SlideShare a Scribd company logo
Ethical Hacking...
Mind the Gap with Business




  ISACA Round Table 10/2011 - Xavier Mertens
$ whoami
• Xavier Mertens
• Security Consultant @ Telenet (C-CURE)
• CISSP, CISA, CeH
• Security Blogger
• Volunteer for security projects:
$ cat disclaimer.txt

“The opinions expressed in this presentation
are those of the speaker and do not reflect
those of past, present or future employers,
partners or customers”
Agenda

• You said “ethical hacking”?
• Some frameworks
• The process
• Some tips
You said “Ethical
   Hacking”?
“Ethic”

“A set of moral principles of right and wrong
that are accepted by an individual or a social
group”
“Hacking”
“Practice of modifying computer hardware/
software or any other electronic device to
accomplish a goal outside of the creator’s
original purpose. People who engage in
computer hacking activities are often called
‘hackers’.”
Hackers are good guys
The term 'hacker' has been misrepresented in
popular media for a long time!
“Hacking has nothing to do with criminal activities such
as identity theft and electronic trespassing! Rather, it
[hacker] has been coined at the Massachusetts Institute
of Technology (MIT) as a term for curious individuals
for whom every device or piece of software is full
of exciting challenges to develop
potential improvements or discover
alternative uses."
But some derive...
Hacking can be used to break into computers
for personal or commercial gains or for
malicious activities.
Those are called “Black Hats”
Can hacking be
“ethical”?
Yes, of course!
Using the same tools and techniques as bad
guys, security vulnerabilities are discovered
then disclosed and patched (sometimes ;-)
Ethical Hacking is...
An individual who is usually employed with the
organization and who can be trusted to
undertake an attempt to penetrate computer
systems using the same methods as a Hacker.
Ethical hacking is:
 •  Legal
 • Granted by the target
 • Scope clearly defined / NDA
 • Non destructive
Also Known As...

• Pentesting
• White-hat hacking
• Red-teaming
Communities

Security conference tries to create bridges
between the various actors active in computer
security world, included but not limited to
hackers, security professionals, security
communities, non-profit organizations, CERTs,
students, law enforcement agencies, etc.....
Security Researchers
• Develop tools to understand how attacks
  work and how to reproduce it
• Search for software vulnerabilities with the
  debate of full-disclosure vs. responsible-
  disclosure
• Prosecuted in some countries
• Research is mandatory!
Why are we vulnerable?
                    Features




      Ease of use              Security

 New features/ease of use reduce the security
 or at least increase the attack surface!
Nothing new...

• Confidentiality
• Integrity
• Availability
Some Testing
Frameworks
OSSTMM
• “Open Source Testing Methodology
  Manual”
• Based on a scientific method
• Divided in 4 groups: Scope, Channel, Index
  & Vector
• http://www.isecom.org/osstmm
ISSAF

• “Information Systems Security Assessment
  Framework”
• Focus on 2 areas: Technical & Managerial
• http://www.oissg.org/issaf
OWASP Top Ten

• Open Web Application Security Project
• Focus on the application layer (websites)
• http://www.owasp.org/
WASC-TC
• “Web Application Security Consortium
  Threat Classification”
• Similar to OWASP but deeper
• Help developers and security to
  understand the threats
• http://projects.webappsec.org/Threat-
  Classification
PTES
• “Penetration Testing Execution Standard”
• It is a new standard (Alpha) designed to
  provide both businesses and security
  service providers with a common language
  and scope for performing penetration
  testing
• http://www.pentest-standard.org
Forget the frameworks!

• Ethical hacking is highly technical
• Use your imagination!
• Be “vicious”!
• Think as a “bad boy”!
Let’s use a standard
• Check-lists suxx!
• Reporting a list of CVE’s or MS security
  bulletins is irrelevant
• Need of translation from technical risks
  into business risks
  • Loss of profit
  • Loss of confidentiality
  • Hit the management!
The Process
Process
• Preparation
• Reconnaissance
• Scanning
• Gaining access
• Maintaining access
• Clearing tracks
• Reporting
Preparation
• Define a clear scope with the customer
• Contract
 • Protection against legal issues
 • Definition of limits and danger
 • Which tests are permitted
 • Time window / Total time
 • Key people
 • NDA
Some scope examples
 • An business application
 • Physical security
 • Wi-Fi
 • DMZ
 • A website
 • ...
Reconnaissance

• Active / Passive
• Information gathering
• Target discovery
• Enumeration
Scanning


• Based on data collected during the
  reconnaissance phase
• Searching for vulnerabilities to attack the
  target
Gaining Access

• “Target Exploration”
• Exploitation of the discovered
  vulnerabilities
• Privilege escalation
Maintaining Access


• Trying to gain/keep the ownership of the
  compromised system
• Zombie systems
Covering Tracks

• Clear all trace of the attack
• Log files
• Tunneling
• Steganography
Reporting

• Critical step!
• At all levels, keep evidences (logs,
  screenshots, recordings)
• Use a mind-mapping software
• Think to the target audience while writing
  your report
Some Tips
Internet is your friend!
• Google! All the required information is
  online
• Documents meta-data (FOCA)
• Social engineering (WE’re the weakest
  link)
  • Maltego / Facebook / LinkedIn
• Fuzzing
Build Your Toolbox

• There exists specialized Linux distributions
  like BackTrack or Samurai
• Physical tools (cables, converters, lock-
  picking kits
• Software tools
  (We are all lazy people)
Keep in mind...
• Information is never far-away (often public)
• Broaden your mind (react as your victim)
• Everything is a question of time! ($$$)
• Do not criticize customer. If they fail, don’t
  lauch!
• Use your imagination
• Be vicious!
Conclusions
Why EH is good?
• Address your security from an attacker
  perspective
• Some audit results might give a false sense
  of security
• Protect company values
• Preserve corporate image and customer
  loyalty  
Thank You!
  Q&A?
http://blog.rootshell.be
http://twitter.com/xme

More Related Content

PPTX
Ethical Hacking
PPTX
Ethical Hacking Overview
PPTX
ethical hacking
PPT
Introduction To Ethical Hacking
PDF
Ethical Hacking Certification Path You Should Follow
PPTX
Hacking and Hackers
PPTX
Ethical hacking
PPTX
Ethical hacking
Ethical Hacking
Ethical Hacking Overview
ethical hacking
Introduction To Ethical Hacking
Ethical Hacking Certification Path You Should Follow
Hacking and Hackers
Ethical hacking
Ethical hacking

What's hot (20)

PPT
Ethical hacking
PPTX
Ethical Hacking
PPT
What is Ethical hacking
DOCX
Ehtical hacking speech
PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
Ethical Hacking
PPTX
Hacking and Types of Hacker.
DOCX
Ethical hacking
PDF
Computer hacking – Is it Ethical PPT
PPT
All about Hacking
PDF
Ethical Hacking Tools
PPTX
Hacking
PPTX
Ethical Hacking & Network Security
PPT
Hacking
PPT
Ethical Hacking
PPTX
Ethical Hacking
PPTX
Introduction to hacking
PPTX
Ethical hacking
PDF
White hat and black hat hackers
PPTX
Hacking
Ethical hacking
Ethical Hacking
What is Ethical hacking
Ehtical hacking speech
Ethical hacking-presentation-updated(1by )Rasheed
Ethical Hacking
Hacking and Types of Hacker.
Ethical hacking
Computer hacking – Is it Ethical PPT
All about Hacking
Ethical Hacking Tools
Hacking
Ethical Hacking & Network Security
Hacking
Ethical Hacking
Ethical Hacking
Introduction to hacking
Ethical hacking
White hat and black hat hackers
Hacking

Viewers also liked (20)

PDF
All Your Security Events Are Belong to ... You!
PPTX
Presentation on ethical hacking
PDF
InfoSecurity.be 2011
PDF
ISSA Siem Fraud
PDF
The BruCO"NSA" Network
PDF
$HOME Sweet $HOME
PDF
Automatic MIME Attachments Triage
PDF
$HOME Sweet $HOME Devoxx 2015
PDF
What Will You Investigate Today?
PDF
$HOME Sweet $HOME SANSFIRE Edition
PDF
Because we are just humans
PDF
Building A Poor man’s Fir3Ey3 Mail Scanner
PDF
Secure Web Coding
PDF
Developers are from Mars, Security guys are from Venus
KEY
Unity makes strength
PPT
Mobile Apps Security
PDF
Mobile Security
PPTX
3g technologies
KEY
Social Networks - The Good and the Bad
PPTX
Ethical hacking presentation
All Your Security Events Are Belong to ... You!
Presentation on ethical hacking
InfoSecurity.be 2011
ISSA Siem Fraud
The BruCO"NSA" Network
$HOME Sweet $HOME
Automatic MIME Attachments Triage
$HOME Sweet $HOME Devoxx 2015
What Will You Investigate Today?
$HOME Sweet $HOME SANSFIRE Edition
Because we are just humans
Building A Poor man’s Fir3Ey3 Mail Scanner
Secure Web Coding
Developers are from Mars, Security guys are from Venus
Unity makes strength
Mobile Apps Security
Mobile Security
3g technologies
Social Networks - The Good and the Bad
Ethical hacking presentation

Similar to ISACA Ethical Hacking Presentation 10/2011 (20)

PPTX
DOCX
ethical hacking report
PPTX
Ethical Hacking
PPTX
Session on Cyber security and Ethical Hacking.pptx
PPTX
Cyber Security PPT
PPTX
Ethical Hacking
PPTX
Hacking and Penetration Testing - a beginners guide
PPTX
Ethical hacking 101 - Singapore RSA 2019
DOCX
Final report ethical hacking
PPT
Ethical hacking-ppt-download4575
PPTX
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
DOCX
Ethical hacking
PPT
Ethical hacking a licence to hack
PPTX
building foundation for ethical hacking.ppt
PDF
IRJET-Ethical Hacking
PPTX
Ethical hacking
PPSX
Ethical Hacking, Its relevance and Its Prospects
PPTX
Ethical hacking
ethical hacking report
Ethical Hacking
Session on Cyber security and Ethical Hacking.pptx
Cyber Security PPT
Ethical Hacking
Hacking and Penetration Testing - a beginners guide
Ethical hacking 101 - Singapore RSA 2019
Final report ethical hacking
Ethical hacking-ppt-download4575
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
Ethical hacking
Ethical hacking a licence to hack
building foundation for ethical hacking.ppt
IRJET-Ethical Hacking
Ethical hacking
Ethical Hacking, Its relevance and Its Prospects
Ethical hacking

More from Xavier Mertens (11)

PDF
FPC for the Masses (SANSFire Edition)
PDF
FPC for the Masses - CoRIIN 2018
PDF
HTTP For the Good or the Bad - FSEC Edition
PDF
Unity Makes Strength
PDF
HTTP For the Good or the Bad
PDF
Malware Analysis Using Free Software
PDF
You have a SIEM! And now?
PDF
What are-you-investigate-today? (version 2.0)
PDF
Unity Makes Strength SOURCE Dublin 2013
PDF
BruCON 2010 Lightning Talk
PPT
Belnet events management
FPC for the Masses (SANSFire Edition)
FPC for the Masses - CoRIIN 2018
HTTP For the Good or the Bad - FSEC Edition
Unity Makes Strength
HTTP For the Good or the Bad
Malware Analysis Using Free Software
You have a SIEM! And now?
What are-you-investigate-today? (version 2.0)
Unity Makes Strength SOURCE Dublin 2013
BruCON 2010 Lightning Talk
Belnet events management

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation theory and applications.pdf
PPTX
Cloud computing and distributed systems.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
cuic standard and advanced reporting.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
MYSQL Presentation for SQL database connectivity
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Weekly Chronicles - August'25 Week I
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
The AUB Centre for AI in Media Proposal.docx
Empathic Computing: Creating Shared Understanding
Reach Out and Touch Someone: Haptics and Empathic Computing
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A Presentation on Artificial Intelligence
Encapsulation theory and applications.pdf
Cloud computing and distributed systems.
Per capita expenditure prediction using model stacking based on satellite ima...
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
cuic standard and advanced reporting.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
MYSQL Presentation for SQL database connectivity
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

ISACA Ethical Hacking Presentation 10/2011

  • 1. Ethical Hacking... Mind the Gap with Business ISACA Round Table 10/2011 - Xavier Mertens
  • 2. $ whoami • Xavier Mertens • Security Consultant @ Telenet (C-CURE) • CISSP, CISA, CeH • Security Blogger • Volunteer for security projects:
  • 3. $ cat disclaimer.txt “The opinions expressed in this presentation are those of the speaker and do not reflect those of past, present or future employers, partners or customers”
  • 4. Agenda • You said “ethical hacking”? • Some frameworks • The process • Some tips
  • 5. You said “Ethical Hacking”?
  • 6. “Ethic” “A set of moral principles of right and wrong that are accepted by an individual or a social group”
  • 7. “Hacking” “Practice of modifying computer hardware/ software or any other electronic device to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called ‘hackers’.”
  • 8. Hackers are good guys The term 'hacker' has been misrepresented in popular media for a long time! “Hacking has nothing to do with criminal activities such as identity theft and electronic trespassing! Rather, it [hacker] has been coined at the Massachusetts Institute of Technology (MIT) as a term for curious individuals for whom every device or piece of software is full of exciting challenges to develop potential improvements or discover alternative uses."
  • 9. But some derive... Hacking can be used to break into computers for personal or commercial gains or for malicious activities. Those are called “Black Hats”
  • 10. Can hacking be “ethical”? Yes, of course! Using the same tools and techniques as bad guys, security vulnerabilities are discovered then disclosed and patched (sometimes ;-)
  • 11. Ethical Hacking is... An individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate computer systems using the same methods as a Hacker. Ethical hacking is: • Legal • Granted by the target • Scope clearly defined / NDA • Non destructive
  • 12. Also Known As... • Pentesting • White-hat hacking • Red-teaming
  • 13. Communities Security conference tries to create bridges between the various actors active in computer security world, included but not limited to hackers, security professionals, security communities, non-profit organizations, CERTs, students, law enforcement agencies, etc.....
  • 14. Security Researchers • Develop tools to understand how attacks work and how to reproduce it • Search for software vulnerabilities with the debate of full-disclosure vs. responsible- disclosure • Prosecuted in some countries • Research is mandatory!
  • 15. Why are we vulnerable? Features Ease of use Security New features/ease of use reduce the security or at least increase the attack surface!
  • 16. Nothing new... • Confidentiality • Integrity • Availability
  • 18. OSSTMM • “Open Source Testing Methodology Manual” • Based on a scientific method • Divided in 4 groups: Scope, Channel, Index & Vector • http://www.isecom.org/osstmm
  • 19. ISSAF • “Information Systems Security Assessment Framework” • Focus on 2 areas: Technical & Managerial • http://www.oissg.org/issaf
  • 20. OWASP Top Ten • Open Web Application Security Project • Focus on the application layer (websites) • http://www.owasp.org/
  • 21. WASC-TC • “Web Application Security Consortium Threat Classification” • Similar to OWASP but deeper • Help developers and security to understand the threats • http://projects.webappsec.org/Threat- Classification
  • 22. PTES • “Penetration Testing Execution Standard” • It is a new standard (Alpha) designed to provide both businesses and security service providers with a common language and scope for performing penetration testing • http://www.pentest-standard.org
  • 23. Forget the frameworks! • Ethical hacking is highly technical • Use your imagination! • Be “vicious”! • Think as a “bad boy”!
  • 24. Let’s use a standard • Check-lists suxx! • Reporting a list of CVE’s or MS security bulletins is irrelevant • Need of translation from technical risks into business risks • Loss of profit • Loss of confidentiality • Hit the management!
  • 26. Process • Preparation • Reconnaissance • Scanning • Gaining access • Maintaining access • Clearing tracks • Reporting
  • 27. Preparation • Define a clear scope with the customer • Contract • Protection against legal issues • Definition of limits and danger • Which tests are permitted • Time window / Total time • Key people • NDA
  • 28. Some scope examples • An business application • Physical security • Wi-Fi • DMZ • A website • ...
  • 29. Reconnaissance • Active / Passive • Information gathering • Target discovery • Enumeration
  • 30. Scanning • Based on data collected during the reconnaissance phase • Searching for vulnerabilities to attack the target
  • 31. Gaining Access • “Target Exploration” • Exploitation of the discovered vulnerabilities • Privilege escalation
  • 32. Maintaining Access • Trying to gain/keep the ownership of the compromised system • Zombie systems
  • 33. Covering Tracks • Clear all trace of the attack • Log files • Tunneling • Steganography
  • 34. Reporting • Critical step! • At all levels, keep evidences (logs, screenshots, recordings) • Use a mind-mapping software • Think to the target audience while writing your report
  • 36. Internet is your friend! • Google! All the required information is online • Documents meta-data (FOCA) • Social engineering (WE’re the weakest link) • Maltego / Facebook / LinkedIn • Fuzzing
  • 37. Build Your Toolbox • There exists specialized Linux distributions like BackTrack or Samurai • Physical tools (cables, converters, lock- picking kits • Software tools (We are all lazy people)
  • 38. Keep in mind... • Information is never far-away (often public) • Broaden your mind (react as your victim) • Everything is a question of time! ($$$) • Do not criticize customer. If they fail, don’t lauch! • Use your imagination • Be vicious!
  • 40. Why EH is good? • Address your security from an attacker perspective • Some audit results might give a false sense of security • Protect company values • Preserve corporate image and customer loyalty  
  • 41. Thank You! Q&A? http://blog.rootshell.be http://twitter.com/xme