Network
Exploitation
September 26 2018
Get Involved
● Discord - discord.gg/kuejt8p
● Fire Talks - October 24th, 2018
● Live Stream - Whenever you want*
● CSG CTF - ctf.utdcsg.club
Events
● The Assembly Group - Wednesday @ 8:15 pm in ECSS 2.201
● 0DAYALLDAY Research Event - September 29 @ 11 AM off
campus
● Dallas Hackers Association - October 3 @ 7 pm off campus
Overview
● Types of Networks
● Types of Network Environments
● Internal VS External
● Enumeration
● Tools
● Attack Routing
● Demo
Types of Networks
Local Area Network (LAN) - Internal network of computers inside of a building or a small
land mass
Wide Area Network (WAN) - External network of computers connected miles apart from
each other
Metropolitan Area Network (MAN) - A network of computers in a metropolitan area
usually a city.
Types of Network Environments
● Corporate - A network consisting of users, servers, and a domain
controller (usually)
● Personal - A home network consisting of a user, router, and
sometimes a switch (usually)
Internal VS External Networks
● Local Area Networks are internal networks in an organisation or home that can
communicate with each other through a router or switch
● Wide Area Networks are external networks that must go through a larger
datacenter or internet service provider to communicate with other computers
● Exploiting external networks allows you to gain access to someone’s internal
network if you are not attacking from within the LAN already
● This gives you more options to pivot and gather information because you have a
larger attack surface
Where are we in the network?
What is our goal?
Network Enumeration
External Enumeration
● Open Ports
● Running Services
○ RDP, VPN, RPC, VNC, SSH
● Web portals
○ Ports 80,443
● Anything that can allow us to get
into the network
Internal Enumeration
● Find Users/Hosts
● Exploitable Services
● Internal Web portals
● Anything that will give you more
information and pivot around the
network
Tools
● NMap - Network scanning tool that allows you to see services
and ports that are running
○ Nmap -sC -sV -oA output IPADDRESS
● Nessus - Vulnerability and Services scanning tool (Very heavy
not very stealthy)
Attack Routing
● Routing external attacks through internal network for more
surface
● Ability to pivot through a network from a external machine
Now time for the demo...

More Related Content

PDF
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
PPTX
Maltego Information Gathering
PPTX
DDoS ATTACKS
PPTX
Haking PPT
PPTX
Reconnaissance - For pentesting and user awareness
PDF
Nessus Software
PPT
L2 Intrusion Detection System (IDS)
PDF
Cyber security and demonstration of security tools
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Maltego Information Gathering
DDoS ATTACKS
Haking PPT
Reconnaissance - For pentesting and user awareness
Nessus Software
L2 Intrusion Detection System (IDS)
Cyber security and demonstration of security tools

What's hot (20)

PPTX
Data breach
PDF
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
PPTX
Network Security
PPTX
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documents
PDF
C# and Dot Net Framework 1st & 2nd Unit.pdf
PPTX
Dark Web and Privacy
PPTX
Dark net
PPTX
Brute force attack
PDF
Osint presentation nov 2019
PPTX
Introduction To Dark Web
PDF
Lessons from 100+ ransomware recoveries
PDF
Purple Team Exercise Workshop December 2020
PDF
Topics in network security
PDF
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
PPTX
Cyber Security A Challenges For Mankind
PPTX
Password cracking and brute force
PPTX
Brute force-attack presentation
PPTX
Ransomware Attack.pptx
PPTX
Security operation center (SOC)
PPT
Reconnaissance
Data breach
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Network Security
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documents
C# and Dot Net Framework 1st & 2nd Unit.pdf
Dark Web and Privacy
Dark net
Brute force attack
Osint presentation nov 2019
Introduction To Dark Web
Lessons from 100+ ransomware recoveries
Purple Team Exercise Workshop December 2020
Topics in network security
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
Cyber Security A Challenges For Mankind
Password cracking and brute force
Brute force-attack presentation
Ransomware Attack.pptx
Security operation center (SOC)
Reconnaissance
Ad

Similar to Network Exploitation (20)

PDF
Plugging Network Security Holes Using NetFlow
PPTX
Chapter One Network nile.pptx
PPT
Securitych1
PPTX
Wi-Fi Hacking with the help of various tools.pptx
PDF
Carmella_DelosSantos-BrochureITssubEra.pdf
PDF
Computer Networks Basics
PPTX
ENTERPRISE NETWORKING
PPTX
lecture5.pptx
PDF
Comprehensive guide for compromising network devices.
PPT
Networking And Telecommunications
PPTX
TYPES OF NETWORKS BY ANAM YOUNAS
PPTX
Basic Foundation For Cybersecurity
PDF
Ch 13: Network Protection Systems
PPTX
Computer network
PPTX
What is network
PPTX
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptx
PPTX
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
PPT
Internet and Networking
DOCX
Data Communication and Computer Network Overview
PPT
ch01.ppt
Plugging Network Security Holes Using NetFlow
Chapter One Network nile.pptx
Securitych1
Wi-Fi Hacking with the help of various tools.pptx
Carmella_DelosSantos-BrochureITssubEra.pdf
Computer Networks Basics
ENTERPRISE NETWORKING
lecture5.pptx
Comprehensive guide for compromising network devices.
Networking And Telecommunications
TYPES OF NETWORKS BY ANAM YOUNAS
Basic Foundation For Cybersecurity
Ch 13: Network Protection Systems
Computer network
What is network
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptx
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Internet and Networking
Data Communication and Computer Network Overview
ch01.ppt
Ad

More from UTD Computer Security Group (20)

PDF
22S kickoff 2.0 (kickoff + anonymity talk)
PPTX
UTD Computer Security Group - Cracking the domain
PPTX
Forensics audio and video
PPTX
Computer networks and network security
PPTX
PPTX
Powershell crash course
PPTX
Intro to cybersecurity
PPTX
PDF
Web Exploitation
PDF
Penetration Testing: Celestial
PDF
Introduction to Exploitation
PDF
Cryptography Crash Course
PDF
Fuzzing - Part 2
PDF
Exploitation Crash Course
PDF
Fuzzing - Part 1
PDF
Protostar VM - Heap3
PDF
Heap Base Exploitation
PDF
Return Oriented Programming
22S kickoff 2.0 (kickoff + anonymity talk)
UTD Computer Security Group - Cracking the domain
Forensics audio and video
Computer networks and network security
Powershell crash course
Intro to cybersecurity
Web Exploitation
Penetration Testing: Celestial
Introduction to Exploitation
Cryptography Crash Course
Fuzzing - Part 2
Exploitation Crash Course
Fuzzing - Part 1
Protostar VM - Heap3
Heap Base Exploitation
Return Oriented Programming

Recently uploaded (20)

PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
The various Industrial Revolutions .pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPT
Geologic Time for studying geology for geologist
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Getting Started with Data Integration: FME Form 101
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Unlock new opportunities with location data.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
The various Industrial Revolutions .pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Taming the Chaos: How to Turn Unstructured Data into Decisions
Geologic Time for studying geology for geologist
observCloud-Native Containerability and monitoring.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Web Crawler for Trend Tracking Gen Z Insights.pptx
Module 1.ppt Iot fundamentals and Architecture
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
DP Operators-handbook-extract for the Mautical Institute
sustainability-14-14877-v2.pddhzftheheeeee
Developing a website for English-speaking practice to English as a foreign la...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
WOOl fibre morphology and structure.pdf for textiles
Getting Started with Data Integration: FME Form 101
Zenith AI: Advanced Artificial Intelligence
CloudStack 4.21: First Look Webinar slides
Unlock new opportunities with location data.pdf

Network Exploitation

  • 2. Get Involved ● Discord - discord.gg/kuejt8p ● Fire Talks - October 24th, 2018 ● Live Stream - Whenever you want* ● CSG CTF - ctf.utdcsg.club
  • 3. Events ● The Assembly Group - Wednesday @ 8:15 pm in ECSS 2.201 ● 0DAYALLDAY Research Event - September 29 @ 11 AM off campus ● Dallas Hackers Association - October 3 @ 7 pm off campus
  • 4. Overview ● Types of Networks ● Types of Network Environments ● Internal VS External ● Enumeration ● Tools ● Attack Routing ● Demo
  • 5. Types of Networks Local Area Network (LAN) - Internal network of computers inside of a building or a small land mass Wide Area Network (WAN) - External network of computers connected miles apart from each other Metropolitan Area Network (MAN) - A network of computers in a metropolitan area usually a city.
  • 6. Types of Network Environments ● Corporate - A network consisting of users, servers, and a domain controller (usually) ● Personal - A home network consisting of a user, router, and sometimes a switch (usually)
  • 7. Internal VS External Networks ● Local Area Networks are internal networks in an organisation or home that can communicate with each other through a router or switch ● Wide Area Networks are external networks that must go through a larger datacenter or internet service provider to communicate with other computers ● Exploiting external networks allows you to gain access to someone’s internal network if you are not attacking from within the LAN already ● This gives you more options to pivot and gather information because you have a larger attack surface
  • 8. Where are we in the network? What is our goal?
  • 9. Network Enumeration External Enumeration ● Open Ports ● Running Services ○ RDP, VPN, RPC, VNC, SSH ● Web portals ○ Ports 80,443 ● Anything that can allow us to get into the network Internal Enumeration ● Find Users/Hosts ● Exploitable Services ● Internal Web portals ● Anything that will give you more information and pivot around the network
  • 10. Tools ● NMap - Network scanning tool that allows you to see services and ports that are running ○ Nmap -sC -sV -oA output IPADDRESS ● Nessus - Vulnerability and Services scanning tool (Very heavy not very stealthy)
  • 11. Attack Routing ● Routing external attacks through internal network for more surface ● Ability to pivot through a network from a external machine Now time for the demo...