SlideShare a Scribd company logo
PETER WOOD – THE ETHICAL HACKER




                                  1
The Ultimate Defence:
             Think Like a Hacker


An Ethical Hacker’s View of Corporate Security




                                      Peter Wood
                                   Chief Executive Officer
                               First•Base Technologies LLP
Who is Peter Wood?

Worked in computers & electronics since 1969
Founded First Base in 1989     (one of the first ethical hacking firms)

CEO First Base Technologies LLP
Social engineer & penetration tester
Conference speaker and security ‘expert’

Member of ISACA Security Advisory Group
Vice Chair of BCS Information Risk Management and Audit Group
UK Chair, Corporate Executive Programme

FBCS, CITP, CISSP, MIEEE, M.Inst.ISP
Registered BCS Security Consultant
Member of ACM, ISACA, ISSA, Mensa
Thinking like a hacker

• Hacking is a way of thinking
  A hacker is someone who thinks outside the box. It's someone who
  discards conventional wisdom, and does something else instead. It's
  someone who looks at the edge and wonders what's beyond. It's
  someone who sees a set of rules and wonders what happens if you
  don't follow them.                      [Bruce Schneier]



• Hacking applies to all aspects of life
  - not just computers
Network Device Compromise
SNMP
                 Simple Network Management Protocol


• A protocol developed to manage nodes (servers, workstations,
  routers, switches and hubs etc.) on an IP network
• Enables network administrators to manage network performance,
  find and solve network problems, and plan for network growth
• SNMP v1 is the de facto network management protocol
• SNMP v1 has been criticised for its poor security. Authentication is
  performed only by a ‘community string’, in effect a type of password,
  which is transmitted in clear text
SNMP Scanning
SNMP for hackers
•   If you know the read string (default public) you can read the entire MIB for
    that device
•   If you know the read-write string (default private) you may be able to change
    settings on that device
•   You may be able to ‘sniff’ community strings off the network if they’ve been
    changed from the defaults
•   You may be able to control a router or switch:
     – Intercept traffic and read sensitive information
     – ‘Crash’ the network repeatedly
     – Lock the device out, requiring physical access to reset it
•   You may be able to list users, groups, shares etc. on servers
•   You may be able to subvert wireless network security
Windows Hacking
Windows architecture
                             Domain logon


Local users                                                            Domain users
and groups    Workstation                                  Domain       and groups

                                                          Controller
                            Global group in local group




                            Lo
Local users
              Workstation        ca                        Domain      Domain users
and groups                            l lo                              and groups
                                             go           Controller
                                                  n




Local users                                                             Local users
and groups    Workstation                                 Member        and groups

                                                          Server




                                                                        Local users
                                                          Member        and groups

                                                          Server
List privileged accounts and
  look for service accounts
Case study: Administrator passwords


                                             admin5
                                             crystal
                                             finance
Global firm worth £800million                friday
                                             macadmin
• 67 Administrator accounts                  monkey
                                             orange
• 43 simple passwords (64%)                  password
                                             password1
                                             prague
• 15 were “password” (22%)
                                             pudding
                                             rocky4
• Some examples we found ->                  security
                                             security1
                                             sparkle
                                             webadmin
                                             yellow
Case study: password crack
• 26,310 passwords from a Windows domain


• 11,279 (42.9%) cracked in 2½ minutes


• It’s not a challenge!
Laptop hacking
If we can boot from CD or USB …
We have some passwords!
… or just read the disk
Change the Administrator password
Desktop & Laptop Security

• Physical security on Windows desktops and laptops
  doesn’t exist
• Native Windows security is ineffective if you have physical
  access
• Everything is visible: e-mails, spreadsheets, documents,
  passwords
• If it’s on your machine - it’s stolen!
• Encryption is the best defence, coupled with lots of
  training!
Attack the building
Impersonating an employee
Impersonating a supplier
Do-it-yourself ID cards
Impersonate a cleaner
•   No vetting
•   Out-of-hours access
•   Cleans the desks
•   Takes out large black sacks
Data theft by keylogger
Keyghost log file


Keystrokes recorded so far is 2706 out of 107250 ...

<PWR><CAD>fsmith<tab><tab>arabella
 xxxxxxx <tab><tab> None<tab><tab> None<tab><tab>
None<tab><tab> <CAD> arabella
<CAD>
<CAD> arabella
<CAD>
<CAD> arabella
exit
tracert 192.168.137.240
telnet 192.168.137.240
cisco
Need more information?

    Peter Wood
    Chief Executive Officer
First•Base Technologies LLP

 peterw@firstbase.co.uk

     http://firstbase.co.uk
    http://white-hats.co.uk
    http://peterwood.com

   Blog: fpws.blogspot.com
    Twitter: @peterwoodx

More Related Content

PPTX
Senetas fibre optic connections are secure - right
PPTX
Ixia anue maximum roi from your existing toolsets
PPTX
Palo alto safe application enablement
PPT
CCNA Security - Chapter 8
PPTX
Cisco OfficeExtend: Secure, High-Performance Wireless for Teleworkers
PPS
CISCO
PPT
Cisco Ccna Certification
PDF
Cisco CCNA Certification Exams
Senetas fibre optic connections are secure - right
Ixia anue maximum roi from your existing toolsets
Palo alto safe application enablement
CCNA Security - Chapter 8
Cisco OfficeExtend: Secure, High-Performance Wireless for Teleworkers
CISCO
Cisco Ccna Certification
Cisco CCNA Certification Exams

What's hot (19)

PDF
Mobilize employees with the cisco mobile workspace solution
PPTX
TechWiseTV Workshop: SD-WAN Security
PPTX
Beyond BYOD
PPTX
Beyond BYOD: Uncompromised Experience for Any Workspace
DOCX
KRISHNAMOORTHI_NW
PDF
Arch Rock Overview
PDF
BYOD Monitoring
PDF
Alcatellucentsdn2013
DOCX
PDF
Teknoforce
PDF
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
PDF
Best reviews for Nevales Networks
PPTX
Ccna security
PDF
Porque cambiar de IPSec a SSL VPN
PDF
Resume_Mayalagu updated
PPTX
Data Center Security Now and into the Future
PDF
Cisco open network environment
PPTX
Cisco connect winnipeg 2018 optimizing your client's wi-fi experience v4 - ...
PDF
Paul Ho - Wireless Infrastructure for Mobile e-Learning
Mobilize employees with the cisco mobile workspace solution
TechWiseTV Workshop: SD-WAN Security
Beyond BYOD
Beyond BYOD: Uncompromised Experience for Any Workspace
KRISHNAMOORTHI_NW
Arch Rock Overview
BYOD Monitoring
Alcatellucentsdn2013
Teknoforce
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
Best reviews for Nevales Networks
Ccna security
Porque cambiar de IPSec a SSL VPN
Resume_Mayalagu updated
Data Center Security Now and into the Future
Cisco open network environment
Cisco connect winnipeg 2018 optimizing your client's wi-fi experience v4 - ...
Paul Ho - Wireless Infrastructure for Mobile e-Learning

Viewers also liked (20)

PDF
2013 Medicines in Development: Older Americans
PDF
Grafico diario del dax perfomance index para el 13 02-2014
PPTX
"Innovative Problem Solving: Getting Unstuck In Your Thinking"
PPTX
Do you hunger for games? Gamification in Information Literacy Instruction
PPT
Presentación sobre EL CENTRO VIRTUAL DE ALTOS ESTUDIOS EN ALTAS ENERGIAS
PPTX
Ixia anue maximum roi from your existing toolsets
PDF
Icip workshop sme needs analysis
PDF
Congreso 2011-2015
PDF
Dispatches from the Frontline: Using Pro-Poor Foresight to Influence Decision...
KEY
User Experience Flight Check - WordCamp LA
PPTX
Leveraging Social Media for Funnel Build
PDF
Integración en-la-organización
PDF
05a fede mma forum colombia
DOC
Zaragoza turismo 196
PDF
How to Buy a Car for $1,000 - Gnomedex 2008
PDF
Integraciòn en la organizaciòn
PDF
Integracion en-la-organización
PDF
100万ダウンロードを達成するには(16班)
PDF
Crossing the streams: Social and technical interfaces between Wikimedia and O...
2013 Medicines in Development: Older Americans
Grafico diario del dax perfomance index para el 13 02-2014
"Innovative Problem Solving: Getting Unstuck In Your Thinking"
Do you hunger for games? Gamification in Information Literacy Instruction
Presentación sobre EL CENTRO VIRTUAL DE ALTOS ESTUDIOS EN ALTAS ENERGIAS
Ixia anue maximum roi from your existing toolsets
Icip workshop sme needs analysis
Congreso 2011-2015
Dispatches from the Frontline: Using Pro-Poor Foresight to Influence Decision...
User Experience Flight Check - WordCamp LA
Leveraging Social Media for Funnel Build
Integración en-la-organización
05a fede mma forum colombia
Zaragoza turismo 196
How to Buy a Car for $1,000 - Gnomedex 2008
Integraciòn en la organizaciòn
Integracion en-la-organización
100万ダウンロードを達成するには(16班)
Crossing the streams: Social and technical interfaces between Wikimedia and O...

Similar to Peter wood – the ethical hacker (20)

PPTX
Prime Targets in Network Infrastructure
PPT
23 computer security
PDF
Cisel1 d
PPT
Top Five Internal Security Vulnerabilities
PPT
1556 a 01
PPT
How to become Hackers .
PPT
Hackers Cracker Network Intruder
PPT
PDF
Bar Camp 11 Oct09 Hacking
PPT
PPT
Hackers
PPT
Hackers
PPTX
Ethical hacking
PPTX
Unit4 NMA working with user accounts WINDOWS SERVER 2008
PDF
Real life hacking101
PPTX
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
PPTX
Monitoring & Administerng System & Network Security.pptx
PPTX
Lecture 5&6 corporate architecture
PDF
Who will guard the guards
PDF
The Ultimate Defence - Think Like a Hacker
Prime Targets in Network Infrastructure
23 computer security
Cisel1 d
Top Five Internal Security Vulnerabilities
1556 a 01
How to become Hackers .
Hackers Cracker Network Intruder
Bar Camp 11 Oct09 Hacking
Hackers
Hackers
Ethical hacking
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Real life hacking101
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Monitoring & Administerng System & Network Security.pptx
Lecture 5&6 corporate architecture
Who will guard the guards
The Ultimate Defence - Think Like a Hacker

Peter wood – the ethical hacker

  • 1. PETER WOOD – THE ETHICAL HACKER 1
  • 2. The Ultimate Defence: Think Like a Hacker An Ethical Hacker’s View of Corporate Security Peter Wood Chief Executive Officer First•Base Technologies LLP
  • 3. Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base in 1989 (one of the first ethical hacking firms) CEO First Base Technologies LLP Social engineer & penetration tester Conference speaker and security ‘expert’ Member of ISACA Security Advisory Group Vice Chair of BCS Information Risk Management and Audit Group UK Chair, Corporate Executive Programme FBCS, CITP, CISSP, MIEEE, M.Inst.ISP Registered BCS Security Consultant Member of ACM, ISACA, ISSA, Mensa
  • 4. Thinking like a hacker • Hacking is a way of thinking A hacker is someone who thinks outside the box. It's someone who discards conventional wisdom, and does something else instead. It's someone who looks at the edge and wonders what's beyond. It's someone who sees a set of rules and wonders what happens if you don't follow them. [Bruce Schneier] • Hacking applies to all aspects of life - not just computers
  • 6. SNMP Simple Network Management Protocol • A protocol developed to manage nodes (servers, workstations, routers, switches and hubs etc.) on an IP network • Enables network administrators to manage network performance, find and solve network problems, and plan for network growth • SNMP v1 is the de facto network management protocol • SNMP v1 has been criticised for its poor security. Authentication is performed only by a ‘community string’, in effect a type of password, which is transmitted in clear text
  • 8. SNMP for hackers • If you know the read string (default public) you can read the entire MIB for that device • If you know the read-write string (default private) you may be able to change settings on that device • You may be able to ‘sniff’ community strings off the network if they’ve been changed from the defaults • You may be able to control a router or switch: – Intercept traffic and read sensitive information – ‘Crash’ the network repeatedly – Lock the device out, requiring physical access to reset it • You may be able to list users, groups, shares etc. on servers • You may be able to subvert wireless network security
  • 10. Windows architecture Domain logon Local users Domain users and groups Workstation Domain and groups Controller Global group in local group Lo Local users Workstation ca Domain Domain users and groups l lo and groups go Controller n Local users Local users and groups Workstation Member and groups Server Local users Member and groups Server
  • 11. List privileged accounts and look for service accounts
  • 12. Case study: Administrator passwords admin5 crystal finance Global firm worth £800million friday macadmin • 67 Administrator accounts monkey orange • 43 simple passwords (64%) password password1 prague • 15 were “password” (22%) pudding rocky4 • Some examples we found -> security security1 sparkle webadmin yellow
  • 13. Case study: password crack • 26,310 passwords from a Windows domain • 11,279 (42.9%) cracked in 2½ minutes • It’s not a challenge!
  • 15. If we can boot from CD or USB …
  • 16. We have some passwords!
  • 17. … or just read the disk
  • 19. Desktop & Laptop Security • Physical security on Windows desktops and laptops doesn’t exist • Native Windows security is ineffective if you have physical access • Everything is visible: e-mails, spreadsheets, documents, passwords • If it’s on your machine - it’s stolen! • Encryption is the best defence, coupled with lots of training!
  • 24. Impersonate a cleaner • No vetting • Out-of-hours access • Cleans the desks • Takes out large black sacks
  • 25. Data theft by keylogger
  • 26. Keyghost log file Keystrokes recorded so far is 2706 out of 107250 ... <PWR><CAD>fsmith<tab><tab>arabella xxxxxxx <tab><tab> None<tab><tab> None<tab><tab> None<tab><tab> <CAD> arabella <CAD> <CAD> arabella <CAD> <CAD> arabella exit tracert 192.168.137.240 telnet 192.168.137.240 cisco
  • 27. Need more information? Peter Wood Chief Executive Officer First•Base Technologies LLP peterw@firstbase.co.uk http://firstbase.co.uk http://white-hats.co.uk http://peterwood.com Blog: fpws.blogspot.com Twitter: @peterwoodx

Editor's Notes

  • #7: One of our clients (a major international bank) was attacked in a scenario which involved cleaners.