SlideShare a Scribd company logo
1 of 70
Lesson 3-Hacker Techniques
Overview  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hacker’s Motivation  ,[object Object],[object Object],[object Object]
Hacker’s Motivation  ,[object Object],[object Object],[object Object],[object Object]
Hacker’s Motivation  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Historical Hacking Techniques  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Historical Hacking Techniques  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Historical Hacking Techniques  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Password Supplement to text ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Password Supplement to text ,[object Object],[object Object],[object Object]
Password Supplement to text ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Password Supplement to text ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Password Supplement to text ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Password Supplement to text ,[object Object],[object Object],[object Object],[object Object],[object Object]
Historical Hacking Techniques  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Historical Hacking Techniques  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Historical Hacking Techniques  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SYN flood DoS attack ,[object Object],[object Object],[object Object],[object Object]
Historical Hacking Techniques  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Smurf DDos attack Gets all the ping responses from all members of the broadcast
Historical Hacking Techniques  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Historical Hacking Techniques  The architecture of DDoS attacks.
Advanced Techniques  ,[object Object],[object Object]
Sniffer suppliment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sniffing Switch Networks  ,[object Object],[object Object],[object Object]
Sniffing Switch Networks  ,[object Object],[object Object],[object Object],[object Object]
Sniffing Switch Networks  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sniffing Switch Networks  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sniffer suppliment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sniffer suppliment ,[object Object],[object Object],[object Object]
Examples of Sniffers Windows version of TCPdump Free Windump Sniffer that decodes and prints many common protocols Analyzes only layers 3 and 4 protocols Free TCPdump Also an IDS Free Snort Decodes many specialized protocols Commercial Network Associates Sniffer Specializes in switched networks and man-in-the-middle sniffing Free Ettercap Graphical sniffer with additional analysis functions Analyzes all 7 layers of the OSI model Free Ethereal Suite of sniffing tools; including tools for sniffing switched networks Free Dsniff Comments Availability Sniffer
Details OF IP Spoofing ,[object Object],[object Object],[object Object]
IP Spoofing  Details of IP spoofing Not sent back to Hacker’s machine The sequence number must be guessed and this must be done _________ ___________________________________________________________________________________
IP Spoof attack results ,[object Object],[object Object]
IP Spoofing Example  Using IP spoofing in the real world ,[object Object],[object Object],[object Object],[object Object]
Malicious Code  ,[object Object]
Computer Viruses  ,[object Object],[object Object],[object Object],[object Object]
How computer viruses spread… ,[object Object],[object Object]
Trojan Horse Programs  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Worms  ,[object Object],[object Object],[object Object],[object Object]
Process of an attack ,[object Object],[object Object],[object Object]
Process of an attack cont.. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process of an attack cont.. ,[object Object],[object Object]
Process of an attack cont.. ,[object Object],[object Object],[object Object],[object Object]
Process of an attack cont.. ,[object Object],[object Object]
Methods Used by  Untargeted  Hacker ,[object Object],[object Object],[object Object]
Methods Used by  Untargeted  Hacker cont… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods Used by  Untargeted  Hacker cont… Stealth scanning SYN I can send a reset because I know the system is up
Methods Used by  Untargeted  Hacker cont… Reset scans So… Indicates the target system exists
Methods Used by  Untargeted  Hacker cont… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods Used by  Untargeted  Hacker cont… ,[object Object],[object Object],[object Object]
Methods Used by  Untargeted  Hacker cont… ,[object Object],[object Object],[object Object]
Methods Used by  Untargeted  Hacker cont… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Rootkit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methods Used by  Targeted  Hacker  ,[object Object],[object Object],[object Object]
Methods Used by  Targeted  Hacker  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods Used by  Targeted  Hacker ,[object Object],[object Object],[object Object],[object Object]
Methods Used by  Targeted  Hacker  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods Used by Targeted Hacker  ,[object Object],[object Object],[object Object],[object Object]
Vulnerability scanner supplement ,[object Object],[object Object]
Versions of vulnerability scanners ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methods Used by  Targeted  Hacker  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methods Used by  Targeted  Hacker  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods Used by  Targeted  Hacker  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods Used by  Targeted  Hacker  ,[object Object],[object Object],[object Object],[object Object]
Summary  ,[object Object],[object Object],[object Object]
Summary  ,[object Object],[object Object],[object Object]
Summary  ,[object Object],[object Object],[object Object]
Summary  ,[object Object],[object Object]
Homework due next class ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudyMohammad Mahmud Kabir
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Arsenal Football Club Scouting Report
Arsenal Football Club Scouting Report Arsenal Football Club Scouting Report
Arsenal Football Club Scouting Report Jose Silva Caparros
 
An Introduction of SQL Injection, Buffer Overflow & Wireless Attack
An Introduction of SQL Injection, Buffer Overflow & Wireless AttackAn Introduction of SQL Injection, Buffer Overflow & Wireless Attack
An Introduction of SQL Injection, Buffer Overflow & Wireless AttackTechSecIT
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardShafaan Khaliq Bhatti
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutionseroglu
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 

Viewers also liked (18)

Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Protocols for Public Key Management
Protocols for Public Key ManagementProtocols for Public Key Management
Protocols for Public Key Management
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
FireEye
FireEyeFireEye
FireEye
 
Arsenal Football Club Scouting Report
Arsenal Football Club Scouting Report Arsenal Football Club Scouting Report
Arsenal Football Club Scouting Report
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
An Introduction of SQL Injection, Buffer Overflow & Wireless Attack
An Introduction of SQL Injection, Buffer Overflow & Wireless AttackAn Introduction of SQL Injection, Buffer Overflow & Wireless Attack
An Introduction of SQL Injection, Buffer Overflow & Wireless Attack
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
Chapter 2: Network Models
Chapter 2: Network ModelsChapter 2: Network Models
Chapter 2: Network Models
 
Wlan security
Wlan securityWlan security
Wlan security
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Message Authentication: MAC, Hashes
Message Authentication: MAC, HashesMessage Authentication: MAC, Hashes
Message Authentication: MAC, Hashes
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
 
Spoofing
SpoofingSpoofing
Spoofing
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 

Similar to Ch03

Would a wanna cry make the industry wanna cry Mysore and Lear
Would a wanna cry make the industry wanna cry   Mysore and LearWould a wanna cry make the industry wanna cry   Mysore and Lear
Would a wanna cry make the industry wanna cry Mysore and LearNSW Environment and Planning
 
Ws wireless solution
Ws   wireless solutionWs   wireless solution
Ws wireless solutionRafael Roque
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Detection and prevention of fake access point using sensor nodes
Detection and prevention of fake access point using sensor nodesDetection and prevention of fake access point using sensor nodes
Detection and prevention of fake access point using sensor nodeseSAT Journals
 
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing NetworksNYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networksrahulmonikasharma
 
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algoFalse positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algoeSAT Journals
 
Gesture control algorithm for personal computers
Gesture control algorithm for personal computersGesture control algorithm for personal computers
Gesture control algorithm for personal computerseSAT Publishing House
 
Gesture control algorithm for personal computers
Gesture control algorithm for personal computersGesture control algorithm for personal computers
Gesture control algorithm for personal computerseSAT Journals
 
Post Lab activity1
Post Lab activity1Post Lab activity1
Post Lab activity1Dwight Sabio
 
Operating System Lab Manual
Operating System Lab ManualOperating System Lab Manual
Operating System Lab ManualDwight Sabio
 
Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networksrahulmonikasharma
 
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 newStrayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 newuopassignment
 
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 newStrayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 newolivergeorg
 
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 newStrayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 newaagnaa
 
Network Security and Risk Management
Network Security and Risk ManagementNetwork Security and Risk Management
Network Security and Risk ManagementHans Oosterling
 

Similar to Ch03 (20)

NAME's Drafted Appendix - J
NAME's Drafted Appendix - JNAME's Drafted Appendix - J
NAME's Drafted Appendix - J
 
Would a wanna cry make the industry wanna cry Mysore and Lear
Would a wanna cry make the industry wanna cry   Mysore and LearWould a wanna cry make the industry wanna cry   Mysore and Lear
Would a wanna cry make the industry wanna cry Mysore and Lear
 
Ws wireless solution
Ws   wireless solutionWs   wireless solution
Ws wireless solution
 
[IJCT-V3I2P25] Authors: Mr.S.Jagadeesan,M.Sc, MCA., M.Phil., ME[CSE]., S.Rubiya
[IJCT-V3I2P25] Authors: Mr.S.Jagadeesan,M.Sc, MCA., M.Phil., ME[CSE]., S.Rubiya[IJCT-V3I2P25] Authors: Mr.S.Jagadeesan,M.Sc, MCA., M.Phil., ME[CSE]., S.Rubiya
[IJCT-V3I2P25] Authors: Mr.S.Jagadeesan,M.Sc, MCA., M.Phil., ME[CSE]., S.Rubiya
 
Computer and Technology Today in our Lives
Computer and Technology Today in our LivesComputer and Technology Today in our Lives
Computer and Technology Today in our Lives
 
Tech Audit
Tech AuditTech Audit
Tech Audit
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Detection and prevention of fake access point using sensor nodes
Detection and prevention of fake access point using sensor nodesDetection and prevention of fake access point using sensor nodes
Detection and prevention of fake access point using sensor nodes
 
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing NetworksNYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
 
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algoFalse positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algo
 
Gesture control algorithm for personal computers
Gesture control algorithm for personal computersGesture control algorithm for personal computers
Gesture control algorithm for personal computers
 
Gesture control algorithm for personal computers
Gesture control algorithm for personal computersGesture control algorithm for personal computers
Gesture control algorithm for personal computers
 
Post Lab activity1
Post Lab activity1Post Lab activity1
Post Lab activity1
 
Operating System Lab Manual
Operating System Lab ManualOperating System Lab Manual
Operating System Lab Manual
 
Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networks
 
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 newStrayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 new
 
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 newStrayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 new
 
Computer Abstractions and Technology
Computer Abstractions and TechnologyComputer Abstractions and Technology
Computer Abstractions and Technology
 
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 newStrayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 new
 
Network Security and Risk Management
Network Security and Risk ManagementNetwork Security and Risk Management
Network Security and Risk Management
 

More from gofortution

More from gofortution (6)

Cita310chap09
Cita310chap09Cita310chap09
Cita310chap09
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
gofortution
gofortutiongofortution
gofortution
 
Best!
Best!Best!
Best!
 
gofortution
gofortutiongofortution
gofortution
 
gofortution
gofortutiongofortution
gofortution
 

Ch03

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Smurf DDos attack Gets all the ping responses from all members of the broadcast
  • 21.
  • 22. Historical Hacking Techniques The architecture of DDoS attacks.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Examples of Sniffers Windows version of TCPdump Free Windump Sniffer that decodes and prints many common protocols Analyzes only layers 3 and 4 protocols Free TCPdump Also an IDS Free Snort Decodes many specialized protocols Commercial Network Associates Sniffer Specializes in switched networks and man-in-the-middle sniffing Free Ettercap Graphical sniffer with additional analysis functions Analyzes all 7 layers of the OSI model Free Ethereal Suite of sniffing tools; including tools for sniffing switched networks Free Dsniff Comments Availability Sniffer
  • 32.
  • 33. IP Spoofing Details of IP spoofing Not sent back to Hacker’s machine The sequence number must be guessed and this must be done _________ ___________________________________________________________________________________
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48. Methods Used by Untargeted Hacker cont… Stealth scanning SYN I can send a reset because I know the system is up
  • 49. Methods Used by Untargeted Hacker cont… Reset scans So… Indicates the target system exists
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.

Editor's Notes

  1. .