Ethical hacking and countermeasures - phần 16
Số trang: 0
Loại file: pdf
Dung lượng: 4.88 MB
Lượt xem: 16
Lượt tải: 0
Xem trước 10 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Tham khảo tài liệu ethical hacking and countermeasures - phần 16, công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
Nội dung trích xuất từ tài liệu:
Ethical hacking and countermeasures - phần 16Ethical Hacking andCountermeasuresVersion 6Module XVIHacking Web Servers Scenario SpeedCake4u, a cake manufacturing firm wants to set up a website for showcasing its products. Matt, a high school graduate was assigned the task of building the website. Even though Matt was not a pro in website building, the $2000 pay was the main motivation for him to take up the task. He builds a website with all the features that the company management asked. The following day the cake manufacturing firm’s website was defaced with the Title “Your cake stinks!” How was it possible to deface the website? Is Matt the culprit? Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited News Source: http://www.pcworld.com/ Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective This module will familiarize you with : • Web Servers • Popular Web Servers and Common Vulnerabilities • Apache Web Server Security p • IIS Server Security • Attacks against Web Servers • Tools used in Attack • Patch Management • Understanding Vulnerability Scanners • Countermeasures • Increasing Web Server Security Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Hacking Tools to Web Servers Exploit Vulnerabilities Web Server Defacement Patch Management Vulnerability Scanners Apache Web Server Security Countermeasures Attacks against IIS Increasing Web Server Security Web Server Vulnerabilities Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited How are Web Servers Compromised Compromised Misconfigurations, in operating systems, or networks Bugs, OS bugs may allow commands to run on the web Installing the server with defaults, service packs may not be applied in the process, leaving holes behind Lack of proper security policy, procedures, and maintenance may create create many loopholes for attackers to exploit Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited Web Server Defacement Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited How are Web Servers Defaced Web Servers are defaced by using the following attacks: • Credentials through Man-in-the-middle attack • Password brute force Administrator account • DNS attack through cache poisoning • DNS attack through social engineering • FTP server intrusion • Mail server intrusion • Web application bugs • Web shares misconfigurations • Wrongly assigned permissions • Rerouting after firewall attack • Rerouting after router attack • SQL Injection • SSH intrusion • Telnet intrusion • URL poisoning • Web Server extension intrusion • Remote service intrusion Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited Attacks Against IIS IIS is one of the most widely used web server platforms on the Internet Microsofts web server has been a frequent target over the years Various vulnerabilities have attacked it Examples include: • ::$DATA vulnerability • showcode.asp vulnerability • Piggy backing vulnerability • Privilege command execution • Buffer Overflow exploits (IIShack.exe) • WebDav / RPC Exploits Warning These outdated vulnerability has been presented here as a proof of concept to demonstrate how a buffer overflow attack works Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited IIS 7 Components IIS 7 contains several components that perform important functions for the application and Web server roles in Windows Server® 2008 Each component has re ...
Nội dung trích xuất từ tài liệu:
Ethical hacking and countermeasures - phần 16Ethical Hacking andCountermeasuresVersion 6Module XVIHacking Web Servers Scenario SpeedCake4u, a cake manufacturing firm wants to set up a website for showcasing its products. Matt, a high school graduate was assigned the task of building the website. Even though Matt was not a pro in website building, the $2000 pay was the main motivation for him to take up the task. He builds a website with all the features that the company management asked. The following day the cake manufacturing firm’s website was defaced with the Title “Your cake stinks!” How was it possible to deface the website? Is Matt the culprit? Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited News Source: http://www.pcworld.com/ Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective This module will familiarize you with : • Web Servers • Popular Web Servers and Common Vulnerabilities • Apache Web Server Security p • IIS Server Security • Attacks against Web Servers • Tools used in Attack • Patch Management • Understanding Vulnerability Scanners • Countermeasures • Increasing Web Server Security Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Hacking Tools to Web Servers Exploit Vulnerabilities Web Server Defacement Patch Management Vulnerability Scanners Apache Web Server Security Countermeasures Attacks against IIS Increasing Web Server Security Web Server Vulnerabilities Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited How are Web Servers Compromised Compromised Misconfigurations, in operating systems, or networks Bugs, OS bugs may allow commands to run on the web Installing the server with defaults, service packs may not be applied in the process, leaving holes behind Lack of proper security policy, procedures, and maintenance may create create many loopholes for attackers to exploit Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited Web Server Defacement Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited How are Web Servers Defaced Web Servers are defaced by using the following attacks: • Credentials through Man-in-the-middle attack • Password brute force Administrator account • DNS attack through cache poisoning • DNS attack through social engineering • FTP server intrusion • Mail server intrusion • Web application bugs • Web shares misconfigurations • Wrongly assigned permissions • Rerouting after firewall attack • Rerouting after router attack • SQL Injection • SSH intrusion • Telnet intrusion • URL poisoning • Web Server extension intrusion • Remote service intrusion Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited Attacks Against IIS IIS is one of the most widely used web server platforms on the Internet Microsofts web server has been a frequent target over the years Various vulnerabilities have attacked it Examples include: • ::$DATA vulnerability • showcode.asp vulnerability • Piggy backing vulnerability • Privilege command execution • Buffer Overflow exploits (IIShack.exe) • WebDav / RPC Exploits Warning These outdated vulnerability has been presented here as a proof of concept to demonstrate how a buffer overflow attack works Copyright © by EC-CouncilEC-Council All Rights Reserved. Reproduction is Strictly Prohibited IIS 7 Components IIS 7 contains several components that perform important functions for the application and Web server roles in Windows Server® 2008 Each component has re ...
Tìm kiếm theo từ khóa liên quan:
bảo mật mạng quy tắc bảo mật kỹ năng máy tính tài liệu về system hacking tài liệu về hackingTài liệu có liên quan:
-
Làm việc với Read Only Domain Controllers
20 trang 348 0 0 -
Đáp án đề thi học kỳ 2 môn cơ sở dữ liệu
3 trang 341 1 0 -
Kỹ thuật và ứng dụng của khai thác văn bản
3 trang 233 0 0 -
Hướng dẫn sử dụng mạch nạp SP200S
31 trang 231 0 0 -
Giáo trình về dữ liệu và các mô hình cơ sở dữ liệu
62 trang 227 0 0 -
Giáo trình Bảo trì hệ thống và cài đặt phần mềm
68 trang 222 0 0 -
Hướng dẫn cách khắc phục lỗi màn hình xanh trong windows
7 trang 208 0 0 -
Giáo Trình tin học căn bản - ĐH Marketing
166 trang 203 0 0 -
Hướng dẫn xem video Youtube mà không cần mở trình duyệt
3 trang 113 0 0 -
Phương pháp hồi phục an toàn dữ liệu và tìm lại password
213 trang 103 1 0