Monday, January 27, 2020

Tracks Covering in Penetration Testing

Tracks Covering in Penetration Testing Er. Ramesh Narwal Er. Gaurav Gupta Abstract After completing attack, covering tracks is the next step in penetration testing. In tracks covering after completing attack we will return to each exploited system to erase tracks and clean up all footprints we left behind. Tracks covering is important because it gives clue to forensics analyst or Intrusion Detection System (IDS). Sometimes it’s difficult to hide all tracks but an attacker can manipulate the system to confuse the examiner and make it almost impossible to identify the extent of the attacker. In this research paper we describe all of the methods used in tracks covering and their future scope. Keywords: Exploit, Payload, Vulnerability Assessment, Penetration Testing, Track Covering Introduction Penetration testing is nowadays an important organisation security testing method. Penetration testing is also known as Pentesting. Main objective of penetration testing is to identify the security threats in networks, systems, servers and applications. Penetration testing consists of various phases which we discuss in overview of penetration testing. After gaining administrative access on a system or server, attacker first task is to cover their tracks to prevent detection of his current and past presence in the system. An attacker or intruder may also try to remove evidence of their identity or activities on the system to prevent tracing of their identity or location by authorities. To prevent himself an attacker usually erases all error messages, alerts or security events that have been logged. Overview of Penetration Testing Penetration Testing used for validation and effectiveness of security protections and controls of an organisation. It reduce an organisation’s expenditure on IT security by identifying an remediating vulnerabilities or loopholes. It provides preventive steps that can prevent upcoming exploitation. Penetration testing phases Pre-engagement Interactions Intelligence Gathering Threat Modeling Vulnerability Analysis Exploitation Post Exploitation Covering Tracks Reporting Pre-engagement Interactions Planning is the first step in pre-engagement. During this phase scope, goal and terms of the penetration test is finalised with the client. Target and methods of planned attacks are also finalised in this phase. Intelligence Gathering This is most important phase if we miss something here we might miss an entire opportunity of attack. All information regarding target is gathered by using social media networks, google hacking and other methods. Our primary goal during this phase to gain accurate information about target without revealing our presence, to learn how organisation operates and to determine the best entry point. Threat Modeling The information acquired in intelligence gathering phase used in this phase to identify existing vulnerabilities on the target system. In threat modelling, we determine the most effective attack methods, the information type we need and how attack can be implemented at an organisation. Vulnerability Analysis Vulnerability is loophole or weakness in the system, network or product by using which can compromise it. After identification of most effective attack method, we consider how we can access the target. During this phase we combine information acquired in previous phases and use that information to find out most effective attack. Port and Vulnerability scans are performe in this phase and all data is also gathered from previous phases. Exploitation Exploit is a code which allows an attacker to take advantage of the flaw or vulnerability within system, application or service. We must perform exploit only when we are sure that the particular exploit will be successful. May be unforeseen protective measures might be on the target that inhibit a particular exploit. Before trigger a vulnerability we must sure that the system is vulnerable. Our exploit must do proper clean-up after execution at compromised system and must not cause the compromised system to grow into unstable state. Given below figure shows some system shutdown prompt at compromised windows machine due to without proper clean-up of exploit after execution. After successful exploitation the compromised system is under the control of an attacker. Many times attacker or penetration tester need to alter the compromised or breached systems to attain privilege escalation. Post Exploitation Payload is actual code which executed on the compromised system after exploitation. Post Exploitation phase begins after compromised one or more systems. In this phase penetration tester identifies critical infrastructure, targets specific systems, targets information and data that values most and that must be attempted to secure. In Post Exploitation while attacking systems we should take time to understand what the system do and their different user roles. Every tester and attacker generally spend time in compromised system to understand the information he have and how he can take benefit from that information. After gaining access of one system an attacker can access other systems in that network by using compromised as a staging point. This method is known as pivoting. Sometimes attackers creates backdoor into the compromised system to regain access of the system in the future Covering Tracks In the previous phases penetration tester or attacker often made significant changes to the compromised systems to exploit the sytems or to gain administrative rights. This is the final stage in penetration test in which an attack clears all the changes made by himself in the compromised systems and returns the system and all compromised hosts to the precise configurations as they are before conducting penetration test. Reporting All of the information like vulnerability reports, diagrams and exploitation results generated during penetration testing must be deleted after handover to the client. If any information is not deleted it should be in the knowledge of client and mentioned in the technical report which is generated after penetration testing. Reporting is the last phase in penetration test in which penetration tester organise available data and related result sets into report and present that report to the client. This report is highly confidential which have all the results of penetration tests like vulnerabilities list in the organisation systems, networks or products and recommendations to solve these problems related to the security of the organisation assets, which helps organisation in stopping future attacks. How to cover tracks To compromise system successfully an attacker need to be stealthy and avoid detection by various security systems like firewalls, Intrusion detection systems (IDS). System administrators and other security personals uses similar techniques to identify malicious activities, so it’s very important for attacker to be remains undetected. A system administrator can examine processes and log files to check malicious activities. There are various challenges which are faced by a penetration tester after successfully compromise of target system. Now we describe various problem faced by a penetration tester in covering tracks Manipulating Log Files Data To manipulate log files data an attacker must have nice knowledge of commonly used operating systems. An attacker must aware of two types of log files system generated and application generated. Penetraion tester or attacker have two options when manipulating log data first one is to delete entire log and second one is to modify the content of the log file. After deleting entire log an attacker there is surety of undetectability. But there is drawback of deletion of entire log is detection. Second option an attacker have to manipulation of log files data within the log files so that system administrator is not able to notice attacker presence in the system. But sometimes if attacker removal of so much information make gap between logs files makes it noticeable. Log Files Management in Various System Main purpose of log files in various operating systems is to check health and state of operating system, to detect malicious activity, to analysis system if something bad happens(system troubleshooting). Here we show locations of log files in commonly used operating systems Windows, Linux/Unix, Mac. Windows In windows log files or stored in event viewer, which is easy to find simply search event viewer and run it. Event viewer is simply look like the figure as given below, where we can see all log files of the system and applications. Figure : Log Files Managements in Windows Linux/Unix In mainly all linux and unix operating systems log files are stored in the /var/log directory. Mainly system log files are hidden in linux and unix operating systems to see complete list of log files from shell simply type ls –l /var/log/ command in shell. In the below figure we show log files in BackTrack linux operating system Figure : Log Files Management in Linux/Unix Mac To get or access log files in MAC operating system simply open finder and select â€Å"Go to Folder† in the Go menu. Type in /Library/Logs and hit Enter here you get the screen like as given in figure which contains all log files. Figure : Log Files Management in Mac OS X To manipulation of log files data an attacker must have root privileges. Challenges in Manipulation of Log Files If the system administrator configures its system to transfer all log files on the remote server time to time, in that case an attacker or penetration tester can only stop log files transfer process except it they have no other way. Hiding Files Various Tools for Covering Tracks There are so many to compromise a system but after compromising the system the attack must need to cover their tracks because each and every activity that attacker can do is stored or recorded by the system. Every system have different way to record the activity that occurs in the system. Every attacker must covers their tracks that are recorded by the system so that no one can identify him.

Sunday, January 19, 2020

Mini Position Paper Essay

Many schools exist that don’t create student success. In too many school systems today, students are deprived of the education they need to become successful in life. What is society doing to make sure these students find their way? What does it take for them to become successful participants of society? After reading Freire’s, Pedagogy of the Oppressed, I must say there is some truth to students being oppressed for they are being forced to matriculate in an educational environment they aren’t familiar with; can’t survive in; or don’t want to be in. Students who are in the predicament noted above are not able to thrive in a strong academic environment because, as Freire states, they don’t know their reality. If they knew their reality, they would be better prepared to adjust to what they need for academic success. My position is that students that will better succeed in vocational or magnet schools. The vocational option is best suited for students that are not college bound and need to learn hands-on job skills to work right out of high school. For the nontraditional student the magnet option can work well. As a dancer, I attended magnet performing art school and this opportunity allowed me to learn about my craft and move on to earning a scholarship to Temple University in dance and theater. It allowed me the option to get involved in a field that I love and having a love for what you do makes the difference in which you become. There is no denying that people are mentally in different places at different times in their lives. Whether they have been raised in a single parent home, or whether they grew up in an environment that isn’t conducive to learning, it is important that students know what they can handle in an educational setting. For some students, an advanced math class or AP courses may not be reasonable. There are some students that understand where they stand academically and know that they aren’t able to learn under the same conditions as other students. These students need to develop other avenues in which to become successful. Vocational and Magnet schools are a great source for students that aren’t ready for a rigorous academic curriculum. Although students will still get the core courses they need to graduate, they will also have a trade that will at least keep them employed and able to take care of them after graduating. There are students that have a love for cosmetology, auto mechanics or even plumbing. One important fact is that there are colleges that offer two year degrees in these vocational trades. It is crucial that today’s generation know that there are options outside of becoming a doctor or lawyer. While we always need lawyers, doctors, and teachers, the world also needs mechanics to fix cars, a plumber to fix leaks the correct way or even a specialist to make sure a heating or air conditioning system is properly working. It is important that today’s student be comfortable in knowing that being academically challenged is okay, and that choosing a vocational education is an option. Vocational Magnet educations are just as important and should be interjected in all of today’s schools for they too serve a vital function in preparing our students in life. â€Å"The Guardian†, a newspaper printed in the U. K. , ran an article in 2013 regarding vocational educations. It questioned the validity of the concept of vocational educations by asking the public if they value vocational skills. The article allowed people to give their opinions. Although most people were in support of vocational education, there were some that weren’t. One person commented that though he didn’t look down on vocational education, he would not consider the vocational route if he didn’t get the grades needed to attend a university. He finished by explaining he would definitely go for A-levels because in his opinion, â€Å"they are far more respected by employers and universities†. In his opinion, having a career rather than a skill is more esteemed. After reading the article, I was stunned at the idea that vocational educations aren’t respected. That a plumber or custodian is not valued is a disrespectful and cocky position to take. Society will always needs someone to make sure offices are clean and bathroom toilets run properly. People underestimate that diverse careers are needed for the world to effectively revolve. Unfortunately vocational skills like plumbing, carpentry, and electricians have been downgraded in social status over the years. One of the biggest issues in education today is low graduation rates, low college entry and a growing rate of unemployment. Vocational education can be the resolution to this problem. What are missing in schools are alternatives like a technical baccalaureate, which offers valuable learning and real skills, and leads to real jobs for young people. Getting children in the right program for their learning needs is what leads to success. Vocational qualifications serve a need for particular kinds of students and are very important skills. Vocational education training provides career and technical education for students interested in jobs that are based upon labor-intensive or real-world jobs. The plus side to vocational education is that students have the opportunity to work in their field while in school; it requires less education than four year degree programs; the vocational fields are vast and varied such as, pharmacy and medical technicians, paralegals, medical assistants, office assistants, cosmetologists, mechanics and construction workers; it assists in higher graduation rates; increased employment; and overall student achievement. The objective in education is to assist students in their quest of having a stable life. A vocational education reinforces the connections between secondary and postsecondary education, and improves accountability for students.

Saturday, January 11, 2020

John Locke and the Declaration of Independence Essay

In 1689, John Locke published, what proved to be, a valuable document for the American Revolution as well as life in present day America, known as the Second Treatise of Government. In his document he creates a model of his ideal civil government, which is created by the people to ensure their â€Å"natural rights† of life, liberty, and property. This government may also be dissolved upon the decision of the people, when it is believed that the sovereignty has ceased to function properly. Locke’s model government is based on his idea of the â€Å"state of nature†; perfect freedom, the state all men are in naturally. This idea infers that all men will govern themselves accordingly; however chaos and anarchy would always occur. Men, in the â€Å"state of nature†, all have the drive and want to acquire more than which they already possess. Men, also, have the same capabilities of doing so, which ultimately creates conflict between men. This is where the idea of the â€Å"politic society† comes into play. The â€Å"politic society† is where men forfeit their individual right to govern themselves, and instead create a â€Å"social contract† amongst one another. The â€Å"social contract† is a binding agreement between the government and the governed, in which the governed agree to sacrifice their individual political power and obey laws, while the government agrees to provide protection of property and enforce/create laws th at promote the common good. The government is prohibited from doing which the governed does not consent nor comply with. Once government goes above or beyond its prescribed capabilities, it is then that it should be dissolved. Locke insists the government may be dissolved in any instance, if does not receive consent from its governed during: legislative alteration, executive hindering its legislative, alteration of elective process the executive, failure to enforce existing laws, and subjection to foreign powers. It is evident that, while Thomas Jefferson was formulating his document, The Declaration of Independence, he was highly influenced by Locke’s views within his Second Treatise of Government. In fact, the preamble to The Declaration of Independence encompasses Locke’s ideas of the â€Å"state of nature† and the â€Å"politic society† as demonstrated here: â€Å"We hold these truths to be self-evident: that all men are created equal; that they are endowed by their Creator with certain unalienable rights; that among these are life liberty and the pursuit of happiness; that, to secure these rights, governments are instituted among men, deriving their just powers from the consent of the governed; that whenever any form of government becomes destructive of these ends, it is the right of the people to alter or to abolish it, and to institute new government, laying its foundation on such principles, and organizing it powers in such form, as to them shall seem most likely to affect their safety and happiness.† This is directly parallel to what Locke states in his Second Treatise to the Government, with the insertion of property in place of happiness, when he says: â€Å"Men being, as has been said, by nature, all free, equal, and independent, no one can be put out of this estate, and subjected to the political power of another, without his own consent†¦Ã¢â‚¬  Another instance of parallelism is within the Declaration of Independence’s list of grievances and Locke’s grounds for dissolution. Jefferson states that: â€Å"He (The King of Great Britain) has refused his assent to laws, the most wholesome and necessary for the public good. He has refused for a long time, after such dissolution, to cause others to be elected†¦ He has plundered our seas, ravaged our coasts, burned our towns, and destroyed the lives of our people†. All of these grievances are considered by Locke, to be just reasons for the dissolution of the current government. Even though, both documents appear to be quite similar, there is a slight difference. Locke’s views are more individualistic. He concentrates on the rights and duties of the individual. While on the other hand, Jefferson’s main focus is on the government and its rights and limitations. Both proved to be highly effective in each owns instance. Case in point, on July 4, 1776, that The Declaration of Independence was formally adopted by the Continental Congress and the American Revolution officially began. Another important issue to be discussed is slavery. In the Second Treatise of Government, Locke maintains that the â€Å"perfect condition of slavery† is based upon consent. That â€Å"man is to be free from any superior power on earth, and not to be under the will or legislative authority of man, but to have only the law of nature for his rule† yet† having by his fault forfeited his own life by some act that deserves death, he to whom he has forfeited it may, when he has him in his power, delay to take it and make use of him to his own service†¦Ã¢â‚¬  Locke essentially is saying slavery is a consensual debt to someone and should not be used in any other instance. The topic of slavery was not included within the embodiment of The Declaration of Independence. In America, slavery was not consistent with Locke’s view of doubtful servitude. Instead, slaves were brought over from other countries, or born into it themselves and it became a common, harsh way of life for African Americans of that time. A prime example would be Frederick Douglass; a self educated, escaped slave, who was a part of the abolitionist movement during the pre-civil war era. He believed that the Declaration of Independence, the document itself and its ideas, did not apply to he and his people, for they were not free. In his oration, what to Say to the Slave is the Fourth of July, he declares that: â€Å"I am not included within the pale of this glorious anniversary! Your high independence only reveals the immeasurable distance between us. The blessings in which you, this day, rejoice, are not enjoyed in common— the rich inheritance of justice, liberty, prosperity and independence†¦ is shared by you and not by me.† It is clear that Frederick Douglass shows a great deal of discontent towards the 4th of July and what it represents to Americans because it doesn’t represent anything for African Americans but after a great deal of effort and a civil war, slavery was abolished in 1868 with the 14th Amendment to the Constitution. During the abolitionist movement, there was another prominent cause in America, the women’s movement. The women of the time, Lucretia Mott for example, felt that women shared a similar cause with the African Americans, in that they were treated unfairly and suffered from inequality in society. They wanted equal rights, mainly the right to vote. The Declaration of Sentiments and Resolutions was a Mott’s response to the Declaration of Independence; a parody of the rights of man, the Caucasian man in particular. It is in this document that she demonstrates how women are deprived of the rights to liberty, justice, and property. After many rallies and protest, women were granted the right to vote in 1919 under Amendment XIX. The next great movement of America’s history was the Civil Rights Movement. This forged many great leaders such as Malcolm X and Dr. Martin Luther King Jr. Both men shared t opposite views on which actions to take to promote their cause. Dr. King advocated the non-violent approach. He and his followers held rallies and protests and tried to educate America about this current state of inequality and segregation through pamphlets and orations. One of Dr. King’s most famous pieces was a Letter from a Birmingham Jail. He too, like Mott, used words in order to express the current condition of deprivation of life, liberty, and property. All of these great movements would have been impossible, if it were not for Locke’s Second Treatise of Government. This document created what became a domino effect of social revolutions in the post years after its publication and is a valuable source of model democratic system still today.

Friday, January 3, 2020

The Death Of Meursault s Mother - 1572 Words

What effect does the death of meursault’s mother have on him and to what extent does this affect him in the novel? Why did camus choose to pick mother and not someone else and how does this show the role of women in the novel? Uchenna Diamond Umunna Written Assignment Mrs. Pillarella May 30, 2015 Uchenna Diamond Umunna Mrs. Pillarella Ib English, Period 5 30 May 2015 What effect does the death of meursault’s mother have on him and to what extent does this affect him in the novel? Why did camus choose to pick mother and not someone else and how does this show the role of women in the novel? â€Å"Maman died today. Or yesterday maybe, I don’t know. I got a telegram from the home: ‘Mother deceased. Funeral tomorrow. Faithfully yours.’ That doesn’t mean anything. Maybe it was yesterday.† (Camus, pg. 3). Meursault in the novel is a person who views and describes much of what occurs around him. He is emotionally different to others around him even to his mother and his lover, Marie. He also refuses to follow the accepted moral order of society, â€Å"I said that I didn’t believe in God† (116). After Meursault kills the Arab,he goes to jail and is put on trial. However, the true focus of Meursault’s murder trial quickly slides away from the murder itself to the way Meursault believes in his attitudes and beliefs. Meursault’s lack of emotional grief at his mother’s funeral act for a serious challenge to the morals and beliefs of the society in which he lives. Maman is theShow MoreRelatedAlbert Camuss The Stranger1030 Words   |  5 Pagesfrom the home: ‘Mother deceased. Funeral tomorrow. Faithfully yours.’ That doesn t mean anything. Maybe it was yesterday.† (1.1.1) In The Stranger, Albert Camus sets the stage for the character of Meursault. Meursault, being the main character, portrays an individual who struggles with himself in functioning and reacting to daily situations. Meursault views the world with lack of meaning and disregard to the meaning of human life. His lack of remorse for his mother’s death is just one exampleRead MoreThe Stranger By Albert Camus1391 Words   |  6 PagesThe Stranger â€Å"The Stranger,† written by the Algerian writer Albert Camus, is a novel about Meursault, a character who’s different and even threatening views on life take him to pay the highest price a person can pay: his life. This was Camus’ first novel written in the early 1940’s, in France, and it reflects the authors belief that there is no meaning in life and it is absurd for humans to try to find it places like religion. The main themes of the novel are irrationality of the universe and theRead MoreThe Characterization Of Meursault In The Stranger1013 Words   |  5 PagesStranger, the characterization of Meursault plays and valuable role in outlining the meaning of this novel. Meursault is the main character in this book and the story follows a part of his life form his first person point of view. Meursault, like the author, does not believe in God, or any religion for that matter. Throughout this story it is revealed that meursault lives a highly indi fferent life, and physical impulses such as sex and smoking make him happy. Meursault is tried for the murder of anRead MoreAnalysis Of The I Don t Feel Anything 1292 Words   |  6 Pagesanything else.† (4) Meursault is trying to shrug off a soldier, so just goes along with what the soldier is saying. His detachment is foreshadowing for dealing with his mother’s death, as he won’t show any emotion throughout her funeral. I predict that his detachment will come back later to bite him. The irony here is, that he’s annoyed, yet trying not to show emotion. So his whole ‘I don’t feel anything† act is really a big phony. This scene builds character, that Meursault is a very unfeeling personRead MoreAnalysis Of The Stranger1 By Albert Camus1331 Words   |  6 Pagesthe life of M. Meursault from the time of his mother s death up to a time evidently just before his execution for the murder of an Arab. The central theme is that the significance of human life is understood only in light of mortality, or the fact of death; and in showing Meursault s consciousness change through the course of events, Camus shows how facing the possibility of death does hav e an effect on one s perception of life. The novel begins with the death of Meursault s mother. Although heRead MoreAnalysis Of The Stranger1 By Albert Camus Essay1331 Words   |  6 Pagesthe life of M. Meursault from the time of his mother s death up to a time evidently just before his execution for the murder of an Arab. The central theme is that the significance of human life is understood only in light of mortality, or the fact of death; and in showing Meursault s consciousness change through the course of events, Camus shows how facing the possibility of death does have an effect on one s perception of life. The novel begins with the death of Meursault s mother. Although heRead MoreAnalysis Of The Stranger By Albert Camus1526 Words   |  7 PagesWithout the role of the Arab, Meursault, would never have gone to prison, and never be tried for murder. Part C: Foil Character In literature, foil characters are used to bring out the distinctive qualities of another character by contrasting with them. In The Stranger, by Albert Camus, Marie Cardona plays the role of a foil character as she brings out Meursault s emotional characteristics. When she told him that she loved him and asked if he loved her, Meursault responded: I answered the sameRead MoreAnalysis Of The Outsider 1397 Words   |  6 Pagesimportance of the physical world in the novel The Outsider, through his character Meursault. Camus uses the elements to exhibit the importance of an individual s physical needs, and how they shape their personality. Meursault is a character that requires his physical needs to be met before he is able to make logical decisions for himself. When he follows through with his decisions, society views them as immoral creating Meursault as a villain in the eyes of society. However, his thoughtless decisions areRead MoreAnalysis Of The Book The Stranger 1670 Words   |  7 Pagesreading the first sentence of Albert Camus s masterpiece The Stranger, many readers and critics conclude that its protagonist, Meursault, is either a fool, a madman, or a callous boor: Today, maman died. Or perhaps yesterday, I don t know. I have received a telegram from the nursing home. Mother deceased. Burial tomorrow. Sincerely yours. That doesn t mean anything. It was perhaps yesterday (Camus 1, my translation). Quoting Stuart Gilbert s slightly inaccurate English translation of thisRead MoreThe Stranger, My Understanding Of The Culture And Absurdist Perspective1287 Words   |  6 PagesStatement Through our class discussion on Camus’ The Stranger, my understanding of the culture and absurdist perspective of this book was furthered amplified. During our dialogue we discussed the French existentialist movement occurring in the 1940’s and how this directly influenced both Camus’ The Stranger and his essay on Sisyphus about absurdism. It was important to note the culture and setting in which Camus wrote this novel to further understand the character Meursault’s feelings of physical