Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA [email protected] DHJETOR 2019...
Transcript of Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA [email protected] DHJETOR 2019...
Ethical HackingATDHE BUJA CEH CIO MCITP OCA IPMAINFO@ACADEMY IC T.NE TDHJETOR 2019
Partner
1.Definicion Hacker / definition
• “a person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent.“
Source: Internet
2.Koncepti Etik / Concept Ethical
• To be on side of Defense
• Discovering vulnerabilities
• Verify that security measures are functioning correctly
• Testing systems and networks for vulnerabilities
3.Mundësitë në karrierë nga ndjekja e trajnimit
• CEH Certified Ethical Hacker
• OSCP Offensive Security Certified Professional
• Software Security Tester
• Penetration Tester
• Information Security Officer
• Security Analyst
4.Kush jemi ne!
Ku jemi ne!
ICT Academy USA Pennsylvania
ICT Academy Japan
ICT Academy Albania
ICT Academy Kosovo
8
Potenciali
5.MisioniThrough sharing & transferring knowledge on Security & Cyber Security, CIO, RDBMS innovations. ICT Academy will bring the latest news, science work - R&D, training, consulting, events on three main fields Security, CIO and RDBMS's in all technologies and platforms.
Çka kemi neWe have a group of professionals, which are very much experienced in ICT industry and have the willing to share the knowledge, be engaged
on training, events and projects for the community.
KreativitetiRealizimi
plotë
Misioni/Vizioni/Strategjia
ICT Academy/CSP Cyber Security & PrivacyStrategjia
Misioni: Në përputhje me rregulloret e ICT Academy, misioni i ICT-CERT ështëqë të identifikoj, mbroj & ofroj zgjidhje të sfidave kibernetike tani & në tëardhmen me fokus tek Infrastrukturat Kritike të Informacionit dhe mbrojtja etyre (CIIP).
Vizioni: kontributi kryesor është përmes edukimit, transferimin e njohurive,kualitet të lartë në hulumtim dhe zhvillim – krijimin e inovacioneve, ofrimit tëmetoave të reja & qasjes, strategjive, politikave dhe teknologjive që do tëndikojnë tani dhe në të ardhmen e vendit dhe rajonit.
Strategjia e Cyber Security & Protection of Privacy (modeli Infrastr. Kritike CIIP)
www.academyict.net/ict-cert
2. Anëtarë në organizatat ndërkombëtare
August 2019
11
August 2019
TBD 2020
Aktivitetet e ICT Academy
https://academyict.net/events-seminars/
9.The process of Ethical Hacking
Reconnaissanceaka
FootprintingScanning Gaining Access
Maintaining Access
Clearing Tracks
Reporting
No standard process & tools!
Mesazh me rendesi: MOS PROVONI KËTO NJOHURI & AFTËSI KUNDËR ASKUJT!Ne nuk marrim pergjegjesi per veprimet tuaja.
9.0 Penetration Testing phase [started]
Target, Web App, IP Range: ??
9.1 Reconnaissance/Information Gathering (aka footprinting)• Reconnaissance is the phase where active or passive means are used for
information gathering. Some of the tools used are for this purpose are: NMAP, Hping, Maltego, Google Dorks etc.
• System architecture
• Users and groups
• IP & Firewall
• OS, ports (fingerprints)
• Services
• Information Systems
• Etj.
9.1 Reconnaissance/Information Gathering (aka footprinting) DEMO
• Google Dorks is technique to find Vulnerable Services & Hidden Info
cache: null-byte.academyict.net (previous versions)
allintext:username filetype: log (looks for log file)
intitle:"index of" inurl:ftp (find ftp servers)
intitle:"webcamXP 5“ (webcam exposed on Internet)
db_password filetype:env (exposed Database passwords)
9.1 Reconnaissance/Information Gathering (aka footprinting) DEMO
• NMAP is a network tool on Linux
nmap 1.1.1.1 ose nmap cloudflare.com (bacis Nmap scan IP/Host)
nmap -p 1-65535 localhost (scan specific/entire ports
nmap --top-ports 20 192.168.1.106 (scan the most popular ports)
nmap -oN output.txt securitytrails.com (Save Nmap result to a file)
nmap -A -T4 cloudflare.com (Scan+OS service detection with fast exec.)
nmap -Pn --script vuln 192.168.1.105 (Vulnerability detection)
9.1.2 Basic Network Troubleshooting Using the Ping Utility DEMO• Ping is a computer network administration utility used to test the reachability of a
host on a Internet Protocol (IP).
• Ping sends ICMP request packets to the target and waits for an ICMP response.
• Ping measures the time from transmission to reception (round-trip time)
• Ping shows information on Ping Statistics
• Packets sent
• Packets received
• Packets lost
• DEMO
• Lab Analysis
9.1.3 Basic Network Troubleshooting Using nslookup Tool DEMO
• Nslookup is a network administration command-line tool for querying the domain name system (DNS) the IP address mapping.
• Nslookup to execute query uses the OS local Domain Name System (DNS) resolver library.
• DEMO cmd command prompt or terminal on Linux
• Lab Analysis
9.1.5 Analyzing Domain and IP Address Queries using SmartWhois DEMO
• SmartWhois is a network information utility that allows you to look up most available information on a hostname, IP addresses or domain.
• SmartWhois tool helps you to search for such information as:
• The owner of the domain
• The domain registration date and owner’s contact information
• The owner of the IP address block
• DEMO https://who.is/
• Lab Analysis
9.1.6 Other techniques
• Extracting Company’s Data using Web Data Extractor: contact details or data such as email, fax and phone through web.
• Mirroring a Website using HTTrack web site copier tool: offline browser utility that allows you to download a website through the Internet to your local directory.
Faleminderit
Pyetje & Pergjigje
www.academyict.net
Raporto Incidentin apo Cyber Crimehttps://academyict.net/contact-us/
Raporto Phishinghttps://academyict.net/report-phishing-sites/