Day3

968 views
938 views

Published on

Network Security and Hacking Techniques

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
968
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
58
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Day3

  1. 1. Securing and Optimization of Linux Servers and Hacking Techniques
  2. 2. Introduction “The Linux Based Services that Mean Business Securing Internet” Securing and optimization of Linux Server and Hacking Techniques
  3. 3. Network-Level Attacks  Session Hijacking: Securing and optimization of Linux Server and Hacking Techniques
  4. 4. Network-Level Attacks(Cont…)  Packet Sniffing: Packet sniffer is a piece of software that grabs all of the traffic flowing  Dsniff –n –i 1 Securing and optimization of Linux Server and Hacking Techniques
  5. 5. Gathering and Parsing Packets  DNS Cache Poisoning  DNS ID Spoofing  DNS Hides Poisoning Securing and optimization of Linux Server and Hacking Techniques
  6. 6. Gathering and Parsing Packets (Cont..)  The ARP Cache poisoning: Securing and optimization of Linux Server and Hacking Techniques
  7. 7. Gathering and Parsing Packets (Cont..)  IP Address Spoofing Variations Securing and optimization of Linux Server and Hacking Techniques
  8. 8. Denial of Service Attacks  TCP Connections Securing and optimization of Linux Server and Hacking Techniques
  9. 9. Denial of Service Attacks (Cont…) Abusing TCP: The Traditional SYN Flood Securing and optimization of Linux Server and Hacking Techniques
  10. 10. Denial of Service Attacks (Cont…) The Development of Bandwidth Attacks Securing and optimization of Linux Server and Hacking Techniques
  11. 11. Denial of Service Attacks (Cont…) DOS Securing and optimization of Linux Server and Hacking Techniques
  12. 12. Denial of Service Attacks (Cont…) DDOS Securing and optimization of Linux Server and Hacking Techniques
  13. 13. Denial of Service Attacks (Cont…) Distributed Reflection DOS Securing and optimization of Linux Server and Hacking Techniques
  14. 14. Denial of Service Attacks (Cont…) Packet path diffusion Securing and optimization of Linux Server and Hacking Techniques
  15. 15. Denial of Service Attacks (Cont…) Diffusing the path Securing and optimization of Linux Server and Hacking Techniques
  16. 16. Web Application Attacks  Web Spoofing  SQL Injection: Manipulating Back-end Databases  Cross-Site Scripting Securing and optimization of Linux Server and Hacking Techniques
  17. 17. Operating System and Application-Level Attacks  Password Cracking With L0phtCrack  Buffer Overflows in Depth  Examples of remote root exploit through buffer overflow  Root Kits Securing and optimization of Linux Server and Hacking Techniques
  18. 18. Operating System and Application-Level Attacks Buffer Overflows in Depth  Stuffing more data into a buffer than it can handle  Overwrites the return address of a function  Switches the execution flow to the hacker code Securing and optimization of Linux Server and Hacking Techniques
  19. 19. Operating System and Application-Level Attacks Process Memory Region Securing and optimization of Linux Server and Hacking Techniques
  20. 20. Operating System and Application-Level Attacks Examples of remote root exploit through buffer overflow  QPOP 3.0beta AUTH remote root stack overflow  BIND 8.2 - 8.2.2 remote root exploit Securing and optimization of Linux Server and Hacking Techniques
  21. 21. Operating System and Application-Level Attacks Root Kits  Rootkit name are combination from two words, “root and “kit”  collection of tools that enable attacker to keep the root power Type of Rootkit  Application rootkit - established at the application layer.  Kernel rootkit - establish more deep into kernel layer. Securing and optimization of Linux Server and Hacking Techniques
  22. 22. Operating System and Application-Level Attacks Application Rootkit  Programs replace to hide attacker presence. Examples ls,ps,top,du,find,ifconfig,lsof  Network Daemons with backdoor  Sniffer Program Kernel Rootkit  Hiding processes.  Hiding files  Hiding the sniffer.  Hiding the File System Securing and optimization of Linux Server and Hacking Techniques
  23. 23. .999

×