12
Hacking and Network Hacking and Network Defense Defense

Hacking and Network Defense

Embed Size (px)

DESCRIPTION

Hacking and Network Defense. Introduction. With the media attention covering security breaches at even the most tightly controlled organization, it is more important than ever to learn about hackers. Hacker Profile. - PowerPoint PPT Presentation

Citation preview

Page 1: Hacking and Network Defense

Hacking and Network Hacking and Network DefenseDefense

Page 2: Hacking and Network Defense

IntroductionIntroduction

With the media attention covering With the media attention covering security breaches at even the most security breaches at even the most tightly controlled organization, it is tightly controlled organization, it is more important than ever to learn more important than ever to learn about hackers.about hackers.

Page 3: Hacking and Network Defense

Hacker ProfileHacker Profile ““Hacker” can be ranged from the Hacker” can be ranged from the

computer programmer you work with computer programmer you work with who hacks in the evening , to a high who hacks in the evening , to a high school student who plays on the school student who plays on the computer after he/she gets out of computer after he/she gets out of school, to almost anyone in between.school, to almost anyone in between.

Why?Why?• Enjoy the game of discovering the Enjoy the game of discovering the

vulnerabilitiesvulnerabilities• Criminal intentCriminal intent• Revenge Revenge

Page 4: Hacking and Network Defense

Enterprise RisksEnterprise Risks Disruption of ServicesDisruption of Services

Damaged ReputationDamaged Reputation

Exposure of Confidential informationExposure of Confidential information

Corruption of DataCorruption of Data

LiabilityLiability

Page 5: Hacking and Network Defense

Anatomy of an AttackAnatomy of an Attack

ProfilingProfiling• Gathering information about target Gathering information about target

ScanningScanning• Identify what systems are activeIdentify what systems are active

EnumeratingEnumerating• Determining valid user account and Determining valid user account and

sharesshares

Page 6: Hacking and Network Defense

Anatomy of an AttackAnatomy of an Attack

Enumerating (Cont.)Enumerating (Cont.)• How?How?

Social EngineeringSocial Engineering ObservationObservation EavesdroppingEavesdropping

ExploitingExploiting• Gain unlawful entry to a systemGain unlawful entry to a system

Page 7: Hacking and Network Defense

Different Kind of ExploitsDifferent Kind of Exploits

Buffer OverflowsBuffer Overflows• Result of poor programming Result of poor programming

Privilege EscalationPrivilege Escalation• Unsecured lower privilege accountUnsecured lower privilege account

Brute Force AttacksBrute Force Attacks• Password guessing gamePassword guessing game

Unexpected InputUnexpected Input• Username: jdoe; rm –rf /Username: jdoe; rm –rf /

Page 8: Hacking and Network Defense

Different Kind of ExploitsDifferent Kind of Exploits

DefacementsDefacements• Surprise on Web sitesSurprise on Web sites

Denial of Service (DoS)Denial of Service (DoS)• A fleet attackA fleet attack

Launch Pad AttacksLaunch Pad Attacks• A victim attacked by other victimA victim attacked by other victim

Page 9: Hacking and Network Defense

The Hackers ToolkitThe Hackers Toolkit Web ScannerWeb Scanner Port ScannerPort Scanner Password CrackersPassword Crackers Password GrindersPassword Grinders War DialersWar Dialers Program Password RecoveryProgram Password Recovery Credit Card Number GeneratorsCredit Card Number Generators Vulnerability ScannersVulnerability Scanners Packet SniffersPacket Sniffers Net BIOS Auditing ToolsNet BIOS Auditing Tools Virus, Trojans, WormsVirus, Trojans, Worms

Page 10: Hacking and Network Defense

Defending Against the HackDefending Against the Hack

1.1. Keep patched up to dateKeep patched up to date

2.2. Shut down unnecessary Shut down unnecessary services/portsservices/ports

3.3. Change default passwordsChange default passwords

4.4. Control physical access to systemControl physical access to system

5.5. Curtail unexpected inputCurtail unexpected input

Page 11: Hacking and Network Defense

Defending Against the HackDefending Against the Hack

6.6. Perform backups the test themPerform backups the test them

7.7. Educate people about social engineeringEducate people about social engineering

8.8. Encrypt and password-protect sensitive Encrypt and password-protect sensitive datadata

9.9. Implement security hardware and Implement security hardware and softwaresoftware

10.10. Develop a written security policy for the Develop a written security policy for the companycompany

Page 12: Hacking and Network Defense

More HackingMore Hacking Hacker toolsHacker tools

• http://www.insecure.org/tools.htmlhttp://www.insecure.org/tools.html Wireless NetworksWireless Networks

• Wireless LAN Analyzers Wireless LAN Analyzers Viruses and WormsViruses and Worms

• http://www.nai.comhttp://www.nai.com TerrorismTerrorism Security AdvisorySecurity Advisory

• http://www.microsoft.com/securityhttp://www.microsoft.com/security