google to pwn4ge pt1
TRANSCRIPT
![Page 1: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/1.jpg)
Google to Pwnag3 in 60 Minutes !(or less.)
Jayson E. Street, CISSP, GSEC, GCIH, GCFA
IEM, IAM, CCSE, CCSA, Security+, etc…
![Page 2: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/2.jpg)
Let go of my EGO Lets start out with a little about yours truly.
http://stratagem-one.com
![Page 3: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/3.jpg)
Know yourself know your enemy
• Sun Wu (Tzu) “Ping-fa”(The Art of War)• “Thus it is said that one who knows the enemy and
knows himself will not be endangered in a hundred engagements. One who does not know the enemy but knows himself will sometimes be victorious, sometimes meet with defeat. One who knows neither the enemy nor himself will invariably be defeated in every engagement!”
![Page 4: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/4.jpg)
Contents
• INTRO• The 5 W’s hackers 57y/3• First look at a weapon even a 12 yr. old can love.• Phase 1& 2 Discovery• Phase 3 - 5 Compromise• Now what?• Discussion
![Page 5: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/5.jpg)
Who’s really attacking you on the Internet?
When was the last time you were attacked?
What kind of threats will we cover?
Where’s the benefit for me?
Why should the hackers have all the fun?
The 5 W’s hackers 57y/3
![Page 6: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/6.jpg)
First look at a weapon even a 12 yr. old can love.
• Back Track Live 2
• All the threat of Linux
• Without the need for the Knowledge.• 1 stop for all your hacking needs.
• http://www.remote-exploit.org/backtrack.html
![Page 7: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/7.jpg)
Phase 1 Recon
Need to hack it Google it!http://sec.gov there to help you and your
enemy.The target website they want you to know
all about them.Ask for help hackers are generous with
other peoples resources.
![Page 8: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/8.jpg)
![Page 9: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/9.jpg)
![Page 10: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/10.jpg)
Phase 2 Scan
• Stealth Scanning 101
• Nmap 1 scanner to rule them all
• Slow and steady steals the race.
![Page 11: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/11.jpg)
Phase 3 Explore
The great wall of China and other urban legends.
Drive by browsing.
The human touch.
![Page 12: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/12.jpg)
Phase 4 Exploit
• Netcat the swiss blah blah blah
• Hashing it out
• Got R00T?
![Page 13: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/13.jpg)
Phase 5 Expunge
• Regedit not a regular edit this time.
• Events what events? • Patch and clean (there are some bad people out there)
![Page 14: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/14.jpg)
Caveats(or lame excuses)
• www.victim.com is real so do not try this at home.• The target is easy picking but is that normal?
(Ask anyone still getting hit with nimda and SQL Slammer.)
• Showing off l337 sK1llz is not scary showing you what a grade-schooler is doing is terrifying.
![Page 15: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/15.jpg)
On with the show!
![Page 16: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/16.jpg)
Resources
• Without understanding where the opponent's weaknesses are you cannot borrow their strength to use against them. (Cheng Man Ching)
• http://www.issa-okc.org • http://www.infragardok.org/• http://OSVDB.org• http://isc.sans.org • http://forums.stratagem-one.com (shameless plug)
This presentation is located @– http://f0rb1dd3n.com/s1s/WP/
– Credit to Andy for the web code and Tom for the movie idea.
![Page 17: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/17.jpg)
Now let’s learn from others
• Discussion and Questions????
• Or several minutes of uncomfortable silence it is your choice.
![Page 18: Google to pwn4ge pt1](https://reader033.vdocument.in/reader033/viewer/2022042817/55a0f6f21a28abe74f8b48a6/html5/thumbnails/18.jpg)
Once again those links
• http://www.issa-okc.org • http://www.infragardok.org/• http://OSVDB.org
• http://isc.sans.org • http://forums.stratagem-one.com (shameless plug)
This presentation is located @
– http://f0rb1dd3n.com/s1s/WP/