CPTS

Just an initial demo map, so that you don't start with an empty map list ...

시작하기. 무료입니다
또는 회원 가입 e메일 주소
CPTS 저자: Mind Map: CPTS

1. M01 - Business and Technical Logistics of PT

1.1. Types of Hackers

1.1.1. white hat

1.1.1.1. Defensive hacker assigned to attack companies in order to improve their defense and security

1.1.2. gray hat

1.1.2.1. Hacker plays mainly a defensive role but sometimes uses his/her knowledge for black hat purposses

1.1.3. black hat

1.1.3.1. Offensive hacker who attacks with intention of unauthorized theft or destruction of data

1.2. Types of attacks

1.2.1. Operating System attacks

1.2.2. Application-level attacks

1.2.3. Shrink wrap code attacks

1.2.4. Misconfiguration attacks

1.3. Functionality, and Ease of Use Triangle

1.4. Security testing - hint: boxes

1.4.1. White box

1.4.2. Black box

1.4.2.1. You know only the company name

1.4.3. gray box

1.5. Passive information gathering

1.6. Active information gathering

1.7. Attack Phases

1.7.1. Reconnaissance

1.7.2. Scanning

1.7.3. Gaining Access

1.7.4. Maintaining Access

1.7.5. Covering Tracks

1.8. Elements of Security

2. M02 - Information Gathering

2.1. Passive Information Gathering

2.1.1. Whois

2.1.2. Google

2.1.3. www.archive.org

2.1.4. ICANN

2.1.4.1. ARIN

2.1.4.2. RIPE ncc

2.1.4.3. LACNIC

2.1.4.4. AfriNIC

2.1.4.5. APNIC

2.1.5. www.centralops.net

2.1.6. DNS

2.1.6.1. DNS - SOA lower at target - Tools used NSlookup, Sam Spade, Dig, Host - RR Records contain NS, SOA, A & MX

2.1.7. Traceroute

2.2. Competitive Intelligence Gathering

2.2.1. Data Gathering

2.2.2. Data Analysis

2.2.3. Information Verification

2.2.4. Information Security

2.3. Social Engineering

2.3.1. Types of social engineering

2.3.1.1. Reciprocation

2.3.1.2. Consistency

2.3.1.3. Social Validation

2.3.1.4. Liking

2.3.1.5. Authority

2.3.1.5.1. Human-based Social Engineering

2.3.1.6. Scarity

2.3.2. Tactic or Trick of gaining sensitive information

2.3.2.1. Trust

2.3.2.2. Fear

2.3.2.3. Desire to Help

2.3.2.4. Social Engineers attempt to gather information such as

2.3.2.4.1. Sensitive information

2.3.2.4.2. Authorization details

2.3.2.4.3. Access Details

2.3.3. Computer based Social Engineering

2.3.3.1. Pop-up Windows

2.3.3.2. Mail Attachments

2.3.3.3. Websites

2.3.3.4. Hoaxes and Chain letters

2.3.3.5. Instant Chat messenger

2.3.3.6. SPAM email

2.3.3.7. Phising

2.3.4. Common targets

2.3.4.1. Receptionist and help desk personnel

2.3.4.2. Technical Support executives

2.3.4.3. Vendors of target organisation

2.3.4.4. System administrators and users

2.3.5. Behaviors Vulnerable to Attacks

2.3.5.1. Trust

2.3.5.2. Ignorance

2.3.5.3. Fear

2.3.5.4. Greed

2.3.5.5. Moral Duty

2.3.6. Insider attack

2.3.6.1. Disgruntled Employee

2.3.6.2. Preventing Insider Thread

2.3.6.2.1. Separation of Duties

2.3.6.2.2. Rotation of duties

2.3.6.2.3. Least privilege

2.3.6.2.4. Controlled Access

2.3.6.2.5. Logging and Auditing

2.3.6.2.6. Legal policies

2.3.6.2.7. Archive critical data

2.3.7. Countermeasures

2.3.7.1. Classification of information

2.3.7.2. Access privileges

2.3.7.3. Background check o employees and proper termination process

2.3.7.4. Proper incidence response system

3. M03 - Linux Fundamentals

4. M04 - Detecting Live Systems

4.1. Scanning

4.1.1. ICMP

4.1.1.1. request

4.1.1.1.1. type 8

4.1.1.2. reply

4.1.1.2.1. type 0

4.1.1.3. TTL Exeeded

4.1.1.3.1. type 11

4.1.1.4. destination unreachable

4.1.1.4.1. type 3

4.1.2. TCP

4.1.2.1. Three way handshake

4.1.2.2. communication flags

4.1.2.2.1. SYN

4.1.2.2.2. ACK

4.1.2.2.3. PSH

4.1.2.2.4. URG

4.1.2.2.5. FIN

4.1.2.2.6. RST

4.1.3. UDP

4.1.4. Nmap

4.1.4.1. Nmap commands

4.1.4.1.1. scans

4.1.4.1.2. verbose

4.1.4.1.3. speeds

4.1.5. An attacker an not simply Spoof his IP address and expect to able to scan or access a network in detected.

4.1.6. If A system Ilicits no Response: * UDP is filted by a gateway * The host might be down * The destination network might be down * ICMP is filtered by a gateway

4.1.7. After Portscanning, an attacker grabs the banner of an open port to know the services running on each port.

4.1.8. TCP Connect scan is the most reilable scan

4.1.9. War Dialing allows circumvention of protection mechanisms by being on the internal network

4.1.10. www.networkuptime.net/nmap/index.shtml

5. M10 - Advanced Vulnerability & Exploitation Techniques

6. M13 - Attacking Databases

7. M14 - Attacking Web Technologies

7.1. Web Based Password Cracking

7.1.1. Authentication Mechanisms

7.1.1.1. HTTP authentication

7.1.1.1.1. Basic authentication

7.1.1.1.2. Digest authentication (challenge)

7.1.1.2. Integrated Windows (NTLM) Authentication

7.1.1.3. Negotiate Authentication

7.1.1.4. Certificate-based authentication

7.1.1.5. Forms-based authentication

7.1.1.6. Microsoft Passport Authentication

7.1.2. Types of Biometrics authentication

7.1.2.1. Face Recognition

7.1.2.2. Iris Scanning

7.1.2.3. Retina Scanning

7.1.2.4. Fingerprinting

7.1.2.5. Hand Geometry

7.1.2.6. Voice Recognition

7.1.3. Questions

7.1.3.1. Obiwan

7.1.3.2. John the ripper

7.1.3.3. Snadboy

7.1.3.4. L0phtcrack

7.1.3.5. Cain and Abel

7.1.3.6. Hydra

8. M15 - Documentation

9. SkriptJack

10. M05 - Reconnaissance

10.1. NetBIOS null sessions

10.1.1. used ports

10.1.1.1. 139

10.1.1.2. 445

10.1.2. check for

10.1.2.1. Windows: net use \\victim\ipc$ "/user:" ""

10.2. Banner grabbing

10.3. Tools to enumerate a system

10.3.1. IP-Tools

10.3.2. DumpSec

10.3.3. getif

10.3.4. winfo.exe

10.4. Data retrievable with Enumeration

10.4.1. usernames

10.4.2. usergroups

10.4.3. shares

10.4.4. password policy

10.4.4.1. min length

10.4.4.2. lockout threshold

10.4.4.3. min age

10.4.4.4. max age

10.4.4.5. lockout duration

10.4.4.6. lockout reset

10.4.5. SID of administrator

10.4.6. password guessing

11. M07 - Vulnerability Assessments

12. M08 - Malware - Software Goes Undercover

12.1. Trojans & Backdoors

12.1.1. Overt channel

12.1.2. Covert channel

12.1.3. Types of Trojans

12.1.3.1. Remote Access

12.1.3.2. Data-Sending

12.1.3.3. Destructive

12.1.3.4. Denial-of-Service

12.1.3.5. Proxy

12.1.3.6. FTP

12.1.3.7. Security Software Disablers

12.1.4. Attack vectors

12.1.4.1. Instant Messaging

12.1.4.2. IRC (Internet Relay Chat)

12.1.4.3. Via Attachments

12.1.4.4. Physical Access

12.1.4.5. Browser and Email Bugs

12.1.4.6. NetBIOS

12.1.4.7. Fake Programs

12.1.4.8. Suspicious Sites and Freeware Software

12.1.5. Working of Trojans

12.1.5.1. Client Server model

12.1.5.2. Command and control channel

12.1.5.2.1. IRC

12.1.5.2.2. ICQ

12.1.5.2.3. HTTP

12.1.5.2.4. RSS

12.1.6. Questions

12.1.6.1. Tini

12.1.6.1.1. 7777

12.1.6.1.2. It's tiny

12.1.6.1.3. 3kb

12.1.6.2. NetCat

12.1.6.2.1. Cyptcat is Netcat with encryption

12.1.6.3. BackOrifice

12.1.6.3.1. port numbers 31337/31338

12.1.6.4. Sub7

12.1.6.4.1. ports 6711,6712,6713

12.1.6.5. NetBus

12.1.6.5.1. ports 12345/12346

12.1.6.6. Beast

12.1.6.6.1. It's a royal pain in the ass

12.1.6.6.2. remove by running a beast server and tell the client to disable itself

12.1.6.7. Loki

12.1.6.7.1. written in deamon9

12.1.6.7.2. access over ICMP

12.1.6.7.3. UDP 53

12.1.7. Detect trojans

12.1.7.1. Netstat

12.1.7.2. Fport

12.1.7.3. TCPview

12.1.7.4. Process viewer

12.1.7.5. What's on my computer

12.1.7.6. Insider

12.1.7.7. Ethereal/Wireshark

12.1.7.8. Currports

12.1.7.9. autoruns

12.1.7.10. msconfig

12.1.7.11. Tripwire

12.1.7.11.1. System intergrity verifier

12.2. Bufferoverflows

12.2.1. Questions

12.2.1.1. String copy

12.2.2. Types

12.2.2.1. Stack-based

12.2.2.2. Heap/BSS-based

12.2.3. Understanding Assembly Language

12.2.3.1. Push pointers

12.2.3.2. Pop pointers

12.2.3.3. Different pointers

12.2.3.3.1. EIP

12.2.3.3.2. ESP

12.2.3.3.3. EBP

12.2.4. Example site/Links

12.2.4.1. nopsr.us

12.2.4.1.1. REALLY GEEKY

12.2.4.2. http://www.isg.rhul.ac.uk/files/Countermeasures.pdf

12.2.5. Howto detect BO's in a program

12.2.5.1. Use a fuzzer

12.2.5.2. Look at the source code

12.2.6. NOPS

12.2.6.1. also called Null Bytes

12.2.6.2. x90

12.2.6.3. _86

12.2.7. Canary word important for exam

12.3. Denial of Service

12.3.1. Are DOS attacks on the rise?

12.3.1.1. August 15 2003, Mircosoft.com falls to a DOS attack. It lasts 2 hours

12.3.1.2. March 27 2003, 15:09 GMT, AlJazeera's English website coming online hours after a DOS attack hit.

12.3.2. Goal of DOS

12.3.2.1. Attackers flood a network, thereby preventing legitimate network traffic

12.3.2.2. Disrupt connections

12.3.2.3. Prevent individuals from accessing a service

12.3.2.4. Disrupt services

12.3.3. Impact and the modes of attack

12.3.3.1. Network connectivity

12.3.3.2. Misuse of Internal resources

12.3.3.3. Bandwith consumption

12.3.3.4. Consumption of other resources

12.3.3.5. Destruction or alteration of configuration information

12.3.4. Types of attacks

12.3.4.1. DOS

12.3.4.1.1. DOS Tools

12.3.4.1.2. DOS attack classification

12.3.4.2. DDOS

12.3.4.2.1. DDOS attack classification

12.3.4.2.2. DDOS Tools

12.3.4.2.3. Tools to detect DDOS attacks

12.3.4.2.4. DDOS countermeasures

12.3.4.3. Reflected DOS attack

12.3.4.3.1. This is the next generation of DOS attacks. It uses the SYN flooding method, but with a twist. Instead of sending SYN packets to the server under attack it "reflects" them off any router or server connected to the internet.

12.3.4.3.2. The three way handshake is exploited

12.3.4.3.3. Any server could be used to send the packets

12.3.4.3.4. Countermeasures involve

12.3.5. Botnets

12.3.5.1. Uses of Botnet

12.3.5.1.1. DDOS attacks

12.3.5.1.2. Spamming

12.3.5.1.3. Sniffing traffic

12.3.5.1.4. Keylogging

12.3.5.1.5. Spreading new malware

12.3.5.1.6. Installing advertisement Addons

12.3.5.1.7. Google Adsense abuse

12.3.5.1.8. Attacking IRC chat networks

12.3.5.1.9. Manipulating online polls

12.3.5.1.10. Mass identity theft

12.3.5.2. Types of bots

12.3.5.2.1. Agobot/Phatbot/Fobot/XtremBot

12.3.5.2.2. SDBot/RBot/UrBot/UrXBot

12.3.5.2.3. mIRC-based Bots - GT-Bots

12.4. Virus and Worms

12.4.1. Diffirences

12.4.1.1. Worm

12.4.1.1.1. Propagates automatically

12.4.1.1.2. takes advantage of an Exploit

12.4.1.1.3. Special type of virus, that cannot attach to a program

12.4.1.2. Virus

12.4.1.2.1. Needs interaction to spread

12.4.1.2.2. Harder to remove

12.4.2. Questions

12.4.2.1. Macro virusses

12.4.2.2. Melissa virus

12.4.2.3. Diffirence between meta and polimophic virusses

12.4.2.4. History

12.4.2.5. What is a Sheep Dip

12.4.2.5.1. Way of testing virusses and what they do

12.4.2.6. How they propagate

12.4.2.7. Hoax virusses

12.4.2.8. EICAR.ORG has created a testvirus. Its a file called EICAR.COM

12.4.3. Virusses

12.4.3.1. Characteristics

12.4.3.1.1. Resides in memory

12.4.3.1.2. Some leave the memory after execution

12.4.3.1.3. Change themselves

12.4.3.1.4. Hide themselves

12.4.3.1.5. Damage

12.4.3.2. Types of infection

12.4.3.2.1. Stealth Virus

12.4.3.2.2. Polymorphic

12.4.3.2.3. Cavity virus

12.4.3.2.4. Tunneling virus

12.4.3.2.5. Camouflage virus

12.4.3.2.6. Metamorphic virus

12.4.3.2.7. difference between polymorphic and metamorphic

12.4.3.3. Classification

12.4.3.3.1. File virus

12.4.3.3.2. Macro virus

12.4.3.3.3. System sectors or boot virus

12.4.3.3.4. Source code virus

12.4.3.3.5. Network virus

13. M09 - Windows Hacking

14. M12 - Networks -Sniffing - IDS

14.1. Sniffers

14.1.1. How a sniffer works

14.1.1.1. Shared Ethernet

14.1.1.2. Switched Ethernet

14.1.1.3. ARP spoofing

14.1.1.4. Mac flooding

14.1.2. Protocols vulnerable to sniffing

14.1.2.1. Cleartext protocols

14.1.2.1.1. HTTP

14.1.2.1.2. SMTP

14.1.2.1.3. NNTP

14.1.2.1.4. POP

14.1.2.1.5. FTP

14.1.2.1.6. IMAP

14.1.2.1.7. Telnet and Rlogin

14.1.3. Sniffers

14.1.3.1. The Dude Sniffer

14.1.3.2. Ethereal/Wireshark

14.1.3.3. tcpdump

14.1.4. Passive Sniffing

14.1.4.1. Through a Hub

14.1.5. Active Sniffing

14.1.5.1. ARP Spoofing

14.1.5.1.1. Tools

14.1.5.2. MAC flooding

14.1.5.2.1. Macof

14.1.5.2.2. Etherflood

14.1.5.3. MAC duplicating

14.1.5.4. Through a switch

14.1.5.5. DNSSpoofing

14.1.5.5.1. Types of DNSSpoofing

14.1.6. RAW Sniffing Tools

14.1.6.1. Sniffit

14.1.6.2. Aldebaran

14.1.6.3. Hunt

14.1.6.3.1. Also used for Session Hijacking

14.1.6.4. NGSSniff

14.1.6.5. NTOP

14.1.6.6. PF

14.1.6.7. IPTraf

14.1.6.8. EtherApe

14.1.6.9. Snort

14.1.6.10. Windump/tcpdump

14.1.6.11. Etherpeek

14.1.6.12. Mac Changer

14.1.6.13. IRIS

14.1.6.14. NetIntercept

14.1.6.15. WinDNSSpoof

14.1.6.16. TCPick

14.2. IDS

15. M11 - Attacking Wireless Networks

15.1. Wireless vs Wired networks

15.1.1. Cost

15.1.2. Reliability

15.1.3. Performance

15.1.4. Security

15.2. Types of Wireless Networks

15.2.1. Peer-to-peer Networks

15.2.2. Extension to Wired Network

15.2.3. Multiple Access Points

15.2.4. LAN to LAN Wireless

15.3. Advantages of Wireless Network

15.3.1. Provides mobility to users

15.3.2. Easy connection

15.3.3. Initial cost to setup is low

15.3.4. Data cen be transmitted if diffirent ways. Cellular Networks, Mobitex, DataTAC, Cellular Digital Packet Data

15.3.5. Sharing of data is easy among wireless devices

15.4. Disadvantages of Wireless Network

15.4.1. No physical protection

15.4.2. The risk of sharing data is high as packets are being sent through the air.

15.5. Wireless Standards

15.5.1. IEEE 802.11

15.5.1.1. a

15.5.1.1.1. 40mhz to 5Ghz

15.5.1.1.2. More channels, high speeds, less interferance

15.5.1.1.3. Speed 54 mbps

15.5.1.2. b

15.5.1.2.1. "wifi" standard

15.5.1.2.2. 20mhz to 2.4Ghz

15.5.1.2.3. Protocol of WIFI recolution, defacto standard

15.5.1.3. n

15.5.1.3.1. Speed over 100 mbps

15.5.1.4. i

15.5.1.4.1. Improves WLAN security

15.5.1.4.2. Also uses WPA

15.5.1.5. g

15.5.1.5.1. Similar to b but faster

15.5.1.5.2. backward compatible with b

15.5.2. IEEE 802.16

15.5.2.1. Long distance

15.6. Related tech and Carrier netowkrs

15.6.1. CDPD

15.6.2. 1xRTT on CDMA

15.6.3. GPRS/GSM

15.6.4. FRS & GMRS

15.6.5. HPNA & Powerline Ethernet

15.6.6. 802.1x

15.6.7. BSS & IBSS

15.7. SSID

15.7.1. unique identifier

15.7.2. NOT SECURE ENOUGH

15.7.3. Beacon frames

15.7.3.1. Broadcast the SSID

15.7.4. Is it secret?

15.7.4.1. NO!

15.8. Terminology

15.8.1. WarWalking

15.8.2. Wardriving

15.8.3. Warflying

15.8.4. WarChalking

15.8.4.1. )(, () (W)

15.8.5. Blue Jacking

15.8.6. Global Positioning System

15.9. Authentication modes

15.9.1. Authentication is done by:

15.9.1.1. A BSS providing a SSID

15.9.1.2. Shared Key authentication

15.9.1.2.1. Difficult to deploy

15.9.1.2.2. Difficult to change

15.9.1.2.3. Hard to keep secret

15.9.1.2.4. No accountability

15.10. WEP Encryption

15.11. Tools

15.11.1. wesside

15.11.2. airsnort

15.11.3. Wepcrack

15.11.4. Scanning tools

15.11.4.1. New node

15.11.5. Sniffing tools

15.11.5.1. Airopeek

15.11.5.2. Aerosol

15.11.5.3. Windump

16. New node