SlideShare a Scribd company logo
Enviar pesquisa
Carregar
Entrar
Cadastre-se
Hacking3e ppt ch09
Denunciar
Skillspire LLC
Seguir
17 de Sep de 2021
•
0 gostou
•
68 visualizações
1
de
39
Hacking3e ppt ch09
17 de Sep de 2021
•
0 gostou
•
68 visualizações
Denunciar
Educação
cybersecurity
Skillspire LLC
Seguir
Recomendados
MIS: Information Security Management
Jonathan Coleman
2.9K visualizações
•
33 slides
Information Assurance And Security - Chapter 1 - Lesson 2
MLG College of Learning, Inc
1.6K visualizações
•
16 slides
Information Assurance And Security - Chapter 2 - Lesson 1
MLG College of Learning, Inc
582 visualizações
•
8 slides
Information Assurance And Security - Chapter 2 - Lesson 2
MLG College of Learning, Inc
649 visualizações
•
26 slides
Information security governance
Koen Maris
3.1K visualizações
•
17 slides
information security management
Gurpreetkaur838
412 visualizações
•
55 slides
Mais conteúdo relacionado
Mais procurados
Whitman_Ch02.pptx
Siphamandla9
153 visualizações
•
64 slides
Board and Cyber Security
Leon Fouche
1.3K visualizações
•
12 slides
Information Assurance And Security - Chapter 1 - Lesson 1
MLG College of Learning, Inc
1.9K visualizações
•
20 slides
Information security for dummies
Ivo Depoorter
11.7K visualizações
•
22 slides
Cybersecurity Priorities and Roadmap: Recommendations to DHS
John Gilligan
722 visualizações
•
15 slides
What is Enterprise Security Architecture (ESA)?
John Gardner, CMC
287 visualizações
•
5 slides
Mais procurados
(20)
Whitman_Ch02.pptx
Siphamandla9
•
153 visualizações
Board and Cyber Security
Leon Fouche
•
1.3K visualizações
Information Assurance And Security - Chapter 1 - Lesson 1
MLG College of Learning, Inc
•
1.9K visualizações
Information security for dummies
Ivo Depoorter
•
11.7K visualizações
Cybersecurity Priorities and Roadmap: Recommendations to DHS
John Gilligan
•
722 visualizações
What is Enterprise Security Architecture (ESA)?
John Gardner, CMC
•
287 visualizações
Protect your Database with Data Masking & Enforced Version Control
DBmaestro - Database DevOps
•
2.2K visualizações
Security & Compliance
Amazon Web Services
•
1.4K visualizações
Disarm vanguards 2022-02-25 (3)
SaraJayneTerp
•
368 visualizações
Security and control in mis
Gurjit
•
32.9K visualizações
Data security in the cloud
IBM Security
•
5.3K visualizações
Information Security Awareness
SnapComms
•
4.3K visualizações
Cyber Security - awareness, vulnerabilities and solutions
inLabFIB
•
3.5K visualizações
Information security
Jin Castor
•
133 visualizações
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
•
1.1K visualizações
Information Security Lecture #1 ppt
vasanthimuniasamy
•
55.6K visualizações
Information Security Awareness for everyone
Yasir Nafees
•
265 visualizações
Raising information security awareness
Terranovatraining
•
4.8K visualizações
Cyber Security PPT
ashish kumar
•
815 visualizações
Information security management system
Arani Srinivasan
•
13.5K visualizações
Similar a Hacking3e ppt ch09
Web Application Scanning 101
Sasha Nunke
2.8K visualizações
•
24 slides
4.Xss
phanleson
1.2K visualizações
•
45 slides
Web Application Security
Chris Hillman
965 visualizações
•
27 slides
Module 11 (hacking web servers)
Wail Hassan
148 visualizações
•
54 slides
Why You Need A Web Application Firewall
Port80 Software
2.3K visualizações
•
41 slides
Web and Mobile Application Security
Prateek Jain
788 visualizações
•
62 slides
Similar a Hacking3e ppt ch09
(20)
Web Application Scanning 101
Sasha Nunke
•
2.8K visualizações
4.Xss
phanleson
•
1.2K visualizações
Web Application Security
Chris Hillman
•
965 visualizações
Module 11 (hacking web servers)
Wail Hassan
•
148 visualizações
Why You Need A Web Application Firewall
Port80 Software
•
2.3K visualizações
Web and Mobile Application Security
Prateek Jain
•
788 visualizações
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
Quek Lilian
•
512 visualizações
Web Application Hacking 2004
Mike Spaulding
•
2.9K visualizações
Module 12 (web application vulnerabilities)
Wail Hassan
•
105 visualizações
Web Application Vulnerabilities
Preetish Panda
•
1.9K visualizações
Securing the Web @RivieraDev2016
Sumanth Damarla
•
286 visualizações
Best Practices to Mitigate from the Emerging Vectors of Network Attack
Amazon Web Services
•
3.5K visualizações
Ceh v5 module 12 web application vulnerabilities
Vi Tính Hoàng Nam
•
1.5K visualizações
Jan 2008 Allup
llangit
•
730 visualizações
Web Application Security: The Land that Information Security Forgot
Jeremiah Grossman
•
2.6K visualizações
Rich Web App Security - Keeping your application safe
Jeremiah Grossman
•
8.1K visualizações
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
IBM Security
•
1.1K visualizações
IRJET- Survey on Web Application Vulnerabilities
IRJET Journal
•
7 visualizações
Top Ten Web Hacking Techniques – 2008
Jeremiah Grossman
•
1.2K visualizações
Hacking3e ppt ch11
Skillspire LLC
•
35 visualizações
Mais de Skillspire LLC
Logistics
Skillspire LLC
208 visualizações
•
5 slides
Introduction to analytics
Skillspire LLC
251 visualizações
•
20 slides
Lecture 31
Skillspire LLC
79 visualizações
•
6 slides
Lecture 30
Skillspire LLC
91 visualizações
•
38 slides
Lecture 29
Skillspire LLC
96 visualizações
•
21 slides
Review
Skillspire LLC
65 visualizações
•
19 slides
Mais de Skillspire LLC
(20)
Logistics
Skillspire LLC
•
208 visualizações
Introduction to analytics
Skillspire LLC
•
251 visualizações
Lecture 31
Skillspire LLC
•
79 visualizações
Lecture 30
Skillspire LLC
•
91 visualizações
Lecture 29
Skillspire LLC
•
96 visualizações
Review
Skillspire LLC
•
65 visualizações
Review version 4
Skillspire LLC
•
64 visualizações
Review version 3
Skillspire LLC
•
65 visualizações
Review version 2
Skillspire LLC
•
62 visualizações
Lecture 25
Skillspire LLC
•
68 visualizações
Lecture 24
Skillspire LLC
•
70 visualizações
Lecture 23 p1
Skillspire LLC
•
76 visualizações
Lecture 21
Skillspire LLC
•
64 visualizações
Lecture 17
Skillspire LLC
•
66 visualizações
Lecture 16
Skillspire LLC
•
53 visualizações
Lecture 15
Skillspire LLC
•
50 visualizações
Lecture 14
Skillspire LLC
•
5 visualizações
Lecture 14
Skillspire LLC
•
21 visualizações
Lecture 13
Skillspire LLC
•
71 visualizações
Lecture 12
Skillspire LLC
•
74 visualizações
Último
Song-Based Lesson Plan: B2 First (FCE) Exam Prep with English Lyrics
Marcia Bonfim
45 visualizações
•
4 slides
UNIT 2 - The Age of Revolutions (PPT).pdf
JaimeAlonsoEdu
36 visualizações
•
66 slides
Imagenes Hotel Sheraton.pdf
Gonella
169 visualizações
•
11 slides
Referencing and Its Styles And Citation.pptx
Teerthanker Mahaveer University, Moradabad
291 visualizações
•
15 slides
कर्ण रोग.pptx
Heman Nagar
48 visualizações
•
88 slides
These Teachers... 'Why Like That One' (English & Chinese).pdf
OH TEIK BIN
115 visualizações
•
10 slides
Último
(20)
Song-Based Lesson Plan: B2 First (FCE) Exam Prep with English Lyrics
Marcia Bonfim
•
45 visualizações
UNIT 2 - The Age of Revolutions (PPT).pdf
JaimeAlonsoEdu
•
36 visualizações
Imagenes Hotel Sheraton.pdf
Gonella
•
169 visualizações
Referencing and Its Styles And Citation.pptx
Teerthanker Mahaveer University, Moradabad
•
291 visualizações
कर्ण रोग.pptx
Heman Nagar
•
48 visualizações
These Teachers... 'Why Like That One' (English & Chinese).pdf
OH TEIK BIN
•
115 visualizações
unit 2 Properties of Matter.ppt
EloisaCayago1
•
191 visualizações
Telehealth.org FINAL DECK 2023 McMenamin & Maheu - Powerpoint Slides - Therap...
Marlene Maheu
•
181 visualizações
Open Source.pdf
YashiGupta410690
•
243 visualizações
DATA-LINK LAYER.ppt
DrTThendralCompSci
•
179 visualizações
CMC Neuroimaging Case Studies - Cerebral Venous Sinus Thrombosis
Sean M. Fox
•
247 visualizações
STAFFING & SCHEDULING.pptx
PRADEEP ABOTHU
•
31 visualizações
Unit2-Tech & EFL teachers.pptx
NhtUyn23
•
264 visualizações
Biases Activity
Corinne Weisgerber
•
69 visualizações
ff.pptx
AmanMalviya14
•
53 visualizações
The Parts of The SpeechPP.pdf
NetziValdelomar1
•
68 visualizações
Personal Brand Exploration Keynote Jamie Johnson
JamieJohnson253007
•
48 visualizações
Peer review in scholarly journals
Academy of Science of South Africa
•
128 visualizações
Ethical hacking - Footprinting.pptx
Nargis Parveen
•
72 visualizações
[English version] Fintech Edu Brochures - 20232024 (1080 × 1080 px).pdf
ChristinaFortunova
•
62 visualizações
Hacking3e ppt ch09
1.
© 2020 Jones
and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Hacker Techniques, Tools, and Incident Handling Chapter 9 Web and Database Attacks
2.
Page 2 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Learning Objective Perform system hacking, and web and database attacks.
3.
Page 3 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Key Concepts Web server vulnerabilities, tools, and exploits Web application vulnerabilities, tools, and exploits Database attacks and attack tools
4.
Page 4 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Attacking Web Servers Classes of individuals interacting or concerned with web server • Server administrator • Network administrator • End user
5.
Page 5 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Attacking Web Servers (Cont.) Categories of risk • Defects and misconfiguration risks • Browser- and network-based risks • Browser or client-side risks Vulnerabilities of web servers Improper or poor web design • Can sometimes observe sensitive items by viewing the source code of the page
6.
Page 6 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Source Code Example 1
7.
Page 7 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Source Code Example 2 Web designer used hidden fields to hold the price of an item Unscrupulous attackers could change the price of the item from $6000 to $60 and make their own discount
8.
Page 8 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Web Server Vulnerabilities Buffer overflow Denial of service (DoS) attack Distributed denial of service (DDoS) attack Banner information Permissions Error messages Unnecessary features User accounts Structured Query Language (SQL) injections
9.
Page 9 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Buffer Overflow Buffer overflow occurs when an application, process, or program attempts to put more data in a buffer than it was designed to hold A programmer, either through lazy coding or other practices, creates a buffer in code but does not put restrictions on it Like too much water poured into an ice cube tray, the data must go someplace, which in this case means adjacent buffers Can result in corrupted or overwritten data, loss of system integrity, or the disclosure of information to unauthorized parties
10.
Page 10 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Denial of Service (DoS)/DDoS Attacks DoS • An attack in which all web server resources are rapidly consumed, slowing the performance of a server • Is mostly considered an annoyance DDoS • Accomplishes the same goal as DoS; the difference is scale • Many more systems are used to attack a target, crushing it under the weight of multiple requests at once
11.
Page 11 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Examples of DDoS Attacks Ping flooding attack Smurf attack SYN flooding Internet Protocol (IP) fragmentation/fragmentation attack
12.
Page 12 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Banner Information A banner reveals information about a web server Connect to port 80 (HTTP) on a web server to receive web server’s banner; for example: telnet www.<servername>.com 80 Results:
13.
Page 13 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Permissions Permissions: • Control access to a server and its content • Can easily be incorrectly configured Incorrectly assigned permissions: • Have potential to allow access to locations on web server that should not be accessible • Older web servers allowed access to directory traversal by default • An attacker could enter a path, such as “../../../etc/somefile”, and access files in other directories
14.
Page 14 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Error Messages Error messages can be a potential vulnerability and give vital information to an attacker Internet Information Services (IIS) messages:
15.
Page 15 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Unnecessary Features Servers should be purpose-built to the role they will fill in the organization Anything not essential to this role should be eliminated Hardening removes features, services, and applications that are not necessary for a system to do its appointed job If a feature or service is not needed, it should be disabled or, better yet, uninstalled
16.
Page 16 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. User Accounts Most operating systems come preconfigured with user accounts and groups already defined and in place These accounts can easily be discovered through research by an attacker • Uses accounts to gain access to the system Security best practices • Disable or remove default accounts • Create new ones that correspond to how an administrator will use the service
17.
Page 17 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Structured Query Language (SQL) Injections Designed to exploit “holes” in a web application Attacker injects SQL code into input box, form, or network packet SWL commands can exploit nonvalidated input vulnerabilities Used to execute arbitrary SQL commons through web applications
18.
Page 18 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Examining a SQL Injection If a website lacks input validation, only a web browser and SQL knowledge are needed to launch an attack SQL injection attack: • Is a common and serious issue with websites that use a database as its back end • Is carried out by placing special characters into existing SQL commands and modifying behavior to achieve desired result
19.
Page 19 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Examining a SQL Injection (Cont.) In the following example, after an attacker with the username “kirk” inputs the string ‘name’; DELETE FROM items;-- ‘ for itemname, the query becomes the following two queries: SELECT * FROM items WHERE owner= ‘kirk’ AND itemname= ‘name’; DELETE FROM items;--‘
20.
Page 20 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Examining a SQL Injection (Cont.) If an attacker enters the string ‘name’; DELETE FROM items; SELECT * FROM items WHERE ‘a’=’a’;, the following valid statements will be created: SELECT FROM items WHERE owner=’kirk’ AND itemname= ‘name’; DELETE FROM items; SELECT * FROM items WHERE ‘a’= ‘a’;
21.
Page 21 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Cross-Site Scripting (XSS) Attack 1. The attacker discovers that the HYRULE website suffers from an XSS scripting defect. 2. An attacker sends an email stating that the victim has just been awarded a prize and should collect it by clicking a link in the email. 3. The link in the email goes to http://www.hyrule.com/default.asp?name= <script>badgoal()</script>. 4. When the user clicks the link, the website displays the message “Welcome Back!” with a prompt to enter the name.
22.
Page 22 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Cross-Site Scripting (XSS) Attack (Cont.) 5. The website has the name from your browser via the link in the email. When the link was clicked in the email, the HYRULE website was told your name is <script>evilScript () </script>. 6. The web server reports the “name” and returns it to the victim’s browser. 7. The browser correctly interprets this as script and runs it. 8. This script instructs the browser to send a cookie containing some information to the attacker’s system, which it does.
23.
Page 23 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Anatomy of Web Applications Exploitative Behaviors Theft of information, such as credit cards or other sensitive data The ability to update application and site content Server-side scripting exploits Buffer overflows Domain Name System (DNS) attacks Destruction of data
24.
Page 24 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Anatomy of Web Applications (Cont.) Categories of web application vulnerabilities • Authentication issues • Authorization configuration • Session management issues • Input validation • Encryption strength and implementation • Environment-specific problems
25.
Page 25 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Insecure Logon Systems Exam of a revealing error message: Track information relating to improper or incorrect user logons • Entry of an invalid user ID with a valid password • Entry of a valid user ID with an invalid password • Entry of an invalid user ID and password
26.
Page 26 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Scripting Errors Upload bombing Poison null byte attack Default scripts Sample scripts Poorly written or questionable scripts
27.
Page 27 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Session Management Issues Session • Represents connection that a client has with the server application Session information can give an attacker access to confidential information Session will have: • Unique identifier • Encryption • Other parameters
28.
Page 28 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Session Vulnerabilities Long-lived sessions Logout features Insecure or weak session identifiers Granting session IDs to unauthorized users Absent or inadequate password change controls Inclusion of unprotected information in cookies
29.
Page 29 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Encryption Weaknesses Weak ciphers • Use short keys or are poorly designed and implemented • Allows attacker to decrypt data easily and gain unauthorized access Vulnerable software • Software implementations (such as Secure Sockets Layer [SSL]) may have poor programming
30.
Page 30 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Database Vulnerabilities Contains info about the site or application “Holy grail” to attackers Configuration info, application data, and other data
31.
Page 31 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Database Types • Data can be organized and accessed to fit the scenario • Data is stored as a collection of tables and accessed through a query language such as SQL Relational database • Come in different varieties • Key-value store is popular • NoSQL data stores (Hadoop and Cassandra) grew from need to store and retrieve large volumes of data in short periods of time Nonrelational / NoSQL database
32.
Page 32 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Database Vulnerabilities Misconfiguration Lack of training Buffer overflows Forgotten options Other oversights
33.
Page 33 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Locating Databases on the Network Network Database Scanner • Effective at locating “rogue” or unknown database installations SQLRecon • Similar to Network Database Scanner • For Microsoft SQL installations Oscanner • For Oracle installations
34.
Page 34 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Network Database Scanner
35.
Page 35 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Database Server Password Cracking Password cracking tools SQLPing3 Cain and Abel Dictionary-based cracking methods
36.
Page 36 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Locating Vulnerabilities in Databases Common vulnerabilities include: • Used stored procedures • Services account privilege issues • Wear or poor authentication methods enabled • No or limited audit log settings
37.
Page 37 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Out of Sight, Out of Mind Learn the security features in the database system Evaluate the use of nonstandard ports Keep up to date Secure the operating system Use a firewall
38.
Page 38 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Cloud Computing Availability Reliability Loss of control Cloud service models: Platform as a Service (PaaS), Software as a Service (SaaS), and Infrastructure as a Service (IaaS) Security issues:
39.
Page 39 Hacker Techniques,
Tools, and Incident Handling © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Summary Web server vulnerabilities, tools, and exploits Web application vulnerabilities, tools, and exploits Database attacks and attack tools