SlideShare a Scribd company logo
Cover the Basics: Part 2
February 4, 2018
Audience
● Beginners in OffSec
● Students
Objective
Objective of this session is to give a starting point to people like me who want
to explore the world of Offensive Security.
This session is not for people who just want to learn hacking (aka Black Hat
hacking)
Topics
● Phase 1 | Reconnaissance
● Phase 2 | Scanning
● Phase 3 | Gaining Access
● Phase 4 | Maintaining Access
● Phase 5 | Covering Tracks /
Reporting
Phase 1 | Reconnaissance
Supposedly - Abraham Lincoln
If I had four hours to chop down a tree,
I’d spend the first two hours sharpening the axe
Reconnaissance
● Active Reconnaissance
In this process, you directly interact with the computer system to gain information. This information can be
relevant and accurate. But there is a risk of getting detected if you are planning active reconnaissance
without permission. If you are detected, then system admin can take severe action against you and trail
your subsequent activities.
● Passive Reconnaissance
In this process, you will not be directly connected to a computer system. This process is used to gather
essential information without ever interacting with the target systems.
Footprinting
Tools and tricks to get the information about the computer, IP and mac
address, related user and system.
● Passive Footprinting
Reviewing a company’s website is an example of passive footprinting.
● Active Footprinting
Whereas attempting to gain access to sensitive information through social engineering is an example of
active information gathering.
Footprinting
Domain Name Information
Domain Name Information (whois.domaintools.com)
Quick Fix - Domain Name Information
It's always recommended to keep your domain
name profile a private one which should hide the
above-mentioned information from potential
hackers.
Finding IP Address
FindingHostingCompany
Quick Fix - IP Information
If a computer system or network is linked with the Internet directly, then you
cannot hide the IP address and the related information such as the hosting
company, its location, ISP, etc. If you have a server containing very sensitive
data, then it is recommended to keep it behind a secure proxy so that hackers
cannot get the exact details of your actual server. This way, it will be difficult for
any potential hacker to reach your server directly.
Another effective way of hiding your system IP and ultimately all the associated
information is to go through a Virtual Private Network (VPN). If you configure a
VPN, then the whole traffic routes through the VPN network, so your true IP
address assigned by your ISP is always hidden.
History of the Website
Quick Fix - History of the Website
Though there are some advantages of keeping
your website in an archive database, but if you
do not like anybody to see how your website
progressed through different stages, then you
can request archive.org to delete the history of
your website.
Fingerprinting
The term OS fingerprinting in Ethical Hacking refers to any method
used to determine what operating system is running on a remote
computer.
● Passive Footprinting
Passive fingerprinting is based on sniffer traces from the remote system. Based on the sniffer traces (such as
Wireshark) of the packets, you can determine the operating system of the remote host.
● Active Footprinting
Active fingerprinting is accomplished by sending specially crafted packets to a target machine and then
noting down its response and analyzing the gathered information to determine the target OS.
nmap Host Scan (nmap -O -v)
Quick Fix - nmap host scan
You can hide your main system behind a secure
proxy server or a VPN so that your complete
identity is safe and ultimately your main system
remains safe.
nmap Port Scan (nmap -sT -p 80)
Quick Fix - nmap port scan
It is always recommended to check and close all
the unwanted ports to safeguard the system from
malicious attacks.
Ping Sweep
A ping sweep is a network scanning technique that you can use to
determine which IP address from a range of IP addresses map to live
hosts. Ping Sweep is also known as ICMP sweep.
You can use fping command for ping sweep. This command is a ping-
like program which uses the Internet Control Message Protocol (ICMP)
echo request to determine if a host is up.
Quick Fix - ping sweep
To disable ping sweeps on a network, you can
block ICMP ECHO requests from outside
sources. This can be done using the following
command which will create a firewall rule in
iptable.
iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP
Prerequisites to be an effective hacker
The Fundamental Skills
● Basic Computer Skills
● Networking Skills
● Linux Skills
● Wireshark / Tcpdump (sniffing)
● Virtualization / Cloud
● Security Concepts & Technologies
● Wireless Technologies
The Intermediate Skills
● Scripting
● Database Skills
● Web Applications
● Forensics
● Advanced TCP/IP
● Cryptography
● Reverse Engineering
● IoT
The Intangible Skills
● Think Creatively
● Problem-Solving Skills
● Persistence
© Harpreet Singh Wadhwa
Harpreet Singh Wadhwa
https://www.meetup.com/offsecblr
https://twitter.com/wharpreet
Mailto: saviour@offsecblr.com

More Related Content

PPTX
Offensive Security basics part 1
PPTX
Introduction to ethical hacking
PDF
Honeypots for Active Defense
PPTX
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
PDF
Threat Hunting with Splunk
PDF
Enabling effective hunt teaming and incident response
PPT
Hacking step (Methodology)
PPTX
vodQA(Pune) 2018 - QAing the security way
Offensive Security basics part 1
Introduction to ethical hacking
Honeypots for Active Defense
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Threat Hunting with Splunk
Enabling effective hunt teaming and incident response
Hacking step (Methodology)
vodQA(Pune) 2018 - QAing the security way

What's hot (20)

PDF
QAing the security way!
PPTX
Threat Hunting with Splunk Hands-on
PDF
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
PPTX
Presentation1
PDF
Threat Hunting Workshop
PPTX
Web hacking 1.0
PDF
Hacking from the Inside
PDF
Advanced Threats and Lateral Movement Detection
PPTX
Hunting before a Known Incident
PDF
Honeycon2016-honeypot updates for public
PPTX
Abstract Tools for Effective Threat Hunting
PPTX
Penetration Testing
PDF
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
PPT
Ethical Hacking
PPTX
Threat Hunting with Splunk
PDF
No Easy Breach DerbyCon 2016
PDF
Threat hunting workshop
PPTX
Login cat tekmonks - v4
PPTX
Honeypots and honeynets
PDF
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
QAing the security way!
Threat Hunting with Splunk Hands-on
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Presentation1
Threat Hunting Workshop
Web hacking 1.0
Hacking from the Inside
Advanced Threats and Lateral Movement Detection
Hunting before a Known Incident
Honeycon2016-honeypot updates for public
Abstract Tools for Effective Threat Hunting
Penetration Testing
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
Ethical Hacking
Threat Hunting with Splunk
No Easy Breach DerbyCon 2016
Threat hunting workshop
Login cat tekmonks - v4
Honeypots and honeynets
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
Ad

Similar to Offensive Security basics part 2 (20)

PPT
Hacking tutorial
PPT
PPT
Hacking 1224807880385377-9
PPT
Hacking Presentation
PPT
PPT
Hacking Fundamentals - Jen Johnson , Miria Grunick
PDF
What is ethical hacking and complete cyber security presentation on this file
PPTX
hacking
PPTX
Hacking - penetration tools
PPTX
2. Footprinting and scanning and its sequence.pptx
PPTX
Hacking by Pratyush Gupta
PPT
Ethical hacking is a based on computer hacking
PPT
Ethical Hacking
PPT
Ethical hacking
PPT
cyber forensics Footprinting and Scanning.ppt
PPT
Reconnaissance
PPTX
Phases of penetration testing
PPTX
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Hacking tutorial
Hacking 1224807880385377-9
Hacking Presentation
Hacking Fundamentals - Jen Johnson , Miria Grunick
What is ethical hacking and complete cyber security presentation on this file
hacking
Hacking - penetration tools
2. Footprinting and scanning and its sequence.pptx
Hacking by Pratyush Gupta
Ethical hacking is a based on computer hacking
Ethical Hacking
Ethical hacking
cyber forensics Footprinting and Scanning.ppt
Reconnaissance
Phases of penetration testing
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Ad

Recently uploaded (20)

PDF
How Creative Agencies Leverage Project Management Software.pdf
PPT
Introduction Database Management System for Course Database
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
top salesforce developer skills in 2025.pdf
PDF
AI in Product Development-omnex systems
PDF
medical staffing services at VALiNTRY
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
ai tools demonstartion for schools and inter college
PPTX
Introduction to Artificial Intelligence
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
System and Network Administraation Chapter 3
PDF
Digital Strategies for Manufacturing Companies
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
How Creative Agencies Leverage Project Management Software.pdf
Introduction Database Management System for Course Database
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
CHAPTER 2 - PM Management and IT Context
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
top salesforce developer skills in 2025.pdf
AI in Product Development-omnex systems
medical staffing services at VALiNTRY
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Design an Analysis of Algorithms II-SECS-1021-03
Upgrade and Innovation Strategies for SAP ERP Customers
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
ai tools demonstartion for schools and inter college
Introduction to Artificial Intelligence
Softaken Excel to vCard Converter Software.pdf
System and Network Administraation Chapter 3
Digital Strategies for Manufacturing Companies
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx

Offensive Security basics part 2

  • 1. Cover the Basics: Part 2 February 4, 2018
  • 2. Audience ● Beginners in OffSec ● Students
  • 3. Objective Objective of this session is to give a starting point to people like me who want to explore the world of Offensive Security. This session is not for people who just want to learn hacking (aka Black Hat hacking)
  • 4. Topics ● Phase 1 | Reconnaissance ● Phase 2 | Scanning ● Phase 3 | Gaining Access ● Phase 4 | Maintaining Access ● Phase 5 | Covering Tracks / Reporting
  • 5. Phase 1 | Reconnaissance
  • 6. Supposedly - Abraham Lincoln If I had four hours to chop down a tree, I’d spend the first two hours sharpening the axe
  • 7. Reconnaissance ● Active Reconnaissance In this process, you directly interact with the computer system to gain information. This information can be relevant and accurate. But there is a risk of getting detected if you are planning active reconnaissance without permission. If you are detected, then system admin can take severe action against you and trail your subsequent activities. ● Passive Reconnaissance In this process, you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.
  • 8. Footprinting Tools and tricks to get the information about the computer, IP and mac address, related user and system. ● Passive Footprinting Reviewing a company’s website is an example of passive footprinting. ● Active Footprinting Whereas attempting to gain access to sensitive information through social engineering is an example of active information gathering.
  • 11. Domain Name Information (whois.domaintools.com)
  • 12. Quick Fix - Domain Name Information It's always recommended to keep your domain name profile a private one which should hide the above-mentioned information from potential hackers.
  • 15. Quick Fix - IP Information If a computer system or network is linked with the Internet directly, then you cannot hide the IP address and the related information such as the hosting company, its location, ISP, etc. If you have a server containing very sensitive data, then it is recommended to keep it behind a secure proxy so that hackers cannot get the exact details of your actual server. This way, it will be difficult for any potential hacker to reach your server directly. Another effective way of hiding your system IP and ultimately all the associated information is to go through a Virtual Private Network (VPN). If you configure a VPN, then the whole traffic routes through the VPN network, so your true IP address assigned by your ISP is always hidden.
  • 16. History of the Website
  • 17. Quick Fix - History of the Website Though there are some advantages of keeping your website in an archive database, but if you do not like anybody to see how your website progressed through different stages, then you can request archive.org to delete the history of your website.
  • 18. Fingerprinting The term OS fingerprinting in Ethical Hacking refers to any method used to determine what operating system is running on a remote computer. ● Passive Footprinting Passive fingerprinting is based on sniffer traces from the remote system. Based on the sniffer traces (such as Wireshark) of the packets, you can determine the operating system of the remote host. ● Active Footprinting Active fingerprinting is accomplished by sending specially crafted packets to a target machine and then noting down its response and analyzing the gathered information to determine the target OS.
  • 19. nmap Host Scan (nmap -O -v)
  • 20. Quick Fix - nmap host scan You can hide your main system behind a secure proxy server or a VPN so that your complete identity is safe and ultimately your main system remains safe.
  • 21. nmap Port Scan (nmap -sT -p 80)
  • 22. Quick Fix - nmap port scan It is always recommended to check and close all the unwanted ports to safeguard the system from malicious attacks.
  • 23. Ping Sweep A ping sweep is a network scanning technique that you can use to determine which IP address from a range of IP addresses map to live hosts. Ping Sweep is also known as ICMP sweep. You can use fping command for ping sweep. This command is a ping- like program which uses the Internet Control Message Protocol (ICMP) echo request to determine if a host is up.
  • 24. Quick Fix - ping sweep To disable ping sweeps on a network, you can block ICMP ECHO requests from outside sources. This can be done using the following command which will create a firewall rule in iptable. iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP
  • 25. Prerequisites to be an effective hacker
  • 26. The Fundamental Skills ● Basic Computer Skills ● Networking Skills ● Linux Skills ● Wireshark / Tcpdump (sniffing) ● Virtualization / Cloud ● Security Concepts & Technologies ● Wireless Technologies
  • 27. The Intermediate Skills ● Scripting ● Database Skills ● Web Applications ● Forensics ● Advanced TCP/IP ● Cryptography ● Reverse Engineering ● IoT The Intangible Skills ● Think Creatively ● Problem-Solving Skills ● Persistence
  • 28. © Harpreet Singh Wadhwa Harpreet Singh Wadhwa https://www.meetup.com/offsecblr https://twitter.com/wharpreet Mailto: saviour@offsecblr.com