SlideShare a Scribd company logo
Linux small business server




PENTRATION TESTING ZENTYAL NETWORKS

         MUSSA KHONJE


 Zentyal summit – Zaragoza Oct. 4&5, 2012
Linux small business server




    Angoni Computer Security Labs ltd

                      ACSLabs

                     Mussa Khonje
                 wildfirelab@gmail.com
                    www.cehlab.com


Oct. 4th & 5th          Zentyal summit 2012                            2
Linux small business server




Born in East Africa Malawi and joined British Forces Army in year 2000
served most of the time with NATO HQ Germany as Group 6 Information
System Engineer until 2009 .Currenty studing at Staffordshire Universty
BSc in Cyber Security and Digital Forensic




   Oct. 4th & 5th             Zentyal summit 2012                            3
Linux small business server



                 WHY PENTEST NETWORK ?

 •    Protect bussines Asset
 •    Protect bussiness integrity
 •    Protecting bussiness service avalability
 •    Complant with ISO standard
 •    Protecting shareholders and public
      confidence

Oct. 4th & 5th           Zentyal summit 2012                            4
Linux small business server



         HOW IS PENTEST CONDUCTED
 •   Contract Signed Autholise PENTEST

 •   Contract might explicity NO DDOS, DOS
     imagine if PENTEST EBAY will they afford
     server down time.

 •   Redteam goes to work

Oct. 4th & 5th       Zentyal summit 2012                            5
Linux small business server



         PENTEST ZENTYAL NETWORK
 •   Stages used to conduct Pentest

 •   Reconassance [ Finding more about the
     target]

 •   Scanning [ Services offered by the target]

 •   Gain Access [ Gain privilage to the target]
Oct. 4th & 5th       Zentyal summit 2012                 6
Linux small business server



•   Maintain Access [Install a backdoor]

•   Cover Tracks [ Erase traces of being in the
    computer [Event Logs,Registry Edit]

•   Make the victim into a zombe to be used in
    attack of other computers in the network


Oct. 4th & 5th       Zentyal summit 2012                            7
Linux small business server



                  HACKERS OS
 •   Backtrack 5r3 comes with 300 + tools to be used in
     Pentration Testing and Digital Forensic
 •   Popular program used in Pentest if Metasploit
     framework




Oct. 4th & 5th           Zentyal summit 2012                            8
Linux small business server



                 TOOLS USED IN PENTEST
 •   Nmap latest version is 6.01

 •   Nessus Vulnability Scanner

 •   Metasploit Attacking Framework
          DEMONSTRATION RAPID ATTACK USING MSF




Oct. 4th & 5th              Zentyal summit 2012                            9
Linux small business server



                 DEMO HACK WINBOX



 •   This is showing tools of pentration testing
     how their are used and how MSF works .




Oct. 4th & 5th        Zentyal summit 2012                            10
Linux small business server




Oct. 4th & 5th   Zentyal summit 2012                            11
Linux small business server




Oct. 4th & 5th   Zentyal summit 2012                            12
Linux small business server




Oct. 4th & 5th   Zentyal summit 2012                            13
Linux small business server




Oct. 4th & 5th   Zentyal summit 2012                            14
Linux small business server




Oct. 4th & 5th   Zentyal summit 2012                            15
Linux small business server




Oct. 4th & 5th   Zentyal summit 2012                            16
Linux small business server




Oct. 4th & 5th   Zentyal summit 2012                            17
Linux small business server




                                                                     AN



Oct. 4th & 5th   Zentyal summit 2012                            18

More Related Content

Similar to Pentration Testing Zentyal Networks

Choosing the Right Community Linux for Your Enterprise
Choosing the Right Community Linux for Your EnterpriseChoosing the Right Community Linux for Your Enterprise
Choosing the Right Community Linux for Your Enterprise
Rogue Wave Software
 
Slides from 2010 Linux Day
Slides from 2010 Linux DaySlides from 2010 Linux Day
Slides from 2010 Linux Day
Novell
 
Uklug2011.lotus.on.linux.report.technical.edition.v1.0
Uklug2011.lotus.on.linux.report.technical.edition.v1.0Uklug2011.lotus.on.linux.report.technical.edition.v1.0
Uklug2011.lotus.on.linux.report.technical.edition.v1.0dominion
 
From Monolithic to Microservices in 45 Minutes
From Monolithic to Microservices in 45 MinutesFrom Monolithic to Microservices in 45 Minutes
From Monolithic to Microservices in 45 Minutes
MongoDB
 
RHCP_IdM_Lab_User_Guide_2015
RHCP_IdM_Lab_User_Guide_2015RHCP_IdM_Lab_User_Guide_2015
RHCP_IdM_Lab_User_Guide_2015Diaa Radwan
 
Red Hat Enterprise Linux and NFS by syedmshaaf
Red Hat Enterprise Linux and NFS by syedmshaafRed Hat Enterprise Linux and NFS by syedmshaaf
Red Hat Enterprise Linux and NFS by syedmshaaf
Syed Shaaf
 
IamLUG -- Lotus On Linux Report
IamLUG -- Lotus On Linux ReportIamLUG -- Lotus On Linux Report
IamLUG -- Lotus On Linux Report
Bill Malchisky Jr.
 
Openstack platform -Red Hat Pizza and technology event - Israel
Openstack platform -Red Hat Pizza and technology event - IsraelOpenstack platform -Red Hat Pizza and technology event - Israel
Openstack platform -Red Hat Pizza and technology event - IsraelArthur Berezin
 
Lotus on Linux Report 2010
Lotus on Linux Report 2010Lotus on Linux Report 2010
Lotus on Linux Report 2010
Bill Malchisky Jr.
 
Sutol - A Hitchhiker’s Guide to troubleshooting IBM Connections
Sutol - A Hitchhiker’s Guide to troubleshooting IBM ConnectionsSutol - A Hitchhiker’s Guide to troubleshooting IBM Connections
Sutol - A Hitchhiker’s Guide to troubleshooting IBM Connections
Sharon James
 
A Complete, Low-cost Virtual Infrastructure for Small and Medium Businesses
A Complete, Low-cost Virtual Infrastructure for Small and Medium BusinessesA Complete, Low-cost Virtual Infrastructure for Small and Medium Businesses
A Complete, Low-cost Virtual Infrastructure for Small and Medium Businesses
Novell
 
LS11 - BP105 - 12 More Things Your Mother Never Told You About Installing Lot...
LS11 - BP105 - 12 More Things Your Mother Never Told You About Installing Lot...LS11 - BP105 - 12 More Things Your Mother Never Told You About Installing Lot...
LS11 - BP105 - 12 More Things Your Mother Never Told You About Installing Lot...
Stuart McIntyre
 
Open mic on what's new in domino 9 social edition
Open mic on what's new in domino 9 social editionOpen mic on what's new in domino 9 social edition
Open mic on what's new in domino 9 social editionsreeJk
 
RH_Summit_IdM_Lab_User_Guide_2015
RH_Summit_IdM_Lab_User_Guide_2015RH_Summit_IdM_Lab_User_Guide_2015
RH_Summit_IdM_Lab_User_Guide_2015Diaa Radwan
 
Why Upgrade To Windows Server 2012
Why Upgrade To Windows Server 2012Why Upgrade To Windows Server 2012
Why Upgrade To Windows Server 2012
Aidan Finn
 
A2 SLED Lotusday
A2 SLED LotusdayA2 SLED Lotusday
A2 SLED Lotusday
Andreas Schulte
 
2011 04 zentyal_cork
2011 04 zentyal_cork2011 04 zentyal_cork
2011 04 zentyal_cork
OpenSourceLGMA
 
Zentyal Customization (templates, hooks, LDAP)
Zentyal Customization (templates, hooks, LDAP)Zentyal Customization (templates, hooks, LDAP)
Zentyal Customization (templates, hooks, LDAP)
Carlos Pérez-Aradros
 
Openmiconwhatsnewindomino9socialedition 130411102852-phpapp01
Openmiconwhatsnewindomino9socialedition 130411102852-phpapp01Openmiconwhatsnewindomino9socialedition 130411102852-phpapp01
Openmiconwhatsnewindomino9socialedition 130411102852-phpapp01
Ranjit Rai
 
What's New in MySQL 5.6
What's New in MySQL 5.6What's New in MySQL 5.6
What's New in MySQL 5.6Santo Leto
 

Similar to Pentration Testing Zentyal Networks (20)

Choosing the Right Community Linux for Your Enterprise
Choosing the Right Community Linux for Your EnterpriseChoosing the Right Community Linux for Your Enterprise
Choosing the Right Community Linux for Your Enterprise
 
Slides from 2010 Linux Day
Slides from 2010 Linux DaySlides from 2010 Linux Day
Slides from 2010 Linux Day
 
Uklug2011.lotus.on.linux.report.technical.edition.v1.0
Uklug2011.lotus.on.linux.report.technical.edition.v1.0Uklug2011.lotus.on.linux.report.technical.edition.v1.0
Uklug2011.lotus.on.linux.report.technical.edition.v1.0
 
From Monolithic to Microservices in 45 Minutes
From Monolithic to Microservices in 45 MinutesFrom Monolithic to Microservices in 45 Minutes
From Monolithic to Microservices in 45 Minutes
 
RHCP_IdM_Lab_User_Guide_2015
RHCP_IdM_Lab_User_Guide_2015RHCP_IdM_Lab_User_Guide_2015
RHCP_IdM_Lab_User_Guide_2015
 
Red Hat Enterprise Linux and NFS by syedmshaaf
Red Hat Enterprise Linux and NFS by syedmshaafRed Hat Enterprise Linux and NFS by syedmshaaf
Red Hat Enterprise Linux and NFS by syedmshaaf
 
IamLUG -- Lotus On Linux Report
IamLUG -- Lotus On Linux ReportIamLUG -- Lotus On Linux Report
IamLUG -- Lotus On Linux Report
 
Openstack platform -Red Hat Pizza and technology event - Israel
Openstack platform -Red Hat Pizza and technology event - IsraelOpenstack platform -Red Hat Pizza and technology event - Israel
Openstack platform -Red Hat Pizza and technology event - Israel
 
Lotus on Linux Report 2010
Lotus on Linux Report 2010Lotus on Linux Report 2010
Lotus on Linux Report 2010
 
Sutol - A Hitchhiker’s Guide to troubleshooting IBM Connections
Sutol - A Hitchhiker’s Guide to troubleshooting IBM ConnectionsSutol - A Hitchhiker’s Guide to troubleshooting IBM Connections
Sutol - A Hitchhiker’s Guide to troubleshooting IBM Connections
 
A Complete, Low-cost Virtual Infrastructure for Small and Medium Businesses
A Complete, Low-cost Virtual Infrastructure for Small and Medium BusinessesA Complete, Low-cost Virtual Infrastructure for Small and Medium Businesses
A Complete, Low-cost Virtual Infrastructure for Small and Medium Businesses
 
LS11 - BP105 - 12 More Things Your Mother Never Told You About Installing Lot...
LS11 - BP105 - 12 More Things Your Mother Never Told You About Installing Lot...LS11 - BP105 - 12 More Things Your Mother Never Told You About Installing Lot...
LS11 - BP105 - 12 More Things Your Mother Never Told You About Installing Lot...
 
Open mic on what's new in domino 9 social edition
Open mic on what's new in domino 9 social editionOpen mic on what's new in domino 9 social edition
Open mic on what's new in domino 9 social edition
 
RH_Summit_IdM_Lab_User_Guide_2015
RH_Summit_IdM_Lab_User_Guide_2015RH_Summit_IdM_Lab_User_Guide_2015
RH_Summit_IdM_Lab_User_Guide_2015
 
Why Upgrade To Windows Server 2012
Why Upgrade To Windows Server 2012Why Upgrade To Windows Server 2012
Why Upgrade To Windows Server 2012
 
A2 SLED Lotusday
A2 SLED LotusdayA2 SLED Lotusday
A2 SLED Lotusday
 
2011 04 zentyal_cork
2011 04 zentyal_cork2011 04 zentyal_cork
2011 04 zentyal_cork
 
Zentyal Customization (templates, hooks, LDAP)
Zentyal Customization (templates, hooks, LDAP)Zentyal Customization (templates, hooks, LDAP)
Zentyal Customization (templates, hooks, LDAP)
 
Openmiconwhatsnewindomino9socialedition 130411102852-phpapp01
Openmiconwhatsnewindomino9socialedition 130411102852-phpapp01Openmiconwhatsnewindomino9socialedition 130411102852-phpapp01
Openmiconwhatsnewindomino9socialedition 130411102852-phpapp01
 
What's New in MySQL 5.6
What's New in MySQL 5.6What's New in MySQL 5.6
What's New in MySQL 5.6
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

Pentration Testing Zentyal Networks

  • 1. Linux small business server PENTRATION TESTING ZENTYAL NETWORKS MUSSA KHONJE Zentyal summit – Zaragoza Oct. 4&5, 2012
  • 2. Linux small business server Angoni Computer Security Labs ltd ACSLabs Mussa Khonje wildfirelab@gmail.com www.cehlab.com Oct. 4th & 5th Zentyal summit 2012 2
  • 3. Linux small business server Born in East Africa Malawi and joined British Forces Army in year 2000 served most of the time with NATO HQ Germany as Group 6 Information System Engineer until 2009 .Currenty studing at Staffordshire Universty BSc in Cyber Security and Digital Forensic Oct. 4th & 5th Zentyal summit 2012 3
  • 4. Linux small business server WHY PENTEST NETWORK ? • Protect bussines Asset • Protect bussiness integrity • Protecting bussiness service avalability • Complant with ISO standard • Protecting shareholders and public confidence Oct. 4th & 5th Zentyal summit 2012 4
  • 5. Linux small business server HOW IS PENTEST CONDUCTED • Contract Signed Autholise PENTEST • Contract might explicity NO DDOS, DOS imagine if PENTEST EBAY will they afford server down time. • Redteam goes to work Oct. 4th & 5th Zentyal summit 2012 5
  • 6. Linux small business server PENTEST ZENTYAL NETWORK • Stages used to conduct Pentest • Reconassance [ Finding more about the target] • Scanning [ Services offered by the target] • Gain Access [ Gain privilage to the target] Oct. 4th & 5th Zentyal summit 2012 6
  • 7. Linux small business server • Maintain Access [Install a backdoor] • Cover Tracks [ Erase traces of being in the computer [Event Logs,Registry Edit] • Make the victim into a zombe to be used in attack of other computers in the network Oct. 4th & 5th Zentyal summit 2012 7
  • 8. Linux small business server HACKERS OS • Backtrack 5r3 comes with 300 + tools to be used in Pentration Testing and Digital Forensic • Popular program used in Pentest if Metasploit framework Oct. 4th & 5th Zentyal summit 2012 8
  • 9. Linux small business server TOOLS USED IN PENTEST • Nmap latest version is 6.01 • Nessus Vulnability Scanner • Metasploit Attacking Framework DEMONSTRATION RAPID ATTACK USING MSF Oct. 4th & 5th Zentyal summit 2012 9
  • 10. Linux small business server DEMO HACK WINBOX • This is showing tools of pentration testing how their are used and how MSF works . Oct. 4th & 5th Zentyal summit 2012 10
  • 11. Linux small business server Oct. 4th & 5th Zentyal summit 2012 11
  • 12. Linux small business server Oct. 4th & 5th Zentyal summit 2012 12
  • 13. Linux small business server Oct. 4th & 5th Zentyal summit 2012 13
  • 14. Linux small business server Oct. 4th & 5th Zentyal summit 2012 14
  • 15. Linux small business server Oct. 4th & 5th Zentyal summit 2012 15
  • 16. Linux small business server Oct. 4th & 5th Zentyal summit 2012 16
  • 17. Linux small business server Oct. 4th & 5th Zentyal summit 2012 17
  • 18. Linux small business server AN Oct. 4th & 5th Zentyal summit 2012 18