Successfully reported this slideshow.
Jayson E. Street,  CISSP, GSEC, GCIH, GCFA, IEM, IAM, ETC… BUSH1D0 The Art of (CYBER) WAR
Let go of my EGO <ul><li>Lets start out with a little about yours truly. </li></ul><ul><li>[email_address] </li></ul>
Know yourself know your enemy <ul><li>Sun Wu (Tzu) “Ping-fa”(The Art of War) </li></ul><ul><li>“ Thus it is said that one ...
Contents <ul><li>INTRO </li></ul><ul><li>What we are doing here </li></ul><ul><li>Stratagem Solutions </li></ul><ul><li>5 ...
Training VS. Teaching Tools have a shelf life a methodology doesn’t I don’t plan on teaching you how to fish. I want to te...
Stratagems we will cover 1.Cross the sea by fooling the sky 3. Kill with a borrowed knife 5. Loot a burning house 8. Prete...
5 Point Bush1d0 Methodology <ul><li>Recon </li></ul><ul><li>Scanning </li></ul><ul><li>Explore </li></ul><ul><li>Exploit <...
Point #1 Recon <ul><li>Tools we will go over </li></ul><ul><li>Sam Spade </li></ul><ul><li>dnsenum </li></ul><ul><li>metag...
Point #2 Scanning <ul><li>Nmap </li></ul><ul><li>Autoscan </li></ul><ul><li>unicornscan </li></ul>
Point #3 Explore <ul><li>Nikto </li></ul><ul><li>Httprint </li></ul><ul><li>Grendel-scan </li></ul>
Point #4 Exploit <ul><li>Metasploit </li></ul><ul><li>Milw0rm </li></ul><ul><li>OSVDB </li></ul>
Point #5 Expunge <ul><li>Regedit </li></ul><ul><li>Back Door </li></ul><ul><li>Delete Button </li></ul>
Time to teach No more reading power points the rest of this class depends on how much you put into it.
Upcoming SlideShare
Loading in …5
×

Bush1D0

407 views

Published on

My pentesing class on Back|Track 4

Published in: Technology, Education
  • Be the first to comment

  • Be the first to like this

Bush1D0

  1. 1. Jayson E. Street, CISSP, GSEC, GCIH, GCFA, IEM, IAM, ETC… BUSH1D0 The Art of (CYBER) WAR
  2. 2. Let go of my EGO <ul><li>Lets start out with a little about yours truly. </li></ul><ul><li>[email_address] </li></ul>
  3. 3. Know yourself know your enemy <ul><li>Sun Wu (Tzu) “Ping-fa”(The Art of War) </li></ul><ul><li>“ Thus it is said that one who knows the enemy and knows himself will not be endangered in a hundred engagements. One who does not know the enemy but knows himself will sometimes be victorious, sometimes meet with defeat. One who knows neither the enemy nor himself will invariably be defeated in every engagement!” </li></ul>
  4. 4. Contents <ul><li>INTRO </li></ul><ul><li>What we are doing here </li></ul><ul><li>Stratagem Solutions </li></ul><ul><li>5 Point methodology </li></ul><ul><li>The games begin </li></ul>
  5. 5. Training VS. Teaching Tools have a shelf life a methodology doesn’t I don’t plan on teaching you how to fish. I want to teach you how to figure out where the fish are. 3,000 year old military strategy successfully applied to modern day pen-testing. Hackers don’t audit a network why are you?
  6. 6. Stratagems we will cover 1.Cross the sea by fooling the sky 3. Kill with a borrowed knife 5. Loot a burning house 8. Pretend to take one path while sneaking down another 12. Take the opportunity to pilfer a goat 18. Defeat the enemy by capturing their chief 21. Slough off the cicada's golden shell 29. Deck the tree with false blossoms 30. Make the host and the guest exchange roles 36. If everything else fails, retreat
  7. 7. 5 Point Bush1d0 Methodology <ul><li>Recon </li></ul><ul><li>Scanning </li></ul><ul><li>Explore </li></ul><ul><li>Exploit </li></ul><ul><li>Expunge </li></ul>
  8. 8. Point #1 Recon <ul><li>Tools we will go over </li></ul><ul><li>Sam Spade </li></ul><ul><li>dnsenum </li></ul><ul><li>metagoofil </li></ul><ul><li>Maltego </li></ul><ul><li>Google </li></ul><ul><li>FEC </li></ul><ul><li>News Sites </li></ul>
  9. 9. Point #2 Scanning <ul><li>Nmap </li></ul><ul><li>Autoscan </li></ul><ul><li>unicornscan </li></ul>
  10. 10. Point #3 Explore <ul><li>Nikto </li></ul><ul><li>Httprint </li></ul><ul><li>Grendel-scan </li></ul>
  11. 11. Point #4 Exploit <ul><li>Metasploit </li></ul><ul><li>Milw0rm </li></ul><ul><li>OSVDB </li></ul>
  12. 12. Point #5 Expunge <ul><li>Regedit </li></ul><ul><li>Back Door </li></ul><ul><li>Delete Button </li></ul>
  13. 13. Time to teach No more reading power points the rest of this class depends on how much you put into it.

×