introduction -...

27
INTRODUCTION

Upload: others

Post on 11-Sep-2019

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

INTRODUCTION

Page 2: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

• Bilişim güvenliğinin önemi• Güvenlik ihtiyacı

Page 3: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

White Hat Hacker

Black Hat Hacker

Gray Hat Hacker

Hacker sınıfları LamerCracker

Page 4: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Hacking Bilgisi Footprinting Scanning

HackingAnatomisi

Gaining Access Hacking Enumeration

Privileges Escalation Hiding Files Cover

Tracking

Page 5: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Black Box

White Box

Gray Box

Güvenlik Testleri

Page 6: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

InternetFootprinting

WhoisFootprinting

DNSFootprinting

MethodologyEmail

FootprintingWeb Site

FootprintingNetwork

Footprinting

Google Hacking

Lokasyon&

Personel

Page 7: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Discovery

Foorprinting Araçları

1. Ping – hping3 – tracetoute (tracert)2. Nmap3. Maltego4. Nslookup5. Loriot Pro6. Google Hacking Database (GHDB)7. E-Mail Header8. http://www.whois.sc9. http://www.dnsstuff.com

Page 8: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Discovery

Whois Registrant:Eyüp Çelikyavuzselim 168.sk no:4Erzincan,Türkiye

+ 90-446-2245118-

** Administrative Contact:NIC Handle : pmo6-metuOrganization Name : Pan MedyaOrganizasyon Ltd.Þti.Address : Hidden upon user requestPhone : Hidden upon user requestFax : Hidden upon user request

** Domain Servers:uma.ns.cloudflare.comphil.ns.cloudflare.com

** Additional Info:Created on..............: 2011-Jan-20.Expires on..............: 2013-Jan-19.

Page 9: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Discovery

Nslookup

Page 10: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Discovery

Tracert - Traceroute

Page 11: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Discovery

Nmap

Page 12: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Discovery

Maltego-1

Page 13: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Discovery

Maltego-2

Page 14: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Discovery

W3AF

Page 15: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Discovery

E-Mail Header

Page 16: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Port Scanning

Network Scanning

Vulnerability Scanning

Page 17: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Araçlar

Araçlar

•Nmap•Nessus•NetScan•Net Tools Suite Pack•Advanced Port Scanner•Super Scan•Retina•Core Impact•MBSA•Armitage•MetaSploit

Page 18: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

PortScanning

Port Scanning

Page 19: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

PortScanning

Port Scanning

•TCP Connect (Full Open) Scan•Stealth (Half Open) Scan•XMAS Scan•FIN Scan•NULL Scan•IDLE Scan

Page 20: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Araçlar

Nmap

Page 21: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

PortScanning

Network Scanning

Page 22: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Araçlar

Nmap

Page 23: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

PortScanning

Vulnerability Scanning

Page 24: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Araçlar

Nessus

Page 25: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

PortScanning

Enumeration

Page 26: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Enumerable Edilebilen Servisler

•Netbios Enumeration•SNMP Enumeration•SMTP Enumeration•DNS Enumeration•LDAP Enumeration•NTP Enumeration

Page 27: INTRODUCTION - eyupcelik.com.treyupcelik.com.tr/Sunumlar/BilgeAdamEthicalHacking-Introduction.pdfFootprinting. Scanning. Hacking. Anatomisi. Gaining Access. Hacking. Enumeration Privileges

Araçlar

•SuperScan•NetBios Enumerator•SolarWinds IP Network Browser•Loriot Pro•JXplorer•NTP Server Scanner•NetScan Tools Pro•Telnet