Presentation Englais

Embed Size (px)

Citation preview

  • 8/3/2019 Presentation Englais

    1/24

    HACKING

    Dont Learn to Hack Hack to Learn

    Realized by :o Hamid IMIHI

    o Abdelghafour MOUJAHIDDINE

  • 8/3/2019 Presentation Englais

    2/24

    Outline

    Brief History What hackers do? Hackers techniques System Hacking

    27/04/12 2

  • 8/3/2019 Presentation Englais

    3/24

    Who is a hacker?

    There are at least two common interpretations:

    Someone who bypasses the systemsaccess controls by taking advantage of security weaknesses left in the systemby

    developers. Someone who is both knowledgeable

    and skilled at computer programming,and who is a member of the hackersubculture.

    27/04/12 3

  • 8/3/2019 Presentation Englais

    4/24

    A Brief History of Hacking

    1980s Two hacker groups formed 2600 published

    1990s National Crackdown on hackers Microsofts NT operating system pierced National infrastructure protection center unveiled

    2000 In one of the biggest denial-of-service attacks , hackers

    launch attacks against eBay, Yahoo!, CNN.com., Amazonand others.

    27/04/12 4

  • 8/3/2019 Presentation Englais

    5/24

    What Do Hackers Do?

    System Access confidential information Threaten someone from YOUR

    computer Broadcast your confidential letters or

    materials

    Store illegal or espionage material

    27/04/12 5

  • 8/3/2019 Presentation Englais

    6/24

    What Do Hackers Do?

    Network Eavesdrop and replay Imposer: server / client

    Modify data / stream Denial-of-Service

    27/04/12 6

  • 8/3/2019 Presentation Englais

    7/24

    Hackers techniques

    System hacking Network hacking Software hacking

    27/04/12 7

  • 8/3/2019 Presentation Englais

    8/24

    System Hacking

    Footprinting Scanning Enumeration Gaining access Escalating privilege Covering tracks Creating backdoors Denial of service

    27/04/12 8

  • 8/3/2019 Presentation Englais

    9/24

    Footprinting

    Objective To learn as much as you can about

    target system, it's remote accesscapabilities, its ports and services,and the aspects of its security.

    Techniques Whois Web interface to whois

    27/04/12 9

  • 8/3/2019 Presentation Englais

    10/24

    PING

    27/04/12 10

  • 8/3/2019 Presentation Englais

    11/24

    Web interface to whois

    27/04/12 11

  • 8/3/2019 Presentation Englais

    12/24

    Scanning

    Objective Bulk target assessment and

    identification of listing servicesfocuses the attention on the mostpromising avenues of entry

    Techniques Ping sweep TCP/UDP port scan OS Detection

    27/04/12 12

  • 8/3/2019 Presentation Englais

    13/24

    27/04/12 13

  • 8/3/2019 Presentation Englais

    14/24

    27/04/12 14

  • 8/3/2019 Presentation Englais

    15/24

    Port numbers and description

    27/04/12 15

  • 8/3/2019 Presentation Englais

    16/24

    Enumeration

    Objective More intrusive probing now begins as

    attackers begin identifying valid useraccounts or poorly protectedresource shares

    Techniques List user accounts List file shares Identify applications

    27/04/12 16

  • 8/3/2019 Presentation Englais

    17/24

    Gaining Access

    Objective Enough data has been gathered at

    this point to make an informedattempt to access the target

    Techniques File share brute forcing Password file grab Buffer overflows Password eavesdropping

    27/04/12 17

  • 8/3/2019 Presentation Englais

    18/24

    NETBRUTE FORCE

    27/04/12 18

  • 8/3/2019 Presentation Englais

    19/24

    Escalating Privileges

    Objective If only user level access was obtained

    in the last step, the attacker will nowseek to gain the complete control of the system

    Techniques Password cracking Known exploits

    27/04/12 19

  • 8/3/2019 Presentation Englais

    20/24

    Covering Tracks

    Objective Once total ownership of the target is

    secured, hiding this from systemadministrators become paramount,lest they quickly end the romp.

    Techniques Clear logs Hide tools

    27/04/12 20

  • 8/3/2019 Presentation Englais

    21/24

    Creating Back Doors Objective

    Trap doors will be laid in various partsof the system to ensure thatprivileged access is easily regained atthe whim if the intruder

    Techniques Create rogue user accounts Schedule batch jobs Infect startup files Plant remote control services Install monitoring mechanisms

    Replace apps with trojans27/04/12 21

  • 8/3/2019 Presentation Englais

    22/24

    Denial of Service

    Objective If an attacker is unsuccessful in gainingaccess ,they may use readily availableexploit code to disable a target as a last

    resort. Techniques

    SYN flood

    Identical SYN requests Overlapping fragment/offset bugs DDOS

  • 8/3/2019 Presentation Englais

    23/24

    NORMAL SYN FLOOD

    27/04/12 23

  • 8/3/2019 Presentation Englais

    24/24

    Thanks for your attention

    27/04/12 24