How hackers do it

17
how do hackers do it?

description

Slides to accompany a demonstration I did for the Pacific Computing Society in Suva, Fiji in late 2006. It demoed the anatomy of a hacker attack.

Transcript of How hackers do it

Page 1: How hackers do it

how do hackers do it?

Page 2: How hackers do it

1. gather info on the target host

Page 3: How hackers do it

whois

Organization: Fiji ABCDEFG Inc.Admin-Name: Josese Bula Admin-Mailbox: [email protected]: Maciu VinakaTech-Mailbox: [email protected]: dns1.somenetwork.com.fj NS1-Netaddress: 202.151.23.2

Page 4: How hackers do it

Google

Find vulnerabilities, revealing error messages,usernames and sometimes even passwords on your target host, all without ever connectingto it

see http://johnny.ihackstuff.com/

Page 5: How hackers do it

2. scan/sniff to find a way in

Page 6: How hackers do it

nmap

superscan

Page 7: How hackers do it

tcpdump

wireshark (formerly ethereal)

dsniff

Page 8: How hackers do it

nessus

Page 9: How hackers do it

3. exploit vulnerabilities

Page 10: How hackers do it

metasploit framework

Page 11: How hackers do it

john the ripper

cain and abel

thc-hydra

Page 12: How hackers do it

4. cover your tracks

Page 13: How hackers do it

nc -L -d -t -p 23 -e cmd.exe

rootkits

Page 14: How hackers do it

edit logs

Page 15: How hackers do it

help! what can i do?

Page 16: How hackers do it

. remove all unnecessary services

. firewall services that do not need remote access

. actively patch vulnerabilities

. use strong passwords

most importantly:

. educate your users again and again and again

Page 17: How hackers do it

chris hammond-thrasher, [email protected]