SlideShare a Scribd company logo
1 of 17
Network Penetration Testing
Cameron Aaron
Software Engineer
John Schaeffer
Chief Information Security Officer (CISO)
Who am I?
Computer Science and Psychology Major w/minor in
Cognitive Science
Ammerman Student
Software Engineer @ Microsoft’s GitHub
Google Product Expert
Fun fact: I used to collect rocks from places I traveled
Network Penetration
Testing
● What
● Why
How
5 Phases
● Installation & configuration,
● Reconnaissance
● Threat Modeling
● Exploitation
● Resolution & recommendations
● Hacky Mc Hack Face config
● Google Cloud server
● Scripting
Installation and
configuration phase
● OS detection
● Fuzzing
● Packet sniffing and intrusion
detection
● Outside exposure
● Wifi network checks
Reconnaissance
phase
● Establish scope
● Establish attack vectors
● Social Engineering?
Pre-engagement
● Msfconsole payload gen
● The magical virustotal
● Wireshark
Threat Modeling
Phase/Vulnerability
Identification
● Noop payloads
● The Z00 VM
Exploitation phase
Case Study: Camel
Card insecurity
● Insecure RFID technology
● Easily cloned from distances of
1 foot away
● Very easy to impersonate other
students
Mitigation
● Shielded card holders
● Encrypted cards such as mifare
desfire (Does not emit info until
both the scanner and reader
handshake)
RFID
● Hexadecimal broadcast (plain
text)
● Powered by receiver
● Receiver grants access by
group in database (BlackBoard)
Case Study:
Degreeworks
unencrypted traffic
● Degree works was served using
HTTP
● Traffic is able to be sniffed in
plain text
Mitigation
● Serve Degreeworks over
HTTPS
Reporting ● Writing of the report
Questions?

More Related Content

Similar to COM 495 network pen testing

Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
WSO2
 

Similar to COM 495 network pen testing (20)

How I Learnt hacking in High School - BSidesLV - 2015
How I Learnt hacking in High School - BSidesLV - 2015How I Learnt hacking in High School - BSidesLV - 2015
How I Learnt hacking in High School - BSidesLV - 2015
 
Null meet Code Review
Null meet Code ReviewNull meet Code Review
Null meet Code Review
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 
FALCON.pptx
FALCON.pptxFALCON.pptx
FALCON.pptx
 
Mobile application security and threat modeling
Mobile application security and threat modelingMobile application security and threat modeling
Mobile application security and threat modeling
 
WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...
WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...
WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...
 
Huiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attackHuiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attack
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security Intelligence
 
Android Application Security from consumer and developer perspectives
Android Application Security from consumer and developer perspectivesAndroid Application Security from consumer and developer perspectives
Android Application Security from consumer and developer perspectives
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
 
Shall we play a game?
Shall we play a game?Shall we play a game?
Shall we play a game?
 
SmartphoneHacking_Android_Exploitation
SmartphoneHacking_Android_ExploitationSmartphoneHacking_Android_Exploitation
SmartphoneHacking_Android_Exploitation
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
 
Android N Security Overview - Mobile Security Saturday at Ciklum
Android N Security Overview - Mobile Security Saturday at CiklumAndroid N Security Overview - Mobile Security Saturday at Ciklum
Android N Security Overview - Mobile Security Saturday at Ciklum
 
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015 Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
 
Anomaly Detection and IP Insights - 2023-06-10
Anomaly Detection and IP Insights - 2023-06-10Anomaly Detection and IP Insights - 2023-06-10
Anomaly Detection and IP Insights - 2023-06-10
 

More from Cameron Aaron

Machine creativity TED Talk 2.0
Machine creativity TED Talk 2.0Machine creativity TED Talk 2.0
Machine creativity TED Talk 2.0
Cameron Aaron
 
Cameron+Aaron+Recommendation+Letter
Cameron+Aaron+Recommendation+LetterCameron+Aaron+Recommendation+Letter
Cameron+Aaron+Recommendation+Letter
Cameron Aaron
 
Cameron+Aaron+Recommendation+Letter
Cameron+Aaron+Recommendation+LetterCameron+Aaron+Recommendation+Letter
Cameron+Aaron+Recommendation+Letter
Cameron Aaron
 
Ltr of recommendation (1)
Ltr of recommendation (1)Ltr of recommendation (1)
Ltr of recommendation (1)
Cameron Aaron
 

More from Cameron Aaron (17)

Japan Korea conflict
Japan Korea conflict Japan Korea conflict
Japan Korea conflict
 
Vacterl Syndrome
Vacterl Syndrome Vacterl Syndrome
Vacterl Syndrome
 
E.a.t ammerman presentation
E.a.t ammerman presentationE.a.t ammerman presentation
E.a.t ammerman presentation
 
Dna replication project Middle school
Dna replication project Middle schoolDna replication project Middle school
Dna replication project Middle school
 
The Real Magical Girls
The Real Magical GirlsThe Real Magical Girls
The Real Magical Girls
 
Dmt a higher state of being
Dmt  a higher state of beingDmt  a higher state of being
Dmt a higher state of being
 
Communication gender and clothes
Communication  gender and clothesCommunication  gender and clothes
Communication gender and clothes
 
Clues inc script
Clues inc script Clues inc script
Clues inc script
 
Mikaela and Cameron's project on Altruism and Self esteem
Mikaela and Cameron's project on Altruism and Self esteem Mikaela and Cameron's project on Altruism and Self esteem
Mikaela and Cameron's project on Altruism and Self esteem
 
Toxoplasma gondii and personality
Toxoplasma gondii and personality Toxoplasma gondii and personality
Toxoplasma gondii and personality
 
Learning Disability or environmental advantage Middle school project
Learning Disability or environmental advantage Middle school project Learning Disability or environmental advantage Middle school project
Learning Disability or environmental advantage Middle school project
 
Aaron hernandez Personality Psychology
Aaron hernandez Personality Psychology Aaron hernandez Personality Psychology
Aaron hernandez Personality Psychology
 
Machine creativity TED Talk 2.0
Machine creativity TED Talk 2.0Machine creativity TED Talk 2.0
Machine creativity TED Talk 2.0
 
Machine creativity TED Talk 2.0
Machine creativity TED Talk 2.0Machine creativity TED Talk 2.0
Machine creativity TED Talk 2.0
 
Cameron+Aaron+Recommendation+Letter
Cameron+Aaron+Recommendation+LetterCameron+Aaron+Recommendation+Letter
Cameron+Aaron+Recommendation+Letter
 
Cameron+Aaron+Recommendation+Letter
Cameron+Aaron+Recommendation+LetterCameron+Aaron+Recommendation+Letter
Cameron+Aaron+Recommendation+Letter
 
Ltr of recommendation (1)
Ltr of recommendation (1)Ltr of recommendation (1)
Ltr of recommendation (1)
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

COM 495 network pen testing