internet TCP and UDP services in each system System architecture Access control mechanisms Intrusion detection systems

Hacking: Footprinting Organization s website Location, contact names and email address Security policies indicating the types of security mechanisms Security configuration options for their firewall Comments in HTML source code Mirror Tools: Wget (Unix), Teleport Pro (Windows)

Hacking: Footprinting Whois Databases European: http://www.ripe.net Asia Pacific: http://www.apnic.net US military: http://whois.nic.mil US gov: http://www.nic.gov/whois.html World: http://allwhois.com Singapore: http://www.nic.net.sg

Hacking: Footprinting Information obtained from whois database Contact number: Wardialer eg 6874 xxxx Email address DNS servers IP addresses Registered IP addresses

Hacking: Footprinting Countermeasures Classify the type of information for the public Remove unnecessary information from the web pages Contact number not in organization s phone exchange (prevent war dialer)

Hacking: Footprinting DNS Interrogation Primary DNS provides zone transfer to secondary DNS Some DNS provide the zone data to anyone External DNS and internal DNS information not segregated Simply use nslookup command Obtained IP addresses, hostnames, OS

Hacking: Footprinting DNS Interrogation: Countermeasures Disable or restrict zone transfer to authorized servers Separate internal DNS from external DNS

Hacking: Scanning

Hacking: Scanning Determine if system is alive Methods 1) Ping sweep: ICMP packets Fping, nmap for UNI Pinger, Ping Sweep for Windows 2) Port Scan: TCP packets Nmap can send TCP Hping2 can fragment TCP packets bypassing some access control devices

Hacking: Scanning Port scanning Objective Identify both TCP and UDP services Identify OS Identify the versions of application and services

Hacking: Scanning Scanner Win Unix UDP TCP Strobe Udp_scan Nmap Netcat SuperScan NetScanTools

Hacking: Scanning Port scanning: Countermeasures Detentive Networking based IDS like Snort firewalls can detect port scan attempts eg. ZoneAlarm(Windows) Preventive Disable unnecessary services to minimize exposure

Hacking: Enumeration

Hacking: Enumeration What is Enumeration? The process of probing the identified services for known weaknesses Information User account names Misconfigured shared resources Older software version with known vulnerabilities

Hacking: Enumeration Common Techniques 1) Finger, TCP/UDP 79 Get logged-on user information and idle time Countermeasure: disable finger service 2) HTTP HEAD request using Navcat Get web server version Countermeasure: Change banner on your web servers

Hacking: Enumeration Common Techniques 3) NetBIOS Name Service, UDP 137 Get window-based hosts in any domain using net view Obtained system name, MAC address using nbtstat

Hacking: Enumeration Countermeasures Set Restrict Anonymous to 2 in Win NT In Win P/.NET server, configure the settings under Security Options correctly

Conclusion Information gathering first step of hacking No step by step in hacking Hacking tools are evolving fast Hacking knowledge is good fundamental for security specialists

~The End ~