《互联世界的危险.pdf》由会员分享,可在线阅读,更多相关《互联世界的危险.pdf(16页珍藏版)》请在三个皮匠报告上搜索。
1、The Dangers of an Inteconnected WorldMONTANA INFORMATION SECURITYShayne MorganIntroductionI was born in Butte,MT a larger than life mining town in southwest Montana.My first experience with a computer was in 5th grade.It was a The Commodore 1530(C2N)Datasette.A cassette tape was the storage medium.Y
2、ou dont see many cassettes these days.LINUX MINT MATEThe operating system Im demonstrating with is Linux Mint.Its a Debian based distro that is extremely light weight and is compatible with most of the Ubuntu packages.The package manager is sudo apt.OPEN SOURCEThere are thousands of open source tool
3、s available for hackers.Kali Linux,Arch Linux,and ParrotOS are just some of the free pentesting distros available that have everything you need to start hacking other than the knowledge of how to do it.IntroductionA recent article published by Gartner shows that at any given time there are over 6 bi
4、llion devices connected to the internet.ENDPOINTSWith this many devices connected to the internet,Imagine how many endpoints exist?With this many devices connected to the internet,some doors can be left wide open.I will demonstrate how these leaks can be exploited using simple tools available to any
5、one.BURPSUITEBurpSuite is a common tool used in pentesting.It allows you to capture traffic between the client and the server.Open-Source ToolsOpen Source Intelligence(OSINT)Google DorksObjective 01Objective 02Objective 03is a technique used by hackers and security researchers to find sensitive info
6、rmation on websites using Googles search engine.It is also known as Google hacking or Google Dorking.GOOGLE EXPLOIT DATABASESHODANShodan gathers information about all devices directly connected to the Internet.If a device is directly hooked