Post on 27-Jun-2015
transcript
HACKING
Don’t Learn to Hack – Hack to Learn
HACKING &
ANTI-HACKING
S.K.Ahsan1
SUNAWAR KHAN AHSAN2
SUNAWAR KHAN AHSAN
IN THE NAME OF
THE MOST MERCIFUL THE BENEFICENT !
ALLAH
3
HACKING
DON’T LEARN TO HACK
HACK TO LEARN !
S.K.Ahsan4
Outlines What is Hacking ?Brief History Who is a Hacker ? Types of Hacker What do Hackers do? Hacker’s Techniques & AttacksAnti-HackingDemo Of Hacking
S.K.Ahsan5
What is “HACKING” ?Hacking is not limited to computers. The real meaning of hacking is to expand the capabilities of any electronic device; to use them beyond the original intentions of the manufacturer.
S.K.Ahsan6
• “ Hacking is the use of one's skills (computer, networking, etc.) to try and find vulnerabilities in a network infrastructure. ”
S.K.Ahsan
HACKER ???
7
• Some one who bypasses the system’s control by taking advantage of security weaknesses left in the system by developers !
• One who is both knowledgeable and skilled at computer programming and have it’s own philosophy and code of ethics !
Who is a HACKER ???
8
S.K.Ahsan
A Brief History of Hacking In 1960s
The first comuter hackers emerge at MIT AI (Massachusetts Institute of Technology) there occurred the first hacking incident an victims were electric trains. 1960’s
S.K.Ahsan9
HistoryIn 1970s
– Phreaking : John Draper Hacked the AT&T’s long distance Calling for free .
– Phone hackers break into regional and international phone networks to make free calls.
S.K.Ahsan10
S.K.Ahsan
History1980’s Phone phreaks begin to move into the realm of computer hacking, and the first electronic bulletin board systems (BBSs) spring up.In 1980s
Bill Landreth(the Cracker)Hacked most secure networks.
(Choas C.Club) Hacked Nuclear secrets in Germany.
>>> Use a Computer, Go to Jail ! ! !
11
In 1990s– Two teens Hacked (T online).– 21 year old Argentinean was hacked
NASA, Harvard an Naval war heads info.
S.K.Ahsan
History
12
S.K.Ahsan
1990’s
After a prolonged sting investigation, Secret Service Agents swoop down on hackers in 14 U.S. cities, conducting early-morning raids and arrests.
The Internet begins to take off as a new browser, Netscape Navigator, makes information on the Web more accessible. Hackers take to the new venue quickly, moving all their information and hacking programs to new hacker Web sites.
>>> As information and easy-to-use tools become available to anyone with Net access, the face of
hacking begins to change.
13
S.K.Ahsan
1995-till date
AOL HACKING ! The hacking group Cult of the Dead Cow releases its
Trojan horse program, a powerful hacking tool--at Def
Con. Once a hacker installs the Trojan horse on a machine running Windows 95 or Windows 98, the program allows unauthorized remote access of the machine !
Hackers launch attacks against eBay, Yahoo,
Amazon, and others !
Microsoft becomes the prominent victim of a new type of hack that attacks the domain name server.
14
2000– In one of the biggest denial-of-service
attacks , hackers launch attacks against eBay, Yahoo!, CNN.com., Amazon and others.
S.K.Ahsan15
S.K.Ahsan16
Who is a “HACKER” ? There are at least two common interpretations:
A programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-crime.
A programmer for whom computing is its own reward; may enjoy the challenge of breaking into other computers but does no harm.
S.K.Ahsan17
Types of Hackers White Hat Hackers Are hackers in the noble sense of the term,
whose goal is to help improve computer systems .
Black Hat Hackers Are people who break into computer
systems for malicious purposes,
commonly called pirates.
S.K.Ahsan18
S.K.Ahsan19
S.K.Ahsan
How Hackers do HACKING …
20
What Do HACKERS Do?Threaten PeopleStole illegal or Private materialDamage SystemStole PasswordsCrack Unpaid SoftwaresModify data / stream
S.K.Ahsan21
S.K.Ahsan
System– Access confidential information – Threaten someone from YOUR computer– Broadcast your confidential letters or
materials – Store illegal or espionage material
22
S.K.Ahsan
Network– Eavesdrop and replay– Imposer: server / client– Modify data / stream– Denial-of-Service
23
SUNAWAR KHAN AHSANS.K.Ahsan
Common Hacking
Techniques!
24
System hackingNetwork hackingSoftware hacking http://wiki.answers.com/Q/What_are_the_types_of_hacking
S.K.Ahsan25
System Hacking
• Foot printing• Scanning• Enumeration• Gaining access• Covering tracks• Creating backdoors• Denial of service
26
S.K.Ahsan
FootprintingObjective
– To learn as much as you can about target system, it's remote access capabilities, its ports and services, and the aspects of its security.
Techniques– Open source search– Whois– Web interface to whois– ARIN whois
27
S.K.Ahsan
Inside Jobs
Most security breeches
originate inside the network that
is under attack.
Which include stealing passwords, performing
industrial private data, or
committing simple misuse.
S.K.Ahsan28
PING
29
S.K.Ahsan
whois microsoft.com
30
S.K.Ahsan
Web interface to whois
31
S.K.Ahsan
Output of: whois tamuk.edu@whois.internic.net
32
S.K.Ahsan
ARIN whois
33
S.K.Ahsan
Scanning
Objective – Bulk target assessment and identification
of listing services focuses the attention on the most promising avenue of entry
Techniques– Ping sweep– TCP/UDP port scan– OS Detection
34
S.K.Ahsan
EnumerationObjective
– More intrusive probing now begins as attackers begin identifying valid user accounts or poorly protected resource shares
Techniques– List user accounts– List file shares– Identify applications
35
S.K.Ahsan
Gaining Access
Objective – Enough data has been gathered at this
point to make an informed attempt to access the target
Techniques– File share brute forcing– Password file grab– Buffer overflows– Password eavesdropping
36
S.K.Ahsan
NETBRUTE FORCE
37
S.K.Ahsan
PASSWORD FILE GRABBER
38
S.K.Ahsan
Covering TracksObjective
– Once total ownership of the target is secured, hiding this from system administrators become paramount ,lest they quickly end the romp.
Techniques– Clear logs– Hide tools
39
S.K.Ahsan
Creating Back DoorsObjective
– Trap doors will be laid in various parts of the system to ensure that privileged access is easily regained at the whim if the intruder
Techniques– Create rogue user accounts– Schedule batch jobs– Infect startup files– Plant remote control services– Install monitoring mechanisms– Replace apps with trojans
40
S.K.Ahsan
Rogue Access Points
Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech.
Rogue APs are most often connected by well
meaning but ignorant employees.
S.K.Ahsan41
Viruses and Worms Viruses and worms are
self-replicating programs
or code fragments that
attach themselves to
other programs (viruses)
or machines (worms).
Viruses and worms attempt to shut down networks by
flooding them with massive amounts of bogus
Traffic,usually through e-mail.
S.K.Ahsan42
Back Doors
Hackers can gain access to a
Network by exploiting back doors,
administrative shortcuts, configuration
errors, easily deciphered
passwords, and unsecured dial-ups.
S.K.Ahsan43
Trojan Horses
Trojan horses, which are
Attached to other programs, are
the leading cause of all break-ins.
When a user Downloads and
activates a Trojan horse, the hacked software kicks off
a virus, password gobbler, or remote-control SW that
gives the hacker control of the PC.i.e Snipersky,PerfectKeylogger.
S.K.Ahsan44
Denial of Service
DoS attacks give hackers a way to bring down a network without gaining internal access.
DoS attacks work by flooding the access routers with bogus traffic.
A DDoS is more difficult to block because it uses multiple, changing, source IP addresses.
S.K.Ahsan45
Anarchists Who just like to break stuff. They usually exploit any
target of opportunity.
Crackers hobbyists or professionals who break passwords and
develop Trojan horses or other SW (called warez).
Script kiddies They have no real hacker skills, so they buy or
download warez, which they launch and use “COwbOy “Languages.
S.K.Ahsan46
Phreakers The pirates who use the switched telephone network
(STN) to make free phone calls.
Carders mainly attack chip card systems (particularly bank
cards) to understand how they work and to exploit their flaws. The term carding refers to chip card piracy.
S.K.Ahsan47
Sniffing refers to the act of intercepting TCP packets. This
interception can happen through simple eavesdropping or something more sinister.
S.K.Ahsan48
Port scanning and spoofing The act of sending an illegitimate packet with an
expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.
S.K.Ahsan49
Phishing
The method of luring an unsuspecting user into giving out their username and password for a secure web resource, usually a bank or credit card account.
Ebay and PayPal are particularly susceptible to this type of attack.
S.K.Ahsan50
S.K.Ahsan51
S.K.Ahsan52
BRUTUS - ( Brute force )
www.hoobie.net/brutusS.K.Ahsan53
54
S.K.Ahsan
55
S.K.Ahsan
Port numbers and description
56
S.K.Ahsan
S.K.Ahsan57
Hacker’s Techniques & Attacks
FAKE PAGE
S.K.Ahsan58
SUNAWAR KHAN AHSANS.K.Ahsan
Anti Hacking !
59
DEFINITION
“The opposite
of hacking".
If hacking is defined as an attack on a computer system then Anti-Hacking is the protection of that system.
AntiHacking
S.K.Ahsan60
S.K.Ahsan61
SUNAWAR KHAN AHSANS.K.Ahsan
Anti Hacking
Techniques!
62
Don't ignore operating system updates Anti-virus software Activate the firewall in Windows XP Email software preview windows Logging out Audit your computer regularly Regularly remove spyware Password issues Increasing Security Against a Brute Force
Attack
S.K.Ahsan63
Don't ignore operating system updates
Don't wait to be alerted via mainstream media of problems that have been discovered
It's wise to visit the software vendors' site and keep abreast of any critical security updates. In the case of Microsoft, you'll need to go to the Windows Update site.
S.K.Ahsan64
Anti-virus software Anti-virus software used *properly*. Ensure that it's regularly updated. Even missing one update could bring
down your computer . remember to password protect the
settings on the software so no-one else can alter protection levels.
S.K.Ahsan65
ANTI-VIRUS
S.K.Ahsan66
Activate the firewall in Windows XP Anti-virus software isn't enough,it's also a
good idea to install firewall software which will help prevent unauthorized incoming and outgoing communications from your computer while connected to the Internet.
Port scanning is *very* common and is carried out with a view to finding weaknesses in your system that can then be exploited.
S.K.Ahsan67
Firewall
S.K.Ahsan68
Email software preview windows
3rd party solutions for filtering email of spam and viruses as their inboxes become inundated with junk.
Email filtering can be very effective in dramatically reducing security risks before the mail even has a chance to be collected by your email software.
S.K.Ahsan69
Logging out
Ensure that you log out of online services properly. Failure to do so can allow others who use your computer to gain access to those services.
S.K.Ahsan70
Audit your computer regularly
If your computer is used by others, carry out regular audits of the software on it.
It's safest to make it a policy not to allow any software to be installed without your permission.
Spybot again is a very effective tool for detecting and removing software that may be a security risk.
S.K.Ahsan71
Regularly remove spyware
If you and your familiar do a lot of surfing and downloading of shareware software, then it's likely you'll also accumulate your fair share of spyware.
Some software companies use spyware that is incorporated into their software products to gather data about customers, which is often sold to other companies.
S.K.Ahsan72
Anti-Spyware
S.K.Ahsan73
Password issues If you must store usernames and passwords
on your system, ensure they are contained in a document that is password protected.
Don't let Windows "remember" passwords for you. Passwords should always be more than 8 characters long and contain a mixture of numbers and letters. Learn more about password security issues.
S.K.Ahsan74
Increasing Security Against a Brute Force Attack
Increasing the length of the PIN Allowing the PIN to contain characters other
than numbers, such as * or # Imposing a 30 second delay between failed
authentication attempts Locking the account after 5 failed
authentication attemptsS.K.Ahsan75
DEMO OF
HACKING
S.K.Ahsan76
SUNAWAR KHAN AHSANS.K.Ahsan
77
SUNAWAR KHAN AHSANS.K.Ahsan
How To Own A Shadow!The Chase For Knuth
Gooooooood By
78