SlideShare a Scribd company logo
www.prismacsi.com
© All Rights Reserved.
11
Practical White Hat Hacker Training #1
Introduction
This document can be shared or used by quoted and used for commercial purposes, but can not be changed. Detailed
information is available at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.
www.prismacsi.com
© All Rights Reserved.
22
Introduction
www.prismacsi.com
© All Rights Reserved.
33
PRISMA : Overview
• Cyber security consultancy to over 100 companies in a period of over 5 years
• Over 300 penetration testing projects
• More than 50 training projects
• The organizers and founders of some of the most important teams and activities in the country
• Octosec
• Canyoupwnme
• Hacktrick Cyber Security Conference
• Game of Pwners CTF
• Hacker Camp
www.prismacsi.com
© All Rights Reserved.
44
• Penetration Testing Services
• Cyber Security Training
• Consultancy services
• Research and Development
• Cyber Army Infrastructure Systems
PRISMA : Activities
www.prismacsi.com
© All Rights Reserved.
55
• Network Penetration Test
• Web Application Penetration Test
• Mobile Application Penetration Test
• Banking Regulation and Supervision Agency (BRSA) Compliant Penetration Test
• Distributed Denial-of-Service (DDoS) Test
• Load and Stress Test
• Social EngineeringTest
• SCADA Penetration Test
• Red Team Penetration Test
• APT Attack Simulation
• Mail Gateway Security Test
• Physical Penetration Test
Penetration Tests
www.prismacsi.com
© All Rights Reserved.
66
• Practical White Hat Hacker Training
• Network Penetration Test Training
• Wireless Network Penetration Test Training
• Mobile Application Security Training
• Web Application Security Training
• Advanced Penetration Test Training
• DoS & DDoS Attacks and Protection Training
• Vulnerability Management Training
• Secure Software Development Training
• Linux System Hardening Training
• Basic Linux Training
Trainings
www.prismacsi.com
© All Rights Reserved.
77
• Source Code Analysis
• Product / Project Consultancy
• Vulnerability Management
• HR - Recruitment Processes Technical Competence Analysis
Consultancy
www.prismacsi.com
© All Rights Reserved.
88
Let’s get to know a little about each other…
Introduction
www.prismacsi.com
© All Rights Reserved.
99
Topics
www.prismacsi.com
© All Rights Reserved.
1010
Cyber Security
Basics
Appendix: Basic
Network
Information
Appendix: Basic
Linux Information
Passive Information
Collection
Active Information
Collection
Vulnerability
Discovery
Post Exploitation
Stage
Exploit Stage
Network Based
Attacks
Password Cracking
Attacks
Agenda
www.prismacsi.com
© All Rights Reserved.
1111
Web Application
Security
Wireless Network
Security
IPS / IDS / WAF Evasion
Techniques
Social
Engineering
Agenda
www.prismacsi.com
© All Rights Reserved.
1212
Cyber Security Basics
www.prismacsi.com
© All Rights Reserved.
1313
Information Security
There are 3 important criteria for information security;
• Confidentiality
• Integrity
• Availability
Availability
Confidentiality
Integrity
Security
Model
www.prismacsi.com
© All Rights Reserved.
1414
Confidentiality
• Information should only be accessible to the person or system that is allowed to access it.
• Information being able to be read, written and changed by persons other than the targeted
endangers this principle.
• Important events experienced in the past.
www.prismacsi.com
© All Rights Reserved.
1515
Integrity
• Consistent transmission of information from the source to the targeted point without any
change in its original form.
• Partial corruption or partial altering of the original information means that its integrity has been
compromised
• Important events experienced in the past.
www.prismacsi.com
© All Rights Reserved.
1616
Availibility
• Information should be accessible and available whenever it is required by an authorized person
or system.
• DoS , DDoS attacks endanger this principle.
• Important events experienced in the past.
www.prismacsi.com
© All Rights Reserved.
1717
The Hacking Concept
Hacking has more than one meaning;
• Use of systems / hardware / software in ways other than the originally intended
• Producing a solution for a problem can also be called hacking
• Software Piracy = Media language
www.prismacsi.com
© All Rights Reserved.
1818
Then who is a hacker?
• According to MIT a hacker is any person working on information systems.
• Computer Hacker
• General description: a person who performs hacks
• What’s a hack?
www.prismacsi.com
© All Rights Reserved.
1919
Concepts
• Penetration Test, Pentest
Attempt by hackers to infiltrate targeted systems using various tools and techniques, thereafter
reporting all identified vulnerabilities in detail.
• Pentester, Penetration Test expert
The person who implements/applies the concept of penetration testing and develops themsselves in
the field of cyber security. Keeps track of current techniques and researches carried out by hackers
hence stays up to date.
www.prismacsi.com
© All Rights Reserved.
2020
Concepts
• Hacker
• White Hat Hacker
• Black Hat Hacker
• Grey Hat Hacker
• Script Kiddie
• Cracker
www.prismacsi.com
© All Rights Reserved.
2121
General Information on Penetration Testing
• Areas
• Network Penetration Testing
• Web Application Penetration Testing
• Mobile Application Penetration Testing
• Critical Infrastructure Systems Penetration Testing
• DDoS and Load Tests
• Risk Analysis
• Vulnerability Scanning
www.prismacsi.com
© All Rights Reserved.
2222
Types of Penetration Tests
• Black Box
• Grey Box
• White Box
www.prismacsi.com
© All Rights Reserved.
2323
Penetration Tests
VULNERABILITY SCANNING
VS
PENETRATION TESTING
www.prismacsi.com
© All Rights Reserved.
2424
Cyber Killchain
Privilege Escalation Covering
Footprints
Exploitation
Vulnerability Discovery
Information
Gathering
www.prismacsi.com
© All Rights Reserved.
2525
Penetration Test Methodologies
• OWASP
• Web Security Tests
• Mobile Application Security Tests
• IoT Security Tests
• OSSTMM
• Open Source Security Testing Methodology Manual
• Pentest-Standard
www.prismacsi.com
© All Rights Reserved.
2626
Penetration Test Methodologies
• OWASP – Web Application Penetration Testing
www.prismacsi.com
© All Rights Reserved.
2727
Penetration Test Methodologies
• OSSTMM - http://www.isecom.org/mirror/OSSTMM.3.pdf
www.prismacsi.com
© All Rights Reserved.
2828
Penetration Test Report
• Tools Used
• Discovered devices
• Topology
• Vulnerabilities
• Exploitation methods
• Reachable endpoint
• Risks
• Defense methods
• Attack combinations
www.prismacsi.com
© All Rights Reserved.
2929
Career in Cyber Security
• Offensive
• Penetration Testing Expert
• Network Penetration Testing Expert
• Web Application Penetration Testing Expert
• Mobile Application Penetration Testing Expert
• Exploit Development
• Malware Development
www.prismacsi.com
© All Rights Reserved.
3030
Career in Cyber Security
• Defensive
• SOC – Security Operation Center – Analyst
• Forensics Expert
• System Security Expert
• Vulnerability Management Specialist
• Software Security Expert
• Malware Analyst
www.prismacsi.com
© All Rights Reserved.
3131
Certification Programs
• CEH – Certified Ethical Hacker
• TSE White Hat Hacker
• OSCP – Offensive Security Certified Professional
• OSCE – Offensive Security Certified Expert
• GWAPT – GIAC Web Application Penetration Tester
• GPEN – GIAC Penetration Tester
www.prismacsi.com
© All Rights Reserved.
3232
Types of Cyber Attacks by Country
• Turkey
• Russia
• America
• Germany
• China
www.prismacsi.com
© All Rights Reserved.
3333
Turkey
• Fraud attacks
• Using and writing of malware
• Social engineering attacks
www.prismacsi.com
© All Rights Reserved.
3434
Russia
• Writing and spreading of exploit kits
• Malware
• Banking attacks
• ATM attacks
www.prismacsi.com
© All Rights Reserved.
3535
Germany
• Exploit Kit / 0day development
• Malware
• Underground activities
• Hackers meeting point
• Chaos Computer Club
www.prismacsi.com
© All Rights Reserved.
3636
America
• Software development
• Technology development
• APT / 0day development
• Cyber war activities
• Case of Stuxnet
www.prismacsi.com
© All Rights Reserved.
3737
China
• Malicious software
• Automated software
• Nationalist hacker groups
• APT / 0day / Exploit development
• Cyber war activities
www.prismacsi.com
© All Rights Reserved.
3838
Chronology
2010
2018
China's largest search engine Baidu
hacked.
2010
DDoS attack affects internet access.
2013
Russia halts Internet access in Estonia
2007
Morris Worm goes online
1998
1998
After the attacks in Gaza, Israel suffered cyber
attacks, 5 million websites were hacked.
2009
Stuxnet is out in the wild.
2010
Wannacry paralyzes life all over the world.
2017
www.prismacsi.com
© All Rights Reserved.
3939
News
https://securityintelligence.com/are-ransomware-attacks-rising-or-falling/
www.prismacsi.com
© All Rights Reserved.
4040
Cyber Attacker Profile
• Hacker
• Target-oriented cyber attack
• Government / State-backed cyber attack
• Religion / Racial sympathy
• Ego satisfaction
• Competitors and unfair competition oriented attacks
• Cyberterrorism
www.prismacsi.com
© All Rights Reserved.
4141
Cyber Attacker Profile
• Untrained staff (risk of involuntary attacks)
• A fired person X
• Insider
www.prismacsi.com
© All Rights Reserved.
4242
Cyber Attacker Profile
• Malware attacks
• If it is target based an APT may be the most likely attacker.
• Any malware can affect your systems in some way.
• These malware can include a system into a botnet.
www.prismacsi.com
© All Rights Reserved.
4343
Cyber Attack Losses
• In the past only prestige was lost.
• Changing the interface of pages (Defacement)
• Today financial loss is the most common form of loss.
• After Denial-of-Service attacks companies may experience a service outage or interruption.
www.prismacsi.com
© All Rights Reserved.
4444
Some Cyber Security Defense Mechanisms
• Security Firewalls
• Antivirus
• SSL
• Intrusion Detection System (IDS)
• Intrusion Prevention Systems (IPS)
• Security Information and Event Management (SIEM)
• Content Filter
www.prismacsi.com
© All Rights Reserved.
4545
Some Cyber Security Defense Mechanisms
• Web Application Firewall (WAF)
• Data Leakage Prevention (DLP)
• Advanced Cyber Threat Detection (APT Protection)
• Deep Packet Inspection (DPI)
• Security Operations Center (SOC)
www.prismacsi.com
© All Rights Reserved.
4646
Basic Terminologies
• Cryptology.
• Password science.
• Steganography
• Science of hiding data in plain sight.
• Encoding
• The process of converting data into a different format..
• Base64
www.prismacsi.com
© All Rights Reserved.
4747
Terminology
• Hash
• It is data converted into a unique form.
• Data length is fixed. (MD5 32 character)
• MD5
• SHA512
• Hash Cracking Attacks
• Unidirectional
• Wordlist
• Rainbow Table
www.prismacsi.com
© All Rights Reserved.
4848
Basic Terminologies
• Base64 - Encoding
• PRISMA -> UFJJU01B
• PRISMACSI -> UFJJU01BQ1NJ
• UFJJU01B -> PRISMA
• UFJJU01BQ1NJ –> PRISMACSI
• MD5
• PRISMA -> c636499e580a2d1c4d96af7aacb67ec3
• PRISMACSI -> be92422ae4a6ebba10d743a6213b9793
www.prismacsi.com
© All Rights Reserved.
4949
Anonymity
Why the need?
• They want to hide their personal data.
• They want to hide their identity.
• They want to hide site preferences.
• They have adopted the concept of free internet.
www.prismacsi.com
© All Rights Reserved.
5050
Anonymity
Communication
• Whatsapp
• Telegram
• Signal
• IRC
• Jabber
www.prismacsi.com
© All Rights Reserved.
5151
Anonymity
Deep Web
• Underground
• Deepweb
• Darkweb
Area where hackers share information.
www.prismacsi.com
© All Rights Reserved.
5252
Anonymity
Deep Web
• Chaos Network
• DN42
• Freenet
• Anonet
• Tor
www.prismacsi.com
© All Rights Reserved.
5353
Demo
Practice
www.prismacsi.com
© All Rights Reserved.
5454
Questions
?
www.prismacsi.com
© All Rights Reserved.
5555
www.prismacsi.com
info@prismacsi.com
0 850 303 85 35
/prismacsi
Contacts

More Related Content

PDF
Practical White Hat Hacker Training - Post Exploitation
PDF
Practical White Hat Hacker Training - Vulnerability Detection
PDF
Practical White Hat Hacker Training - Exploitation
PDF
Practical White Hat Hacker Training - Active Information Gathering
PDF
CSW2017 Geshev+Miller logic bug hunting in chrome on android
PDF
Web security for developers
PDF
CSW2017 chuanda ding_state of windows application security
PDF
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
Practical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Exploitation
Practical White Hat Hacker Training - Active Information Gathering
CSW2017 Geshev+Miller logic bug hunting in chrome on android
Web security for developers
CSW2017 chuanda ding_state of windows application security
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...

What's hot (20)

PDF
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
PDF
CMS Hacking Tricks - DerbyCon 4 - 2014
PDF
No Easy Breach DerbyCon 2016
PDF
Csw2016 chaykin having_funwithsecuremessengers_and_androidwear
PDF
Infosecurity.be 2019: What are relevant open source security tools you should...
PDF
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
PDF
Wi-Fi Hotspot Attacks
PDF
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
PDF
Introduction to red team operations
PDF
Attacker's Perspective of Active Directory
PPTX
External to DA, the OS X Way
PDF
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
PDF
Shamoon
PPT
Nomura UCCSC 2009
PPTX
Lateral Movement - Phreaknik 2016
PDF
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
PDF
Anatomy of a Cloud Hack
PDF
Coporate Espionage
PDF
Sigma and YARA Rules
PPTX
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CMS Hacking Tricks - DerbyCon 4 - 2014
No Easy Breach DerbyCon 2016
Csw2016 chaykin having_funwithsecuremessengers_and_androidwear
Infosecurity.be 2019: What are relevant open source security tools you should...
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
Wi-Fi Hotspot Attacks
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introduction to red team operations
Attacker's Perspective of Active Directory
External to DA, the OS X Way
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Shamoon
Nomura UCCSC 2009
Lateral Movement - Phreaknik 2016
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
Anatomy of a Cloud Hack
Coporate Espionage
Sigma and YARA Rules
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams

Similar to Practical White Hat Hacker Training - Introduction to Cyber Security (20)

PPT
Hackers Cracker Network Intruder
PPTX
Hacking and Penetration Testing - a beginners guide
PPT
How to become Hackers .
PPT
Hacking Presentation
PPT
Introduction to hackers
PDF
Real life hacking101
PPT
PPTX
Inetsecurity.in Ethical Hacking presentation
PDF
Bar Camp 11 Oct09 Hacking
PPT
Ethi mini1 - ethical hacking
PPT
001.itsecurity bcp v1
PPT
PPT
Hackers
PPT
Hackers
PPT
Unit-2 ICS.ppt
PPT
ETHICAL HACKING
PPTX
It security the condensed version
PPTX
CyberSecurity and Importance of cybersecurity
PPTX
Cyber crime &_info_security
PPTX
Ethical hacking
Hackers Cracker Network Intruder
Hacking and Penetration Testing - a beginners guide
How to become Hackers .
Hacking Presentation
Introduction to hackers
Real life hacking101
Inetsecurity.in Ethical Hacking presentation
Bar Camp 11 Oct09 Hacking
Ethi mini1 - ethical hacking
001.itsecurity bcp v1
Hackers
Hackers
Unit-2 ICS.ppt
ETHICAL HACKING
It security the condensed version
CyberSecurity and Importance of cybersecurity
Cyber crime &_info_security
Ethical hacking

More from PRISMA CSI (12)

PDF
Sysmon ile Log Toplama
PDF
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
PDF
Beyaz Şapkalı Hacker CEH Eğitimi - Parola Kırma Saldırıları
PDF
Sızma Testi Metodolojileri
PDF
Sızma (Penetrasyon) Testi Nedir?
PDF
Beyaz Şapkalı Hacker CEH Eğitimi - Post Exploit Aşaması
PDF
Beyaz Şapkalı Hacker CEH Eğitimi - Zafiyet Keşfi
PDF
Beyaz Şapkalı Hacker CEH Eğitimi - Exploit Aşaması
PDF
Beyaz Şapkalı Hacker CEH Eğitimi - Aktif Bilgi Toplama
PDF
Beyaz Şapkalı Hacker CEH Eğitimi - Siber Güvenlik Temelleri
PDF
Beyaz Şapkalı Hacker CEH Eğitimi - Pasif Bilgi Toplama (OSINT)
PDF
Kaynak Kod Analiz Süreci
Sysmon ile Log Toplama
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Beyaz Şapkalı Hacker CEH Eğitimi - Parola Kırma Saldırıları
Sızma Testi Metodolojileri
Sızma (Penetrasyon) Testi Nedir?
Beyaz Şapkalı Hacker CEH Eğitimi - Post Exploit Aşaması
Beyaz Şapkalı Hacker CEH Eğitimi - Zafiyet Keşfi
Beyaz Şapkalı Hacker CEH Eğitimi - Exploit Aşaması
Beyaz Şapkalı Hacker CEH Eğitimi - Aktif Bilgi Toplama
Beyaz Şapkalı Hacker CEH Eğitimi - Siber Güvenlik Temelleri
Beyaz Şapkalı Hacker CEH Eğitimi - Pasif Bilgi Toplama (OSINT)
Kaynak Kod Analiz Süreci

Recently uploaded (20)

PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Pre independence Education in Inndia.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Computing-Curriculum for Schools in Ghana
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Pharma ospi slides which help in ospi learning
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Cell Structure & Organelles in detailed.
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Lesson notes of climatology university.
PPTX
Institutional Correction lecture only . . .
PDF
01-Introduction-to-Information-Management.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pre independence Education in Inndia.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
VCE English Exam - Section C Student Revision Booklet
Computing-Curriculum for Schools in Ghana
Supply Chain Operations Speaking Notes -ICLT Program
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Cell Types and Its function , kingdom of life
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
Final Presentation General Medicine 03-08-2024.pptx
Pharma ospi slides which help in ospi learning
Module 4: Burden of Disease Tutorial Slides S2 2025
Cell Structure & Organelles in detailed.
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Lesson notes of climatology university.
Institutional Correction lecture only . . .
01-Introduction-to-Information-Management.pdf
Anesthesia in Laparoscopic Surgery in India

Practical White Hat Hacker Training - Introduction to Cyber Security

  • 1. www.prismacsi.com © All Rights Reserved. 11 Practical White Hat Hacker Training #1 Introduction This document can be shared or used by quoted and used for commercial purposes, but can not be changed. Detailed information is available at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.
  • 2. www.prismacsi.com © All Rights Reserved. 22 Introduction
  • 3. www.prismacsi.com © All Rights Reserved. 33 PRISMA : Overview • Cyber security consultancy to over 100 companies in a period of over 5 years • Over 300 penetration testing projects • More than 50 training projects • The organizers and founders of some of the most important teams and activities in the country • Octosec • Canyoupwnme • Hacktrick Cyber Security Conference • Game of Pwners CTF • Hacker Camp
  • 4. www.prismacsi.com © All Rights Reserved. 44 • Penetration Testing Services • Cyber Security Training • Consultancy services • Research and Development • Cyber Army Infrastructure Systems PRISMA : Activities
  • 5. www.prismacsi.com © All Rights Reserved. 55 • Network Penetration Test • Web Application Penetration Test • Mobile Application Penetration Test • Banking Regulation and Supervision Agency (BRSA) Compliant Penetration Test • Distributed Denial-of-Service (DDoS) Test • Load and Stress Test • Social EngineeringTest • SCADA Penetration Test • Red Team Penetration Test • APT Attack Simulation • Mail Gateway Security Test • Physical Penetration Test Penetration Tests
  • 6. www.prismacsi.com © All Rights Reserved. 66 • Practical White Hat Hacker Training • Network Penetration Test Training • Wireless Network Penetration Test Training • Mobile Application Security Training • Web Application Security Training • Advanced Penetration Test Training • DoS & DDoS Attacks and Protection Training • Vulnerability Management Training • Secure Software Development Training • Linux System Hardening Training • Basic Linux Training Trainings
  • 7. www.prismacsi.com © All Rights Reserved. 77 • Source Code Analysis • Product / Project Consultancy • Vulnerability Management • HR - Recruitment Processes Technical Competence Analysis Consultancy
  • 8. www.prismacsi.com © All Rights Reserved. 88 Let’s get to know a little about each other… Introduction
  • 9. www.prismacsi.com © All Rights Reserved. 99 Topics
  • 10. www.prismacsi.com © All Rights Reserved. 1010 Cyber Security Basics Appendix: Basic Network Information Appendix: Basic Linux Information Passive Information Collection Active Information Collection Vulnerability Discovery Post Exploitation Stage Exploit Stage Network Based Attacks Password Cracking Attacks Agenda
  • 11. www.prismacsi.com © All Rights Reserved. 1111 Web Application Security Wireless Network Security IPS / IDS / WAF Evasion Techniques Social Engineering Agenda
  • 12. www.prismacsi.com © All Rights Reserved. 1212 Cyber Security Basics
  • 13. www.prismacsi.com © All Rights Reserved. 1313 Information Security There are 3 important criteria for information security; • Confidentiality • Integrity • Availability Availability Confidentiality Integrity Security Model
  • 14. www.prismacsi.com © All Rights Reserved. 1414 Confidentiality • Information should only be accessible to the person or system that is allowed to access it. • Information being able to be read, written and changed by persons other than the targeted endangers this principle. • Important events experienced in the past.
  • 15. www.prismacsi.com © All Rights Reserved. 1515 Integrity • Consistent transmission of information from the source to the targeted point without any change in its original form. • Partial corruption or partial altering of the original information means that its integrity has been compromised • Important events experienced in the past.
  • 16. www.prismacsi.com © All Rights Reserved. 1616 Availibility • Information should be accessible and available whenever it is required by an authorized person or system. • DoS , DDoS attacks endanger this principle. • Important events experienced in the past.
  • 17. www.prismacsi.com © All Rights Reserved. 1717 The Hacking Concept Hacking has more than one meaning; • Use of systems / hardware / software in ways other than the originally intended • Producing a solution for a problem can also be called hacking • Software Piracy = Media language
  • 18. www.prismacsi.com © All Rights Reserved. 1818 Then who is a hacker? • According to MIT a hacker is any person working on information systems. • Computer Hacker • General description: a person who performs hacks • What’s a hack?
  • 19. www.prismacsi.com © All Rights Reserved. 1919 Concepts • Penetration Test, Pentest Attempt by hackers to infiltrate targeted systems using various tools and techniques, thereafter reporting all identified vulnerabilities in detail. • Pentester, Penetration Test expert The person who implements/applies the concept of penetration testing and develops themsselves in the field of cyber security. Keeps track of current techniques and researches carried out by hackers hence stays up to date.
  • 20. www.prismacsi.com © All Rights Reserved. 2020 Concepts • Hacker • White Hat Hacker • Black Hat Hacker • Grey Hat Hacker • Script Kiddie • Cracker
  • 21. www.prismacsi.com © All Rights Reserved. 2121 General Information on Penetration Testing • Areas • Network Penetration Testing • Web Application Penetration Testing • Mobile Application Penetration Testing • Critical Infrastructure Systems Penetration Testing • DDoS and Load Tests • Risk Analysis • Vulnerability Scanning
  • 22. www.prismacsi.com © All Rights Reserved. 2222 Types of Penetration Tests • Black Box • Grey Box • White Box
  • 23. www.prismacsi.com © All Rights Reserved. 2323 Penetration Tests VULNERABILITY SCANNING VS PENETRATION TESTING
  • 24. www.prismacsi.com © All Rights Reserved. 2424 Cyber Killchain Privilege Escalation Covering Footprints Exploitation Vulnerability Discovery Information Gathering
  • 25. www.prismacsi.com © All Rights Reserved. 2525 Penetration Test Methodologies • OWASP • Web Security Tests • Mobile Application Security Tests • IoT Security Tests • OSSTMM • Open Source Security Testing Methodology Manual • Pentest-Standard
  • 26. www.prismacsi.com © All Rights Reserved. 2626 Penetration Test Methodologies • OWASP – Web Application Penetration Testing
  • 27. www.prismacsi.com © All Rights Reserved. 2727 Penetration Test Methodologies • OSSTMM - http://www.isecom.org/mirror/OSSTMM.3.pdf
  • 28. www.prismacsi.com © All Rights Reserved. 2828 Penetration Test Report • Tools Used • Discovered devices • Topology • Vulnerabilities • Exploitation methods • Reachable endpoint • Risks • Defense methods • Attack combinations
  • 29. www.prismacsi.com © All Rights Reserved. 2929 Career in Cyber Security • Offensive • Penetration Testing Expert • Network Penetration Testing Expert • Web Application Penetration Testing Expert • Mobile Application Penetration Testing Expert • Exploit Development • Malware Development
  • 30. www.prismacsi.com © All Rights Reserved. 3030 Career in Cyber Security • Defensive • SOC – Security Operation Center – Analyst • Forensics Expert • System Security Expert • Vulnerability Management Specialist • Software Security Expert • Malware Analyst
  • 31. www.prismacsi.com © All Rights Reserved. 3131 Certification Programs • CEH – Certified Ethical Hacker • TSE White Hat Hacker • OSCP – Offensive Security Certified Professional • OSCE – Offensive Security Certified Expert • GWAPT – GIAC Web Application Penetration Tester • GPEN – GIAC Penetration Tester
  • 32. www.prismacsi.com © All Rights Reserved. 3232 Types of Cyber Attacks by Country • Turkey • Russia • America • Germany • China
  • 33. www.prismacsi.com © All Rights Reserved. 3333 Turkey • Fraud attacks • Using and writing of malware • Social engineering attacks
  • 34. www.prismacsi.com © All Rights Reserved. 3434 Russia • Writing and spreading of exploit kits • Malware • Banking attacks • ATM attacks
  • 35. www.prismacsi.com © All Rights Reserved. 3535 Germany • Exploit Kit / 0day development • Malware • Underground activities • Hackers meeting point • Chaos Computer Club
  • 36. www.prismacsi.com © All Rights Reserved. 3636 America • Software development • Technology development • APT / 0day development • Cyber war activities • Case of Stuxnet
  • 37. www.prismacsi.com © All Rights Reserved. 3737 China • Malicious software • Automated software • Nationalist hacker groups • APT / 0day / Exploit development • Cyber war activities
  • 38. www.prismacsi.com © All Rights Reserved. 3838 Chronology 2010 2018 China's largest search engine Baidu hacked. 2010 DDoS attack affects internet access. 2013 Russia halts Internet access in Estonia 2007 Morris Worm goes online 1998 1998 After the attacks in Gaza, Israel suffered cyber attacks, 5 million websites were hacked. 2009 Stuxnet is out in the wild. 2010 Wannacry paralyzes life all over the world. 2017
  • 39. www.prismacsi.com © All Rights Reserved. 3939 News https://securityintelligence.com/are-ransomware-attacks-rising-or-falling/
  • 40. www.prismacsi.com © All Rights Reserved. 4040 Cyber Attacker Profile • Hacker • Target-oriented cyber attack • Government / State-backed cyber attack • Religion / Racial sympathy • Ego satisfaction • Competitors and unfair competition oriented attacks • Cyberterrorism
  • 41. www.prismacsi.com © All Rights Reserved. 4141 Cyber Attacker Profile • Untrained staff (risk of involuntary attacks) • A fired person X • Insider
  • 42. www.prismacsi.com © All Rights Reserved. 4242 Cyber Attacker Profile • Malware attacks • If it is target based an APT may be the most likely attacker. • Any malware can affect your systems in some way. • These malware can include a system into a botnet.
  • 43. www.prismacsi.com © All Rights Reserved. 4343 Cyber Attack Losses • In the past only prestige was lost. • Changing the interface of pages (Defacement) • Today financial loss is the most common form of loss. • After Denial-of-Service attacks companies may experience a service outage or interruption.
  • 44. www.prismacsi.com © All Rights Reserved. 4444 Some Cyber Security Defense Mechanisms • Security Firewalls • Antivirus • SSL • Intrusion Detection System (IDS) • Intrusion Prevention Systems (IPS) • Security Information and Event Management (SIEM) • Content Filter
  • 45. www.prismacsi.com © All Rights Reserved. 4545 Some Cyber Security Defense Mechanisms • Web Application Firewall (WAF) • Data Leakage Prevention (DLP) • Advanced Cyber Threat Detection (APT Protection) • Deep Packet Inspection (DPI) • Security Operations Center (SOC)
  • 46. www.prismacsi.com © All Rights Reserved. 4646 Basic Terminologies • Cryptology. • Password science. • Steganography • Science of hiding data in plain sight. • Encoding • The process of converting data into a different format.. • Base64
  • 47. www.prismacsi.com © All Rights Reserved. 4747 Terminology • Hash • It is data converted into a unique form. • Data length is fixed. (MD5 32 character) • MD5 • SHA512 • Hash Cracking Attacks • Unidirectional • Wordlist • Rainbow Table
  • 48. www.prismacsi.com © All Rights Reserved. 4848 Basic Terminologies • Base64 - Encoding • PRISMA -> UFJJU01B • PRISMACSI -> UFJJU01BQ1NJ • UFJJU01B -> PRISMA • UFJJU01BQ1NJ –> PRISMACSI • MD5 • PRISMA -> c636499e580a2d1c4d96af7aacb67ec3 • PRISMACSI -> be92422ae4a6ebba10d743a6213b9793
  • 49. www.prismacsi.com © All Rights Reserved. 4949 Anonymity Why the need? • They want to hide their personal data. • They want to hide their identity. • They want to hide site preferences. • They have adopted the concept of free internet.
  • 50. www.prismacsi.com © All Rights Reserved. 5050 Anonymity Communication • Whatsapp • Telegram • Signal • IRC • Jabber
  • 51. www.prismacsi.com © All Rights Reserved. 5151 Anonymity Deep Web • Underground • Deepweb • Darkweb Area where hackers share information.
  • 52. www.prismacsi.com © All Rights Reserved. 5252 Anonymity Deep Web • Chaos Network • DN42 • Freenet • Anonet • Tor
  • 53. www.prismacsi.com © All Rights Reserved. 5353 Demo Practice
  • 54. www.prismacsi.com © All Rights Reserved. 5454 Questions ?
  • 55. www.prismacsi.com © All Rights Reserved. 5555 www.prismacsi.com info@prismacsi.com 0 850 303 85 35 /prismacsi Contacts