Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA [email protected] DHJETOR 2019...

21
Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA [email protected] DHJETOR 2019 Partner

Transcript of Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA [email protected] DHJETOR 2019...

Page 1: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

Ethical HackingATDHE BUJA CEH CIO MCITP OCA IPMAINFO@ACADEMY IC T.NE TDHJETOR 2019

Partner

Page 3: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

2.Koncepti Etik / Concept Ethical

• To be on side of Defense

• Discovering vulnerabilities

• Verify that security measures are functioning correctly

• Testing systems and networks for vulnerabilities

Page 4: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

3.Mundësitë në karrierë nga ndjekja e trajnimit

• CEH Certified Ethical Hacker

• OSCP Offensive Security Certified Professional

• Software Security Tester

• Penetration Tester

• Information Security Officer

• Security Analyst

Page 5: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

4.Kush jemi ne!

Page 6: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

Ku jemi ne!

ICT Academy USA Pennsylvania

ICT Academy Japan

ICT Academy Albania

ICT Academy Kosovo

8

Page 7: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

Potenciali

5.MisioniThrough sharing & transferring knowledge on Security & Cyber Security, CIO, RDBMS innovations. ICT Academy will bring the latest news, science work - R&D, training, consulting, events on three main fields Security, CIO and RDBMS's in all technologies and platforms.

Çka kemi neWe have a group of professionals, which are very much experienced in ICT industry and have the willing to share the knowledge, be engaged

on training, events and projects for the community.

KreativitetiRealizimi

plotë

Page 8: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

Misioni/Vizioni/Strategjia

ICT Academy/CSP Cyber Security & PrivacyStrategjia

Misioni: Në përputhje me rregulloret e ICT Academy, misioni i ICT-CERT ështëqë të identifikoj, mbroj & ofroj zgjidhje të sfidave kibernetike tani & në tëardhmen me fokus tek Infrastrukturat Kritike të Informacionit dhe mbrojtja etyre (CIIP).

Vizioni: kontributi kryesor është përmes edukimit, transferimin e njohurive,kualitet të lartë në hulumtim dhe zhvillim – krijimin e inovacioneve, ofrimit tëmetoave të reja & qasjes, strategjive, politikave dhe teknologjive që do tëndikojnë tani dhe në të ardhmen e vendit dhe rajonit.

Strategjia e Cyber Security & Protection of Privacy (modeli Infrastr. Kritike CIIP)

www.academyict.net/ict-cert

Page 9: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

2. Anëtarë në organizatat ndërkombëtare

August 2019

11

August 2019

TBD 2020

Page 10: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

Aktivitetet e ICT Academy

https://academyict.net/events-seminars/

Page 11: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

9.The process of Ethical Hacking

Reconnaissanceaka

FootprintingScanning Gaining Access

Maintaining Access

Clearing Tracks

Reporting

No standard process & tools!

Page 12: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

Mesazh me rendesi: MOS PROVONI KËTO NJOHURI & AFTËSI KUNDËR ASKUJT!Ne nuk marrim pergjegjesi per veprimet tuaja.

Page 13: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

9.0 Penetration Testing phase [started]

Target, Web App, IP Range: ??

Page 14: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

9.1 Reconnaissance/Information Gathering (aka footprinting)• Reconnaissance is the phase where active or passive means are used for

information gathering. Some of the tools used are for this purpose are: NMAP, Hping, Maltego, Google Dorks etc.

• System architecture

• Users and groups

• IP & Firewall

• OS, ports (fingerprints)

• Services

• Information Systems

• Etj.

Page 15: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

9.1 Reconnaissance/Information Gathering (aka footprinting) DEMO

• Google Dorks is technique to find Vulnerable Services & Hidden Info

cache: null-byte.academyict.net (previous versions)

allintext:username filetype: log (looks for log file)

intitle:"index of" inurl:ftp (find ftp servers)

intitle:"webcamXP 5“ (webcam exposed on Internet)

db_password filetype:env (exposed Database passwords)

Page 16: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

9.1 Reconnaissance/Information Gathering (aka footprinting) DEMO

• NMAP is a network tool on Linux

nmap 1.1.1.1 ose nmap cloudflare.com (bacis Nmap scan IP/Host)

nmap -p 1-65535 localhost (scan specific/entire ports

nmap --top-ports 20 192.168.1.106 (scan the most popular ports)

nmap -oN output.txt securitytrails.com (Save Nmap result to a file)

nmap -A -T4 cloudflare.com (Scan+OS service detection with fast exec.)

nmap -Pn --script vuln 192.168.1.105 (Vulnerability detection)

Page 17: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

9.1.2 Basic Network Troubleshooting Using the Ping Utility DEMO• Ping is a computer network administration utility used to test the reachability of a

host on a Internet Protocol (IP).

• Ping sends ICMP request packets to the target and waits for an ICMP response.

• Ping measures the time from transmission to reception (round-trip time)

• Ping shows information on Ping Statistics

• Packets sent

• Packets received

• Packets lost

• DEMO

• Lab Analysis

Page 18: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

9.1.3 Basic Network Troubleshooting Using nslookup Tool DEMO

• Nslookup is a network administration command-line tool for querying the domain name system (DNS) the IP address mapping.

• Nslookup to execute query uses the OS local Domain Name System (DNS) resolver library.

• DEMO cmd command prompt or terminal on Linux

• Lab Analysis

Page 19: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

9.1.5 Analyzing Domain and IP Address Queries using SmartWhois DEMO

• SmartWhois is a network information utility that allows you to look up most available information on a hostname, IP addresses or domain.

• SmartWhois tool helps you to search for such information as:

• The owner of the domain

• The domain registration date and owner’s contact information

• The owner of the IP address block

• DEMO https://who.is/

• Lab Analysis

Page 20: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

9.1.6 Other techniques

• Extracting Company’s Data using Web Data Extractor: contact details or data such as email, fax and phone through web.

• Mirroring a Website using HTTrack web site copier tool: offline browser utility that allows you to download a website through the Internet to your local directory.

Page 21: Ethical Hacking...Ethical Hacking ATDHE BUJA CEH CIO MCITP OCA IPMA INFO@ACADEMYICT.NET DHJETOR 2019 Partner 1.Definicion Hacker / definition •“a person who hacks into a computer

Faleminderit

Pyetje & Pergjigje

[email protected]

www.academyict.net

Raporto Incidentin apo Cyber Crimehttps://academyict.net/contact-us/

Raporto Phishinghttps://academyict.net/report-phishing-sites/