100 likes | 162 Views
Explore the realm of S.N.U.P.E. and penetration testing to identify and neutralize network vulnerabilities. Utilize tools to analyze risks and secure your network using white hat hacking methods.
E N D
Project S.N.U.P.E( ) By Patrick D. Cook
Introduction • Background Why this topic and what is S.N.U.P.E () • Purpose • Look for vulnerabilities within a network • Analyze and Mitigate the risk • Topic Area • Penetration Testing • White hat hacking
Staging • Purpose • Tools • Cyberarmy http://www.cyberarmy.com • Whois http://www.networksolutions.com • WS_ Ping Pack Prohttp://www.ipswitch.com • Layers of the OSI model
Neutralizing • Purpose • Tools • File Wrangler http://www.tucows.com • PowerDesk's ExplorerPlus http://www.mijenix.com/powerdesk98.asp • Revelation http://www.snadboy.com • Layers of the OSI model
Unarming • Purpose • Tools • Cygwin Win32 http://www.cygnus.com • Wipe ftp://ftp.technotronic.com/unix/log-tools/wipe-1.00.tgz • Zap ftp://ftp.technotronic.com/unix/log-tools/zap.c • Layers of the OSI model
Penetration • Purpose • Tools • L0phtcrack's Reads mb http://www.l0pht.com/ • Legion http://www.rhino9.com • Layers of the OSI model
Exploiting • Purpose • Tools • Portfuck http://www.stargazer.net • Unhide http://www.webdon.com • Layers of the OSI model
Real World Examples • Microsoft Security Flaw • http://money.cnn.com/2003/05/09/technology/msft_passport.reut/ • High School Student teaches school • http://abcnews.go.com/sections/scitech/TechTV/techtv_HS_hacker021225.html
Summary • The majority of the tools attack a similar area from the Transport layer to the Application layer (as indicated by the following diagram) is the most vulnerable to attacks.
References • Stuart McClure, Joel Scambra, and George Kurtz, Hacking Expose: Network Security Threats and Solutions ( California: Osborne/McGraw-Hill, 2001) • The biggest virus encyclopedia: Virus List.com http://www.viruslist.com/