SlideShare a Scribd company logo
1 of 222
Download to read offline
Certified Ethical Hacking
Certified Ethical Hacking 
- Introduction 
- Footprinting and Reconnaissaince 
- Scanning Networks 
- Enumeration
Certified Ethical Hacking 
- System Hacking 
- Trojans Backdoors + 
- Viruses Worms + 
- Sniffer
Certified Ethical Hacking 
- Social Engineering 
- Denial of Sevices 
- Session hijacking 
- Hacking Web Servers 
- Hacking Web Apps
Certified Ethical Hacking 
- SQL Injection 
- Wireless Hacking 
- Evading IDS, Firewalls, Honeypots 
- Buffer Overflow 
- Cryptography 
- Pen Testing
Introduction - CEH 
- No legal advice 
• The legal framework is not very clear about what is actually lawful or not 
• Be authorized in advance by those in power. 
• Demonstrate and highlight how you can access the data without accessing it. 
• In Italy, use a document created with the help of Indemnity of Legal possibly 
- It may be illegal to make PenTest on propia network 
• No prior authorization 
• Access to sensitive data 
- Most are unsuccessful Hack 
- Expansive Exam
Introduction - CEH 
- Current Situation 
• News Suglia cyber attacks 
• Criminal activities 
- Anonymous Activities 
- Cyber Terrorism 
- Companies must necessarily have and implement security policies 
• Management of utilities 
• Access Management 
• Authentication and security levels 
• Delegation: rules for delegation 
• Authoritative sources of data
Introduction - CEH 
- Overview of legislation 
• Computer Misuse Act 1990 (UK) 
• CANspam Act (2003) 
- In Italy 
• Law 48/2008: European Convention on Cybercrime. 
• Law 196/2003 
• DPS (Document Security) 
• Measures of protection commissioner 27/11/2008 
• The Indemnity
Introduction - CEH 
- Terminology 
• Hacking 
• Hackers 
• Black Box Testing 
• White Box Testing 
• Gray Box Testing 
• Security 
• Vulnerability 
• Exploit / Proof of concept 
• Zero Day 
• Vulnerability Scan 
• Penetration Test
Introduction - CEH 
- Origin threats 
• Within the company 
a. Licensed physical access 
b. Logins via the network 
c. Directors 
d. Employees 
• Outside the company 
a. External Consultants 
b. External Collaborators 
c. Its affiliates, subsidiaries of company 
d. External maintenance, visitors, etc..
Introduction - CEH 
- Who is a Hacker? (1/2) 
• Black Hats / Crackers / Malicious 
Individuals with high computer skills used for malicious activity or destructive 
• White Hats / Ethical Hacker / pentester 
Individuals with expertise in the field of computer hacking who use their knowledge to improve the safety of the environment and are often identified with the term Security Analyst
Introduction - CEH 
- Who is a Hacker? (2/2) 
• Gray Hats 
Individuals with high computer skills used, as appropriate, both for business "offensive", and "defensive" 
• Suicide Hecker 
Individuals that use their computer skills to create inefficiencies in companies victims or critical infrastructure, not caring if possible iripercussioni of legal they face. 
• Hactvism / Script Kiddie / Phreak / Red Team
Introduction - CEH 
- How does a Hacker? (1/3) 
• Step 1: Patrol 
a. Research information about the victim 
b. Connections on a large scale for possible points of attack 
c. Looking for any information about customers, employees, networks, systems employed, etc.. 
• Step 2: Scanning 
a. Port Scan 
b. Networks scan 
c. Extract useful information on which versions and service
Introduction - CEH 
- How does a Hacker? (2/3) 
• Step 3: Obtain access 
a. Exploit 
b. Weak Password 
c. Buffer Overflow 
d. Denial of service 
• Step 2: Maintain access 
a. Keylogger 
b. Backdoor 
c. Rootkits 
d. Trojan / Worm
Introduction - CEH 
- Why do you need the Ethical hacking? 
• Vulnerability Testing and Security Audit does not ensure that our infrastructure is safe 
• Need to implement defense strategies taking advantage of targeted Pentest 
• The Ethical Hacking is necessary in order to anticipate the moves of any malicious people who would compromise our systems
Introduction - CEH 
- Benefits Ethical Hacking? 
• Risk Assessment 
• Auditing 
• Mitigate fraud 
• Best Practies 
• Good infrastructure management
Introduction - CEH 
- Benefits Ethical Hacking 
• Risk Assessment 
• Auditing 
• Mitigate fraud 
• Best Practies 
• Good infrastructure management 
- Disadvantages Ethical Hacking 
• Despite the intentions of companies in hiring external people to test their systems, does not guarantee that this leads to a positive contribution in raising the level of security of the company. 
• An Ethical Hacker can only help to understand the levels of security in place in the company. It will be the latter that must be put in place proper countermeasures
Introduction - CEH 
- What is an Ethical Hackers? 
• Sniffing out Vulenaribilità 
• Verify the effectiveness of the strategies implemented safety 
• Head found in any vulnerbilità systems and network 
• Test the ability to access sensitive data
Introduction - CEH 
- The triangle of safety, functionality, ease of use 
Safety 
Functionality Ease of use
Introduction - CEH 
Introduction Virtual Lab + Linux
Introduction - CEH 
Questions?
Footprinting and Reconnaissaince - CEH 
- Information gathering 
- Rating Size of attack 
- Exposure
Footprinting and Reconnaissaince - CEH 
- Information gathering 
• Search technical information 
a. Registered domains 
b. IP range used 
c. Services Provided 
• Additional Information 
a. IT administrators of groups, forums, etc.. 
b. Instruments used, and software versions 
c. Hardware devices and technologies
Footprinting and Reconnaissaince - CEH 
- Attack Surface 
• Discover the machines and services used 
• Discover any open wireless networks 
• Other types of network access: 
a. Waiting Rooms 
b. Chiosci 
c. Shared networks 
• Ability to use in the attack malware
Footprinting and Reconnaissaince - CEH 
- Exposure 
• Check for services found and the cars reach: 
a. Exploit for the optional field 
b. Potential for abuse services 
• Organize the information collected 
• Create a plan of attack 
a. An attack can 'be performed using more' weaknesses in a coordinated manner 
• Testing diving the posture (position) before the attack
Footprinting and Reconnaissaince - CEH 
- Footprinting 
• Delimit the scope of attack 
a. DNS / WHOIS 
b. Internic 
c. Physical location 
d. RF (Wi-Fi, Bluetooth) monitoring - WarDriving 
• Analysis Traceroute 
• Mirroring the site of the target company 
• Tracking email communications 
• Using Google Hacking 
• Nessus Scan 
• Nikto Scan
Footprinting and Reconnaissaince - CEH 
- Perimeter attack 
• Analysis of DNS records 
a. IP Assigned 
b. MX Record 
c. etc. .. 
• Sniffing out the company's website 
a. Public or restricted WebSite 
• Search information via search engines (eg google, bing, yahoo, etc..), Job sites, financial services, etc.. 
• Research staff on Social Networks, Chat services, etc.. 
• Physical location of the office
Footprinting and Reconnaissaince - CEH 
- Analysis Traceroute 
• Identification devices routers, firewalls, etc.. 
es. # traceroute 10.10.10.10 
traceroute to 10.10.10.10, 64 hops max, 52 byte packets 
1 10.10.10.1 (10.10.10.1) 1.427 ms 1.160 ms 0956 ms 
2 10.10.10.3 (10.10.10.3) 33,266 ms 34.849 ms 33,298 ms 
3 * * * * 
... 
• By correlating the information obtained it is possible to draw the network topology 
• Traceroute Tools 
a. VisualRoute Trace (http://viualroute.visualware.com) 
b. Visual IP Trace (http://www.visualiptrace.com) 
c. vTrace (http://vtrace.pl)
Footprinting and Reconnaissaince - CEH 
- Mirroring the corporate website 
• Create a copy of the entire site azinedale in order to obtain information on the structure as CSS, images, flash files, video, html code, etc.. 
• Website mirroring tools: 
a. Wget (http://www.gnu.org) 
b. BlackWidow (http://softbytelabs.com) 
c. WinWSD (http://winwsd.uw.hu) 
d. etc..
Footprinting and Reconnaissaince - CEH 
- Tracking email communications 
• The Tracking of Email is a valid method for monitor and spy on the emails sent to recipients 
a. When an email has been read or received 
b. Possibility to send email destructive 
c. Phishing attack 
d. Find the endpoints of e-mail communication 
e. Tracking of documents, etc. 
• E-mails Tracking tool: 
a. Trout (http://www.foundstone.com) 
b. 3d Visual Trace Route (http://www.3dsnmp.com) 
c. etc..
Footprinting and Reconnaissaince - CEH 
- Using Google Hacking (1/2) 
• What a hacker can do with the techniques of Google Hacking 
a. Find errors that contain sensitive information 
b. File containing password 
c. Warnings or safety vulenrabilità 
d. Pages containing the login form 
e. Pages containing data regarding the configuration or network vulnerabilities 
• Examples of some operators used for advanced searches of google: 
a. [Cache:] - shows the version of the site that is cached by google 
b. [Inurl:] - restricts the search of the given string only if present in the URL 
c. [Intitle:] - narrows the search to documents that contain the specified string in the title 
d. etc ...
Footprinting and Reconnaissaince - CEH 
- Using Google Hacking (2/2) 
• Google Hacking Tool: 
a. MetaGoofil (http://www.edge-security.com) 
b. SiteDigger (http://www.foundstone.com) 
c. Google Hacks (http://code.google.com) 
d. GMapCatcher (http://code. Google.com) 
e. Goolink Scanner (http://www.ghacks. Net) 
f. etc ...
Footprinting and Reconnaissaince - CEH 
- Nessus Scan 
• Nessus is a tool that allows of find and possibly identify the services exposed by a particular server 
Picture of nessus 
• Nessus Site (http://www.tenable.com/products/nessus)
Footprinting and Reconnaissaince - CEH 
- Nikto Scan 
• Nikto is a tool that allows of Identify a webserver and make crowling of the sites configured in it. 
• Nikto is in degrees also identify any known vulnerabilities present on that webserver on the basis of its own internal DB 
Picture of Nikto 
• Nikto Site (http://www.cirt.net/nikto2)
Footprinting and Reconnaissaince - CEH 
- Countermeasures Footprinting (1/2) 
• Secure destruction of documents 
• Configuring Router / IDS 
a. Reject any suspicious traffic 
b. Identify patterns of footprinting 
c. Close access to the ports that are not strictly necessary for the provision of the service and filter any unused protocols from their applications. 
• Configure the web server so that it does not provide useful information 
• Perform tests to verify footprinting countermeasures
Footprinting and Reconnaissaince - CEH 
- Countermeasures Footprinting (2/2) 
• Removal of any sensitive data on the DMZ 
• Prevention of spider and loading of copies cache (robots.txt) 
• Split - DNS 
• Honeypot
Footprinting and Reconnaissaince - CEH 
Questions?
Scanning - CEH 
- CEH scanning methodology 
- Types of Scan 
- Firewalking 
- 3 way handshake 
- Closing Sessions 
- Scanning techniques 
- War Dialing 
- Scan tool
Scanning - CEH 
- CEH scanning methodology 
1) Check the Live systems 
2) Check open ports on the system 
3) Identify the types of services and versions 
4) Vulnerability Scanning 
5) Design diagram network 
6) Using Proxy
Scanning - CEH 
- Types of Scan 
• Network scanning 
a. ICMP scanning 
b. Ping Sweep scanning 
• Port scanning 
a. Check open ports on a system 
• Vulnerability scaning 
a. Identification of services 
b. Identifying versions of applications 
c. Identification Applications
Scanning - CEH 
- Firewalking 
• Identifies the ACL (Access Control Lists) configured on the Firewall 
• It uses the TTL (Time To Live) of a package to find "hop" 
• Forwarding packets to the open services 
a. Icmp_time_exceded 
b. Drop Package 
• It is not necessary to reach the destination
3-way handshake 
Scanning - CEH 
- 3 way handshake 
Computer Computer 
A B 
SYN = 1, SEQ # 10 
SYN = 1, ACK = 1 ACK # 11 
ACK = 1, SEQ # 11 
Time Time
Scanning - CEH 
- Chiusira sessions 
Computer Computer Computer Computer 
A B A B 
FYN, ACK 
RTD 
FIN ACK, ACK 
ACK 
Time Time
Scanning - CEH 
- Scanning techniques 
• TCP Connect Scan 
• Stealth Scan 
• XMAS Scan 
• SYN / ACK / FIN Scan 
• NULL Scan 
• IDLE Scan 
• UDP Scan
Scanning - CEH 
- TCP Connect Scan 
• Indicates whether the port is open only after completing three way handshake 
- Sequence packages: 
SYN 
SYN, ACK, ACK, RST 
• TCP Connect scan uses a RST packet to terminate the communication
Scanning - CEH 
- Stealth Scan 
• Used to bypass firewall rules, logging mechanisms or hide their activities as normal traffic 
SYN 
SYN SYN, ACK 
RTD RTD 
Open Door Closed Door
Scanning - CEH 
- XMAS Scan 
• forge a packet with the URG, ACK, RST, SYN and FYN settati 
• The FIN flag works only for systems that have implemented the TCP stack according to RFC 793 
• Often does not work for some systems Microsoft Windows 
FIN, URG, PUSH FIN, URG, PUSH 
None RTD 
reply 
Open Door Closed Door
Scanning - CEH 
- NULL Scan 
• The FIN flag works only for systems that have implemented the TCP stack according to RFC 793 
• Often does not work for some systems Microsoft Windows 
No Flags settati No Flags settati 
None RST, ACK 
reply 
Open Door Closed Door
Scanning - CEH 
- FIN Scan 
• Send packets with the FIN flag set 
• The FIN flag works only for systems that have implemented the TCP stack according to RFC 793 
• Often does not work for some systems Microsoft Windows 
FIN FIN 
None RST, ACK 
reply 
Open Door Closed Door
Scanning - CEH 
- Idle Scan 
• To verify an open door just send a SYN packet 
• The target responds with SYN, ACK, RST if it is open or closed if 
• A PC receives a response to SYN, ACK, it did not send any request will respond with RST 
• Each RTD is not required ignored 
• Each packet on the network contains a number of "fragment identification" (IPID) 
• The Idle scan + is a scanning technique that spoofed packets are sent to check the status of the ports on a target.
Scanning - CEH 
- Idle Scan: Step 1 
• Send SYN, ACK to Zombie PC to check on the IPID 
• Each packet on the network has its own IP ID, consisting of 4 digits and is incremented each time a PC sends a packet 
• The PC Zombie not expecting the SYN, ACK, it responds with an RST by adding your own 
IPID probe package SYN, ACK
Zombie 
Scanning - CEH 
- Idle Scan: Step 2.1 Open Door 
• Send SYN to port 80 for example of the target with spoofed ip of Zoombie 
Striker SYN on port 80 IP = Zoombie 
Target SYN, ACK Open Door 
RTD IPID = xxxx +1
Scanning - CEH 
- Idle Scan: Step 2.2 port Close 
• If the door is closed, the target will send a RST packet to the zombie who will not follow response. 
Striker SYN on port 80 IP = Zoombie 
Target 
RTD 
Zombie
Scanning - CEH 
- Idle Scan: Step 3 
• The attacker sends a request to the zombie 
• If the IPID is incremented by one stage the door is open, otherwise not 
SYN, ACK 
Striker Zombie 
RTD IPID = xxxx +2
Scanning - CEH 
- SYN / FYN IP Fragments Scan: 
• Is not a method different from the previous scan 
• Involves sending fragmented packets with the TCP header so that any systems "Packet filtering" fail to intercept 
- ACK Scan: 
• The attacker sends packets with the ACK flag active and random number sequences 
• No response means that the port is filtered 
• RST packet response indicates that the port is not filtered
Scanning - CEH 
- UDP Scan: 
• For the UDP port scan is not required 3 way TCP handshake 
• When a packet is sent to a port in the state Open, the target system does not send any return package 
• If a UDP request is sent to a port in a state close, the target system risposnde with an ICMP port unreachable message 
• Spyware, Trojan horses and other malicious applications using the UDP port to propagate between systems
Scanning - CEH 
- War-Dialing 
• One of the attack techniques used in the past (Mitnick) 
• Was to call a range of phone numbers looking for an EndPoint that responds to initiate a connection. 
• Often automated 
a. They use the range of random numbers 
• The response by an EndPoint, often detects the presence of an access of "emergency" reserved for system administrators
Scanning - CEH 
- Scan tool 
• Nmap (http://nmap.org/) 
• Nesus (http://www.tenable.com/products/nessus) 
• OpenVAS (http://www.openvas.org/) 
• Hping (http://www.hping.org/) 
• Netcat (http://netcat.sourceforge.net/) 
• SuperScan (http://www.foundstone.com) 
• Free Port Scanner (http://www.nsauditor.com) 
• THC-Scan (http://freeworld.thc.org) 
• iWar (http://www.softwink.com)
Scanning - CEH 
Questions?
Enumeration - CEH 
- Enumeration 
- Tecnihce enumeration 
- NetBIOS Enumaration 
- Enumerating User Account 
- SNMP Enumeration 
- Unix / Linux Enumeration 
- SMTP Enumeration
Enumeration - CEH 
- What is an enumeration? 
• By enumerating the process of extracting username, machine name, network resources, shared resources and services of a system 
• Enumeration techniques are applied in an intranet environment or for more '
Enumeration - CEH 
- Enumeration techniques 
• Remove users from the email ID 
• Pull user names through the SNMP service 
• Remove groups from Windows macchien 
• Extracting data using the Default Password 
• Brute forcing Active Directory 
• Extract information using DNS Zone Transfer
Enumeration - CEH 
- NetBIOS Enumeration 
• An attacker exploits the enumeration of NetBIOS 
a. The list of computers that belong to a domain 
b. The list of the Share network that exposes single host on the network 
c. Policies 
d. Password
Enumeration - CEH 
- Enumeration systems using default password 
• Apparatus as HUB, switches, routers, are often used with the default password 
• An attacker can 'get access and the information contained in these systems using default credentials 
• Default Password Site (http:// www.defaultpassword.com)
Enumeration - CEH 
- SNMP Enumeration 
• The SNMP (Simple Network Management Protocol) is a protocol used to monitor and maintain hosts, routers, and in general any device on the network that supports 
• An attacker uses the SNMP enumeration to extract information about the resources of the network devices 
• The SNMP consists of a manager and an agent; the agent is directly integrated in the apparatus and the manager is usually an installed system apart and dedicated. 
• The default string is used to monitor and read access to the information is "public", while maintaining and write access is "private" 
• The technique uses SNMP enumeration of these strings to extract useful information on the equipment
Enumeration - CEH 
- Unix / Linux enumeration 
• For Unix / Linux, there are several commands to enumarare resources on the network 
a. Showmount: provides a list of the share exposed by the system 
b. Finger: the possibility to enumerate users and hosts, providing detailed information such as home directories, etc.. 
c. Rpcclient: Provides a list of users on Linux and OS X 
d. Rpcinfo: helps to enumerate RPC (Remote Procedure Call) protocol. RPC protocol allows communication via network applications.
Enumeration - CEH 
- SMTP Enumration 
• Service that enables iterating through the direct command "Telnet" 
• Allows enumeration of users through the normal commands available 
a. VRFY / EXPN 
b. RCPT TO
Enumeration - CEH 
- User Account Enumeration 
• You can 'try to get through interrgoazione anonymous LDAP Server 
• On Windows systems using the SID (Security Identifier) 
a. Null Session 
b. SID to User
Enumeration - CEH 
Questions?
System Hacking - CEH 
- Password Cracking / Attack 
- Privileges Escalation 
- Running programs Spyware / Keylogger / rootkits 
- NTFS Data Stream 
- Steganography 
- Covering the tracks
System Hacking - CEH 
- Password Cracking / Attack 
• Password Cracking Techniques are used to recover the password of a given system 
• Attackers use this type of techniques to obtain unauthorized access to vulnerable systems 
• The use of this type of techniques work for the simplicity of the passwords used by the users
System Hacking - CEH 
- Password Cracking Techniques 
• Dictionary attack 
a. Use a file containing common passwords 
• Brute force attack (Brute Forcing Attack) 
a. Combination of numbers and characters until the password 
• Attack Hybrid (Hybrid Attack) 
a. All'ìattacco similar to the dictionary, adds numbers and letters to the words used in the dictionary 
• Attack syllable (Syllable Attack) 
a. Combine the dictionary attack and brute Forzza 
• Attack du based rules (Rule-Based Attack) 
a. It is based on information that the attacker has previously found regarding the password (Business Policy, the amount of special characters, etc.)
System Hacking - CEH 
- Types of attack on Password 
• Passive Online Attack 
• Attack Active Online 
• Attack Offline 
• Attack is not computerized
System Hacking - CEH 
- Passive Online Attack 
• Sniffing the network 
• MIM (Man in the Middle) 
• Replay
System Hacking - CEH 
- Attack Active Online 
• Predictability of passwords 
• Trojan / Spyware / Keylogger 
• Hash injection
System Hacking 
- Attack Offline 
• Precalculated hash 
• Rainbow tables 
• Distributed networks 
- 
CEH
System Hacking - CEH 
- Attack is not computerized 
• Spying on behind those who are typing password (Shoulder Surfing) 
• Social Engneering 
• Rummage in garbage (dumpster diving)
System Hacking - CEH 
- Privileges Escalation 
• Exploits vulnerabilities in the operating system 
• Vunlnerabilità software 
• Errors in programming 
a. Data buffer overflow 
b. No distinction between data and code executive 
c. Failure to check user input Etc. .. 
• Often used with Exploit shellcode
System Hacking - CEH 
- Spyware 
• Program that records user actions that are performed on your computer and surfing the Internet without the user knowing anything 
a. It hides its process 
b. It hides their files, and other objects 
c. Difficult to remove 
• Methods of propagation 
a. Masquerading as anti-spyware 
b. Downloaded from the internet 
c. Exploit vulenrabilità browser 
d. Add-on fictitious 
e. Software installations containing macros specifically designed
System Hacking - CEH 
- Keylogger (Keystroke Logger) 
• Software or hardware components that allow the recording of what the user types on the keyboard 
• All the recorded will be saved in a file and sent to a remote destination 
• The Keylogger meddle in the communication between the keyboard and the operating system 
• Some companies use this type equipment or software to monitor their employees, as well as for a more home for the purpose of monitoring children or whatever.
System Hacking - CEH 
- RootKit 
• These are programs that reside at the kernel level to hide themselves and cover the tracks of their attivià 
• Replace specific routines or operating system components with modified versions of the ad hoc 
• The RootKit allow an attacker to maintain access to the system path
System Hacking - CEH 
- Types RootKit (1/2) 
• Hardware / Firmware 
• He hides in physical devices or firmware updates that do not check code integrity 
• Hypervisor level 
• Change the boot sequence so as to put himself before the operating system virtual 
• Boot Loader level 
• Replaces the original boot with one controlled by a remote attacker
System Hacking - CEH 
- Types RootKit (1/2) 
• Kernel level 
Replaces or adds malicious code parts of the kernel of the operating system or device 
• Library level 
Replaces the libraries of the operating system in order to obfuscate the information of the attacker 
• Application level 
Replaces the executives of regular applications with Trojans or malicious pieces of code
System Hacking - CEH 
- Types RootKit (2/2) 
• Kernel level 
Replaces or adds malicious code parts of the kernel of the operating system or device 
• Library level 
Replaces the libraries of the operating system in order to obfuscate the information of the attacker 
• Application level 
Replaces the executives of regular applications with Trojans or malicious pieces of code
System Hacking - CEH 
- NTFS Data Stream 
• NTFS Alternative Data Streams (ADS) is a system of hidden flow of information in windows which contains the metadata of a file (attributes, word count, author name, etc ... 
• ADS is the system that allows you to add attributes to the file without changing its functionality or how they appear in the file manager 
• ADS can be exploited by an attacker to inject code into a corrupt system and execute commands without being detected by the user
System Hacking - CEH 
- Steganography (1/2) 
• The shorthand is the technique of hiding secret messages and extract the same joints at the destination while maintaining the confidentiality of the message 
• Utilizziare graphic images as a cover to hide data, coordinates, secret plans is one of the most widely used methods 
• There are several free programs that allow the use of the techniques stenogragrafiche
System Hacking - CEH 
- Steganography (2/2) 
• Example with ImageHide (http://www.dancemammal.com/ imagehide.htm)
history and temporary files 
System Hacking - CEH 
- Covering the tracks 
• Remove all WEB activities such as MRU (Most Recently Used), cookies, cache, 
• Disable auditing systems 
• Edit the log file, do not delete! 
a. Operating System 
b. Applications 
c. Access to DB 
d. Administrative 
e. UTMP / lastlog / WTMP 
• Close all connections to the target machine 
a. Use tools or alter files to obfuscate its presence 
b. Windows Watcher, Tracks Eraser Pro Evidence Eliminator, etc. 
• Close all possible ports used, apply patches to the system, to prevent others from entering Hacker
System Hacking - CEH 
Questions?
Trojans Backdoors + - 
- What is a Trojan? 
• It 'a program containing malicious code within itself, that allows you to take control and cause damage to the system 
• With the help of a Trojan attacker is able to gain access to the password registered on the system, but in general what is all this about it as personal documents, deleted files, images, messages, etc..
Trojans Backdoors + - 
- What is the purpose of a Trojan? 
• Steal information important, which password secret codes, informaizoni on credit cards, bank details, etc. 
• Registration of activities on the PC victim 
• Modify or replace operating system files 
• DOS Attack 
• Download spyware, keyloggers 
• Disable protection systems, anti-virus, anti-spyware, etc. 
• Use your PC victim to propagate the infection of Trojan
Trojans Backdoors + - 
- Against which method to infect a system used by a Trojan? 
1. Create a package modified by using a Trojan Horse Constructor Kit 
2. Create the procedure ("droppers") that will be the heart of the Trojan and execute malicious code on the target system 
3. Create a container ("wrapper") through the tool containing the Trojan, which will be used to install everything on the victim's PC 
4. Propagate the Trojan 
5. Run the dropper 
6. Perform routine harmful
Trojans Backdoors + - 
- Ways by which a Trojan is able to infect a system 
• Software packages created by employees not satisfied 
• Fake programs (AV pop-ups, rogue security) 
• Files downloaded from the internet (games, music, screen savers, etc.) 
• Systems messaging (IM, IRC, AOL, etc.) 
• Sugeriti links or attachments provided in the e-mail address 
• File Sharing 
• Vulnerability of browsers or mail clients used 
• Physical access to the PC
Trojans Backdoors + - 
- As a Trojan virus evades controls 
• Subdivide the code of Trojan in small parts separate and tablets 
• Change the content, the checksum and encrypt the code of the Trojan using hex editor 
• Do not use Trojan downloaded directly from the internet 
• Use different types of common extensions to convert the esegutivo of Torjan
Trojans Backdoors + - 
- Some types of Trojans 
• Command Shell Trojan 
• Covert Channel Trojan 
• Botnet Trojan 
• Proxy Server Trojan 
• Remote Access Trojan (backdoor) 
• E-Mail Trojan 
• FTP Trojans 
• E-Bancking Trojan 
• Mobile Trojan 
• Spam Trojan 
• MAC OSX Trojan 
• etc ...
Trojans Backdoors + - 
- Methods for detecting the presence of Trojans within a system compromise 
• Scanning open ports 
• Scan active processes 
• Scan of the drivers installed 
• Scan Windows Services 
• Scanning of the programs that start at boot 
• Scan for suspicious files or cartelel 
• Monitoring network activity 
• Scan of any file of system operating last modified 
• Using Trojan Scanner
Viruses Worms + - CEH 
- What is a Virus? 
• It ' a program self-replicating that modification the inserting its code in other executive programs 
• Some Virus infect the computer a time performed the program that contains 
• Other forms of Virus riamangono Dormant as long as a triggering event makes them active
Viruses Worms + - CEH 
- Why are created Virus? 
• Damage to society competitors 
• Financial Benefits 
• Progietto to research climate 
• How fun 
• Acts of vandalism 
• Cyber terrorism 
• For the distribution of political messages
Viruses Worms + - CEH 
- How can a virus infect a computer? 
• The DB of the tracks viragli the antivirus is not updated 
• Plugin outdated versions of installed 
• By installing pirated software or crackkato 
• Opening infected e-mails 
• When a user downloads files without verifying the source
Viruses Worms + - CEH 
- Some examples of Type Virus 
• System or Boot Sector Virus 
• File Virus 
• Cluster Virus 
• Multipart Virus 
• Macro Virus 
• Encryption Virus 
• Polymorphic Virus 
• Shell Virus 
• Tunneling Virus
Viruses Worms + - CEH 
- What is a Worm? 
• It 'a malicious program that can replicate, run and propagate itself through the network without internvento of a human being 
• Most Worm created are able to replicate and spread to the network in order to consume computing resources 
• Acluni Worm may contain code that can harm the infected ssitema 
• The attackers use to install Backdoor Worm on infected systems in such a way as to create zombies or botnets. Botnets are used for future cyber attack
Viruses Worms + - CEH 
- How to avoid infections Worm and Virus 
• Install an Antivirus and keep updated LDB of the tracks 
• Aggionrare steadily the systems with the Latest Patch of available safety 
• Pay particular attention to files or programs downloaded from the Internet 
• Avoid of perform attachments of e-mail the which sender not is known 
• Always keep backup of the data so that you can restore in case of infection 
• Regularly scan your PC 
• Do not use administrative accounts 
• Using programs that control connections (personal firewalls, etc.) 
• Use programs such as tripware, sigverif, widnows file protection
Viruses Worms + - CEH 
Questions?
Sniffer - CEH 
- ARP 
- Using the sniffing 
- Techniques sniffing 
- Sniffing active 
- Countermeasures
Sniffer - CEH 
- ARP 
• It 'a network protocol, whose task is to provide a mapping between IP address and MAC address in the Ethernet network, a PC 
• Specifc according to RFC 826 
• ARP tables 
• System requst ARP / ARP Reply
Sniffer - CEH 
- Using the sniffing 
• To identify the elements of a network 
a. Router 
b. DNS Server 
c. Addressing type used 
d. Network equipment 
• Get MAC address and IP address of a computer on the network 
• Obtaining sensitive data 
a. Credentials traveling on criptatti channels (HTTP, FTP) 
b. Confidential documents 
c. Password hashes 
d. Etc.
Sniffer - CEH 
- Techniques sniffing 
• Passive Sniffing 
a. Applicable only in a network where there are "HUB" 
b. Is to monitor the number of packets traveling over the network 
c. HUB obsolete today 
• Active Sniffing 
a. A technique used on networks where there are "Switch" 
b. Consists of injecting packets (ARP) to the network that generates requests
Sniffer - CEH 
- Sniffing active (1/3) 
• It is used where it is not possible to passive listening of the network, the presence of Switch 
• Fictitious involves injecting packets in the network in order to divert traffic to the attacker 
• Exploits the weaknesses of the ARP protocol 
• And 'lawful if used for monitoring or control of the network 
a. SPAN Port: Reserved for duplication of traffic in the switch 
b. Monitoring Port 
c. Port Mirroring
Sniffer - CEH 
- Sniffing active (2/3) 
• ARP Spoofing (Poison) 
a. Inject ARP Reply modified (e.s. Gateway MAC) 
b. It requires consistency and frequency 
c. Easily identifiable 
d. Easy to prevent enabling the "port security" on the equipment 
• MAC duplication 
a. Substitute your own MAC address with that of the target machine
Sniffer - CEH 
- Sniffing active (3/3) 
• MAC Flooding 
a. Generate a quantity of elevta Spoofed ARP reply 
b. Saturates the memory and the ability to refresh the switches 
c. Turn the switch in the HUB 
• Attack in the DHCP 
a. IP is sending requests to the DHCP server in order to saturate the available addressing 
b. And 'considered a DoS (Denial of Service)
Sniffer - CEH 
- Countermeasures 
• Enable port security on the switches available 
a. Prevents the presence of duplication of MAC addresses 
b. Maintains mapping of MAC addresses and the ports to which they are connected 
• Using IDS (Intrusion Detection System) 
a. Allow the immediate detection of MAC Flood, MAC Duplicates, high amounts of ARP traffic 
• Use static ARP tables 
• Enable the DHCP Snooping 
a. Prevents attcchi DHCP
Sniffer - CEH 
- Some useful programs 
• ARP attacks 
a. Ettercap (http://ettercap.github.io/ettercap/) 
b. Cain & Abel (http://www.oxid.it/cain.html) 
c. SMAC (http://www.klcconsulting.net/smac-cl/) 
• Sniffing tools 
a. TCP Dump (http://www.tcpdump.org/) 
b. Wireshark (http://www.wireshark.org/) 
c. Dsniff (http://www.monkey.org/ dugsong ~ / dsniff /) 
d. Aircrack-ng (http://www.aircrack-ng.org/doku.php?id=airodump-ng)
Sniffer - CEH 
Questions?
Social Engineering - CEH 
- Social Engineering 
• The "Social Engineering" is the art of fooling people into revealing confidential information 
• This kind of technique has the strength of the value unaware that cover the information in the possession of people and the lack of care in keeping this information confidential
Social Engineering - CEH 
- Victims of such attacks Social Engineering 
• Secretaries or help desk personnel 
• Users or customers of the company 
• Suppliers company 
• System Administrators 
• Technical support staff
Social Engineering - CEH 
- Phases of an attack type of Social Engineering 
a. Search information on the company target 
• Dumpster diving 
• Website 
• Information about the employee 
• Inspections to the premises of the company 
• etc. 
b. Select a victim 
• Identifying such as a disgruntled employee 
c. Develop relationship with the victim 
• Begin a relationship with / the employee selected as a victim 
d. Exploit the relationship 
• Get information such as user names, financial information, technologies used, etc..
Social Engineering - CEH 
- Techniques of Social Engineering (1/2) 
• Human-based 
a. Dumpster Diving (Research in the trash) 
b. Featuring a user attempts to crystallize 
c. Presenting itself as a company VIP 
d. By posing as a technical support person 
e. Interception of telephone conversations 
f. Spy on people behind (Shoulder Surfing) 
g. Entering the sly 
h. Presenting himself as a third party 
i. etc ...
Social Engineering - CEH 
- Techniques of Social Engineering (2/2) 
• Computer-based 
a. Using pop-up windows that appear during navigation (gifts, sweepstakes millionaire, etc.). 
b. Through letters buffaloes (Hoax) 
c. Through chain letters 
d. Chat via message (dates of birth, names bachelors / bachelorettes, household names, etc.) 
e. Via email Spam 
f. Phishing 
g. Sending fake SMS requesting banking information
Social Engineering - CEH 
- Countermeasures 
• Adopt corporate policies of behavior clear and enforce them 
• Enhance the physical security 
• Train staff to respond to such threats 
• Implement control measures and verification of the same constants 
• Draw the possible recipients and dangerous content of the e-mail
Social Engineering - CEH 
Questions?
Denial of Sevices - CEH 
- What is a Denial of Service? 
• Denial of Service (DoS) attack is an attack on a computer or a computer network designed to inhibit the normal delivery of services available 
• In a DoS attack the attacker floods the victim richeiste the system up to the saturation of the available resources
Denial of Sevices - CEH 
- Techniques DoS attack 
• Ping of Death (ICMP Flood) 
a. Submit a large number of ICMP requests 
b. It affects the saturation of available memory 
c. The modern OS have a system of prevention Ping of Death 
• SYN Flood 
a. Exploits the normal operation of the 3 way Handshakiing 
b. Saturate the available memory 
c. Leave hung connections for up to 75 seconds
Denial of Sevices - CEH 
- Why use DoS attack 
• Vandalism 
• As a method monitivo or activist 
• As anti-tracking method (Mitnick, Shimomura)
Denial of Sevices 
- Joint programs DoS 
• Trinity - IRC DDOS 
• r-u-dead-yet (Rudy) - HTTP POST DDOS 
• Tribe - Network flood 
• Slowloris - HTTP DoS 
• Low Orbit Ion Cannon (LOIC) - DoS tool 
- 
CEH
Denial of Sevices - CEH 
Questions?
Session hijacking - CEH 
- What is Session Hijacking? 
• With the Session Hijacking refers to the exploitation and compromise of a valid session between two computers 
• An attacker steals a valid session ID to gain access to the system and the dti contained in it 
• With TCP Session Hijacking is meant when an attacker takes control of a TCP session between two computers
Session hijacking - CEH 
- Types of Session Hijacking? 
• Enable 
a. Is to replace the host to which it was unearthed session 
• Passive 
a. Is to turn the traffic through the attacker who merely observe and record 
• Hybrid 
a. Similar to the passive less than find important information
Session hijacking - CEH 
- Key Techniques Session Hijacking 
• Brute forcing 
a. An attacker tries different valid session ID 
• Stealing 
a. An attacker uses different techniques to steal session IDs valid 
• Caluclating 
a. An attacker tries to calculate the value of a valid session ID
Session hijacking - CEH 
- Brute Forcing 
• Try to indivduare the session Id in the clear (no SSL) 
• Try to identify multiple sessions of valid ID 
• Sessions that do not have expiration times 
• Accounts that do not have the credentials Lokout
Session hijacking - CEH 
- Man in the Middle 
• Based on Sniffing traffic 
• Since the ability to add packages to an existing session 
• It can be used to change the sequence number for groped to maintain the active user session for the purpose of inettare malicious code 
• you can change the payload of the packets sent by adding
Session hijacking - CEH 
- Session Fixation 
• The attacker determines the session ID 
• In the case of log already made attempts to keep the session active 
• Phishing exploits techniques to send the session ID of the user 
• Once authenticated attacker is able to access the target user's data
Session hijacking - CEH 
- What are the advantages of Session Hijacking 
• Access to the server as an authenticated user 
• Often the access remains hidden 
a. Keeping a session ID exists, replacing the orignal client 
b. The Hijacking is difficult to trace 
c. The credentials are valid 
• The nature of the TCP Session from the possibility of continuous access 
• No need to re-authenticate or alteration of the security package
Session hijacking - CEH 
- Programs for Hijacking 
• Hamster / Ferret 
• Firesheep 
• Ettercap 
• Juggernaut 
• Hunt 
• T-Sight 
• Metasploit 
• SSL Strip
Session hijacking - CEH 
- Countermeasures 
• Be used wherever possible communications on secure channels (SSL) 
• Cookie exchange through encrypted channels (HTTPS) 
• Implement systems for deauthenticate Logout user sessions 
• Use session ID generated only after Authorized Access 
• Use sequences of random numbers and letters for the generation of session keys 
• Use only encrypted data is exchanged between the user and webserver
Session hijacking - CEH 
Questions?
Hacking Web Servers - CEH 
- Suppliers Webserver current 
• Apache 
• Microsoft IIS 
• Lighttpd 
• Google 
• Nginx
Hacking Web Servers - CEH 
- Architecture of a WebServer 
• Communication ports and protocols used 
a. HTTP (Hypertext Transfer Protocol) Port 80 
b. HTTPS (Hyper-Text Transfer Protocol over Secure Socket Layer) Port 443 
• Manages requests received from clients with various methods 
a. GET 
b. POST 
c. TRACE 
• Potentially vulnerable 
a. GET / POST malformed 
b. SQL Injection 
c. Configuration Errors 
d. Etc. ..
Hacking Web Servers - CEH 
- Impact of attacks on WebServer 
• Compromise of user accounts 
• Tampering with data managed 
• As a bridge to other web attacks 
• Abduction of information 
• Administrative access to the server or other applications 
• Site managed defacement
Hacking Web Servers - CEH 
- Some types of attack on the WebServer 
• Configuration errors WebServer 
a. Administrative capabilities enabled 
b. Error messages or debug information-rich 
c. Backup, old copies of configuration files, scripts 
d. Anonymous user test with password or easily ascertainable enabled 
e. Etc. ..
Hacking Web Servers - CEH 
- Some types of attack on the WebServer 
• Directory Traversal 
a. Access to confidential directory of the system 
b. Running external commands to the WebServer 
c. Access to confidential information 
d. Use UNICODE encoding to mask requests
Hacking Web Servers - CEH 
- Some types of attack on the WebServer 
• Tampering with the parameters of the request (URL) 
a. Changing the parameters exchanged between client and serves 
b. Example: http://www.example.com/sample? a = 1234 & b = 456 & admin = 1 
• URL Obfuscation 
a. UNICODE encoding, Binary, Decimal, etc ...
Hacking Web Servers - CEH 
- Some types of attack on the WebServer 
• Source Code Analysis 
a. Discovery of DIrectory sensitive, any servers or services 
b. Users and Passwords 
c. ID preconfigured sessions or defualt 
• Password 
a. Brute Force Attack 
b. Dictionary attack 
c. Attack hybrid 
d. Simple passwords
Hacking Web Servers - CEH 
- Meotodologia to attack the WebServer (1/2) 
• Collection information 
a. Collection of information about the target company 
b. Search news groups, forums, etc. 
c. Whois, Traceroute, etc. structure systems victim 
• Identification of the type of WebServer 
a. Type of server, operating system, etc ... 
• Copy of the structure of Website 
a. Create a copy of the site structure 
b. Find useful comments within the code
Hacking Web Servers - CEH 
- Meotodologia to attack the WebServer (2/2) 
• Scanning for known vulnerabilities 
a. Identify any weaknesses in the system 
b. HP WebInspect, Nessus, etc ... 
• Session Hijacking 
a. Sniffing valid session ID for unauthorized access 
b. Burp Suite, Paros Proxy, Hamster, FireSheep 
• Hacking Passwords used by the WebServer 
a. Groped to find passwords with various techniques useful 
b. Brutus, THC-Hydra, etc ...
Hacking Web Servers - CEH 
- Countermeasures 
• Regular scanning and patch systems 
• Apply any update provided by the manufacturers of the software 
• Ensure that all systems have the same versions of Service Pack, Hotfixes and Security Patches 
• Provide a plan for disaster recovery and backup systems in the event of a recovery is required
Hacking Web Servers - CEH 
Questions?
Hacking Web Apps - CEH 
- Defining a Web Application 
• It 'a communication interface between the user and the Web Server consists of several server-generated pages that contain the same scripts or commands to be executed dynamically dul Browser User 
• Businesses rely on web applications, but in general on web technology as a key support for business processes and improvements of the same
Hacking Web Apps - CEH 
- Components of a Web App 
• The Web Server 
• The application Content 
• Data Access
User 
Web Server 
OS Command 
Hacking Web Apps - CEH 
- Funionamento a Web App 
User request 
Output DBMS 
Web Application 
... 
... 
... 
...
Hacking Web Apps - CEH 
- Types of attacks Web App (1/2) 
• SQL Injection 
a. The most common attacks and the more functional 
b. Sfruttta input modules present in web pages 
c. Forca login requests to obtain valid credentials 
d. interface to the DB (alter, insert, delete table) 
• Automated tools 
a. SQL Map 
b. SQL Ninja 
c. Havis 
d. Etc. ..
Hacking Web Apps - CEH 
- Types of attacks Web App (2/2) 
• Cross Site Scripting (XSS) 
a. Forces the execution of the script actions not foreseen 
b. Executing commands or software installation 
c. Based on an incorrect handling by the application of user input 
d. The tag for excellence to indicate an XSS "<script>" 
• Cross Site Request Forgery (CSRF) 
a. Force the user's browser to send malicious requests without the control of the latter 
b. The victim uses a valid active session on a site "Trusted" while visiting a malicious site, which injects a malformed HTTP request that is turned over to the main site and carried out in a lawful manner
Hacking Web Apps - CEH 
- Methodology for attack on a Web App 
• Get a scheme infrastructure WEB 
• Attack on Web Servers 
• Analysis of the Web 
• Attempting to bypass authentication mechanisms 
• Attempting to bypass the authorization mechanisms 
• Attack of the session control mechanisms 
• Attempted injection of packets 
• Attack of the possible client Web App 
• Attack Web services used by the application
Hacking Web Apps - CEH 
- Web Application Firewall (WAF) 
• Firewall with Advanced Features 
• Specializing in defending web applications 
• It allows the analysis of the HTTP / HTTPS traffic to intercept and possibly dangerous lock requests 
• It allows you to block SQL injection attacks, buffer overflows, XSS, etc.
Hacking Web Apps - CEH 
Questions?
SQL Injection - CEH 
- What is SQL Injection? 
• SQL injection is a technique that exploits the wrong part of the application from user input validation WEB, to execute SQL commands on the DB BackEnd 
• The SQL Injection is an attack aimed at obtaining unauthorized access to the DataBase or the information contained in it
SQL Injection - CEH 
- Types of SQL Injection attack 
• Bypass Authentication Methods 
• Disclosure of sensitive information 
• Compromised the integrity of the data managed 
• Impairment of the availability of data managed 
• Run remote commands
SQL Injection - CEH 
- Meotdi detecting SQL Injection 
a. Check to see if the web application accesses the DB server 
b. Enumerate POSSIBLE INPT user exploitable to execute sql commands 
c. Simulate the insertion of code into user input fields 
d. Simulate entering numbers in the fields reserved for strings 
e. The operator UNION is used in techniques of SQL Injection to concatenate SQL statements 
f. Check the level of information content within error messages
SQL Injection - CEH 
- Types of SQL Injection 
a. Simple SQL Injection 
• SQL Union 
• SQL Error 
b. Blind Injection
SQL Injection - CEH 
- Simple SQL Injection Attacks 
• Store System procedures 
a. Attacks are based on the use of "store procedures" already in the DB 
b. UNION Query 
SELECT name, phone, address FROM Users WHERE ID = 1 UNION ALL SELECT CreditCardNumber, 1, 1, from creditcardtable 
c. Tautology (true by definition Affirmation) 
SELECT * FROM user WHERE name = ' 'OR '1' = '1 '; 
d. Commenting on the end of the line 
SELECT * FROM user WHERE name = 'x' AND userid IS NULL; - '; 
e. Understanding the structure of the DB via requests with parameters that are not allowed
SQL Injection - CEH 
- Blind SQL Injection 
• It 'a technique used when the Web application is subject to SQL injection but but the answers are not visible to the attacker 
• the Blind SQL Injection exploit the same philosophy of normal SQL Injection except for the fact that the attacker is not able to see the specific error generated 
• This type of attack can become very expansive in terms of time because of the excessive amount of requests from having to send for every single bit of information obtained
SQL Injection - CEH 
- Methodology SQL Injection attack 
a. Collection information 
b. Sniffing out a vulenrabilità SQL Injction 
c. Exploit the vulnerability found 
d. Extract data from the Data Base 
e. Interacting with the Operating System 
f. Compromise the entire network
SQL Injection - CEH 
- Programs for SQL Injection 
a. SQL Power Injection (http://www.sqlpowerinjector.com/) 
b. BSQLHAcker (http://labs.portcullis.co.uk/tools/bsql- hacker /) 
c. Marathon Tool (http://marathontool.codeplex.com/) 
d. Absinthe (https://github.com/HandsomeCam/Absinthe) 
e. SqlNinja (http://sqlninja.sourceforge.net/) 
f. Sqlmap (http://sqlmap.org/)
SQL Injection - CEH 
- Countermeasures 
a. Use account with minimum privileges on the DB 
b. Disable the functions or procedures not necessary to the performance of the application 
c. Monitor connections with IDS, WAF, etc. 
d. Use custom error messages 
e. Filtering Data Client 
f. Provide of controls of safety in data passed by the application to make requests to the Data Base
SQL Injection - CEH 
Questions?
Hacking 
Wireless 
- 
CEH 
- Wireless LAN 
- Bluethoot
Hacking Wireless - CEH 
- Wireless LAN 
• The Wi-Fi was developed according to the IEEE 
802.11 and is widely used in wireless communication, as it provides access to applications and data over the wireless network 
• The standardized Wi-Fi set nuemrosi ways to use a connection between the transmitter and the receiver, such as DSSS, FHSS, Infrared (IR) and OFDM
Hacking Wireless - CEH 
- Types of Wireless 
• As an extension of a wired network 
• Multiple Access Points 
• LAN-to-LAN Wireless Network (Bridge Mode) 
• 3G Hotspot
Hacking Wireless - CEH 
- Wireless Standard 
• 802.11a: bandwidth up to 54 Mbps, 5 GHz frequency used 
• 802.11b bandwidth up to 11 Mbps, 2.4 GHz frequency used 
• 802.11g: up to 54 Mbps bandwidth, use higher frequency of 2.4 GHz 
• 802.11i is a standard that goes back 802 .11a/b/g inserting an improvement in cryptography for networks 
• 802.11n: 100Mbps bandwidth over the 
• 802.16: A standard for wireless broadband developed for the MAN (Metropolitan Area Network) 
• Bluethoot: standard range with very small (<10 m) and low-low speed (1-3 Mbps), developed for low-power network devices such as PDAs
Hacking Wireless - CEH 
- Types of encryption used in wireless 
• WEP 
a. It 's the first and the old standard used in wireless communications 
• WPA 
a. Use 48 BIT IV 
b. 32 Bit CRC 
c. TKIP encryption 
• WPA2 
a. Use AES encryption (128 bit) and CCMP 
• WPA2 Enterprice 
a. It integrates with the standard WPA EAP
Hacking Wireless - CEH 
- How to decrypt the WEP 
• Configure the interface wireless into monitor mode on a specific channel of the access point 
• Verify the ability to inject packets to the AP 
• Use a program like aireplay-ng to simulate false authentication to the AP 
• Run a sniffer to collect unique IV 
• Use a tool to extract the encryption key from the collected IV
Hacking Wireless - CEH 
- How to decrypt the WPA/WPA2 
• WPA PSK 
WPA PSK it uses a user-selected key to initialize the TKIP that can not be violated as a precompiled package, but it can 'be unearthed with a dictionary attack Brute-Forced 
• Brute-Force WPA 
Use a program such as aircrack, aireplay, KisMAC to try to find the key 
• Attack Offline 
Collect a considerable number of packets so as to obtain WPA/WPA2 authentication handshake 
• Attack deautentica that clients connected 
Is to force the client already connected to the AP disconnect and reconnect in order to collect authentication packets for subsequent cracking
Hacking Wireless - CEH 
- Methodology attacks Wireless 
• Locating the Wi-Fi network target 
• GPS mapping 
• Wireless Network Traffic Analysis 
• Attack on the Wi-Fi network 
• Cracking the encryption used 
• Impaired Wi-Fi network
Hacking Wireless - CEH 
- Bluetooth 
• Easy to use 
• Easy to detect 
• Types of Attack 
a. BlueSmacking 
b. Bluejacking 
c. BlueSniffing 
d. Bluesnarfing
Hacking Wireless - CEH 
Questions?
Evading IDS, Firewalls, Honeypots - CEH 
- IDS 
- Firewall 
- Snort 
- HoneyPot
Evading IDS, Firewalls, Honeypots - CEH 
- IDS 
• An Intrusion Detection System (IDS) is a system that collects and analyzes information from a computer or a network, in order to identify possible violations of security policies 
• With IDS identifies a system of "packet-sniffer", which intercepts packets traveling, for example, a wild TCP / IP network 
• The packets are analyzed after they were caught 
• An IDS evaluates a suspected intrusion once it has taken place and signals an alarm
Evading IDS, Firewalls, Honeypots - CEH 
- Methods for the identification of an intrusion 
• Identification by signatures (Signaure Recognition) 
This type of system attempts to identify the events that improper use of the system. 
• Identification of anomalies (Anomaly Detection) 
You try to identify threats based on analysis of behavior characteristic of a user or a fixed component in a system 
• Identification of abnormalities in the communication protocol (Protocol Anomaly Detection) 
The models used for this type of recognition are based on the specifications of the protocol used. For example, the TCP / IP
Evading IDS, Firewalls, Honeypots - CEH 
- Types of Intrusion Detection System (1/2) 
• Based on the Network 
a. This system typically consists of a blackbox placed inside the network, which captures traffic in promiscuous mode and tries to identify threats based on preset patterns 
• Host-based 
a. This system is based on listening to the events generated by a specific host 
b. It is not commonly used due to the excessive workload for monitoring
Evading IDS, Firewalls, Honeypots - CEH 
- Types of Intrusion Detection System (2/2) 
• Monitoring of log files 
a. This type of system is based on a program that scans the log files looking for events that have already happened 
• Checking file integrity 
a. This type of system checks for the presence of any Trojan Horse present or changed files that indicate the possible presence of an intrusion. 
b. Tripwire (http://www.tripwire.com/)
Evading IDS, Firewalls, Honeypots - CEH 
- Firewall 
• It 'a system hardware, software designed to prevent unauthorized access to or from a private network 
• And 'placed at strategic points such as junctions or as a network gateway 
• A firewall monitors all messages entering and leaving the private network, blocking those that do not meet specific security criteria 
• Firewalls only care about the type of traffic, addresses and destination ports
Evading IDS, Firewalls, Honeypots - CEH 
- DeMilitarized Zone (DMZ) 
• The DMZ is an isolated segment of the LAN, accessible from both internal and external networks, but characterized by the fact that the hosts on the DMZ certificates have limited possibilities of connection to specific hosts on the internal network 
• It is created using a Firewall with at least 3 physical network adapters, which are assigned specific rules as Trusted Network, Network and Network DMZ Un-Trusted External (Internet)
Evading IDS, Firewalls, Honeypots - CEH 
- Types of Firewall (1/2) 
• Packet Filter 
a. It works at the network layer of the OSI model 
b. Each packet is analyzed according to established rules before being forwarded 
c. The rules can be specified IP address, source port or destination and the type of protocol 
• Circuit-Level Gateway 
a. It works at the level of the OSI Model Session 
b. To identify a legitimate connection monitors TCP handshaking 
c. The information passed to the remote computer have as their origin the Gateway / Firewall 
d. This type of firewall is able to macherare the information about the network that protects but does not filter the packets individually
Evading IDS, Firewalls, Honeypots - CEH 
- Types of Firewall (2/2) 
• Applicaiton-Level 
a. It works at the Application layer of the OSI model 
b. It does not allow access to services that are not proxati the Firewall 
c. When configured as a Web Proxy services like FTP, telnet, and others are not allowed 
d. Acting on the application level this kind of devices are able to filter the specific application commands. For example, GET or HTTP Post 
• Stateful Multilayer Inspection 
a. This kind of Firewall and combines the functionality of previous models 
b. They work by filtering packets at the network layer to identify a legitimate session and pass the inspection of the content for the application
Evading IDS, Firewalls, Honeypots - CEH 
- Intrusion Detection System: Snort 
• Open source IDS can analyze traffic in real-time and to log any problems of a network 
• And 'able to analyze the protocols and contents of the package to detect attempted attacks, buffer overflow, Port Scan, attacks to CGI scripts, etc.. 
• Use language for writing their own rules 
• Uses of Snort 
a. Dirattamente as simple as sniffer TCP Dump 
b. Recorder of packets (for any network problems) 
c. As IPS (Intrusion Prevention System)
Evading IDS, Firewalls, Honeypots - CEH 
- The Snort rules 
• The rules engine allows you to create personal rules and specifications for the various types of network and use that if you want to do 
• The Snort rules allow distunguere between normal browsing activity, network activity lawful, and activities such as "mischievous" 
• The rules must be contained in a single line, the parser does not allow the preparation of more 'lines 
• The Snort rules are logically divided into two parts: 
a. Header of the rule (Rule Header): identifies the action that the rule will execute. For example, alert, log, pass, activate, etc.. 
b. options of the rule (Rule Option): identifies the message alert rule
Evading IDS, Firewalls, Honeypots - CEH 
- HoneyPot 
• It 'a system used and configured specifically to attract and trap those who attempt to penetrate our network 
• Simulates a system or service vulnerable and easily hackerabile 
• Uses: 
a. Sutdio of attack methods used 
b. Study of the sources of attack 
c. How effective palliative to protect the real target systems 
• Must be positioned so im segregated compared to the production environment 
• Verify the legality of use of this type of systems
Evading IDS, Firewalls, Honeypots - CEH 
- Preventing IDS 
• Identify any interfaces in promiscuous mode 
a. AntiSniff program 
b. NEPAD program antisniffer 
• Intercepting the IDS alerts sent 
• Use techniques of evasion or polymorphic shellcode 
• Attach the IDS: 
a. Snort Vulnerability 
b. Vulenrabilità OS or in exposed services
Evading IDS, Firewalls, Honeypots - CEH 
Questions?
Buffer Overflow - CEH 
- Defining Buffer Overflow 
- Method Buffer Overflow 
- Identify a Buffer Overflow 
- Countermeasures to Buffer Overflow
Buffer Overflow - CEH 
- Defining Buffer Overflow 
• It 'a security vulnerability that occurs when a program does not properly check the length of the incoming data, but merely write down their value in a baffer fixed length, trusting that the data do not exceed more than previously allocated
Buffer Overflow - CEH 
- Why do the programs and applications are vulnerable? 
• Controls are ineffective or absent in many cases with regard to the data managed 
• In many cases, the same programming languages used are subject to vulnerability 
• Prograami and applications are developed following the Best Practies safety 
• Functions such as strcat (), strcpy (), sprintf (), vsprintf (), gets (), scanf (), used in "C" may be subject to buffer overflow in that they do control the length of the buffer
Buffer Overflow - CEH 
- The Stack and Buffer Overflow 
• A stack buffer overflow occurs when a buffer is overwritten on the stack space 
• An attacker can exploit this issue, coming into possession of the control flow of the stack and execute arbitrary code
Buffer Overflow - CEH 
- The Heap Buffer Overflow and the 
• When a program copies data in memory, without having carried out the necessary checks, it can be exploited by an attacker to gain control of the information managed heap 
• An attacker creates a buffer to fill the bottom of the heap and overwrite the other dynamic variables with unexpected effects from the normal execution of the program
Buffer Overflow - CEH 
- Method Buffer Overflow 
• Find the presence of a possible buffer overflow and what is the condition triggering 
• Send more data than the program can handle 
• Overwrite the return address of a function 
• Run your own malicious code (Shellcode)
Buffer Overflow - CEH 
- How to Identify a Buffer Overflow? 
a. Run a program on your own machine 
b. Insert large amounts of data with control characters identifiable. 
For example, "$ $ $ $" at the end of a string 
c. In the event of a crash program 
d. Look in the dump of the program the control character used to identify the trigger point of Buffer Overflow 
e. Setup using a debugger (gdb, OllyGdb, etc.). Analyze the behavior of the program 
f. Writing the exploit that exploits the buffer overflow found just
Buffer Overflow - CEH 
- Countermeasures to Buffer Overflow 
• Manual code review 
• Tecnihce Compilation 
• Use Libraries for developing secure 
• Disabling stack execution 
• Use destination randomiche Stack 
• Implement controls in real-time
Buffer Overflow - CEH 
Questions?
Cryptography - CEH 
- What is Encryption? 
• Encryption is the conversion of a given data into encrypted code 
• Encryption can be used to protect: 
a. E-mail messages 
b. Information on credit cards 
c. Sensitive Data 
d. etc.. 
• Objectives of cryptography 
a. Discretion 
b. Integrity 
c. Non-repudiation 
d. Authenticity
Cryptography - CEH 
- Types of Encryption 
• Symmetric Cryptography 
Symmetric encryption uses the same key to encrypt and decrypt a given data (secret-key, shared-key, private-key) 
• Asymmetric encryption 
Asymmetric encryption uses different keys for encryption and decryption. These keys are identified as public and private key (public- key) 
• Hash Functions 
the hash function does not use any key to encrypt or decrypt
Cryptography - CEH 
- Encryption Algorithms 
• The encryption algorithms are used to encrypt and decrypt data 
• Algortmi classic 
a. Replacing figures 
It consists in the replacement of bits, characters, or blocks of characters with different bits, characters, or blocks 
b. Transposition of digits 
The letters of the plaintext are moved tot positions to create the ciphertext 
• Modern algorithms 
a. Based on types of keys used 
Private key: the same key to encrypt and decrypt 
Public key: two different keys to encrypt or decrypt 
b. Based on the types of input 
• Block cipher: encryption of data blocks according to a fixed length 
• Stream cipher: Encryption of a continuous data stream
Cryptography - CEH 
- Symmetric encryption 
• Same key to encrypt and decrypt 
• ECB / CBC and other variants 
• The key is difficult to distribute 
• Since DES AES 
a. NIST Competition 1995-2001 
b. Originally called Rijndael
Cryptography - CEH 
- Asymmetric encryption 
• ECDSA: based dulle ellipses 
• RSA is based on prime numbers 
• Two public and private keys 
a. If encrypted with Private, Public deciphered with 
b. If encrypted with the Public, Private deciphered with
Cryptography - CEH 
- Hash 
• From a text a "number" unique and irreversible 
• The limits of hash collisions 
• Algortmi hash: 
a. MD5 
b. SHA-1, 
c. Etc..
Cryptography - CEH 
- Symmetric Asymmetric + + Hash 
• Certificates 
• Digital Signature 
• Authentication (Strong Autentication) 
- Use: 
• GSM 
• SSL 
• Etc. ..
Cryptography - CEH 
Questions?
Pen Testing - CEH 
- Penetration Test 
• A Pentest simulates the methods used by intruders to gain unauthorized access to the network and resources of an organization, for the purpose of compromising data and information 
• When carrying out safety tests, the tester is limited by available resources, such as time, expertise and access to equipment as specified in the indemnity 
• Many attacks follow a common approach to violate the security of a system
Pen Testing - CEH 
- Security Assessments 
• Every organization uses different types of security assessment to validate the security level of resources within the network 
• Categories of Security Assessment: 
a. Security Audit 
b. Vulnerability Assessment 
c. Penetration Testing 
• Each type of Security Assessment requires on the part of those who lead testing different skill levels
Pen Testing - CEH 
- Vulnerability Assessment 
• Network Scanning 
• Scanning tools 
• Security Errors 
• Test systems and network
Pen Testing - CEH 
- Limitations of Vulnerability Assessment 
• The scanning programs used to identify vulnerabilities are limited to a given point of time 
• Need to be updated when they come new vulnerabilities or funzinoalità 
• This affects the result of the evaluation 
• The methodologies used by the various softaware and options used may give different results in tests
Pen Testing - CEH 
- Penetration Testing 
• The pentest not carried out in a professional manner, can cause serious disruption to normal service delivery 
• The pentest verify the security model of the company as a whole 
• Detect potential threats that would be exploited in a real attack 
• The testers are differentiated by attackers only by the end of their actions
Pen Testing - CEH 
- What should be tested? 
• Communication errors, abuse of e-commerce, loss of credentials, etc. 
• Public systems exposed; websites, mail servers, platforms, remote access (RDP, VPN, etc.). 
• Mail, DNS, Firewalls, passwords, FTP, IIS, and webserver
Pen Testing - CEH 
- What makes a pentest reliable? 
• Establish a perimeter precise PenTest; objectives, limitations, gisutificazione of the procedures used 
• Relying on experienced professionals and competent to perform the tests 
• Choose a suitable test set that balances costs and benefits 
• Follow methodologies planned and well-documented 
• Document the results in a complete and asaustiva, but most clearly understood by the final customer 
• Highlight chairamente in the final report of the potential risks and vulnerabilities solutions
Pen Testing - CEH 
- Types of Penetration Testing (1/2) 
• From the outside 
a. The external PenTest provide this information by analyzing the full public tiguardanti the target (eg email server, web server, firewall, router, etc.) 
b. And 'the traditional approach to penetration testing 
c. The tests are focused only on the server, the infrastructure and the basic software of the target 
d. The tests may be done: 
• without any prior information of the target (Black Box) 
• with comprehensive information about the type and environment that you will be tested (Gray / White box)
Pen Testing - CEH 
- Types of Penetration Testing (2/2) 
• From 
a. The tests are efettuati from every possible point of access 
b. Within an object, test access from external locations, branch offices, DMZ, etc.. 
c. The tests basically follow from the methods used for testing but add an external point of view much more comprehensive infrastructure
Pen Testing - CEH 
- Black-box Penetration Testing 
• No knowledge of the infrastructure to be tested 
• It comes usually just the name of the company 
• The tests faithfully simulate an attack real 
• Provides a considerable amount of time spent on information retrieval and understanding of the infrastructure to be tested 
• It 'a kind of test expensive and time-consuming
Pen Testing - CEH 
- Gray-box Penetration Testing 
• Limited knowledge of the infrastructure to be tested 
• Perform internal security assessment and testing 
• Focused on the security of the applications that head all the possible vulnerabilities that an attacker could exploit 
• It runs mostly 'when starting from a Black box testing, we need a deeper understanding of a well-protected system for further investigation of possible vulnerabilities
Pen Testing - CEH 
- White-box Penetration Testing 
• Complete knowledge of the infrastructure to be tested 
• The tests simulate the actions committed by employees of the company evenutali 
• The preliminary information provided: 
a. The infrastructure of the company 
b. Type of network 
c. The security measures taken 
d. Firewall, Indirizzamneto network, IDS, etc.. 
e. The company policy on what and what not to do
Pen Testing - CEH 
- Stages of a Penetration Testing (1/3) 
• Phase preattacco 
a. This phase deals with the ways in which it will be tested and the objectives to be achieved 
b. The portion of the acquisition of information about dental on the target is considered essential in this phase of initial 
c. He formulates a plan of attack to follow 
d. Can be of two types: 
Reconnaissance passive collect target information from the information public 
Active Reconnaissance: Collect information through publications on social-network, social engineering, web sites visited, interviews, questionnaires, etc..
Pen Testing - CEH 
- Stages of a Penetration Testing (2/3) 
• Attack phase 
a. Penetrate the perimeter to gain unauthorized access to the network 
b. Capturing | Costasur.com safety of the various target 
c. Compromised systems, access to data managed, running exploits, etc.. 
d. Escalating privileges
Pen Testing - CEH 
- Stages of a Penetration Testing (3/3) 
• Phase postattacco 
a. Being more 'criticism of the whole process 
b. Is to "clean up" the traces of the action taken by the tester, in order to bring the systems before testing 
c. The actions include: 
• Removal of the copied files on the systems 
• Cleaning of the registers or vulnerabilities created 
• Exploit or removal of any programs used 
• Disable any share or unauthorized connections 
• Analysis of the results found and presentation of the same customer
Pen Testing - CEH 
Questions?
Th ank you 
Make a basic course on "Penetration test". 
https://www.udemy.com/basic-professional-penetration- 
tests/?couponCode=HACKING% 
408 
Hacking Basic Professional Penetration Test 
Designed to perform in penetration testing and web 
security, a good way to become a Certified Ethical 
Hacking! 
Price lowered to $ 8

More Related Content

What's hot

What's hot (20)

Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information security
Information securityInformation security
Information security
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
cyber security
cyber securitycyber security
cyber security
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 

Similar to Certified Ethical Hacking - Book Summary

CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
Malware collection and analysis
Malware collection and analysisMalware collection and analysis
Malware collection and analysis
Chong-Kuan Chen
 

Similar to Certified Ethical Hacking - Book Summary (20)

Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Super1
Super1Super1
Super1
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Malware collection and analysis
Malware collection and analysisMalware collection and analysis
Malware collection and analysis
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 

Recently uploaded

Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 

Recently uploaded (20)

Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 

Certified Ethical Hacking - Book Summary

  • 2. Certified Ethical Hacking - Introduction - Footprinting and Reconnaissaince - Scanning Networks - Enumeration
  • 3. Certified Ethical Hacking - System Hacking - Trojans Backdoors + - Viruses Worms + - Sniffer
  • 4. Certified Ethical Hacking - Social Engineering - Denial of Sevices - Session hijacking - Hacking Web Servers - Hacking Web Apps
  • 5. Certified Ethical Hacking - SQL Injection - Wireless Hacking - Evading IDS, Firewalls, Honeypots - Buffer Overflow - Cryptography - Pen Testing
  • 6. Introduction - CEH - No legal advice • The legal framework is not very clear about what is actually lawful or not • Be authorized in advance by those in power. • Demonstrate and highlight how you can access the data without accessing it. • In Italy, use a document created with the help of Indemnity of Legal possibly - It may be illegal to make PenTest on propia network • No prior authorization • Access to sensitive data - Most are unsuccessful Hack - Expansive Exam
  • 7. Introduction - CEH - Current Situation • News Suglia cyber attacks • Criminal activities - Anonymous Activities - Cyber Terrorism - Companies must necessarily have and implement security policies • Management of utilities • Access Management • Authentication and security levels • Delegation: rules for delegation • Authoritative sources of data
  • 8. Introduction - CEH - Overview of legislation • Computer Misuse Act 1990 (UK) • CANspam Act (2003) - In Italy • Law 48/2008: European Convention on Cybercrime. • Law 196/2003 • DPS (Document Security) • Measures of protection commissioner 27/11/2008 • The Indemnity
  • 9. Introduction - CEH - Terminology • Hacking • Hackers • Black Box Testing • White Box Testing • Gray Box Testing • Security • Vulnerability • Exploit / Proof of concept • Zero Day • Vulnerability Scan • Penetration Test
  • 10. Introduction - CEH - Origin threats • Within the company a. Licensed physical access b. Logins via the network c. Directors d. Employees • Outside the company a. External Consultants b. External Collaborators c. Its affiliates, subsidiaries of company d. External maintenance, visitors, etc..
  • 11. Introduction - CEH - Who is a Hacker? (1/2) • Black Hats / Crackers / Malicious Individuals with high computer skills used for malicious activity or destructive • White Hats / Ethical Hacker / pentester Individuals with expertise in the field of computer hacking who use their knowledge to improve the safety of the environment and are often identified with the term Security Analyst
  • 12. Introduction - CEH - Who is a Hacker? (2/2) • Gray Hats Individuals with high computer skills used, as appropriate, both for business "offensive", and "defensive" • Suicide Hecker Individuals that use their computer skills to create inefficiencies in companies victims or critical infrastructure, not caring if possible iripercussioni of legal they face. • Hactvism / Script Kiddie / Phreak / Red Team
  • 13. Introduction - CEH - How does a Hacker? (1/3) • Step 1: Patrol a. Research information about the victim b. Connections on a large scale for possible points of attack c. Looking for any information about customers, employees, networks, systems employed, etc.. • Step 2: Scanning a. Port Scan b. Networks scan c. Extract useful information on which versions and service
  • 14. Introduction - CEH - How does a Hacker? (2/3) • Step 3: Obtain access a. Exploit b. Weak Password c. Buffer Overflow d. Denial of service • Step 2: Maintain access a. Keylogger b. Backdoor c. Rootkits d. Trojan / Worm
  • 15. Introduction - CEH - Why do you need the Ethical hacking? • Vulnerability Testing and Security Audit does not ensure that our infrastructure is safe • Need to implement defense strategies taking advantage of targeted Pentest • The Ethical Hacking is necessary in order to anticipate the moves of any malicious people who would compromise our systems
  • 16. Introduction - CEH - Benefits Ethical Hacking? • Risk Assessment • Auditing • Mitigate fraud • Best Practies • Good infrastructure management
  • 17. Introduction - CEH - Benefits Ethical Hacking • Risk Assessment • Auditing • Mitigate fraud • Best Practies • Good infrastructure management - Disadvantages Ethical Hacking • Despite the intentions of companies in hiring external people to test their systems, does not guarantee that this leads to a positive contribution in raising the level of security of the company. • An Ethical Hacker can only help to understand the levels of security in place in the company. It will be the latter that must be put in place proper countermeasures
  • 18. Introduction - CEH - What is an Ethical Hackers? • Sniffing out Vulenaribilità • Verify the effectiveness of the strategies implemented safety • Head found in any vulnerbilità systems and network • Test the ability to access sensitive data
  • 19. Introduction - CEH - The triangle of safety, functionality, ease of use Safety Functionality Ease of use
  • 20. Introduction - CEH Introduction Virtual Lab + Linux
  • 21. Introduction - CEH Questions?
  • 22. Footprinting and Reconnaissaince - CEH - Information gathering - Rating Size of attack - Exposure
  • 23. Footprinting and Reconnaissaince - CEH - Information gathering • Search technical information a. Registered domains b. IP range used c. Services Provided • Additional Information a. IT administrators of groups, forums, etc.. b. Instruments used, and software versions c. Hardware devices and technologies
  • 24. Footprinting and Reconnaissaince - CEH - Attack Surface • Discover the machines and services used • Discover any open wireless networks • Other types of network access: a. Waiting Rooms b. Chiosci c. Shared networks • Ability to use in the attack malware
  • 25. Footprinting and Reconnaissaince - CEH - Exposure • Check for services found and the cars reach: a. Exploit for the optional field b. Potential for abuse services • Organize the information collected • Create a plan of attack a. An attack can 'be performed using more' weaknesses in a coordinated manner • Testing diving the posture (position) before the attack
  • 26. Footprinting and Reconnaissaince - CEH - Footprinting • Delimit the scope of attack a. DNS / WHOIS b. Internic c. Physical location d. RF (Wi-Fi, Bluetooth) monitoring - WarDriving • Analysis Traceroute • Mirroring the site of the target company • Tracking email communications • Using Google Hacking • Nessus Scan • Nikto Scan
  • 27. Footprinting and Reconnaissaince - CEH - Perimeter attack • Analysis of DNS records a. IP Assigned b. MX Record c. etc. .. • Sniffing out the company's website a. Public or restricted WebSite • Search information via search engines (eg google, bing, yahoo, etc..), Job sites, financial services, etc.. • Research staff on Social Networks, Chat services, etc.. • Physical location of the office
  • 28. Footprinting and Reconnaissaince - CEH - Analysis Traceroute • Identification devices routers, firewalls, etc.. es. # traceroute 10.10.10.10 traceroute to 10.10.10.10, 64 hops max, 52 byte packets 1 10.10.10.1 (10.10.10.1) 1.427 ms 1.160 ms 0956 ms 2 10.10.10.3 (10.10.10.3) 33,266 ms 34.849 ms 33,298 ms 3 * * * * ... • By correlating the information obtained it is possible to draw the network topology • Traceroute Tools a. VisualRoute Trace (http://viualroute.visualware.com) b. Visual IP Trace (http://www.visualiptrace.com) c. vTrace (http://vtrace.pl)
  • 29. Footprinting and Reconnaissaince - CEH - Mirroring the corporate website • Create a copy of the entire site azinedale in order to obtain information on the structure as CSS, images, flash files, video, html code, etc.. • Website mirroring tools: a. Wget (http://www.gnu.org) b. BlackWidow (http://softbytelabs.com) c. WinWSD (http://winwsd.uw.hu) d. etc..
  • 30. Footprinting and Reconnaissaince - CEH - Tracking email communications • The Tracking of Email is a valid method for monitor and spy on the emails sent to recipients a. When an email has been read or received b. Possibility to send email destructive c. Phishing attack d. Find the endpoints of e-mail communication e. Tracking of documents, etc. • E-mails Tracking tool: a. Trout (http://www.foundstone.com) b. 3d Visual Trace Route (http://www.3dsnmp.com) c. etc..
  • 31. Footprinting and Reconnaissaince - CEH - Using Google Hacking (1/2) • What a hacker can do with the techniques of Google Hacking a. Find errors that contain sensitive information b. File containing password c. Warnings or safety vulenrabilità d. Pages containing the login form e. Pages containing data regarding the configuration or network vulnerabilities • Examples of some operators used for advanced searches of google: a. [Cache:] - shows the version of the site that is cached by google b. [Inurl:] - restricts the search of the given string only if present in the URL c. [Intitle:] - narrows the search to documents that contain the specified string in the title d. etc ...
  • 32. Footprinting and Reconnaissaince - CEH - Using Google Hacking (2/2) • Google Hacking Tool: a. MetaGoofil (http://www.edge-security.com) b. SiteDigger (http://www.foundstone.com) c. Google Hacks (http://code.google.com) d. GMapCatcher (http://code. Google.com) e. Goolink Scanner (http://www.ghacks. Net) f. etc ...
  • 33. Footprinting and Reconnaissaince - CEH - Nessus Scan • Nessus is a tool that allows of find and possibly identify the services exposed by a particular server Picture of nessus • Nessus Site (http://www.tenable.com/products/nessus)
  • 34. Footprinting and Reconnaissaince - CEH - Nikto Scan • Nikto is a tool that allows of Identify a webserver and make crowling of the sites configured in it. • Nikto is in degrees also identify any known vulnerabilities present on that webserver on the basis of its own internal DB Picture of Nikto • Nikto Site (http://www.cirt.net/nikto2)
  • 35. Footprinting and Reconnaissaince - CEH - Countermeasures Footprinting (1/2) • Secure destruction of documents • Configuring Router / IDS a. Reject any suspicious traffic b. Identify patterns of footprinting c. Close access to the ports that are not strictly necessary for the provision of the service and filter any unused protocols from their applications. • Configure the web server so that it does not provide useful information • Perform tests to verify footprinting countermeasures
  • 36. Footprinting and Reconnaissaince - CEH - Countermeasures Footprinting (2/2) • Removal of any sensitive data on the DMZ • Prevention of spider and loading of copies cache (robots.txt) • Split - DNS • Honeypot
  • 38. Scanning - CEH - CEH scanning methodology - Types of Scan - Firewalking - 3 way handshake - Closing Sessions - Scanning techniques - War Dialing - Scan tool
  • 39. Scanning - CEH - CEH scanning methodology 1) Check the Live systems 2) Check open ports on the system 3) Identify the types of services and versions 4) Vulnerability Scanning 5) Design diagram network 6) Using Proxy
  • 40. Scanning - CEH - Types of Scan • Network scanning a. ICMP scanning b. Ping Sweep scanning • Port scanning a. Check open ports on a system • Vulnerability scaning a. Identification of services b. Identifying versions of applications c. Identification Applications
  • 41. Scanning - CEH - Firewalking • Identifies the ACL (Access Control Lists) configured on the Firewall • It uses the TTL (Time To Live) of a package to find "hop" • Forwarding packets to the open services a. Icmp_time_exceded b. Drop Package • It is not necessary to reach the destination
  • 42. 3-way handshake Scanning - CEH - 3 way handshake Computer Computer A B SYN = 1, SEQ # 10 SYN = 1, ACK = 1 ACK # 11 ACK = 1, SEQ # 11 Time Time
  • 43. Scanning - CEH - Chiusira sessions Computer Computer Computer Computer A B A B FYN, ACK RTD FIN ACK, ACK ACK Time Time
  • 44. Scanning - CEH - Scanning techniques • TCP Connect Scan • Stealth Scan • XMAS Scan • SYN / ACK / FIN Scan • NULL Scan • IDLE Scan • UDP Scan
  • 45. Scanning - CEH - TCP Connect Scan • Indicates whether the port is open only after completing three way handshake - Sequence packages: SYN SYN, ACK, ACK, RST • TCP Connect scan uses a RST packet to terminate the communication
  • 46. Scanning - CEH - Stealth Scan • Used to bypass firewall rules, logging mechanisms or hide their activities as normal traffic SYN SYN SYN, ACK RTD RTD Open Door Closed Door
  • 47. Scanning - CEH - XMAS Scan • forge a packet with the URG, ACK, RST, SYN and FYN settati • The FIN flag works only for systems that have implemented the TCP stack according to RFC 793 • Often does not work for some systems Microsoft Windows FIN, URG, PUSH FIN, URG, PUSH None RTD reply Open Door Closed Door
  • 48. Scanning - CEH - NULL Scan • The FIN flag works only for systems that have implemented the TCP stack according to RFC 793 • Often does not work for some systems Microsoft Windows No Flags settati No Flags settati None RST, ACK reply Open Door Closed Door
  • 49. Scanning - CEH - FIN Scan • Send packets with the FIN flag set • The FIN flag works only for systems that have implemented the TCP stack according to RFC 793 • Often does not work for some systems Microsoft Windows FIN FIN None RST, ACK reply Open Door Closed Door
  • 50. Scanning - CEH - Idle Scan • To verify an open door just send a SYN packet • The target responds with SYN, ACK, RST if it is open or closed if • A PC receives a response to SYN, ACK, it did not send any request will respond with RST • Each RTD is not required ignored • Each packet on the network contains a number of "fragment identification" (IPID) • The Idle scan + is a scanning technique that spoofed packets are sent to check the status of the ports on a target.
  • 51. Scanning - CEH - Idle Scan: Step 1 • Send SYN, ACK to Zombie PC to check on the IPID • Each packet on the network has its own IP ID, consisting of 4 digits and is incremented each time a PC sends a packet • The PC Zombie not expecting the SYN, ACK, it responds with an RST by adding your own IPID probe package SYN, ACK
  • 52. Zombie Scanning - CEH - Idle Scan: Step 2.1 Open Door • Send SYN to port 80 for example of the target with spoofed ip of Zoombie Striker SYN on port 80 IP = Zoombie Target SYN, ACK Open Door RTD IPID = xxxx +1
  • 53. Scanning - CEH - Idle Scan: Step 2.2 port Close • If the door is closed, the target will send a RST packet to the zombie who will not follow response. Striker SYN on port 80 IP = Zoombie Target RTD Zombie
  • 54. Scanning - CEH - Idle Scan: Step 3 • The attacker sends a request to the zombie • If the IPID is incremented by one stage the door is open, otherwise not SYN, ACK Striker Zombie RTD IPID = xxxx +2
  • 55. Scanning - CEH - SYN / FYN IP Fragments Scan: • Is not a method different from the previous scan • Involves sending fragmented packets with the TCP header so that any systems "Packet filtering" fail to intercept - ACK Scan: • The attacker sends packets with the ACK flag active and random number sequences • No response means that the port is filtered • RST packet response indicates that the port is not filtered
  • 56. Scanning - CEH - UDP Scan: • For the UDP port scan is not required 3 way TCP handshake • When a packet is sent to a port in the state Open, the target system does not send any return package • If a UDP request is sent to a port in a state close, the target system risposnde with an ICMP port unreachable message • Spyware, Trojan horses and other malicious applications using the UDP port to propagate between systems
  • 57. Scanning - CEH - War-Dialing • One of the attack techniques used in the past (Mitnick) • Was to call a range of phone numbers looking for an EndPoint that responds to initiate a connection. • Often automated a. They use the range of random numbers • The response by an EndPoint, often detects the presence of an access of "emergency" reserved for system administrators
  • 58. Scanning - CEH - Scan tool • Nmap (http://nmap.org/) • Nesus (http://www.tenable.com/products/nessus) • OpenVAS (http://www.openvas.org/) • Hping (http://www.hping.org/) • Netcat (http://netcat.sourceforge.net/) • SuperScan (http://www.foundstone.com) • Free Port Scanner (http://www.nsauditor.com) • THC-Scan (http://freeworld.thc.org) • iWar (http://www.softwink.com)
  • 59. Scanning - CEH Questions?
  • 60. Enumeration - CEH - Enumeration - Tecnihce enumeration - NetBIOS Enumaration - Enumerating User Account - SNMP Enumeration - Unix / Linux Enumeration - SMTP Enumeration
  • 61. Enumeration - CEH - What is an enumeration? • By enumerating the process of extracting username, machine name, network resources, shared resources and services of a system • Enumeration techniques are applied in an intranet environment or for more '
  • 62. Enumeration - CEH - Enumeration techniques • Remove users from the email ID • Pull user names through the SNMP service • Remove groups from Windows macchien • Extracting data using the Default Password • Brute forcing Active Directory • Extract information using DNS Zone Transfer
  • 63. Enumeration - CEH - NetBIOS Enumeration • An attacker exploits the enumeration of NetBIOS a. The list of computers that belong to a domain b. The list of the Share network that exposes single host on the network c. Policies d. Password
  • 64. Enumeration - CEH - Enumeration systems using default password • Apparatus as HUB, switches, routers, are often used with the default password • An attacker can 'get access and the information contained in these systems using default credentials • Default Password Site (http:// www.defaultpassword.com)
  • 65. Enumeration - CEH - SNMP Enumeration • The SNMP (Simple Network Management Protocol) is a protocol used to monitor and maintain hosts, routers, and in general any device on the network that supports • An attacker uses the SNMP enumeration to extract information about the resources of the network devices • The SNMP consists of a manager and an agent; the agent is directly integrated in the apparatus and the manager is usually an installed system apart and dedicated. • The default string is used to monitor and read access to the information is "public", while maintaining and write access is "private" • The technique uses SNMP enumeration of these strings to extract useful information on the equipment
  • 66. Enumeration - CEH - Unix / Linux enumeration • For Unix / Linux, there are several commands to enumarare resources on the network a. Showmount: provides a list of the share exposed by the system b. Finger: the possibility to enumerate users and hosts, providing detailed information such as home directories, etc.. c. Rpcclient: Provides a list of users on Linux and OS X d. Rpcinfo: helps to enumerate RPC (Remote Procedure Call) protocol. RPC protocol allows communication via network applications.
  • 67. Enumeration - CEH - SMTP Enumration • Service that enables iterating through the direct command "Telnet" • Allows enumeration of users through the normal commands available a. VRFY / EXPN b. RCPT TO
  • 68. Enumeration - CEH - User Account Enumeration • You can 'try to get through interrgoazione anonymous LDAP Server • On Windows systems using the SID (Security Identifier) a. Null Session b. SID to User
  • 69. Enumeration - CEH Questions?
  • 70. System Hacking - CEH - Password Cracking / Attack - Privileges Escalation - Running programs Spyware / Keylogger / rootkits - NTFS Data Stream - Steganography - Covering the tracks
  • 71. System Hacking - CEH - Password Cracking / Attack • Password Cracking Techniques are used to recover the password of a given system • Attackers use this type of techniques to obtain unauthorized access to vulnerable systems • The use of this type of techniques work for the simplicity of the passwords used by the users
  • 72. System Hacking - CEH - Password Cracking Techniques • Dictionary attack a. Use a file containing common passwords • Brute force attack (Brute Forcing Attack) a. Combination of numbers and characters until the password • Attack Hybrid (Hybrid Attack) a. All'ìattacco similar to the dictionary, adds numbers and letters to the words used in the dictionary • Attack syllable (Syllable Attack) a. Combine the dictionary attack and brute Forzza • Attack du based rules (Rule-Based Attack) a. It is based on information that the attacker has previously found regarding the password (Business Policy, the amount of special characters, etc.)
  • 73. System Hacking - CEH - Types of attack on Password • Passive Online Attack • Attack Active Online • Attack Offline • Attack is not computerized
  • 74. System Hacking - CEH - Passive Online Attack • Sniffing the network • MIM (Man in the Middle) • Replay
  • 75. System Hacking - CEH - Attack Active Online • Predictability of passwords • Trojan / Spyware / Keylogger • Hash injection
  • 76. System Hacking - Attack Offline • Precalculated hash • Rainbow tables • Distributed networks - CEH
  • 77. System Hacking - CEH - Attack is not computerized • Spying on behind those who are typing password (Shoulder Surfing) • Social Engneering • Rummage in garbage (dumpster diving)
  • 78. System Hacking - CEH - Privileges Escalation • Exploits vulnerabilities in the operating system • Vunlnerabilità software • Errors in programming a. Data buffer overflow b. No distinction between data and code executive c. Failure to check user input Etc. .. • Often used with Exploit shellcode
  • 79. System Hacking - CEH - Spyware • Program that records user actions that are performed on your computer and surfing the Internet without the user knowing anything a. It hides its process b. It hides their files, and other objects c. Difficult to remove • Methods of propagation a. Masquerading as anti-spyware b. Downloaded from the internet c. Exploit vulenrabilità browser d. Add-on fictitious e. Software installations containing macros specifically designed
  • 80. System Hacking - CEH - Keylogger (Keystroke Logger) • Software or hardware components that allow the recording of what the user types on the keyboard • All the recorded will be saved in a file and sent to a remote destination • The Keylogger meddle in the communication between the keyboard and the operating system • Some companies use this type equipment or software to monitor their employees, as well as for a more home for the purpose of monitoring children or whatever.
  • 81. System Hacking - CEH - RootKit • These are programs that reside at the kernel level to hide themselves and cover the tracks of their attivià • Replace specific routines or operating system components with modified versions of the ad hoc • The RootKit allow an attacker to maintain access to the system path
  • 82. System Hacking - CEH - Types RootKit (1/2) • Hardware / Firmware • He hides in physical devices or firmware updates that do not check code integrity • Hypervisor level • Change the boot sequence so as to put himself before the operating system virtual • Boot Loader level • Replaces the original boot with one controlled by a remote attacker
  • 83. System Hacking - CEH - Types RootKit (1/2) • Kernel level Replaces or adds malicious code parts of the kernel of the operating system or device • Library level Replaces the libraries of the operating system in order to obfuscate the information of the attacker • Application level Replaces the executives of regular applications with Trojans or malicious pieces of code
  • 84. System Hacking - CEH - Types RootKit (2/2) • Kernel level Replaces or adds malicious code parts of the kernel of the operating system or device • Library level Replaces the libraries of the operating system in order to obfuscate the information of the attacker • Application level Replaces the executives of regular applications with Trojans or malicious pieces of code
  • 85. System Hacking - CEH - NTFS Data Stream • NTFS Alternative Data Streams (ADS) is a system of hidden flow of information in windows which contains the metadata of a file (attributes, word count, author name, etc ... • ADS is the system that allows you to add attributes to the file without changing its functionality or how they appear in the file manager • ADS can be exploited by an attacker to inject code into a corrupt system and execute commands without being detected by the user
  • 86. System Hacking - CEH - Steganography (1/2) • The shorthand is the technique of hiding secret messages and extract the same joints at the destination while maintaining the confidentiality of the message • Utilizziare graphic images as a cover to hide data, coordinates, secret plans is one of the most widely used methods • There are several free programs that allow the use of the techniques stenogragrafiche
  • 87. System Hacking - CEH - Steganography (2/2) • Example with ImageHide (http://www.dancemammal.com/ imagehide.htm)
  • 88. history and temporary files System Hacking - CEH - Covering the tracks • Remove all WEB activities such as MRU (Most Recently Used), cookies, cache, • Disable auditing systems • Edit the log file, do not delete! a. Operating System b. Applications c. Access to DB d. Administrative e. UTMP / lastlog / WTMP • Close all connections to the target machine a. Use tools or alter files to obfuscate its presence b. Windows Watcher, Tracks Eraser Pro Evidence Eliminator, etc. • Close all possible ports used, apply patches to the system, to prevent others from entering Hacker
  • 89. System Hacking - CEH Questions?
  • 90. Trojans Backdoors + - - What is a Trojan? • It 'a program containing malicious code within itself, that allows you to take control and cause damage to the system • With the help of a Trojan attacker is able to gain access to the password registered on the system, but in general what is all this about it as personal documents, deleted files, images, messages, etc..
  • 91. Trojans Backdoors + - - What is the purpose of a Trojan? • Steal information important, which password secret codes, informaizoni on credit cards, bank details, etc. • Registration of activities on the PC victim • Modify or replace operating system files • DOS Attack • Download spyware, keyloggers • Disable protection systems, anti-virus, anti-spyware, etc. • Use your PC victim to propagate the infection of Trojan
  • 92. Trojans Backdoors + - - Against which method to infect a system used by a Trojan? 1. Create a package modified by using a Trojan Horse Constructor Kit 2. Create the procedure ("droppers") that will be the heart of the Trojan and execute malicious code on the target system 3. Create a container ("wrapper") through the tool containing the Trojan, which will be used to install everything on the victim's PC 4. Propagate the Trojan 5. Run the dropper 6. Perform routine harmful
  • 93. Trojans Backdoors + - - Ways by which a Trojan is able to infect a system • Software packages created by employees not satisfied • Fake programs (AV pop-ups, rogue security) • Files downloaded from the internet (games, music, screen savers, etc.) • Systems messaging (IM, IRC, AOL, etc.) • Sugeriti links or attachments provided in the e-mail address • File Sharing • Vulnerability of browsers or mail clients used • Physical access to the PC
  • 94. Trojans Backdoors + - - As a Trojan virus evades controls • Subdivide the code of Trojan in small parts separate and tablets • Change the content, the checksum and encrypt the code of the Trojan using hex editor • Do not use Trojan downloaded directly from the internet • Use different types of common extensions to convert the esegutivo of Torjan
  • 95. Trojans Backdoors + - - Some types of Trojans • Command Shell Trojan • Covert Channel Trojan • Botnet Trojan • Proxy Server Trojan • Remote Access Trojan (backdoor) • E-Mail Trojan • FTP Trojans • E-Bancking Trojan • Mobile Trojan • Spam Trojan • MAC OSX Trojan • etc ...
  • 96. Trojans Backdoors + - - Methods for detecting the presence of Trojans within a system compromise • Scanning open ports • Scan active processes • Scan of the drivers installed • Scan Windows Services • Scanning of the programs that start at boot • Scan for suspicious files or cartelel • Monitoring network activity • Scan of any file of system operating last modified • Using Trojan Scanner
  • 97. Viruses Worms + - CEH - What is a Virus? • It ' a program self-replicating that modification the inserting its code in other executive programs • Some Virus infect the computer a time performed the program that contains • Other forms of Virus riamangono Dormant as long as a triggering event makes them active
  • 98. Viruses Worms + - CEH - Why are created Virus? • Damage to society competitors • Financial Benefits • Progietto to research climate • How fun • Acts of vandalism • Cyber terrorism • For the distribution of political messages
  • 99. Viruses Worms + - CEH - How can a virus infect a computer? • The DB of the tracks viragli the antivirus is not updated • Plugin outdated versions of installed • By installing pirated software or crackkato • Opening infected e-mails • When a user downloads files without verifying the source
  • 100. Viruses Worms + - CEH - Some examples of Type Virus • System or Boot Sector Virus • File Virus • Cluster Virus • Multipart Virus • Macro Virus • Encryption Virus • Polymorphic Virus • Shell Virus • Tunneling Virus
  • 101. Viruses Worms + - CEH - What is a Worm? • It 'a malicious program that can replicate, run and propagate itself through the network without internvento of a human being • Most Worm created are able to replicate and spread to the network in order to consume computing resources • Acluni Worm may contain code that can harm the infected ssitema • The attackers use to install Backdoor Worm on infected systems in such a way as to create zombies or botnets. Botnets are used for future cyber attack
  • 102. Viruses Worms + - CEH - How to avoid infections Worm and Virus • Install an Antivirus and keep updated LDB of the tracks • Aggionrare steadily the systems with the Latest Patch of available safety • Pay particular attention to files or programs downloaded from the Internet • Avoid of perform attachments of e-mail the which sender not is known • Always keep backup of the data so that you can restore in case of infection • Regularly scan your PC • Do not use administrative accounts • Using programs that control connections (personal firewalls, etc.) • Use programs such as tripware, sigverif, widnows file protection
  • 103. Viruses Worms + - CEH Questions?
  • 104. Sniffer - CEH - ARP - Using the sniffing - Techniques sniffing - Sniffing active - Countermeasures
  • 105. Sniffer - CEH - ARP • It 'a network protocol, whose task is to provide a mapping between IP address and MAC address in the Ethernet network, a PC • Specifc according to RFC 826 • ARP tables • System requst ARP / ARP Reply
  • 106. Sniffer - CEH - Using the sniffing • To identify the elements of a network a. Router b. DNS Server c. Addressing type used d. Network equipment • Get MAC address and IP address of a computer on the network • Obtaining sensitive data a. Credentials traveling on criptatti channels (HTTP, FTP) b. Confidential documents c. Password hashes d. Etc.
  • 107. Sniffer - CEH - Techniques sniffing • Passive Sniffing a. Applicable only in a network where there are "HUB" b. Is to monitor the number of packets traveling over the network c. HUB obsolete today • Active Sniffing a. A technique used on networks where there are "Switch" b. Consists of injecting packets (ARP) to the network that generates requests
  • 108. Sniffer - CEH - Sniffing active (1/3) • It is used where it is not possible to passive listening of the network, the presence of Switch • Fictitious involves injecting packets in the network in order to divert traffic to the attacker • Exploits the weaknesses of the ARP protocol • And 'lawful if used for monitoring or control of the network a. SPAN Port: Reserved for duplication of traffic in the switch b. Monitoring Port c. Port Mirroring
  • 109. Sniffer - CEH - Sniffing active (2/3) • ARP Spoofing (Poison) a. Inject ARP Reply modified (e.s. Gateway MAC) b. It requires consistency and frequency c. Easily identifiable d. Easy to prevent enabling the "port security" on the equipment • MAC duplication a. Substitute your own MAC address with that of the target machine
  • 110. Sniffer - CEH - Sniffing active (3/3) • MAC Flooding a. Generate a quantity of elevta Spoofed ARP reply b. Saturates the memory and the ability to refresh the switches c. Turn the switch in the HUB • Attack in the DHCP a. IP is sending requests to the DHCP server in order to saturate the available addressing b. And 'considered a DoS (Denial of Service)
  • 111. Sniffer - CEH - Countermeasures • Enable port security on the switches available a. Prevents the presence of duplication of MAC addresses b. Maintains mapping of MAC addresses and the ports to which they are connected • Using IDS (Intrusion Detection System) a. Allow the immediate detection of MAC Flood, MAC Duplicates, high amounts of ARP traffic • Use static ARP tables • Enable the DHCP Snooping a. Prevents attcchi DHCP
  • 112. Sniffer - CEH - Some useful programs • ARP attacks a. Ettercap (http://ettercap.github.io/ettercap/) b. Cain & Abel (http://www.oxid.it/cain.html) c. SMAC (http://www.klcconsulting.net/smac-cl/) • Sniffing tools a. TCP Dump (http://www.tcpdump.org/) b. Wireshark (http://www.wireshark.org/) c. Dsniff (http://www.monkey.org/ dugsong ~ / dsniff /) d. Aircrack-ng (http://www.aircrack-ng.org/doku.php?id=airodump-ng)
  • 113. Sniffer - CEH Questions?
  • 114. Social Engineering - CEH - Social Engineering • The "Social Engineering" is the art of fooling people into revealing confidential information • This kind of technique has the strength of the value unaware that cover the information in the possession of people and the lack of care in keeping this information confidential
  • 115. Social Engineering - CEH - Victims of such attacks Social Engineering • Secretaries or help desk personnel • Users or customers of the company • Suppliers company • System Administrators • Technical support staff
  • 116. Social Engineering - CEH - Phases of an attack type of Social Engineering a. Search information on the company target • Dumpster diving • Website • Information about the employee • Inspections to the premises of the company • etc. b. Select a victim • Identifying such as a disgruntled employee c. Develop relationship with the victim • Begin a relationship with / the employee selected as a victim d. Exploit the relationship • Get information such as user names, financial information, technologies used, etc..
  • 117. Social Engineering - CEH - Techniques of Social Engineering (1/2) • Human-based a. Dumpster Diving (Research in the trash) b. Featuring a user attempts to crystallize c. Presenting itself as a company VIP d. By posing as a technical support person e. Interception of telephone conversations f. Spy on people behind (Shoulder Surfing) g. Entering the sly h. Presenting himself as a third party i. etc ...
  • 118. Social Engineering - CEH - Techniques of Social Engineering (2/2) • Computer-based a. Using pop-up windows that appear during navigation (gifts, sweepstakes millionaire, etc.). b. Through letters buffaloes (Hoax) c. Through chain letters d. Chat via message (dates of birth, names bachelors / bachelorettes, household names, etc.) e. Via email Spam f. Phishing g. Sending fake SMS requesting banking information
  • 119. Social Engineering - CEH - Countermeasures • Adopt corporate policies of behavior clear and enforce them • Enhance the physical security • Train staff to respond to such threats • Implement control measures and verification of the same constants • Draw the possible recipients and dangerous content of the e-mail
  • 120. Social Engineering - CEH Questions?
  • 121. Denial of Sevices - CEH - What is a Denial of Service? • Denial of Service (DoS) attack is an attack on a computer or a computer network designed to inhibit the normal delivery of services available • In a DoS attack the attacker floods the victim richeiste the system up to the saturation of the available resources
  • 122. Denial of Sevices - CEH - Techniques DoS attack • Ping of Death (ICMP Flood) a. Submit a large number of ICMP requests b. It affects the saturation of available memory c. The modern OS have a system of prevention Ping of Death • SYN Flood a. Exploits the normal operation of the 3 way Handshakiing b. Saturate the available memory c. Leave hung connections for up to 75 seconds
  • 123. Denial of Sevices - CEH - Why use DoS attack • Vandalism • As a method monitivo or activist • As anti-tracking method (Mitnick, Shimomura)
  • 124. Denial of Sevices - Joint programs DoS • Trinity - IRC DDOS • r-u-dead-yet (Rudy) - HTTP POST DDOS • Tribe - Network flood • Slowloris - HTTP DoS • Low Orbit Ion Cannon (LOIC) - DoS tool - CEH
  • 125. Denial of Sevices - CEH Questions?
  • 126. Session hijacking - CEH - What is Session Hijacking? • With the Session Hijacking refers to the exploitation and compromise of a valid session between two computers • An attacker steals a valid session ID to gain access to the system and the dti contained in it • With TCP Session Hijacking is meant when an attacker takes control of a TCP session between two computers
  • 127. Session hijacking - CEH - Types of Session Hijacking? • Enable a. Is to replace the host to which it was unearthed session • Passive a. Is to turn the traffic through the attacker who merely observe and record • Hybrid a. Similar to the passive less than find important information
  • 128. Session hijacking - CEH - Key Techniques Session Hijacking • Brute forcing a. An attacker tries different valid session ID • Stealing a. An attacker uses different techniques to steal session IDs valid • Caluclating a. An attacker tries to calculate the value of a valid session ID
  • 129. Session hijacking - CEH - Brute Forcing • Try to indivduare the session Id in the clear (no SSL) • Try to identify multiple sessions of valid ID • Sessions that do not have expiration times • Accounts that do not have the credentials Lokout
  • 130. Session hijacking - CEH - Man in the Middle • Based on Sniffing traffic • Since the ability to add packages to an existing session • It can be used to change the sequence number for groped to maintain the active user session for the purpose of inettare malicious code • you can change the payload of the packets sent by adding
  • 131. Session hijacking - CEH - Session Fixation • The attacker determines the session ID • In the case of log already made attempts to keep the session active • Phishing exploits techniques to send the session ID of the user • Once authenticated attacker is able to access the target user's data
  • 132. Session hijacking - CEH - What are the advantages of Session Hijacking • Access to the server as an authenticated user • Often the access remains hidden a. Keeping a session ID exists, replacing the orignal client b. The Hijacking is difficult to trace c. The credentials are valid • The nature of the TCP Session from the possibility of continuous access • No need to re-authenticate or alteration of the security package
  • 133. Session hijacking - CEH - Programs for Hijacking • Hamster / Ferret • Firesheep • Ettercap • Juggernaut • Hunt • T-Sight • Metasploit • SSL Strip
  • 134. Session hijacking - CEH - Countermeasures • Be used wherever possible communications on secure channels (SSL) • Cookie exchange through encrypted channels (HTTPS) • Implement systems for deauthenticate Logout user sessions • Use session ID generated only after Authorized Access • Use sequences of random numbers and letters for the generation of session keys • Use only encrypted data is exchanged between the user and webserver
  • 135. Session hijacking - CEH Questions?
  • 136. Hacking Web Servers - CEH - Suppliers Webserver current • Apache • Microsoft IIS • Lighttpd • Google • Nginx
  • 137. Hacking Web Servers - CEH - Architecture of a WebServer • Communication ports and protocols used a. HTTP (Hypertext Transfer Protocol) Port 80 b. HTTPS (Hyper-Text Transfer Protocol over Secure Socket Layer) Port 443 • Manages requests received from clients with various methods a. GET b. POST c. TRACE • Potentially vulnerable a. GET / POST malformed b. SQL Injection c. Configuration Errors d. Etc. ..
  • 138. Hacking Web Servers - CEH - Impact of attacks on WebServer • Compromise of user accounts • Tampering with data managed • As a bridge to other web attacks • Abduction of information • Administrative access to the server or other applications • Site managed defacement
  • 139. Hacking Web Servers - CEH - Some types of attack on the WebServer • Configuration errors WebServer a. Administrative capabilities enabled b. Error messages or debug information-rich c. Backup, old copies of configuration files, scripts d. Anonymous user test with password or easily ascertainable enabled e. Etc. ..
  • 140. Hacking Web Servers - CEH - Some types of attack on the WebServer • Directory Traversal a. Access to confidential directory of the system b. Running external commands to the WebServer c. Access to confidential information d. Use UNICODE encoding to mask requests
  • 141. Hacking Web Servers - CEH - Some types of attack on the WebServer • Tampering with the parameters of the request (URL) a. Changing the parameters exchanged between client and serves b. Example: http://www.example.com/sample? a = 1234 & b = 456 & admin = 1 • URL Obfuscation a. UNICODE encoding, Binary, Decimal, etc ...
  • 142. Hacking Web Servers - CEH - Some types of attack on the WebServer • Source Code Analysis a. Discovery of DIrectory sensitive, any servers or services b. Users and Passwords c. ID preconfigured sessions or defualt • Password a. Brute Force Attack b. Dictionary attack c. Attack hybrid d. Simple passwords
  • 143. Hacking Web Servers - CEH - Meotodologia to attack the WebServer (1/2) • Collection information a. Collection of information about the target company b. Search news groups, forums, etc. c. Whois, Traceroute, etc. structure systems victim • Identification of the type of WebServer a. Type of server, operating system, etc ... • Copy of the structure of Website a. Create a copy of the site structure b. Find useful comments within the code
  • 144. Hacking Web Servers - CEH - Meotodologia to attack the WebServer (2/2) • Scanning for known vulnerabilities a. Identify any weaknesses in the system b. HP WebInspect, Nessus, etc ... • Session Hijacking a. Sniffing valid session ID for unauthorized access b. Burp Suite, Paros Proxy, Hamster, FireSheep • Hacking Passwords used by the WebServer a. Groped to find passwords with various techniques useful b. Brutus, THC-Hydra, etc ...
  • 145. Hacking Web Servers - CEH - Countermeasures • Regular scanning and patch systems • Apply any update provided by the manufacturers of the software • Ensure that all systems have the same versions of Service Pack, Hotfixes and Security Patches • Provide a plan for disaster recovery and backup systems in the event of a recovery is required
  • 146. Hacking Web Servers - CEH Questions?
  • 147. Hacking Web Apps - CEH - Defining a Web Application • It 'a communication interface between the user and the Web Server consists of several server-generated pages that contain the same scripts or commands to be executed dynamically dul Browser User • Businesses rely on web applications, but in general on web technology as a key support for business processes and improvements of the same
  • 148. Hacking Web Apps - CEH - Components of a Web App • The Web Server • The application Content • Data Access
  • 149. User Web Server OS Command Hacking Web Apps - CEH - Funionamento a Web App User request Output DBMS Web Application ... ... ... ...
  • 150. Hacking Web Apps - CEH - Types of attacks Web App (1/2) • SQL Injection a. The most common attacks and the more functional b. Sfruttta input modules present in web pages c. Forca login requests to obtain valid credentials d. interface to the DB (alter, insert, delete table) • Automated tools a. SQL Map b. SQL Ninja c. Havis d. Etc. ..
  • 151. Hacking Web Apps - CEH - Types of attacks Web App (2/2) • Cross Site Scripting (XSS) a. Forces the execution of the script actions not foreseen b. Executing commands or software installation c. Based on an incorrect handling by the application of user input d. The tag for excellence to indicate an XSS "<script>" • Cross Site Request Forgery (CSRF) a. Force the user's browser to send malicious requests without the control of the latter b. The victim uses a valid active session on a site "Trusted" while visiting a malicious site, which injects a malformed HTTP request that is turned over to the main site and carried out in a lawful manner
  • 152. Hacking Web Apps - CEH - Methodology for attack on a Web App • Get a scheme infrastructure WEB • Attack on Web Servers • Analysis of the Web • Attempting to bypass authentication mechanisms • Attempting to bypass the authorization mechanisms • Attack of the session control mechanisms • Attempted injection of packets • Attack of the possible client Web App • Attack Web services used by the application
  • 153. Hacking Web Apps - CEH - Web Application Firewall (WAF) • Firewall with Advanced Features • Specializing in defending web applications • It allows the analysis of the HTTP / HTTPS traffic to intercept and possibly dangerous lock requests • It allows you to block SQL injection attacks, buffer overflows, XSS, etc.
  • 154. Hacking Web Apps - CEH Questions?
  • 155. SQL Injection - CEH - What is SQL Injection? • SQL injection is a technique that exploits the wrong part of the application from user input validation WEB, to execute SQL commands on the DB BackEnd • The SQL Injection is an attack aimed at obtaining unauthorized access to the DataBase or the information contained in it
  • 156. SQL Injection - CEH - Types of SQL Injection attack • Bypass Authentication Methods • Disclosure of sensitive information • Compromised the integrity of the data managed • Impairment of the availability of data managed • Run remote commands
  • 157. SQL Injection - CEH - Meotdi detecting SQL Injection a. Check to see if the web application accesses the DB server b. Enumerate POSSIBLE INPT user exploitable to execute sql commands c. Simulate the insertion of code into user input fields d. Simulate entering numbers in the fields reserved for strings e. The operator UNION is used in techniques of SQL Injection to concatenate SQL statements f. Check the level of information content within error messages
  • 158. SQL Injection - CEH - Types of SQL Injection a. Simple SQL Injection • SQL Union • SQL Error b. Blind Injection
  • 159. SQL Injection - CEH - Simple SQL Injection Attacks • Store System procedures a. Attacks are based on the use of "store procedures" already in the DB b. UNION Query SELECT name, phone, address FROM Users WHERE ID = 1 UNION ALL SELECT CreditCardNumber, 1, 1, from creditcardtable c. Tautology (true by definition Affirmation) SELECT * FROM user WHERE name = ' 'OR '1' = '1 '; d. Commenting on the end of the line SELECT * FROM user WHERE name = 'x' AND userid IS NULL; - '; e. Understanding the structure of the DB via requests with parameters that are not allowed
  • 160. SQL Injection - CEH - Blind SQL Injection • It 'a technique used when the Web application is subject to SQL injection but but the answers are not visible to the attacker • the Blind SQL Injection exploit the same philosophy of normal SQL Injection except for the fact that the attacker is not able to see the specific error generated • This type of attack can become very expansive in terms of time because of the excessive amount of requests from having to send for every single bit of information obtained
  • 161. SQL Injection - CEH - Methodology SQL Injection attack a. Collection information b. Sniffing out a vulenrabilità SQL Injction c. Exploit the vulnerability found d. Extract data from the Data Base e. Interacting with the Operating System f. Compromise the entire network
  • 162. SQL Injection - CEH - Programs for SQL Injection a. SQL Power Injection (http://www.sqlpowerinjector.com/) b. BSQLHAcker (http://labs.portcullis.co.uk/tools/bsql- hacker /) c. Marathon Tool (http://marathontool.codeplex.com/) d. Absinthe (https://github.com/HandsomeCam/Absinthe) e. SqlNinja (http://sqlninja.sourceforge.net/) f. Sqlmap (http://sqlmap.org/)
  • 163. SQL Injection - CEH - Countermeasures a. Use account with minimum privileges on the DB b. Disable the functions or procedures not necessary to the performance of the application c. Monitor connections with IDS, WAF, etc. d. Use custom error messages e. Filtering Data Client f. Provide of controls of safety in data passed by the application to make requests to the Data Base
  • 164. SQL Injection - CEH Questions?
  • 165. Hacking Wireless - CEH - Wireless LAN - Bluethoot
  • 166. Hacking Wireless - CEH - Wireless LAN • The Wi-Fi was developed according to the IEEE 802.11 and is widely used in wireless communication, as it provides access to applications and data over the wireless network • The standardized Wi-Fi set nuemrosi ways to use a connection between the transmitter and the receiver, such as DSSS, FHSS, Infrared (IR) and OFDM
  • 167. Hacking Wireless - CEH - Types of Wireless • As an extension of a wired network • Multiple Access Points • LAN-to-LAN Wireless Network (Bridge Mode) • 3G Hotspot
  • 168. Hacking Wireless - CEH - Wireless Standard • 802.11a: bandwidth up to 54 Mbps, 5 GHz frequency used • 802.11b bandwidth up to 11 Mbps, 2.4 GHz frequency used • 802.11g: up to 54 Mbps bandwidth, use higher frequency of 2.4 GHz • 802.11i is a standard that goes back 802 .11a/b/g inserting an improvement in cryptography for networks • 802.11n: 100Mbps bandwidth over the • 802.16: A standard for wireless broadband developed for the MAN (Metropolitan Area Network) • Bluethoot: standard range with very small (<10 m) and low-low speed (1-3 Mbps), developed for low-power network devices such as PDAs
  • 169. Hacking Wireless - CEH - Types of encryption used in wireless • WEP a. It 's the first and the old standard used in wireless communications • WPA a. Use 48 BIT IV b. 32 Bit CRC c. TKIP encryption • WPA2 a. Use AES encryption (128 bit) and CCMP • WPA2 Enterprice a. It integrates with the standard WPA EAP
  • 170. Hacking Wireless - CEH - How to decrypt the WEP • Configure the interface wireless into monitor mode on a specific channel of the access point • Verify the ability to inject packets to the AP • Use a program like aireplay-ng to simulate false authentication to the AP • Run a sniffer to collect unique IV • Use a tool to extract the encryption key from the collected IV
  • 171. Hacking Wireless - CEH - How to decrypt the WPA/WPA2 • WPA PSK WPA PSK it uses a user-selected key to initialize the TKIP that can not be violated as a precompiled package, but it can 'be unearthed with a dictionary attack Brute-Forced • Brute-Force WPA Use a program such as aircrack, aireplay, KisMAC to try to find the key • Attack Offline Collect a considerable number of packets so as to obtain WPA/WPA2 authentication handshake • Attack deautentica that clients connected Is to force the client already connected to the AP disconnect and reconnect in order to collect authentication packets for subsequent cracking
  • 172. Hacking Wireless - CEH - Methodology attacks Wireless • Locating the Wi-Fi network target • GPS mapping • Wireless Network Traffic Analysis • Attack on the Wi-Fi network • Cracking the encryption used • Impaired Wi-Fi network
  • 173. Hacking Wireless - CEH - Bluetooth • Easy to use • Easy to detect • Types of Attack a. BlueSmacking b. Bluejacking c. BlueSniffing d. Bluesnarfing
  • 174. Hacking Wireless - CEH Questions?
  • 175. Evading IDS, Firewalls, Honeypots - CEH - IDS - Firewall - Snort - HoneyPot
  • 176. Evading IDS, Firewalls, Honeypots - CEH - IDS • An Intrusion Detection System (IDS) is a system that collects and analyzes information from a computer or a network, in order to identify possible violations of security policies • With IDS identifies a system of "packet-sniffer", which intercepts packets traveling, for example, a wild TCP / IP network • The packets are analyzed after they were caught • An IDS evaluates a suspected intrusion once it has taken place and signals an alarm
  • 177. Evading IDS, Firewalls, Honeypots - CEH - Methods for the identification of an intrusion • Identification by signatures (Signaure Recognition) This type of system attempts to identify the events that improper use of the system. • Identification of anomalies (Anomaly Detection) You try to identify threats based on analysis of behavior characteristic of a user or a fixed component in a system • Identification of abnormalities in the communication protocol (Protocol Anomaly Detection) The models used for this type of recognition are based on the specifications of the protocol used. For example, the TCP / IP
  • 178. Evading IDS, Firewalls, Honeypots - CEH - Types of Intrusion Detection System (1/2) • Based on the Network a. This system typically consists of a blackbox placed inside the network, which captures traffic in promiscuous mode and tries to identify threats based on preset patterns • Host-based a. This system is based on listening to the events generated by a specific host b. It is not commonly used due to the excessive workload for monitoring
  • 179. Evading IDS, Firewalls, Honeypots - CEH - Types of Intrusion Detection System (2/2) • Monitoring of log files a. This type of system is based on a program that scans the log files looking for events that have already happened • Checking file integrity a. This type of system checks for the presence of any Trojan Horse present or changed files that indicate the possible presence of an intrusion. b. Tripwire (http://www.tripwire.com/)
  • 180. Evading IDS, Firewalls, Honeypots - CEH - Firewall • It 'a system hardware, software designed to prevent unauthorized access to or from a private network • And 'placed at strategic points such as junctions or as a network gateway • A firewall monitors all messages entering and leaving the private network, blocking those that do not meet specific security criteria • Firewalls only care about the type of traffic, addresses and destination ports
  • 181. Evading IDS, Firewalls, Honeypots - CEH - DeMilitarized Zone (DMZ) • The DMZ is an isolated segment of the LAN, accessible from both internal and external networks, but characterized by the fact that the hosts on the DMZ certificates have limited possibilities of connection to specific hosts on the internal network • It is created using a Firewall with at least 3 physical network adapters, which are assigned specific rules as Trusted Network, Network and Network DMZ Un-Trusted External (Internet)
  • 182. Evading IDS, Firewalls, Honeypots - CEH - Types of Firewall (1/2) • Packet Filter a. It works at the network layer of the OSI model b. Each packet is analyzed according to established rules before being forwarded c. The rules can be specified IP address, source port or destination and the type of protocol • Circuit-Level Gateway a. It works at the level of the OSI Model Session b. To identify a legitimate connection monitors TCP handshaking c. The information passed to the remote computer have as their origin the Gateway / Firewall d. This type of firewall is able to macherare the information about the network that protects but does not filter the packets individually
  • 183. Evading IDS, Firewalls, Honeypots - CEH - Types of Firewall (2/2) • Applicaiton-Level a. It works at the Application layer of the OSI model b. It does not allow access to services that are not proxati the Firewall c. When configured as a Web Proxy services like FTP, telnet, and others are not allowed d. Acting on the application level this kind of devices are able to filter the specific application commands. For example, GET or HTTP Post • Stateful Multilayer Inspection a. This kind of Firewall and combines the functionality of previous models b. They work by filtering packets at the network layer to identify a legitimate session and pass the inspection of the content for the application
  • 184. Evading IDS, Firewalls, Honeypots - CEH - Intrusion Detection System: Snort • Open source IDS can analyze traffic in real-time and to log any problems of a network • And 'able to analyze the protocols and contents of the package to detect attempted attacks, buffer overflow, Port Scan, attacks to CGI scripts, etc.. • Use language for writing their own rules • Uses of Snort a. Dirattamente as simple as sniffer TCP Dump b. Recorder of packets (for any network problems) c. As IPS (Intrusion Prevention System)
  • 185. Evading IDS, Firewalls, Honeypots - CEH - The Snort rules • The rules engine allows you to create personal rules and specifications for the various types of network and use that if you want to do • The Snort rules allow distunguere between normal browsing activity, network activity lawful, and activities such as "mischievous" • The rules must be contained in a single line, the parser does not allow the preparation of more 'lines • The Snort rules are logically divided into two parts: a. Header of the rule (Rule Header): identifies the action that the rule will execute. For example, alert, log, pass, activate, etc.. b. options of the rule (Rule Option): identifies the message alert rule
  • 186. Evading IDS, Firewalls, Honeypots - CEH - HoneyPot • It 'a system used and configured specifically to attract and trap those who attempt to penetrate our network • Simulates a system or service vulnerable and easily hackerabile • Uses: a. Sutdio of attack methods used b. Study of the sources of attack c. How effective palliative to protect the real target systems • Must be positioned so im segregated compared to the production environment • Verify the legality of use of this type of systems
  • 187. Evading IDS, Firewalls, Honeypots - CEH - Preventing IDS • Identify any interfaces in promiscuous mode a. AntiSniff program b. NEPAD program antisniffer • Intercepting the IDS alerts sent • Use techniques of evasion or polymorphic shellcode • Attach the IDS: a. Snort Vulnerability b. Vulenrabilità OS or in exposed services
  • 188. Evading IDS, Firewalls, Honeypots - CEH Questions?
  • 189. Buffer Overflow - CEH - Defining Buffer Overflow - Method Buffer Overflow - Identify a Buffer Overflow - Countermeasures to Buffer Overflow
  • 190. Buffer Overflow - CEH - Defining Buffer Overflow • It 'a security vulnerability that occurs when a program does not properly check the length of the incoming data, but merely write down their value in a baffer fixed length, trusting that the data do not exceed more than previously allocated
  • 191. Buffer Overflow - CEH - Why do the programs and applications are vulnerable? • Controls are ineffective or absent in many cases with regard to the data managed • In many cases, the same programming languages used are subject to vulnerability • Prograami and applications are developed following the Best Practies safety • Functions such as strcat (), strcpy (), sprintf (), vsprintf (), gets (), scanf (), used in "C" may be subject to buffer overflow in that they do control the length of the buffer
  • 192. Buffer Overflow - CEH - The Stack and Buffer Overflow • A stack buffer overflow occurs when a buffer is overwritten on the stack space • An attacker can exploit this issue, coming into possession of the control flow of the stack and execute arbitrary code
  • 193. Buffer Overflow - CEH - The Heap Buffer Overflow and the • When a program copies data in memory, without having carried out the necessary checks, it can be exploited by an attacker to gain control of the information managed heap • An attacker creates a buffer to fill the bottom of the heap and overwrite the other dynamic variables with unexpected effects from the normal execution of the program
  • 194. Buffer Overflow - CEH - Method Buffer Overflow • Find the presence of a possible buffer overflow and what is the condition triggering • Send more data than the program can handle • Overwrite the return address of a function • Run your own malicious code (Shellcode)
  • 195. Buffer Overflow - CEH - How to Identify a Buffer Overflow? a. Run a program on your own machine b. Insert large amounts of data with control characters identifiable. For example, "$ $ $ $" at the end of a string c. In the event of a crash program d. Look in the dump of the program the control character used to identify the trigger point of Buffer Overflow e. Setup using a debugger (gdb, OllyGdb, etc.). Analyze the behavior of the program f. Writing the exploit that exploits the buffer overflow found just
  • 196. Buffer Overflow - CEH - Countermeasures to Buffer Overflow • Manual code review • Tecnihce Compilation • Use Libraries for developing secure • Disabling stack execution • Use destination randomiche Stack • Implement controls in real-time
  • 197. Buffer Overflow - CEH Questions?
  • 198. Cryptography - CEH - What is Encryption? • Encryption is the conversion of a given data into encrypted code • Encryption can be used to protect: a. E-mail messages b. Information on credit cards c. Sensitive Data d. etc.. • Objectives of cryptography a. Discretion b. Integrity c. Non-repudiation d. Authenticity
  • 199. Cryptography - CEH - Types of Encryption • Symmetric Cryptography Symmetric encryption uses the same key to encrypt and decrypt a given data (secret-key, shared-key, private-key) • Asymmetric encryption Asymmetric encryption uses different keys for encryption and decryption. These keys are identified as public and private key (public- key) • Hash Functions the hash function does not use any key to encrypt or decrypt
  • 200. Cryptography - CEH - Encryption Algorithms • The encryption algorithms are used to encrypt and decrypt data • Algortmi classic a. Replacing figures It consists in the replacement of bits, characters, or blocks of characters with different bits, characters, or blocks b. Transposition of digits The letters of the plaintext are moved tot positions to create the ciphertext • Modern algorithms a. Based on types of keys used Private key: the same key to encrypt and decrypt Public key: two different keys to encrypt or decrypt b. Based on the types of input • Block cipher: encryption of data blocks according to a fixed length • Stream cipher: Encryption of a continuous data stream
  • 201. Cryptography - CEH - Symmetric encryption • Same key to encrypt and decrypt • ECB / CBC and other variants • The key is difficult to distribute • Since DES AES a. NIST Competition 1995-2001 b. Originally called Rijndael
  • 202. Cryptography - CEH - Asymmetric encryption • ECDSA: based dulle ellipses • RSA is based on prime numbers • Two public and private keys a. If encrypted with Private, Public deciphered with b. If encrypted with the Public, Private deciphered with
  • 203. Cryptography - CEH - Hash • From a text a "number" unique and irreversible • The limits of hash collisions • Algortmi hash: a. MD5 b. SHA-1, c. Etc..
  • 204. Cryptography - CEH - Symmetric Asymmetric + + Hash • Certificates • Digital Signature • Authentication (Strong Autentication) - Use: • GSM • SSL • Etc. ..
  • 205. Cryptography - CEH Questions?
  • 206. Pen Testing - CEH - Penetration Test • A Pentest simulates the methods used by intruders to gain unauthorized access to the network and resources of an organization, for the purpose of compromising data and information • When carrying out safety tests, the tester is limited by available resources, such as time, expertise and access to equipment as specified in the indemnity • Many attacks follow a common approach to violate the security of a system
  • 207. Pen Testing - CEH - Security Assessments • Every organization uses different types of security assessment to validate the security level of resources within the network • Categories of Security Assessment: a. Security Audit b. Vulnerability Assessment c. Penetration Testing • Each type of Security Assessment requires on the part of those who lead testing different skill levels
  • 208. Pen Testing - CEH - Vulnerability Assessment • Network Scanning • Scanning tools • Security Errors • Test systems and network
  • 209. Pen Testing - CEH - Limitations of Vulnerability Assessment • The scanning programs used to identify vulnerabilities are limited to a given point of time • Need to be updated when they come new vulnerabilities or funzinoalità • This affects the result of the evaluation • The methodologies used by the various softaware and options used may give different results in tests
  • 210. Pen Testing - CEH - Penetration Testing • The pentest not carried out in a professional manner, can cause serious disruption to normal service delivery • The pentest verify the security model of the company as a whole • Detect potential threats that would be exploited in a real attack • The testers are differentiated by attackers only by the end of their actions
  • 211. Pen Testing - CEH - What should be tested? • Communication errors, abuse of e-commerce, loss of credentials, etc. • Public systems exposed; websites, mail servers, platforms, remote access (RDP, VPN, etc.). • Mail, DNS, Firewalls, passwords, FTP, IIS, and webserver
  • 212. Pen Testing - CEH - What makes a pentest reliable? • Establish a perimeter precise PenTest; objectives, limitations, gisutificazione of the procedures used • Relying on experienced professionals and competent to perform the tests • Choose a suitable test set that balances costs and benefits • Follow methodologies planned and well-documented • Document the results in a complete and asaustiva, but most clearly understood by the final customer • Highlight chairamente in the final report of the potential risks and vulnerabilities solutions
  • 213. Pen Testing - CEH - Types of Penetration Testing (1/2) • From the outside a. The external PenTest provide this information by analyzing the full public tiguardanti the target (eg email server, web server, firewall, router, etc.) b. And 'the traditional approach to penetration testing c. The tests are focused only on the server, the infrastructure and the basic software of the target d. The tests may be done: • without any prior information of the target (Black Box) • with comprehensive information about the type and environment that you will be tested (Gray / White box)
  • 214. Pen Testing - CEH - Types of Penetration Testing (2/2) • From a. The tests are efettuati from every possible point of access b. Within an object, test access from external locations, branch offices, DMZ, etc.. c. The tests basically follow from the methods used for testing but add an external point of view much more comprehensive infrastructure
  • 215. Pen Testing - CEH - Black-box Penetration Testing • No knowledge of the infrastructure to be tested • It comes usually just the name of the company • The tests faithfully simulate an attack real • Provides a considerable amount of time spent on information retrieval and understanding of the infrastructure to be tested • It 'a kind of test expensive and time-consuming
  • 216. Pen Testing - CEH - Gray-box Penetration Testing • Limited knowledge of the infrastructure to be tested • Perform internal security assessment and testing • Focused on the security of the applications that head all the possible vulnerabilities that an attacker could exploit • It runs mostly 'when starting from a Black box testing, we need a deeper understanding of a well-protected system for further investigation of possible vulnerabilities
  • 217. Pen Testing - CEH - White-box Penetration Testing • Complete knowledge of the infrastructure to be tested • The tests simulate the actions committed by employees of the company evenutali • The preliminary information provided: a. The infrastructure of the company b. Type of network c. The security measures taken d. Firewall, Indirizzamneto network, IDS, etc.. e. The company policy on what and what not to do
  • 218. Pen Testing - CEH - Stages of a Penetration Testing (1/3) • Phase preattacco a. This phase deals with the ways in which it will be tested and the objectives to be achieved b. The portion of the acquisition of information about dental on the target is considered essential in this phase of initial c. He formulates a plan of attack to follow d. Can be of two types: Reconnaissance passive collect target information from the information public Active Reconnaissance: Collect information through publications on social-network, social engineering, web sites visited, interviews, questionnaires, etc..
  • 219. Pen Testing - CEH - Stages of a Penetration Testing (2/3) • Attack phase a. Penetrate the perimeter to gain unauthorized access to the network b. Capturing | Costasur.com safety of the various target c. Compromised systems, access to data managed, running exploits, etc.. d. Escalating privileges
  • 220. Pen Testing - CEH - Stages of a Penetration Testing (3/3) • Phase postattacco a. Being more 'criticism of the whole process b. Is to "clean up" the traces of the action taken by the tester, in order to bring the systems before testing c. The actions include: • Removal of the copied files on the systems • Cleaning of the registers or vulnerabilities created • Exploit or removal of any programs used • Disable any share or unauthorized connections • Analysis of the results found and presentation of the same customer
  • 221. Pen Testing - CEH Questions?
  • 222. Th ank you Make a basic course on "Penetration test". https://www.udemy.com/basic-professional-penetration- tests/?couponCode=HACKING% 408 Hacking Basic Professional Penetration Test Designed to perform in penetration testing and web security, a good way to become a Certified Ethical Hacking! Price lowered to $ 8