About Backtrack

35
김태훈

description

Basic usage of backtrack by carpedm20

Transcript of About Backtrack

Page 1: About Backtrack

김태훈

Page 2: About Backtrack

1단계

• 독창적 해킹 추구

• (I'll be a cool hacker)

2단계

• 근원 추구의 자연스러운 연마

• (Return to the root)

3단계

• 노는 물이 달라진다

• (Level up)

4단계

• 혁신적 기술 전이를 선도

• (Lead to the paradigm change)

5단계

• 멋진 스포츠카와 멋진 여자친구

• (What a cool life!)

해커의발전과정

Page 3: About Backtrack

Backtrack = Hacking Machine

Page 4: About Backtrack

Backtrack = Hacking Machine

Page 5: About Backtrack

Pentest = Penetration Test

A method of evaluating the security of a computer system or network by simulating an attack from malicious outsiders (who do not have an authorized means of accessing the organization's systems) and malicious insiders (who have some level of authorized access)

인가 받은 해킹 전담 컨설턴트에 의해 외부 또는 내부 네트워크상에서 대상 서비스와 서버에 대해 실제 해커가 사용하는 해킹 도구와 기법 등을 이용하여 정보 시스템으로의 침투 가능성을 진단하는 선의의 해킹(ethical hacking)

Page 6: About Backtrack

1단계• 정보 수집

• 스캐닝

2단계• 목록화

• 취약점 공격

• 사용자 계정 탈취 -> 권한 상승

3단계•백도어

•서비스 거부

공격

해킹방법론

Page 7: About Backtrack

VMware = Virtual Machine

Page 8: About Backtrack

Vmware Workstation

Page 9: About Backtrack

Vmware Workstation

Page 10: About Backtrack

Vmware - Network

타겟 : 본인 컴퓨터, 다른 Vmware OS

Page 11: About Backtrack

Vmware - Network

타겟 : 공유기 연결된 컴퓨터

Page 12: About Backtrack

Vmware – Network settings

Page 13: About Backtrack

Backtrack 5

Login : rootPassword : toor

startx

Page 14: About Backtrack

Backtrack 5

Page 15: About Backtrack

Backtrack 5

Page 16: About Backtrack

Backtrack 5 – Network Settings

Page 17: About Backtrack

Backtrack 5 – Network Settings

Page 18: About Backtrack

Backtrack 5 – Network Settings

Page 19: About Backtrack

Backtrack 5 – 정보수집& 스캐닝

Page 20: About Backtrack

UNIST Network

• 도서관 : 10.12.10-12.*

• 무선랜 : 10.64.144-129.*

• 기숙사 : 10.36-38.*.*

• 공학관 : 10.20.14.*

Page 21: About Backtrack

Metasploit - 취약점공격

Page 22: About Backtrack

Metasploit

search use exploit/set payloads

& optionsexploit

타겟의 취약점을 분석ex) nmap, nessus

사용할 공격코드 선택

공격 후 통신 방법 선택

GAME OVER

Page 23: About Backtrack

Metasploit - Search

Page 24: About Backtrack

Metasploit – info command

Page 25: About Backtrack

Metasploit – 통신프로그램생성

Page 26: About Backtrack

Metasploit – 사회공학기법

Page 27: About Backtrack

Metasploit – use exploit, set payloads, exploit

check 사용 가능

Page 28: About Backtrack

Metasploit

Page 29: About Backtrack

Metasploit

Page 30: About Backtrack

SET – Social Engineering Toolkit

Page 31: About Backtrack

Nessus – search for weak point

Page 32: About Backtrack

Nessus – search for weak point

Page 33: About Backtrack

aircrack-ng

Page 34: About Backtrack

www.hackingdna.com

Page 35: About Backtrack

Metasploit Megaprimer – Video Lecture