[CEHV3] Ethical Hacking Workshop Presentation

109 397 0
[CEHV3] Ethical Hacking Workshop Presentation

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

EC-Council Ethical Hacking Workshop Ethical Hacking Presented by: Name of Speaker Certified Ethical Hacker Institute Name To Stop a Hacker is to Think Like One! EC-Council Background  Seminar Objectives • Provide insight into current efforts and future plans for network security. • Provide helpful perspective on nature of today’s Internet security risk • Provide guidelines to achieving goals. • Demonstrations of tools used by hackers EC-Council Presentation Outline  Part 1: Threats to Security  Part 2: Performing a Risk Assessment  Part 3: Hacker Technologies  Part 4: Buffer Overflow Exploits  Part 5: Firewalls  Part 6: Denial of Service and Trojans  Part 7: Security Policy  Part 8: How to Handle an Attack?  Part 9: Educational Resources EC-Council Why Security  90% of large companies & govt. agencies had computer security breaches in 2001  Three-quarters suffered financial losses  Most frequent problems • Computer viruses (85%) • Abuse of Internet access (79%) • Web-site vandalism (64%) Source: 2002 CSI/FBI Computer Crime and Security Survey EC-Council External threats, such as social engineering or viruses Internal threats, such as internal attacks or code vulnerabilities Threats to Security EC-Council Addressing Internal Threats  Failure to update hotfixes and security patches  Blank or weak passwords  Default installation with unnecessary services Internal attacks Restricted Area of Network EC-Council External Threats Organizational Attacks Acquire confidential information to gain a business or competitive advantage Organizational Attacks Bypasses Technology to gain network access Social Engineering Organizational Attacks Social Engineering Automated Attacks Uses software to gain network access Organizational Attacks Social Engineering Automated Attacks Denial of Service (DoS) User Connection Fails Blocks access to data or services DoSDoS Organizational Attacks Social Engineering Denial of Service (DoS) Automated Attacks Viruses, Trojan Horses, and Worms Harmful code, malicious programs, self replicating Organizational Attacks Social Engineering Denial of Service (DoS) Automated Attacks Viruses, Trojan Horses, and Worms Improper permissions can result in access to restricted data Accidental Breaches In Security Restricted Data FC Organizational Attacks Social Engineering Viruses, Trojan Horses, and Worms Denial of Service (DoS) Automated Attacks Accidental Breaches in Security EC-Council General Prevention  Test and apply service packs and hotfixes  Run and maintain antivirus software  Run an intrusion detection system at the perimeter to your network  Block all messages containing Readme.exe or Admin.dll attachments  Reinstall infected systems EC-Council  Microsoft Outlook e-mail security update • Blocks common script and executable extensions • Disables active scripting • Warns users about attempts to access the Outlook address book or send e-mail  Internet Explorer service packs for Microsoft Outlook Express • Internet Explorer 5.01 SP2 • Internet Explorer 5.5 SP2 • Internet Explorer 6 (full installation required on upgrades) Protecting E-Mail [...]... self-replicating code password guessing 1980 packet forging / spoofing password cracking 1985 stealth diagnostics disabling audits 1990 Hacking Tools GUI Average Intruder 1995 Source: GAO Report to Congress, 1996 EC-Council Relative Technical Complexity Trend Has Continued Hacking Tools DDoS Insertion Tools Windows Remote Control Trinoo ? PrettyPark Stacheldraht Melissa Kiddie Scripter 1998 1999 2000 2001... Management – Reverse Engineering – Distributing Computing – Cryptography – Social Engineering EC-Council The Threats  Hacking Tools become more and more sophisticated and powerful in term of • Efficiency • Distributing • Stealth • Automation • User friendliness EC-Council The Threats  These hacking tools could be easily download from the Internet => – Hacker tool ability increases – Knowledge of hacker... security weakness can be identified by scan tool  Security of any network on the Internet depends on the security of every other networks  No network is really secure EC-Council The Threats  The trends • Hacking activities become more and more common • Poor management networks will become the hackers playground EC-Council The Threats  The Trends • From Jan to April 2000 (before we fully deploy our IE... the victim host by some scanning program • Identify the victim host vulnerability • Attack the victim host via this vulnerability • Establish backdoors for later access EC-Council How they Hack in? Some hacking tools can automate the above steps into a single command • After break-in, use this victim host to – hack or attack other network – use this victim host resource to carry out their activities – . EC-Council Ethical Hacking Workshop Ethical Hacking Presented by: Name of Speaker Certified Ethical Hacker Institute Name To Stop. guidelines to achieving goals. • Demonstrations of tools used by hackers EC-Council Presentation Outline  Part 1: Threats to Security  Part 2: Performing a Risk

Ngày đăng: 08/07/2013, 01:27

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan