InterAmerican Academy AASSA Conference 2012 Ethical Hacking a general overview IT Department Quito, Ecuador March 16th 2012 Instructor: Francisco Bolaños, Ing. All the rights reserved. TABLE OF CONTENT Objectives. Security fundamentals. Ethical hacking stages. Conclusion. Instructor: Francisco Bolaños, Ing. All the rights reserved. OBJECTIVES 1. To show a general overview of what ethical hacking implies: Main concepts. Common vulnerabilities. Ethical hacking Stages/ Tools. 2. To create a baseline to apply professional methodologies for security audits such as: Open Source Security Testing Methodology Manual (OSSTMM). Information Systems Security Assessment Framework (ISSAT) ISO27001:2005. Instructor: Francisco Bolaños, Ing. All the rights reserved. SECURITY FUNADMANETALS: MAIN CONCPETS Security Information: It protects the information from a wide spectrum of threats, in order to ensure business continuity, minimize damage to the organization and maximize the return on investment and business opportunities. Computer Security: It ensures the resources of the information systems (hardware or software) of an organization are used in the proper way. Ethical Hacking: It is a penetration test of which the goal is to discover trophies throughout the network within the predetermined project time limit.(OSSTMM ) Instructor: Francisco Bolaños, Ing. All the rights reserved. SECURITY FUNADMANETALS: MAIN CONCPETS Accountability: Confidentiality: It is the capacity of keeping track based on the generation of files. Example: Log system /IDS It keeps the information private; only the owner can access it. Example: Doctor-Patient Security features: Integrity: the information will remain the same. Example: Message sent: Hello Message received: Hello Instructor: Francisco Bolaños, Ing. Availability: the information is available all the time without any kind of disruption. Example: Website 24/7 All the rights reserved. SECURITY FUNADMANETALS: COMMON VULNERABILITIES Wrong router configurations. Remote Access Service (RAS) not secured and either monitored. Leakage of information. Unnecessary services. Weak passwords. Accounts with too many privileges. Internet services not well configured. Firewalls not well configured. Lack of patches or configurations by default. No authenticated services. Instructor: Francisco Bolaños, Ing. All the rights reserved. ETHICAL HACKING STAGES - -- - Stages - -- - Footprinting Scanning and Enumeration Vulnerability Analysis Exploitation - -- - - -- -- -- - - -- Instructor: Francisco Bolaños, Ing. All the rights reserved. CONCLUSIONS 1. IT staff should be trained on this topic to prevent security issues: 2. Ethical hacking is a baseline for security audit methodologies. 3. Keep in mind that hacking is art and the security evaluation is science. Instructor: Francisco Bolaños, Ing. All the rights reserved. THANK YOU Instructor: Francisco Bolaños, Ing. All the rights reserved. InterAmerican Academy Instructor: Francisco Bolaños, Ing. All the rights reserved. ETHICAL HACKING STAGES Scanning and Enumeration: Scanning is based on Footprinting because with the information gathered from the Footprinting stage is possible to identify the resources of the target like: access points, open ports, active machines, uncovering services on ports and operating systems. Enumeration lists all the resources found in the scanning with the purpose of having a general network schema and possible vulnerabilities of it. . Go Back Instructor: Francisco Bolaños, Ing. All the rights reserved. ETHICAL HACKING STAGES Footprinting: It is the technique of gathering information about the target or victim . The more information you can get from this stage the more accurate your attack will be. The purpose is to create a profile of the target and get familiar with it. Go Back Instructor: Francisco Bolaños, Ing. All the rights reserved. ETHICAL HACKING STAGES Vulnerability Analysis: It is an active process in which the possible security holes are confirmed or discarded based on the enumeration stage. . Go Back Instructor: Francisco Bolaños, Ing. All the rights reserved. ETHICAL HACKING STAGES Exploitation: In this stage the attacker is going to get access, escalate privileges and get or manipulate the data of his/her victim. In other words, the intruder will hack the company. Go Back Instructor: Francisco Bolaños, Ing. All the rights reserved.