107
Hacking a WebSite & Secure WebServer Techniques used Group-2: RollNo 6-10. Setu Behal Siddharth Bhattacharya

Hacking a WebSite & Secure WebServer Techniques Used

Embed Size (px)

DESCRIPTION

Read to get basic overview of hacking exploits used and ways to improve internet security.Document contains many descriptions & examples of exploit scenarios.

Citation preview

Page 1: Hacking a WebSite & Secure WebServer Techniques Used

Hacking a WebSite & Secure WebServer Techniques used

Group-2:RollNo 6-10.

Setu BehalSiddharth Bhattacharya

Page 2: Hacking a WebSite & Secure WebServer Techniques Used

A chain is only as strong as its weakest link.

Page 3: Hacking a WebSite & Secure WebServer Techniques Used

As the old Jungle saying goes …

Half knowledge is Dangerous.

Page 4: Hacking a WebSite & Secure WebServer Techniques Used
Page 5: Hacking a WebSite & Secure WebServer Techniques Used

Insight into PracticalWeb-Server Security Issues

Page 6: Hacking a WebSite & Secure WebServer Techniques Used
Page 7: Hacking a WebSite & Secure WebServer Techniques Used
Page 8: Hacking a WebSite & Secure WebServer Techniques Used
Page 9: Hacking a WebSite & Secure WebServer Techniques Used
Page 10: Hacking a WebSite & Secure WebServer Techniques Used
Page 11: Hacking a WebSite & Secure WebServer Techniques Used
Page 12: Hacking a WebSite & Secure WebServer Techniques Used
Page 13: Hacking a WebSite & Secure WebServer Techniques Used
Page 14: Hacking a WebSite & Secure WebServer Techniques Used
Page 15: Hacking a WebSite & Secure WebServer Techniques Used
Page 16: Hacking a WebSite & Secure WebServer Techniques Used
Page 17: Hacking a WebSite & Secure WebServer Techniques Used
Page 18: Hacking a WebSite & Secure WebServer Techniques Used
Page 19: Hacking a WebSite & Secure WebServer Techniques Used
Page 20: Hacking a WebSite & Secure WebServer Techniques Used
Page 21: Hacking a WebSite & Secure WebServer Techniques Used
Page 22: Hacking a WebSite & Secure WebServer Techniques Used
Page 23: Hacking a WebSite & Secure WebServer Techniques Used
Page 24: Hacking a WebSite & Secure WebServer Techniques Used
Page 25: Hacking a WebSite & Secure WebServer Techniques Used
Page 26: Hacking a WebSite & Secure WebServer Techniques Used
Page 27: Hacking a WebSite & Secure WebServer Techniques Used
Page 28: Hacking a WebSite & Secure WebServer Techniques Used
Page 29: Hacking a WebSite & Secure WebServer Techniques Used
Page 30: Hacking a WebSite & Secure WebServer Techniques Used
Page 31: Hacking a WebSite & Secure WebServer Techniques Used
Page 32: Hacking a WebSite & Secure WebServer Techniques Used
Page 33: Hacking a WebSite & Secure WebServer Techniques Used
Page 34: Hacking a WebSite & Secure WebServer Techniques Used
Page 35: Hacking a WebSite & Secure WebServer Techniques Used
Page 36: Hacking a WebSite & Secure WebServer Techniques Used
Page 37: Hacking a WebSite & Secure WebServer Techniques Used
Page 38: Hacking a WebSite & Secure WebServer Techniques Used
Page 39: Hacking a WebSite & Secure WebServer Techniques Used
Page 40: Hacking a WebSite & Secure WebServer Techniques Used
Page 41: Hacking a WebSite & Secure WebServer Techniques Used
Page 42: Hacking a WebSite & Secure WebServer Techniques Used
Page 43: Hacking a WebSite & Secure WebServer Techniques Used
Page 44: Hacking a WebSite & Secure WebServer Techniques Used
Page 45: Hacking a WebSite & Secure WebServer Techniques Used

CACHE Poisoning

Page 46: Hacking a WebSite & Secure WebServer Techniques Used
Page 47: Hacking a WebSite & Secure WebServer Techniques Used
Page 48: Hacking a WebSite & Secure WebServer Techniques Used
Page 49: Hacking a WebSite & Secure WebServer Techniques Used
Page 50: Hacking a WebSite & Secure WebServer Techniques Used
Page 51: Hacking a WebSite & Secure WebServer Techniques Used
Page 52: Hacking a WebSite & Secure WebServer Techniques Used
Page 53: Hacking a WebSite & Secure WebServer Techniques Used
Page 54: Hacking a WebSite & Secure WebServer Techniques Used
Page 55: Hacking a WebSite & Secure WebServer Techniques Used
Page 56: Hacking a WebSite & Secure WebServer Techniques Used
Page 57: Hacking a WebSite & Secure WebServer Techniques Used
Page 58: Hacking a WebSite & Secure WebServer Techniques Used
Page 59: Hacking a WebSite & Secure WebServer Techniques Used
Page 60: Hacking a WebSite & Secure WebServer Techniques Used
Page 61: Hacking a WebSite & Secure WebServer Techniques Used
Page 62: Hacking a WebSite & Secure WebServer Techniques Used

Vulnerabilities of Windows Systems

• 1.Internet Information Services (IIS) • 2.Microsoft Data Access Components (MDAC) -Remote

Data Services • 3.Microsoft SQL Server • 4.NETBIOS -Unprotected Windows Networking Shares • 5.Anonymous Logon -Null Sessions • 6.LAN Manager Authentication -Weak LM Hashing • 7.General Windows Authentication - Accounts with No

Passwords or Weak Passwords • 8.Internet Explorer • 9.Remote Registry Access • 10.Windows Scripting Host

Page 63: Hacking a WebSite & Secure WebServer Techniques Used

Vulnerabilities of Unix Systems

• 1.Remote Procedure Calls (RPC) • 2.Apache Web Server • 3.Secure Shell (SSH) • 4.Simple Network Management Protocol (SNMP) • 5.File Transfer Protocol (FTP) • 6.R-Services -Trust Relationships • 7.Line Printer Daemon (LPD) • 8.Sendmail• 9.BIND/DNS • 10.General Unix Authentication -Accounts with No

Passwords or Weak Passwords

Page 64: Hacking a WebSite & Secure WebServer Techniques Used
Page 65: Hacking a WebSite & Secure WebServer Techniques Used
Page 66: Hacking a WebSite & Secure WebServer Techniques Used
Page 67: Hacking a WebSite & Secure WebServer Techniques Used
Page 68: Hacking a WebSite & Secure WebServer Techniques Used
Page 69: Hacking a WebSite & Secure WebServer Techniques Used
Page 70: Hacking a WebSite & Secure WebServer Techniques Used
Page 71: Hacking a WebSite & Secure WebServer Techniques Used
Page 72: Hacking a WebSite & Secure WebServer Techniques Used
Page 73: Hacking a WebSite & Secure WebServer Techniques Used

Hacking as perceived fromManagement’s Perspective

Page 74: Hacking a WebSite & Secure WebServer Techniques Used
Page 75: Hacking a WebSite & Secure WebServer Techniques Used
Page 76: Hacking a WebSite & Secure WebServer Techniques Used

Hacking ISP DNS

Page 77: Hacking a WebSite & Secure WebServer Techniques Used
Page 78: Hacking a WebSite & Secure WebServer Techniques Used
Page 79: Hacking a WebSite & Secure WebServer Techniques Used
Page 80: Hacking a WebSite & Secure WebServer Techniques Used
Page 81: Hacking a WebSite & Secure WebServer Techniques Used
Page 82: Hacking a WebSite & Secure WebServer Techniques Used
Page 83: Hacking a WebSite & Secure WebServer Techniques Used
Page 84: Hacking a WebSite & Secure WebServer Techniques Used
Page 85: Hacking a WebSite & Secure WebServer Techniques Used
Page 86: Hacking a WebSite & Secure WebServer Techniques Used
Page 87: Hacking a WebSite & Secure WebServer Techniques Used
Page 88: Hacking a WebSite & Secure WebServer Techniques Used
Page 89: Hacking a WebSite & Secure WebServer Techniques Used
Page 90: Hacking a WebSite & Secure WebServer Techniques Used
Page 91: Hacking a WebSite & Secure WebServer Techniques Used

SecurityBest

Paractices[Management-Perspective]

Page 92: Hacking a WebSite & Secure WebServer Techniques Used
Page 93: Hacking a WebSite & Secure WebServer Techniques Used
Page 94: Hacking a WebSite & Secure WebServer Techniques Used
Page 95: Hacking a WebSite & Secure WebServer Techniques Used
Page 96: Hacking a WebSite & Secure WebServer Techniques Used
Page 97: Hacking a WebSite & Secure WebServer Techniques Used
Page 98: Hacking a WebSite & Secure WebServer Techniques Used
Page 99: Hacking a WebSite & Secure WebServer Techniques Used
Page 100: Hacking a WebSite & Secure WebServer Techniques Used
Page 101: Hacking a WebSite & Secure WebServer Techniques Used
Page 102: Hacking a WebSite & Secure WebServer Techniques Used
Page 103: Hacking a WebSite & Secure WebServer Techniques Used
Page 104: Hacking a WebSite & Secure WebServer Techniques Used
Page 105: Hacking a WebSite & Secure WebServer Techniques Used
Page 106: Hacking a WebSite & Secure WebServer Techniques Used
Page 107: Hacking a WebSite & Secure WebServer Techniques Used

Thankyou !!!

• Any Questions ?