Tải bản đầy đủ (.ppt) (109 trang)

[CEHV3] Ethical Hacking Workshop Presentation

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (2.28 MB, 109 trang )

EC-Council
Ethical Hacking Workshop
Ethical Hacking
Presented by:
Name of Speaker
Certified Ethical Hacker
Institute Name
To Stop a Hacker is to Think Like One!
EC-Council
Background

Seminar Objectives

Provide insight into current efforts and future plans
for network security.

Provide helpful perspective on nature of today’s
Internet security risk

Provide guidelines to achieving goals.

Demonstrations of tools used by hackers
EC-Council
Presentation Outline

Part 1: Threats to Security

Part 2: Performing a Risk Assessment

Part 3: Hacker Technologies


Part 4: Buffer Overflow Exploits

Part 5: Firewalls

Part 6: Denial of Service and Trojans

Part 7: Security Policy

Part 8: How to Handle an Attack?

Part 9: Educational Resources
EC-Council
Why Security

90% of large companies & govt. agencies had computer
security breaches in 2001

Three-quarters suffered financial losses

Most frequent problems

Computer viruses (85%)

Abuse of Internet access (79%)

Web-site vandalism (64%)
Source: 2002 CSI/FBI Computer Crime and Security Survey
EC-Council
External threats, such
as social engineering

or viruses
Internal threats, such as
internal attacks or code
vulnerabilities
Threats to Security
EC-Council
Addressing Internal Threats

Failure to update hotfixes and security patches

Blank or weak passwords

Default installation with unnecessary services
Internal attacks
Restricted Area
of Network
EC-Council
External Threats
Organizational
Attacks
Acquire confidential
information to gain a business
or competitive advantage
Organizational
Attacks
Bypasses Technology to
gain network access
Social
Engineering
Organizational

Attacks
Social
Engineering
Automated
Attacks
Uses software to gain
network access
Organizational
Attacks
Social
Engineering
Automated
Attacks
Denial of
Service (DoS)
User
Connection Fails
Blocks access to data
or services
DoSDoS
Organizational
Attacks
Social
Engineering
Denial of
Service (DoS)
Automated
Attacks
Viruses,
Trojan Horses,

and Worms
Harmful code, malicious
programs, self replicating
Organizational
Attacks
Social
Engineering
Denial of
Service (DoS)
Automated
Attacks
Viruses, Trojan Horses,
and Worms
Improper permissions can
result in access to restricted
data
Accidental Breaches
In Security
Restricted
Data
FC
Organizational
Attacks
Social
Engineering
Viruses, Trojan Horses,
and Worms
Denial of
Service (DoS)
Automated

Attacks
Accidental Breaches
in Security
EC-Council
General Prevention

Test and apply service packs and hotfixes

Run and maintain antivirus software

Run an intrusion detection system at the perimeter to
your network

Block all messages containing Readme.exe or
Admin.dll attachments

Reinstall infected systems
EC-Council

Microsoft Outlook e-mail security update

Blocks common script and executable extensions

Disables active scripting

Warns users about attempts to access
the Outlook address book or send e-mail

Internet Explorer service packs for Microsoft Outlook Express


Internet Explorer 5.01 SP2

Internet Explorer 5.5 SP2

Internet Explorer 6 (full installation required on upgrades)
Protecting E-Mail
EC-Council
Protecting Web Servers

Apply the latest hotfixes

Install the latest service pack

Install the security roll-up packages

Remove unnecessary IIS components

Install UrlScan with the default rule set
Internet
Information Service
Internet
Information Service
EC-Council
Protecting File Servers

Remove unnecessary file shares

Use an AGDLP or AGUDLP Strategy

Assign the minimum required permissions


Enforce complex passwords
EC-Council
Microsoft Strategic Technology
Protection Program

Two-phase program that integrates Microsoft
products, services, and support

Phase 1: Get Secure

Phase 2: Stay Secure
EC-Council
Phase 1: Get Secure

The Microsoft Security Tool Kit

Contains tools that provide a baseline level of security for
servers that are connected to the Internet.

Provides support for Windows NT 4.0 and Windows 2000.

Toll-free virus support
EC-Council
Phase 2: Stay Secure

Worldwide security-readiness events

Tools, updates, and patches


Enterprise security tools

Windows Update auto-update functionality

Bimonthly product roll-up patches

Consulting engagements
EC-Council
Part 2: Performing a Risk Assessment
EC-Council
Strategies to Manage Risk
Avoidance
Avoidance
Mitigation
Mitigation
Contingency
Plans
Contingency
Plans
Acceptance
Acceptance
Risk
Risk
EC-Council
Analyzing Risk
1. Identify
Resources
1. Identify
Resources
5. Review

Plan
5. Review
Plan
4. Implement
Security
Measures
4. Implement
Security
Measures
3. Calculate
Exposure
3. Calculate
Exposure
2. Identify
Threats
2. Identify
Threats
EC-Council
Identifying the Resources to Protect
Hardware
Hardware
Software
Software
Data
Data
People
People
Documentation
Documentation
1. Identify

Resources
1. Identify
Resources
EC-Council
Identifying the Threats to Resources
Viruses, Trojan
Horses,
and Worms
Social
Engineering
Automated
Attacks
Accidental
Breaches in
Security
Denial of
Service (DoS)
Organizational
Attacks
Restricted
Data
2. Identify
Threats
2. Identify
Threats
EC-Council
Calculating Exposure

Example


A security risk to data valued at $500,000 has a
75% probability of occurring

Multiply 75% x $500,000 to calculate a $375,000
exposure value.

Rank risks to an organization based on
exposure value

Exposure = Probability x Impact

Exposure = Probability x Impact
3. Calculating
Exposure
3. Calculating
Exposure
EC-Council
External Attacks Most Frequent

Greater use of
Internet

Tools & techniques
evolve to enable new
opportunities for
attack
Source: 2000 CSI/FBI Computer Crime and Security Survey
Frequent Points of Attack
38
59

0 20 40 60 80
Internal
systems
Internet
connection
Percent of respondents
EC-Council
password
guessing
self-replicating
code
password
cracking
exploiting
known
vulnerabilities
disabling
audits
back
doors
hijacking
sessions
sniffer /
sweepers
stealth
diagnostics
packet forging /
spoofing
GUI
Hacking

Tools
Average
Intruder
1980 1985 1990 1995
Relative Technical Complexity
Source: GAO Report to Congress, 1996
20-Year Trend: Stronger Attack Tools
EC-Council
Trend Has Continued
Windows
Remote
Control
Stacheldraht
Trinoo
Melissa
PrettyPark
1998 1999 2000
?
DDoS
Insertion
Tools
Hacking
Tools
Kiddie
Scripter
2001
Relative Technical Complexity
EC-Council
Part 3: Hacker Technologies

×