Ethical Hacking
and Network
    Defense
                Contact Information
   Sam Bowne
   Email: sbowne@ccsf.edu
   Website:                     samsclass.info
   All materials from this talk are already
    on that website
   Download them and use them freely
Hands-On Ethical Hacking and Network Defense      2
Isn’t Hacking a Crime?
                         3
                Ethical Hacking
   Ethical hackers
       Employed by companies
        to perform penetration
        tests
   Penetration test
       Legal attempt to break into
        a company’s network to
        find its weakest link
       Tester only reports
        findings, does not harm
        the company
              Penetration Testers
   Hackers
       Access computer system or network without
        authorization
       Breaks the law; can go to prison
   Crackers
       Break into systems to steal or destroy data
       U.S. Department of Justice calls both hackers
   Ethical hacker
       Performs most of the same activities but with
        owner’s permission                              5
           Penetration Testers
   Script kiddies or packet monkeys
       Young inexperienced hackers
       Copy codes and techniques from
        knowledgeable hackers
   Experienced penetration testers use
    Perl, C, Assembler, or other languages
    to code exploits
                                             6
         Security Credentials
   CompTIA offers Security+ certification,
    a basic familiarity with security
    concepts and terms
                                              7
       OSSTMM Professional
       Security Tester (OPST)
   Designated by the
    Institute for
    Security and Open
    Methodologies
    (ISECOM)
   Based on the Open
    Source Security
    Testing
    Methodology
    Manual (OSSTMM)             8
Certified Information
 Systems Security
Professional (CISSP)
   Issued by the International Information
    Systems Security Certifications
    Consortium (ISC2)
   Usually more concerned with policies and
    procedures than technical details
   Web site
       www.isc2.org
                                              9
Certified Ethical Hacker (CEH)
   But see Run Away From The CEH
    Certification
       Link at samsclass.info      10
    What You Cannot Do Legally
   Accessing a computer without permission
    is illegal
   Other illegal actions
     Installing worms or viruses
     Denial of Service attacks
     Denying users access to network resources
   Possession of others’ passwords can be
    a crime
       See Password theft
            Link at samsclass.info
                                             11
      Get Out of Jail Free Card
   When doing a penetration test, have a
    written contract giving you permission
    to attack the network
   Using a contract is just good business
   Contracts may be useful in court
   Have an attorney read over your contract
    before sending or signing it
                                             12
                   Projects
   To get credit for this session, do any one of
    these:
   Project 1: Using The Metasploit Framework
    to take over a vulnerable computer remotely
   Project 2: : Using Ophcrack to crack
    Windows passwords with Rainbow tables
   Project 3: Using a Keylogger to record
    keystrokes (including passwords)
                                                    13
    CNIT 123: Ethical Hacking and
          Network Defense
   3-unit course
   Offered face-to-face next semester
   Face-to-face and online sections in
    Spring 2008
                                          14