Vinny Hoxha Vinny Hoxha 12/08/2009



Similar documents
Certified Ethical Hacker (CEH)

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Vulnerability Assessment and Penetration Testing

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Kerem Kocaer 2010/04/14

Demystifying Penetration Testing

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

!!!!!!!!!!!!!!!!!!!!!!

Network Penetration Testing

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Anatomy of an ethical penetration test

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Bust a cap in a web app with OWASP ZAP

CRYPTUS DIPLOMA IN IT SECURITY

Penetration Testing. What Is a Penetration Testing?

Ethical Hacking Course Layout

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Penetration Testing in Romania

CYBERTRON NETWORK SOLUTIONS

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

About Effective Penetration Testing Methodology

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Ed Ferrara, MSIA, CISSP Fox School of Business

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

VMware: Advanced Security

CEH Version8 Course Outline

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Penetration Testing with Kali Linux

Conducting a Penetration Test/Vulnerability Analysis to Improve an Organization s Information Security Posture

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

SENSITIVE AUSTRALIAN SPORTS COMMISSION ATHLETE MANAGEMENT SYSTEM (AMS) SMARTBASE SECURITY TEST PLAN. Final. Version 1.0

Audience. Pre-Requisites

Department of Computer Science and Technology, UTU 2014

Certification Programs

Build Your Own Security Lab

NETWORK PENETRATION TESTING

Penetration Testing. Presented by

Client logo placeholder XXX REPORT. Page 1 of 37

Hosts HARDENING WINDOWS NETWORKS TRAINING

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

Evaluation of Penetration Testing Software. Research

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

EC Council Security Analyst (ECSA)

Penetration Testing Workshop

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Course Title: Course Description: Course Key Objective: Fee & Duration:

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

Information Security Organizations trends are becoming increasingly reliant upon information technology in

Certified Penetration Testing Specialist

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Certification Programs

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Healthcare Information Security Governance and Public Safety II

Security Testing for Web Applications and Network Resources. (Banking).

AN OVERVIEW OF VULNERABILITY SCANNERS

This tutorial has been prepared for beginners to help them understand the basics of Penetration Testing and how to use it in practice.

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

SCP - Strategic Infrastructure Security

Post Exploitation. n00bpentesting.com

Penetration Testing Report Client: Business Solutions June 15 th 2015

SONDRA SCHNEIDER JOHN NUNES

Virtual Learning Tools in Cyber Security Education

Penetration Testing Services. Demonstrate Real-World Risk

Learn Ethical Hacking, Become a Pentester

Experiences from Educating Practitioners in Vulnerability Analysis

Penetration Testing. Security Testing

Vulnerability Assessment and Penetration Testing

(WAPT) Web Application Penetration Testing

Best IT Security Tools & Software. rewind< & past database.com

Andreas Dittrich, Philipp Reinecke Testing of Network and System Security. example.

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

gathering Dave van Stein 9 april 2009

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

Audit Tools That Won t Break the Bank

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

Profiling Campus Network using Network Penetration Testing

PKF Avant Edge. Penetration Testing. Stevie Heong CISSP, CISA, CISM, CGEIT, CCNP

NSSA Faculty Involvement in IT Security Auditing at RIT

An Introduction to Network Vulnerability Testing

We ve been hacked! We did it! Rick Grandy Lockheed Martin Hanford Site

How To Test For Security On A Network Without Being Hacked

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Transcription:

Ethical Hacking and Penetration Testing Vinny Hoxha Vinny Hoxha 12/08/2009

What is Ethical Hacking? Types of Attacks Testing Approach Vulnerability Assessments vs. Penetration Testing Testing Methodology Live Demo Conclusions Agenda

Art and Science of determining the extent to which an attacker might exploit the vulnerabilities that reside within your network. Should be performed by highly hl skilled and ethical security professionals. What is Ethical Hacking

Full penetration testing Denial of Service Theft or disclosure Social engineering Everything is fair game. Create a DoS on the network. Concerned about specific data. Exploit people. Types of Attacks

Black Box The penetration tester has no knowledge of the network being testing. White Box Penetration ti tester t has full knowledge of the network, company and systems being tested. Gray Box Combination of the black and white box testing. ti The tester t has some knowledge of the network. Testing Approach

Reconnaissance Scanning Service Enumeration Vulnerability Assessment Penetration and Access Pi Privilege il Escalation Expanding Access and Erasing Tracks OSSTMM Open Source Security Testing Methodology Manual NIST SP800-115 National Institute of Standards and Technology ISSAF Information Systems Security Assessment Framework Testing Methodology

First step in the penetration test Gather data and information about the target company and network. Gather data from the company website Job openings and IT requirements American Registry for Internet Numbers (ARIN) whois www.ws.arin.net/whois Google searches Goolag Reconnaissance

Determine the hosts s that are live on the network. Check for open ports and services running on those systems. Consistent scans will be detected by firewalls and Intrusion Detection ti and Prevention systems. Nmap, Superscan, Nessus, GFI LanGuard Scanning

Determine the types of systems s that are running on the network. Determine the services running on the systems. Determine the version of a given service. Nmap, LanSpy, Nessus, GFI LanGuard Service Enumeration / Fingerprinting

Vulnerability assessments s make use of automated tools to identify vulnerabilities and weaknesses within the network. No testing is done during a vulnerability assessment. Penetration ti testing ti makes full use of the vulnerabilities identified during the vulnerability assessment phase and tries to exploit those vulnerabilities. Vulnerability Assessments vs. Penetration Testing

Discover the vulnerabilities that exist within each system identified within the network. LanGuard Vulnerability Scanner Nessus Vulnerability Scanner Saint W3AF Paros Proxy SolarWinds Vulnerability Assessment

Identify well known exploits for the vulnerabilities discovered. Develop new exploits for new vulnerabilities or custom systems and applications. Penetrate systems based on the exploits identified. Metasploit Framework www.metasploit.com www.milw0rm.com www.securityfocus.com Cain & Abel John the Ripper Penetration and Access

Gain administrative a access to the system. Take full control of the system. Metasploit Framework www.milw0rm.com www.securityfocus.com Privilege Escalation

Rootkits can be used to maintain a and expand access. Key loggers can be used to expand access. Delete log files, reset permissions and remove any tools used during the attack. www.milw0rm.com m www.securityfocus.com Expanding Access and Erasing Tracks

Nmap Scanner Demo Nessus Vulnerability Scanner Demo Metasploit Meterpreter Demo Metasploit VNC Demo Web Vulnerabilities Demo Live Demo

Ethical hacking can identify vulnerabilities before they are exploited. Can be used as an effective preventative measure. Any penetration test should always include a vulnerability remediation phase. Be proactive, know your environment, your weaknesses and the capabilities of your enemy. Conclusions

Ethical Hacking and Penetration Testing Vinny Hoxha, CISSP, CISA 12/8/2009 vinny.hoxha@gm.com Questions?