about backtrack
DESCRIPTION
Basic usage of backtrack by carpedm20TRANSCRIPT
![Page 1: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/1.jpg)
김태훈
![Page 2: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/2.jpg)
1단계
• 독창적 해킹 추구
• (I'll be a cool hacker)
2단계
• 근원 추구의 자연스러운 연마
• (Return to the root)
3단계
• 노는 물이 달라진다
• (Level up)
4단계
• 혁신적 기술 전이를 선도
• (Lead to the paradigm change)
5단계
• 멋진 스포츠카와 멋진 여자친구
• (What a cool life!)
해커의발전과정
![Page 3: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/3.jpg)
Backtrack = Hacking Machine
![Page 4: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/4.jpg)
Backtrack = Hacking Machine
![Page 5: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/5.jpg)
Pentest = Penetration Test
A method of evaluating the security of a computer system or network by simulating an attack from malicious outsiders (who do not have an authorized means of accessing the organization's systems) and malicious insiders (who have some level of authorized access)
인가 받은 해킹 전담 컨설턴트에 의해 외부 또는 내부 네트워크상에서 대상 서비스와 서버에 대해 실제 해커가 사용하는 해킹 도구와 기법 등을 이용하여 정보 시스템으로의 침투 가능성을 진단하는 선의의 해킹(ethical hacking)
![Page 6: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/6.jpg)
1단계• 정보 수집
• 스캐닝
2단계• 목록화
• 취약점 공격
• 사용자 계정 탈취 -> 권한 상승
3단계•백도어
•서비스 거부
공격
해킹방법론
![Page 7: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/7.jpg)
VMware = Virtual Machine
![Page 8: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/8.jpg)
Vmware Workstation
![Page 9: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/9.jpg)
Vmware Workstation
![Page 10: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/10.jpg)
Vmware - Network
타겟 : 본인 컴퓨터, 다른 Vmware OS
![Page 11: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/11.jpg)
Vmware - Network
타겟 : 공유기 연결된 컴퓨터
![Page 12: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/12.jpg)
Vmware – Network settings
![Page 13: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/13.jpg)
Backtrack 5
Login : rootPassword : toor
startx
![Page 14: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/14.jpg)
Backtrack 5
![Page 15: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/15.jpg)
Backtrack 5
![Page 16: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/16.jpg)
Backtrack 5 – Network Settings
![Page 17: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/17.jpg)
Backtrack 5 – Network Settings
![Page 18: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/18.jpg)
Backtrack 5 – Network Settings
![Page 19: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/19.jpg)
Backtrack 5 – 정보수집& 스캐닝
![Page 20: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/20.jpg)
UNIST Network
• 도서관 : 10.12.10-12.*
• 무선랜 : 10.64.144-129.*
• 기숙사 : 10.36-38.*.*
• 공학관 : 10.20.14.*
![Page 21: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/21.jpg)
Metasploit - 취약점공격
![Page 22: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/22.jpg)
Metasploit
search use exploit/set payloads
& optionsexploit
타겟의 취약점을 분석ex) nmap, nessus
사용할 공격코드 선택
공격 후 통신 방법 선택
GAME OVER
![Page 23: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/23.jpg)
Metasploit - Search
![Page 24: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/24.jpg)
Metasploit – info command
![Page 25: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/25.jpg)
Metasploit – 통신프로그램생성
![Page 26: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/26.jpg)
Metasploit – 사회공학기법
![Page 27: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/27.jpg)
Metasploit – use exploit, set payloads, exploit
check 사용 가능
![Page 28: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/28.jpg)
Metasploit
![Page 29: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/29.jpg)
Metasploit
![Page 30: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/30.jpg)
SET – Social Engineering Toolkit
![Page 31: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/31.jpg)
Nessus – search for weak point
![Page 32: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/32.jpg)
Nessus – search for weak point
![Page 33: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/33.jpg)
aircrack-ng
![Page 34: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/34.jpg)
www.hackingdna.com
![Page 35: About Backtrack](https://reader035.vdocuments.site/reader035/viewer/2022062320/55935b651a28ab24478b45f7/html5/thumbnails/35.jpg)
Metasploit Megaprimer – Video Lecture