Hacking A Web Site And Secure Web Server Techniques Used

107
Hacking a WebSite & Secure WebServer Techniques used Group-2: RollNo 6-10. Setu Behal Siddharth Bhattacharya

description

Overview of hacking techniques used to attack modern web applications focused on application layer. Cross Site Scripting, SQL Injection, Buffer Overflow, Phishing attacks presented.

Transcript of Hacking A Web Site And Secure Web Server Techniques Used

Page 1: Hacking A Web Site And Secure Web Server Techniques Used

Hacking a WebSite & Secure WebServer Techniques used

Group-2:RollNo 6-10.

Setu BehalSiddharth Bhattacharya

Page 2: Hacking A Web Site And Secure Web Server Techniques Used

A chain is only as strong as its weakest link.

Page 3: Hacking A Web Site And Secure Web Server Techniques Used

As the old Jungle saying goes …

Half knowledge is Dangerous.

Page 4: Hacking A Web Site And Secure Web Server Techniques Used
Page 5: Hacking A Web Site And Secure Web Server Techniques Used

Insight into PracticalWeb-Server Security Issues

Page 6: Hacking A Web Site And Secure Web Server Techniques Used
Page 7: Hacking A Web Site And Secure Web Server Techniques Used
Page 8: Hacking A Web Site And Secure Web Server Techniques Used
Page 9: Hacking A Web Site And Secure Web Server Techniques Used
Page 10: Hacking A Web Site And Secure Web Server Techniques Used
Page 11: Hacking A Web Site And Secure Web Server Techniques Used
Page 12: Hacking A Web Site And Secure Web Server Techniques Used
Page 13: Hacking A Web Site And Secure Web Server Techniques Used
Page 14: Hacking A Web Site And Secure Web Server Techniques Used
Page 15: Hacking A Web Site And Secure Web Server Techniques Used
Page 16: Hacking A Web Site And Secure Web Server Techniques Used
Page 17: Hacking A Web Site And Secure Web Server Techniques Used
Page 18: Hacking A Web Site And Secure Web Server Techniques Used
Page 19: Hacking A Web Site And Secure Web Server Techniques Used
Page 20: Hacking A Web Site And Secure Web Server Techniques Used
Page 21: Hacking A Web Site And Secure Web Server Techniques Used
Page 22: Hacking A Web Site And Secure Web Server Techniques Used
Page 23: Hacking A Web Site And Secure Web Server Techniques Used
Page 24: Hacking A Web Site And Secure Web Server Techniques Used
Page 25: Hacking A Web Site And Secure Web Server Techniques Used
Page 26: Hacking A Web Site And Secure Web Server Techniques Used
Page 27: Hacking A Web Site And Secure Web Server Techniques Used
Page 28: Hacking A Web Site And Secure Web Server Techniques Used
Page 29: Hacking A Web Site And Secure Web Server Techniques Used
Page 30: Hacking A Web Site And Secure Web Server Techniques Used
Page 31: Hacking A Web Site And Secure Web Server Techniques Used
Page 32: Hacking A Web Site And Secure Web Server Techniques Used
Page 33: Hacking A Web Site And Secure Web Server Techniques Used
Page 34: Hacking A Web Site And Secure Web Server Techniques Used
Page 35: Hacking A Web Site And Secure Web Server Techniques Used
Page 36: Hacking A Web Site And Secure Web Server Techniques Used
Page 37: Hacking A Web Site And Secure Web Server Techniques Used
Page 38: Hacking A Web Site And Secure Web Server Techniques Used
Page 39: Hacking A Web Site And Secure Web Server Techniques Used
Page 40: Hacking A Web Site And Secure Web Server Techniques Used
Page 41: Hacking A Web Site And Secure Web Server Techniques Used
Page 42: Hacking A Web Site And Secure Web Server Techniques Used
Page 43: Hacking A Web Site And Secure Web Server Techniques Used
Page 44: Hacking A Web Site And Secure Web Server Techniques Used
Page 45: Hacking A Web Site And Secure Web Server Techniques Used

CACHE Poisoning

Page 46: Hacking A Web Site And Secure Web Server Techniques Used
Page 47: Hacking A Web Site And Secure Web Server Techniques Used
Page 48: Hacking A Web Site And Secure Web Server Techniques Used
Page 49: Hacking A Web Site And Secure Web Server Techniques Used
Page 50: Hacking A Web Site And Secure Web Server Techniques Used
Page 51: Hacking A Web Site And Secure Web Server Techniques Used
Page 52: Hacking A Web Site And Secure Web Server Techniques Used
Page 53: Hacking A Web Site And Secure Web Server Techniques Used
Page 54: Hacking A Web Site And Secure Web Server Techniques Used
Page 55: Hacking A Web Site And Secure Web Server Techniques Used
Page 56: Hacking A Web Site And Secure Web Server Techniques Used
Page 57: Hacking A Web Site And Secure Web Server Techniques Used
Page 58: Hacking A Web Site And Secure Web Server Techniques Used
Page 59: Hacking A Web Site And Secure Web Server Techniques Used
Page 60: Hacking A Web Site And Secure Web Server Techniques Used
Page 61: Hacking A Web Site And Secure Web Server Techniques Used
Page 62: Hacking A Web Site And Secure Web Server Techniques Used

Vulnerabilities of Windows Systems

• 1.Internet Information Services (IIS) • 2.Microsoft Data Access Components (MDAC) -Remote

Data Services • 3.Microsoft SQL Server • 4.NETBIOS -Unprotected Windows Networking Shares • 5.Anonymous Logon -Null Sessions • 6.LAN Manager Authentication -Weak LM Hashing • 7.General Windows Authentication - Accounts with No

Passwords or Weak Passwords • 8.Internet Explorer • 9.Remote Registry Access • 10.Windows Scripting Host

Page 63: Hacking A Web Site And Secure Web Server Techniques Used

Vulnerabilities of Unix Systems

• 1.Remote Procedure Calls (RPC) • 2.Apache Web Server • 3.Secure Shell (SSH) • 4.Simple Network Management Protocol (SNMP) • 5.File Transfer Protocol (FTP) • 6.R-Services -Trust Relationships • 7.Line Printer Daemon (LPD) • 8.Sendmail• 9.BIND/DNS • 10.General Unix Authentication -Accounts with No

Passwords or Weak Passwords

Page 64: Hacking A Web Site And Secure Web Server Techniques Used
Page 65: Hacking A Web Site And Secure Web Server Techniques Used
Page 66: Hacking A Web Site And Secure Web Server Techniques Used
Page 67: Hacking A Web Site And Secure Web Server Techniques Used
Page 68: Hacking A Web Site And Secure Web Server Techniques Used
Page 69: Hacking A Web Site And Secure Web Server Techniques Used
Page 70: Hacking A Web Site And Secure Web Server Techniques Used
Page 71: Hacking A Web Site And Secure Web Server Techniques Used
Page 72: Hacking A Web Site And Secure Web Server Techniques Used
Page 73: Hacking A Web Site And Secure Web Server Techniques Used

Hacking as perceived fromManagement’s Perspective

Page 74: Hacking A Web Site And Secure Web Server Techniques Used
Page 75: Hacking A Web Site And Secure Web Server Techniques Used
Page 76: Hacking A Web Site And Secure Web Server Techniques Used

Hacking ISP DNS

Page 77: Hacking A Web Site And Secure Web Server Techniques Used
Page 78: Hacking A Web Site And Secure Web Server Techniques Used
Page 79: Hacking A Web Site And Secure Web Server Techniques Used
Page 80: Hacking A Web Site And Secure Web Server Techniques Used
Page 81: Hacking A Web Site And Secure Web Server Techniques Used
Page 82: Hacking A Web Site And Secure Web Server Techniques Used
Page 83: Hacking A Web Site And Secure Web Server Techniques Used
Page 84: Hacking A Web Site And Secure Web Server Techniques Used
Page 85: Hacking A Web Site And Secure Web Server Techniques Used
Page 86: Hacking A Web Site And Secure Web Server Techniques Used
Page 87: Hacking A Web Site And Secure Web Server Techniques Used
Page 88: Hacking A Web Site And Secure Web Server Techniques Used
Page 89: Hacking A Web Site And Secure Web Server Techniques Used
Page 90: Hacking A Web Site And Secure Web Server Techniques Used
Page 91: Hacking A Web Site And Secure Web Server Techniques Used

SecurityBest

Paractices[Management-Perspective]

Page 92: Hacking A Web Site And Secure Web Server Techniques Used
Page 93: Hacking A Web Site And Secure Web Server Techniques Used
Page 94: Hacking A Web Site And Secure Web Server Techniques Used
Page 95: Hacking A Web Site And Secure Web Server Techniques Used
Page 96: Hacking A Web Site And Secure Web Server Techniques Used
Page 97: Hacking A Web Site And Secure Web Server Techniques Used
Page 98: Hacking A Web Site And Secure Web Server Techniques Used
Page 99: Hacking A Web Site And Secure Web Server Techniques Used
Page 100: Hacking A Web Site And Secure Web Server Techniques Used
Page 101: Hacking A Web Site And Secure Web Server Techniques Used
Page 102: Hacking A Web Site And Secure Web Server Techniques Used
Page 103: Hacking A Web Site And Secure Web Server Techniques Used
Page 104: Hacking A Web Site And Secure Web Server Techniques Used
Page 105: Hacking A Web Site And Secure Web Server Techniques Used
Page 106: Hacking A Web Site And Secure Web Server Techniques Used
Page 107: Hacking A Web Site And Secure Web Server Techniques Used

Thankyou !!!

• Any Questions ?