demystifying penetration testing by sambit priyambad rout

22
KONARK INSTITUTE OF SCIENCE & TECHNOLOGY Prepared By: Sambit Priyambad Rout Branch:Computer Science & Engineering 7 th semester Registration No:0601214088 Email:[email protected] seminar on DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING CYBERCON 2009

Upload: department-of-csekistbhubaneswar

Post on 29-Jun-2015

785 views

Category:

Education


2 download

DESCRIPTION

Steps involved in scanning the vulnerabilities on a computer system.better known as pentesting

TRANSCRIPT

Page 1: Demystifying Penetration Testing by Sambit Priyambad Rout

KONARK INSTITUTE OF SCIENCE & TECHNOLOGY

Prepared By: Sambit Priyambad RoutBranch:Computer Science & Engineering

7th semesterRegistration No:0601214088Email:[email protected]

seminar onDEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

CYBERCON 2009

Page 2: Demystifying Penetration Testing by Sambit Priyambad Rout

• It is a process of gaining access to systems,network and resources without prior knowledge of username password and other normal means.

• Penetration Testers are different from attackers as they perform on demand hacking of systems and have necessary legal permissions from the organizations.

• Used for internal and external security assessment of an organization .

What is Pen-Testing ?

Page 3: Demystifying Penetration Testing by Sambit Priyambad Rout

Securing the networksProtecting business secretsSome cases of network intrusion: DRDO hack 1998,MILWORM LHC hack 2008,GST Nokia, Fujitsu, Motorola, and Sun

Microsystems,NYT 1980-95,Kevin Mitnick

Why Pen-Testing ?

Page 4: Demystifying Penetration Testing by Sambit Priyambad Rout

Penetration Testing vs. Vulnerability Assessment

Page 5: Demystifying Penetration Testing by Sambit Priyambad Rout

Types of Penetration Testing ?

Page 6: Demystifying Penetration Testing by Sambit Priyambad Rout

Scope of Penetration Testing ?

Page 7: Demystifying Penetration Testing by Sambit Priyambad Rout

Wireless NetworksDMZ environmentsInternet Data Centers (IDC)VPN Termination pointsRemote Access pointsDial -In

Possible Environments for Pen-Testing ?

Page 8: Demystifying Penetration Testing by Sambit Priyambad Rout

1.Network Information Gathering2. Ports Scanning and Automated Vulnerability

Scanning3. Network Attack & Penetration4.Local Information Gathering5.Privilege Escalation , Maintaining Access and covering

Tracks6.Social Engineering7.Report and Documentation of facts with PoC’s

Pen-Testing Approach…

Page 9: Demystifying Penetration Testing by Sambit Priyambad Rout

Domain Registration and Mail ID

Network Information Gathering

Whois.com

Page 10: Demystifying Penetration Testing by Sambit Priyambad Rout

IP ranges

Network Information Gathering

Page 11: Demystifying Penetration Testing by Sambit Priyambad Rout

OS Types

Network Information Gathering

Page 12: Demystifying Penetration Testing by Sambit Priyambad Rout

Applications Running

Network Information Gathering

Page 13: Demystifying Penetration Testing by Sambit Priyambad Rout

Scan for Open ,Closed and Filtered ports and

identify services

Scan for vulnerabilities for known applications

running on that port.

Port Scanning and AVS…

Page 14: Demystifying Penetration Testing by Sambit Priyambad Rout

Vulnerabilities discovered during AVS are exploited either by use of automated tools or manually.

Gaining Access Metasploit ,CORE Impact and SAINTexploit SQL Injection Buffer Overflow attacks

Exploiting Known Vulnerabilities…

Page 15: Demystifying Penetration Testing by Sambit Priyambad Rout

Password Cracking techniques: Brute Force Attack Hybrid Attack Dictionary Attack

Password Cracking

Page 16: Demystifying Penetration Testing by Sambit Priyambad Rout

Post Attack Scenario…

Creates a new user account with administrator privilegeAfter the system has been compromised the attacker tries to maintain access to the systemInstalls trojans ,worms ,backdoorsAfter exploring the system ,the attacker deletes the user accountCleans up the tracks by use of timestamp tools

Page 17: Demystifying Penetration Testing by Sambit Priyambad Rout

• How it is done?• Phone Phreaking in 1980’s• Founder of social engineering Kevin Mitinick – FBI’s

most wanted computer criminal• Motorola source code stolen• Inhouse training of staffs

Social Engineering

Page 18: Demystifying Penetration Testing by Sambit Priyambad Rout

Reporting and Documentation…

A briefing of the penetration test,details of the techniques usedClassify the vulnerabilities as high,low or medium risk PoCRemedies for the vulnerabilitySuggest best practicesA summary of the overall testing process

Page 19: Demystifying Penetration Testing by Sambit Priyambad Rout

Enumeration ,Fingerprinting and Scanning: Traceroute,Nmap,whois lookup,nslookup,

Ports Scanning and Automated Vulnerability Scanning:Nmap,GFI Languard,Nessus,Personal Security Inspector 1.5

Exploiting Services for Known Vulnerabilities:Metasploit 3.2,CORE Impact,SAINTexploit

Password Cracking:Brutus,MungaBunga,Elcomsoft,John The Ripper Post Attack:BackOrifice,LCP 5.0 Exploits Used:Open Source and freeware exploits Toolkits: BackTrack 4,Knoppix-STD

List of Tools…

Page 20: Demystifying Penetration Testing by Sambit Priyambad Rout

www.sans.orgwww.insecure.orgWikipediawww.hackingspirits.comwww.remote-exploit.orgwww.milw0rm.comwww.governmentsecurity.orgwww.astalavista.net

Bibliography

Page 21: Demystifying Penetration Testing by Sambit Priyambad Rout

QUERIES ?

Page 22: Demystifying Penetration Testing by Sambit Priyambad Rout

Thank You !!SAMBIT PRIYAMBAD ROUTCSE,7th [email protected]