introduction to ceh

17
INTRODUCTION TO CEH PRESENTED BY:HEMANT MITAL

Upload: hemant-mittal

Post on 02-Nov-2014

191 views

Category:

Technology


8 download

DESCRIPTION

It is an introduction of CEH course

TRANSCRIPT

Page 1: Introduction  to ceh

INTRODUCTION TO CEH

PRESENTED BY:HEMANT MITAL

Page 2: Introduction  to ceh

WHY SHOULD WE KNOW ABOUT CEH?

• In this Tech-savvy world of 21st Century every one is engaged with internet, through whatsapp , twitter, facebook , net-banking & lots of other platforms are there.

• And some criminal minded persons commit crimes here, which is included under cyber-crime.

• We should be aware about crimes happening around in the cyber-space, so we can protect ourselves.

Page 3: Introduction  to ceh

WHAT A CEH DO?

•  A CEH is hired to locate and repair application and system security vulnerabilities to preempt exploitations by black hat hackers and others with potentially illegal intentions. 

•Ethical hackers employ the same tools and techniques as the intruders.

Page 4: Introduction  to ceh

EXAMPLES OF CYBER CRIME

Page 5: Introduction  to ceh

STEPS FOR PEN TESTING

1. Preparation

2. Footprinting

3. Enumeration & Fingerprinting

4. Identification of Vulnerabilities

5. Attack – Exploit the Vulnerabilities

6. Cover tracks

Page 6: Introduction  to ceh

PREPARATION

• Identification of Targets – company websites, mail servers, extranets, etc.

• Signing of Contract

• Agreement on protection against any legal issues

• Contracts to clearly specifies the limits and dangers of the test

• Specifics on Denial of Service Tests, Social Engineering, etc.

• Time window for Attacks

• Total time for the testing

• Prior Knowledge of the systems

• Key people who are made aware of the testing

Page 7: Introduction  to ceh

FOOTPRINTING

Collecting as much information about the target•DNS Servers•IP Ranges•Administrative Contacts•Problems revealed by administrators

Information Sources•Search engines•Forums•Tools – PING, whois, Traceroute, nslookup,

Page 8: Introduction  to ceh

ENUMERATION & FINGERPRINTING

• Specific targets determined• Identification of Services / open ports• Operating System Enumeration

• Methods• Banner grabbing• Responses to various protocol (ICMP &TCP) commands • Port / Service Scans – TCP Connect, TCP SYN, TCP FIN, etc.

• Tools• Nmap, tcpdump, ssh, telnet

Page 9: Introduction  to ceh

IDENTIFICATION OF VULNERABILITIES

Vulnerabilities

•Insecure Configuration

•Weak passwords

•Unpatched vulnerabilities in services, Operating systems, applications

•Possible Vulnerabilities in Services, Operating Systems

•Insecure programming

•Weak Access Control

Page 10: Introduction  to ceh

IDENTIFICATION OF VULNERABILITIES

Methods

•Unpatched / Possible Vulnerabilities – Tools, Vulnerability information Websites

•Weak Passwords – Default Passwords, Brute force, Social Engineering, Listening to Traffic

•Insecure Programming – SQL Injection, Listening to Traffic

•Weak Access Control – Using the Application Logic, SQL Injection

Page 11: Introduction  to ceh

ATTACK – EXPLOIT THE VULNERABILITIES

• Obtain as much information (trophies) from the Target Asset

• Gaining Normal Access

• Escalation of privileges

• Obtaining access to other connected systems

• Last Ditch Effort – Denial of Service

Page 12: Introduction  to ceh

ATTACK – EXPLOIT THE VULNERABILITIES

• Network Infrastructure Attacks

• Connecting to the network through modem

• Weaknesses in TCP / IP, NetBIOS

• Flooding the network to cause DOS

• Operating System Attacks

• Application Specific Attacks

• Exploiting implementations of HTTP, SMTP protocols

Page 13: Introduction  to ceh

ATTACK – EXPLOIT THE VULNERABILITIES

• Gaining access to application Databases

• SQL Injection

• Spamming

Exploits

• Free exploits from Hacker Websites

• Customised free exploits

• Internally Developed

• Tools – Nessus, Metasploit Framework

Page 14: Introduction  to ceh

REPORTING

Methodology

•Exploited Conditions & Vulnerabilities that could not be exploited•Proof for Exploits - Trophies•Practical Security solutions

Page 15: Introduction  to ceh

OTHER IMPORTANT TECHNICES

• Social Engineering

• Denial of Service

• Session Hijacking

• SQL Injection

• IDS, Firewalls and Honeypots

Page 16: Introduction  to ceh

OTHER IMPORTANT TECHNICES(CONTINUED…)

• Buffer Overflow

• Cryptography

• Hacking Wireless Networks

• SNIFFING

• Trojan horse

Page 17: Introduction  to ceh

OTHER IMPORTANT TECHNICES(CONTINUED…)

• Viruses and Worms

• Hacking Web Applications

• Hacking Mobile Platforms