NT SECURITY: HACKING AND HOW TO PREVENT IT - PowerPoint PPT Presentation

About This Presentation
Title:

NT SECURITY: HACKING AND HOW TO PREVENT IT

Description:

An Internet Browsing Hacking Tip ... These files can be browsed, executed or downloaded by wandering guests. KNOWN NT EXPLOITS ... – PowerPoint PPT presentation

Number of Views:240
Avg rating:3.0/5.0
Slides: 16
Provided by: keith354
Category:

less

Transcript and Presenter's Notes

Title: NT SECURITY: HACKING AND HOW TO PREVENT IT


1
NT SECURITY HACKINGAND HOW TO PREVENT IT
BY GREG WATSON
2
WHAT IS HACKING?
HACKING VS. "CRACKING" THE WORD HACKING HAS TWO
DEFINITIONS 1) THE HOBBY OR PROFESSION OF
WORKING WITH COMPUTERS. 2) BREAKING INTO
COMPUTER SYSTEMS OR "CRACKING" INTO
THEM.
3
WHY HACK OR WHY CRACK?
THE MIND OF THE HACKER OR WHAT ARE THE
MOTIVATIONS OF HACKERS SOCIAL MOTIVATIONS -
peer acceptance, a feeling of self
superiority. TECHNICAL MOTIVATIONS - people who
hack who hack to help, in their minds, progress
the evolution of technology.
4
FINANCIAL MOTIVATIONS - people who hack for
personal gain. Corporate espionage, financial
institutions, and even people who are pirating
(or cracking) software for profit. POLITICAL
MOTIVATIONS - hackers who break into systems
related to a political movement they want to
speak out against.
5
GOVERNMENT MOTIVATIONS - acts committed by one
government against another. Information warfare
and governmental espionage would fit into this
category.
6
NT HACKER TOOLS
NT Recover and NT Locksmith by Sysinternals. With
NTRecover you can access a dead x86 NT system's
disks from a good system over a serial
connection. You can then salvage data off of the
drives using native NT commands and utilities.
7
NTLocksmith is an add-on program to NTRecover
that allows for the changing of passwords on
systems where the administrative password has
been lost. It works 100 of the time, and if
you've forgotten the password to your machine,
you can gain entry within minutes using
NTLocksmith.
8
MORE NT HACKING TIPS
pwdump - http//www.inch.com/agagescu/hp/Ntpass.
ht mcrack2. It walks through your SAM database
and writes out a file with userid's and the hash
values associated with the user's password.
9
SYN ATTACK Multiple TCP connection requests
(SYN) are sent to the target computer with an
unreachable source IP address. On receiving the
connection request, the target computer allocates
resources to handle and track the new connection,
then responds with a "SYN-ACK" to the unreachable
address.
10
  • An Internet Browsing Hacking Tip
  • A URL such as 'http//www.domain.com/..\..'
    allows you to browse and download files outside
    of the webserver content root directory.
  • A URL such as 'http//www.domain.com/scripts..\..\
    scriptname' allows you to execute the target
    script.

11
THE GUEST ACCOUNT
  • By default user 'Guest' or IUSR_WWW has read
    access to all files on an NT disk. These files
    can be browsed, executed or downloaded by
    wandering guests.

12
KNOWN NT EXPLOITS
  • http//xforce.iss.net/library/bill_stout/ntexploit
    s.htm

13
NT HACKING PREVENTION
18 basic NT Security Tips available
at http//www.ntsecurity.net Rule 1 Always use
NTFS disk partitions instead of FAT.
/
14
  • Disable the Guest Account
  • Create a New Administrator Account, and take the
    permissions away from the existing Administrator
    Account.

15
  • Make sure routers between your UN-trusted
    bordering networks (Internet, etc) can (and are
    configured to) stop source routing, IP spoofing,
    and ICMP redirects
Write a Comment
User Comments (0)
About PowerShow.com