SlideShare a Scribd company logo
1 of 27
PETER WOOD – THE ETHICAL HACKER




                                  1
The Ultimate Defence:
             Think Like a Hacker


An Ethical Hacker’s View of Corporate Security




                                      Peter Wood
                                   Chief Executive Officer
                               First•Base Technologies LLP
Who is Peter Wood?

Worked in computers & electronics since 1969
Founded First Base in 1989     (one of the first ethical hacking firms)

CEO First Base Technologies LLP
Social engineer & penetration tester
Conference speaker and security ‘expert’

Member of ISACA Security Advisory Group
Vice Chair of BCS Information Risk Management and Audit Group
UK Chair, Corporate Executive Programme

FBCS, CITP, CISSP, MIEEE, M.Inst.ISP
Registered BCS Security Consultant
Member of ACM, ISACA, ISSA, Mensa
Thinking like a hacker

• Hacking is a way of thinking
  A hacker is someone who thinks outside the box. It's someone who
  discards conventional wisdom, and does something else instead. It's
  someone who looks at the edge and wonders what's beyond. It's
  someone who sees a set of rules and wonders what happens if you
  don't follow them.                      [Bruce Schneier]



• Hacking applies to all aspects of life
  - not just computers
Network Device Compromise
SNMP
                 Simple Network Management Protocol


• A protocol developed to manage nodes (servers, workstations,
  routers, switches and hubs etc.) on an IP network
• Enables network administrators to manage network performance,
  find and solve network problems, and plan for network growth
• SNMP v1 is the de facto network management protocol
• SNMP v1 has been criticised for its poor security. Authentication is
  performed only by a ‘community string’, in effect a type of password,
  which is transmitted in clear text
SNMP Scanning
SNMP for hackers
•   If you know the read string (default public) you can read the entire MIB for
    that device
•   If you know the read-write string (default private) you may be able to change
    settings on that device
•   You may be able to ‘sniff’ community strings off the network if they’ve been
    changed from the defaults
•   You may be able to control a router or switch:
     – Intercept traffic and read sensitive information
     – ‘Crash’ the network repeatedly
     – Lock the device out, requiring physical access to reset it
•   You may be able to list users, groups, shares etc. on servers
•   You may be able to subvert wireless network security
Windows Hacking
Windows architecture
                             Domain logon


Local users                                                            Domain users
and groups    Workstation                                  Domain       and groups

                                                          Controller
                            Global group in local group




                            Lo
Local users
              Workstation        ca                        Domain      Domain users
and groups                            l lo                              and groups
                                             go           Controller
                                                  n




Local users                                                             Local users
and groups    Workstation                                 Member        and groups

                                                          Server




                                                                        Local users
                                                          Member        and groups

                                                          Server
List privileged accounts and
  look for service accounts
Case study: Administrator passwords


                                             admin5
                                             crystal
                                             finance
Global firm worth £800million                friday
                                             macadmin
• 67 Administrator accounts                  monkey
                                             orange
• 43 simple passwords (64%)                  password
                                             password1
                                             prague
• 15 were “password” (22%)
                                             pudding
                                             rocky4
• Some examples we found ->                  security
                                             security1
                                             sparkle
                                             webadmin
                                             yellow
Case study: password crack
• 26,310 passwords from a Windows domain


• 11,279 (42.9%) cracked in 2½ minutes


• It’s not a challenge!
Laptop hacking
If we can boot from CD or USB …
We have some passwords!
… or just read the disk
Change the Administrator password
Desktop & Laptop Security

• Physical security on Windows desktops and laptops
  doesn’t exist
• Native Windows security is ineffective if you have physical
  access
• Everything is visible: e-mails, spreadsheets, documents,
  passwords
• If it’s on your machine - it’s stolen!
• Encryption is the best defence, coupled with lots of
  training!
Attack the building
Impersonating an employee
Impersonating a supplier
Do-it-yourself ID cards
Impersonate a cleaner
•   No vetting
•   Out-of-hours access
•   Cleans the desks
•   Takes out large black sacks
Data theft by keylogger
Keyghost log file


Keystrokes recorded so far is 2706 out of 107250 ...

<PWR><CAD>fsmith<tab><tab>arabella
 xxxxxxx <tab><tab> None<tab><tab> None<tab><tab>
None<tab><tab> <CAD> arabella
<CAD>
<CAD> arabella
<CAD>
<CAD> arabella
exit
tracert 192.168.137.240
telnet 192.168.137.240
cisco
Need more information?

    Peter Wood
    Chief Executive Officer
First•Base Technologies LLP

 peterw@firstbase.co.uk

     http://firstbase.co.uk
    http://white-hats.co.uk
    http://peterwood.com

   Blog: fpws.blogspot.com
    Twitter: @peterwoodx

More Related Content

What's hot

Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionCisco Mobility
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityRobb Boyd
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceCisco Mobility
 
Arch Rock Overview
Arch Rock OverviewArch Rock Overview
Arch Rock Overviewpauldeng
 
Alcatellucentsdn2013
Alcatellucentsdn2013Alcatellucentsdn2013
Alcatellucentsdn2013deepersnet
 
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamuraIndonesia Network Operators Group
 
Best reviews for Nevales Networks
Best reviews for Nevales NetworksBest reviews for Nevales Networks
Best reviews for Nevales NetworksNevales Networks
 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
 
Porque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPNPorque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPNaloscocco
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environmentdeepers
 
Cisco connect winnipeg 2018 optimizing your client's wi-fi experience v4 - ...
Cisco connect winnipeg 2018   optimizing your client's wi-fi experience v4 - ...Cisco connect winnipeg 2018   optimizing your client's wi-fi experience v4 - ...
Cisco connect winnipeg 2018 optimizing your client's wi-fi experience v4 - ...Cisco Canada
 

What's hot (19)

Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any Workspace
 
KRISHNAMOORTHI_NW
KRISHNAMOORTHI_NW KRISHNAMOORTHI_NW
KRISHNAMOORTHI_NW
 
Arch Rock Overview
Arch Rock OverviewArch Rock Overview
Arch Rock Overview
 
BYOD Monitoring
BYOD MonitoringBYOD Monitoring
BYOD Monitoring
 
Alcatellucentsdn2013
Alcatellucentsdn2013Alcatellucentsdn2013
Alcatellucentsdn2013
 
ccna
ccnaccna
ccna
 
Teknoforce
TeknoforceTeknoforce
Teknoforce
 
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
 
Best reviews for Nevales Networks
Best reviews for Nevales NetworksBest reviews for Nevales Networks
Best reviews for Nevales Networks
 
Ccna security
Ccna securityCcna security
Ccna security
 
Porque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPNPorque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPN
 
Resume_Mayalagu updated
Resume_Mayalagu updatedResume_Mayalagu updated
Resume_Mayalagu updated
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environment
 
Cisco connect winnipeg 2018 optimizing your client's wi-fi experience v4 - ...
Cisco connect winnipeg 2018   optimizing your client's wi-fi experience v4 - ...Cisco connect winnipeg 2018   optimizing your client's wi-fi experience v4 - ...
Cisco connect winnipeg 2018 optimizing your client's wi-fi experience v4 - ...
 
Paul Ho - Wireless Infrastructure for Mobile e-Learning
Paul Ho - Wireless Infrastructure for Mobile e-LearningPaul Ho - Wireless Infrastructure for Mobile e-Learning
Paul Ho - Wireless Infrastructure for Mobile e-Learning
 

Viewers also liked

2013 Medicines in Development: Older Americans
2013 Medicines in Development: Older Americans2013 Medicines in Development: Older Americans
2013 Medicines in Development: Older AmericansPhRMA
 
Grafico diario del dax perfomance index para el 13 02-2014
Grafico diario del dax perfomance index para el 13 02-2014Grafico diario del dax perfomance index para el 13 02-2014
Grafico diario del dax perfomance index para el 13 02-2014Experiencia Trading
 
"Innovative Problem Solving: Getting Unstuck In Your Thinking"
"Innovative Problem Solving: Getting Unstuck In Your Thinking""Innovative Problem Solving: Getting Unstuck In Your Thinking"
"Innovative Problem Solving: Getting Unstuck In Your Thinking"Sherisse Steward
 
Do you hunger for games? Gamification in Information Literacy Instruction
Do you hunger for games? Gamification in Information Literacy InstructionDo you hunger for games? Gamification in Information Literacy Instruction
Do you hunger for games? Gamification in Information Literacy Instructionagcalabrese
 
Presentación sobre EL CENTRO VIRTUAL DE ALTOS ESTUDIOS EN ALTAS ENERGIAS
Presentación sobre EL CENTRO VIRTUAL DE ALTOS ESTUDIOS EN ALTAS ENERGIASPresentación sobre EL CENTRO VIRTUAL DE ALTOS ESTUDIOS EN ALTAS ENERGIAS
Presentación sobre EL CENTRO VIRTUAL DE ALTOS ESTUDIOS EN ALTAS ENERGIASElias Said Hung
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
 
Dispatches from the Frontline: Using Pro-Poor Foresight to Influence Decision...
Dispatches from the Frontline: Using Pro-Poor Foresight to Influence Decision...Dispatches from the Frontline: Using Pro-Poor Foresight to Influence Decision...
Dispatches from the Frontline: Using Pro-Poor Foresight to Influence Decision...The Rockefeller Foundation
 
User Experience Flight Check - WordCamp LA
User Experience Flight Check - WordCamp LAUser Experience Flight Check - WordCamp LA
User Experience Flight Check - WordCamp LAjharr
 
Leveraging Social Media for Funnel Build
Leveraging Social Media for Funnel BuildLeveraging Social Media for Funnel Build
Leveraging Social Media for Funnel BuildRichard Brasser
 
Integración en-la-organización
Integración en-la-organizaciónIntegración en-la-organización
Integración en-la-organizaciónRachel Rivera
 
How to Buy a Car for $1,000 - Gnomedex 2008
How to Buy a Car for $1,000 - Gnomedex 2008How to Buy a Car for $1,000 - Gnomedex 2008
How to Buy a Car for $1,000 - Gnomedex 2008Kevin Fox
 
Integraciòn en la organizaciòn
Integraciòn en la organizaciònIntegraciòn en la organizaciòn
Integraciòn en la organizaciònJavii Martínez
 
100万ダウンロードを達成するには(16班)
100万ダウンロードを達成するには(16班)100万ダウンロードを達成するには(16班)
100万ダウンロードを達成するには(16班)stucon
 
Crossing the streams: Social and technical interfaces between Wikimedia and O...
Crossing the streams: Social and technical interfaces between Wikimedia and O...Crossing the streams: Social and technical interfaces between Wikimedia and O...
Crossing the streams: Social and technical interfaces between Wikimedia and O...Dario Taraborelli
 

Viewers also liked (20)

2013 Medicines in Development: Older Americans
2013 Medicines in Development: Older Americans2013 Medicines in Development: Older Americans
2013 Medicines in Development: Older Americans
 
Grafico diario del dax perfomance index para el 13 02-2014
Grafico diario del dax perfomance index para el 13 02-2014Grafico diario del dax perfomance index para el 13 02-2014
Grafico diario del dax perfomance index para el 13 02-2014
 
"Innovative Problem Solving: Getting Unstuck In Your Thinking"
"Innovative Problem Solving: Getting Unstuck In Your Thinking""Innovative Problem Solving: Getting Unstuck In Your Thinking"
"Innovative Problem Solving: Getting Unstuck In Your Thinking"
 
Do you hunger for games? Gamification in Information Literacy Instruction
Do you hunger for games? Gamification in Information Literacy InstructionDo you hunger for games? Gamification in Information Literacy Instruction
Do you hunger for games? Gamification in Information Literacy Instruction
 
Presentación sobre EL CENTRO VIRTUAL DE ALTOS ESTUDIOS EN ALTAS ENERGIAS
Presentación sobre EL CENTRO VIRTUAL DE ALTOS ESTUDIOS EN ALTAS ENERGIASPresentación sobre EL CENTRO VIRTUAL DE ALTOS ESTUDIOS EN ALTAS ENERGIAS
Presentación sobre EL CENTRO VIRTUAL DE ALTOS ESTUDIOS EN ALTAS ENERGIAS
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
Icip workshop sme needs analysis
Icip workshop sme needs analysisIcip workshop sme needs analysis
Icip workshop sme needs analysis
 
Congreso 2011-2015
Congreso 2011-2015Congreso 2011-2015
Congreso 2011-2015
 
Dispatches from the Frontline: Using Pro-Poor Foresight to Influence Decision...
Dispatches from the Frontline: Using Pro-Poor Foresight to Influence Decision...Dispatches from the Frontline: Using Pro-Poor Foresight to Influence Decision...
Dispatches from the Frontline: Using Pro-Poor Foresight to Influence Decision...
 
User Experience Flight Check - WordCamp LA
User Experience Flight Check - WordCamp LAUser Experience Flight Check - WordCamp LA
User Experience Flight Check - WordCamp LA
 
Leveraging Social Media for Funnel Build
Leveraging Social Media for Funnel BuildLeveraging Social Media for Funnel Build
Leveraging Social Media for Funnel Build
 
Integración en-la-organización
Integración en-la-organizaciónIntegración en-la-organización
Integración en-la-organización
 
05a fede mma forum colombia
05a fede mma forum colombia05a fede mma forum colombia
05a fede mma forum colombia
 
Zaragoza turismo 196
Zaragoza turismo 196Zaragoza turismo 196
Zaragoza turismo 196
 
How to Buy a Car for $1,000 - Gnomedex 2008
How to Buy a Car for $1,000 - Gnomedex 2008How to Buy a Car for $1,000 - Gnomedex 2008
How to Buy a Car for $1,000 - Gnomedex 2008
 
Integraciòn en la organizaciòn
Integraciòn en la organizaciònIntegraciòn en la organizaciòn
Integraciòn en la organizaciòn
 
Integracion en-la-organización
Integracion en-la-organizaciónIntegracion en-la-organización
Integracion en-la-organización
 
100万ダウンロードを達成するには(16班)
100万ダウンロードを達成するには(16班)100万ダウンロードを達成するには(16班)
100万ダウンロードを達成するには(16班)
 
ทุน 2557
ทุน 2557ทุน 2557
ทุน 2557
 
Crossing the streams: Social and technical interfaces between Wikimedia and O...
Crossing the streams: Social and technical interfaces between Wikimedia and O...Crossing the streams: Social and technical interfaces between Wikimedia and O...
Crossing the streams: Social and technical interfaces between Wikimedia and O...
 

Similar to Peter wood – the ethical hacker

Prime Targets in Network Infrastructure
Prime Targets in Network InfrastructurePrime Targets in Network Infrastructure
Prime Targets in Network InfrastructurePeter Wood
 
Ultimate pen test compromising a highly secure environment (nikhil)
Ultimate pen test   compromising a highly secure environment (nikhil)Ultimate pen test   compromising a highly secure environment (nikhil)
Ultimate pen test compromising a highly secure environment (nikhil)ClubHack
 
Breadcrumbs to Loaves: BSides Austin '17
Breadcrumbs to Loaves: BSides Austin '17Breadcrumbs to Loaves: BSides Austin '17
Breadcrumbs to Loaves: BSides Austin '17Brandon Arvanaghi
 
You think your WiFi is safe?
You think your WiFi is safe?You think your WiFi is safe?
You think your WiFi is safe?Rob Gillen
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-IIManageEngine
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network MayhemPacketTrap Msp
 
John adams talk cloudy
John adams   talk cloudyJohn adams   talk cloudy
John adams talk cloudyJohn Adams
 
Attack all the layers secure 360
Attack all the layers secure 360Attack all the layers secure 360
Attack all the layers secure 360Scott Sutherland
 
Scientific Computing - Hardware
Scientific Computing - HardwareScientific Computing - Hardware
Scientific Computing - Hardwarejalle6
 
Topic 2 - Ransomware Techniques.pptx
Topic 2 - Ransomware Techniques.pptxTopic 2 - Ransomware Techniques.pptx
Topic 2 - Ransomware Techniques.pptxMorningstar90
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar Santhosh Kumar
 
Introduction to web security @ confess 2012
Introduction to web security @ confess 2012Introduction to web security @ confess 2012
Introduction to web security @ confess 2012jakobkorherr
 
Creating a fortress in your active directory environment
Creating a fortress in your active directory environmentCreating a fortress in your active directory environment
Creating a fortress in your active directory environmentDavid Rowe
 
Attack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingAttack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingNetSPI
 
Attack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingAttack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingNetSPI
 
Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Scott Sutherland
 
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEPENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEChris Gates
 
Discovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and ProfitDiscovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and ProfitAbhisek Datta
 

Similar to Peter wood – the ethical hacker (20)

Prime Targets in Network Infrastructure
Prime Targets in Network InfrastructurePrime Targets in Network Infrastructure
Prime Targets in Network Infrastructure
 
Ultimate pen test compromising a highly secure environment (nikhil)
Ultimate pen test   compromising a highly secure environment (nikhil)Ultimate pen test   compromising a highly secure environment (nikhil)
Ultimate pen test compromising a highly secure environment (nikhil)
 
Breadcrumbs to Loaves: BSides Austin '17
Breadcrumbs to Loaves: BSides Austin '17Breadcrumbs to Loaves: BSides Austin '17
Breadcrumbs to Loaves: BSides Austin '17
 
You think your WiFi is safe?
You think your WiFi is safe?You think your WiFi is safe?
You think your WiFi is safe?
 
You suck at Memory Analysis
You suck at Memory AnalysisYou suck at Memory Analysis
You suck at Memory Analysis
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-II
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network Mayhem
 
John adams talk cloudy
John adams   talk cloudyJohn adams   talk cloudy
John adams talk cloudy
 
Attack all the layers secure 360
Attack all the layers secure 360Attack all the layers secure 360
Attack all the layers secure 360
 
Scientific Computing - Hardware
Scientific Computing - HardwareScientific Computing - Hardware
Scientific Computing - Hardware
 
Topic 2 - Ransomware Techniques.pptx
Topic 2 - Ransomware Techniques.pptxTopic 2 - Ransomware Techniques.pptx
Topic 2 - Ransomware Techniques.pptx
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
 
Introduction to web security @ confess 2012
Introduction to web security @ confess 2012Introduction to web security @ confess 2012
Introduction to web security @ confess 2012
 
Creating a fortress in your active directory environment
Creating a fortress in your active directory environmentCreating a fortress in your active directory environment
Creating a fortress in your active directory environment
 
Attack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingAttack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration Testing
 
Attack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingAttack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration Testing
 
Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)
 
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEPENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
 
Discovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and ProfitDiscovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and Profit
 

Peter wood – the ethical hacker

  • 1. PETER WOOD – THE ETHICAL HACKER 1
  • 2. The Ultimate Defence: Think Like a Hacker An Ethical Hacker’s View of Corporate Security Peter Wood Chief Executive Officer First•Base Technologies LLP
  • 3. Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base in 1989 (one of the first ethical hacking firms) CEO First Base Technologies LLP Social engineer & penetration tester Conference speaker and security ‘expert’ Member of ISACA Security Advisory Group Vice Chair of BCS Information Risk Management and Audit Group UK Chair, Corporate Executive Programme FBCS, CITP, CISSP, MIEEE, M.Inst.ISP Registered BCS Security Consultant Member of ACM, ISACA, ISSA, Mensa
  • 4. Thinking like a hacker • Hacking is a way of thinking A hacker is someone who thinks outside the box. It's someone who discards conventional wisdom, and does something else instead. It's someone who looks at the edge and wonders what's beyond. It's someone who sees a set of rules and wonders what happens if you don't follow them. [Bruce Schneier] • Hacking applies to all aspects of life - not just computers
  • 6. SNMP Simple Network Management Protocol • A protocol developed to manage nodes (servers, workstations, routers, switches and hubs etc.) on an IP network • Enables network administrators to manage network performance, find and solve network problems, and plan for network growth • SNMP v1 is the de facto network management protocol • SNMP v1 has been criticised for its poor security. Authentication is performed only by a ‘community string’, in effect a type of password, which is transmitted in clear text
  • 8. SNMP for hackers • If you know the read string (default public) you can read the entire MIB for that device • If you know the read-write string (default private) you may be able to change settings on that device • You may be able to ‘sniff’ community strings off the network if they’ve been changed from the defaults • You may be able to control a router or switch: – Intercept traffic and read sensitive information – ‘Crash’ the network repeatedly – Lock the device out, requiring physical access to reset it • You may be able to list users, groups, shares etc. on servers • You may be able to subvert wireless network security
  • 10. Windows architecture Domain logon Local users Domain users and groups Workstation Domain and groups Controller Global group in local group Lo Local users Workstation ca Domain Domain users and groups l lo and groups go Controller n Local users Local users and groups Workstation Member and groups Server Local users Member and groups Server
  • 11. List privileged accounts and look for service accounts
  • 12. Case study: Administrator passwords admin5 crystal finance Global firm worth £800million friday macadmin • 67 Administrator accounts monkey orange • 43 simple passwords (64%) password password1 prague • 15 were “password” (22%) pudding rocky4 • Some examples we found -> security security1 sparkle webadmin yellow
  • 13. Case study: password crack • 26,310 passwords from a Windows domain • 11,279 (42.9%) cracked in 2½ minutes • It’s not a challenge!
  • 15. If we can boot from CD or USB …
  • 16. We have some passwords!
  • 17. … or just read the disk
  • 19. Desktop & Laptop Security • Physical security on Windows desktops and laptops doesn’t exist • Native Windows security is ineffective if you have physical access • Everything is visible: e-mails, spreadsheets, documents, passwords • If it’s on your machine - it’s stolen! • Encryption is the best defence, coupled with lots of training!
  • 24. Impersonate a cleaner • No vetting • Out-of-hours access • Cleans the desks • Takes out large black sacks
  • 25. Data theft by keylogger
  • 26. Keyghost log file Keystrokes recorded so far is 2706 out of 107250 ... <PWR><CAD>fsmith<tab><tab>arabella xxxxxxx <tab><tab> None<tab><tab> None<tab><tab> None<tab><tab> <CAD> arabella <CAD> <CAD> arabella <CAD> <CAD> arabella exit tracert 192.168.137.240 telnet 192.168.137.240 cisco
  • 27. Need more information? Peter Wood Chief Executive Officer First•Base Technologies LLP peterw@firstbase.co.uk http://firstbase.co.uk http://white-hats.co.uk http://peterwood.com Blog: fpws.blogspot.com Twitter: @peterwoodx

Editor's Notes

  1. One of our clients (a major international bank) was attacked in a scenario which involved cleaners.