ethical hacking presentation october 2006
TRANSCRIPT
![Page 1: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/1.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 1/98
Ethical Hacking for Ethical Hacking for
EducatorsEducators
Presented ByPresented By
Regina DeLisse Hartley, Ph.D.Regina DeLisse Hartley, Ph.D.
Caldwell Community College & Caldwell Community College &
Technical InstituteTechnical Institute
![Page 2: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/2.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 2/98
OverviewOverview
Old School Hackers: History of HackingOld School Hackers: History of Hacking Ec-Council: Certified Ethical HackerEc-Council: Certified Ethical Hacker Learning CompetenciesLearning Competencies Teaching Resources: Ethical HackingTeaching Resources: Ethical Hacking
TextbooksTextbooks Hacking ToolsHacking Tools Hacker Challenge WebsitesHacker Challenge Websites Additional Web SitesAdditional Web Sites Questions and AnswersQuestions and Answers
![Page 3: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/3.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 3/98
Old School Hackers:Old School Hackers:
History of HackingHistory of Hacking
![Page 4: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/4.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 4/98
PREHISTORYPREHISTORY 1960s: The Dawn of 1960s: The Dawn of
HackingHacking
Original meaning of theOriginal meaning of theword "hack" started atword "hack" started atMIT; meant elegant, wittyMIT; meant elegant, wittyor inspired way of doingor inspired way of doingalmost anything; hacksalmost anything; hackswere programmingwere programming
shortcutsshortcutsELDER DAYS (1970-1979)ELDER DAYS (1970-1979) 1970s: Phone Phreaks1970s: Phone Phreaks
and Cap'n Crunch:and Cap'n Crunch: OneOnephreak, John Draper (akaphreak, John Draper (aka
"Cap'n Crunch"), discovers"Cap'n Crunch"), discoversa toy whistle inside Cap'na toy whistle inside Cap'nCrunch cereal gives 2600-Crunch cereal gives 2600-hertz signal, and canhertz signal, and canaccess AT&T's long-access AT&T's long-
distance switching system.distance switching system.
DraperDraper builds a "bluebuilds a "bluebox" used with whistlebox" used with whistleallows phreaks to makeallows phreaks to makefree calls.free calls.
Steve WozniakSteve Wozniak andandSteve Jobs, futureSteve Jobs, futurefounders of Applefounders of AppleComputer, make and sellComputer, make and sellblue boxes.blue boxes.
THE GOLDEN AGETHE GOLDEN AGE(1980-1991)(1980-1991) 1980: Hacker Message1980: Hacker Message
Boards and GroupsBoards and GroupsHacking groups form;Hacking groups form;
such as Legion of Doomsuch as Legion of Doom(US), Chaos Computer(US), Chaos ComputerClub (Germany).Club (Germany).
1983: Kids' Games1983: Kids' GamesMovie "War Games"Movie "War Games"
introduces public tointroduces public tohacking.hacking.
![Page 5: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/5.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 5/98
THE GREAT HACKER WAR THE GREAT HACKER WAR Legion of DoomLegion of Doom vsvs
Masters of Deception;Masters of Deception;
online warfare; jammingonline warfare; jammingphone lines.phone lines.
1984: Hacker 'Zines1984: Hacker 'ZinesHacker magazine 2600Hacker magazine 2600publication; online 'zinepublication; online 'zine
Phrack.Phrack.CRACKDOWN (1986-CRACKDOWN (1986-
1994)1994) 1986:1986: Congress passesCongress passes
Computer Fraud and AbuseComputer Fraud and Abuse
Act; crime to break intoAct; crime to break intocomputer systems.computer systems. 11988: The Morris Worm988: The Morris Worm
Robert T. Morris, Jr.,Robert T. Morris, Jr.,launches self-replicatinglaunches self-replicating
worm on ARPAnet.worm on ARPAnet.
1989: The Germans ,the KGB and KevinMitnick.
German Hackers arrested for breakinginto U.S. computers;sold information toSoviet KGB.
Hacker "The Mentor“ arrested; publishesHacker's Manifesto.
Kevin Mitnick convicted; first person
convicted under lawagainst gaining accessto interstate networkfor criminal purposes.
![Page 6: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/6.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 6/98
1993: Why Buy a Car1993: Why Buy a CarWhen You Can HackWhen You Can HackOne?One?Radio station call-inRadio station call-in
contest; hacker-fugitivecontest; hacker-fugitiveKevin Poulsen and friendsKevin Poulsen and friendscrack phone; theycrack phone; theyallegedly get two Porsches,allegedly get two Porsches,$20,000 cash, vacation$20,000 cash, vacationtrips; Poulsen now atrips; Poulsen now afreelance journalistfreelance journalistcovering computer crime.covering computer crime.
First Def ConFirst Def Con hackinghackingconference in Las Vegasconference in Las Vegas
ZERO TOLERANCE (1994-ZERO TOLERANCE (1994-
1998)1998) 1995: The Mitnick1995: The Mitnick
Takedown:Takedown: ArrestedArrestedagain; charged withagain; charged withstealing 20,000 credit cardstealing 20,000 credit card
numbers.numbers.
1995: Russian Hackers Siphon $10 million fromCitibank; Vladimir Levin,leader.
Oct 1998 teenager hacksinto Bell Atlantic phonesystem; disabledcommunication at airportdisables runway lights.
1999 hackers attackPentagon, MIT, FBI websites.
1999: E-commercecompany attacked;
blackmail threats followedby 8 million credit cardnumbers stolen. (www.blackhat.info; www.h2k2.net;www.slais.ubc.ca/; www.sptimes.com;www.tlc.discovery.com)
![Page 7: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/7.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 7/98
Ec-Council: Certified EthicalEc-Council: Certified Ethical
Hacker Hacker
![Page 8: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/8.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 8/98
EC-Council has certified ITEC-Council has certified IT
professionals from the followingprofessionals from the followingorganizations as CEH:organizations as CEH:
Novell, Canon, Hewlett Packard, US Air ForceNovell, Canon, Hewlett Packard, US Air ForceReserve, US Embassy, Verizon, PFIZER, HDFCReserve, US Embassy, Verizon, PFIZER, HDFCBank, University of Memphis, MicrosoftBank, University of Memphis, MicrosoftCorporation, Worldcom, Trusecure, USCorporation, Worldcom, Trusecure, USDepartment of Defense, Fedex, Dunlop, BritishDepartment of Defense, Fedex, Dunlop, British
Telecom, Cisco, Supreme Court of the Philippines,Telecom, Cisco, Supreme Court of the Philippines,United Nations, Ministry of Defense, UK, NortelUnited Nations, Ministry of Defense, UK, NortelNetworks, MCI, Check Point Software, KPMG, FleetNetworks, MCI, Check Point Software, KPMG, FleetInternational, Cingular Wireless, Columbia DailyInternational, Cingular Wireless, Columbia DailyTribune, Johnson & Johnson, Marriott Hotel,Tribune, Johnson & Johnson, Marriott Hotel,Tucson Electric Power Company, Singapore PoliceTucson Electric Power Company, Singapore Police
ForceForce
![Page 9: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/9.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 9/98
PriceWaterhouseCoopers, SAP, Coca-Cola
Corporation, Quantum Research, US Military, IBMGlobal Services, UPS, American Express, FBI,Citibank Corporation, Boehringer Ingelheim,Wipro, New York City Dept Of IT & Telecom –DoITT, United States Marine Corps, ReserveBank of India, US Air Force, EDS, Bell Canada,SONY, Kodak, Ontario Provincial Police, HarrisCorporation, Xerox, Philips Electronics, U.S.Army, Schering, Accenture, Bank One, SAIC,Fujitsu, Deutsche Bank
(Cont.)(Cont.)
![Page 10: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/10.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 10/98
Hackers are here. Where areHackers are here. Where are
you?you? The explosive growth of the Internet hasThe explosive growth of the Internet has
brought many good things…As with mostbrought many good things…As with mosttechnological advances, there is also a darktechnological advances, there is also a darkside: criminal hackers.side: criminal hackers.
The term “hacker” has a dual usage in theThe term “hacker” has a dual usage in thecomputer industry today. Originally, the termcomputer industry today. Originally, the termwas defined as:was defined as:
HACKER HACKER noun.noun. 1. A person who enjoys1. A person who enjoys
learning the details of computer systems andlearning the details of computer systems andhow to stretch their capabilities…. 2. One whohow to stretch their capabilities…. 2. One whoprograms enthusiastically or who enjoysprograms enthusiastically or who enjoysprogramming rather than just theorizing aboutprogramming rather than just theorizing about
programming.programming.
![Page 11: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/11.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 11/98
What is a Hacker?What is a Hacker?
Old School Hackers:Old School Hackers: 1960s style Stanford or MIT1960s style Stanford or MIThackers. Do not have malicious intent, but do havehackers. Do not have malicious intent, but do havelack of concern for privacy and proprietarylack of concern for privacy and proprietaryinformation. They believe the Internet wasinformation. They believe the Internet wasdesigned to be an open system.designed to be an open system.
Script Kiddies or Cyber-Punks:Script Kiddies or Cyber-Punks: Between 12-30;Between 12-30;predominantly white and male; bored in school; getpredominantly white and male; bored in school; getcaught due to bragging online; intent is tocaught due to bragging online; intent is tovandalize or disrupt systems.vandalize or disrupt systems.
Professional Criminals or Crackers:Professional Criminals or Crackers: Make aMake aliving by breaking into systems and selling theliving by breaking into systems and selling theinformation.information.
Coders and Virus Writers:Coders and Virus Writers: See themselves as anSee themselves as anelite; programming background and write code butelite; programming background and write code butwon’t use it themselves; have their own networkswon’t use it themselves; have their own networkscalled “zoos”; leave it to others to release theircalled “zoos”; leave it to others to release their
code into “The Wild” or Internet.code into “The Wild” or Internet. ((www.tlc.discovery.comwww.tlc.discovery.com))
![Page 12: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/12.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 12/98
What is Ethical Hacking?What is Ethical Hacking?
Ethical hackingEthical hacking – defined “methodology– defined “methodologyadopted by ethical hackers to discover theadopted by ethical hackers to discover thevulnerabilities existing in informationvulnerabilities existing in informationsystems’ operating environments.” systems’ operating environments.”
With the growth of the Internet, computerWith the growth of the Internet, computersecurity has become a major concern forsecurity has become a major concern forbusinesses and governments.businesses and governments.
In their search for a way to approach theIn their search for a way to approach theproblem, organizations came to realizeproblem, organizations came to realize
that one of the best ways to evaluate thethat one of the best ways to evaluate theintruder threat to their interests would beintruder threat to their interests would beto have independent computer securityto have independent computer securityprofessionals attempt to break into theirprofessionals attempt to break into their
computer systems.computer systems.
![Page 13: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/13.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 13/98
Who are Ethical Hackers?Who are Ethical Hackers? ““One of the best ways to evaluate the intruder One of the best ways to evaluate the intruder
threat is to have an independent computer threat is to have an independent computer security professionals attempt to break their security professionals attempt to break their computer systems” computer systems”
Successful ethical hackers possess a variety of Successful ethical hackers possess a variety of
skills. First and foremost, they must be completelyskills. First and foremost, they must be completelytrustworthy.trustworthy. Ethical hackers typically have very strongEthical hackers typically have very strong
programming and computer networking skills.programming and computer networking skills. They are also adept at installing and maintainingThey are also adept at installing and maintaining
systems that use the more popular operatingsystems that use the more popular operatingsystems (e.g., Linux or Windows 2000) used onsystems (e.g., Linux or Windows 2000) used ontarget systems.target systems.
These base skills are augmented with detailedThese base skills are augmented with detailedknowledge of the hardware and software providedknowledge of the hardware and software provided
by the more popular computer and networkingby the more popular computer and networkinghardware vendors.hardware vendors.
![Page 14: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/14.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 14/98
What do Ethical Hackers do?What do Ethical Hackers do?
An ethical hacker’s evaluation of a system’sAn ethical hacker’s evaluation of a system’s
security seeks answers to these basic questions:security seeks answers to these basic questions:
• What can an intruder see on the targetWhat can an intruder see on the target
systems?systems?
• What can an intruder do with that information?What can an intruder do with that information?
• Does anyone at the target notice the intruder’sDoes anyone at the target notice the intruder’s
at tempts or successes?at tempts or successes?
• What are you trying to protect?What are you trying to protect?• What are you trying to protect against?What are you trying to protect against?
• How much time, effort, and money are youHow much time, effort, and money are you
willing to expend to obtain adequatewilling to expend to obtain adequate
protection?protection?
![Page 15: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/15.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 15/98
How much do Ethical HackersHow much do Ethical Hackers
get Paid?get Paid? Globally, the hiring of ethical hackers is onGlobally, the hiring of ethical hackers is on
the rise with most of them working withthe rise with most of them working with
top consulting firms.top consulting firms. In the United States, an ethical hacker canIn the United States, an ethical hacker can
make upwards of $120,000 per annum.make upwards of $120,000 per annum. Freelance ethical hackers can expect toFreelance ethical hackers can expect to
make $10,000 per assignment.make $10,000 per assignment. Some ranges from $15,000 toSome ranges from $15,000 to
$45,000 for a standalone ethical$45,000 for a standalone ethical
hack.hack.
![Page 16: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/16.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 16/98
Certified Ethical Hacker (C|EH)Certified Ethical Hacker (C|EH)
TrainingTraining
InfoSec AcademyInfoSec Academy
http://www.infosecacademy.comhttp://www.infosecacademy.com
• Five-dayFive-day Certified Ethical Hacker (C|EH)Certified Ethical Hacker (C|EH) Training Camp Certification Training ProgramTraining Camp Certification Training Program
• (C|EH)(C|EH) examinationexamination
• C|EH Certified EthicalC|EH Certified Ethical
Hacker Training CampHacker Training Camp(5-Day Package)(5-Day Package)$3,595$3,595
($2,580 training only)($2,580 training only)
(Source: www.eccouncil.org)
![Page 17: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/17.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 17/98
Learning CompetenciesLearning Competencies
![Page 18: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/18.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 18/98
Required Skills of an EthicalRequired Skills of an Ethical
Hacker Hacker
Routers:Routers: knowledge of routers, routingknowledge of routers, routingprotocols, and access control listsprotocols, and access control lists
Microsoft:Microsoft: skills in operation, configuration andskills in operation, configuration andmanagement.management.
Linux:Linux: knowledge of Linux/Unix; securityknowledge of Linux/Unix; securitysetting, configuration, and services.setting, configuration, and services.
Firewalls:Firewalls: configurations, and operation of configurations, and operation of intrusion detection systems.intrusion detection systems.
MainframesMainframes Network Protocols:Network Protocols: TCP/IP; how they functionTCP/IP; how they function
and can be manipulated.and can be manipulated. Project Management:Project Management: knowledge of leading,knowledge of leading,
planning, organizing, and controlling aplanning, organizing, and controlling apenetration testing team.penetration testing team.
(Source: http://www.examcram.com)
![Page 19: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/19.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 19/98
Modes of Ethical HackingModes of Ethical Hacking
Insider attackInsider attack
Outsider attackOutsider attack
Stolen equipment attackStolen equipment attack Physical entryPhysical entry
Bypassed authentication attackBypassed authentication attack
(wireless access points)(wireless access points) Social engineering attackSocial engineering attack
(Source: http://www.examcram.com)
![Page 20: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/20.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 20/98
Anatomy of an attack:Anatomy of an attack:
• ReconnaissanceReconnaissance – attacker gathers– attacker gathers
information; can include socialinformation; can include socialengineering.engineering.• ScanningScanning – searches for open ports (port– searches for open ports (port
scan) probes target for vulnerabilities.scan) probes target for vulnerabilities.
• Gaining accessGaining access – attacker exploits– attacker exploitsvulnerabilities to get inside system; usedvulnerabilities to get inside system; usedfor spoofing IP.for spoofing IP.
• Maintaining accessMaintaining access – creates backdoor– creates backdoorthrough use of Trojans; once attackerthrough use of Trojans; once attackergains access makes sure he/she can getgains access makes sure he/she can getback in.back in.
• Covering tracksCovering tracks – deletes files, hides– deletes files, hidesfiles, and erases log files. So that attackerfiles, and erases log files. So that attacker
cannot be detected or penalized.cannot be detected or penalized.(Source: www.eccouncil.org)
![Page 21: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/21.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 21/98
Hacker classesHacker classes
• Black hatsBlack hats – highly skilled,– highly skilled,
malicious, destructive “crackers” malicious, destructive “crackers” • White hatsWhite hats – skills used for– skills used for
defensive security analystsdefensive security analysts
• Gray hatsGray hats – offensively and– offensively and
defensively; will hack for differentdefensively; will hack for different
reasons, depends on situation.reasons, depends on situation. HactivismHactivism – hacking for social and– hacking for social and
political cause.political cause. Ethical hackersEthical hackers – determine what– determine what
attackers can gain access to, what theyattackers can gain access to, what theywill do with the information, and can theywill do with the information, and can they
be detected.be detected. (Source: www.eccouncil.org)
![Page 22: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/22.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 22/98
Teaching Resources: EthicalTeaching Resources: EthicalHacking TextbooksHacking Textbooks
![Page 23: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/23.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 23/98
Ec-CouncilEc-Council
Certified Ethical HackerCertified Ethical Hacker
www.eccouncil.org
ISBN 0-9729362-1-1
![Page 24: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/24.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 24/98
![Page 25: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/25.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 25/98
Ec-Council (Cont.)Ec-Council (Cont.)
Web Application VulnerabilitiesWeb Application Vulnerabilities Web Based Password Cracking TechniquesWeb Based Password Cracking Techniques SQL InjectionSQL Injection Hacking Wireless NetworksHacking Wireless Networks VirusesViruses Novell HackingNovell Hacking
Linux HackingLinux Hacking Evading IDS, Firewalls and HoneypotsEvading IDS, Firewalls and Honeypots Buffer OverflowsBuffer Overflows CryptographyCryptography
![Page 26: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/26.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 26/98
Certified Ethical Hacker ExamCertified Ethical Hacker Exam
PrepPrep
http://www.examcram.comISBN 0-7897-3531-8
![Page 27: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/27.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 27/98
Certified Ethical Hacker ExamCertified Ethical Hacker Exam
PrepPrep
The Business Aspects of PenetrationThe Business Aspects of PenetrationTestingTesting
The Technical Foundations of HackingThe Technical Foundations of Hacking Footprinting and ScanningFootprinting and Scanning Enumeration and System HackingEnumeration and System Hacking Linux and automated Security AssessmentLinux and automated Security Assessment
ToolsTools Trojans and BackdoorsTrojans and Backdoors Sniffers, Session Hyjacking, and Denial of Sniffers, Session Hyjacking, and Denial of
ServiceService
![Page 28: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/28.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 28/98
Certified Ethical Hacker ExamCertified Ethical Hacker Exam
Prep (Cont.)Prep (Cont.) Web Server Hacking, Web Applications,Web Server Hacking, Web Applications,
and Database Attacksand Database Attacks
Wireless Technologies, Security, andWireless Technologies, Security, and
AttacksAttacks
IDS, Firewalls, and HoneypotsIDS, Firewalls, and Honeypots
Buffer Overflows, Viruses, and WormsBuffer Overflows, Viruses, and Worms Cryptographic Attacks and DefensesCryptographic Attacks and Defenses
Physical Security and Social EngineeringPhysical Security and Social Engineering
![Page 29: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/29.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 29/98
Hands-On Information SecurityHands-On Information Security
Lab Manual, Second EditionLab Manual, Second Edition
http://www.course.com/
ISBN 0-619-21631-X
1. Footprinting
2. Scanning and Enumeration
3. Operating System Vulnerabilities
and Resolutions4. Network Security Tools and
Technologies
5. Security Maintenance
6. Information SecurityManagement
7. File System Security and
Cryptography
8. Computer Forensics
![Page 30: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/30.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 30/98
Hacking Tools: Footprinting andHacking Tools: Footprinting and
ReconnaissanceReconnaissance
![Page 31: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/31.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 31/98
WhoisWhois
![Page 32: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/32.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 32/98
Whois (cont.)Whois (cont.)
http://www.allwhois.com/
![Page 33: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/33.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 33/98
Whois (cont.)Whois (cont.)
![Page 34: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/34.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 34/98
Sam SpadeSam Spade
![Page 35: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/35.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 35/98
Sam Spade (Cont.)Sam Spade (Cont.)
![Page 36: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/36.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 36/98
NslookupNslookup
![Page 37: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/37.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 37/98
Nslookup OptionsNslookup Options
![Page 38: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/38.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 38/98
TracerouteTraceroute
![Page 39: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/39.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 39/98
PingPing
![Page 40: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/40.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 40/98
Ping OptionsPing Options
![Page 41: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/41.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 41/98
Hacking Tools: Scanning andHacking Tools: Scanning and
EnumerationEnumeration
![Page 42: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/42.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 42/98
nmapnmap
![Page 43: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/43.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 43/98
NMapWinNMapWin
![Page 44: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/44.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 44/98
SuperScanSuperScan
![Page 45: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/45.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 45/98
SuperScan (Cont.)SuperScan (Cont.)
![Page 46: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/46.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 46/98
IP Scanner IP Scanner
![Page 47: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/47.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 47/98
HyenaHyena
![Page 48: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/48.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 48/98
RetinaRetina
![Page 49: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/49.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 49/98
LANguardLANguard
![Page 50: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/50.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 50/98
Hacking Tools: System HackingHacking Tools: System Hacking
![Page 51: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/51.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 51/98
telnettelnet
S db
![Page 52: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/52.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 52/98
SnadboySnadboy
P d C ki ithP d C ki ith
![Page 53: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/53.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 53/98
Password Cracking withPassword Cracking with
LOphtcrackLOphtcrack
![Page 54: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/54.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 54/98
Keylogger Keylogger
![Page 55: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/55.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 55/98
Hacking Tools: Trojans andHacking Tools: Trojans and
BackdoorsBackdoors
![Page 56: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/56.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 56/98
NetBusNetBus
G C t B kd fG C t B kd f
![Page 57: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/57.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 57/98
Game Creates Backdoor for Game Creates Backdoor for
NetBusNetBus
![Page 58: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/58.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 58/98
SubSevenSubSeven
![Page 59: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/59.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 59/98
Hacking Tools: SniffersHacking Tools: Sniffers
S fi MAC ddSpoofing a MAC address
![Page 60: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/60.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 60/98
Spoofing a MAC addressSpoofing a MAC address
Original ConfigurationOriginal Configuration
![Page 61: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/61.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 61/98
Spoofed MacSpoofed Mac
![Page 62: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/62.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 62/98
EtherealEthereal
![Page 63: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/63.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 63/98
IrisIris
![Page 64: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/64.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 64/98
![Page 65: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/65.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 65/98
Hacking Tools: Web BasedHacking Tools: Web Based
Password CrackingPassword Cracking
![Page 66: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/66.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 66/98
Cain and AbelCain and Abel
![Page 67: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/67.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 67/98
Cain and Abel (Cont.)Cain and Abel (Cont.)
![Page 68: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/68.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 68/98
Cain and Abel (Cont.)Cain and Abel (Cont.)
![Page 69: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/69.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 69/98
LegionLegion
![Page 70: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/70.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 70/98
BrutusBrutus
![Page 71: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/71.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 71/98
Hacking Tools: Covering TracksHacking Tools: Covering Tracks
ImageHideImageHide
![Page 72: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/72.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 72/98
ImageHideImageHide
![Page 73: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/73.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 73/98
ClearLogsClearLogs
![Page 74: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/74.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 74/98
ClearLogs (Cont.)ClearLogs (Cont.)
![Page 75: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/75.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 75/98
Hacking Tools: Google HackingHacking Tools: Google Hacking
and SQL Injectionand SQL Injection
![Page 76: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/76.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 76/98
Google HackingGoogle Hacking
G l Ch Sh
![Page 77: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/77.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 77/98
Google Cheat SheetGoogle Cheat Sheet
SQL I j tiSQL I j ti
![Page 78: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/78.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 78/98
SQL InjectionSQL Injection
Allows a remote attacker toAllows a remote attacker toexecute arbitrary databaseexecute arbitrary database
commandscommands Relies on poorly formed database queriesRelies on poorly formed database queries
and insufficientand insufficientinput validationinput validation
Often facilitated, but does not rely onOften facilitated, but does not rely onunhandledunhandled
exceptions and ODBC error messagesexceptions and ODBC error messages Impact: MASSIVE. This is one of the mostImpact: MASSIVE. This is one of the most
dangerousdangerous
vulnerabilities on the web.vulnerabilities on the web.
![Page 79: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/79.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 79/98
Common Database QueryCommon Database Query
Problem: Unvalidated InputProblem: Unvalidated Input
![Page 80: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/80.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 80/98
Problem: Unvalidated InputProblem: Unvalidated Input
Piggybacking Queries withPiggybacking Queries with
![Page 81: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/81.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 81/98
Piggybacking Queries withPiggybacking Queries with
UNIONUNION
C
![Page 82: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/82.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 82/98
Hacker Challenge WebsitesHacker Challenge Websites
![Page 83: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/83.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 83/98
http://www.hackr.org/mainpage.php
![Page 84: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/84.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 84/98
H k hi iH kthi it
![Page 85: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/85.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 85/98
Hackthissite.orgHackthissite.org
http://www.hackthissite.org
A l d i dA l d i d
![Page 86: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/86.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 86/98
Answers revealed in codeAnswers revealed in code
H kitH kit
![Page 87: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/87.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 87/98
HackitsHackits
http://www.hackits.de/challenge/
Additi l W b SitAdditi l W b Sit
![Page 88: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/88.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 88/98
Additional Web SitesAdditional Web Sites
L i f Ethi l H kiL i f Ethi l H ki
![Page 89: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/89.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 89/98
Legion of Ethical HackingLegion of Ethical Hacking
L i f Ethi l H ki (C t )L i f Ethi l H ki (C t )
![Page 90: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/90.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 90/98
Legion of Ethical Hacking (Cont.)Legion of Ethical Hacking (Cont.)
Hacker HighschoolHacker Highschool
![Page 91: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/91.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 91/98
Hacker HighschoolHacker Highschool
http://www.hackerhighschool.org/
Hacker HighschoolHacker Highschool
![Page 92: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/92.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 92/98
Hacker HighschoolHacker Highschool
j h ih k t ff /johnny ihackstuff com/
![Page 93: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/93.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 93/98
johnny.ihackstuff.com/ johnny.ihackstuff.com/
H H kHappyHacker org
![Page 94: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/94.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 94/98
HappyHacker.orgHappyHacker.org
F d tFoundstone
![Page 95: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/95.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 95/98
FoundstoneFoundstone
Insecure orgInsecure org
![Page 96: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/96.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 96/98
Insecure.orgInsecure.org
SANS InstituteSANS Institute
![Page 97: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/97.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 97/98
SANS InstituteSANS Institute
![Page 98: Ethical Hacking Presentation October 2006](https://reader031.vdocuments.us/reader031/viewer/2022021401/577dabf71a28ab223f8d4241/html5/thumbnails/98.jpg)
8/14/2019 Ethical Hacking Presentation October 2006
http://slidepdf.com/reader/full/ethical-hacking-presentation-october-2006 98/98
Questions & AnswersQuestions & Answers