Vous êtes sur la page 1sur 27

1

(Introduction)

By

Dr.Mohammed Sobhy Teba


Introduction
https://www.facebook.com/tibea2004

CONTENTS
3 ............................................................................................................................................................ Introduction to Ethical Hacker
3 ..................... ................................................................................................................................................................
ethical hacking3 ................. ................................................................................................................................
3 ........ ................................................................................................................................
1.2 )4 .......... ................................................................................................ (Information security overview
4 .............................................................................................................................................................................................. IC3
)5 .......... ................................................................................................Data Breach Investigations Report (Verizon business
5 ....... ................................................................................................................................................................:
5 ................. ................................................................................................................................................................Hack Value
5 ........................................................................................................................................................................................ Exploit
5 .............. ................................................................................................................................................................Vulnerability
5 . ................................................................................................................................................................ Target of Evaluation
5 ........ ................................................................................................................................................................ Zero-day Attack
5 ........... ................................................................................................................................................................ Daisy chaining
6 ...................... ................................................................................................................................:
)6 ................... ................................................................................................ (element of information security
6 ..........................................................................................:
7 .............................................................................................................................. Information security threats and attack vector 1.3
Attack vector 7 ................ ................................................................................................................................
Goal of attack 7 ........... .................................................................................................................................
Security Threat 8 .......... ................................................................................................................................ .
) Information Warfare ( 9 ............ ................................................................................................................................
) IPv6 security threats 10 ................. ................................................................................................ (IPv6
10 ................. ................................................................................................................................IPv6
) Hack concept 1.4 (11 ..........................................................................................................................................................
12 .................. ................................................................................................................................................................
12 ................ ................................................................................................................................................................ :
13 .............. ................................................................................................................................................................:Hacktivism
) Hack Phase 1.5 ( 13 ..........................................................................................................................................................

https://www.facebook.com/tibea2004

2
14 ..................... ................................................................................................................................( ) Type of Attacks 1.6
15 ........................................................................................................................................................Operating System attacks-1
15 ......................................................................................................................................................... Application-level attacks-2
16 ........... ................................................................................................................................:
16 .........................................................................................................................................................Misconfiguration attacks-3
16 ........................................................................................................................................................... Shrink wrap code attacks-4
17 ..................... ................................................................................................( ) Information security control 1.7
18 ................ ................................................................ (scope and limitations of the ethical hackers)
18 .........................................................................................................................................................................................Scope
18 ............... ................................................................................................................................................................Limitations
18 .. ................................................................................................................................ :Ethical Hacker Skills
18 ................. ................................................................................................................................( ) Defense-in-Depth
19 ..................... ................................................................................................( ) Incident Management Process
20 ...................... ................................................................................................ Information Security Policies
20 .... ................................................................................................................................ : (security policies)
20 ............ ................................................................................................( ) Classification of security policy
21 ...................... ................................................................ structure and contents of security policies
21 .................... ................................................................................................(Structure of security policy)
21 .................. ................................................................................................ (Contents of security policy)
21 ................................................................................................................................ (Types of Security policy)
22 ............................................................ (Steps to Create and Implement Security Policies)
22 ..................... ................................................................................................................................ :
23 .................. ................................................................................................ (Research Vulnerability security)
23 ............................................................................................ Vulnerability research website
25 ........................................................................................................................ (what is penetration testing)
25 ..... ................................................................................................................................................................pen tester
25 ............... ................................................................................................ penetration testing methodology

https://www.facebook.com/tibea2004

INTRODUCTION TO ETHICAL HACKER

" .
. "

16 20 .
.
.
. .

.

.
) (ADMIN ) (network security prof.
) (infrastructure )( )
( .


.
Graphical User Interface GUI
.

.
.
) (Crackers

.
.

Crack .

ETHICAL HACKING
.
) (white hacker
. .

.

) :(ethical hacker
.
.

https://www.facebook.com/tibea2004

4
:

1.2 )(INFORMATION SECURITY OVERVIEW



:
Unauthorized access .1/ .
Disclosure .2 .
Alteration .3 .
Destruction .4 .

.

IC3
Internet Crime complaint center
www.ic3.gov

https://www.facebook.com/tibea2004

5
)DATA BREACH INVESTIGATIONS REPORT (VERIZON BUSINESS

www.verizonbusiness.com

:
HACK VALUE
.
EXPLOIT

) (commands
.
VULNERABILITY
/ ) (design code
) (error/bugs .
.
TARGET OF EVALUATION
) (IT system .
.
ZERO-DAY ATTACK

.
DAISY CHAINING

) (destroy log file .

https://www.facebook.com/tibea2004

6
:

:Attack .

:Security .

:Threat .
)(ELEMENT OF INFORMATION SECURITY

) (Infrastructure

) Confidentiality(
) / ( .
Integrity
) (.
) Availability(

.
Authenticity
) ( ) (genuine .
authentication :
.1 .
.2 .
.3 biometric smart cards digital certificate
.
Non-repudiation

HTTPS.Kerberos
:

https://www.facebook.com/tibea2004

7
.
) (security )(Usability Functionality
INFORMATION SECURITY THREATS AND ATTACK VECTOR 1.3

:
Attack Vector .1
Security Threat .2 .
Goal of attack .3 .
ATTACK VECTOR
.
:Attack Vector .
:

GOAL OF ATTACK .
attack

) ) + (Motive ) + (method (Vulnerability


motive ) (motive , goal or objective
) (disrupting business continuity
. .
) (exploit vulnerability
information system security policy .

https://www.facebook.com/tibea2004

8
SECURITY THREAT .
:

Natural Threats
earthquake floods hurricanes
.

.
Physical Threats

) (physical impact ).(hardware damage
Human Threat
) (Insider ).(Outsider
) Insider Attack ( :
. ) (security posture .
) Outsider Attack ( :
.
:

https://www.facebook.com/tibea2004

9
:Network Threats .A
:Network ) (
communication channel computer resources ) ...( .
communication channel
.
:
) Information gathering .1 (
) sniffing and eavesdropping .2 (
) spoofing .3(
session hijacking and man-in-middle attack .4
sql injection .5
ARP Poisoning .6
Denial of service attack .7
comprised key attack .8
:Host Threats .B
) (.
:
Malware attacks .1
Target Footprinting .2
Password attacks .3
Denial of service attacks .4
Arbitrary code execution .5
Unauthorized access .6 .
Privilege escalation .7
Back door attacks .8
Physical security threats .9
Application Threats .C
.
.
:
Data/Input validation .1
Authentication and Authorization attacks .2
Configuration management .3
Information disclosure .4
Session management issues .5
Cryptography attacks .6
Parameter manipulation .7
Improper error handling and exception management .8
Auditing and logging issues .9
) INFORMATION WARFARE (
) (Information Warfare/InfoWar ICT
.


.


.

https://www.facebook.com/tibea2004

10


.


.
:Defensive InfoWar
).(ICT assets
:Offensive InfoWar
InfoWar ) (ICT assets .

) IPV6 SECURITY THREATS (IPV6


IPv6 IPv4
:
Auto-Configuration threat-1
IPv6 ) (Authconfig ) ,(IP
.
Unavailability Reputation-based Protection-2
) reputation of IP address IP (
.malware .IPv6
Incompatibility of Logging Systems-3
IPv6 128 bit 39 , IPv4 32 bit
15 . logging solutions IPv4
.IPv6
Rate Limiting Problem-4
Admin ) (rate limiting strategy )(Automated attack tool
.128 bit
IPV6
Default IPv6 Activation-1
IPv6 ) ,(ADMIN .IPv4
Complexity of Network Management Tasks-2
) (admin IPv6 ) (::10, ::20, ::FOOD, ::C5C0
.
.

https://www.facebook.com/tibea2004

11
Complexity in Vulnerability Assessment-3
IPv6 128 bit ) (infrastructure .
Overloading of Perimeter Security Controls-4
IPv6 header 40 byte (extension header) add-on
) (security control firewall ,security gateways ,routers .IDS
IPv4 to IPv6 Translation Issues-5
IPv4 IPv6 ).(poor implementation
Security Information and Event Management (SIEM) Problems-6
IPv6 IPv6 log .event
Denial-of-service (DOS)-7
.DOS
Trespassing-8
IPv6
).(restricted resources

) HACK CONCEPT 1.4 (


) (Hacking )(Ethical hacking
hacking
) (vulnerability ) (compromising security controls
) (unauthorized access . ) (modifying system
) (application feature .
Ethical hacking
.
.

.1 .
.2 .
.3 back door
.4 .
.5 .
:

https://www.facebook.com/tibea2004

12



.
.
.
)(ATIM .

:
) Black Hats (
) (computer science
).(crackers
.
.

.
) White Hats (
)(
) .(security analysts
. .
) Gray Hats (
.
Black Hats .White Hats
) (software and hardware .
) Suicide Hackers (
.
30
. .
Script Kiddies

.
. .
Spy Hackers
.
) Cyber Terrorists (
.
.

.
State Sponsored Hackers

.
.

https://www.facebook.com/tibea2004

13

:HACKTIVISM
.
.hacktivist ) (
.
.
) (bad or wrong .
.

.

) HACK PHASE 1.5 (


:
Reconnaissance-1 )(
Scanning-2
Gaining Access-3
Maintaining Access-4
Clearing Tracks-5
Reconnaissance
preparatory phase
. .
) network scanning ( .

.
) .(social engineering
.
) ( )
(.
) Dumpster diving (
.

dumpster diving
.
.

https://www.facebook.com/tibea2004

14
) Reconnaissance( :

:Passive Reconnaissance ;
dumpster diving
:Active reconnaissance ;
/ .

Scanning
.
) (Reconnaissance )(
.
network/host scanner war dialers .
Gaining Access
.potential damage
) (LAN
. password cracking session hijacking denial of servicebuffer overflows :
Maintaining Access
Backdoors
Rootkits Trojans
Clearing Tracks

.Log
) TYPE OF ATTACKS 1.6 (

.
. :

:Operating System attacks-1 ) (OS vulnerabilities


.
:Application-level attacks-2 / .
.
.
:Misconfiguration attacks-3 ) (Admin
/ .
.
:Shrink wrap code attacks-4
) (Admin
.
.

https://www.facebook.com/tibea2004

15

OPERATING SYSTEM ATTACKS-1


.
.
) .(GUI ports
. )(OS vulnerabilities
.
.
.
ports .
. patches fix-file
. .
:
Buffer overflow vulnerabilities
Bugs in the operating system
Unpatched operating system
Exploiting specific network protocol implementation
Attacking built-in authentication systems Breaking file system security
Cracking passwords and encryption mechanisms
APPLICATION-LEVEL ATTACKS-2
.
.
.
:
.1 ) (tight schedules to deliver
.
.2 .
.3 ).(dearth of time
.4 ). (add-on component
) (poor or nonexistent error checking :
) Buffer overflow attacks .1 (
Active content .2
Cross-site scripting .3
Denial-of service and SYN attacks .4
SQL injection attacks .5
Malicious bots .6
:
Phishing .1
Session hijacking .2
Man-in-the middle attacks .3
Parameter/from tampering .4
Directory traversal attacks .5

https://www.facebook.com/tibea2004

16
:

Session Hijacking-1

denial of service-2

MISCONFIGURATION ATTACKS-3
) (misconfiguration /
) (framework / illegal access .
/ .
SHRINK WRAP CODE ATTACKS-4

Admin . "
" .shrink-wrap code

https://www.facebook.com/tibea2004

17


.
) INFORMATION SECURITY CONTROL 1.7 (



.
) : (ethical hacking
.
) :(Defense-in-Depth Strategy " "
.
) :(Counter the Attacks
) (anticipating methods .
:

)(reconnaissance and scanning

)(Gaining Access and Maintaining Access

)(reconnaissance and covering tracks

https://www.facebook.com/tibea2004

18

.1 .
.2 .
.3 .
.4 .
)(SCOPE AND LIMITATIONS OF THE ETHICAL HACKERS
SCOPE

:
.

)(ICT .
LIMITATIONS

:

.

.
:ETHICAL HACKER SKILLS
pen tester .
:
.1 .
.2 .
.3 .
.4 .
.5 .
.6 .
.7 .
.8 .
.9 .
) DEFENSE-IN-DEPTH (
) (Defense-in-Depth .
.
) (Defense-in-Depth
.
) (Defense-in-Depth .

.

https://www.facebook.com/tibea2004

19

) INCIDENT MANAGEMENT PROCESS (



.
:
) improves service quality (
) Pro-active problem resolution (
) Reduces impact of incidents on business/organization /(
) Meets service availability requirements (
) Increases staff efficiency and productivity (
) Improves user/customer satisfaction /(
) Assists in handling future incidents (

https://www.facebook.com/tibea2004

20
INFORMATION SECURITY POLICIES
) :(Security Policy
.
.

.
.
.

) . (Security infrastructure
.

.
.
.
): (SECURITY POLICIES
.
.
.
.
.
.
.
.
) CLASSIFICATION OF SECURITY POLICY (

.
:
) User Policy (
.

. .password management policy :
IT Policy

.
modification policy patch updates server configurationbackup policies :

General policies

.
crisis management business continuity planshigh-level program policy :

Partner policy

Issue-specific policies
.
.

https://www.facebook.com/tibea2004

21

personnel security policy Physical security policy :

STRUCTURE AND CONTENTS OF SECURITY POLICIES


)(STRUCTURE OF SECURITY POLICY

.
. :
.

.
.
.
)(CONTENTS OF SECURITY POLICY
: high-level security requirements
. :
: Discipline security requirements

.
: safeguard security requirement
audit authenticity
integrity non-repudiation object reuse
recovery .
: procedural security requirement
/ )(continuity-of-operations
:assurance security
.
:Policy Description
. .
:security concept of operation .

.
:allocation of security enforcement to architecture elements
.
)(TYPES OF SECURITY POLICY

. .
:
Promiscuous Policy (1 : .
.

) (malware .
.

https://www.facebook.com/tibea2004

22
) (malware .
.
Permissive Policy (2 : ) (internet traffic
.
. .
Prudent Policy (3 : . ) (administrator
. . .
Paranoid Policy (4 : .
. server
.
)(STEPS TO CREATE AND IMPLEMENT SECURITY POLICIES

. .
:
.1 .
.2 .
.3 .
.4 .
.5 .
.6 .
.7 .
.8 .
:

.
Acceptable-Use Policy
.
User-Account policy
) .(account .
.

https://www.facebook.com/tibea2004

23
Remote-Access Policy
.
Information-Protection Policy

Firewall-Management Policy
.
Special-access Policy
.
Network-Connection Policy
.
Email Security Policy
.
Password Policy
.
)(RESEARCH VULNERABILITY SECURITY
Research Vulnerability
, .
. :
) (
)) (local ).((remotely
:
.
.
.
.
.
.
VULNERABILITY RESEARCH WEBSITE
CodeRed Center .1
http://www.eccouncil.org :
) (admin
.
TechNet .2
http://blogs.technet.com :
) .(Microsoft Lync server teams Lync Server
documentation
.
.

https://www.facebook.com/tibea2004

24
Security Magazine .3
http://www.securitymagazine.com :
.
.
SecurityFocus .4
http://www.securityfocus.com :
.
:
BugTraq .
.
The SecurityFocus Vulnerability Database
.
Help Net Security .5
http://www.net-security.org :
.1998

.Mac OS X
HackerStorm .6
http://www.hackerstorm.com.uk :
.
SC Magazine .7
http://www.scmagazine.com :
Haymarket Media Inc. . .
North America U.S. and Canada
International U.K and mainland Europe .
Asia Pacific online -20 .
. .
.1989
Computerworld .8
http://www.computerworld.com :
40 computer world .
HackerJournals .9
http://www.hackerjournals.com :
.
.
. blogs
.
WindowsSecurity Blogs .10
http://blogs.windowsecurity.com :
.

https://www.facebook.com/tibea2004

25
)(WHAT IS PENETRATION TESTING
) :(penetration test .
.

. :
)(black box
.
)(white box
.
) (pen tester
.

.
PEN TESTER

) (ROSI
(ROSI = Return On Security Investment) .
: ) (policy
.
). (BS7799,HIPAA etc.
.
.
.
.
.
/ .

PENETRATION TESTING METHODOLOGY


pen tester .

.
) (denial-of-services .
. .

https://www.facebook.com/tibea2004

26

https://www.facebook.com/tibea2004

Vous aimerez peut-être aussi