google to pwn4ge pt1

18
Google to Pwnag3 in 60 Minutes ! (or less.) Jayson E. Street, CISSP, GSEC, GCIH, GCFA IEM, IAM, CCSE, CCSA, Security+, etc…

Upload: jaysonstreet

Post on 11-Jul-2015

249 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Google to pwn4ge pt1

Google to Pwnag3 in 60 Minutes !(or less.)

Jayson E. Street, CISSP, GSEC, GCIH, GCFA

IEM, IAM, CCSE, CCSA, Security+, etc…

Page 2: Google to pwn4ge pt1

Let go of my EGO Lets start out with a little about yours truly.

http://stratagem-one.com

Page 3: Google to pwn4ge pt1

Know yourself know your enemy

• Sun Wu (Tzu) “Ping-fa”(The Art of War)• “Thus it is said that one who knows the enemy and

knows himself will not be endangered in a hundred engagements. One who does not know the enemy but knows himself will sometimes be victorious, sometimes meet with defeat. One who knows neither the enemy nor himself will invariably be defeated in every engagement!”

Page 4: Google to pwn4ge pt1

Contents

• INTRO• The 5 W’s hackers 57y/3• First look at a weapon even a 12 yr. old can love.• Phase 1& 2 Discovery• Phase 3 - 5 Compromise• Now what?• Discussion

Page 5: Google to pwn4ge pt1

Who’s really attacking you on the Internet?

When was the last time you were attacked?

What kind of threats will we cover?

Where’s the benefit for me?

Why should the hackers have all the fun?

The 5 W’s hackers 57y/3

Page 6: Google to pwn4ge pt1

First look at a weapon even a 12 yr. old can love.

• Back Track Live 2

• All the threat of Linux

• Without the need for the Knowledge.• 1 stop for all your hacking needs.

• http://www.remote-exploit.org/backtrack.html

Page 7: Google to pwn4ge pt1

Phase 1 Recon

Need to hack it Google it!http://sec.gov there to help you and your

enemy.The target website they want you to know

all about them.Ask for help hackers are generous with

other peoples resources.

Page 8: Google to pwn4ge pt1
Page 9: Google to pwn4ge pt1
Page 10: Google to pwn4ge pt1

Phase 2 Scan

• Stealth Scanning 101

• Nmap 1 scanner to rule them all

• Slow and steady steals the race.

Page 11: Google to pwn4ge pt1

Phase 3 Explore

The great wall of China and other urban legends.

Drive by browsing.

The human touch.

Page 12: Google to pwn4ge pt1

Phase 4 Exploit

• Netcat the swiss blah blah blah

• Hashing it out

• Got R00T?

Page 13: Google to pwn4ge pt1

Phase 5 Expunge

• Regedit not a regular edit this time.

• Events what events? • Patch and clean (there are some bad people out there)

Page 14: Google to pwn4ge pt1

Caveats(or lame excuses)

• www.victim.com is real so do not try this at home.• The target is easy picking but is that normal?

(Ask anyone still getting hit with nimda and SQL Slammer.)

• Showing off l337 sK1llz is not scary showing you what a grade-schooler is doing is terrifying.

Page 15: Google to pwn4ge pt1

On with the show!

Page 16: Google to pwn4ge pt1

Resources

• Without understanding where the opponent's weaknesses are you cannot borrow their strength to use against them. (Cheng Man Ching)

• http://www.issa-okc.org • http://www.infragardok.org/• http://OSVDB.org• http://isc.sans.org • http://forums.stratagem-one.com (shameless plug)

This presentation is located @– http://f0rb1dd3n.com/s1s/WP/

– Credit to Andy for the web code and Tom for the movie idea.

Page 17: Google to pwn4ge pt1

Now let’s learn from others

• Discussion and Questions????

• Or several minutes of uncomfortable silence it is your choice.

Page 18: Google to pwn4ge pt1

Once again those links

• http://www.issa-okc.org • http://www.infragardok.org/• http://OSVDB.org

• http://isc.sans.org • http://forums.stratagem-one.com (shameless plug)

This presentation is located @

– http://f0rb1dd3n.com/s1s/WP/