SlideShare a Scribd company logo
Ethical Hacking
&
Penetration Testing
Center of Computer
Center of Computer Education and Training
Institute of Professional Studies
December 23,2014
By: Rishabh Upadhyay
Batch: BCA[2012-15]
Under the Guidence of
Prof. R.R.Tewa
Pen Test University of Allahabad Local Area Network.
Network Mapping: Locate Important Host and Services,
Firewall and Switches and Hubs.
Develop a Simple Network Scanner.
Demonstrate Some Attacks.
What is a Penetration Testing?
Penetration Testing
“The process of evaluating systems,
applications, and protocols with the intent
of identifying vulnerabilities usually from the
perspective of an unprivileged or
anonymous user to determine potential real
world impacts…”
In short ...
Penetration Testing
…trying to break into stuff
before the bad guys do
PenTest
Methodologies
PenTest
Methodologies
Reconnaissance
Purpose:
Narrow down to Specific Target
and Technique
• Visiting Organisation Website
• Consulting Public Internet Registry
• Google Hacking
• Using Tools: Nikto ,Nessus,dig,
nslookup and lot more ..
Scanning
Purpose:
Look for Live Host , Firewall
Service Running ,Version
running
Types of Scan:
•
TCP connect Scan
•
SYN Scan
•
UDP Scan
Tools:
Nmap,Nessus ,tracert and lot more
Exploitation
Purpose:
To exploit the vulnerability and
to deploy payload on the remote
system
Tools:
Metasploit,Wireshark,Cain,Aircrack-ng,
Etherape,
Maintaining Access
Ways to Maintain Access
• Netcat,Crypt
•RootKits
•Remote Access Trojan(RAT)
Vulnerability Assessment
&
Penetration Testing
for
University Of Allahabad
Network Mapping
Why to Map network??
• Mapping Networks gives a better
understanding of underlying Internet and
network infrastructure.
• Network mapping makes testing ,evaluating
security of network easy and efficient.
Network Mapping
Network Mapped from SRK Hostel (172.16.233.7)
www.mail1.allduniv.ac.in
JK Web Server
www.allduniv.ac.in
www.proxy5.allduniv.ac.in
Cisco Managed Switched
SRK Hostel’s GateWay
Zonal Switch
CCE Gateway
Network Mapping
Network Mapped from EL Lab 1 (172.16.38.11)
www.mail1.allduniv.ac.in
www.proxy5.allduniv.ac.in www.allduniv.ac.in
www.ns2.allduniv.ac.in www.proxy2.allduniv.ac.in
JK Web Server
CCE Gateway
JK Institute Gateway
Fees Deposit Server (backups)
Gateway
Gateway
Gateway
Discoveries and
Findings …
Unprotected Switches and Routers
• UoA network has ample number unprotected
Switches and Gateways
• Login Credentials :
login:rwa
password:rwa
login:l2
password: l2
login: cisco
password:cisco
Refer Page 23 & 24 of the
Documentation for detailed
report
Discoveries and
Findings …
Unprotected
Switches
and
Routers
Refer Page 23 & 24 of the
Documentation for detailed
report
Discoveries and
Findings …
Unprotected
Switches
and
Routers
Refer Page 23 & 24 of the
Documentation for detailed
report
Discoveries and
Findings …
Unprotected
Switches
and
Routers
Refer Page 23 & 24 of the
Documentation for detailed
report
Discoveries and
Findings …
Unprotected
Switches
and
Routers
Refer Page 23 & 24 of the
Documentation for detailed
report
Discoveries and
Findings …
Unprotected Switches and Routers
Refer Page 23 & 24 of the
Documentation for detailed
report
Discoveries and
Findings …
Unprotected
Switches
and
Routers
Refer Page 23 & 24 of the
Documentation for detailed
report
Discoveries and
Findings …
CCTV Cameras - Central Library
Refer Page 25 & 26 of the
Documentation for detailed
report
• UoA ‘s CCTV camera sends unencrypted over the network
• Weak Login Credentials :
login:admin
password: 1234
Footage of CCTV Cameras at Central Library
Discoveries and
Findings …
Refer Page 25 & 26 of the
Documentation for detailed
report
Footage of CCTV Cameras at Central Library
Discoveries and
Findings …
FTP Server running on 172.16.8.3
Refer Page 21 & 22 of the
Documentation for detailed
report
• Weak Login Credentials :
login:admin
password: auauau
Ethical Hacking and Penetration Testing
UoA Hacking
Incident
Cause of Phishing Site and Hacking Incident
Refer Page 21 & 22 of the
Documentation for detailed
report
• File Size : 2.94 GB
• Blue print of entire site
• Has credentials of
phpMyAdmin,Joomla
CMS
• It is the server end code
of the site
UoA Hacking
Incident
Refer Page 21 & 22 of the
Documentation for detailed
report
UoA Hacking
Incident
Refer Page 21 & 22 of the
Documentation for detailed
report
Right Now !! The Site is hosted on my machine
UoA Hacking
Incident
Refer Page 21 & 22 of the
Documentation for detailed
report
Login into The Admin Pannel
UoA Hacking
Incident
Refer Page 21 & 22 of the
Documentation for detailed
report
Log in Successful!! – Can create and delete post
UoA Hacking
Incident
Refer Page 21 & 22 of the
Documentation for detailed
report
Total No of Admin the Site has
UoA Hacking
Incident
Refer Page 21 & 22 of the
Documentation for detailed
report
Logging Into phpMyAdmin: SQL Server
UoA Hacking
Incident
Refer Page 21 & 22 of the
Documentation for detailed
report
Logged in successfully
UoA Hacking
Incident
Refer Page 21 & 22 of the
Documentation for detailed
report
Can view and manipulate the Professors Records
UoA Hacking
Incident
Refer Page 21 & 22 of the
Documentation for detailed
report
Records of All student studing at UoA
UoA Hacking
Incident
Refer Page 21 & 22 of the
Documentation for detailed
report
Login Credentials with Salted MD5 Hash
Live Demonstration
Man in the Middle Attack:
Such type of attack are very easy to launch.
•In this type of attack the ,the attacker poisons
the ARP Table(Address Resolution Protocol)
•Hence, can divert all the traffic through its
System and can also alter the packets ,if he
wishes..
•Tools:
Etherape,
Driftnet
Live Demonstration
Man in the Middle Attack
***Caution****
1.The attack may or may not be successful
2.It may show some objectionable content
Simple Network
Scanner in C#
This simple network scanner scans the given work
group/domain for computers in Directory Services
The Developed Network Scanner take the limit of I P
addresses as Input and scans the entire domain and
outputs the Computer Name.
It uses the following Namespaces:
using System.Net;
using System.Net.Dns;
Methods:
Dns.GetHostByAddress();
Simple Network
Scanner in C#
Algorithm:
private void button1_Click(object sender, EventArgs e)
{
String ipAdress = textBox1.Text;
string machineName = string.Empty;
try
{
IPHostEntry hostEntry=Dns.GetHostEntry(ipAdress);
machineName=hostEntry.HostName;
}
catch (Exception ex)
{
textBox2.Text = "Machine Not Found";
}
textBox2.Text= machineName;
Simple Network
Scanner in C#
Screenshot
Thank You !!
Center of ComputerCenter of Computer Education and Training
Institute of Professional Studies
December 23,2014
By: Rishabh Upadhyay
Batch: BCA[2012-15]

More Related Content

PPTX
Ethical hacking/ Penetration Testing
PPTX
Vulnerability assessment and penetration testing
PPT
Cyber Security Emerging Threats
PDF
Cisco Cyber Security Essentials Chapter-1
PPTX
VAPT PRESENTATION full.pptx
PPT
Packet tracer
PPTX
Penetration testing reporting and methodology
PPTX
Fundamentals of Network security
Ethical hacking/ Penetration Testing
Vulnerability assessment and penetration testing
Cyber Security Emerging Threats
Cisco Cyber Security Essentials Chapter-1
VAPT PRESENTATION full.pptx
Packet tracer
Penetration testing reporting and methodology
Fundamentals of Network security

What's hot (20)

PPTX
Introduction to Malware Analysis
PPTX
Introduction To Ethical Hacking
PPTX
OWASP Top 10 2021 What's New
PPTX
Ethical Hacking
PDF
Web application security & Testing
PPT
Ethical Hacking Powerpoint
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PPTX
OWASP Top 10 2021 Presentation (Jul 2022)
PPT
Ethical hacking
PPTX
Introduction to cyber security amos
PPTX
Owasp top 10 vulnerabilities
PPT
Module 2 Foot Printing
PPT
Introduction to Cyber Security
PPTX
Footprinting and reconnaissance
PDF
Penetration testing & Ethical Hacking
PPTX
Introduction To Vulnerability Assessment & Penetration Testing
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPTX
Threat hunting for Beginners
PPTX
WTF is Penetration Testing v.2
Introduction to Malware Analysis
Introduction To Ethical Hacking
OWASP Top 10 2021 What's New
Ethical Hacking
Web application security & Testing
Ethical Hacking Powerpoint
Ethical Hacking n VAPT presentation by Suvrat jain
OWASP Top 10 2021 Presentation (Jul 2022)
Ethical hacking
Introduction to cyber security amos
Owasp top 10 vulnerabilities
Module 2 Foot Printing
Introduction to Cyber Security
Footprinting and reconnaissance
Penetration testing & Ethical Hacking
Introduction To Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Threat hunting for Beginners
WTF is Penetration Testing v.2

Viewers also liked (11)

PDF
Ethical Hacking & Penetration Testing
PPTX
Low Hanging Fruit from Penetration Testing
DOCX
Conceptual view
PDF
451 Research Report on Avalon Big Data Capabilities - 2017
PPTX
Maltego Radium Mapping Network Ties and Identities across the Internet
PDF
Web hackingtools cf-summit2014
PDF
Kali Linux, Introduction to Ethical Hacking and Penetration Tools
PDF
OWASP Top 10 Web Application Vulnerabilities
PDF
Alphorm.com Formation Hacking et Sécurité , avancé
Ethical Hacking & Penetration Testing
Low Hanging Fruit from Penetration Testing
Conceptual view
451 Research Report on Avalon Big Data Capabilities - 2017
Maltego Radium Mapping Network Ties and Identities across the Internet
Web hackingtools cf-summit2014
Kali Linux, Introduction to Ethical Hacking and Penetration Tools
OWASP Top 10 Web Application Vulnerabilities
Alphorm.com Formation Hacking et Sécurité , avancé

Similar to Ethical Hacking and Penetration Testing (20)

PPTX
Soho routers: swords and shields CyberCamp 2015
PDF
BSIT3CD_Continuation of Cyber incident response (1).pdf
PDF
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
PPTX
Webinar: Vawtrak v2 the next big Banking Trojan
PPS
Workshop on BackTrack live CD
PPT
Kunal - Introduction to backtrack - ClubHack2008
PPT
Kunal - Introduction to BackTrack - ClubHack2008
PDF
Ceh v8 labs module 03 scanning networks
PPTX
Conclusions from Tracking Server Attacks at Scale
PPTX
cybergyanppt.pptx centre for development of
PPTX
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
PDF
Ceh v5 module 04 enumeration
PDF
How to measure your security response readiness?
PDF
Detection of Spreading Process on many assets over the network
PDF
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PPT
Ethical Hacking
PPT
Ethical hacking
PPTX
DDOS ATTACK - MIRAI BOTNET
PPTX
Splunk Enterprise for InfoSec Hands-On Breakout Session
PDF
Vulnerability Assessment and Penetration Testing Report
Soho routers: swords and shields CyberCamp 2015
BSIT3CD_Continuation of Cyber incident response (1).pdf
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
Webinar: Vawtrak v2 the next big Banking Trojan
Workshop on BackTrack live CD
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
Ceh v8 labs module 03 scanning networks
Conclusions from Tracking Server Attacks at Scale
cybergyanppt.pptx centre for development of
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
Ceh v5 module 04 enumeration
How to measure your security response readiness?
Detection of Spreading Process on many assets over the network
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
Ethical Hacking
Ethical hacking
DDOS ATTACK - MIRAI BOTNET
Splunk Enterprise for InfoSec Hands-On Breakout Session
Vulnerability Assessment and Penetration Testing Report

Recently uploaded (20)

PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
composite construction of structures.pdf
PDF
Digital Logic Computer Design lecture notes
PPT
Mechanical Engineering MATERIALS Selection
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
web development for engineering and engineering
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
additive manufacturing of ss316l using mig welding
DOCX
573137875-Attendance-Management-System-original
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPT
Project quality management in manufacturing
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Foundation to blockchain - A guide to Blockchain Tech
Structs to JSON How Go Powers REST APIs.pdf
composite construction of structures.pdf
Digital Logic Computer Design lecture notes
Mechanical Engineering MATERIALS Selection
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Lesson 3_Tessellation.pptx finite Mathematics
web development for engineering and engineering
CYBER-CRIMES AND SECURITY A guide to understanding
additive manufacturing of ss316l using mig welding
573137875-Attendance-Management-System-original
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Project quality management in manufacturing
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Operating System & Kernel Study Guide-1 - converted.pdf
Internet of Things (IOT) - A guide to understanding
CH1 Production IntroductoryConcepts.pptx
Model Code of Practice - Construction Work - 21102022 .pdf

Ethical Hacking and Penetration Testing