SlideShare a Scribd company logo
Colin McLean
Lecturer in Ethical Hacking
 This is a stand-alone environment.
 Seeing attacks makes a difference!
 Please don’t try any of this at home!
 PS Adam is a 4th
year Ethical Hacking
student at Abertay.
Installed On my
PC.
Adam will try to
hack it..
Installed On my
PC.
Adam will try to
hack it..
And generally not as well defended.
Web
server
Web app
Web app
Web app
Web app
transport
DB
DB
App
server
(optional)
Web client:
IE, Firefox,
Opera, etc.
HTTP
response
(HTML,
JavaScript,
VBScript,
etc.)
HTTP
request
Clear-
text or
SSL
• Apache
• IIS
• Netscape
• etc.
• ColdFusion
• Oracle 9iAS
• GlassFish
• etc.
• Perl
• C++
• CGI
• Java
• ASP
• PHP
• etc.
• ADO
• ODBC
• JDBC
• etc.
• Oracle
• SQL
Server
• etc.
• AJP
• IIOP
• etc.
Web
server
Web app
Web app
Web app
Web app
transport
DB
DB
App
server
(optional)
 Entering Colin and test gives a SQL query similar to the
following: -
$query = "SELECT * FROM accounts WHERE username=‘Colin' AND
password=‘test’;
 PROBLEM: - Often there is no filtering of input meaning that a
hacker can inject CODE.
Typical Code
$username = $_REQUEST["username"];
$password = $_REQUEST["password"];
$query = "SELECT * FROM accounts WHERE username='$username' AND
password='$password';
 Entering blah ‘OR 1=1#
 In MYSQL, “#” is a comment.
$query = SELECT * FROM accounts WHERE username= '$username' AND
password= '$password';
 Gives
$query = SELECT * FROM accounts WHERE username= ‘blah' OR 1=1#
password= ''
 Effectively
$query = SELECT * FROM accounts WHERE username= ‘blah' OR 1=1
 HacmeBank has an SQL injection flaw.
 Adam is currently trying to do as much as damage
as he can by exploiting this flaw....
 “SQLMAP” tool as used by hacking groups.
login_id password user_name
JV JV789 Joe Vilella
JM jm789 John Mathew
JC jc789 Jane Chris
Abertay Ethical Hacking Group
user_id branch
curren
cy account_no account_type creation_date balance_amount
1
Texas-Remington
Circle USD 5204320422040000 Platinum
Jun 14 2005
1:29AM 16779
1
Texas-Remington
Circle USD 5204320422040000 Silver
Jun 14 2005
1:29AM 8145
2
Mahnattan - New
york USD 5204320422040000 Silver
Sep 14 2005
1:29AM 8555
2
Mahnattan - New
York USD 5204320422040000 Platinum
Sep 12 2005
1:23AM 91000
3L A-Hoston Road USD 5204320422040000 Platinum
Jun 14 2005
1:29AM 4800
3L A-Hoston Road USD 5204320422040000 Silver
Jun 14 2005
1:29AM 5100
3
Buston-Richadson
Avenue USD 5204320422040000 Platinum
Jun 14 2005
1:29AM 7600
3
Buston-Richadson
Avenue USD 5204320422040000 Silver
Jun 14 2005
1:29AM 1200
2
Mahnattan - New
York USD 5204320422040000 Gold
Oct 12 2005
1:23AM 850
Transactions tableTransactions table
 Gain a “shell” on the victims PC.
 Stop firewall
 Deface Web site
 Could also publish database on the Internet.
 Reputation?
 Compensation?
 Could be devastating for the company.
 Approximately 3 lines of code..
 AWARENESS.
 Only one of many Web flaws.
 A1-Injection
 A2-Broken Authentication and Session Management
 A3-Cross-Site Scripting (XSS)
 A4- Insecure Direct Object References
 A5-Security Misconfiguration
 A6-Sensitive Data Exposure
 A7-Missing Function Level Access Control
 A8-Cross-Site Request Forgery (CSRF)
 A9-Using Components with Known Vulnerabilities
 A10-Unvalidated Redirects and Forwards .
 ..etc
We are all
vulnerable.
No such thing as
a “dumb user”.
 Relies on victim clicking on a link (e.g. E-Mail,
Google search .....etc).
 Hackers success against a company can be
greatly increased using targeting users.
 E.g. Might not be easy to get an accountant to
click on any old link....but...
 Get user to visit a page...
 Issue commands from the menu.
This is many
users view of
what a trojan is...
This is many
users view of
what a trojan is...
 Install...
◦ Visit the wrong web page/install the wrong
software/Someone gets on your PC.
 Anti-virus can be evaded relatively easily.
 The ultimate hack.
Unpatched /
Downloaded..
How dangerous?
Unpatched /
Downloaded..
How dangerous?
• This demo applies to “out of date”
software or packages downloaded
from the Internet.
• If a flaw isn’t fixed then this is what
can happen.
 Technical controls can help greatly but
 Developers/Networking staff/IT Staff/User
awareness is a major mitigation.
 Most modern hacking attacks require user “help”.
 Awareness training @ Abertay Uni...
◦ Pen Testing & Vulnerability Assessment (2 days)
◦ Security awareness for users (1/2 day)
◦ Web Security testing (2 days)
◦ Security Awareness for Managers (1/2 day)
◦ Secure Coding (1 day)
◦ Wireless security (1 day)
◦ Intro to Digital Forensics (2 days)
◦ Network Forensics (2 days).
 In our Ethical Hacking lab or in your company.
Any questions?
Abertay Ethical Hacking Group

More Related Content

Viewers also liked

Dear son dear_daughter
Dear son dear_daughterDear son dear_daughter
Dear son dear_daughter
vinod kumar
 
Potrzeby współczesnego prosumenta jako determinanta rozwoju nowych narzędzi k...
Potrzeby współczesnego prosumenta jako determinanta rozwoju nowych narzędzi k...Potrzeby współczesnego prosumenta jako determinanta rozwoju nowych narzędzi k...
Potrzeby współczesnego prosumenta jako determinanta rozwoju nowych narzędzi k...
Magdalena Kachniewska
 
La nuova società italiana trasforma i lavoratori in schiavi.
La nuova società italiana trasforma i lavoratori in schiavi.La nuova società italiana trasforma i lavoratori in schiavi.
La nuova società italiana trasforma i lavoratori in schiavi.Cagliostro Puntodue
 
Curricularesprimerainf
CurricularesprimerainfCurricularesprimerainf
Curricularesprimerainf
Carlos Soto
 
Failing to learn from Australia’s most successful defence project
Failing to learn from Australia’s most successful defence projectFailing to learn from Australia’s most successful defence project
Failing to learn from Australia’s most successful defence project
William Hall
 
Yorkshire Presentation
Yorkshire PresentationYorkshire Presentation
Yorkshire Presentation
sebasquinteros
 
Critical issues-in-disaster-science-and-management a dialogue between researc...
Critical issues-in-disaster-science-and-management a dialogue between researc...Critical issues-in-disaster-science-and-management a dialogue between researc...
Critical issues-in-disaster-science-and-management a dialogue between researc...
JD Hamilton
 
Application Holy Wars theme and why the book was written
Application Holy Wars theme and why the book was writtenApplication Holy Wars theme and why the book was written
Application Holy Wars theme and why the book was written
William Hall
 
Homeschooling Children with Down Syndrome
Homeschooling Children with Down SyndromeHomeschooling Children with Down Syndrome
Homeschooling Children with Down Syndrome
amongtheblessed
 
Soil experiment
Soil experimentSoil experiment
Soil experiment
newham5-6
 
Aug presentation to nyp phyisotherapy jun 2011 distribution
Aug presentation to nyp phyisotherapy jun 2011   distributionAug presentation to nyp phyisotherapy jun 2011   distribution
Aug presentation to nyp phyisotherapy jun 2011 distribution
spastudent
 
40th TOP500 List and Awarding Session
40th TOP500 List and Awarding Session40th TOP500 List and Awarding Session
40th TOP500 List and Awarding Session
top500
 
Girisimciler icin PR
Girisimciler icin PRGirisimciler icin PR
Girisimciler icin PR
Merve Guner
 
Seafield Resources Ltd (TSX-V: SFF) - November 2011
Seafield Resources Ltd (TSX-V: SFF) - November 2011Seafield Resources Ltd (TSX-V: SFF) - November 2011
Seafield Resources Ltd (TSX-V: SFF) - November 2011
sffresources
 
Top500 Slides for June 2014
Top500 Slides for June 2014Top500 Slides for June 2014
Top500 Slides for June 2014
top500
 
Rivero claudia mabel 3 con video
Rivero claudia mabel 3 con videoRivero claudia mabel 3 con video
Rivero claudia mabel 3 con video
claudiariveroisg
 
13 decomposição de um número em fatores primos
13 decomposição de um número em fatores primos13 decomposição de um número em fatores primos
13 decomposição de um número em fatores primos
Carla Gomes
 
Greg Klassen - Annual Public Meeting - Oct. 3, 2011 - EN
Greg Klassen - Annual Public Meeting - Oct. 3, 2011 - ENGreg Klassen - Annual Public Meeting - Oct. 3, 2011 - EN
Greg Klassen - Annual Public Meeting - Oct. 3, 2011 - EN
ctc-cct
 
M. Kachniewska: Wisła – wspólna sprawa
M. Kachniewska: Wisła – wspólna sprawaM. Kachniewska: Wisła – wspólna sprawa
M. Kachniewska: Wisła – wspólna sprawa
Magdalena Kachniewska
 

Viewers also liked (20)

Dear son dear_daughter
Dear son dear_daughterDear son dear_daughter
Dear son dear_daughter
 
Potrzeby współczesnego prosumenta jako determinanta rozwoju nowych narzędzi k...
Potrzeby współczesnego prosumenta jako determinanta rozwoju nowych narzędzi k...Potrzeby współczesnego prosumenta jako determinanta rozwoju nowych narzędzi k...
Potrzeby współczesnego prosumenta jako determinanta rozwoju nowych narzędzi k...
 
La nuova società italiana trasforma i lavoratori in schiavi.
La nuova società italiana trasforma i lavoratori in schiavi.La nuova società italiana trasforma i lavoratori in schiavi.
La nuova società italiana trasforma i lavoratori in schiavi.
 
Curricularesprimerainf
CurricularesprimerainfCurricularesprimerainf
Curricularesprimerainf
 
Failing to learn from Australia’s most successful defence project
Failing to learn from Australia’s most successful defence projectFailing to learn from Australia’s most successful defence project
Failing to learn from Australia’s most successful defence project
 
Yorkshire Presentation
Yorkshire PresentationYorkshire Presentation
Yorkshire Presentation
 
Critical issues-in-disaster-science-and-management a dialogue between researc...
Critical issues-in-disaster-science-and-management a dialogue between researc...Critical issues-in-disaster-science-and-management a dialogue between researc...
Critical issues-in-disaster-science-and-management a dialogue between researc...
 
Application Holy Wars theme and why the book was written
Application Holy Wars theme and why the book was writtenApplication Holy Wars theme and why the book was written
Application Holy Wars theme and why the book was written
 
Homeschooling Children with Down Syndrome
Homeschooling Children with Down SyndromeHomeschooling Children with Down Syndrome
Homeschooling Children with Down Syndrome
 
Voorleeskwartierklasjecircus
VoorleeskwartierklasjecircusVoorleeskwartierklasjecircus
Voorleeskwartierklasjecircus
 
Soil experiment
Soil experimentSoil experiment
Soil experiment
 
Aug presentation to nyp phyisotherapy jun 2011 distribution
Aug presentation to nyp phyisotherapy jun 2011   distributionAug presentation to nyp phyisotherapy jun 2011   distribution
Aug presentation to nyp phyisotherapy jun 2011 distribution
 
40th TOP500 List and Awarding Session
40th TOP500 List and Awarding Session40th TOP500 List and Awarding Session
40th TOP500 List and Awarding Session
 
Girisimciler icin PR
Girisimciler icin PRGirisimciler icin PR
Girisimciler icin PR
 
Seafield Resources Ltd (TSX-V: SFF) - November 2011
Seafield Resources Ltd (TSX-V: SFF) - November 2011Seafield Resources Ltd (TSX-V: SFF) - November 2011
Seafield Resources Ltd (TSX-V: SFF) - November 2011
 
Top500 Slides for June 2014
Top500 Slides for June 2014Top500 Slides for June 2014
Top500 Slides for June 2014
 
Rivero claudia mabel 3 con video
Rivero claudia mabel 3 con videoRivero claudia mabel 3 con video
Rivero claudia mabel 3 con video
 
13 decomposição de um número em fatores primos
13 decomposição de um número em fatores primos13 decomposição de um número em fatores primos
13 decomposição de um número em fatores primos
 
Greg Klassen - Annual Public Meeting - Oct. 3, 2011 - EN
Greg Klassen - Annual Public Meeting - Oct. 3, 2011 - ENGreg Klassen - Annual Public Meeting - Oct. 3, 2011 - EN
Greg Klassen - Annual Public Meeting - Oct. 3, 2011 - EN
 
M. Kachniewska: Wisła – wspólna sprawa
M. Kachniewska: Wisła – wspólna sprawaM. Kachniewska: Wisła – wspólna sprawa
M. Kachniewska: Wisła – wspólna sprawa
 

Similar to Edinburgh

They need either one Manually easy or Hard1. Go to dnschecker..docx
They need either one Manually easy or Hard1. Go to dnschecker..docxThey need either one Manually easy or Hard1. Go to dnschecker..docx
They need either one Manually easy or Hard1. Go to dnschecker..docx
randymartin91030
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
jaymemcree
 
Fast and Good: Alternate Approaches to Quality at Etsy - STPCon fall 2011
Fast and Good: Alternate Approaches to Quality at Etsy - STPCon fall 2011Fast and Good: Alternate Approaches to Quality at Etsy - STPCon fall 2011
Fast and Good: Alternate Approaches to Quality at Etsy - STPCon fall 2011
Noah Sussman
 
Ajax to the Moon
Ajax to the MoonAjax to the Moon
Ajax to the Moon
davejohnson
 
Fix me if you can - DrupalCon prague
Fix me if you can - DrupalCon pragueFix me if you can - DrupalCon prague
Fix me if you can - DrupalCon prague
hernanibf
 
Java application security the hard way - a workshop for the serious developer
Java application security the hard way - a workshop for the serious developerJava application security the hard way - a workshop for the serious developer
Java application security the hard way - a workshop for the serious developer
Steve Poole
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
North Texas Chapter of the ISSA
 
Secure pl-sql-coding
Secure pl-sql-codingSecure pl-sql-coding
Secure pl-sql-coding
Trần Bình Hậu
 
Abusing "Accepted Risk" With 3rd Party C2 - HackMiamiCon5
Abusing "Accepted Risk" With 3rd Party C2 - HackMiamiCon5Abusing "Accepted Risk" With 3rd Party C2 - HackMiamiCon5
Abusing "Accepted Risk" With 3rd Party C2 - HackMiamiCon5
sixdub
 
Recent Trends in Cyber Security
Recent Trends in Cyber SecurityRecent Trends in Cyber Security
Recent Trends in Cyber Security
Ayoma Wijethunga
 
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
Allison Miller
 
LogLogic SQL Server Hacking DBs April09
LogLogic SQL Server Hacking DBs April09LogLogic SQL Server Hacking DBs April09
LogLogic SQL Server Hacking DBs April09
Mark Ginnebaugh
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Nipun Jaswal
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
Christian Heilmann
 
Cheapass.in — presented at JSFoo 2016
Cheapass.in — presented at JSFoo 2016Cheapass.in — presented at JSFoo 2016
Cheapass.in — presented at JSFoo 2016
Aakash Goel
 
Owasp top 10 web application security hazards - Part 1
Owasp top 10 web application security hazards - Part 1Owasp top 10 web application security hazards - Part 1
Owasp top 10 web application security hazards - Part 1
Abhinav Sejpal
 
Webstock Workshop: Creating Simple
Webstock Workshop: Creating SimpleWebstock Workshop: Creating Simple
Webstock Workshop: Creating Simple
Daniel Burka
 
So you want to be a red teamer
So you want to be a red teamerSo you want to be a red teamer
So you want to be a red teamer
Jorge Orchilles
 
Oracle database threats - LAOUC Webinar
Oracle database threats - LAOUC WebinarOracle database threats - LAOUC Webinar
Oracle database threats - LAOUC Webinar
Osama Mustafa
 
Intro to Php Security
Intro to Php SecurityIntro to Php Security
Intro to Php Security
Dave Ross
 

Similar to Edinburgh (20)

They need either one Manually easy or Hard1. Go to dnschecker..docx
They need either one Manually easy or Hard1. Go to dnschecker..docxThey need either one Manually easy or Hard1. Go to dnschecker..docx
They need either one Manually easy or Hard1. Go to dnschecker..docx
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
 
Fast and Good: Alternate Approaches to Quality at Etsy - STPCon fall 2011
Fast and Good: Alternate Approaches to Quality at Etsy - STPCon fall 2011Fast and Good: Alternate Approaches to Quality at Etsy - STPCon fall 2011
Fast and Good: Alternate Approaches to Quality at Etsy - STPCon fall 2011
 
Ajax to the Moon
Ajax to the MoonAjax to the Moon
Ajax to the Moon
 
Fix me if you can - DrupalCon prague
Fix me if you can - DrupalCon pragueFix me if you can - DrupalCon prague
Fix me if you can - DrupalCon prague
 
Java application security the hard way - a workshop for the serious developer
Java application security the hard way - a workshop for the serious developerJava application security the hard way - a workshop for the serious developer
Java application security the hard way - a workshop for the serious developer
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 
Secure pl-sql-coding
Secure pl-sql-codingSecure pl-sql-coding
Secure pl-sql-coding
 
Abusing "Accepted Risk" With 3rd Party C2 - HackMiamiCon5
Abusing "Accepted Risk" With 3rd Party C2 - HackMiamiCon5Abusing "Accepted Risk" With 3rd Party C2 - HackMiamiCon5
Abusing "Accepted Risk" With 3rd Party C2 - HackMiamiCon5
 
Recent Trends in Cyber Security
Recent Trends in Cyber SecurityRecent Trends in Cyber Security
Recent Trends in Cyber Security
 
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
 
LogLogic SQL Server Hacking DBs April09
LogLogic SQL Server Hacking DBs April09LogLogic SQL Server Hacking DBs April09
LogLogic SQL Server Hacking DBs April09
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
Cheapass.in — presented at JSFoo 2016
Cheapass.in — presented at JSFoo 2016Cheapass.in — presented at JSFoo 2016
Cheapass.in — presented at JSFoo 2016
 
Owasp top 10 web application security hazards - Part 1
Owasp top 10 web application security hazards - Part 1Owasp top 10 web application security hazards - Part 1
Owasp top 10 web application security hazards - Part 1
 
Webstock Workshop: Creating Simple
Webstock Workshop: Creating SimpleWebstock Workshop: Creating Simple
Webstock Workshop: Creating Simple
 
So you want to be a red teamer
So you want to be a red teamerSo you want to be a red teamer
So you want to be a red teamer
 
Oracle database threats - LAOUC Webinar
Oracle database threats - LAOUC WebinarOracle database threats - LAOUC Webinar
Oracle database threats - LAOUC Webinar
 
Intro to Php Security
Intro to Php SecurityIntro to Php Security
Intro to Php Security
 

Recently uploaded

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

Edinburgh

  • 1. Colin McLean Lecturer in Ethical Hacking
  • 2.  This is a stand-alone environment.  Seeing attacks makes a difference!  Please don’t try any of this at home!  PS Adam is a 4th year Ethical Hacking student at Abertay.
  • 3. Installed On my PC. Adam will try to hack it.. Installed On my PC. Adam will try to hack it..
  • 4. And generally not as well defended.
  • 5. Web server Web app Web app Web app Web app transport DB DB App server (optional) Web client: IE, Firefox, Opera, etc. HTTP response (HTML, JavaScript, VBScript, etc.) HTTP request Clear- text or SSL • Apache • IIS • Netscape • etc. • ColdFusion • Oracle 9iAS • GlassFish • etc. • Perl • C++ • CGI • Java • ASP • PHP • etc. • ADO • ODBC • JDBC • etc. • Oracle • SQL Server • etc. • AJP • IIOP • etc.
  • 6. Web server Web app Web app Web app Web app transport DB DB App server (optional)
  • 7.  Entering Colin and test gives a SQL query similar to the following: - $query = "SELECT * FROM accounts WHERE username=‘Colin' AND password=‘test’;  PROBLEM: - Often there is no filtering of input meaning that a hacker can inject CODE. Typical Code $username = $_REQUEST["username"]; $password = $_REQUEST["password"]; $query = "SELECT * FROM accounts WHERE username='$username' AND password='$password';
  • 8.  Entering blah ‘OR 1=1#  In MYSQL, “#” is a comment. $query = SELECT * FROM accounts WHERE username= '$username' AND password= '$password';  Gives $query = SELECT * FROM accounts WHERE username= ‘blah' OR 1=1# password= ''  Effectively $query = SELECT * FROM accounts WHERE username= ‘blah' OR 1=1
  • 9.  HacmeBank has an SQL injection flaw.  Adam is currently trying to do as much as damage as he can by exploiting this flaw....  “SQLMAP” tool as used by hacking groups.
  • 10. login_id password user_name JV JV789 Joe Vilella JM jm789 John Mathew JC jc789 Jane Chris
  • 11. Abertay Ethical Hacking Group user_id branch curren cy account_no account_type creation_date balance_amount 1 Texas-Remington Circle USD 5204320422040000 Platinum Jun 14 2005 1:29AM 16779 1 Texas-Remington Circle USD 5204320422040000 Silver Jun 14 2005 1:29AM 8145 2 Mahnattan - New york USD 5204320422040000 Silver Sep 14 2005 1:29AM 8555 2 Mahnattan - New York USD 5204320422040000 Platinum Sep 12 2005 1:23AM 91000 3L A-Hoston Road USD 5204320422040000 Platinum Jun 14 2005 1:29AM 4800 3L A-Hoston Road USD 5204320422040000 Silver Jun 14 2005 1:29AM 5100 3 Buston-Richadson Avenue USD 5204320422040000 Platinum Jun 14 2005 1:29AM 7600 3 Buston-Richadson Avenue USD 5204320422040000 Silver Jun 14 2005 1:29AM 1200 2 Mahnattan - New York USD 5204320422040000 Gold Oct 12 2005 1:23AM 850 Transactions tableTransactions table
  • 12.  Gain a “shell” on the victims PC.  Stop firewall  Deface Web site  Could also publish database on the Internet.
  • 13.  Reputation?  Compensation?  Could be devastating for the company.
  • 14.
  • 15.  Approximately 3 lines of code..  AWARENESS.  Only one of many Web flaws.  A1-Injection  A2-Broken Authentication and Session Management  A3-Cross-Site Scripting (XSS)  A4- Insecure Direct Object References  A5-Security Misconfiguration  A6-Sensitive Data Exposure  A7-Missing Function Level Access Control  A8-Cross-Site Request Forgery (CSRF)  A9-Using Components with Known Vulnerabilities  A10-Unvalidated Redirects and Forwards .  ..etc
  • 16. We are all vulnerable. No such thing as a “dumb user”.
  • 17.  Relies on victim clicking on a link (e.g. E-Mail, Google search .....etc).  Hackers success against a company can be greatly increased using targeting users.  E.g. Might not be easy to get an accountant to click on any old link....but...
  • 18.
  • 19.  Get user to visit a page...  Issue commands from the menu.
  • 20. This is many users view of what a trojan is... This is many users view of what a trojan is...
  • 21.  Install... ◦ Visit the wrong web page/install the wrong software/Someone gets on your PC.  Anti-virus can be evaded relatively easily.  The ultimate hack.
  • 22.
  • 23. Unpatched / Downloaded.. How dangerous? Unpatched / Downloaded.. How dangerous? • This demo applies to “out of date” software or packages downloaded from the Internet. • If a flaw isn’t fixed then this is what can happen.
  • 24.  Technical controls can help greatly but  Developers/Networking staff/IT Staff/User awareness is a major mitigation.  Most modern hacking attacks require user “help”.
  • 25.  Awareness training @ Abertay Uni... ◦ Pen Testing & Vulnerability Assessment (2 days) ◦ Security awareness for users (1/2 day) ◦ Web Security testing (2 days) ◦ Security Awareness for Managers (1/2 day) ◦ Secure Coding (1 day) ◦ Wireless security (1 day) ◦ Intro to Digital Forensics (2 days) ◦ Network Forensics (2 days).  In our Ethical Hacking lab or in your company.