49
Se7en - Creative Powerpoint Template Practical Cyber Attacking Tutorial Yam Peleg

Practical Cyber Attacking Tutorial

Embed Size (px)

Citation preview

Page 1: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Practical Cyber AttackingTutorialYam Peleg

Page 2: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Cyber?

Page 3: Practical Cyber Attacking Tutorial

CYBER!

Page 4: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint TemplateJAIL!

Page 5: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Introduction To Cyber

Page 6: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Cyber Attacking

Active Reconnaissance Gaining AccessPassive

ReconnaissanceMaintaining

Access

Gaining AccessThis is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access.

Maintaining AccessOnce a hacker has gained access, they want to keep that access for future exploitation andattacks.

Passive Reconnaissance Passive reconnaissance involves gathering information regarding a potential target without the targeted individual’s or company’s knowledge

Active ReconnaissanceActive reconnaissance involves probing the network to discover individual hosts, IP addresses,and services on the network. This usually involves more risk of detection than passive reconnaissance

Page 7: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Vulnerability based cyber attacks

Attacker

💻- Develops code that will be sent to the victim and then

- Uses a vulnerability to insert and run that code to

the victim's device.

Victim

💻- Unaware of the attacker’s

code running on the device.

- The malicious code transmit to the attacker.

The art of running your own code on someone else’s computer :)

LOLZ

Page 8: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Social Engineering

Page 9: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template 9

Social Engineering

PhishingPractice of sending emails

Or creating sites appearing to befrom reputable source with theGoal of influencing or gaining

Personal information

ImpersonationPractice of pretexting as

Another person with the goalOf obtaining information or

Access to a person, Company, or computer system.

VishingPractice of eliciting

Information of attempting to Influence action via the

Telephone may include such Tools as “phone spoofing”

Hey! I am from ITCan you please give Me your password

So I can.. Blah Blah..

Page 10: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Passive reconnaissance

Page 11: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Where can we find information?

Page 12: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Google Hacking

Page 13: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Google Hacking

www.victim.com

Page 14: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Google Hacking

site:www.victim.com intitle:index.of 

www.victim.com

Page 15: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Google Hacking

www.victim.com

site:www.victim.com ext:xml | ext:conf | ext:cnf | ext:reg | ext:inf | ext:rdp | ext:cfg | ext:txt | ext:ora |

ext:ini

Page 16: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Google Hacking

www.victim.com

site:www.victim.com ext:sql | ext:dbf | ext:mdb

Page 17: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Google Hacking

www.victim.com

site:www.victim.com ext:log

Page 18: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Google Hacking

www.victim.com

site:www.victim.com ext:bkf | ext:bkp | ext:bak | ext:old | ext:backup

Page 19: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Google Hacking

www.victim.com

site:www.victim.com inurl:login

Page 20: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Google Hacking

www.victim.com

site:www.victim.com intext:"sql syntax near" | intext:"syntax error has occurred" | intext:"incorrect

syntax near" | intext:"unexpected end of SQL command" | intext:"Warning: mysql_connect()" |

intext:"Warning: mysql_query()" | intext:"Warning: pg_connect()"

Page 21: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Google Hacking

www.victim.com

site:www.victim.com intext:"sql syntax near" | intext:"syntax error has occurred" | intext:"incorrect

syntax near" | intext:"unexpected end of SQL command" | intext:"Warning: mysql_connect()" |

intext:"Warning: mysql_query()" | intext:"Warning: pg_connect()"

Page 22: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Google Hacking

www.victim.com

site:www.victim.com ext:php intitle:phpinfo "published by the PHP Group"

Page 23: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Searching for information

Searching for “Information”?

Page 24: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Whois

Page 25: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Kali Linux

Page 26: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Maltego

Page 27: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Active reconnaissance

Page 28: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

��

��

Client Server

SYN

ACK

SYN ACK

Three way handshake

Page 29: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

��

��

Me Server

Port Scanning

LOLZ

Ports..

25..

80..

SYNSYN ACK

ServerOpen ports:

25

Page 30: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Network Attacking

Page 31: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

��

��

You Someone who is good looking

ARP

IP:192.168.2.13 IP:192.168.2.52MAC :7B-DA-70-1C-2E-EA MAC :?

Who has 192.168.2.52

I Know 192.168.2.52

Mac: E5-28-EC-7E-8B-

5E

Someone

Page 32: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

��

��

You Someone who is good looking

ARP Poisoning

IP:192.168.2.13 IP:192.168.2.52MAC :7B-DA-70-1C-2E-EA MAC : E5-28-EC-7E-8B-5E

��

Me

LOLZ

MAC :BE-EF-CA-CE-13-37

I Know 192.168.2.52

Mac: BE-EF-CA-CE-13-

37

Than you :)

I Know 192.168.2.13

Mac: BE-EF-CA-CE-13-

37

Than you :)

Hey There ;) Hey There

;)

Page 33: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Wireless Hacking

Page 34: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Web HackingWWW

Page 35: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

��

��

Client Server

SQL Injection

Request: auth.htmlPOST:user: userPass: pass

SQL

Que

ry

"Do we have a user with user name: user and password: pass?”

SELECT user from users WHERE user=‘user’ and password=‘pass’

Page 36: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

��

��

Me Server

SQL Injection

User: user

SQL

Que

rySELECT user from users WHERE user=‘user’ and password=‘pass’

False

User: ‘OR ‘1’=‘1

SELECT user from users WHERE user=‘’OR ‘1’ =‘1’ and password=‘pass’

True

LOLZ

Page 37: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

��

��

Client Server

Cross side scripting

GET: Page.html

Backend Data

��Other Guys

������

Page 38: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Cross side scripting

Backend Data

Runnable Script

Runnable Script

Page 39: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Cross side scripting

Page 40: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Exploitation

Page 41: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

How a normal program works..

Page 42: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

How a normal program works..

AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAddress

Page 43: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Reverse Engineering

Page 44: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Exploiting

Page 45: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Everyday use of windows

Page 46: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

The Vulnerability… RPCR

T4!O

SF_S

CALL

::Beg

inRp

cCal

l

RPCR

T4!O

SF_S

CALL

::Pro

cess

Rece

ived

PDU

RPCR

T4!O

SF_S

CALL

::Dis

patc

hRPC

Call

RPCR

T4!O

SF_S

CALL

::Dis

patc

hHel

per

RPCR

T4!S

tubC

all2

RPCR

T4!O

SF_S

CALL

::Dis

patc

hRPC

Call

… RPCR

T4!In

voke

srvsc

v!Ne

tprP

athC

anon

ical

ize

NETA

PI32!Ne

tpw

Path

Cano

nica

lize

NETA

PI32!Ca

noni

czliz

ePat

hNam

e

NETA

PI32!su

b71C

4968

3

rpccrt4.dll srvscv.dll netapi32.dll

NetpwPathCanonicalize

\\server\\dir1\\..\\dir2

\\server\\dir2

Page 47: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Exploiting..

Page 48: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

Exploiting..

Page 49: Practical Cyber Attacking Tutorial

Se7en - Creative Powerpoint Template

a7 87 ce 5c 95 b2 4d 98 d6 fc e6 0a 56 19 96 b8 cd d3 e5 77 4d 98 d6 fc e6 0a 56

Exploiting..

c0 33 5b ac 12 82 1b ab 2b 02 9dac 6a 93 e0 9e a5 ea 3a 9e 25 5c7b c1 ad 90 29 9b 2f e6 3a 47 7d9a 20 c6 75 dc 0Address