Mano ‘dash4rk’ Paul r3c0n to r00t - Security and Soul

Slides:



Advertisements
Similar presentations
We Can Rejoice in the Lord Because We Have Salvation
Advertisements

Preparing to Share Your Story
Lesson 1: The Plan Salvation of.
Responding to the Shepherd John 10. Who or what are you listening to?
Heaven Is Just Four Steps Away
Matthew 22:42 42 What think ye of Christ? Whose son is He? Matthew 16:13.
The Hour Is Coming John 5:28-29 A Time Appointed 8/8/2010 pm
Did Jesus Christ Die In Vain
ALL SCRIPTURE REFERENCES – NEW AMERICAN STANDARD BIBLE
Background – the Gospel, which: Paul had preached, v. 1; Acts 18:1-11. The Corinthians had received, v. 2; Acts 18:8 By which they were saved, v. 2; Romans.
Questions Jesus Asked Questions Jesus Asked! Whose Wife Will She Be or Living with resurrection eyes?
“MIRACLES AT COLOSSAE”
A servant of God or of Satan
An Uncommon Love Welcome and give thanks to God and brothers and sisters for allowing me to present another lesson before you. I hope that it is beneficial.
The Appearance of Christianity Matthew 6:1-4. The Appearance of Christianity Numbers 15:1-13 (rules of Sacrifice) Numbers 15:14-17 (stranger, sacrifice.
Biblical Faith HEBREWS 11:1 NOW FAITH IS THE SUBSTANCE OF THINGS HOPED FOR, THE EVIDENCE OF THINGS NOT SEEN.
Saving The Sinner James 5:19-20.
The Wonderful Good News of Revelation
God’s Simple Plan of Salvation
All we need is Love. All we need is Love Introduction the Book of Love “Love” used 676 time in NASB 360 times in the New Testament Where do we go?
‘Man in Sin’ is separated from ‘God’
Preparing & Preaching Gospel Sermons
Making God in Mans Image. Man has always made God in his image Romans 1:18-25.
The Many Factors In Man’s Salvation
Galatians Teaches Approval Galatians 1:10
The Way of Man Jeremiah 10: Jeremiah 10:23 O LORD, I know the way of man is not in himself; it is not in man who walks to direct his own steps.
1 God’s Purpose: Honor and Serve Him
THE APOSTLES’ CREED – 2NDARTICLE THE THREEFOLD OFFICE OF CHRIST
“We Know” (1 John) The Christian’s Assurance. 2 DO YOU KNOW YOU HAVE ETERNAL LIFE? 1Jo 2:28 And now, little children, abide in Him, that when He appears,
Eternal Life It’s your decision....
Why I Am A Christian. Why Do People Reject God?  Some accept philosophical arguments  Many due to suffering they have experienced or seen  Refuse the.
The Mind of Christ Lesson One.
Mano ‘dash4rk’ Paul October 11, 2013 Seek and Ye shall Find - Password and Providence.
If Necessary Use Words Dave Ferguson.
If Necessary Use Words Part 2.
Living Things. 2 Life is a gift from God, Acts 17:25 (Isa. 42:5)Life is a gift from God, Acts 17:25 (Isa. 42:5) Jesus Christ, the Son of God, offers us.
A Study of Psalm 71. Delivers me (v. 2, 4) – Col. 1:13; 2 Pet. 2:7-9 Rescues me (v. 2) – 1 Cor. 10:13; 2 Tim. 2:26 Hears me (v. 2) – 1 John 5:14-15; 1.
James 5: There is only one truth – “the truth” –Many want to make truth relative – no absolute truth!  Argue for the existence of various shades.
Colossians 1: As Lord, Jesus Has Authority – An Extensive Reach Over All (1:15-18) As Lord, Jesus Has Authority – An Extensive Reach Over All (1:15-18)
You Will Die, Tomorrow Isaiah 38:1-3.
Who Told You? The Bible shows us very clearly what we are to do in the realm of religion in order to be pleasing to God “So then faith comes by hearing,
What Will Your Answer Be? Some-day you’ll stand at the bar on high, Some day your record you’ll see; Some-day you’ll answer the question of life, What.
1 Cor 12:13 “For by one Spirit we were all baptized into one body— whether Jews or Greeks, whether slaves or free—and have all been made to drink into.
“The Curse is Broken” Romans 3:10-18 As the Scriptures say, “No one is righteous— not even one. 11 No one is truly wise; no one is seeking God. 12 All.
 1 Peter 3:15  15 But sanctify the Lord God in your hearts, and always be ready to give a defense to everyone who asks you a reason for the hope that.
If I Were The Devil 1965 What if I was the Devil? 1 Peter 5:8 8 Be sober, be vigilant; because your adversary the devil walks about like a roaring.
Faith Matters Romans 4:20-21 Hebrews 11:6.
Ephesians 5:1-20 Message 1 in our 5-part series on Ephesians 5 & 6.
He who has an ear, let him hear
…is life itself. ‘Now this is eternal life: that they may know you, the only true God, and Jesus Christ, whom you have sent.’ John chapter 17 verse 3.
God’s Great Exchange.
The Nature and Character of God. It is the temptation and instinct of mankind to create in our own sinful minds a “god” that is the figment of our imagination.
Finding Peace with God.
Love Part 2.
The Substance of Faith An Evidence and Foundational Christian Curriculum Part 5.
The Gift of Righteousness Romans 9:1-33. (1) God chose you to believe. (2) You chose God. (3) They’re both true, but we just can’t understand it. three.
Trinity Lutheran Youth Group. Last Month Does God Exist? Evidence from Science Logic Evidence from History Experience.
“Within the one Being that is God, there exists eternally three coequal and coeternal persons, namely, the Father, the Son and the Holy Spirit.” The Trinity.
Spiritual Weakness Anemia of the Soul. 2 Be Strong in the Lord Watch, stand fast in the faith, be brave, be strong. 1 Cor. 16:13 Finally, my brethren,
It isn’t Possible to Have a Relationship with God, if…
Love God, Love People Mark 12:28-34.
The grass withers, the flower fades, but the word of our God stands forever. Isaiah 40:8.
Review of Genesis 47: Joseph presented five of his brothers and his father to Pharaoh, vs Joseph dealt very wisely with the Egyptians as the famine.
This is not an option. Introduction In our culture, the word “let” implies a permission to happen, or an allowance for something too happen. In Biblical.
Do not let your hearts be troubled
What Sin Does.
Requirements For Proclaiming The Gospel
Threat Modeling in the garden of Eden Mano ‘dash4rk’ Paul HackFormers.
Mano ‘dash4rk’ Paul CISSP, CSSLP, AMBCI, MCAD, MCSD, CompTIA Network+, ECSA SQL Injection & Soul Injection attacks.
“… the conspiracy to torture Jesus to death should not be read in too much of a hurry, with too much eagerness to get the body into the tomb – or beyond.
Presentation transcript:

Mano ‘dash4rk’ Paul r3c0n to r00t - Security and Soul

whois [Querying whois.org] Name: manoranjan paul > mano paul [IDENTITY] Primary: Follower of Jesus Christ (Christian) DOB: 09/ [TECHNICAL] Advisor: (ISC) 2, Software Assurance Books: The 7 Qualities of Highly Secure Software; Official (ISC) 2 Guide to CSSLP CEO: SecuRisk Solutions [OTHER] Researcher: Shark Biology (dash4rk) Creds: CSSLP, CISSP, MCSD, MCAD, CompTIA Network+, ECSA Record created on Record expires on tbd Database last updated on wen u c me, tweet

What is the topic/series about? Security – Pentesting processes from r3c0n to r00t – Intro to security tools in the Kali Linux OS Soul – Exploits that impact the soul – Intro to tools in the Bible and the protection in Jesus Christ 3 It is one thing to get r00ted in security; It is far worse to get r00ted in life

Agenda Teach Security Teach Christ Teach Security In Christ 4

Security -- getting r00ted in security -- Teach Security

Pentesting? Answers the question: – Can some entity penetrate your security defenses? Attestation of your overall security posture Before ogres do Attest Security Controls (safeguards, countermeasures) 6

Pentesting? (contd.) Rules of engagement – Scope defined – Get out of Jail card Structured process – Discovery to Exploit to Post-exploitation Internal/External scenarios 7

Pentesting – what it is NOT? 8

In the “r3c0n to r00t” series I will cover the various tools in the Kali Linux pentest distro/OS to perform the 3 steps pentest process – Step 1: r3c0n – Step 2: r3sili3ncy attestation – Step 3: r00t 9

What is Kali Linux? Debian based OS distro – dpkg –i file.deb Favorite OS for pentesters and forensics Trivia – Other Names – Kali – Backtrack – Whax – Whoppix – Knoppix 300+ security tools 10

Tools, Tools, and more Tools 11

Step 1: r3c0n Identify live hosts Enumerate Discover Gather Info/Intelligence 12

r3c0n - Quotes Know your enemy – The Art of War; Sun Tzu Know your victim – Mano ‘dash4rk’ Paul 13

r3c0n Tool Categories Identification – Live host – IDS/IPS Scanning – Network Fingerprinting – OS – Services Analysis – DNS – OSINT – Route – SMB – SMTP – SNMP – SSL – Telephony – Traffic – VoIP – VPN 14

Step 2: r3sili3ncy attestation Evaluate attack surface Analyze vulnerability Check exploit 15

r3sili3ncy attestation - Quotes The art of being wise is the art of knowing what to overlook. – American Philosopher and Psychologist, William James ( ) The art of being wise is the art of knowing what to look over. – Mano ‘dash4rk’ Paul (19.. – Forever) 16

Step 3: r00t Run exploit Getting pwn3d 17

Tell me, and I’ll forget Show me, and I may remember Involve me, and I’ll understand 18

Demo Step 1: r3c0n – 1.a. Who is out there alive? Live host identification – netdiscover – 1.b. What can we find out about the living? 1.b.1. Scanning (enumeration, discovery) – dmitry – nmap – zenmap – dnmap_server – dnmap_client 1.b.2. Fingerprinting – miranda 19

Demo (contd.) Step 2: r3sili3ncy attestation – Is the system vulnerable to exploitation? metasploit framework (check) Step 3: r00t – Getting pwn3d? metasploit framework (run exploit) 20

Soul -- getting r00ted in life -- Teach Christ

r3c0n of the living Who is out there alive? – Identification of the living (live hosts) Jesus said, “I am the resurrection and the life; Anyone who believes in me will live, even after dying.” (John 11:25; NLT) Those who believe in Jesus shall live (now) and eternally; they are the ones who are spiritually alive. (John 3:16) The devil is not interested in those who are spiritually dead 22

Scan What can we find out about the living? – The bad: Your adversary the devil is like a roaring lion (in r3c0n), seeking whom he may devour (exploit) (1 Peter 5:8) – The good: The eyes of the Lord search the whole earth (in r3c0n) to strengthen those whose hearts are fully committed to him (2 Chronicles 16:9a ; NLT) 23

Fingerprint Whose fingerprint is on you? – The d3v1l’s For you are the children of your father the devil, and you love to do the evil things he does. He was a murderer from the beginning. He has always hated the truth, because there is no truth in him. When he lies, it is consistent with his character; for he is a liar and the father of lies. (John 8:44; NLT) – God’s For I hold you by your right hand — I, the Lord your God. And I say to you, ‘Don’t be afraid. I am here to help you. … I am the Lord, your Redeemer. I am the Holy One of Israel.’ (Isaiah 41:13,14b; NLT) 24

r3sili3ncy attestation Is our life vulnerable to exploitation? – No one is righteous; no not one (Romans 3:10) – All are vulnerable. All have sinned and have fallen short of the glory of God (i.e., vulnerable and exploitable) - Romans 3:23 The wages of sin is death (getting r00ted/pwn3d) - Romans 6:

r00t – getting pwn3d Who 0wns you? – Are you r00ted by the devil? a slave to sin – Sin is crouching at the door, eager to control you. But you must subdue it and be its master.” (Genesis 4:7; NLT) – Are you r00ted in Christ Jesus? a servant of the Savior and Lord – And now, just as you accepted Christ Jesus as your Lord, you must continue to follow him. Let your roots grow down into him, and let your lives be built on him. Then your faith will grow strong in the truth you were taught, and you will overflow with thankfulness. (Colossians 2:6-7; NLT) 26

The conclusion of the matter No own wants to be pwn3d! To avoid security – one must implement security controls To avoid your soul from getting pwn3d (soul one MUST be r00ted in the one life control – Jesus Christ! 27

Points to Ponder Teach Security In Christ

Discussion Points Would you consider yourself alive or dead (spiritually)? – Born once, die twice – Born twice, die once If you are alive, you are the target! Are you r00ted by the devil (slave to sin) or are you r00ted in Christ Jesus? All who call on the name of the Lord Jesus Christ shall be saved [i.e., not have their soul (Joel 2:32) 29

Closing Thoughts 30 try { if (uLikedThisPresentationAndMtg) { subscribeVia (); followAndTweet(); getLinkedIn(); Us(); // } else { giveFeedback(); // } catch(Temptations t) { r00tedIn(God JesusChrist); } finally { ThankUandGodBless(); }

Standards Pre-engagement activities Intelligence Gathering Threat Modeling Vulnerability Analysis Exploitation Post Exploitation Reporting

Process Anatomy of an Attack - The 5Ps Probe Penetrate Persist Propagate Paralyze Official (ISC) 2 Guide to CSSLP - The 4Rs Reconnaissance – Enumeration & Discovery Resiliency Attestation – Attack & Exploitation Removal of Evidence (Cleanup) & Restoration Reporting & Recommendations 32 perspective defender’s perspective