ehitsec, cci & network pen-testing

24
Ethical Hacking IT Security, Cyber Crime Investigation & Penetration Testing Mr. Vishwesh.S.Satapute Co-Founder Cypherkode Infosec

Upload: vishwesh-satapute

Post on 13-Apr-2017

564 views

Category:

Presentations & Public Speaking


0 download

TRANSCRIPT

Page 1: EHITSec, CCI & Network Pen-Testing

Ethical Hacking IT Security, Cyber Crime Investigation & Penetration Testing

Mr. Vishwesh.S.SataputeCo-Founder Cypherkode Infosec

Page 2: EHITSec, CCI & Network Pen-Testing

#whoami Pen-Tester Trainer (OSCP).

Interested in finding loop holes in networks.

Learning some new concepts and ninja techniques.

Pursuing my BE in Computer Engineering (RGIT, Versova).

Interested in hardware hacking.

Page 3: EHITSec, CCI & Network Pen-Testing

What is Hacking?

Page 4: EHITSec, CCI & Network Pen-Testing

TYPE OF H@CK3r’SWHITE

HAT HACKE

R

BLACK HAT

HACKER

GRAYHAT

HACKER

Page 5: EHITSec, CCI & Network Pen-Testing

Hacking - Process

• Foot Printing

• Scanning

• Gaining Access

• Maintaining Access

Page 6: EHITSec, CCI & Network Pen-Testing

HACKING VS CRACKING• Hacker– The person who hack

• Cracker– System intruder/destroyer

• Hacking with malicious intention is cracking.• The basic difference is hackers do not do anythingdisastrous.• Cracking yield more devastating results.• Cracking is crime.• Cyber crime are the results of cracking ,not hacking

Page 7: EHITSec, CCI & Network Pen-Testing

How you all use

• Which are your famous sites ?

• How you share your information on social media sites ?

• Social Engineering

Page 8: EHITSec, CCI & Network Pen-Testing

Attacking Method

Page 9: EHITSec, CCI & Network Pen-Testing

#CYBER CRIMES

List of cyber crimes are as follows:-• Hacking of computer systems and networks.• Financial crimes such as siphoning of money

from banks, credit card frauds, money laundering.

• Cyber pornography involving production & distribution of pornographic material, including child pornography.

Page 10: EHITSec, CCI & Network Pen-Testing

#CYBER CRIMES

• Online Gambling, Launching of virus, worms, Trojans , DOS Attack, Sale of illegal articles such as narcotics, weapons, wildlife, etc.

• Harassments such as cyber stalking, cyber defamation, indecent and abusing mails.

• Intellectual property crimes such as theft of computer source code, software piracy, copyright infringement, trademark violations.

Page 11: EHITSec, CCI & Network Pen-Testing

#Indian Hackers• ATMS.• Jobs.• ACROSS INDIA level fraud.• Target any age group.

Page 12: EHITSec, CCI & Network Pen-Testing

Scams & Frauds

• How hackers use Facebook.

• Recent cyber crimes using Facebook.

• Facebook records all information.

• Securing Facebook by filters.

Page 13: EHITSec, CCI & Network Pen-Testing

#Cyber Crime in Organizations

• Spam mails.• Theft of source code.• Exchange of business secrets and documents.• Insider attacks on personal database.• Use of office computer for running other

business.• External cyber attacks on an organization

resulting in denial-of-service.

Page 14: EHITSec, CCI & Network Pen-Testing

#Cyber Warfare

• Cyberwarfare is any virtual conflict initiated as a politically motivated attack on an enemy's computer and information systems.

• Waged via the Internet, these attacks disable financial and organizational systems by stealing or altering classified data to undermine networks, websites and services.

Page 15: EHITSec, CCI & Network Pen-Testing

#Cyber Warfare Attacks

• The Original Logic Bomb.

• Moonlight Maze.

• Titan Rain.

Page 16: EHITSec, CCI & Network Pen-Testing

#Cyber Warfare India VS Pakistan

• Why India is the weaker side?

Page 17: EHITSec, CCI & Network Pen-Testing

#Safe Guard Yourself

• Information : general not specific.• TP Id’s.• Insta-alert facility: Credit card n banks.• DO NOT TRUST ANYONE.• Social engg, pictures, 2 id’s same person.• Always LOGOUT or SIGNOUT.• WI-FI security.• HTTPS & LOCK.

Page 18: EHITSec, CCI & Network Pen-Testing

#Personal Information Leaks• Personal information identifies you,

your location or your financial assets.

• Known: name, age, sex, picture, phone number, address, ID numbers such as SSN, Bank Account Numbers, Credit Card Numbers.

• Less Unknowns: hobbies, interests, school mascot, gaming identities.

• This info can be used for phishing scams/pretexting.

Page 19: EHITSec, CCI & Network Pen-Testing

#Network Pentesting

Page 20: EHITSec, CCI & Network Pen-Testing

#Basic Pentest

Page 21: EHITSec, CCI & Network Pen-Testing

#Safety Punch’s :P

• Do not share personal information such as your name, age, sex, picture, location Etc.

• Create nicknames that do not reflect your own name or anything personal.

• Never respond to online communication that is inappropriate.

• Never agree to meet in person someone you met online.

• Never open e-mails from people you do not know.• Never click on links you don’t know about it.

Page 22: EHITSec, CCI & Network Pen-Testing
Page 23: EHITSec, CCI & Network Pen-Testing

#Connect me

• Email:-– Vishwesh.satapute[at]cypherkode[dot]com– Vsatapute[at]gmail[dot]com

• Facebook:- – www.facebook.com/funkymalware– www.facebook.com/CypherkodeInfosec

• Mobile & Whatsapp:- +91 9768036518• Website:- www.cypherkode.com (UC)

Page 24: EHITSec, CCI & Network Pen-Testing