Democratization of Hacking


Click here to start

Table of contents

Anatomy of Internet Attacks

Democratization of Hacking

Slide 3

Where do I want to go?

Slide 5

Who do I want to be today?

Who do I want to be today? UNIX - finger

Slide 8

Who do I want to be today? NT - qtip

Slide 10

Who do I want to be today? Protection

Slide 12

Where is the door? Probing tools

Where is the door? Open Ports - Continued

Where is the door? nmap

Slide 16

Where is the door? Protection

Opening the door

CGI-Bin Exploit

Slide 20

Slide 21

Slide 22

CGI-Bin Exploit Protection

Slide 24

Opening the door John The Ripper

Slide 26

Opening the door l0phtcrack

Slide 28

Opening the door Protection

Who is watching?

Who is watching? Protection

Taking control

Becoming Superuser by Exploiting Buffer Overflow

Becoming Super-User by Exploiting Buffer Overflow

Slide 35

Backdoors and Trojan Horses

Slide 37

Slide 38

Backdoor - Back Orifice From “Cult of the Dead Cow”

Backdoor - Back Orifice 2000

Slide 41

Taking control Protection

Now, where can I go?

Now, where can I go? Packet Sniffers

Now, where can I go? Packet Sniffers - Sniffit

Slide 46

Now, where can I go? Packet Sniffers - Protection

Slide 48

Now, where can I go? VPN defeats Packet Sniffers

Slide 50

What else can we do…?

Slide 52

Slide 53

Slide 54

What else can we do…? Web Site Vandalism - Protection

What else can we do…? Denial-of-Service (DoS)

Denial-of-Service Example: LAND Attack

Slide 58

Distributed Denial of Service

Distributed Denial-Of-Service The Internet Meltdown

Distributed Denial of Service The Internet Meltdown

Distributed Attack Protective Measures

Distributed Attack Protection: Filtering & Router Configuration

What else can we do…? Hostile ActiveX and Java Applets

Slide 65

What else can we do…? Viruses

Virus and Hostile Applet Protection

Conclusions

Best viewed with
StarOffice

Download presentation