Are Your Students Ready To Play The (Ethical) Hacking Game?

56
Are Your Students Ready To Play The (Ethical) Hacking Game?

Transcript of Are Your Students Ready To Play The (Ethical) Hacking Game?

Page 1: Are Your Students Ready To Play The (Ethical) Hacking Game?

Are Your Students Ready To Play The (Ethical) Hacking Game?

Page 2: Are Your Students Ready To Play The (Ethical) Hacking Game?

Welcome!

Presenter: Steven Graham | Senior Director, EC-Council

> About EC-Council> Global, Member Based Information Security Certification

Body> 320+ partners in over 70 Countries> 60,000 Trained Professionals over 21,000 Certified

> Primary Certifications:> Network Security Administrator (E|NSA)> Certified Ethical Hacker (C|EH)> Computer Hacking Forensic Investigator (C|HFI)> Certified Security Analyst/ Licensed Penetration Tester (E|

CSA/L|PT)> 27 total industry certifications. More info at www.eccouncil.org

Page 3: Are Your Students Ready To Play The (Ethical) Hacking Game?

Agenda

> Why Information Security is Important> Oops, I gave my Visa to a Hacker! (Heartland Breach)> Cyber War on our own soil? Is it Possible? (Bot-Nets)> Individual Responsibilities tied to National Security and our

responsibility as educators (DOD-National Strategy to Secure Cyberspace)

> Understanding IT Security Roles and Responsibilities, and educating to them.

> Incorporating Information Security into existing Education programs with the EC-Council | Press

> The Ethical Hacking Game – and introduction to Ethical Hacking – overview & Phase 1 - Reconnaissance

> Discussion

Page 4: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Oops, I gave my Visa to a Hacker! (the Heartland Breach Exposed)> January of 2009 Heartland Payment Systems,

responsible for the processing of 100 Million Credit Card Transactions for 175,000 unique Merchants every month, announced their compromise.

> Bob Carr, CEO sells 80,000 Shares for 1.4 million right before public announcement of the breach

> Stock Plummets

Page 5: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Oops, I gave my Visa to a Hacker! (the Heartland Breach Exposed)

January 6th, 2009Price: 18.83Volume: 329k January 21st, 2009

Price: 14.11Volume: 839k

January 22nd, 2009Price: 8.18Volume: 4 Million

1 day marked a 43% Drop in Stock Value with SharesJumping from 839K To over 4 million

Page 6: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Oops, I gave my Visa to a Hacker! (the Heartland Breach Exposed)> In a recent USA TODAY interview, Heartland’s

President and CFO, Robert Baldwin Noted, in late 2008, hackers had access for “longer than weeks”, no specific information was released.

> Visa & MasterCard Notified Heartland of suspicious transactions stemming from their accounts, then investigators found a “Data-Stealing” program.

> 3 weeks access, potentially 750 million credit card transactions exposed!

Page 7: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Oops, I gave my Visa to a Hacker! (the Heartland Breach Exposed)> Lessons Learned

> End-to-end encryption was not in place> Intrusion Detection, Intrusion Prevention systems were

insufficient> Proactive Scanning for anomalies failed or was not present.> Cyber criminals Exploited Vulnerabilities in Heartland Systems

compromising the financial Data of millions of customers. > Preventative security measures were insufficient despite best

efforts and compliance to standard industry regulations.

Page 8: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Cyber War on our own soil? Is it Possible? (Bot-Nets)> The simple answer, YES AND IT’S HAPPENING NOW!> 2008 attacks against SecureWorks managed clients

originating countries:> #10 Canada originated 107,483 Attacks> #9 Germany originated 110,493 Attacks> #8 Taiwan originated 124,997 Attacks> #7 Russia originated 130,572 Attacks> #6 Japan originated 142,346 Attacks> #5 Poland originated 153,205 Attacks> #4 South Korea originated 162,289 Attacks> #3 Brazil originated 166,987 Attacks

Page 9: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Cyber War on our own soil? Is it Possible? (Bot-Nets)> The simple answer, YES AND IT’S HAPPENING NOW!> 2008 attacks against SecureWorks managed clients originating

countries:

>#2 China originated 7,700,000 Attacks

>#1 United States of America originated 20,600,000 Attacks emanating from Computers inside US Borders

Page 10: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Cyber War on our own soil? Is it Possible? (Bot-Nets)> What is prompting these attacks?> “Owned computers” by large become a part of various

“BotNets” and can be remotely controlled.> Hackers gain access to combined computing resources

through distribution of passive Malware, Virus’, and Trojans.

> Compromised/unprotected Personal Computers, Library Networks, School Networks, Govt. Networks, and Corporate Networks contribute to the proliferation of BotNets.

Page 11: Are Your Students Ready To Play The (Ethical) Hacking Game?

Example Workings of a BotNet• Stage 1, Stage 2:

The Bot Master sends malicious trojan/botnet client over the Internet and infects a victim

• Stage 3:

The bot client connects to the Command Centre( Malicious Server)and informs the status of being infected

• Stage4:

Command Centre informs the Bot Master about the victim

• Stage 5:

The attacker sends attack information to the command centre

• Stage6,

The command centre triggers the victim with the set of instructions sent by the Bot Master to search for other victim computers with similar vulnerabilities

• Stage 7:

The compromised computer scans the Internet for other similar systems and infects them with malicious code

• Stage 8:

This way the attacker creates a huge network of bots that are ready to act based on the instructions sent by the attacker.

The network of bots is referred to as botnet

Page 12: Are Your Students Ready To Play The (Ethical) Hacking Game?

Example Workings of a BotNet

INTERNET

1 Creates a vicious Trojan/ Bot Client

Bot Master

Victim

2

Command Centre

3

4

5

6

Victim

Victim

Victim

Victim

7

7

7

7

8

8

88

EC-Council

Page 13: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> How does this apply to me as an educator?– According to the DOD’s National Strategy to Secure Cyber

Space: “Each American who depends on cyberspace, the network of information networks, must secure the part that they own or for which they are responsible.”

– To further explain, Threats & Vulnerabilities a 5 Level Problem. Consider where your graduates go.

1. Home Users/Small Business

2. Large Enterprises

3. Critical Sectors/Infrastructures

4. National Issues

5. Global

Page 14: Are Your Students Ready To Play The (Ethical) Hacking Game?

Typical Security Job Roles and responsibilities

Job Level Typical Roles Corresponding EC-Council Certifications & Designations

IT/IS Executive

Information Assurance, Design, and Compliance

MSS/ECSO (Coming Soon)

IT/IS Manager

Information Assurance

oversight and Personnel

management

IT/IS Specialist

Specialization roles including Pen Testing, Forensics,

Disaster Recover, Voice over IP,

Secure Programming,

etc.

Penetration Testing Specialist

Forensics SpecialistDisaster Recovery

SpecialistVOIP Specialist

Secure Programmer

IT/IS Admin

Network Installation,

Configuration, maintenance, Information Assurance

IT/IS Technician

Standard Network installation & configuration

Information Worker

Access to Computing

systems

Page 15: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Information Security Job Roles/Responsibilities.> Front Line (Receptionist, secretaries, Information Workers, HR,

Accounting, Non-IT personnel)> Responsibilities – Protect Corporate information

> Vulnerable to – Social Engineering attacks leaking sensitive information, or portions of the “big Picture” allowing attackers to gain access. Computer Virus/Worms/Trojans, Etc.

> 1st Level IT, Help Desk, Support Specialists, Network Administrators.> Responsibilities – Adhere to Security/General IT Policy. Standard

Configurations and supporting roles to superiors, internal and external clients.> Vulnerable to – Social Engineering, Mis-configurations, Common mistakes

exposing serious vulnerability

Page 16: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why Information Security is Important

> Information Security Job Roles/Responsibilities.> 2nd Level IT Network Engineers, Managers, Auditors,

Specialists> Responsibility – System Design and maintenance, constant

assessment, Security Patching, Hardware/software break-fix upgrade. Typically first line contact with outsourced firms/consultants. E-Discovery/Preservation. DR/BC

> Vulnerabilities – Mis-configuration, Policy Gaps, Outsource mistakes/decisions/assessment. Admin Level Access.

> Executives – Director of IT, CIO, CISO, CEO> Responsibility – Compliance, Compliance, Compliance

> Vulnerability - ALL VULNERABILITIES END UP HERE.

Page 17: Are Your Students Ready To Play The (Ethical) Hacking Game?

Incorporating Information Security Titles in existing Education Programs.

EC-Council | PressSecurity Fundamentals – General Education – entry level Computer ScienceSecurity | 5 Titles

• Social Site and Online Behavior• Cyber Dangers• ID Theft

Security Essentials – Entry Level Computer ScienceE|NSA Network Defense Titles:

• Network fundamentals and protocols • Network threats and security policy • Perimeter defense mechanisms • Securing network devices, operating system and troubleshooting • Patch Management and Log Analysis

Page 18: Are Your Students Ready To Play The (Ethical) Hacking Game?

Incorporating Information Security Titles in existing Education Programs.

EC-Council | PressEthical Hacking & Counter Measures – Computer

Science/Security – entry level to advanced Computer ScienceC|EH Ethical Hacking Titles

• The CEH Hacking cycle and Penetration Testing • Threats and defensive mechanisms • Hacking Web applications • Securing Linux and Defense against Buffer Overflows

• Securing Network Infrastructure

Page 19: Are Your Students Ready To Play The (Ethical) Hacking Game?

Incorporating Information Security Titles in existing Education Programs.

EC-Council | PressComputer Forensics – Computer Science/Security – entry level to

advanced Computer ScienceC|HFI Computer Forensics Titles:

• Investigating procedures and role of an expert witness • Computer Forensic Lab Requirements Ethical Hacking: Hacking Web

applications • Investigating file systems, hard disks and operating systems for evidence • Investigating data and image files for evidence • Investigating network intrusions and cyber attacks • Investigating attacks on wireless network and devices

Page 20: Are Your Students Ready To Play The (Ethical) Hacking Game?

Incorporating Information Security Titles in existing Education Programs.

EC-Council | PressPenetration Testing – Computer Science/Security – Advanced

Computer Science

E|CSA Computer Security Analyst/ Advanced Penetration Testing Titles:

• Security analysis and advanced tools • Customer agreements and reporting procedures Penetration Testing

Methodologies • Network Perimeter Testing Procedures • Communication Media Testing Procedures • Network Threat Testing Procedures

Page 21: Are Your Students Ready To Play The (Ethical) Hacking Game?

Now, It’s time to play!

EC-Council

Slides extracted from EC-Council’s Intro to Ethical Hacking

Here comes the part you all came for

Page 22: Are Your Students Ready To Play The (Ethical) Hacking Game?

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 23: Are Your Students Ready To Play The (Ethical) Hacking Game?

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 24: Are Your Students Ready To Play The (Ethical) Hacking Game?

ECC Fulfills the Need

• Ethical Hacking and Countermeasures (C|EH)– CEH understand tools and techniques

used• Attack tools – by those outside the network• Compromise tools – by those inside the

network

– “Thinking like a hacker”

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 25: Are Your Students Ready To Play The (Ethical) Hacking Game?

Problem Definition – Why Security?

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 26: Are Your Students Ready To Play The (Ethical) Hacking Game?

What Does a Malicious Hacker Do?

Clearing Tracks

Maintaining Access

Gaining Access

Scanning

Reconnaissance

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 27: Are Your Students Ready To Play The (Ethical) Hacking Game?

Phase 1 - Reconnaissance

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 28: Are Your Students Ready To Play The (Ethical) Hacking Game?

Reconnaissance Types

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 29: Are Your Students Ready To Play The (Ethical) Hacking Game?

Step 1: Reconnaissance

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 30: Are Your Students Ready To Play The (Ethical) Hacking Game?

Part 1: Footprinting

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 31: Are Your Students Ready To Play The (Ethical) Hacking Game?

Revisiting Reconnaissance

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 32: Are Your Students Ready To Play The (Ethical) Hacking Game?

Defining Footprinting

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 33: Are Your Students Ready To Play The (Ethical) Hacking Game?

Why is Footprinting Necessary

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 34: Are Your Students Ready To Play The (Ethical) Hacking Game?

Unearthing Initial Information

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 35: Are Your Students Ready To Play The (Ethical) Hacking Game?

Finding a Company’s URL

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 36: Are Your Students Ready To Play The (Ethical) Hacking Game?

Tool: WebFerret

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 37: Are Your Students Ready To Play The (Ethical) Hacking Game?

Extracting Archive 0f a Website

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 38: Are Your Students Ready To Play The (Ethical) Hacking Game?

www.archive.org

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 39: Are Your Students Ready To Play The (Ethical) Hacking Game?

www.archive.org (cont’d)

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 40: Are Your Students Ready To Play The (Ethical) Hacking Game?

Anonymity with Caches

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 41: Are Your Students Ready To Play The (Ethical) Hacking Game?

Yahoo People Search

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 42: Are Your Students Ready To Play The (Ethical) Hacking Game?

Footprinting Through Job Sites

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 43: Are Your Students Ready To Play The (Ethical) Hacking Game?

• Industry trade associations may provide information about the target network as well

Footprinting Through Industry Sites

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 44: Are Your Students Ready To Play The (Ethical) Hacking Game?

Passive Information Gathering

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 45: Are Your Students Ready To Play The (Ethical) Hacking Game?

Competitive Intelligence Gathering

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 46: Are Your Students Ready To Play The (Ethical) Hacking Game?

Tool: HTTrack Web Site Copier

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 47: Are Your Students Ready To Play The (Ethical) Hacking Game?

Tool: SpiderFoot

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 48: Are Your Students Ready To Play The (Ethical) Hacking Game?

Tool: Expired Domains

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 49: Are Your Students Ready To Play The (Ethical) Hacking Game?

Tool: Maltego

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 50: Are Your Students Ready To Play The (Ethical) Hacking Game?

E-Mail Spiders

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 51: Are Your Students Ready To Play The (Ethical) Hacking Game?

Part 2: Google Hacking

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 52: Are Your Students Ready To Play The (Ethical) Hacking Game?

What is Google Hacking

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 53: Are Your Students Ready To Play The (Ethical) Hacking Game?

What a Hacker Can Find With Google Hacking

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 54: Are Your Students Ready To Play The (Ethical) Hacking Game?

SiteDigger Tool

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Page 55: Are Your Students Ready To Play The (Ethical) Hacking Game?

C|EH Cont.

Copyright © by EC-Council All rights reserved. Reproduction is strictly

prohibited.

Source Decks continue on with complete presentations of:

•Scanning

•Gaining Access

•Maintaining Access

•Covering Your Tracks

Over 3500 Tools, virus;, malware, robo-demo videos recorded in our advanced hacking lab, and examples included in curriculum.

Page 56: Are Your Students Ready To Play The (Ethical) Hacking Game?

Conclusion

Thank you for your Time. Discussion is now open.

Contact:

EC-Council:

Steven GrahamSenior Director | [email protected] Osuna NE,Albuquerque, NM 87109Web: http://iclass.eccouncil.org/US Office: 505.341.3228 x102

Presentation Sources:EC-Councilwww.eccouncil.orgiclass.eccouncil.orgUSA Today:http://www.usatoday.com/money/perfi/credit/2009-01-20-heartland-credit-card-security-breach_N.htmHeartland Processing Systemswww.2008breach.comSecure Workshttp://www.secureworks.com/media/press_releases/20080922-attacks/EC-CouncilCertified Ethical Hacker Curriculum Version 6.0 – BotnetsDepartment of Defense (US)http://www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdf

Cengage:

Elizabeth SuggSenior Curriculum Services Manager, Digital Solutions GroupCengage LearningPO Box 563, Nyack, New York 10960 c 845-337-0253(o) 845-358-4836| (e) [email protected] | www.cengage.com