hacking a web site and secure web server techniques used

107
Hacking a WebSite & Secure WebServer Techniques used Group-2: RollNo 6-10. Setu Behal Siddharth Bhattacharya

Upload: siddharth-bhattacharya

Post on 30-May-2015

8.463 views

Category:

Technology


3 download

DESCRIPTION

Overview of hacking techniques used to attack modern web applications focused on application layer. Cross Site Scripting, SQL Injection, Buffer Overflow, Phishing attacks presented.

TRANSCRIPT

Page 1: Hacking A Web Site And Secure Web Server Techniques Used

Hacking a WebSite & Secure WebServer Techniques used

Group-2:RollNo 6-10.

Setu BehalSiddharth Bhattacharya

Page 2: Hacking A Web Site And Secure Web Server Techniques Used

A chain is only as strong as its weakest link.

Page 3: Hacking A Web Site And Secure Web Server Techniques Used

As the old Jungle saying goes …

Half knowledge is Dangerous.

Page 4: Hacking A Web Site And Secure Web Server Techniques Used
Page 5: Hacking A Web Site And Secure Web Server Techniques Used

Insight into PracticalWeb-Server Security Issues

Page 6: Hacking A Web Site And Secure Web Server Techniques Used
Page 7: Hacking A Web Site And Secure Web Server Techniques Used
Page 8: Hacking A Web Site And Secure Web Server Techniques Used
Page 9: Hacking A Web Site And Secure Web Server Techniques Used
Page 10: Hacking A Web Site And Secure Web Server Techniques Used
Page 11: Hacking A Web Site And Secure Web Server Techniques Used
Page 12: Hacking A Web Site And Secure Web Server Techniques Used
Page 13: Hacking A Web Site And Secure Web Server Techniques Used
Page 14: Hacking A Web Site And Secure Web Server Techniques Used
Page 15: Hacking A Web Site And Secure Web Server Techniques Used
Page 16: Hacking A Web Site And Secure Web Server Techniques Used
Page 17: Hacking A Web Site And Secure Web Server Techniques Used
Page 18: Hacking A Web Site And Secure Web Server Techniques Used
Page 19: Hacking A Web Site And Secure Web Server Techniques Used
Page 20: Hacking A Web Site And Secure Web Server Techniques Used
Page 21: Hacking A Web Site And Secure Web Server Techniques Used
Page 22: Hacking A Web Site And Secure Web Server Techniques Used
Page 23: Hacking A Web Site And Secure Web Server Techniques Used
Page 24: Hacking A Web Site And Secure Web Server Techniques Used
Page 25: Hacking A Web Site And Secure Web Server Techniques Used
Page 26: Hacking A Web Site And Secure Web Server Techniques Used
Page 27: Hacking A Web Site And Secure Web Server Techniques Used
Page 28: Hacking A Web Site And Secure Web Server Techniques Used
Page 29: Hacking A Web Site And Secure Web Server Techniques Used
Page 30: Hacking A Web Site And Secure Web Server Techniques Used
Page 31: Hacking A Web Site And Secure Web Server Techniques Used
Page 32: Hacking A Web Site And Secure Web Server Techniques Used
Page 33: Hacking A Web Site And Secure Web Server Techniques Used
Page 34: Hacking A Web Site And Secure Web Server Techniques Used
Page 35: Hacking A Web Site And Secure Web Server Techniques Used
Page 36: Hacking A Web Site And Secure Web Server Techniques Used
Page 37: Hacking A Web Site And Secure Web Server Techniques Used
Page 38: Hacking A Web Site And Secure Web Server Techniques Used
Page 39: Hacking A Web Site And Secure Web Server Techniques Used
Page 40: Hacking A Web Site And Secure Web Server Techniques Used
Page 41: Hacking A Web Site And Secure Web Server Techniques Used
Page 42: Hacking A Web Site And Secure Web Server Techniques Used
Page 43: Hacking A Web Site And Secure Web Server Techniques Used
Page 44: Hacking A Web Site And Secure Web Server Techniques Used
Page 45: Hacking A Web Site And Secure Web Server Techniques Used

CACHE Poisoning

Page 46: Hacking A Web Site And Secure Web Server Techniques Used
Page 47: Hacking A Web Site And Secure Web Server Techniques Used
Page 48: Hacking A Web Site And Secure Web Server Techniques Used
Page 49: Hacking A Web Site And Secure Web Server Techniques Used
Page 50: Hacking A Web Site And Secure Web Server Techniques Used
Page 51: Hacking A Web Site And Secure Web Server Techniques Used
Page 52: Hacking A Web Site And Secure Web Server Techniques Used
Page 53: Hacking A Web Site And Secure Web Server Techniques Used
Page 54: Hacking A Web Site And Secure Web Server Techniques Used
Page 55: Hacking A Web Site And Secure Web Server Techniques Used
Page 56: Hacking A Web Site And Secure Web Server Techniques Used
Page 57: Hacking A Web Site And Secure Web Server Techniques Used
Page 58: Hacking A Web Site And Secure Web Server Techniques Used
Page 59: Hacking A Web Site And Secure Web Server Techniques Used
Page 60: Hacking A Web Site And Secure Web Server Techniques Used
Page 61: Hacking A Web Site And Secure Web Server Techniques Used
Page 62: Hacking A Web Site And Secure Web Server Techniques Used

Vulnerabilities of Windows Systems

• 1.Internet Information Services (IIS) • 2.Microsoft Data Access Components (MDAC) -Remote

Data Services • 3.Microsoft SQL Server • 4.NETBIOS -Unprotected Windows Networking Shares • 5.Anonymous Logon -Null Sessions • 6.LAN Manager Authentication -Weak LM Hashing • 7.General Windows Authentication - Accounts with No

Passwords or Weak Passwords • 8.Internet Explorer • 9.Remote Registry Access • 10.Windows Scripting Host

Page 63: Hacking A Web Site And Secure Web Server Techniques Used

Vulnerabilities of Unix Systems

• 1.Remote Procedure Calls (RPC) • 2.Apache Web Server • 3.Secure Shell (SSH) • 4.Simple Network Management Protocol (SNMP) • 5.File Transfer Protocol (FTP) • 6.R-Services -Trust Relationships • 7.Line Printer Daemon (LPD) • 8.Sendmail• 9.BIND/DNS • 10.General Unix Authentication -Accounts with No

Passwords or Weak Passwords

Page 64: Hacking A Web Site And Secure Web Server Techniques Used
Page 65: Hacking A Web Site And Secure Web Server Techniques Used
Page 66: Hacking A Web Site And Secure Web Server Techniques Used
Page 67: Hacking A Web Site And Secure Web Server Techniques Used
Page 68: Hacking A Web Site And Secure Web Server Techniques Used
Page 69: Hacking A Web Site And Secure Web Server Techniques Used
Page 70: Hacking A Web Site And Secure Web Server Techniques Used
Page 71: Hacking A Web Site And Secure Web Server Techniques Used
Page 72: Hacking A Web Site And Secure Web Server Techniques Used
Page 73: Hacking A Web Site And Secure Web Server Techniques Used

Hacking as perceived fromManagement’s Perspective

Page 74: Hacking A Web Site And Secure Web Server Techniques Used
Page 75: Hacking A Web Site And Secure Web Server Techniques Used
Page 76: Hacking A Web Site And Secure Web Server Techniques Used

Hacking ISP DNS

Page 77: Hacking A Web Site And Secure Web Server Techniques Used
Page 78: Hacking A Web Site And Secure Web Server Techniques Used
Page 79: Hacking A Web Site And Secure Web Server Techniques Used
Page 80: Hacking A Web Site And Secure Web Server Techniques Used
Page 81: Hacking A Web Site And Secure Web Server Techniques Used
Page 82: Hacking A Web Site And Secure Web Server Techniques Used
Page 83: Hacking A Web Site And Secure Web Server Techniques Used
Page 84: Hacking A Web Site And Secure Web Server Techniques Used
Page 85: Hacking A Web Site And Secure Web Server Techniques Used
Page 86: Hacking A Web Site And Secure Web Server Techniques Used
Page 87: Hacking A Web Site And Secure Web Server Techniques Used
Page 88: Hacking A Web Site And Secure Web Server Techniques Used
Page 89: Hacking A Web Site And Secure Web Server Techniques Used
Page 90: Hacking A Web Site And Secure Web Server Techniques Used
Page 91: Hacking A Web Site And Secure Web Server Techniques Used

SecurityBest

Paractices[Management-Perspective]

Page 92: Hacking A Web Site And Secure Web Server Techniques Used
Page 93: Hacking A Web Site And Secure Web Server Techniques Used
Page 94: Hacking A Web Site And Secure Web Server Techniques Used
Page 95: Hacking A Web Site And Secure Web Server Techniques Used
Page 96: Hacking A Web Site And Secure Web Server Techniques Used
Page 97: Hacking A Web Site And Secure Web Server Techniques Used
Page 98: Hacking A Web Site And Secure Web Server Techniques Used
Page 99: Hacking A Web Site And Secure Web Server Techniques Used
Page 100: Hacking A Web Site And Secure Web Server Techniques Used
Page 101: Hacking A Web Site And Secure Web Server Techniques Used
Page 102: Hacking A Web Site And Secure Web Server Techniques Used
Page 103: Hacking A Web Site And Secure Web Server Techniques Used
Page 104: Hacking A Web Site And Secure Web Server Techniques Used
Page 105: Hacking A Web Site And Secure Web Server Techniques Used
Page 106: Hacking A Web Site And Secure Web Server Techniques Used
Page 107: Hacking A Web Site And Secure Web Server Techniques Used

Thankyou !!!

• Any Questions ?