Penetration Testing Presented by: Elham Hojati

Slides:



Advertisements
Similar presentations
For further information computersecurity.wlu.ca
Advertisements

Penetration Testing Presented by: Elham Hojati Advisor: Dr. Akbar Namin July 2014.
Security Issues and Challenges in Cloud Computing
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Computer Security and Penetration Testing
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Browser Exploitation Framework (BeEF) Lab
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Red Hat Installation. Installing Red Hat Linux is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on.
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
Security Testing Case Study 360logica Software Testing Services.
Software Security Testing Vinay Srinivasan cell:
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Security Scanners Mark Shtern. Popular attack targets Web – Web platform – Web application Windows OS Mac OS Linux OS Smartphone.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Retina Network Security Scanner
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
MIS Week 5 Site:
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Final Project: Advanced Security Blade IPS and DLP blades.
Vulnerability Analysis Dr. X. Computer system Design Implementation Maintenance Operation.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Responder Field Edition & Pro
Defining your requirements for a successful security (and compliance
CGS 3066: Web Programming and Design Spring 2017
Virtual Machine and VirtualBox
Penetration Testing Reconnaissance 2
Penetration Testing Scanning
Web Programming Language
GENI, Pen Testing, & other stories
Penetration Testing Social Engineering Attack and Web-based Exploitation CIS 6395, Incident Response Technologies Fall.
Penetration Testing: Concepts,Attacks and Defence Stratagies
Fortinet NSE8 Exam Do You Want To Pass In First Attempt.
Penetration Testing Presented by: Elham Hojati
Security Testing Methods
Penetration Test Debrief
Secure Software Confidentiality Integrity Data Security Authentication
Penetration Testing Karen Miller.
Responder Field Edition & Pro
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Computer Security Fundamentals
Network Services.
Web Penetration Testing and Ethical Hacking Capture the Flag
Backtrack Metasploit and SET
Cyber Operation and Penetration Testing Social Engineering Attack and Web-based Exploitation Cliff Zou University of Central Florida.
Virtual Machine and VirtualBox
Acknowledgement Content from the book:
Virtual Machine and VirtualBox
Virtual Machine and VirtualBox
Designing IIS Security (IIS – Internet Information Service)
Web Servers (IIS and Apache)
Presentation transcript:

Penetration Testing Presented by: Elham Hojati Advisor: Dr. Akbar Namin July 2014

Part one: the concept of penetration testing

What is a penetration test?(informal) Port scanning Vulnerability Scanning Penetration Testing 3

What is a penetration test? A penetration test is an attack on a computer system, network or Web application to find vulnerabilities that an attacker could exploit with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data. Pen tests can be automated with software applications or they can be performed manually. The process includes: gathering information about the target before the test (reconnaissance), identifying possible entry points(Port scanning), attempting to break in (either virtually or for real) reporting back the findings. 4

Why conduct a penetration test? Prevent data breach Test your security controls Ensure system security Get a baseline Compliance 5

Steps of penetration test (informal) Establish goal Information gathering Reconnaissance Discovery Port scanning Vulnerability scanning Vulnerability analysis Taking control Exploitation Brute forcing Social engineering Pivoting Reporting Evidence collection Risk analysis Remediation 6

Some Considerations Scope Internal or external In-house or outsourced Selecting a pen-tester (white hat hacker) White hat hacker vs Black hat hacker Penetration tests are sometimes called white hat attacks because in a pen test, the good guys are attempting to break in. The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems 7

Steps of penetration test 12 subcategories of the Web Application Penetration Testing Methodology: based on OWASP methodology Introduction and Objectives Information Gathering Configuration and Deploy Management Testing Identity Management Testing Authentication Testing Authorization Testing Session Management Testing Data Validation Testing Error Handling Cryptography Business Logic Testing Client Side Testing 8

Steps of network penetration test 9

Steps of penetration test Step 1: Introduction and Objectives Step 2:Information gathering Step 3:Vulnerability analysis Step 4:Simulation (Penetrate the system to provide the proof) Step 5:Risk assessment Step 6:Recommendations for reduction or recovery and providing the report 10

Part 2: Introduction to some Penetration Testing Tools https://drive.google.com/file/d/0B7j6y0yrm70VSmFGV0VtYWpucHM/edit?usp=sharing pt.isfahanblog.com

Kali Linux Kali Linux is a Debian-derived Linux distribution, designed for digital forensics and penetration testing. Kali Linux is preinstalled with numerous penetration-testing programs. Kali Linux can be run from a hard disk, live CD, or live USB. It is a supported platform of the Metasploit Project's Metasploit Framework, a tool for developing and executing security exploits. From the creators of BackTrack comes Kali Linux, the most advanced penetration testing distribution created till now. 12

Installing Kali Linux 1- Go to the link http://www.kali.org/downloads/ 2- Download a proper version of the kali Linux image (based on your “system type”, if it is 32 bit or 64 bit, for example for 64 bit OS you can download Kali Linux 64 bit ISO (to find the type of the system: right click on the computer icon in your desktop or in the start menu and go to the properties tab and read the system type there). 3- Then you can write this ISO file to a cd or DVD or flash memory and use it or you can put it in the VMware like below. 4- For running Kali Linux in the VMware, go to the start and type VMware Workstation and open that. 5- Go to the file-> new virtual machine to install the Kali Linux through this wizard. 6- Install the Kali Linux and select it from the list in the left sideof the page and power it on. 7- Type the user name and password (ex. User: root Pass: toor). 8- Go to the application->Kali Linux to see all the penetration testing tools there. 13

Penetration testing tools whois: for information gathering step Maltego: for information gathering step Hydra: for brute force step Vega: for Vulnerability analysis 14

Maltego Maltego is an open source intelligence and forensics application. It will offer you gathering of information as well as the representation of this information in an easy to understand format. 15

Maltego 1- Go to the Applications -> Kali Linux -> top 10 security tools -> maltego, or open a command line terminal and type maltego. 2- If it is your first time you want to run this program, you should register to this program by using an email address and then login to the program using this email address and the password that you set before. 3- Go to the menu tab (a circle at the top left corner of the page) and select new. 4-from the palette menu (from the left side of the page), select domain and drag and drop it to the middle of the page. 5- Type the domain name in the property view of the domain (at the right side). 6- Right click on the domain. Choose Run Transform-> all transforms-> to website DNS 7- Right click on one of the websites and choose Run Transform-> all transforms-> ToServerTechnologiesWebsite. 16

Maltego 8- Right click on one of the websites and choose Run Transform-> all transforms-> To IP Address. 9- Right click on one of the IP address and choose Run Transform-> all transforms ->Net block using Whois. 10- Right click on one of the net block and choose Run Transform-> all transforms-> toLocationCountryNetblock. 11- Right click on one of the websites and choose Run Transform-> all transforms-> Mirror: email addresses found 17

WHOIS SERVICE WHOIS is a query and response protocol that is widely used for querying databases that store the registered users of an Internet resource, such as a domain name, an IP address block, or an autonomous system It is also used for a wider range of other information. The protocol stores and delivers database content in a human-readable format. 18

Using WHOIS SERVICE 1- Open a command line terminal in Kali Linux and type whois <target> for example: whois google.com 2- Type ping yahoo.com and find the IP address of yahoo. 3-type whois <yahoo IP address> 4- Go to the link http://www.iana.org/whois and type google.com 5- Go to the link http://www.whois.net/ and type www.google.com 19

Vega Vega is a free and open source scanner and testing platform to test the security of web applications. Vega can help you find and validate SQL Injection, Cross-Site Scripting (XSS), inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows 20

Vega 1- In the Kali Linux go to the Applications -> Kali Linux -> Web Applications -> web crawlers -> Vega, or Open a command line terminal in Kali Linux and type vega. 2- Go to the link https://subgraph.com/vega/download/index.en.html to download Vega. 3- Install the Vega tool and run it. 4- Go to the scan tab -> start new scan. 5- Type http://www.ebay.com/ to find this website vulnerability. 21

Hydra: Brute force Attack 22

Finding a username and password of a website Go the the website: http://www.sunstudiophotography.com/ Type /hackme at the end of the website URL address (for going to this part of the site you need to have a username and password). Download a library of usernames and a library of passwords through the internet or use some tools such as key generator tools to produce a list of username and password ( now you have 2 files, one of the consists of a list of usernames and the other one consists of a list of passwords.) Go to the command line terminal and type this: hydra <website> -L <userlist> -P <wordlist> -V -f http-get /<sub dir> for example: hydra www.sunstudiophotography.com -L /root/Desktop/userlist.txt -P /root/Desktop/wordlist.txt -V -f http-get /hackme You find the username and password of this web site Login to the website using the username: guest and password: password [4] 23

Hydra-gtk : Finding Gmail password 1- Go to the Applications -> Kali Linux -> Password Attacks -> Online Attacks -> hydra-gtk 2- Set: In the target tab: Single Target: smtp.gmail.com Port: 465 Protocol: smtp Use SSL should be selected Show Attempts should be selected In the passwords tab: Username: el.sec.test.2014@gmail.com Password list: browse and choose the password file Try login as password should be selected. Click start in the start tab. 24

3- Hydra found gmail password:11111111q 4- Or you can go to the command line terminal and type: hydra -S -l el.sec.test.2014@gmail.com -P /root/Desktop/pass4.txt -V -s 465 smtp.gmail.com smtp Or type: hydra -s 465 -S -V -l el.sec.test.2014@gmail.com -P/root/Desktop/pass4.txt -e s -t 36 -w 36 smtp.gmail.com smtp 25

References: [1] http://en.wikipedia.org/wiki/White_hat_%28computer_security%29 [2] https://community.rapid7.com/docs/DOC-2248 [3] http://searchsoftwarequality.techtarget.com/definition/penetration-testing [4] http://en.wikipedia.org/wiki/Penetration_test [5] https://www.securitymetrics.com/pentest_steps.adp [6] http://www.kali.org/ [7] http://en.wikipedia.org/wiki/Kali_Linux [8] https://www.paterva.com/web6/ [9] http://en.wikipedia.org/wiki/Whois [10] https://subgraph.com/vega/ [11] http://www.youtube.com/watch?v=plitHS8Tqdo 26

Question 27