Cover the Basics: Part 2
February 4, 2018
Audience
● Beginners in OffSec
● Students
Objective
Objective of this session is to give a starting point to people like me who want
to explore the world of Offensive Security.
This session is not for people who just want to learn hacking (aka Black Hat
hacking)
Topics
● Phase 1 | Reconnaissance
● Phase 2 | Scanning
● Phase 3 | Gaining Access
● Phase 4 | Maintaining Access
● Phase 5 | Covering Tracks /
Reporting
Phase 1 | Reconnaissance
Supposedly - Abraham Lincoln
If I had four hours to chop down a tree,
I’d spend the first two hours sharpening the axe
Reconnaissance
● Active Reconnaissance
In this process, you directly interact with the computer system to gain information. This information can be
relevant and accurate. But there is a risk of getting detected if you are planning active reconnaissance
without permission. If you are detected, then system admin can take severe action against you and trail
your subsequent activities.
● Passive Reconnaissance
In this process, you will not be directly connected to a computer system. This process is used to gather
essential information without ever interacting with the target systems.
Footprinting
Tools and tricks to get the information about the computer, IP and mac
address, related user and system.
● Passive Footprinting
Reviewing a company’s website is an example of passive footprinting.
● Active Footprinting
Whereas attempting to gain access to sensitive information through social engineering is an example of
active information gathering.
Footprinting
Domain Name Information
Domain Name Information (whois.domaintools.com)
Quick Fix - Domain Name Information
It's always recommended to keep your domain
name profile a private one which should hide the
above-mentioned information from potential
hackers.
Finding IP Address
FindingHostingCompany
Quick Fix - IP Information
If a computer system or network is linked with the Internet directly, then you
cannot hide the IP address and the related information such as the hosting
company, its location, ISP, etc. If you have a server containing very sensitive
data, then it is recommended to keep it behind a secure proxy so that hackers
cannot get the exact details of your actual server. This way, it will be difficult for
any potential hacker to reach your server directly.
Another effective way of hiding your system IP and ultimately all the associated
information is to go through a Virtual Private Network (VPN). If you configure a
VPN, then the whole traffic routes through the VPN network, so your true IP
address assigned by your ISP is always hidden.
History of the Website
Quick Fix - History of the Website
Though there are some advantages of keeping
your website in an archive database, but if you
do not like anybody to see how your website
progressed through different stages, then you
can request archive.org to delete the history of
your website.
Fingerprinting
The term OS fingerprinting in Ethical Hacking refers to any method
used to determine what operating system is running on a remote
computer.
● Passive Footprinting
Passive fingerprinting is based on sniffer traces from the remote system. Based on the sniffer traces (such as
Wireshark) of the packets, you can determine the operating system of the remote host.
● Active Footprinting
Active fingerprinting is accomplished by sending specially crafted packets to a target machine and then
noting down its response and analyzing the gathered information to determine the target OS.
nmap Host Scan (nmap -O -v)
Quick Fix - nmap host scan
You can hide your main system behind a secure
proxy server or a VPN so that your complete
identity is safe and ultimately your main system
remains safe.
nmap Port Scan (nmap -sT -p 80)
Quick Fix - nmap port scan
It is always recommended to check and close all
the unwanted ports to safeguard the system from
malicious attacks.
Ping Sweep
A ping sweep is a network scanning technique that you can use to
determine which IP address from a range of IP addresses map to live
hosts. Ping Sweep is also known as ICMP sweep.
You can use fping command for ping sweep. This command is a ping-
like program which uses the Internet Control Message Protocol (ICMP)
echo request to determine if a host is up.
Quick Fix - ping sweep
To disable ping sweeps on a network, you can
block ICMP ECHO requests from outside
sources. This can be done using the following
command which will create a firewall rule in
iptable.
iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP
Prerequisites to be an effective hacker
The Fundamental Skills
● Basic Computer Skills
● Networking Skills
● Linux Skills
● Wireshark / Tcpdump (sniffing)
● Virtualization / Cloud
● Security Concepts & Technologies
● Wireless Technologies
The Intermediate Skills
● Scripting
● Database Skills
● Web Applications
● Forensics
● Advanced TCP/IP
● Cryptography
● Reverse Engineering
● IoT
The Intangible Skills
● Think Creatively
● Problem-Solving Skills
● Persistence
© Harpreet Singh Wadhwa
Harpreet Singh Wadhwa
https://www.meetup.com/offsecblr
https://twitter.com/wharpreet
Mailto: saviour@offsecblr.com

More Related Content

PPTX
Offensive Security basics part 1
PPTX
Introduction to ethical hacking
PDF
Honeypots for Active Defense
PPTX
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
PDF
Threat Hunting with Splunk
PDF
Enabling effective hunt teaming and incident response
PPT
Hacking step (Methodology)
PPTX
vodQA(Pune) 2018 - QAing the security way
Offensive Security basics part 1
Introduction to ethical hacking
Honeypots for Active Defense
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Threat Hunting with Splunk
Enabling effective hunt teaming and incident response
Hacking step (Methodology)
vodQA(Pune) 2018 - QAing the security way

What's hot (20)

PDF
QAing the security way!
PPTX
Threat Hunting with Splunk Hands-on
PDF
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
PPTX
Presentation1
PDF
Threat Hunting Workshop
PPTX
Web hacking 1.0
PDF
Hacking from the Inside
PDF
Advanced Threats and Lateral Movement Detection
PPTX
Hunting before a Known Incident
PDF
Honeycon2016-honeypot updates for public
PPTX
Abstract Tools for Effective Threat Hunting
PPTX
Penetration Testing
PDF
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
PPT
Ethical Hacking
PPTX
Threat Hunting with Splunk
PDF
No Easy Breach DerbyCon 2016
PDF
Threat hunting workshop
PPTX
Login cat tekmonks - v4
PPTX
Honeypots and honeynets
PDF
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
QAing the security way!
Threat Hunting with Splunk Hands-on
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Presentation1
Threat Hunting Workshop
Web hacking 1.0
Hacking from the Inside
Advanced Threats and Lateral Movement Detection
Hunting before a Known Incident
Honeycon2016-honeypot updates for public
Abstract Tools for Effective Threat Hunting
Penetration Testing
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
Ethical Hacking
Threat Hunting with Splunk
No Easy Breach DerbyCon 2016
Threat hunting workshop
Login cat tekmonks - v4
Honeypots and honeynets
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
Ad

Similar to Offensive Security basics part 2 (20)

PPTX
( Ethical hacking tools ) Information grathring
PPTX
Forensic Analysis - Empower Tech Days 2013
PDF
Network Vulnerabilities And Cyber Kill Chain Essay
DOCX
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
PPTX
Scanning and Enumeration in Cyber Security.pptx
PDF
Having Honeypot for Better Network Security Analysis
PDF
04-post-connection-attacks.pdf
PPT
Module 3 Scanning
PPTX
Ethical hacking/ Penetration Testing
PPT
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
PPTX
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
PDF
Nmap basics-1198948509608024-3
PPTX
2. Footprinting and scanning and its sequence.pptx
PPT
Security & ethical hacking p2
PDF
What is ethical hacking and complete cyber security presentation on this file
PPT
Security & ethical hacking
PPTX
Cyber_Threat_Intelligent_Cyber_Operation_Contest
PPT
( Ethical hacking tools ) Information grathring
Forensic Analysis - Empower Tech Days 2013
Network Vulnerabilities And Cyber Kill Chain Essay
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Scanning and Enumeration in Cyber Security.pptx
Having Honeypot for Better Network Security Analysis
04-post-connection-attacks.pdf
Module 3 Scanning
Ethical hacking/ Penetration Testing
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
Nmap basics-1198948509608024-3
2. Footprinting and scanning and its sequence.pptx
Security & ethical hacking p2
What is ethical hacking and complete cyber security presentation on this file
Security & ethical hacking
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Ad

Recently uploaded (20)

PPTX
Hexagone difital twin solution in the desgining
PDF
OpenTimelineIO Virtual Town Hall - August 2025
PPTX
SQL introduction and commands, SQL joining
PDF
Multiverse AI Review 2025_ The Ultimate All-in-One AI Platform.pdf
PPTX
AI Tools Revolutionizing Software Development Workflows
PDF
OpenImageIO Virtual Town Hall - August 2025
PDF
Software Development Company - swapdigit | Best Mobile App Development In India
PDF
solman-7.0-ehp1-sp21-incident-management
PDF
IObit Driver Booster Pro Crack Latest Version Download
PPTX
Lesson-3-Operation-System-Support.pptx-I
PPTX
MCP empowers AI Agents from Zero to Production
PPTX
UNIT II: Software design, software .pptx
PDF
MaterialX Virtual Town Hall - August 2025
PDF
DOWNLOAD—IOBit Uninstaller Pro Crack Download Free
PDF
OpenColorIO Virtual Town Hall - August 2025
PPTX
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
PDF
How to Write Automated Test Scripts Using Selenium.pdf
PPTX
Phoenix Marketo User Group: Building Nurtures that Work for Your Audience. An...
PDF
Module 1 - Introduction to Generative AI.pdf
PPTX
SAP Business AI_L1 Overview_EXTERNAL.pptx
Hexagone difital twin solution in the desgining
OpenTimelineIO Virtual Town Hall - August 2025
SQL introduction and commands, SQL joining
Multiverse AI Review 2025_ The Ultimate All-in-One AI Platform.pdf
AI Tools Revolutionizing Software Development Workflows
OpenImageIO Virtual Town Hall - August 2025
Software Development Company - swapdigit | Best Mobile App Development In India
solman-7.0-ehp1-sp21-incident-management
IObit Driver Booster Pro Crack Latest Version Download
Lesson-3-Operation-System-Support.pptx-I
MCP empowers AI Agents from Zero to Production
UNIT II: Software design, software .pptx
MaterialX Virtual Town Hall - August 2025
DOWNLOAD—IOBit Uninstaller Pro Crack Download Free
OpenColorIO Virtual Town Hall - August 2025
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
How to Write Automated Test Scripts Using Selenium.pdf
Phoenix Marketo User Group: Building Nurtures that Work for Your Audience. An...
Module 1 - Introduction to Generative AI.pdf
SAP Business AI_L1 Overview_EXTERNAL.pptx

Offensive Security basics part 2

  • 1. Cover the Basics: Part 2 February 4, 2018
  • 2. Audience ● Beginners in OffSec ● Students
  • 3. Objective Objective of this session is to give a starting point to people like me who want to explore the world of Offensive Security. This session is not for people who just want to learn hacking (aka Black Hat hacking)
  • 4. Topics ● Phase 1 | Reconnaissance ● Phase 2 | Scanning ● Phase 3 | Gaining Access ● Phase 4 | Maintaining Access ● Phase 5 | Covering Tracks / Reporting
  • 5. Phase 1 | Reconnaissance
  • 6. Supposedly - Abraham Lincoln If I had four hours to chop down a tree, I’d spend the first two hours sharpening the axe
  • 7. Reconnaissance ● Active Reconnaissance In this process, you directly interact with the computer system to gain information. This information can be relevant and accurate. But there is a risk of getting detected if you are planning active reconnaissance without permission. If you are detected, then system admin can take severe action against you and trail your subsequent activities. ● Passive Reconnaissance In this process, you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.
  • 8. Footprinting Tools and tricks to get the information about the computer, IP and mac address, related user and system. ● Passive Footprinting Reviewing a company’s website is an example of passive footprinting. ● Active Footprinting Whereas attempting to gain access to sensitive information through social engineering is an example of active information gathering.
  • 11. Domain Name Information (whois.domaintools.com)
  • 12. Quick Fix - Domain Name Information It's always recommended to keep your domain name profile a private one which should hide the above-mentioned information from potential hackers.
  • 15. Quick Fix - IP Information If a computer system or network is linked with the Internet directly, then you cannot hide the IP address and the related information such as the hosting company, its location, ISP, etc. If you have a server containing very sensitive data, then it is recommended to keep it behind a secure proxy so that hackers cannot get the exact details of your actual server. This way, it will be difficult for any potential hacker to reach your server directly. Another effective way of hiding your system IP and ultimately all the associated information is to go through a Virtual Private Network (VPN). If you configure a VPN, then the whole traffic routes through the VPN network, so your true IP address assigned by your ISP is always hidden.
  • 16. History of the Website
  • 17. Quick Fix - History of the Website Though there are some advantages of keeping your website in an archive database, but if you do not like anybody to see how your website progressed through different stages, then you can request archive.org to delete the history of your website.
  • 18. Fingerprinting The term OS fingerprinting in Ethical Hacking refers to any method used to determine what operating system is running on a remote computer. ● Passive Footprinting Passive fingerprinting is based on sniffer traces from the remote system. Based on the sniffer traces (such as Wireshark) of the packets, you can determine the operating system of the remote host. ● Active Footprinting Active fingerprinting is accomplished by sending specially crafted packets to a target machine and then noting down its response and analyzing the gathered information to determine the target OS.
  • 19. nmap Host Scan (nmap -O -v)
  • 20. Quick Fix - nmap host scan You can hide your main system behind a secure proxy server or a VPN so that your complete identity is safe and ultimately your main system remains safe.
  • 21. nmap Port Scan (nmap -sT -p 80)
  • 22. Quick Fix - nmap port scan It is always recommended to check and close all the unwanted ports to safeguard the system from malicious attacks.
  • 23. Ping Sweep A ping sweep is a network scanning technique that you can use to determine which IP address from a range of IP addresses map to live hosts. Ping Sweep is also known as ICMP sweep. You can use fping command for ping sweep. This command is a ping- like program which uses the Internet Control Message Protocol (ICMP) echo request to determine if a host is up.
  • 24. Quick Fix - ping sweep To disable ping sweeps on a network, you can block ICMP ECHO requests from outside sources. This can be done using the following command which will create a firewall rule in iptable. iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP
  • 25. Prerequisites to be an effective hacker
  • 26. The Fundamental Skills ● Basic Computer Skills ● Networking Skills ● Linux Skills ● Wireshark / Tcpdump (sniffing) ● Virtualization / Cloud ● Security Concepts & Technologies ● Wireless Technologies
  • 27. The Intermediate Skills ● Scripting ● Database Skills ● Web Applications ● Forensics ● Advanced TCP/IP ● Cryptography ● Reverse Engineering ● IoT The Intangible Skills ● Think Creatively ● Problem-Solving Skills ● Persistence
  • 28. © Harpreet Singh Wadhwa Harpreet Singh Wadhwa https://www.meetup.com/offsecblr https://twitter.com/wharpreet Mailto: [email protected]