Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 109 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
109
Dung lượng
3,1 MB
Nội dung
EC-Council EthicalHackingWorkshopEthicalHacking Presented by: Name of Speaker Certified Ethical Hacker Institute Name To Stop a Hacker is to Think Like One! EC-Council Background Seminar Objectives • Provide insight into current efforts and future plans for network security. • Provide helpful perspective on nature of today’s Internet security risk • Provide guidelines to achieving goals. • Demonstrations of tools used by hackers EC-Council Presentation Outline Part 1: Threats to Security Part 2: Performing a Risk Assessment Part 3: Hacker Technologies Part 4: Buffer Overflow Exploits Part 5: Firewalls Part 6: Denial of Service and Trojans Part 7: Security Policy Part 8: How to Handle an Attack? Part 9: Educational Resources EC-Council Why Security 90% of large companies & govt. agencies had computer security breaches in 2001 Three-quarters suffered financial losses Most frequent problems • Computer viruses (85%) • Abuse of Internet access (79%) • Web-site vandalism (64%) Source: 2002 CSI/FBI Computer Crime and Security Survey EC-Council External threats, such as social engineering or viruses Internal threats, such as internal attacks or code vulnerabilities Threats to Security EC-Council Addressing Internal Threats Failure to update hotfixes and security patches Blank or weak passwords Default installation with unnecessary services Internal attacks Restricted Area of Network EC-Council External Threats Organizational Attacks Acquire confidential information to gain a business or competitive advantage Organizational Attacks Bypasses Technology to gain network access Social Engineering Organizational Attacks Social Engineering Automated Attacks Uses software to gain network access Organizational Attacks Social Engineering Automated Attacks Denial of Service (DoS) User Connection Fails Blocks access to data or services DoSDoS Organizational Attacks Social Engineering Denial of Service (DoS) Automated Attacks Viruses, Trojan Horses, and Worms Harmful code, malicious programs, self replicating Organizational Attacks Social Engineering Denial of Service (DoS) Automated Attacks Viruses, Trojan Horses, and Worms Improper permissions can result in access to restricted data Accidental Breaches In Security Restricted Data FC Organizational Attacks Social Engineering Viruses, Trojan Horses, and Worms Denial of Service (DoS) Automated Attacks Accidental Breaches in Security EC-Council General Prevention Test and apply service packs and hotfixes Run and maintain antivirus software Run an intrusion detection system at the perimeter to your network Block all messages containing Readme.exe or Admin.dll attachments Reinstall infected systems EC-Council Microsoft Outlook e-mail security update • Blocks common script and executable extensions • Disables active scripting • Warns users about attempts to access the Outlook address book or send e-mail Internet Explorer service packs for Microsoft Outlook Express • Internet Explorer 5.01 SP2 • Internet Explorer 5.5 SP2 • Internet Explorer 6 (full installation required on upgrades) Protecting E-Mail [...]... self-replicating code password guessing 1980 packet forging / spoofing password cracking 1985 stealth diagnostics disabling audits 1990 Hacking Tools GUI Average Intruder 1995 Source: GAO Report to Congress, 1996 EC-Council Relative Technical Complexity Trend Has Continued Hacking Tools DDoS Insertion Tools Windows Remote Control Trinoo ? PrettyPark Stacheldraht Melissa Kiddie Scripter 1998 1999 2000 2001... Management – Reverse Engineering – Distributing Computing – Cryptography – Social Engineering EC-Council The Threats Hacking Tools become more and more sophisticated and powerful in term of • Efficiency • Distributing • Stealth • Automation • User friendliness EC-Council The Threats These hacking tools could be easily download from the Internet => – Hacker tool ability increases – Knowledge of hacker... security weakness can be identified by scan tool Security of any network on the Internet depends on the security of every other networks No network is really secure EC-Council The Threats The trends • Hacking activities become more and more common • Poor management networks will become the hackers playground EC-Council The Threats The Trends • From Jan to April 2000 (before we fully deploy our IE... the victim host by some scanning program • Identify the victim host vulnerability • Attack the victim host via this vulnerability • Establish backdoors for later access EC-Council How they Hack in? Some hacking tools can automate the above steps into a single command • After break-in, use this victim host to – hack or attack other network – use this victim host resource to carry out their activities – . EC-Council Ethical Hacking Workshop Ethical Hacking Presented by: Name of Speaker Certified Ethical Hacker Institute Name To Stop. guidelines to achieving goals. • Demonstrations of tools used by hackers EC-Council Presentation Outline Part 1: Threats to Security Part 2: Performing a Risk