Ch1_2_Know Your Enemy
Ch1_2_Know Your Enemy
Alice Bob
channel data, control
messages
Trudy
Who might Bob, Alice be?
other examples?
Who might Trudy be?
Intruder Motives
Money, profit
Personal vengeance
Curiosity
Attention
Intruder Techniques
intruders
International scope
Steps of Intrusion/Hacking
Random targets
Specific target
Political
Military
Industrial
Money
Step 1-Find the targets (2)
Organization: address
Nslookup
Traceroute or tracert
Computers
Routers
Firewalls
Dial-in connections
Remote sites
WiFi
Step 2 – Locate the target’s assets (2)
Social engineering
Step 2 – Locate the target’s assets:
Network pings (3)
Use ping, nmap to sweep a network address
range looking for hosts
Timestamp
Address mask
Step 2 – Locate the target’s assets:
Port scanning (4)
Used to identify service running on a computer, e.g.
80: www-http
The port numbers are divided into three ranges
Well Known Ports: from 0 - 1023
Registered Ports: 1024-49151
Dynamic and/or Private Ports: 49152-65535
More info: http://www.iana.org/assignments/port-
numbers
Several tools
Nmap
Strobe
Superscan
Step 2 – Locate the target’s assets:
OS detection (5)
Based on responses to various packets and which
services are active, you can guess the OS on a
machine
Active methods involve sending packets and checking
the results
Default password
Shared resources
Social engineering
Top Vulnerabilities to Windows Systems
http://www.sans.org
Top Vulnerabilities to Unix Systems
Password guessing
Social engineering
Default password
Packet sniffing
Network attacks
Redirects
Man-in-the-middle
IP hiding (spoofing)
Step 5 – Increasing access
Known exploits
Password guessing
Password sniffers
Sniff the networks, applications and email passwords
back to the hacker
Financial information
Step 7 – Making a backdoor