SlideShare a Scribd company logo
GROUP MEMBERS
ANAND KUMAR MISHRA
Hacking and its Defense
Objective
 Why this topic??
Surprising Facts on Hacking –
• U.S. Department of Defense is attacked some 250,000
times each year
- Source: The Business Journal
• A Microsoft-operated site was cracked and defaced
Monday by someone calling himself “flipz.” It was the first time
a Microsoft Web site has been breached successfully.
- Dated: oct 26 Source: abc.com
• Worldwide cost of the Code Red computer worms that
were unleashed on the Internet in July and August has reached
about $2.6 billion U.S. ($1.1 billion in clean-up costs and $1.5
billion in lost productivity)
- Source: www.ns2000.org
 Estimated total cost for 2001- $15 billion
 Love Bug - $8.7 billion
 Melissa- $1.2 billion
 Explorer-$1 billion
 SirCam- $1.035 billion
 Finally, www would have been radically
different if there were no Hackers.
 Cost of virus attacks on information systems
around the world
 2000 - $17.1 billion
 1999 - $12.1 billion
 Here, we will Discuss the practice of
hacking in general and demonstrate a few of
the current common methods, exploits and
Preventions….
Reasons to hack !!
 Curiosity
 Fame
 Belief in open systems
 Revenge
 Notoriety/Fame
 Profit ($$$ or other gain)
 Revolutionary
Glossary
 Hacking – 2 definitions
1. Hobby/Profession of working with computers.
2. Hacking refers to acts of unauthorized access or
intrusion, in a computer, network, or telecom
system by means of computer device, gadget and or
softwares. –
often referred to as the 2nd
one who refer cyber
criminals as “Crackers”
 Phreaking-
The art and Science of Cracking the Phone Network
(for eg: free long- distance calls). By extension, security –
cracking especially communication networks.
 Back-Door Program-
A feature programmers often build into programs to
allow special privileges normally denied to users of the
program. Often programmers build back doors so they
can fix bugs. If hackers or others learn about a back
door, the feature may pose a security risk.
Glossary
 Smurfing
- Popular hacking technique by which attackers can persuade
your network to perform a denial of service attack on a machine
somewhere else on the Internet. Such attacks can also generate large
quantities of traffic on your network…
Prevention: use a line: no ip directed-broadcast
 Spoofing
A common technique used to attack sites is to create TCP/IP
packets which appear to be from local IP addresses.
Prevention: The site router is in an ideal place to detect
and prevent these attacks, since it can detect when packets with
internal source addresses arrive on the external interface of the
router…
Glossary
 Trojan Horse Program
A program which may be planted on your hard drive
by an email message attachment, and may be designed to send
information about your system back to the hackers which wrote it.
 Spy Ware
A program which you have downloaded from a legitimate
company, but which—unbeknownst to you—has been written to
track your every move on the internet for marketing purposes and
send the information back to the company.
Glossary
 Denial of Service
An attack specifically designed to prevent the normal
functioning of a system and thereby to prevent lawful access to
the system by authorized users.
Hackers can cause denial of service attacks by destroying or
modifying data or by overloading the system's servers until
service to authorized users is delayed or prevented.
 Sniffing
The use of a sniffer to capture passwords as they cross
a network. The network could be a local area network, or the
Internet itself. The sniffer can be hardware or software.
Glossary
 Virus - Vital Information Resources Under Siege
A computer virus is a specific type of malicious computer
code that replicates itself or inserts copies or new versions of itself
in other programs.
 Worm
Worms are parasitic computer programs that replicate, but
unlike viruses, do not infect other computer program files. Worms
can create copies on the same computer, or can send the copies to
other computers via a network
Damages likely be Caused !!
 Stealing or destroying data
 Disabling protection systems
 Shutting down entire networks
 Disclosure of Information, such as
theft of credit card numbers
 Denial of service attacks including
Smurfing…
A common methodology is the
following
 1. Gather target information.
 2. Identify services offered by target to the public
(whether intentional or not).
 3. Research the discovered services for known
vulnerabilities.
 4. Attempt to exploit the services.
 5. Utilize exploited services to gain additional
privileges from the target.
Reiterate steps 1-5 until goals are achieved.
Steps Hackers generally follow !!
Step 1: Gather target information..
 Domain names, IP address ranges
 InterNIC contact information
 Physical addresses
 Organizational structures
 Alliances and financial information
 Names of officers, managers, technical staff
 Newsgroup posts
Step 2: Indentify services !!
 Web Servers
 FTP Servers
 DNS Servers
 e-mail gateways
 Help desks/phone support
 other (gopher, LDAP, irc, etc.)
Step 3: Research vulnerabilities
 Vendor announcements.
 Default configurations.
 Poor configurations. (ie. Passwords, cleartext
protocols)
 Gather available exploits or develop new exploit
 Derived exploits
 Some original work.
Step 4: Exploit Vulnerabilities.
 Attempt to exploit vulnerabilities to gain access to the target.
 Continue until Successful.
Step 5: Utilize increased access
 Exploit additional vulnerabilities to gain additional access
and
information to use in penetrating further into an organization.
 The hacker "becomes" a legitimate user (even an
administrator).
 Only requires normal web user access to an IIS webserver
(i.e. port 80 or 443).
 Using non-standard ports for your web server only makes
this marginally more difficult. You do publish how to access
your webserver to someone, right? (also, you would be
surprised what search engines contain about you.)
 Using SSL (https protocol) will not prevent the exploit
from succeeding.
Demo on IIS Web Exploit !!
 Target: Windows NT Server 4.0sp6a, IIS 4.0
 Attacker: Linux 2.2.17-21mdk kernel, Window NT
Worstation 4.0 sp6a
Demo : Software Levels
 Target IP address is 192.168.168.125
 Query whois database at ARIN.net to locate owner and
domain information.
 Also try reverse DNS mappings for host/domain names.
Demo : Target info
Use nmap to scan target for services of interest.
$ nmap -sS -p 21-25,80,135-139,443 192.168.168.125
Starting nmap V. 2.53 by fyodor@insecure.org
( www.insecure.org/nmap/ )
Interesting ports on (192.168.168.125):
(The 7 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
80/tcp open http
135/tcp open loc-srv
139/tcp open netbios-ssn
443/tcp open https
Nmap run completed -- 1 IP address (1 host up) scanned in 1 second
Demo : Services information
Use netcat or telnet commands to determine web server information.
$ nc 198.168.168.125 80
HEAD / HTTP/1.0
<CR>
HTTP/1.1 200 OK
Server: Microsoft-IIS/4.0
Content-Location: http://192.168.168.125/Default.htm
Date: Mon, 06 Aug 2001 23:40:10 GMT
Content-Type: text/html
Accept-Ranges: bytes
Last-Modified: Mon, 30 Jul 2001 15:28:47 GMT
ETag: "c0bf6c53c19c11:b50"
Content-Length: 4325
Demo: Research services
 Unicode “dot dot” exploit to traverse filesystem
 Default configuration of Inetpubscripts directory is
used to upload and execute commands of our choice.
 Get target to fetch useful commands.
 Get target to initiate a command session.
 Use target to obtain additional information.
Demo : Exploit services to gain access
 Stay current on patch levels for Microsoft's OS
and web server.
 Implement good firewalling.
 Use an IDS system (or two!).
 Host security is important (Microsoft's "Securing
IIS” and “Securing Windows NT” documents).
 Pattern matching intercept proxies.
Prevention on IIS
Demonstration
 Ping, ifconfig, tracert(Icmp)
Hacking tools
 IP – tools.exe
 Wotweb.exe
 Superscan.exe
Prevention
 The Price of a New Web Server $ 800
 The Price of the Application Firewall $ 2500
Having to tell your boss that you’ve
Just been Hacked!!
PRICELESS!!
Some Defense Arsenals for
Computer Security !!
1. Password Protection
2. AntiVirus Software
3. Encryption
4. Audit Trails
5. Smart Cards and Biometrics
6. Firewalls
Here we will focus about Firewalls…
Firewall
Firewall
H/W firewall S/W firewall
Router/internet
gateways Application Packet
Proxy filtering
Firewall firewall
(Squid: -Microsoft proxy server) (ipchains:-Linux)
Proxy Server Example
There are two types of Firewall.
1. Dual Homed
2. Demilitarized Setup.
Internet
Router
Firewall +
router +DHCP
Server
Hub
Comp Comp Comp
Comp Comp CompComp
Dual Homed (Secure Network)
Internet
Firewall
Web Server mail DNS
Firewall
Database Server mail DNS
Demilitarized Setup
(More Secure
Network)
Firewall Example 1
Firewall Example 2
Firewall Products
 Some Firewall Providers:
 McAFEE ASAP
 Trend Micro
 Zone Alarm..
Single user- Cost $ 40 (for 1 year)
50 users - Cost $1500
 Some Versions of it are Free to download…..
Useful security related links !!
 SANS Institute (www.sans.org)
 Security Focus Archives (www.securityfocus.com)
 Snort IDS home (www.snort.org)
 Security archives (archives.neohapsis.com)
 CERT Coordination Center (www.cert.org)
 http://www.courses.dsu.edu/ infs750
 www.insecure.org
Mailing Lists
 Risks Digest (www.risks.org)
 BUGTRAQ
(www.securityfocus.com/bugtraq/archive)
 NTBugtraq (www.ntbugtraq.com)
 Win2KSecurity Advice (www.ntsecurity.net)
Securing Web servers
 Apache project (www.apache.org)
http://httpd.apache.org/docs/misc/tutorials.html
 support.microsoft.com
"Resources for Securing Internet Information Services”,
Article ID Q282060.
Conclusion
 How to prevent becoming a target?
!! The only reliable solution to reduce the risk of a
successful intrusion attempt is staying current with
your security infrastructure. This is an ongoing
dynamic process. !!
Areas to be explored includes
 More about Hackers
 SSL, L2TP, Proxy servers (security devices and
software)
 More on Server Vulnerabilities

More Related Content

What's hot (20)

Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
Vi Tính Hoàng Nam
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
Vi Tính Hoàng Nam
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
Sophos Benelux
 
42 - Malware - Understand the Threat and How to Respond
42 - Malware - Understand the Threat and How to Respond42 - Malware - Understand the Threat and How to Respond
42 - Malware - Understand the Threat and How to Respond
Thomas Roccia
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
amiable_indian
 
Web backdoors attacks, evasion, detection
Web backdoors   attacks, evasion, detectionWeb backdoors   attacks, evasion, detection
Web backdoors attacks, evasion, detection
n|u - The Open Security Community
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
Geoff Pesimo
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
Network Security
Network  SecurityNetwork  Security
Network Security
VIKAS SINGH BHADOURIA
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
padmeshagrekar
 
Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?
Aaron Lancaster
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
Napier University
 
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Stefano Maccaglia
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
Mohd Harris Ahmad Jaal
 
Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cns
mmubashirkhan
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
Vi Tính Hoàng Nam
 
WannaCry? No Thanks!
WannaCry? No Thanks!WannaCry? No Thanks!
WannaCry? No Thanks!
Roberto Martelloni
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
Aamlan Saswat Mishra
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
Jessore University of Science & Technology, Jessore.
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
Vi Tính Hoàng Nam
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
Sophos Benelux
 
42 - Malware - Understand the Threat and How to Respond
42 - Malware - Understand the Threat and How to Respond42 - Malware - Understand the Threat and How to Respond
42 - Malware - Understand the Threat and How to Respond
Thomas Roccia
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
amiable_indian
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
Geoff Pesimo
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
padmeshagrekar
 
Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?
Aaron Lancaster
 
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Stefano Maccaglia
 
Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cns
mmubashirkhan
 

Similar to Hacking and its Defence (20)

Hacking
HackingHacking
Hacking
rameswara reddy venkat
 
Hacking
HackingHacking
Hacking
Roshan Chaudhary
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
MSA Technosoft
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
Greater Noida Institute Of Technology
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
aashish2cool4u
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
DHRUV562167
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
Ave Nawsh
 
Introduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptxIntroduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptx
SahilSwe
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
 
presentation of professionalism harwares.ppt
presentation of professionalism harwares.pptpresentation of professionalism harwares.ppt
presentation of professionalism harwares.ppt
JayPatil820512
 
31.ppt
31.ppt31.ppt
31.ppt
KarmanChandi
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
DHRUV562167
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
Ave Nawsh
 
Introduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptxIntroduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptx
SahilSwe
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
 
presentation of professionalism harwares.ppt
presentation of professionalism harwares.pptpresentation of professionalism harwares.ppt
presentation of professionalism harwares.ppt
JayPatil820512
 

More from Greater Noida Institute Of Technology (20)

Airline Analysis of Data Using Hadoop
Airline Analysis of Data Using HadoopAirline Analysis of Data Using Hadoop
Airline Analysis of Data Using Hadoop
Greater Noida Institute Of Technology
 
College Administration Management System
College Administration Management System College Administration Management System
College Administration Management System
Greater Noida Institute Of Technology
 
Web security
Web securityWeb security
Web security
Greater Noida Institute Of Technology
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Greater Noida Institute Of Technology
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
Greater Noida Institute Of Technology
 
Spoofing
SpoofingSpoofing
Spoofing
Greater Noida Institute Of Technology
 
Sentimental Analysis of twitter data .
Sentimental Analysis of twitter data .Sentimental Analysis of twitter data .
Sentimental Analysis of twitter data .
Greater Noida Institute Of Technology
 
Hacking Question and Answer
Hacking Question and Answer Hacking Question and Answer
Hacking Question and Answer
Greater Noida Institute Of Technology
 
Security tools
Security toolsSecurity tools
Security tools
Greater Noida Institute Of Technology
 
Computer Security
Computer SecurityComputer Security
Computer Security
Greater Noida Institute Of Technology
 
BroadBand Over powerline .
BroadBand Over powerline .BroadBand Over powerline .
BroadBand Over powerline .
Greater Noida Institute Of Technology
 
Modern Networking Hacking
Modern Networking HackingModern Networking Hacking
Modern Networking Hacking
Greater Noida Institute Of Technology
 
Network security
Network securityNetwork security
Network security
Greater Noida Institute Of Technology
 
Lifi Technology
Lifi TechnologyLifi Technology
Lifi Technology
Greater Noida Institute Of Technology
 
Hack wireless internet connections or wifi
Hack wireless internet connections or wifiHack wireless internet connections or wifi
Hack wireless internet connections or wifi
Greater Noida Institute Of Technology
 
Hacking step (Methodology)
Hacking step (Methodology)Hacking step (Methodology)
Hacking step (Methodology)
Greater Noida Institute Of Technology
 
Computer Security
Computer SecurityComputer Security
Computer Security
Greater Noida Institute Of Technology
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
Greater Noida Institute Of Technology
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Greater Noida Institute Of Technology
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 

Recently uploaded (19)

Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 

Hacking and its Defence

  • 1. GROUP MEMBERS ANAND KUMAR MISHRA Hacking and its Defense
  • 2. Objective  Why this topic?? Surprising Facts on Hacking – • U.S. Department of Defense is attacked some 250,000 times each year - Source: The Business Journal • A Microsoft-operated site was cracked and defaced Monday by someone calling himself “flipz.” It was the first time a Microsoft Web site has been breached successfully. - Dated: oct 26 Source: abc.com • Worldwide cost of the Code Red computer worms that were unleashed on the Internet in July and August has reached about $2.6 billion U.S. ($1.1 billion in clean-up costs and $1.5 billion in lost productivity) - Source: www.ns2000.org
  • 3.  Estimated total cost for 2001- $15 billion  Love Bug - $8.7 billion  Melissa- $1.2 billion  Explorer-$1 billion  SirCam- $1.035 billion  Finally, www would have been radically different if there were no Hackers.
  • 4.  Cost of virus attacks on information systems around the world  2000 - $17.1 billion  1999 - $12.1 billion  Here, we will Discuss the practice of hacking in general and demonstrate a few of the current common methods, exploits and Preventions….
  • 5. Reasons to hack !!  Curiosity  Fame  Belief in open systems  Revenge  Notoriety/Fame  Profit ($$$ or other gain)  Revolutionary
  • 6. Glossary  Hacking – 2 definitions 1. Hobby/Profession of working with computers. 2. Hacking refers to acts of unauthorized access or intrusion, in a computer, network, or telecom system by means of computer device, gadget and or softwares. – often referred to as the 2nd one who refer cyber criminals as “Crackers”
  • 7.  Phreaking- The art and Science of Cracking the Phone Network (for eg: free long- distance calls). By extension, security – cracking especially communication networks.  Back-Door Program- A feature programmers often build into programs to allow special privileges normally denied to users of the program. Often programmers build back doors so they can fix bugs. If hackers or others learn about a back door, the feature may pose a security risk.
  • 8. Glossary  Smurfing - Popular hacking technique by which attackers can persuade your network to perform a denial of service attack on a machine somewhere else on the Internet. Such attacks can also generate large quantities of traffic on your network… Prevention: use a line: no ip directed-broadcast  Spoofing A common technique used to attack sites is to create TCP/IP packets which appear to be from local IP addresses. Prevention: The site router is in an ideal place to detect and prevent these attacks, since it can detect when packets with internal source addresses arrive on the external interface of the router…
  • 9. Glossary  Trojan Horse Program A program which may be planted on your hard drive by an email message attachment, and may be designed to send information about your system back to the hackers which wrote it.  Spy Ware A program which you have downloaded from a legitimate company, but which—unbeknownst to you—has been written to track your every move on the internet for marketing purposes and send the information back to the company.
  • 10. Glossary  Denial of Service An attack specifically designed to prevent the normal functioning of a system and thereby to prevent lawful access to the system by authorized users. Hackers can cause denial of service attacks by destroying or modifying data or by overloading the system's servers until service to authorized users is delayed or prevented.  Sniffing The use of a sniffer to capture passwords as they cross a network. The network could be a local area network, or the Internet itself. The sniffer can be hardware or software.
  • 11. Glossary  Virus - Vital Information Resources Under Siege A computer virus is a specific type of malicious computer code that replicates itself or inserts copies or new versions of itself in other programs.  Worm Worms are parasitic computer programs that replicate, but unlike viruses, do not infect other computer program files. Worms can create copies on the same computer, or can send the copies to other computers via a network
  • 12. Damages likely be Caused !!  Stealing or destroying data  Disabling protection systems  Shutting down entire networks  Disclosure of Information, such as theft of credit card numbers  Denial of service attacks including Smurfing…
  • 13. A common methodology is the following  1. Gather target information.  2. Identify services offered by target to the public (whether intentional or not).  3. Research the discovered services for known vulnerabilities.  4. Attempt to exploit the services.  5. Utilize exploited services to gain additional privileges from the target. Reiterate steps 1-5 until goals are achieved.
  • 14. Steps Hackers generally follow !! Step 1: Gather target information..  Domain names, IP address ranges  InterNIC contact information  Physical addresses  Organizational structures  Alliances and financial information  Names of officers, managers, technical staff  Newsgroup posts
  • 15. Step 2: Indentify services !!  Web Servers  FTP Servers  DNS Servers  e-mail gateways  Help desks/phone support  other (gopher, LDAP, irc, etc.)
  • 16. Step 3: Research vulnerabilities  Vendor announcements.  Default configurations.  Poor configurations. (ie. Passwords, cleartext protocols)  Gather available exploits or develop new exploit  Derived exploits  Some original work.
  • 17. Step 4: Exploit Vulnerabilities.  Attempt to exploit vulnerabilities to gain access to the target.  Continue until Successful. Step 5: Utilize increased access  Exploit additional vulnerabilities to gain additional access and information to use in penetrating further into an organization.  The hacker "becomes" a legitimate user (even an administrator).
  • 18.  Only requires normal web user access to an IIS webserver (i.e. port 80 or 443).  Using non-standard ports for your web server only makes this marginally more difficult. You do publish how to access your webserver to someone, right? (also, you would be surprised what search engines contain about you.)  Using SSL (https protocol) will not prevent the exploit from succeeding. Demo on IIS Web Exploit !!
  • 19.  Target: Windows NT Server 4.0sp6a, IIS 4.0  Attacker: Linux 2.2.17-21mdk kernel, Window NT Worstation 4.0 sp6a Demo : Software Levels
  • 20.  Target IP address is 192.168.168.125  Query whois database at ARIN.net to locate owner and domain information.  Also try reverse DNS mappings for host/domain names. Demo : Target info
  • 21. Use nmap to scan target for services of interest. $ nmap -sS -p 21-25,80,135-139,443 192.168.168.125 Starting nmap V. 2.53 by [email protected] ( www.insecure.org/nmap/ ) Interesting ports on (192.168.168.125): (The 7 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 80/tcp open http 135/tcp open loc-srv 139/tcp open netbios-ssn 443/tcp open https Nmap run completed -- 1 IP address (1 host up) scanned in 1 second Demo : Services information
  • 22. Use netcat or telnet commands to determine web server information. $ nc 198.168.168.125 80 HEAD / HTTP/1.0 <CR> HTTP/1.1 200 OK Server: Microsoft-IIS/4.0 Content-Location: http://192.168.168.125/Default.htm Date: Mon, 06 Aug 2001 23:40:10 GMT Content-Type: text/html Accept-Ranges: bytes Last-Modified: Mon, 30 Jul 2001 15:28:47 GMT ETag: "c0bf6c53c19c11:b50" Content-Length: 4325 Demo: Research services
  • 23.  Unicode “dot dot” exploit to traverse filesystem  Default configuration of Inetpubscripts directory is used to upload and execute commands of our choice.  Get target to fetch useful commands.  Get target to initiate a command session.  Use target to obtain additional information. Demo : Exploit services to gain access
  • 24.  Stay current on patch levels for Microsoft's OS and web server.  Implement good firewalling.  Use an IDS system (or two!).  Host security is important (Microsoft's "Securing IIS” and “Securing Windows NT” documents).  Pattern matching intercept proxies. Prevention on IIS
  • 25. Demonstration  Ping, ifconfig, tracert(Icmp) Hacking tools  IP – tools.exe  Wotweb.exe  Superscan.exe
  • 26. Prevention  The Price of a New Web Server $ 800  The Price of the Application Firewall $ 2500 Having to tell your boss that you’ve Just been Hacked!! PRICELESS!!
  • 27. Some Defense Arsenals for Computer Security !! 1. Password Protection 2. AntiVirus Software 3. Encryption 4. Audit Trails 5. Smart Cards and Biometrics 6. Firewalls Here we will focus about Firewalls…
  • 28. Firewall Firewall H/W firewall S/W firewall Router/internet gateways Application Packet Proxy filtering Firewall firewall (Squid: -Microsoft proxy server) (ipchains:-Linux)
  • 30. There are two types of Firewall. 1. Dual Homed 2. Demilitarized Setup.
  • 31. Internet Router Firewall + router +DHCP Server Hub Comp Comp Comp Comp Comp CompComp Dual Homed (Secure Network)
  • 32. Internet Firewall Web Server mail DNS Firewall Database Server mail DNS Demilitarized Setup (More Secure Network)
  • 35. Firewall Products  Some Firewall Providers:  McAFEE ASAP  Trend Micro  Zone Alarm.. Single user- Cost $ 40 (for 1 year) 50 users - Cost $1500  Some Versions of it are Free to download…..
  • 36. Useful security related links !!  SANS Institute (www.sans.org)  Security Focus Archives (www.securityfocus.com)  Snort IDS home (www.snort.org)  Security archives (archives.neohapsis.com)  CERT Coordination Center (www.cert.org)  http://www.courses.dsu.edu/ infs750  www.insecure.org
  • 37. Mailing Lists  Risks Digest (www.risks.org)  BUGTRAQ (www.securityfocus.com/bugtraq/archive)  NTBugtraq (www.ntbugtraq.com)  Win2KSecurity Advice (www.ntsecurity.net)
  • 38. Securing Web servers  Apache project (www.apache.org) http://httpd.apache.org/docs/misc/tutorials.html  support.microsoft.com "Resources for Securing Internet Information Services”, Article ID Q282060.
  • 39. Conclusion  How to prevent becoming a target? !! The only reliable solution to reduce the risk of a successful intrusion attempt is staying current with your security infrastructure. This is an ongoing dynamic process. !! Areas to be explored includes  More about Hackers  SSL, L2TP, Proxy servers (security devices and software)  More on Server Vulnerabilities