SlideShare a Scribd company logo
Network
Exploitation
September 26 2018
Get Involved
● Discord - discord.gg/kuejt8p
● Fire Talks - October 24th, 2018
● Live Stream - Whenever you want*
● CSG CTF - ctf.utdcsg.club
Events
● The Assembly Group - Wednesday @ 8:15 pm in ECSS 2.201
● 0DAYALLDAY Research Event - September 29 @ 11 AM off
campus
● Dallas Hackers Association - October 3 @ 7 pm off campus
Overview
● Types of Networks
● Types of Network Environments
● Internal VS External
● Enumeration
● Tools
● Attack Routing
● Demo
Types of Networks
Local Area Network (LAN) - Internal network of computers inside of a building or a small
land mass
Wide Area Network (WAN) - External network of computers connected miles apart from
each other
Metropolitan Area Network (MAN) - A network of computers in a metropolitan area
usually a city.
Types of Network Environments
● Corporate - A network consisting of users, servers, and a domain
controller (usually)
● Personal - A home network consisting of a user, router, and
sometimes a switch (usually)
Internal VS External Networks
● Local Area Networks are internal networks in an organisation or home that can
communicate with each other through a router or switch
● Wide Area Networks are external networks that must go through a larger
datacenter or internet service provider to communicate with other computers
● Exploiting external networks allows you to gain access to someone’s internal
network if you are not attacking from within the LAN already
● This gives you more options to pivot and gather information because you have a
larger attack surface
Where are we in the network?
What is our goal?
Network Enumeration
External Enumeration
● Open Ports
● Running Services
○ RDP, VPN, RPC, VNC, SSH
● Web portals
○ Ports 80,443
● Anything that can allow us to get
into the network
Internal Enumeration
● Find Users/Hosts
● Exploitable Services
● Internal Web portals
● Anything that will give you more
information and pivot around the
network
Tools
● NMap - Network scanning tool that allows you to see services
and ports that are running
○ Nmap -sC -sV -oA output IPADDRESS
● Nessus - Vulnerability and Services scanning tool (Very heavy
not very stealthy)
Attack Routing
● Routing external attacks through internal network for more
surface
● Ability to pivot through a network from a external machine
Now time for the demo...

More Related Content

What's hot

Trade union AND ITS GROWTH AND EVOLUTION IN INDIA
Trade union AND ITS GROWTH AND EVOLUTION IN INDIA Trade union AND ITS GROWTH AND EVOLUTION IN INDIA
Trade union AND ITS GROWTH AND EVOLUTION IN INDIA
sourav mathur
 
Industrial Relations
Industrial RelationsIndustrial Relations
Industrial Relations
Annamalai University
 
Trade unionism
Trade unionismTrade unionism
Trade unionism
PoojaSharma1336
 
Employers' association final
Employers' association finalEmployers' association final
Employers' association final
Nishu Jindal
 
7. Values-2-c-converted.pdf
7. Values-2-c-converted.pdf7. Values-2-c-converted.pdf
7. Values-2-c-converted.pdf
SaiprasannaMudiraj1
 
industrial democracy
industrial democracyindustrial democracy
industrial democracy
Brijesh Kumar
 
Industrial Relations (Chapter 1: Introduction)
Industrial Relations (Chapter 1: Introduction)Industrial Relations (Chapter 1: Introduction)
Industrial Relations (Chapter 1: Introduction)
Masum Hussain
 
New industrial policy 1991
New industrial policy 1991New industrial policy 1991
New industrial policy 1991
yaman kaushik
 
Organizational behavior
Organizational behaviorOrganizational behavior
Organizational behavior
nihad341
 
Collective bargaining in India
Collective bargaining in IndiaCollective bargaining in India
Collective bargaining in India
MOHAMMED IMRAN
 
Industrial Relations
Industrial RelationsIndustrial Relations
Industrial Relations
Sharad Reddy
 
Globalization and human resource challenges
Globalization and human resource challengesGlobalization and human resource challenges
Globalization and human resource challenges
Sana Hassan Afridi
 
Introduction to commerce
Introduction to commerceIntroduction to commerce
Introduction to commerce
sowndarya shree
 
INDIAN NATIONAL TRADE UNION CONGRESS
INDIAN NATIONAL TRADE UNION CONGRESSINDIAN NATIONAL TRADE UNION CONGRESS
INDIAN NATIONAL TRADE UNION CONGRESS
jayanti saxena
 
Compensation management Question paper for assignments
Compensation management Question paper for assignmentsCompensation management Question paper for assignments
Compensation management Question paper for assignments
Al-Qurmoshi Institute of Business Management, Hyderabad
 
Trade Union
Trade UnionTrade Union
Trade Union
Sumant Singh
 
Workers participation in management
Workers participation in management Workers participation in management
Workers participation in management
parags06
 
What benefits are of greatest value to employees and to the organization? Why?
What benefits are of greatest value to employees and to the organization? Why?What benefits are of greatest value to employees and to the organization? Why?
What benefits are of greatest value to employees and to the organization? Why?
Dhrumil Shah
 
Industrial relation
Industrial relationIndustrial relation
Industrial relation
anuse
 
Settlement of industrial dispute between employer and employee
Settlement of industrial dispute between employer and employeeSettlement of industrial dispute between employer and employee
Settlement of industrial dispute between employer and employee
Altacit Global
 

What's hot (20)

Trade union AND ITS GROWTH AND EVOLUTION IN INDIA
Trade union AND ITS GROWTH AND EVOLUTION IN INDIA Trade union AND ITS GROWTH AND EVOLUTION IN INDIA
Trade union AND ITS GROWTH AND EVOLUTION IN INDIA
 
Industrial Relations
Industrial RelationsIndustrial Relations
Industrial Relations
 
Trade unionism
Trade unionismTrade unionism
Trade unionism
 
Employers' association final
Employers' association finalEmployers' association final
Employers' association final
 
7. Values-2-c-converted.pdf
7. Values-2-c-converted.pdf7. Values-2-c-converted.pdf
7. Values-2-c-converted.pdf
 
industrial democracy
industrial democracyindustrial democracy
industrial democracy
 
Industrial Relations (Chapter 1: Introduction)
Industrial Relations (Chapter 1: Introduction)Industrial Relations (Chapter 1: Introduction)
Industrial Relations (Chapter 1: Introduction)
 
New industrial policy 1991
New industrial policy 1991New industrial policy 1991
New industrial policy 1991
 
Organizational behavior
Organizational behaviorOrganizational behavior
Organizational behavior
 
Collective bargaining in India
Collective bargaining in IndiaCollective bargaining in India
Collective bargaining in India
 
Industrial Relations
Industrial RelationsIndustrial Relations
Industrial Relations
 
Globalization and human resource challenges
Globalization and human resource challengesGlobalization and human resource challenges
Globalization and human resource challenges
 
Introduction to commerce
Introduction to commerceIntroduction to commerce
Introduction to commerce
 
INDIAN NATIONAL TRADE UNION CONGRESS
INDIAN NATIONAL TRADE UNION CONGRESSINDIAN NATIONAL TRADE UNION CONGRESS
INDIAN NATIONAL TRADE UNION CONGRESS
 
Compensation management Question paper for assignments
Compensation management Question paper for assignmentsCompensation management Question paper for assignments
Compensation management Question paper for assignments
 
Trade Union
Trade UnionTrade Union
Trade Union
 
Workers participation in management
Workers participation in management Workers participation in management
Workers participation in management
 
What benefits are of greatest value to employees and to the organization? Why?
What benefits are of greatest value to employees and to the organization? Why?What benefits are of greatest value to employees and to the organization? Why?
What benefits are of greatest value to employees and to the organization? Why?
 
Industrial relation
Industrial relationIndustrial relation
Industrial relation
 
Settlement of industrial dispute between employer and employee
Settlement of industrial dispute between employer and employeeSettlement of industrial dispute between employer and employee
Settlement of industrial dispute between employer and employee
 

Similar to Network Exploitation

An EyeWitness View into your Network
An EyeWitness View into your NetworkAn EyeWitness View into your Network
An EyeWitness View into your Network
CTruncer
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
Rubal Sagwal
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
Rubal Sagwal
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
Issar Kapadia
 
CISSP Week 7
CISSP Week 7CISSP Week 7
CISSP Week 7
jemtallon
 
Network Penetration Testing
Network Penetration TestingNetwork Penetration Testing
Network Penetration Testing
Mohammed Adam
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
cemporku
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
tehkotak4
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
AmitDeshai
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Boston Institute of Analytics
 
computer network introduction. psc notes . Assisant professor in cse.
computer network introduction. psc notes . Assisant professor in cse.computer network introduction. psc notes . Assisant professor in cse.
computer network introduction. psc notes . Assisant professor in cse.
bushraphd2022
 
Training ppt
Training pptTraining ppt
Training ppt
Anamika Singh
 
Defensive information warfare on open platforms
Defensive information warfare on open platformsDefensive information warfare on open platforms
Defensive information warfare on open platforms
Ben Tullis
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
talkaton
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
talkaton
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
KAMALI PRIYA P
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
Shah Sheikh
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
karthikvcyber
 
ManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical OverviewManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical Overview
ManageEngine, Zoho Corporation
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
HoneyKumar34
 

Similar to Network Exploitation (20)

An EyeWitness View into your Network
An EyeWitness View into your NetworkAn EyeWitness View into your Network
An EyeWitness View into your Network
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
CISSP Week 7
CISSP Week 7CISSP Week 7
CISSP Week 7
 
Network Penetration Testing
Network Penetration TestingNetwork Penetration Testing
Network Penetration Testing
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
 
computer network introduction. psc notes . Assisant professor in cse.
computer network introduction. psc notes . Assisant professor in cse.computer network introduction. psc notes . Assisant professor in cse.
computer network introduction. psc notes . Assisant professor in cse.
 
Training ppt
Training pptTraining ppt
Training ppt
 
Defensive information warfare on open platforms
Defensive information warfare on open platformsDefensive information warfare on open platforms
Defensive information warfare on open platforms
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
ManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical OverviewManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical Overview
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 

More from UTD Computer Security Group

Py jail talk
Py jail talkPy jail talk
22S kickoff 2.0 (kickoff + anonymity talk)
22S kickoff 2.0 (kickoff + anonymity talk)22S kickoff 2.0 (kickoff + anonymity talk)
22S kickoff 2.0 (kickoff + anonymity talk)
UTD Computer Security Group
 
Cloud talk
Cloud talkCloud talk
UTD Computer Security Group - Cracking the domain
UTD Computer Security Group - Cracking the domainUTD Computer Security Group - Cracking the domain
UTD Computer Security Group - Cracking the domain
UTD Computer Security Group
 
Forensics audio and video
Forensics   audio and videoForensics   audio and video
Forensics audio and video
UTD Computer Security Group
 
Computer networks and network security
Computer networks and network securityComputer networks and network security
Computer networks and network security
UTD Computer Security Group
 
Intro to python
Intro to pythonIntro to python
Powershell crash course
Powershell crash coursePowershell crash course
Powershell crash course
UTD Computer Security Group
 
Intro to cybersecurity
Intro to cybersecurityIntro to cybersecurity
Intro to cybersecurity
UTD Computer Security Group
 
Intro to Bash
Intro to BashIntro to Bash
Web Exploitation
Web ExploitationWeb Exploitation
Web Exploitation
UTD Computer Security Group
 
Penetration Testing: Celestial
Penetration Testing: CelestialPenetration Testing: Celestial
Penetration Testing: Celestial
UTD Computer Security Group
 
Introduction to Exploitation
Introduction to ExploitationIntroduction to Exploitation
Introduction to Exploitation
UTD Computer Security Group
 
Cryptography Crash Course
Cryptography Crash CourseCryptography Crash Course
Cryptography Crash Course
UTD Computer Security Group
 
Fuzzing - Part 2
Fuzzing - Part 2Fuzzing - Part 2
Fuzzing - Part 2
UTD Computer Security Group
 
Exploitation Crash Course
Exploitation Crash CourseExploitation Crash Course
Exploitation Crash Course
UTD Computer Security Group
 
Fuzzing - Part 1
Fuzzing - Part 1Fuzzing - Part 1
Fuzzing - Part 1
UTD Computer Security Group
 
Protostar VM - Heap3
Protostar VM - Heap3Protostar VM - Heap3
Protostar VM - Heap3
UTD Computer Security Group
 
Heap Base Exploitation
Heap Base ExploitationHeap Base Exploitation
Heap Base Exploitation
UTD Computer Security Group
 
Return Oriented Programming
Return Oriented ProgrammingReturn Oriented Programming
Return Oriented Programming
UTD Computer Security Group
 

More from UTD Computer Security Group (20)

Py jail talk
Py jail talkPy jail talk
Py jail talk
 
22S kickoff 2.0 (kickoff + anonymity talk)
22S kickoff 2.0 (kickoff + anonymity talk)22S kickoff 2.0 (kickoff + anonymity talk)
22S kickoff 2.0 (kickoff + anonymity talk)
 
Cloud talk
Cloud talkCloud talk
Cloud talk
 
UTD Computer Security Group - Cracking the domain
UTD Computer Security Group - Cracking the domainUTD Computer Security Group - Cracking the domain
UTD Computer Security Group - Cracking the domain
 
Forensics audio and video
Forensics   audio and videoForensics   audio and video
Forensics audio and video
 
Computer networks and network security
Computer networks and network securityComputer networks and network security
Computer networks and network security
 
Intro to python
Intro to pythonIntro to python
Intro to python
 
Powershell crash course
Powershell crash coursePowershell crash course
Powershell crash course
 
Intro to cybersecurity
Intro to cybersecurityIntro to cybersecurity
Intro to cybersecurity
 
Intro to Bash
Intro to BashIntro to Bash
Intro to Bash
 
Web Exploitation
Web ExploitationWeb Exploitation
Web Exploitation
 
Penetration Testing: Celestial
Penetration Testing: CelestialPenetration Testing: Celestial
Penetration Testing: Celestial
 
Introduction to Exploitation
Introduction to ExploitationIntroduction to Exploitation
Introduction to Exploitation
 
Cryptography Crash Course
Cryptography Crash CourseCryptography Crash Course
Cryptography Crash Course
 
Fuzzing - Part 2
Fuzzing - Part 2Fuzzing - Part 2
Fuzzing - Part 2
 
Exploitation Crash Course
Exploitation Crash CourseExploitation Crash Course
Exploitation Crash Course
 
Fuzzing - Part 1
Fuzzing - Part 1Fuzzing - Part 1
Fuzzing - Part 1
 
Protostar VM - Heap3
Protostar VM - Heap3Protostar VM - Heap3
Protostar VM - Heap3
 
Heap Base Exploitation
Heap Base ExploitationHeap Base Exploitation
Heap Base Exploitation
 
Return Oriented Programming
Return Oriented ProgrammingReturn Oriented Programming
Return Oriented Programming
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 

Network Exploitation

  • 2. Get Involved ● Discord - discord.gg/kuejt8p ● Fire Talks - October 24th, 2018 ● Live Stream - Whenever you want* ● CSG CTF - ctf.utdcsg.club
  • 3. Events ● The Assembly Group - Wednesday @ 8:15 pm in ECSS 2.201 ● 0DAYALLDAY Research Event - September 29 @ 11 AM off campus ● Dallas Hackers Association - October 3 @ 7 pm off campus
  • 4. Overview ● Types of Networks ● Types of Network Environments ● Internal VS External ● Enumeration ● Tools ● Attack Routing ● Demo
  • 5. Types of Networks Local Area Network (LAN) - Internal network of computers inside of a building or a small land mass Wide Area Network (WAN) - External network of computers connected miles apart from each other Metropolitan Area Network (MAN) - A network of computers in a metropolitan area usually a city.
  • 6. Types of Network Environments ● Corporate - A network consisting of users, servers, and a domain controller (usually) ● Personal - A home network consisting of a user, router, and sometimes a switch (usually)
  • 7. Internal VS External Networks ● Local Area Networks are internal networks in an organisation or home that can communicate with each other through a router or switch ● Wide Area Networks are external networks that must go through a larger datacenter or internet service provider to communicate with other computers ● Exploiting external networks allows you to gain access to someone’s internal network if you are not attacking from within the LAN already ● This gives you more options to pivot and gather information because you have a larger attack surface
  • 8. Where are we in the network? What is our goal?
  • 9. Network Enumeration External Enumeration ● Open Ports ● Running Services ○ RDP, VPN, RPC, VNC, SSH ● Web portals ○ Ports 80,443 ● Anything that can allow us to get into the network Internal Enumeration ● Find Users/Hosts ● Exploitable Services ● Internal Web portals ● Anything that will give you more information and pivot around the network
  • 10. Tools ● NMap - Network scanning tool that allows you to see services and ports that are running ○ Nmap -sC -sV -oA output IPADDRESS ● Nessus - Vulnerability and Services scanning tool (Very heavy not very stealthy)
  • 11. Attack Routing ● Routing external attacks through internal network for more surface ● Ability to pivot through a network from a external machine Now time for the demo...