Submit Search
Upload
Ceh v5 module 05 system hacking
•
5 likes
•
2,945 views
Vi Tính Hoàng Nam
Follow
Ceh v5 module 05 system hacking
Read less
Read more
Technology
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 133
Download now
Download to read offline
Recommended
Ceh v5 module 04 enumeration
Ceh v5 module 04 enumeration
Vi Tính Hoàng Nam
Ch 10: Hacking Web Servers
Ch 10: Hacking Web Servers
Sam Bowne
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffers
Vi Tính Hoàng Nam
ETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
Network security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
Vi Tính Hoàng Nam
Ch 5: Port Scanning
Ch 5: Port Scanning
Sam Bowne
Intro to modern cryptography
Intro to modern cryptography
zahid-mian
Recommended
Ceh v5 module 04 enumeration
Ceh v5 module 04 enumeration
Vi Tính Hoàng Nam
Ch 10: Hacking Web Servers
Ch 10: Hacking Web Servers
Sam Bowne
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffers
Vi Tính Hoàng Nam
ETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
Network security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
Vi Tính Hoàng Nam
Ch 5: Port Scanning
Ch 5: Port Scanning
Sam Bowne
Intro to modern cryptography
Intro to modern cryptography
zahid-mian
Footprinting
Footprinting
Duah John
Penetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
Session Hijacking
Session Hijacking
n|u - The Open Security Community
Penetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
Vi Tính Hoàng Nam
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
Vi Tính Hoàng Nam
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Eric Vanderburg
Denail of Service
Denail of Service
Ramasubbu .P
An introduction to denial of service attacks
An introduction to denial of service attacks
Rollingsherman
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
Reconnaissance
Reconnaissance
n|u - The Open Security Community
Network attacks
Network attacks
Manjushree Mashal
DDoS ATTACKS
DDoS ATTACKS
Anil Antony
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
ControlScan, Inc.
Nmap basics
Nmap basics
n|u - The Open Security Community
Pen Testing Explained
Pen Testing Explained
Rand W. Hirt
Introduction to foot printing
Introduction to foot printing
CHETAN THAKRE
Ceh v5 module 02 footprinting
Ceh v5 module 02 footprinting
Vi Tính Hoàng Nam
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
Amit Tyagi
Cryptography.ppt
Cryptography.ppt
Uday Meena
Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineering
Vi Tính Hoàng Nam
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
Vi Tính Hoàng Nam
More Related Content
What's hot
Footprinting
Footprinting
Duah John
Penetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
Session Hijacking
Session Hijacking
n|u - The Open Security Community
Penetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
Vi Tính Hoàng Nam
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
Vi Tính Hoàng Nam
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Eric Vanderburg
Denail of Service
Denail of Service
Ramasubbu .P
An introduction to denial of service attacks
An introduction to denial of service attacks
Rollingsherman
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
Reconnaissance
Reconnaissance
n|u - The Open Security Community
Network attacks
Network attacks
Manjushree Mashal
DDoS ATTACKS
DDoS ATTACKS
Anil Antony
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
ControlScan, Inc.
Nmap basics
Nmap basics
n|u - The Open Security Community
Pen Testing Explained
Pen Testing Explained
Rand W. Hirt
Introduction to foot printing
Introduction to foot printing
CHETAN THAKRE
Ceh v5 module 02 footprinting
Ceh v5 module 02 footprinting
Vi Tính Hoàng Nam
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
Amit Tyagi
Cryptography.ppt
Cryptography.ppt
Uday Meena
What's hot
(20)
Footprinting
Footprinting
Penetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
Session Hijacking
Session Hijacking
Penetration testing reporting and methodology
Penetration testing reporting and methodology
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Denail of Service
Denail of Service
An introduction to denial of service attacks
An introduction to denial of service attacks
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
Reconnaissance
Reconnaissance
Network attacks
Network attacks
DDoS ATTACKS
DDoS ATTACKS
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
Nmap basics
Nmap basics
Pen Testing Explained
Pen Testing Explained
Introduction to foot printing
Introduction to foot printing
Ceh v5 module 02 footprinting
Ceh v5 module 02 footprinting
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
Cryptography.ppt
Cryptography.ppt
Viewers also liked
Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineering
Vi Tính Hoàng Nam
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
Vi Tính Hoàng Nam
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflow
Vi Tính Hoàng Nam
Module 3 social engineering-b
Module 3 social engineering-b
BbAOC
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
Vi Tính Hoàng Nam
Ceh v5 module 03 scanning
Ceh v5 module 03 scanning
Vi Tính Hoàng Nam
CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
Vi Tính Hoàng Nam
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
Vi Tính Hoàng Nam
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
Vi Tính Hoàng Nam
Ceh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webservers
Vi Tính Hoàng Nam
The Non-Advanced Persistent Threat
The Non-Advanced Persistent Threat
Imperva
Presentation buffer overflow attacks and theircountermeasures
Presentation buffer overflow attacks and theircountermeasures
tharindunew
Ceh v5 module 14 sql injection
Ceh v5 module 14 sql injection
Vi Tính Hoàng Nam
File000140
File000140
Desmond Devendran
Ce hv6 module 49 creating security policies
Ce hv6 module 49 creating security policies
Vi Tính Hoàng Nam
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Eric Vanderburg
Cehv8 - Module 06: Trojans and Backdoors
Cehv8 - Module 06: Trojans and Backdoors
Vuz Dở Hơi
Kerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-Hash
Ankit Mehta
Module 4 Enumeration
Module 4 Enumeration
leminhvuong
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wireshark
Al Imran, CISA
Viewers also liked
(20)
Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineering
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflow
Module 3 social engineering-b
Module 3 social engineering-b
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
Ceh v5 module 03 scanning
Ceh v5 module 03 scanning
CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
Ceh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webservers
The Non-Advanced Persistent Threat
The Non-Advanced Persistent Threat
Presentation buffer overflow attacks and theircountermeasures
Presentation buffer overflow attacks and theircountermeasures
Ceh v5 module 14 sql injection
Ceh v5 module 14 sql injection
File000140
File000140
Ce hv6 module 49 creating security policies
Ce hv6 module 49 creating security policies
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Cehv8 - Module 06: Trojans and Backdoors
Cehv8 - Module 06: Trojans and Backdoors
Kerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-Hash
Module 4 Enumeration
Module 4 Enumeration
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wireshark
Similar to Ceh v5 module 05 system hacking
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hacking
Asep Sopyan
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
Vi Tính Hoàng Nam
Workshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwords
Vi Tính Hoàng Nam
Socially Acceptable Methods to Walk in the Front Door
Socially Acceptable Methods to Walk in the Front Door
Mike Felch
Password cracking and brute force tools
Password cracking and brute force tools
zeus7856
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
Joff Thyer
Common crypto attacks and secure implementations
Common crypto attacks and secure implementations
Trupti Shiralkar, CISSP
User Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
Jim Fenton
Ce hv6 module 63 botnets
Ce hv6 module 63 botnets
Vi Tính Hoàng Nam
Hacking tutorial
Hacking tutorial
MSA Technosoft
Workshop on Network Security
Workshop on Network Security
UC San Diego
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Shakacon
Windows network
Windows network
Jithesh Nair
Ceh v5 module 21 cryptography
Ceh v5 module 21 cryptography
Vi Tính Hoàng Nam
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
Inderjeet Singh
How to measure your security response readiness?
How to measure your security response readiness?
Tomasz Jakubowski
Module 5 (system hacking)
Module 5 (system hacking)
Wail Hassan
Similar to Ceh v5 module 05 system hacking
(20)
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hacking
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
Workshop on BackTrack live CD
Workshop on BackTrack live CD
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwords
Socially Acceptable Methods to Walk in the Front Door
Socially Acceptable Methods to Walk in the Front Door
Password cracking and brute force tools
Password cracking and brute force tools
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
Common crypto attacks and secure implementations
Common crypto attacks and secure implementations
User Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
Ce hv6 module 63 botnets
Ce hv6 module 63 botnets
Hacking tutorial
Hacking tutorial
Workshop on Network Security
Workshop on Network Security
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Windows network
Windows network
Ceh v5 module 21 cryptography
Ceh v5 module 21 cryptography
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
How to measure your security response readiness?
How to measure your security response readiness?
Module 5 (system hacking)
Module 5 (system hacking)
More from Vi Tính Hoàng Nam
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
Vi Tính Hoàng Nam
Catalogue 2015
Catalogue 2015
Vi Tính Hoàng Nam
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
Vi Tính Hoàng Nam
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
Vi Tính Hoàng Nam
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
Vi Tính Hoàng Nam
Các loại cáp mạng
Các loại cáp mạng
Vi Tính Hoàng Nam
Catalogue 10-2014-new
Catalogue 10-2014-new
Vi Tính Hoàng Nam
Qtx 6404
Qtx 6404
Vi Tính Hoàng Nam
Camera QTX-1210
Camera QTX-1210
Vi Tính Hoàng Nam
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
Vi Tính Hoàng Nam
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
Vi Tính Hoàng Nam
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
Vi Tính Hoàng Nam
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
Vi Tính Hoàng Nam
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
Vi Tính Hoàng Nam
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
Vi Tính Hoàng Nam
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
Vi Tính Hoàng Nam
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
Vi Tính Hoàng Nam
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
Vi Tính Hoàng Nam
I phone v1.2_e
I phone v1.2_e
Vi Tính Hoàng Nam
Android v1.3 e
Android v1.3 e
Vi Tính Hoàng Nam
More from Vi Tính Hoàng Nam
(20)
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
Catalogue 2015
Catalogue 2015
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
Các loại cáp mạng
Các loại cáp mạng
Catalogue 10-2014-new
Catalogue 10-2014-new
Qtx 6404
Qtx 6404
Camera QTX-1210
Camera QTX-1210
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
I phone v1.2_e
I phone v1.2_e
Android v1.3 e
Android v1.3 e
Recently uploaded
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
Sujit Pal
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Recently uploaded
(20)
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Slack Application Development 101 Slides
Slack Application Development 101 Slides
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Ceh v5 module 05 system hacking
1.
Module V System Hacking Ethical
Hacking Version 5
2.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Module Objective This module will familiarize you with the following: Password cracking Password attacks Identifying various password cracking tools Formulating countermeasures for password cracking Escalating privileges Executing applications Keyloggers and Spywares Spywares and keyloggers countermeasures Hiding files Understanding rootkits The use of Steganography Covering tracks
3.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Module Flow Password Cracking Password Cracking Tools Password Cracking Countermeasures Password Attacks Keyloggers and Spywares Escalating Privileges Executing Applications Hiding Files Covering Tracks Steganography Countermeasures Rootkits
4.
System Hacking: Part I Cracking
Passwords
5.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited CEH Hacking Cycle Enumeration Cracking passwords Escalating privileges Executing applicationsHiding files Covering tracks
6.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Password Types Passwords that contain only letters • HIJKLMNO Passwords that contain only numbers • 758904 Passwords that contain only special characters • $@$!() Passwords that contain letters and numbers • ax1500g Passwords that contain only letters and special characters • m@roon$ Passwords that contain only special characters and numbers • @$47$ Passwords that contain letters, special characters, and numbers • E1n@8$ CHC: Cracking passwords
7.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Types of Password Attacks Four types of password attacks Passive online attacks Active online attacks Offline attacks Non-electronic attacks CHC: Cracking passwords
8.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Passive Online Attack: Wire Sniffing Access and record raw network traffic Wait until authentication sequence Brute force credentials Considerations: • Relatively hard to perpetrate • Usually extremely computationally complex • Tools widely available CHC: Cracking passwords
9.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Passive Online Attack: Man-in-the- Middle and Replay Attacks Somehow get access to communications channel Wait until authentication sequence Proxy authentication-traffic No need to brute force Considerations: • Relatively hard to perpetrate • Must be trusted by one or both sides • Some tools widely available • Can sometimes be broken by invalidating traffic CHC: Cracking passwords
10.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Active Online Attack: Password Guessing Try different passwords until one works Succeeds with: • Bad passwords • Open authentication points Considerations: • Should take a long time • Requires huge amounts of network bandwidth • Easily detected • Core problem: bad passwords CHC: Cracking passwords
11.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Offline Attacks Time consuming LM Hashes much more vulnerable due to smaller key space and shorter length Web services available Distributed password cracking techniques available Mitigations: • Use good passwords • Remove LM Hashes • Attacker has password database Password representations must be cryptographically secure Considerations: • Moore’s law CHC: Cracking passwords
12.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Offline Attacks Try different passwords from a list Succeeds only with poor passwords Considerations: • Very fast • Core problem: bad passwords Hybrid AttackDictionary Attack Start with dictionary Insert entropy: • Append a symbol • Append a number Considerations: • Relatively fast • Succeeds when entropy is poorly used CHC: Cracking passwords
13.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Offline Attack: Brute-force Attack Try all possible passwords: • More commonly, try a subset thereof Usually implemented with progressive complexity Typically, LM “hash” is attacked first Considerations: • Very slow • All passwords will eventually be found • Attack against NT hash is MUCH harder than LM hash CHC: Cracking passwords
14.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Offline Attack: Pre-Computed Hashes Generate all possible hashes Compare to database values Storing hashes requires huge storage: • LM “Hashes”: 310 Terabytes • NT Hashes < 15 chars: 5,652,897,009 exabytes Solution: Use a time-space tradeoff CHC: Cracking passwords
15.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Non-Technical Attacks Shoulder surfing • Watching someone type his/her password • Common and successful • Mouthing password while typing Keyboard sniffing • Hardware is cheap and hard to detect • Software is cheap and hard to detect • Both can be controlled remotely Social engineering • Discussed in Module 9 CHC: Cracking passwords
16.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Password Mitigation Use the following in place of passwords: Smart cards • Two-factor authentication • Difficult to thwart • High cost of initial deployment Biometric • Two- or three-factor authentication • Usually defeated with non-technical attacks • Very expensive • Prone to failures CHC: Cracking passwords
17.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Administrator Password Guessing Assuming that NetBIOS TCP139 port is open, the most effective method of breaking into 2000/2003 is password guessing Attempting to connect to an enumerated share (ipc$, or c$) and trying user name/password Default admin$, c$, %systemdrive% shares are good starting points CHC: Cracking passwords
18.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Manual Password Cracking Algorithm Find a valid user Create a list of possible passwords Rank the passwords from high probability to low Key in each password If the system allows in – Success, or else try again peter./34dre45 Jacob/nukk Ujohn/dfdfg Rudy/98#rt System Manual Attacker CHC: Cracking passwords
19.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Automatic Password Cracking Algorithm 1. Find a valid user 2. Find encryption algorithm used 3. Obtain encrypted passwords 4. Create list of possible passwords 5. Encrypt each word 6. See if there is a match for each user ID 7. Repeat steps 1 through 6 Attack Speed 300 words / sec CHC: Cracking passwords System peter./34dre45 Jacob/nukk Ujohn/dfdfg Rudy/98#rt Dictionary Attack
20.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Performing Automated Password Guessing Performing automated password guessing is easy—simple loop using the NT/2000 shell for command based on the standard NET USE syntax 1. Create a simple user name and password file 2. Pipe this file into FOR command: C:> FOR /F "token=1, 2*" %i in (credentials.txt) do net use targetIPC$ %i /u: %j CHC: Cracking passwords
21.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited The NetBIOS Auditing Tool (NAT) is designed to explore the NetBIOS file-sharing services offered by the target system • It implements a stepwise approach to gather information and attempt to obtain file system-level access as though it were a legitimate local client If a NETBIOS session can be established at all via TCP port 139, the target is declared “vulnerable” Once the session is fully set up, transactions are performed to collect more information about the server, including any file system “shares” it offers Tool: NAT CHC: Cracking passwords
22.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Smbbf (SMB Passive Brute Force Tool) The SMB Auditing Tool is a password auditing tool for the Windows and the SMB platforms It makes it possible to exploit the timeout architecture bug in Windows 2000/XP, making it extremely fast when guessing passwords on these platforms When running a large password file against Windows 2000/XP, it shows statistics up to 1,200 logins/sec This means that you could run a commonly used English dictionary with 53,000 words against a server in under a minute CHC: Cracking passwords
23.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Legion Legion automates the password guessing in NetBIOS sessions. Legion will scan multiple, Class C, IP address ranges for Windows shares and also offers a manual dictionary attack tool CHC: Cracking passwords
24.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Hacking Tool: LOphtcrack LC4 is a password auditing and recovery package distributed by @stake software. SMB packet capture listens to the local network segment and captures individual login sessions CHC: Cracking passwords
25.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Microsoft Authentication NTLM (NT LAN Manager) is a challenge/response form of authentication that was the default network authentication protocol in Windows NT 4.0/Windows 2000 Microsoft has upgraded its default authentication protocol to Kerberos, a considerably more secure option than NTLM CHC: Cracking passwords
26.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited LM, NTLMv1, and NTLMv2 Attribute LM NTLMv1 NTLMv2 Password case sensitive No Yes Yes Hash key length 56bit + 56bit - - Password hash algorithm DES (ECB mode) MD4 MD4 Hash value length 64bit + 64bit 128bit 128bit C/R key length 56bit + 56bit + 16bit 56bit + 56bit + 16bit 128bit C/R algorithm DES (ECB mode) DES (ECB mode) HMAC_MD 5 C/R value length 64bit + 64bit + 64bit 64bit + 64bit + 64bit 128bit CHC: Cracking passwords
27.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited NTLM and LM Authentication on the Wire ClientClient ServerServer Authentication Request Server – Challenge - nonce LM Response – DES (LM Hash, nonce) NTLM Response – DES (Unicode pwd, nonce) Authentication Result
28.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Kerberos Authentication
29.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited What is LAN Manager Hash? Example: Let’s say that the password is: 123456qwerty When this password is encrypted with the LM algorithm, it is first converted to all uppercase: 123456QWERTY The password is padded with null (blank) characters to make it 14 characters in length: 123456QWERTY_ Before encrypting this password, 14 character string is split in half: 123456Q and WERTY_ Each string is individually encrypted and the results concatenated: 123456Q = 6BF11E04AFAB197F WERTY_ = F1E9FFDCC75575B15 The hash is 6BF11E04AFAB197FF1E9FFDCC75575B15 Note: The first half of the hash contains alphanumeric characters and it will take 24 hrs to crack by Lophtcrack, and the second half only takes 60 seconds. LM hashes are not salted CHC: Cracking passwords
30.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited LM “Hash” Generation Padded with NULL to 14 characters Converted to uppercase Separated into two 7-character strings KeyKey Constant cehman1 CEHMAN 1******1******== ++ LM Hash KeyKey Constant Concatenate DESDES DESDES
31.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited LM Hash The first 8 bytes are derived from the first 7 characters of the password and the second 8 bytes are derived from characters 8 through 14 of the password If the password is less than 7 characters, then the second half will always be 0xAAD3B435B51404EE Let's assume, for this example, that the user's password has an LM hash of 0xC23413A8A1E7665f AAD3B435B51404EE LC4 will crack the password as "WELCOME" 16-byte NTLM hash (md4)16-byte LM hash 1st 8 bytes of LM hash 2nd 8 bytes of LM hash from first 7 chars from second 7 chars CHC: Cracking passwords
32.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Salting Salting technique prevents deriving passwords from password file Stored representation differs Side effect: defeats pre-computed hash attacks Alice:root:b4ef21:3ba4303ce24a83fe0317608de02bf38d Bob:root:a9c4fa:3282abd0308323ef0349dc7232c349ac Cecil:root:209be1:a483b303c23af34761de02be038fde08 Same Password
33.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited PWdump2 and Pwdump3 PWdump2 decrypts a password or password file. It uses an algorithmic approach as well as brute forcing pwdump3 is a Windows NT/2000 remote password hash grabber. Use of this program requires administrative privileges on the remote system CHC: Cracking passwords
34.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Rainbowcrack Hash cracker Pre-computes all possible plaintext-ciphertext pairs in advance and stores them in the file called “rainbow table” CHC: Cracking passwords
35.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Hacking Tool: KerbCrack KerbCrack consists of two programs, kerbsniff and kerbcrack. The sniffer listens on the network and captures Windows 2000/XP Kerberos logins. The cracker can be used to find the passwords from the capture file using a brute-force attack or a dictionary attack CHC: Cracking passwords
36.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Hacking Tool: NBTDeputy NBTDeputy registers a NetBIOS computer name on the network and responds to NetBT name-query requests It helps to resolve IP address from the NetBIOS computer name, which is similar to Proxy ARP This tool works well with SMBRelay For example, SMBRelay runs on a computer as ANONYMOUS-ONE and the IP address is 192.168.1.25. NBTDeputy is also run on 192.168.1.25. Then, SMBRelay may connect to any XP or .NET server when the logon users access "My Network Places" CHC: Cracking passwords
37.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited NetBIOS DoS Attack Sending a NetBIOS Name Release message to the NetBIOS Name Service (NBNS, UDP 137) on a target NT/2000 machine forces it to place its name in conflict so that the system will no longer will be able to use it This will block the client from participating in the NetBIOS network Tool: nbname.cpp • NBName can disable entire LANs and prevent machines from rejoining them • Nodes on a NetBIOS network infected by the tool will think that their names already are being used by other machines CHC: Cracking passwords
38.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Hacking Tool: John the Ripper It is a command-line tool designed to crack both Unix and NT passwords The resulting passwords are case insensitive and may not represent the real mixed-case password CHC: Cracking passwords
39.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Password guessing is a tough task Why not just sniff credentials off the wire as users log in to a server and then replay them to gain access? If an attacker is able to eavesdrop on NT/2000 logins, then this approach can spare lot of random guesswork Password Sniffing CHC: Cracking passwords
40.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Sniffing Hashes Using LophtCrack CHC: Cracking passwords
41.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: ScoopLM This tool captures LM/NTLM authentication exchange on the network Supports microsoft- ds, Active Directory, NTLMv2 on NetBIOS over TCP/IP, Telnet, IIS (HTTP), and DCOM over TCP/IP CHC: Cracking passwords
42.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited SMBRelay Man-in-the-Middle Scenario Victim client 192.168.234.220 Attacker 192.168.234.50 Relay address 192.168.234.252 Victim server 192.168.234.34 HR data Man-in-the-middle 192.168.234.251 The attacker in this setting sets up a fraudulent server at 192.168.234.251, a relay address of 192.168.234.252 using /R, and a target server address of 192.168.234.34 with /T. c:> smbrelay /IL 2 /IR /R 192.168.234.252 /T 192.168.234.34 When a victim client connects to the fraudulent server thinking it is talking to the target, MITM server intercepts the call, hashes the password, and passes the connection to the target server. CHC: Cracking passwords
43.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Attacker cracks the hashes using LOphtcrack John's hash, dfsd7Ecvkxjcx77868cx6vxcv, is transmitted over the network Eavesdropping on LM responses becomes much easier if the attacker can trick the victim to attempt Windows authentication of the attacker's choice The basic trick is to send an email message to the victim with an embedded hyperlink to a fraudulent SMB server When the hyperlink is clicked, the user unwittingly sends his credentials over the network Redirecting SMB Logon to the Attacker CHC: Cracking passwords
44.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited SMB Replay Attacks Trick client computer to request a connection Request connection to the client computer and collect challenge Return challenge from client computer as own challenge Wait for response from client computer Return response as own response Best way of fighting SMB replay attack is by enabling SMB signing in security policy CHC: Cracking passwords
45.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited SMB Replay Attacks 1. Hey, I want to connect.1. Hey, I want to connect. 2. What a coincidence,2. What a coincidence, so do I.so do I. 3. OK, here is3. OK, here is a challenge.a challenge. 4. Thanks! Here4. Thanks! Here’’s yours your challenge, rightchallenge, right back at you.back at you. 5. All right, here5. All right, here’’s my responses my response to your (my) challenge.to your (my) challenge. 6. That6. That’’s so nice, heres so nice, here’’ss your response back to you.your response back to you. CHC: Cracking passwords
46.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Replay Attack Tool: SMBProxy A “Passing the Hash” tool that works as a proxy You can authenticate to a Windows NT4/2000 server by knowing only the md4 hash You can mount shares and access the registry and anything a particular user can do with his privileges It does not work with syskey enabled systems CHC: Cracking passwords
47.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Hacking Tool: SMBDie SMBDie tool crashes computers running Windows 2000/XP/NT by sending specially- crafted SMB requests This is outdated hack presented for Proof of concept CHC: Cracking passwords
48.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited SMBRelay Weaknesses & Countermeasures Weaknesses The problem is convincing a victim's client to authenticate to the MITM server A malicious email message to the victim client, with an embedded hyperlink to the SMBRelay server's IP address, can be sent Another solution is ARP poisoning attack against the entire segment, causing all of the systems on the segment to authenticate through the fraudulent MITM server Countermeasures Configure Windows 2000 to use SMB signing Client and server communication will cause it to cryptographically sign each block of SMB communications These settings are found under Security Policies /Security Options CHC: Cracking passwords
49.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited SMB Signing Server Messaging Block signing helps prevent man-in-the-middle attacks, such as eavesdropping on SMB packets for password hashes from remote user logins SMB signing provides mutual authentication by embedding a digital signature in each packet and requiring verification by the server and the client You can enable SMB Signing using Local Security Policy
50.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Password Cracking Countermeasures Enforce 8-12 character alphanumeric passwords Set the password change policy to 30 days Physically isolate and protect the server Use SYSKEY utility to store hashes on disk Monitor the server logs for brute force attacks on user accounts CHC: Cracking passwords
51.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Do Not Store LAN Manager Hash in SAM Database Instead of storing your user account password in cleartext, Windows generates and stores user account passwords by using two different password "hashes" When you set or change the password for a user account to a password that contains fewer than 15 characters, Windows generates both a LAN Manager hash (LM hash) and a Windows NT hash (NT hash) of the password These hashes are stored in the local Security Accounts Manager (SAM) database or in Active Directory The LM hash is relatively weak compared to the NT hash, and so it is prone to fast brute-force attack. Therefore, you may want to prevent Windows from storing an LM hash of your password
52.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited How to Disable LM HASH? Method 1: Implement the NoLMHash Policy by Using Group Policy – Disable “Network security: Do not store LAN Manager hash value on next password change” in Local Security Policy Security Options Method 2: Implement the NoLMHash Policy by Editing the Registry – Locate the following key: – HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa – Add Key, type NoLMHash Method 3: Use a Password that is at least 15 Characters Long – Windows stores an LM hash value that cannot be used to authenticate the user
53.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Syskey Utility The key used to encrypt the passwords is randomly generated by the Syskey utility Encryption prevents compromise of the passwords Syskey uses 128-bit encryption to encrypt the system hash Syskey must be present for the system to boot CHC: Cracking passwords
54.
System Hacking: Part II Escalating
Privileges
55.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited CEH Hacking Cycle Enumeration Cracking passwords Escalating privileges Executing applicationsHiding files Covering tracks
56.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Privilege Escalation If an attacker gains access to the network using a non-admin user account, the next step is to gain privileges higher than that of an administrator This is called privilege escalation CHC: Escalating privileges Network I can access the network using John’s user account but I need “Admin” privileges? Attacker
57.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Cracking NT/2000 Passwords SAM file in Windows NT/2000 contains the user names and encrypted passwords. The SAM file is located at %systemroot%system32config directory The file is locked when the OS is running • Booting to an alternate OS – NTFSDOS (www.sysInternals.com) will mount any NTFS partition as a logical drive • Backup SAM from the Repair directory – Whenever rdisk /s is run, a compressed copy of the SAM called SAM._ is created in %systemroot%repair. Expand this file using c:>expand sam._sam • Extract the hashes from the SAM – Use LOphtcrack to hash the passwords CHC: Escalating privileges
58.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Active@ Password Changer Active@ Password Changer is a DOS-based solution designed for resetting local administrator and user passwords on Windows XP / 2003 / 2000 / NT systems Boot the target computer using A@ctive formatted floppy/CD-ROM and change the password located at the SAM file Other Windows login security restrictions like 'Account is disabled', 'Password never expires', 'Account is locked out', 'User Must Change Password at Next Logon' and 'Logon Hours' can be changed or reset With Active@ Password Changer you can log in as a particular user with a blank password
59.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Privilege Escalation Tool: x.exe This tool, when executed on remote systems, creates a user called “X” with a password of “X” and adds the user to the administrator’s group CHC: Escalating privileges
60.
System Hacking: Part III Executing
Applications
61.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited CEH Hacking Cycle Enumeration Cracking passwords Escalating privileges Executing applicationsHiding files Covering tracks
62.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: psexec CHC: Executing applications Lets you execute processes on other systems remotely Launches interactive command prompts on remote systems
63.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: remoexec Executes applications remotely You should know the following: • IP address, the account name, and password, to run the application CHC: Executing applications
64.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Alchemy Remote Executor Alchemy Remote Executor is a system management tool that allows Network Administrators to execute programs on remote network computers Program executes on multiple remote computers simultaneously
65.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited If all other attempts to sniff out domain privileges fail, then a keystroke logger is the solution Keystroke loggers are stealth software packages that are placed between keyboard hardware and the operating system, so that they can record every keystroke There are two types of keystroke loggers: • 1. Software-based • 2. Hardware-based Keystroke Loggers CHC: Executing applications
66.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited E-mail Keylogger This keylogger captures keystrokes and sends them to an e-mail account
67.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Hacking Tool: Hardware Keylogger The Hardware Keylogger is a tiny hardware device that can be attached in between a keyboard and a computer It keeps a record of all keystrokes typed on the keyboard. The recording process is transparent to the end user There are two types of hardware keyloggers: • PS/2 keyloggers • USB keyloggers CHC: Executing applications
68.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Hardware Keylogger: Output CHC: Executing applications
69.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Keyboard Keylogger: KeyGhost Security Keyboard Records all the keystrokes The “Security Keyboard” functions cannot be bypassed even if the user boots from a disc It can record upto 2,000,000 key strokes A non-volatile flash memory stored placed in the keyboard stores all the keystrokes Keylogger records the Keystrokes that are used to modify BIOS Source Courtesy: http://www.keyghost.com/securekb.htm
70.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited USB Keylogger:KeyGhost USB Keylogger It works by recording USB traffic in the hardware Keystrokes are recorded to KeyGhost’s internal flash memory chip It can record upto 2,000,000 keystrokes Source Courtesy: http://www.keyghost.com/USB-Keylogger.htm
71.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited What is Spyware? Spyware is a program that records computer activities on a machine • Records keystrokes • Records email messages • Records IM chat sessions • Records websites visited • Records applications opened • Captures screenshots CHC: Executing applications
72.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Spyware: Spector Spector is spyware that records everything that one does on the Internet Spector automatically takes hundreds of snapshots every hour, like a surveillance camera Spector works by taking a snapshot of whatever is on the computer screen and saves it away in a hidden location on the system’s hard drive CHC: Executing applications
73.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Remote Spy http://www.covert-spy.com
74.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Hacking Tool: eBlaster It shows what the surveillance target surfs on the Internet and records all emails, chats, instant messages, websites visited, and keystrokes typed, and then automatically sends this recorded information to the desired email address CHC: Executing applications
75.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Stealth Voice Recorder CHC: Executing applications
76.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Stealth Keylogger Keystrokes recording Websites visited Chat and instant message monitoring Recording applications executed File monitoring Screenshot monitoring Printer monitoring Clipboard monitoring CHC: Executing applications
77.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Stealth Website Logger Designed to monitor and record all websites that a user or computer visits Offers detailed reports on all accessed websites from a single computer or from the entire network Displays reports in web format or secretly sends them to a specified email address All recorded information is stored in a secret encrypted file CHC: Executing applications
78.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Digi-Watcher Video Surveillance Watcher turns a PC with webcam into an inexpensive and complete security and video surveillance system Standalone, Watcher does motion detection, video logging, email or FTP alert, broadcasting, and more It can operate in stealth mode
79.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Desktop Spy Screen Capture Program Captures desktop/active application screenshots and saves them to a specified directory on the hard drive
80.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Telephone Spy Records telephone conversations directly to your hard disk It can start recording from a telephone line automatically whenever a receiver is put off You will need a PC and a voice modem You can use it to record any phone conversation such as business discussions and negotiations It can send the recorded conversation by email, attaching a sound file and a memo
81.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Print Monitor Spy Tool Would you like to find out what documents were printed on an employee’s computer? This tool secretly records and stores a copy of printed documents and then emails/FTPs to a secret location Valuable tool for lawyers
82.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Perfect Keylogger Combination of features like keylogging, screen capturing, and AOL monitoring
83.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Stealth Email Redirector Stealth Email Redirector is a program that sends the copies of all outgoing emails SER monitors outgoing traffic of email client software and intercepts all emails that are sent The program sends intercepted emails to specified email addresses
84.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Spy Software: Wiretap Professional
85.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Spy Software: FlexiSpy www.flexispy.com FlexiSPY is an ‘activity logger’ for mobile phones Activities such as sending and receiving SMS messages, call history, (incoming/outgoing), call duration, GPRS activity, and contact names in their address book that is associated to each SMS and call FlexiSPY is virtually undetectable by the user! Works with most Motorola and Nokia phones
86.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited PC PhoneHome This tool tracks stolen laptops PC PhoneHome secretly sends a stealth email message to an email address of your choice containing the physical location of your computer every time you get an Internet connection When the stolen computer is online, it will send a stealth message to the pre- determined email address containing its exact location • Install the software and restart the computer • Start Run configmod • Enter your email address • That’s all • Whenever your system is online, you will receive notification through email
87.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Keylogger Countermeasures Install Antivirus software and keep the signatures up to date Install a Host-based IDS such as Cisco CSA agent which can monitor your system and disable the installation of keyloggers Keep your hardware systems secure in a locked environment Frequently check the keyboard cables for attached connectors
88.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Anti-Keylogger This tool can detect keylogger installations and remove them
89.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited PrivacyKeyboard http://www.anti-keylogger.com PrivacyKeyboard is the first product of its kind which protects computers against both spy software and hardware When you are typing important information like your e-banking password, PrivacyKeyboard will help you circumvent hardware keyloggers, which are difficult to detect The virtual keyboard prevents hardware keyloggers from intercepting keystrokes made by the user The protection against software keyloggers is also active at this moment Since the user is not actually using the keyboard of his PC, hardware keyloggers do not receive any signals from it and cannot capture the keystrokes
90.
System Hacking: Part IV Hiding
Files
91.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited CEH Hacking Cycle Enumeration Cracking passwords Escalating privileges Execute applicationsHiding files Covering tracks
92.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Hiding Files There are two ways of hiding files in NT/2000 • Attrib – use attrib +h [file/directory] • NTFS Alternate Data Streaming – NTFS files system used by Windows NT, 2000, and XP has a feature Alternate Data Streams that allows data to be stored in hidden files that are linked to a normal visible file. Streams are not limited in size and there can be more than one stream linked to a normal file CHC: Hiding files
93.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Rootkits Rootkits are kernel programs that have the ability to hide themselves and cover up traces of activities When a rootkit is installed, it replaces certain operating system calls and utilities with its own modified versions of those routines For example, to hide the existence of a file, the rootkit intercepts all system calls that can carry a file name argument, such as open(), chdir(), and unlink()
94.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Why Rootkits? The hacker requires root access to the system by installing a virus, Trojan horse program, or spyware, in order to exploit it To maintain the root access, the attacker needs to hide tracks from the system administrator by modifying the system commands Rootkit allows the hacker to maintain hidden access to the system
95.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Hacking Tool: NT/2000 RootKit What if the very code of the operating system came under the control of the attacker? The NT/2000 rootkit is built as a kernel mode driver which can be dynamically loaded at run time The NT/2000 rootkit runs with system privileges, right at the core of the NT kernel, so it has access to all the resources of the operating system The rootkit can also: • Hide processes (that is, keep them from being listed) • Hide files • Hide registry entries • Intercept keystrokes typed at the system console • Issue a debug interrupt, causing a blue screen of death • Redirect EXE files CHC: Hiding files
96.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Rootkits in Linux A rootkit is also referred to as a set of modified and recompiled Unix tools (typically including ps, netstat, and passwd) designed to hide any trace of the intruder’s presence or existence A rootkit may include programs to monitor traffic, create a back door into the system, alter log files, and attack other machines on the network
97.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Detecting Rootkits Detecting rootkits is a problem Once infected with a rootkit, you cannot trust your operating system You cannot believe what the system tells you when you request a list of running processes or files in a directory One way to get around this is to shut down the suspect computer and check its storage after booting from alternative media that you know is clean, such as a bootable CD-ROM
98.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Steps for Detecting Rootkits Simple steps you can take to detect some of today’s ghostware: Run "dir /s /b /ah" and "dir /s /b /a-h" inside the potentially infected OS and save the results Boot into a clean CD, run "dir /s /b /ah" and "dir /s /b /a-h" on the same drive, and save the results Run a clean version of WinDiff from the CD on the two sets of results to detect file-hiding ghostware (i.e., invisible inside, but visible from outside) Note: There will be some false positives. Also, this does not detect stealth software that hides in BIOS, Video card EEPROM, bad disk sectors, Alternate Data Streams and so on
99.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Rootkit Detection Tools BlackLight from F-Secure Corp. • http://www.f-secure.com/blacklight RootkitRevealer from Sysinternals • http://www.sysinternals.com/Utilities/RootkitRevealer.html Malicious Software Removal Tool from Microsoft Corp • http://www.microsoft.com/security/malware remove/default.mspx
100.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Rootkit Countermeasures Back up critical data and reinstall OS/applications from a trusted source Do not rely on backups, as there is a chance of restoring from Trojaned software Keep a well-documented automated installation procedure Keep availability of trusted restoration media CHC: Hiding files
101.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Patchfinder2.0 Patchfinder (PF) is a sophisticated diagnostic utility designed to detect system libraries and kernel compromises Its primary use is to check if the given machine has been attacked with some modern rootkits like Hacker Defender, AFX, Vaniquish, and He4Hook CHC: Hiding files
102.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited RootkitRevealer RootkitRevealer from www.sysinternals.com scans the drive and the registry for the presence of rootkits
103.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Creating Alternate Data Streams Start by going to the command line and typing notepad test.txt Put some data in the file, save the file, and close Notepad From the command line, type dir test.txt and note the file size Next, go to the command line and type notepad test.txt:hidden.txt. Type some text into Notepad, save the file, and close Check the file size again and notice that it hasn’t changed! On opening test.txt, only the original data will be seen On use of the type command on the filename from the command line, only the original data is displayed On typing type test.txt:hidden.txt, a syntax error message is displayed CHC: Hiding files
104.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited NTFS Streams Countermeasures Deleting a stream file involves copying the front file to a FAT partition, then copying it back to NTFS Streams are lost when the file is moved to the FAT Partition LNS.exe from (http://nt security.nu/cgi-bin/download/lns.exe.pl) can detect streams CHC: Hiding files
105.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited What is Steganography? The process of hiding data in images is called Steganography The most popular method for hiding data in files is to utilize graphic images as hiding places Attackers can embed information such as: • Source code for hacking tool • List of compromised servers • Plans for future attacks • Grandma’s secret cookie recipe CHC: Hiding files
106.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Merge Streams This utility enables you to merge MS Word streams and MS Excel workbook streams It can hide MS Excel workbooks within MS Word documents or vice versa CHC: Hiding files
107.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Invisible Folders Hide any folder or a group of folders on your system by pressing a simple hotkey combination The select folders will remain invisible until you decide to make them visible again using your hotkey combinations You can also password-protect your hotkey combinations CHC: Hiding files
108.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Invisible Secrets 4 A security suite that helps you to hide files, encrypt files, destroy your Internet traces, shred files, make secure IP to IP password transfers, and even lock any application on your computer CHC: Hiding files
109.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Image Hide Image Hide is a steganography program that hides text in images Does simple encryption and decryption of data Even after adding bytes of data, there will not be any increase in image size Image looks the same to normal Paint packages Loads and saves to files and gets past all mail sniffers CHC: Hiding files
110.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Stealth Files Stealth Files can hide executables in other files such as Microsoft Word, Excel, PowerPoint, and Acrobat
111.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Steganography
112.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Masker Steganography Tool Masker is a program that encrypts files and folders and hides them inside another file Masker hides files and folders in inconspicuous places, such as pictures, videos, and sound files You can hide any files and even whole folders with subfolders
113.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Hermetic Stego Hermetic Stego is a a Steganography program that allows you to encrypt and hide a file of any size in one or more BMP image files, with or without the use of a stego/encryption key, so that the presence of the hidden file is undetectable, even by forensic software using statistical methods The message is hidden in multiple BMP images files Hide “Secret Message”
114.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited DCPP – Hide an Operating System DCPP is a Steganography tool that hides an entire operating system inside free space of another operating system http://www.securstar.com Windows XP Windows 2003 hidden
115.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Camera/Shy Camera/Shy works with Windows and Internet Explorer and lets users share censored or sensitive information buried within an ordinary GIF image The program lets users encrypt text with a click of the mouse and bury the text in an image. The files can be password protected for further security Viewers who open the pages with the Camera/Shy browser tool can then decrypt the embedded text on the fly by double-clicking on the image and supplying a password CHC: Hiding files
116.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Mp3Stego http://www.techtv.com MP3Stego will hide information in MP3 files during the compression process The data is first compressed, encrypted, and then hidden in the MP3 bit stream CHC: Hiding files
117.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Snow.exe Snow is a white space steganography program and is used to conceal messages in ASCII text by appending white space to the end of lines Because spaces and tabs are generally not visible in text viewers, the message is effectively hidden from casual observers If the built-in encryption is used, the message cannot be read even if it is detected CHC: Hiding files
118.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Video Steganography MSU StegoVideo can hide any file in a video sequence Embed .exe files directly inside an mpeg or avi file
119.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Steganography Detection Stegdetect is an automated tool for detecting steganographic content in images It is capable of detecting different steganographic methods to embed hidden information in JPEG images Stegbreak is used to launch dictionary attacks against Jsteg-Shell, JPHide, and OutGuess 0.13b CHC: Hiding files
120.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited SIDS Stego intrusion detection system: • Aims to flag all HTTP traffic containing imagery that tests positive for stego content (more protocols later) Gateway defense mechanism: • Placed at a network border • In promiscuous mode, sniffs all HTTP traffic and reconstructs (if necessary) any images transmitted • Tests each image against all known steganalysis algorithms • Alerts user/administrator to presence of stego on their network It is Not a firewall!
121.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: dskprobe.exe Run a low-level hard disk scanner to detect steganographic content: • E.g., dskprobe.exe can search the hard disk sectors for file contents Dskprobe can be found on the Windows 2000 Installation CD-ROM under Support Directory Steps to search for file contents: • Launch dskprobe and open the physical drive to read • Click the Set Active button adjustment to the drive after it populates the handle '0‘ • Click Tools -> Search sectors and search for string efs0.tmp (in sector 0 at the end of the disk) • Select Exhaustive Search and ignore Case and Unicode characters CHC: Hiding files
122.
System Hacking: Part V Covering
Tracks
123.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited CEH Hacking Cycle Enumeration Cracking passwords Escalating privileges Execute applicationsHiding files Covering tracks
124.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Covering Tracks Once intruders have successfully gained Administrator access on a system, they will try to cover the detection of their presence When all the information of interest has been stripped off from the target, the intruder installs several backdoors so that he can gain easy access in the future CHC: Hiding files
125.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Disabling Auditing First thing intruders will do after gaining Administrator privileges is to disable auditing Windows 2003 Resource Kit's auditpol.exe tool can disable auditing using the command line At the end of their stay, the intruders will just turn on auditing again using auditpol.exe CHC: Hiding files
126.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Clearing the Event Log Intruders can easily wipe out the logs in the Event Viewer This process will clear logs of all records but will leave one record stating that the event log has been cleared by “Attacker” CHC: Hiding files
127.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: elsave.exe elsave.exe utility is a simple tool for clearing the event log The following syntax will clear the security log on the remote server 'rovil' (correct privileges are required on the remote system) Save the system log on the local machine to d:system.log and then clear the log: elsave -l system -F d:system.log –C Save the application log on serv1 to serv1d$application.log: elsave -s serv1 -F d:application.log CHC: Hiding files
128.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Hacking Tool: Winzapper Winzapper is a tool that an attacker can use to erase event records selectively from the security log in Windows 2000 To use the program, the attacker runs winzapper.exe and marks the event records to be deleted, then he presses Delete Events and Exit To sum things up: After an attacker has gained Administrator access to the system, you cannot trust the security log CHC: Hiding files
129.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Evidence Eliminator Deleting the “Internet cache and history", will not protect you... your PC is storing deadly evidence Even FORMATTING the disk would not work All those web pages, pictures, movies, videos, sounds, email and everything else you have ever viewed could easily be recovered Files and Internet searches you have made that you thought you had never "saved to disk" can be recorded as permanent evidence on your hard drive Evidence Eliminator permanently wipes out evidence so that forensic analysis is impossible
130.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Traceless Clear your Internet settings You can stop your home page from being written over by uninvited websites CHC: Hiding files
131.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Tracks Eraser Pro Designed to protect you by cleaning up all the unwanted history data on your computer Allows you to erase the cache, cookies, history, typed URLs, auto complete memory, index.dat from your browsers and Window's temp folder, run history, search history, open/save history, recent documents, and so on CHC: Hiding files
132.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: ZeroTracks Allows you to clear paging files, recent documents, the Recycle Bin, temp files, and the run list on the Start menu You can also clear the Internet cache, temporary Internet files, cookies, and autocompletes CHC: Hiding files
133.
EC-Council Copyright © by
EC-Council All Rights reserved. Reproduction is strictly prohibited Summary Hackers use a variety of means to penetrate systems Password guessing/cracking is one of the first steps Password sniffing is a preferred eavesdropping tactic Vulnerability scanning aids the hacker in identifying which password cracking technique to use Key stroke logging/other spyware tools are used as they gain entry to systems to keep up the attacks Invariably, attackers destroy evidence of “having been there and done the damage” Stealing files as well as hiding files are the means to sneak out sensitive information
Download now