Upload
andris-soroka
View
391
Download
2
Tags:
Embed Size (px)
DESCRIPTION
Presentation from Riga, Latvia. "Data Security Solutions" Ltd. ITSEC Conference.
Citation preview
Agenda
• Demo: Hacking Windows Server 2008 Remote Desktop
• Certified Ethical Hacker v7 course overview
• EC-Council security course family
• Demo: Installing Trojan using malcrafted MS Excel sheet
What is Remote Desktop? The most popular remote access technology
“Most of our enterprise clients run line of business applications on Remote Desktop
servers. The outsource support of business critical systems is also carried out using
this technology. Even common people work using RDP on their home computers.”
Dmitry Kiselov, IT Outsource Company CEO
Configured with default settings,
Remote Desktop is open to the
Man-In-The-Middle attack.
It is possible to break into the
RDP Session and capture
sensitive data.
Engineered by Hackers. Presented by Professionals.
Is Remote Desktop safe? Let’s see
Demo:
Hacking Remote Desktop User Credentials
Engineered by Hackers. Presented by Professionals.
Man-In-The-Middle Attack
Introducing IT Security Course Ethical Hacking and Countermeasures v7
New Horizons Latvia offers Ethical Hacking and Countermeasures course which
prepares students to the EC-Council Certified Ethical Hacker v7 exam. The
demonstrated MITM attack is a part of the actual course.
Engineered by Hackers. Presented by Professionals.
Comprehensive Module Flow
This class will immerse the students into an interactive environment where they will be
shown how to scan, test, and hack into their own computers. Students then learn how
intruders escalate privileges and what steps can be taken to secure a system.
Students will also learn about:
• Hacking Webservers
• Intrusion Detection
• Social Engineering
• Buffer Overflows
• Policy Creation
• DDoS Attacks
• Virus Creation
• SQL Injection
• Cryptography
Engineered by Hackers. Presented by Professionals.
Introducing IT Security Course Ethical Hacking and Countermeasures v7
Engineered by Hackers. Presented by Professionals.
Updated Hacking Technologies
Courseware is regularly updated to reflect the latest achievements in this field and
meet the standards of highly skilled security professionals.
Introducing IT Security Course Ethical Hacking and Countermeasures v7
Engineered by Hackers. Presented by Professionals.
Exclusive Security Software Repository
CEHv7 Courseware presents about 2000 pages of well-illustrated content. It comes
with a package of 20 GB of tools and exploits uncovered from the underground
community and features more than 1000 minutes of videos demonstrating hacking
techniques.
Introducing IT Security Course Ethical Hacking and Countermeasures v7
Engineered by Hackers. Presented by Professionals.
Attack Countermeasures
CEHv7 has an exclusive section, which provides detailed explanation of
countermeasures to be adopted against different types of attacks. The certification
will fortify the application knowledge of security officers, auditors, site administrators,
and anyone who is concerned about the integrity of the network infrastructure.
Introducing IT Security Course Ethical Hacking and Countermeasures v7
Engineered by Hackers. Presented by Professionals.
Hands-on Experience
During classes, students will receive in-depth knowledge as well as practical
experience. They will employ the methodologies and tools learned in the course in
order to break into laboratory’s computers, wireless network and specialized
software.
Introducing IT Security Course Ethical Hacking and Countermeasures v7
Engineered by Hackers. Presented by Professionals.
Ethical Hacking and Countermeasures v8
CEH v8 exam will be available for public soon.
However, courseware will be only available tentatively in 2013.
Upcoming CEH v8 certification
Certified Secure Computer User This course is specifically designed for todays' computer users who use the internet
extensively to work, study and play. Students will acquire fundamental understanding
of various computer and network security threats such as identity theft, credit card
fraud, online banking phishing scams, virus and backdoors, emails hoaxes, loss of
confidential information, hacking attacks and social engineering.
EC-Council course family
EC-Council Network Security Administrator The ENSA program is designed to provide fundamental skills needed to analyze the
internal and external security threats, to develop security policies, to configure
firewalls, intrusion detection systems and AV systems that will protect an
organization’s information.
EC-Council course family
Engineered by Hackers. Presented by Professionals.
Still not impressed? Let’s play some more...
Demo:
Installing Trojan from the Excel spreadsheet
See you at
New Horizons!
Phone: +371 67847600
Address: Elizabetes 65-10,
Riga, Latvia LV-1050
E-mail: [email protected]
Thanks for attending!