Date post: | 06-Apr-2018 |
Category: |
Documents |
Upload: | sahil-wadhwa |
View: | 215 times |
Download: | 0 times |
of 23
8/3/2019 EthicalH
1/23
#!@
Ethical Hacking
By:-Prant ChaudharyIT VIIth Semester
11901
8/3/2019 EthicalH
2/23
2
#!@
Ethical Hacking - ?
Why Ethical Hacking ?
Ethical Hacking - Process
Ethical Hacking Commandments
Reporting
8/3/2019 EthicalH
3/23
3
#!@
Ethical
Hacking
Conforming to accepted professional standards of conduct
What is Ethical Hacking
Process of breaking into systems for:Personal or Commercial GainsMalicious Intent Causing sever damage to Information & Assets
Also Called Attack & Penetration Testing,White-hat hacking, Red teaming
White-hat - Good GuysBlack-hat Bad guys
8/3/2019 EthicalH
4/23
4
#!@
What is Ethical Hacking
It is Legal
Permission is obtained from the target
Part of an overall security program
Identify vulnerabilities visible from Internet atparticular point of time
Ethical hackers possesses same skills, mindsetand tools of a hacker but the attacks are done in
a non-destructive manner
8/3/2019 EthicalH
5/23
5
#!@
Why Ethical Hacking
Source: CERT-India
January - 2005June 01, 2004 to Dec.31, 2004
Domains No of Defacements
.com 922
.gov.in 24
.org 53
.net 39
.biz 12
.co.in 48
.ac.in 13
.info 3
.nic.in 2
.edu 2
other 13
Total 1131
Defacement Statistics for Indian Websites
8/3/2019 EthicalH
6/23
6
#!@
Why Ethical Hacking
Source: CERT/CCTotal Number of Incidents Incidents
8/3/2019 EthicalH
7/23
7
#!@
Why Ethical Hacking
Source: US - CERT
8/3/2019 EthicalH
8/23
8
#!@
Why Ethical Hacking
Viruses, TrojanHorses,
and Worms
SocialEngineering
Automated
Attacks
AccidentalBreaches in
Security Denial ofService (DoS)
Organizational
Attacks
Restricted
Data
Protection from possible External Attacks
8/3/2019 EthicalH
9/23
9
#!@
Ethical Hacking - Process
1. Preparation
2. Footprinting
3. Enumeration & Fingerprinting
4. Identification of Vulnerabilities
5. Attack Exploit the Vulnerabilities
8/3/2019 EthicalH
10/23
10
#!@
Preparation
Identification of Targets company websites,mail servers, extranets, etc.
Signing of Contract Agreement on protection against any legal issues
Contracts to clearly specifies the limits and dangers ofthe test
Specifics on Denial of Service Tests, Social Engineering,etc.
Time window for Attacks
Total time for the testing Prior Knowledge of the systems
Key people who are made aware of the testing
8/3/2019 EthicalH
11/23
11
#!@
Footprinting
Collecting as much information about the target
DNS Servers
IP Ranges
Administrative Contacts
Problems revealed by administrators
Information Sources
Search engines
Forums Databases whois, ripe, arin, apnic
Tools PING, whois, Traceroute, DIG, nslookup, sam spade
8/3/2019 EthicalH
12/23
12
#!@
Enumeration & Fingerprinting
Specific targets determined
Identification of Services / open ports
Operating System Enumeration
Methods Banner grabbing
Responses to various protocol (ICMP &TCP) commands
Port / Service Scans TCP Connect, TCP SYN, TCP FIN, etc.
Tools Nmap, FScan, Hping, Firewalk, netcat, tcpdump, ssh,
telnet, SNMP Scanner
8/3/2019 EthicalH
13/23
13
#!@
Identification of Vulnerabilities
Vulnerabilities
Insecure Configuration
Weak passwords Unpatched vulnerabilities in services, Operating
systems, applications
Possible Vulnerabilities in Services, Operating
Systems Insecure programming
Weak Access Control
8/3/2019 EthicalH
14/23
14
#!@
Identification of Vulnerabilities
Methods
Unpatched / Possible Vulnerabilities Tools,Vulnerability information Websites
Weak Passwords
Default Passwords, Bruteforce, Social Engineering, Listening to Traffic
Insecure Programming SQL Injection, Listeningto Traffic
Weak Access Control
Using the ApplicationLogic, SQL Injection
8/3/2019 EthicalH
15/23
15
#!@
Identification of Vulnerabilities
Tools
Vulnerability Scanners - Nessus, ISS, SARA, SAINT
Listening to Traffic Ethercap, tcpdump
Password Crackers John the ripper, LC4, Pwdump
Intercepting Web Traffic
Achilles, Whisker, Legion
Websites
Common Vulnerabilities & Exposures http://cve.mitre.org
Bugtraq www.securityfocus.com
Other Vendor Websites
http://cve.mitre.org/http://www.securityfocus.com/http://www.securityfocus.com/http://cve.mitre.org/8/3/2019 EthicalH
16/23
16
#!@
Attack Exploit the vulnerabilities
Obtain as much information (trophies) from theTarget Asset
Gaining Normal Access
Escalation of privileges Obtaining access to other connected systems
Last Ditch Effort Denial of Service
8/3/2019 EthicalH
17/23
17
#!@
Attack Exploit the vulnerabilities
Network Infrastructure Attacks
Connecting to the network through modem
Weaknesses in TCP / IP, NetBIOS
Flooding the network to cause DOS
Operating System Attacks
Attacking Authentication Systems
Exploiting Protocol Implementations
Exploiting Insecure configuration Breaking File-System Security
8/3/2019 EthicalH
18/23
18
#!@
Attack Exploit the vulnerabilities
Application Specific Attacks
Exploiting implementations of HTTP, SMTPprotocols
Gaining access to application Databases
SQL Injection
Spamming
8/3/2019 EthicalH
19/23
19
#!@
Attack Exploit the vulnerabilities
Exploits
Free exploits from Hacker Websites
Customised free exploits
Internally Developed
Tools Nessus, Metasploit Framework,
8/3/2019 EthicalH
20/23
20
#!@
Reporting
Methodology
Exploited Conditions & Vulnerabilities thatcould not be exploited
Proof for Exploits - Trophies
Practical Security solutions
8/3/2019 EthicalH
21/23
21
#!@
Ethical Hacking - Commandments
Working Ethically
Trustworthiness
Misuse for personal gain
Respecting Privacy
Not Crashing the Systems
8/3/2019 EthicalH
22/23
22
#!@
8/3/2019 EthicalH
23/23
23
#!@
ANY QUERIES??