Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.

Slides:



Advertisements
Similar presentations
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Advertisements

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
System Security Scanning and Discovery Chapter 14.
Information Networking Security and Assurance Lab National Chung Cheng University Network Security (I) 授課老師 : 鄭伯炤 Office: Dept. of Communication Rm #112.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Network Security Testing Techniques Presented By:- Sachin Vador.
1 Colorado University Guest Lecture: Vulnerability Assessment Chris Triolo Spring 2007.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Computer Security and Penetration Testing
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
1 Presentation ISS Security Scanner & Retina by Adnan Khairi
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Penetration Testing.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
ECE 578: COMPUTER NETWORK AND SECURITY
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Honeypot and Intrusion Detection System
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Module 14: Configuring Server Security Compliance
The Microsoft Baseline Security Analyzer A practical look….
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
DIYTP Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.
Information Systems Security Operations Security Domain #9.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Module 11: Designing Security for Network Perimeters.
Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
Footprinting and Scanning
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Enumeration March 2, 2010 MIS 4600 – MBA © Abdou Illia.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Filip Chytrý Everyone of you in here can help us improve online security....
SECURITY ANALYSIS TOOLS FOR INFORMATION MANAGEMENT Alicia Coon.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Outline Securing your system before the IDS and some tools to help you
Seminar On Ethical Hacking Submitted To: Submitted By:
ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Footprinting and Scanning
Secure Software Confidentiality Integrity Data Security Authentication
Securing A Wireless Network
Wireless Network Security
Wireless Hacking.
Footprinting and Scanning
Network hardening Chapter 14.
How hackers do it Ron Woerner Security Administrator CSG Systems, Inc.
Hacking Linux and MacOS
Presentation transcript:

Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003

Security Penetration Services  Goal: help organizations secure their systems  Skill set: equivalent to system administrators  Record keeping & ethics

Announced vs. Unannounced Penetration Testing  Announced testing  Pros Efficient Team oriented  Cons Holes may be fixed as discovered & block further penetration False sense of security  Unannounced testing  Pros Greater range of testing  Cons Response may block further penetration Requires strict escalation process Impact operations

Rules of Engagement  Type of attacks allowed (no DoS)  Off-limits machines & files (passwords)  Designated machines or networks  Test Plan  Contacts

Penetration Testing Phases  Footprint  Scanning/Probing  Enumeration  Gain Access  Escalate Privileges  Exploit  Cover Tracks  Create Backdoors

Footprinting  Profile target passively Address blocks Internet IP addresses Administrators  Techniques Googling Whois lookups

Scanning/Probing: nmap  Active probing  NMAP Port scanner  Discovers: Available Hosts Ports (services) OS & version Firewalls Packet filters

Scanning/Probing: nessus   Vulnerability scanning Common configuration errors Default configuration weaknesses Well-known vulnerabilities

Enumeration: hackbot  Identify accounts, files & resources  Ws.obit.nl/hackbot  Finds: CGI Services X connection check

Gaining Access: packet captures  Eavesdropping  Ethereal,

Physical Access  Boot loader & BIOS vulnerabilities  GRUB loader No password Allows hacker to boot into single- user w/root access  Password crackers John the Ripper Crack

Wireless Security  War driving with directional antenna  Wired Equivalent Privacy (WEP) vulnerabilities  Penetration Tools: WEPcrack AirSnort

Counter Measures1  Update latest patches.  Change default settings/options  Setup password and protect your password file.  Install anti-virus software and keep it updated.

Counter Measures2  Install only required softwares, open only required ports.  Maintain a good backup.  Set BIOS password, system loader password, or other passwords that necessary.  Have a good emergency plan.

Counter Measures3  Monitor your system if possible.  Have a good administrator.

Future Improvements  Correction of weaknesses uncovered by the penetration exercise  Automate and customize the penetration test process  Use of intrusion detection systems  Use of honeypots and honeynets

Demo: Retina Network Security Scanner  Created by eEye Digital Security, Retina Network Security Scanner is recognized as the #1 rated network vulnerability assessment scanner by Network World magazine.  Retina sets the standard in terms of speed, ease of use, reporting, non-intrusiveness and advanced vulnerability detection capabilities.  Retina incorporates the most comprehensive and up- to-date vulnerabilities database -- automatically downloaded at the beginning of every Retina session.

Bibliography  Klevinsky, et. al. Hack I.T.-Security Through Penetration Testing. ISBN  McClure, et. al. Hacking Exposed: Network Security Secrets and Solutions, 2nd edition, ISBN  Sage, Scott & Lear, Lt. Col. Tom. “A Penetration Analysis of UCCS Network Lab Machines,” March, UCCS course CS691c.  Warren Kruse, et. al. Computer Forensics. ISBN  Ed Skoudis, et. al. Counter Hack. ISBN  Lance Spitzner, et. al. Honeypots. ISBN  Retina network security scanner,