Вы находитесь на странице: 1из 26

Ethical Hacking

Niken DwiClick to edit Master subtitle style Wahyu Cahyani ST. Mkom., CCSO., CEH Ian Harisman Moderator: Gandeva Bayu ST., CCNA

6/4/12

6/4/12

CEHv7 Outline
1 2 3 4 5
6/4/12

Footprinting and Reconnaisanc Scanning e Networks Enumeration System Hacking Trojan and Backdoors

6 7 8 9 1 0

Viruses and Worms Sniffers Social Enginineering Denial of Service Session Hijacking

CEHv7 Outline
1 1 1 2 1 3 1 4 1 5 6/4/12
Hacking Webservers Hacking Web Applications SQL Injection Hacking Wireless Networks IDS, Firewalls and Honeypots

1 6 1 7 1 8

Buffer Overflows Cryptography Penetration Testing

EC-Council Certification Program


Security5 Certified E-Business Professional EC-Council Certified Security Specialist (ECSS) EC-Council Network Security Administration Certified(ENSA) Hacker Ethical (CEH) Computer Hacking Forensic Investigator 6/4/12 (CHFI) EC-Council Disaster Recovery Professional (EDRP) EC-Council Certified Security Analyst (ECSA) EC-Council Certified

Secure Programmer (ECSP) Certified Secure Application Developer (CSAD) Licensed Penetration Tester (LPT) Master of Security Science (MSS)

EC-Council Certification Program

6/4/12

Lets Start Hacking!

6/4/12

Website Deface Attack Statistic

The top rank Attack Methods: file 6/4/12 inclusion, sql injection, webdav

Internet Crime Curent Report: IC3

6/4/12

Why Attack Are Increasing

6/4/12

Hacker Classes

6/4/12

What Does a Hacker Do?

6/4/12

Footprinting & Reconnaissance

6/4/12

Footprinting & Reconnaissance

6/4/12

Footprinting &Reconnaissance
Footprinting Methodology

6/4/12

Inter Com net pet Foot itiv Net e WHO pri DNS nti Foot Intell wo IS ng pri ige rk Foot Web nti Goo Foot nt pri E-

Footprinting & Reconnaissance

Example:

Ping EmailTracerPro SmartWhois

6/4/12

Scanning
Types of Scanning

6/4/12

Scanning

Example:

Nmap Advanced IP Scanner Amap CurrPorts Nessus

6/4/12

System Hacking: Goals


Hacking-Stage
Gaining Access

Goal
To collect enough information to gain access

Technique/Explo it Used
Password eavesdropping, brute forcing Password Cracking, known exploits

Escalating Priviliges To create a privileged user account if the user level is obtained Executing Applications Hiding Files Covering Tracks
6/4/12

To create and maintain backdoor access To hide malicious files

Trojans

Rootkits

To hide the presence Clearing logs of compromise

CLOSING

6/4/12

Top 5 IT Security Certifications for 2011


Based by scanning job boards and interviewing IT security recruiters and employers: * Vendor Certifications * CISSP: Certified Information Systems Security Professional * CEH: Certified Ethical Hacker * 6/4/12 CISM: Certified Information

Survey Result
Salaries for IT security professionals are expected to increase by more than 4% in 2011, according to a survey by Robert Half International. Data security analyst is expected to increase by 4.5% Systems security administrator is expected to jump 4.0% 6/4/12 Network security administrator,

IT Security Related Position and Salary Ranges

* Source: 6/4/12 http://www.securityweek.com/it-salary-guide-shows-increase-salaries-

Average CEH Salary Ranges by Country United States ranges from $56,930 to $82,424 Canada ranges from C$62,288 and C$74,000 (approximately $64,387 to $76,400).
6/4/12 U.K., the average salary range is

6/4/12

Daftar Pustaka

Modul CEH EC-Council

6/4/12

Вам также может понравиться