1 / 26

Week 5: System Hacking

Week 5: System Hacking. Administrator Password Guessing. Week 5: System Hacking. Performing Automated Password Guessing Legion NTInfoScan. Week 5: System Hacking. Defending Against Password Guessing Monitoring Event Viewer Logs VisualLast Eavesdropping on Network Password Exchange.

karlyn
Download Presentation

Week 5: System Hacking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Week 5: System Hacking • Administrator Password Guessing

  2. Week 5: System Hacking • Performing Automated Password Guessing • Legion • NTInfoScan

  3. Week 5: System Hacking • Defending Against Password Guessing • Monitoring Event Viewer Logs • VisualLast • Eavesdropping on Network Password Exchange

  4. Week 5: System Hacking • Hacking Tool: L0phtCrack • Hacking Tool: KerbCrack http://ntsecurity.nu/toolbox/kerbcrack/

  5. Week 5: System Hacking • Privilege Escalation • Hacking Tool: GetAdmin • Hacking Tool: hk www.nmrc.org

  6. Week 5: System Hacking • Manual Password Cracking Algorithm • Automatic Password Cracking Algorithm • Password Types

  7. Week 5: System Hacking • Types of Password Attacks • Dictionary Attack • Brute Force Attack • Distributed Brute Force Attack

  8. Week 5: System Hacking • Password Change Interval • Hybrid Attack • Cracking Windows 2000 Passwords

  9. Week 5: System Hacking • Retrieving the SAM file • Redirecting SMB Logon to the Attacker • SMB Redirection

  10. Week 5: System Hacking • Hacking Tool: SMBRelay • Hacking Tool: SMBRelay2

  11. Week 5: System Hacking • SMBRelay Man-in-the-Middle (MITM) • SMBRelay MITM Countermeasures

  12. Week 5: System Hacking • Hacking Tool: SMBGrinder • Hacking Tool: SMBDie • Hacking Tool: NBTDeputy

  13. Week 5: System Hacking • NetBIOS DoS Attack • Hacking Tool: nbname • Hacking Tool: John the Ripper

  14. Week 5: System Hacking • LanManager Hash • Password Cracking Countermeasures

  15. Week 5: System Hacking • Keystroke Logger • Hacking Tool: Spector http://www.spectorsoft.com/ • AntiSpector http://www.anti-keyloggers.com/

  16. Week 5: System Hacking • Hacking Tool: eBlaster • Hacking Tool: SpyAnywhere • Hacking Tool: IKS Software Logger

  17. Week 5: System Hacking • Hardware Tool: Hardware Key Logger • Hacking Tool: Rootkit • Planting Rootkit on Windows 2000 Machine

  18. Week 5: System Hacking • _rootkit_ embedded TCP/IP Stack • Rootkit Countermeasures

  19. Week 5: System Hacking • MD5 Checksum utility • Tripwire www.tripwire.comwww.tripwire.org

  20. Week 5: System Hacking • Covering Tracks • Disabling Auditing • Auditpol • Clearing the Event Log

  21. Week 5: System Hacking • Hacking Tool: Elsave • Hacking Tool: Winzapper • Hacking Tool: Evidence Eliminator

  22. Week 5: System Hacking • Hiding Files • NTFS File Streaming • Hacking Tool: makestrm • NTFS Streams Countermeasures: LADS, sfind can detect ADS (alternative data streams) • LNS

  23. Week 5: System Hacking • Steganography (covered writing) • Hacking Tool: ImageHide • Hacking Tool: MP3Stego • Hacking Tool: Snow • Hacking Tool: Camera/Shy

  24. Week 5: System Hacking • Steganography Detection • StegDetect • Encrypted File System • Hacking Tool: dskprobe • Hacking Tool: EFSView

  25. Week 5: System Hacking • Buffer Overflows • Creating Buffer Overflow Exploit • Outlook Buffer Overflow • Hacking Tool: Outoutlook

  26. Week 5: System Hacking • Summary

More Related