Thomas Kemmerich Hacking - Network Security Introduction 0. introduction BaSoTi 2016 - Tallinn 1 Hacking Information Security A practical course in Ethical Hacking 1 Thomas Kemmerich Hacking - Network Security Introduction 0. introduction BaSoTi 2016 - Tallinn 2 Thomas Kemmerich, PHD Associated Professor NTNU i Gjøvik Norway E-mail: [email protected]Tel. +47 611 35229 Teaching: Computer Networks, Network Security, Computer Forensics and Ethical Hacking Research: Networks, Cloud Security and Digital Forensic Readiness 2 01-Hacking-Network-Security - 25 July 2016
26
Embed
0. introduction Hacking Information Security - uni … · Hacking Information Security ... • Pentesting is a subset of ethical hacking ... code of Android OS, 8pt? 31 Thomas Kemmerich
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
General Behaviour (Ethics)• usage of knowledge and tools only for GOOD
• usage of knowledge and tools only: with your own systems and networks or with systems and networks you are allowed to investigate, proofed by a written agreement
Don’t use your knowledge or tools just for fun!!Do only things you understand!!
‘This slides are produced according to the lecture ‘Ethical Hacking!’ from Lasse Øverlier, Høgskolen i Gjøvik
Exam:1. Part: Plan and Report of your Hacking experiment here in this course:- Plan What is the goal of your pen testing How will you reach the goal Step by step plan including a rough timeline (here are not only technical aspects relevant)
Exam:2. Part: Plan and Report of your Hacking experiment here in this course:- Report What did you do? What kind of difficulties did appear? Results of each step Overall description of the Pentest What would you improve next time?
• (Data) Confidentiality: The property that information is not made available or disclosed to unauthorized individuals, entities, or processes [i.e., to any unauthorized system entity].
• (Data) Integrity:The property that data has not been changed, destroyed, or lost in an unauthorized or accidental manner.
• Availability:The property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system; i.e., a system is available if it provides services according to the system design whenever users request them.
Information Security BasicsTerminology based on RFC 2828• Vulnerability:
A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy.
• Threat:A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. I.e., a threat is a possible danger that might exploit a vulnerability.
Information Security BasicsTerminology based on RFC 2828
• Attack: An assault on the system that derives form an intelligent threat i.e., an intelligent act that is deliberate attempt to evade security services and violate the security policy of a system.
• Risk: An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.
Information Security BasicsTerminology based on RFC 2828
• Adversary: An entity that attacks, or is a threat to a system
• Countermeasure: An action, device, procedure, technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken.
• System resource (asset): Data contained in an information system, or a service provided by the system, or a system capability, such as processing power or communication bandwidth, or an item of system equipment, or a facility that houses system operations and equipment.
Pentesting"Penetration testing can be defined as a legal and authorized attempt to locate and successfully exploit computer systems for the purpose of making those systems more secure."
"A vulnerability assessment is the process of reviewing services and systems for potential security issues, whereas a penetrations test actually performs exploitation and POC (proof of concept) attacks to prove that a security issue exists."
• Gather all available information:- IP-Addresses- Users- Servers- Services- E-mails- locations- persons- … Avoid direct contact with the target (scanning etc.)
Reconnaissance - Online Information• Searching for information
- Web sites - Search engines - Public databases - DNS informationRequired for a good start:- good internal mapping of the: * People (culture) * Infrastructure