google to pwn4ge pt1

Post on 11-Jul-2015

249 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Google to Pwnag3 in 60 Minutes !(or less.)

Jayson E. Street, CISSP, GSEC, GCIH, GCFA

IEM, IAM, CCSE, CCSA, Security+, etc…

Let go of my EGO Lets start out with a little about yours truly.

http://stratagem-one.com

Know yourself know your enemy

• Sun Wu (Tzu) “Ping-fa”(The Art of War)• “Thus it is said that one who knows the enemy and

knows himself will not be endangered in a hundred engagements. One who does not know the enemy but knows himself will sometimes be victorious, sometimes meet with defeat. One who knows neither the enemy nor himself will invariably be defeated in every engagement!”

Contents

• INTRO• The 5 W’s hackers 57y/3• First look at a weapon even a 12 yr. old can love.• Phase 1& 2 Discovery• Phase 3 - 5 Compromise• Now what?• Discussion

Who’s really attacking you on the Internet?

When was the last time you were attacked?

What kind of threats will we cover?

Where’s the benefit for me?

Why should the hackers have all the fun?

The 5 W’s hackers 57y/3

First look at a weapon even a 12 yr. old can love.

• Back Track Live 2

• All the threat of Linux

• Without the need for the Knowledge.• 1 stop for all your hacking needs.

• http://www.remote-exploit.org/backtrack.html

Phase 1 Recon

Need to hack it Google it!http://sec.gov there to help you and your

enemy.The target website they want you to know

all about them.Ask for help hackers are generous with

other peoples resources.

Phase 2 Scan

• Stealth Scanning 101

• Nmap 1 scanner to rule them all

• Slow and steady steals the race.

Phase 3 Explore

The great wall of China and other urban legends.

Drive by browsing.

The human touch.

Phase 4 Exploit

• Netcat the swiss blah blah blah

• Hashing it out

• Got R00T?

Phase 5 Expunge

• Regedit not a regular edit this time.

• Events what events? • Patch and clean (there are some bad people out there)

Caveats(or lame excuses)

• www.victim.com is real so do not try this at home.• The target is easy picking but is that normal?

(Ask anyone still getting hit with nimda and SQL Slammer.)

• Showing off l337 sK1llz is not scary showing you what a grade-schooler is doing is terrifying.

On with the show!

Resources

• Without understanding where the opponent's weaknesses are you cannot borrow their strength to use against them. (Cheng Man Ching)

• http://www.issa-okc.org • http://www.infragardok.org/• http://OSVDB.org• http://isc.sans.org • http://forums.stratagem-one.com (shameless plug)

This presentation is located @– http://f0rb1dd3n.com/s1s/WP/

– Credit to Andy for the web code and Tom for the movie idea.

Now let’s learn from others

• Discussion and Questions????

• Or several minutes of uncomfortable silence it is your choice.

Once again those links

• http://www.issa-okc.org • http://www.infragardok.org/• http://OSVDB.org

• http://isc.sans.org • http://forums.stratagem-one.com (shameless plug)

This presentation is located @

– http://f0rb1dd3n.com/s1s/WP/

top related