A apresentação está carregando. Por favor, espere

A apresentação está carregando. Por favor, espere

Phases of Hackers. Module 1: Today’s Threat Landscape Module 2: Key Principles of Security Module 3: Understanding your enemy! Module 4: Phases of Hackers.

Apresentações semelhantes


Apresentação em tema: "Phases of Hackers. Module 1: Today’s Threat Landscape Module 2: Key Principles of Security Module 3: Understanding your enemy! Module 4: Phases of Hackers."— Transcrição da apresentação:

1 Phases of Hackers

2 Module 1: Today’s Threat Landscape Module 2: Key Principles of Security Module 3: Understanding your enemy! Module 4: Phases of Hackers Lunch Break Module 5: What motivates hackers? Module 6: Pass the Hash Module 7: Windows Security Capabilities and Tools

3 Module Insights Identify how hackers behave in real- world when they chaise targets and gain access.

4 Phases of Hackers ReconnaissanceScanningGaining Access Maintaining Access Clearing Tracks

5 Reconnaissance Refers to phase where attacker gathers as much information as possible. Learn About Target: 1) Active Recon 2) Passive Recon

6 DEMO Gaining fast personal information's

7 Scanning Types Port Scanning Vulnerability ScanningNetwork Scanning

8 DEMO How do they find us?

9 Gaining Access The Key Point of hacking: This phase of the attack occurs when the hacker moves from simply probing the network to actually attacking it. After the hacker has gained access, he can begin to move from system to system, spreading his damage as he progresses. Comes down to his skill level, amount of access he achieves, network architecture, and configuration of the victim's network.

10 DEMO How do they gain access?

11 Maintaining Access Refers to the phase when attacker tries to retain ownership of the system The attacker may compromise the system This where Backdoors, RootKits or Trojans prevents your systems An Attacker can upload, download or manipulate data, applications & configurations of your systems

12 Clearing Tracks Refer to activates carried out by an attacker to hide the misdeeds Reasons Inc. the need for prolonged stay, continued use of resource, remove evidence of hacking

13

14 @ErdalOzkaya@MiladPFE Connect with the speakers! http://erdalozkaya.com/https://www.facebook.com/milad.aslaner

15 Deep technical content and free product evaluations Hands-on deep technical labs Free, online, technical courses Download Microsoft software trials today. Find Hand On Labs.Take a free online course. Technet.microsoft.com/evalcenterTechnet.microsoft.com/virtuallabsmicrosoftvirtualacademy.com TechNet Virtual Labs

16 ©2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Office, Azure, System Center, Dynamics and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Carregar ppt "Phases of Hackers. Module 1: Today’s Threat Landscape Module 2: Key Principles of Security Module 3: Understanding your enemy! Module 4: Phases of Hackers."

Apresentações semelhantes


Anúncios Google