Ethical Hacking and Its Role To Business Continuity
Ethical Hacking and Its Role To Business Continuity
Ethical Hacking and Its Role To Business Continuity
Business Continuity
!@ #
Ethical Hacking - ?
Incident Reports
Case Studies
2
!@ #
What is Ethical Hacking
Also Called – Attack & Penetration Testing,
White-hat hacking, Red teaming
Hacking
Ethical
Conforming to accepted professional standards of conduct
3
!@ #
What is Ethical Hacking
It is Legal
Permission is obtained from the target
Ethical hackers possesses same skills, mindset
and tools of a hacker but the attacks are done in
a non-destructive manner
4
!@ #
Why – Ethical Hacking
2008
5
!@ #
Why – Ethical Hacking
6
!@ #
Business Continuity Management
A process of evaluation of the impacts
which would have the greatest effect on
the ability of a firm to continue trading.
7
!@ #
Steps in BCM
Assess Architect Align
Assure
8
!@ #
Vulnerabilities of Business
Internal
External
9
!@ #
Vulnerabilities of Business
Social
Engineering
Automated
Organizational Attacks
Attacks
Restricted
Data
Accidental
Breaches in
Security Denial of
Viruses, Trojan Service (DoS)
Horses,
and Worms
10
!@ #
VULNERABILITIES EXPLOITED….
11
!@ #
The Melissa virus
Written by David Smith spread to more
than 300 companies across the world
completely destroying their computer
networks.
Damages reported amounted to nearly
$400 million
12
!@ #
MafiaBoy
Hacked eBay, Amazon and Yahoo
between February 6 and Valentine's Day in
2000.
15
!@ #
The Solution
An Ethical hacker
16
!@ #
Ethical Hacking - Process
1. Preparation
2. Footprinting
3. Enumeration & Fingerprinting
4. Identification of Vulnerabilities
5. Attack – Exploit the Vulnerabilities
6. Reports
17
!@ #
Preparation
Signing of Contract
Agreement on protection against any legal issues
Contracts to clearly specifies the limits and dangers of
the test
18
!@ #
Footprinting
Collecting as much information about the target
DNS Servers
IP Ranges
Information Sources
Search engines
Forums
Tools – PING, whois, Traceroute, DIG, nslookup,
sam spade
19
!@ #
Enumeration & Fingerprinting
Specific targets determined
Identification of Services / open ports
Operating System Enumeration
20
!@ #
Identification of Vulnerabilities
Vulnerabilities
Insecure Configuration
Weak passwords
Possible Vulnerabilities in Services,
Operating Systems
Insecure programming
Weak Access Control
21
!@ #
Identification of Vulnerabilities
Methods
Weak Passwords – Default Passwords, Brute
force, Social Engineering, Listening to Traffic
Insecure Programming – SQL Injection, Listening
to Traffic
Weak Access Control – Using the Application
Logic
22
!@ #
Identification of Vulnerabilities
Tools
Vulnerability Scanners – Angry ip scanner, SAINT, Super Scan
Listening to Traffic – Ethercap, tcpdump
Password Crackers – John the ripper, LC4, Pwdump
Intercepting Web Traffic – Achilles, Whisker, Legion
23
!@ #
Attack – Exploit the vulnerabilities
Obtain as much information (trophies) from the
Target Asset
Gaining Normal Access
Exploiting privileges
Obtaining access to other connected systems
Denial of Service
24
!@ #
Attack – Exploit the vulnerabilities
Application Specific Attacks
Exploiting implementations of HTTP, SMTP
protocols
Gaining access to application Databases
SQL Injection
25
!@ #
Reporting
Methodology
Exploited Conditions & Vulnerabilities that
could not be exploited
Proof for Exploits
Practical Security solutions
26
!@ #
Ethical Hacking - Commandments
Working Ethically
Trustworthiness
Misuse for personal gain
Respecting Privacy
Not Crashing the Systems
27
!@ #
CASE STUDIES
28
!@ #
PIVOT POINT SECUIRITY(US)
Client Organization finds unusual data transfer
from its servers amounting to GBs per week.
Port 14120 was running another FTP Server, which was not
stated in the ports usage of the organization.
30
!@ #
Encase Software was used to get a image of the server
hard drives that was sent to the forensic dept.
31
!@ #
Reporting agencies, suggested by PPS
32
!@ #
Recommendations provided.
33
!@ #
Benefits:
Saved Bandwidth of the Clients org.
Saved the Client from getting exposed to
host adult content in their official servers.
System Vulnerabilities exposed.
System Vulnerabilities rectified.
Helped in their Business Continuity.
34
!@ #
Use of activity Monitor to track
employee activities
35
!@ #
References
Cert in
Reuters (us,uk)
TechRepublic
Ieee.org
Cc parmer, “Ethical hacking” IBM Journals.
www.ethicalhacker.net
Wikipedia.org
Hackmysite.org
Netsecuirity.about.com
36
!@ #
Questions???
37
!@ #