Hands-on Hacking Unlimited

Similar documents
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Penetration Testing with Kali Linux

Penetration Testing Report Client: Business Solutions June 15 th 2015

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Vulnerability Assessment and Penetration Testing

Demystifying Penetration Testing

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Penetration Testing Service. By Comsec Information Security Consulting

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Learn Ethical Hacking, Become a Pentester

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

CRYPTUS DIPLOMA IN IT SECURITY

Reducing Application Vulnerabilities by Security Engineering

Chapter 11 Cloud Application Development

Need for Database Security. Whitepaper

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Certified Ethical Hacker (CEH)

Foundstone ERS remediation System

Course Content: Session 1. Ethics & Hacking

NETWORK PENETRATION TESTING

Ethical Hacking Course Layout

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Web App Security Audit Services

What is Web Security? Motivation

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Stop that Big Hack Attack Protecting Your Network from Hackers.

Security: Attack and Defense

CMPT 471 Networking II

An Introduction to Network Vulnerability Testing

Client logo placeholder XXX REPORT. Page 1 of 37

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Audience. Pre-Requisites

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Internet Security [1] VU Engin Kirda

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Network and Host-based Vulnerability Assessment

Directory and File Transfer Services. Chapter 7

Network Security. Network Packet Analysis

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

PCI Security Scan Procedures. Version 1.0 December 2004

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Building A Secure Microsoft Exchange Continuity Appliance

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Payment Card Industry (PCI) Data Security Standard

Keyword: Cloud computing, service model, deployment model, network layer security.

The Trivial Cisco IP Phones Compromise

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Linux Network Security

Linux MDS Firewall Supplement

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Codes of Connection for Devices Connected to Newcastle University ICT Network

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Quarterly Report: Symantec Intelligence Quarterly

Firewalls. Chapter 3

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Vulnerability Assessment and Penetration Testing

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Attack and Defense Techniques

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

locuz.com Professional Services Security Audit Services

CYBERTRON NETWORK SOLUTIONS

General Network Security

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

How To Protect A Network From Attack From A Hacker (Hbss)

CTS2134 Introduction to Networking. Module Network Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Hacking Database for Owning your Data

Payment Card Industry (PCI) Executive Report. Pukka Software

Evaluation of Penetration Testing Software. Research

A Decision Maker s Guide to Securing an IT Infrastructure

Transcription:

About Zone-H

Attacks techniques (%) File Inclusion Shares misconfiguration SQL Injection DNS attack through social engineering Web Server external module intrusion Attack against the administrator/user (password stealing/sniffing) FTP Server intrusion Web Server intrusion Remote administrative panel access through password guessing Access credentials through Man In the Middle attack Telnet Server intrusion Rerouting after attacking the Router DNS attack through cache poisoning Other Web Application bug RPC Server intrusion Remote administrative panel access through social engineering Rerouting after attacking the Firewall SSH Server intrusion URL Poisoning Remote service password guessing Other Server intrusion Mail Server intrusion Remote administrative panel access through bruteforcing Remote service password bruteforce 1,4 1,4 3,1 4,7 6,0 1,5 3,7 1,4 1,2 2,3 1,4 1,9 1,1 2,4 2,4 1,1 3,2 0,5 1,6 0,9 7,6 9,1 17,8 22,3 0,0 5,0 10,0 15,0 20,0 25,0

Hackers and such Whitehat Hackers Good technical skills, good programmers, enjoy the intellectual challenge but no damages on systems. Knowledge is free for everyone. Blackhat Hackers Good technical skills and programmers but used to steal information, cause damages, and control the attacked system. Knowledge is for a small elite. Crackers/Defacers/Script Kiddies People with low technical and programming skills, usually teenagers, that use tools written by other people to cause damages and for self amusement. Phreakers Active on hacking telephone lines, originally mostly oriented to hardware hacking but nowadays turning to the digital side (VoIP).

Cyber Attack Information Gathering Hiding traces Exploiting

Collecting information on our target The most critical phases revolve around the accessibility of various online resources such as: Internet Service Registration: Registration and maintenance of IP addresses information Domain Name System: Registration and maintenance of host naming Naming Conventions: How an organization encodes or categorizes the name of machines or services Email Systems: Info contained inside email headers Website Analysis: Public information that may pose a risk to security

VisualRoute/TraceRoute www.visualroute.ch visualroute.visualware.com

Naming convention It is important to analyze the names used to define each service.the naming convention used provides valuable insights into the use and position of hosts within an organization. Common naming convention includes: Functional information (e.g. FW.acme.com for firewall, OWA.acme.com for exchange Web-mail interface, webdev.acme.com for developer webserver, etc.) Network location information (fwdmz.acme.com) Physical location information or common location shorthand (e.g. NY - New York, LA - Los Angeles, etc.) Operations system information (e.g. the Microsoft Windows 2003 as w2k3) Hardware/model information (Cisco2611.acme.com) Common sequences to identify servers (jupiter.acme.com, moon.acme.com) Users name like (pc-bob.acme.com, smith-pc.acme.com)

Email info gathering A lot of information about an organization can be gathered through analysis of its e-mail system. Email headers provide insight into internal server naming, IP addresses, possible content filtering or anti-virus solutions, smtp server type, patch levels and even the version of the client s mail client. How can we get this info? Through search engines or by sending an email to nonexistent email addresses And why? because returned error notification e-mails contain headers!

Hiding your traces It is mandatory, for an attacker, to cover as much as possible his traces during all the phases of the attacking process, including the simple web based information gathering. In order to do so, several methods are available. Proxies Strategic shell bouncing TOR

Strategic shell bouncing Your server The shell The hacker

Scanners There are various categories of scanners, some available for free and some upon payment. There are scanners just to test the network and the TCP/UDP layer, scanners to test generic vulnerabilities on systems (services) and scanners for specific daemons (like databases) or web applications.

IP/Port Scanners IP scanners are designed to scan for active hosts or active services on a network. Port Scanners instead, are designed to search a network host for open ports. They are often used by administrators to check the security of their networks and by hackers to compromise it. WINDOWS Superscan - www.foundstone.com Nmap - www.insecure.org LINUX Nmap - www.insecure.org Hping - www.hping.org

Exploits / 0day What is an exploit? An exploit is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug or vulnerability in order to get unintended or unanticipated behavior out of computer software, hardware, or something electronic (usually computerized). This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

Example of vulnerable code #include <stdio.h> #include <string.h> int main(int argc, char *argv[]) { char buffer[60]; if (argc < 2) { fprintf(stderr, "USAGE: %s string\n", argv[0]); return 1; } strcpy(buffer, argv[1]); printf( Your text %s\n, buffer); return 0; }

0x61616161

Buffer Overflows A buffer overflow is a programming error which may result in a memory access exception and program termination, or in the event of the user being malicious, a breach of system security. In details, it is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include other buffers, variables and program flow data. www.phrack.org/archives/49/p49-14