Hacking Phases Slides
Hacking Phases Slides
Dale Meredith
@dalemeredith | www.dalemeredith.com
What is the MOST secure
system?
The one that is never built
You Can’t Stop “Them”
Maintaining
Clearing tracks
access
Phase 1) Reconnaissance
Passive
Active
Gather Info
§ ID systems
§ Vulnerabilities
Tools Used
§ Port Scanners
§ Vulnerability Scanners
Phase 3) Gaining Access
Path
q Via network
q Via OS
q Via application
q Our goal?
v To escalate privileges
Phase 4) Maintaining Access
q PWNing the system
q Use system as a launch pad
q Inject Backdoor/Trojans
q Used to revisit
q Used to sniff/monitor network
q Use resources
q Harden up
Phase 5) Clearing Tracks
“These are not the drones that you
were looking for…”
q Destroy proof
q Hide my stuff
q Cyber blind
Summary
Reconnaissance Scanning
• Reconnaissance
• Scanning
Maintaining
Gaining access
access
• Gaining access
• Maintaining access
Clear tracks
• Clear tracks