16

DSS ITSEC 2012 Conference - Presentation CEHv7

Embed Size (px)

DESCRIPTION

Presentation from Riga, Latvia. "Data Security Solutions" Ltd. ITSEC Conference.

Citation preview

Page 1: DSS ITSEC 2012 Conference - Presentation CEHv7
Page 2: DSS ITSEC 2012 Conference - Presentation CEHv7

Agenda

• Demo: Hacking Windows Server 2008 Remote Desktop

• Certified Ethical Hacker v7 course overview

• EC-Council security course family

• Demo: Installing Trojan using malcrafted MS Excel sheet

Page 3: DSS ITSEC 2012 Conference - Presentation CEHv7

What is Remote Desktop? The most popular remote access technology

“Most of our enterprise clients run line of business applications on Remote Desktop

servers. The outsource support of business critical systems is also carried out using

this technology. Even common people work using RDP on their home computers.”

Dmitry Kiselov, IT Outsource Company CEO

Page 4: DSS ITSEC 2012 Conference - Presentation CEHv7

Configured with default settings,

Remote Desktop is open to the

Man-In-The-Middle attack.

It is possible to break into the

RDP Session and capture

sensitive data.

Engineered by Hackers. Presented by Professionals.

Is Remote Desktop safe? Let’s see

Page 5: DSS ITSEC 2012 Conference - Presentation CEHv7

Demo:

Hacking Remote Desktop User Credentials

Engineered by Hackers. Presented by Professionals.

Man-In-The-Middle Attack

Page 6: DSS ITSEC 2012 Conference - Presentation CEHv7

Introducing IT Security Course Ethical Hacking and Countermeasures v7

New Horizons Latvia offers Ethical Hacking and Countermeasures course which

prepares students to the EC-Council Certified Ethical Hacker v7 exam. The

demonstrated MITM attack is a part of the actual course.

Engineered by Hackers. Presented by Professionals.

Page 7: DSS ITSEC 2012 Conference - Presentation CEHv7

Comprehensive Module Flow

This class will immerse the students into an interactive environment where they will be

shown how to scan, test, and hack into their own computers. Students then learn how

intruders escalate privileges and what steps can be taken to secure a system.

Students will also learn about:

• Hacking Webservers

• Intrusion Detection

• Social Engineering

• Buffer Overflows

• Policy Creation

• DDoS Attacks

• Virus Creation

• SQL Injection

• Cryptography

Engineered by Hackers. Presented by Professionals.

Introducing IT Security Course Ethical Hacking and Countermeasures v7

Page 8: DSS ITSEC 2012 Conference - Presentation CEHv7

Engineered by Hackers. Presented by Professionals.

Updated Hacking Technologies

Courseware is regularly updated to reflect the latest achievements in this field and

meet the standards of highly skilled security professionals.

Introducing IT Security Course Ethical Hacking and Countermeasures v7

Page 9: DSS ITSEC 2012 Conference - Presentation CEHv7

Engineered by Hackers. Presented by Professionals.

Exclusive Security Software Repository

CEHv7 Courseware presents about 2000 pages of well-illustrated content. It comes

with a package of 20 GB of tools and exploits uncovered from the underground

community and features more than 1000 minutes of videos demonstrating hacking

techniques.

Introducing IT Security Course Ethical Hacking and Countermeasures v7

Page 10: DSS ITSEC 2012 Conference - Presentation CEHv7

Engineered by Hackers. Presented by Professionals.

Attack Countermeasures

CEHv7 has an exclusive section, which provides detailed explanation of

countermeasures to be adopted against different types of attacks. The certification

will fortify the application knowledge of security officers, auditors, site administrators,

and anyone who is concerned about the integrity of the network infrastructure.

Introducing IT Security Course Ethical Hacking and Countermeasures v7

Page 11: DSS ITSEC 2012 Conference - Presentation CEHv7

Engineered by Hackers. Presented by Professionals.

Hands-on Experience

During classes, students will receive in-depth knowledge as well as practical

experience. They will employ the methodologies and tools learned in the course in

order to break into laboratory’s computers, wireless network and specialized

software.

Introducing IT Security Course Ethical Hacking and Countermeasures v7

Page 12: DSS ITSEC 2012 Conference - Presentation CEHv7

Engineered by Hackers. Presented by Professionals.

Ethical Hacking and Countermeasures v8

CEH v8 exam will be available for public soon.

However, courseware will be only available tentatively in 2013.

Upcoming CEH v8 certification

Page 13: DSS ITSEC 2012 Conference - Presentation CEHv7

Certified Secure Computer User This course is specifically designed for todays' computer users who use the internet

extensively to work, study and play. Students will acquire fundamental understanding

of various computer and network security threats such as identity theft, credit card

fraud, online banking phishing scams, virus and backdoors, emails hoaxes, loss of

confidential information, hacking attacks and social engineering.

EC-Council course family

Page 14: DSS ITSEC 2012 Conference - Presentation CEHv7

EC-Council Network Security Administrator The ENSA program is designed to provide fundamental skills needed to analyze the

internal and external security threats, to develop security policies, to configure

firewalls, intrusion detection systems and AV systems that will protect an

organization’s information.

EC-Council course family

Page 15: DSS ITSEC 2012 Conference - Presentation CEHv7

Engineered by Hackers. Presented by Professionals.

Still not impressed? Let’s play some more...

Demo:

Installing Trojan from the Excel spreadsheet

Page 16: DSS ITSEC 2012 Conference - Presentation CEHv7

See you at

New Horizons!

Phone: +371 67847600

Address: Elizabetes 65-10,

Riga, Latvia LV-1050

E-mail: [email protected]

Thanks for attending!