{"id":299,"date":"2018-01-18T22:32:52","date_gmt":"2018-01-18T20:32:52","guid":{"rendered":"https:\/\/www.caribou360.com\/blog\/?p=299"},"modified":"2018-01-21T23:25:25","modified_gmt":"2018-01-21T21:25:25","slug":"security-company-safe","status":"publish","type":"post","link":"https:\/\/www.caribou360.com\/blog\/security-company-safe\/","title":{"rendered":"Is the IT-Security of your company safe?"},"content":{"rendered":"<p>If you are responsible to answer this question, you are engaged in the security of your company and therefore supposed to use hacking techniques to achieve realistic results. Break through the firewall, access the DMZ and the internal LAN network. Get yourself access to the Windows domain and administrator accounts. Access the ERP servers and the different VLAN\u2019s and so on. You know how to do this, right? Don\u2019t worry, Caribou360 is here to help!<br \/>\n<!--more--><br \/>\nIt is quite important to know how you might get hacked instead of just updating your software and hope for the best or that your hosting provider knows what to do. Caribou360 offers awesome and fast web hosting too \u2013 just for the records. If you want to become the next &#8220;l33th4x0r&#8221;, you might want to take a look at the following courses:<\/p>\n<h2><strong>c360sec<\/strong>.advanced<\/h2>\n<p><strong>Footprinting<\/strong><br \/>\nWhich information is publicly available on the Net?<\/p>\n<p><strong>Hacking Tools<\/strong><br \/>\nAll about Kali Linux \u2013 Identify targets on the web.<\/p>\n<p><strong>Port Scanning<\/strong><br \/>\nFind vulnerable targets.<\/p>\n<p><strong>Google Hacking<\/strong><br \/>\nUse Google to find live targets.<\/p>\n<p><strong>WLAN<\/strong><br \/>\nLearn how to hack a WPA2 secured network.<\/p>\n<p><strong>Exploits<\/strong><br \/>\nHow they work and the risks.<\/p>\n<p><strong>Mobile Security<\/strong><br \/>\nHacking Android and iOS.<\/p>\n<p><strong>Attacking Virtual Server<\/strong><br \/>\nMan-in-the-Middle sniffing in a switched network.<\/p>\n<p><strong>DNS-Hacking<\/strong><br \/>\nRedirect a website to another.<\/p>\n<p><strong>VPN-Hacking<\/strong><br \/>\nAnalyze the VPN Gateway for vulnerabilities and learn how to hack active connections to retrieve domain passwords.<\/p>\n<p><strong>SSL Hacking<\/strong><br \/>\nMonitor and manipulate connections.<\/p>\n<p><strong>Website Hacking<\/strong><br \/>\nSQL Injection, XSS \/ Cross Site Scripting.<\/p>\n<p><strong>Tunneling<\/strong><br \/>\nDodge Firewalls and Proxies and break out of a secured Network known as Calling home \/ Backchannel.<\/p>\n<p><strong>VoIP<\/strong><br \/>\nLearn how to monitor (and secure) phone calls between VoIP clients and server.<\/p>\n<p><strong>Password Hacking<\/strong><br \/>\nHack Windows passwords via Rainbow Tables and decrypt website passwords.<\/p>\n<p><strong>Biometry<\/strong><br \/>\nLearn how to fake Fingerprints to sign in on a Windows system.<\/p>\n<p><strong>Penetration Testing<\/strong><br \/>\nSecurity Audits.<\/p>\n<p><strong>Forensic<\/strong><br \/>\nTrace Hackers.<\/p>\n<h3><strong>c360sec<\/strong>.professional<\/h3>\n<p><strong>Web- and Firewall Hacking, Social Engineering<\/strong><br \/>\nCurrent hacking software at a glance. Which information about users and administrators are important to the attacker?<\/p>\n<p>\u2022 Automated information search of your company<br \/>\n\u2022 Information Gathering<br \/>\n\u2022 Personalize password lists using social engineering<br \/>\n\u2022 Automated web security scanner<br \/>\n\u2022 DNS Zone Stealing<br \/>\n\u2022 Identify vulnerabilities in the server and firewall by extended vulnerability scans<br \/>\n\u2022 Pivoting &#8211; access to the DMZ<\/p>\n<p><strong>Exploiting<\/strong><\/p>\n<p>\u2022 Windows, Windows Server<br \/>\n\u2022 DMZ Server<br \/>\n\u2022 Metasploit &#8211; important functions and access options<br \/>\n\u2022 Armitage<br \/>\n\u2022 Access to FTP server using Exploiting technology<br \/>\n\u2022 Password Stealing &amp; cracking from the Windows Active Directory<\/p>\n<p><strong>Internal System<\/strong><\/p>\n<p>\u2022 Attacking ERP systems<br \/>\n\u2022 Access from the Internet, via the DMZ to the internal LAN &#8211; Reverse Proxy Chains<br \/>\n\u2022 Privilege Escalation &#8211; get extended admin privileges with normal user privileges<br \/>\n\u2022 Pass the Hash &#8211; Access a Windows system without cracking the password hash<br \/>\n\u2022 Advanced man in the middle attacks<br \/>\n\u2022 Bruteforce attack on terminal server<br \/>\n\u2022 Browser Hijacking<\/p>\n<p><strong>Even more<\/strong><\/p>\n<p>\u2022 VLAN Hacking &#8211; access other VLANs<br \/>\n\u2022 WLAN hacking using Rogue Access points<br \/>\n\u2022 Keylogger practice<br \/>\n\u2022 Listening to DECT calls<br \/>\n\u2022 Mobile Hacking Devices<\/p>\n<p><strong>Java, PHP, HTML 5 Security<\/strong><\/p>\n<p>\u2022 Identify and evaluate threats:<br \/>\nWho is attacking? Where does the attack come from? What are worthwhile goals?<br \/>\n\u2022 Burp Suite, Arachni, NetSparker, Nikto, Skipfish, ZAP and others<br \/>\n\u2022 Top 10 security risks for web applications<br \/>\n\u2022 HTML5 Security Practice<br \/>\n\u2022 SQL Injection, LDAP Injection, Command Injection<br \/>\n\u2022 Cross Site Scripting \/ XSS<br \/>\n\u2022 Spying on and manipulating users, taking over web pages<\/p>\n<p><strong>Web Application Firewall Hacking<\/strong><br \/>\nAnalyze sessions and find authentication and session management vulnerabilities<\/p>\n<p><strong>Direct access to sensitive Data<\/strong><br \/>\nRead secret messages of the community management<\/p>\n<p><strong>Cross Site Request Forgery \/ CSRF<\/strong><br \/>\nForce attackers to run your manipulated scripts<\/p>\n<p><strong>Configuration errors<\/strong><br \/>\nExploit open ports, unused services and typically misconfigured software<\/p>\n<p><strong>Vulnerable despite Encryption<\/strong><br \/>\nSSL, md5, DES, SHA, Rainbow Tables<br \/>\n<strong><br \/>\nAccess to privileged pages<\/strong><\/p>\n<p>\u2022 Are transmission paths really protected?<br \/>\n\u2022 Redirects and redirect supported phishing and other attacks<br \/>\n\u2022 Reviewing pitfalls, UTF-8 and other encodings, regular expressions<br \/>\n\u2022 Are your vulnerabilities already known to the attackers?<\/p>\n<p><strong>Google Hacking, Frameworks, Social Networks<\/strong><br \/>\nMinimize risks<\/p>\n<p><strong>Regression tests<\/strong><br \/>\nCreate automated tasks to search for already known security issues.<\/p>\n<h4><strong>c360sec<\/strong>.mobile<\/h4>\n<p><strong>Spy software and how to protect yourself<\/strong><\/p>\n<p><strong>Mobile Device Policy, BYOD<\/strong><\/p>\n<p>\u2022 Mobile Device Management Systems<br \/>\n\u2022 Identify unwanted systems and how to block them<br \/>\n\u2022 Apps as an attack vector<br \/>\n\u2022 Mobile Hotspot attacks<br \/>\n\u2022 Jailbreaks<br \/>\n\u2022 GSM attacks<br \/>\n\u2022 Forensically read data and secure it<br \/>\n\u2022 Skip local passwords<br \/>\n\u2022 Backdoors<br \/>\n\u2022 Fake SMS messages<br \/>\n\u2022 Web and SSL attacks<br \/>\n\u2022 Identify theft<\/p>\n<p><strong>Notebook Security<\/strong><\/p>\n<p>\u2022 BitLocker and Notebook Encryption hacking<br \/>\n\u2022 Hotel WLAN risks<\/p>\n<h5><strong>c360sec<\/strong>.forensic<\/h5>\n<p>\u2022 Forensic today \u2013 numbers and facts<br \/>\n\u2022 Analysis of external and internal offenders<br \/>\n\u2022 Expiration of an attack from the perspective of the hacker<br \/>\n\u2022 Incident Detection Hacker<br \/>\n\u2022 Response: Forensic or system recovery?<br \/>\n\u2022 Incident Response: Procedure in case of suspicion<br \/>\n\u2022 Forensic Tools \u2013 commercial and open source<br \/>\n\u2022 Analysis of running systems<br \/>\n\u2022 Create forensic duplicates yourself<br \/>\n\u2022 Post Mortem Offline Analysis<br \/>\n\u2022 Forensic and virtual Server<br \/>\n\u2022 Mobile Devices<br \/>\n\u2022 Recovery of deleted or manipulated files<br \/>\n\u2022 Anti-Forensic: How to obscure attacks<\/p>\n<p>Experts should take a closer look at <a href=\"https:\/\/www.enigmagroup.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.enigmagroup.org\/<\/a> to improve their skills even more. The Enigma Group offers more than 300 challenges and it is a great place to learn everything about hacking at your very own pace.<\/p>\n<p>Caribou360 also offers remote Web- and IT-Security services!<\/p>\n<p>Get in touch!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you are responsible to answer this question, you are engaged in the security of your company and therefore supposed to use hacking techniques to achieve realistic results. Break through the firewall, access the DMZ and the internal LAN network. Get yourself access to the Windows domain and administrator accounts. Access the ERP servers and &hellip; <a href=\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Is the IT-Security of your company safe?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":300,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[22,42,43,18,6],"tags":[48,45,44,47,46],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is the IT-Security of your company safe? | Caribou360<\/title>\n<link rel=\"canonical\" href=\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is the IT-Security of your company safe? | Caribou360\" \/>\n<meta property=\"og:description\" content=\"If you are responsible to answer this question, you are engaged in the security of your company and therefore supposed to use hacking techniques to achieve realistic results. Break through the firewall, access the DMZ and the internal LAN network. Get yourself access to the Windows domain and administrator accounts. Access the ERP servers and &hellip; Continue reading &quot;Is the IT-Security of your company safe?&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/\" \/>\n<meta property=\"og:site_name\" content=\"Caribou360\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Caribou360\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-18T20:32:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-21T21:25:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.caribou360.com\/blog\/wp-content\/uploads\/2018\/01\/caribou_hacking.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:creator\" content=\"@Caribou360\" \/>\n<meta name=\"twitter:site\" content=\"@Caribou360\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"4 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.caribou360.com\/blog\/#organization\",\"name\":\"Caribou360\",\"url\":\"https:\/\/www.caribou360.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/Caribou360\/\",\"https:\/\/www.instagram.com\/caribou360\/\",\"https:\/\/www.linkedin.com\/company\/caribou360\/\",\"https:\/\/twitter.com\/Caribou360\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.caribou360.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.caribou360.com\/blog\/wp-content\/uploads\/2017\/07\/caribou360-logo.png\",\"contentUrl\":\"https:\/\/www.caribou360.com\/blog\/wp-content\/uploads\/2017\/07\/caribou360-logo.png\",\"width\":675,\"height\":225,\"caption\":\"Caribou360\"},\"image\":{\"@id\":\"https:\/\/www.caribou360.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.caribou360.com\/blog\/#website\",\"url\":\"https:\/\/www.caribou360.com\/blog\/\",\"name\":\"Caribou360\",\"description\":\"Superior Alaska Web Design\",\"publisher\":{\"@id\":\"https:\/\/www.caribou360.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.caribou360.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.caribou360.com\/blog\/wp-content\/uploads\/2018\/01\/caribou_hacking.jpg\",\"contentUrl\":\"https:\/\/www.caribou360.com\/blog\/wp-content\/uploads\/2018\/01\/caribou_hacking.jpg\",\"width\":750,\"height\":350,\"caption\":\"Is the IT-Security of your company safe?\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/#webpage\",\"url\":\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/\",\"name\":\"Is the IT-Security of your company safe? | Caribou360\",\"isPartOf\":{\"@id\":\"https:\/\/www.caribou360.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/#primaryimage\"},\"datePublished\":\"2018-01-18T20:32:52+00:00\",\"dateModified\":\"2018-01-21T21:25:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.caribou360.com\/blog\/\",\"url\":\"https:\/\/www.caribou360.com\/blog\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/\",\"url\":\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/\",\"name\":\"Is the IT-Security of your company safe?\"}}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.caribou360.com\/blog\/#\/schema\/person\/ab9d766e213f226f255726e9d23d3303\"},\"headline\":\"Is the IT-Security of your company safe?\",\"datePublished\":\"2018-01-18T20:32:52+00:00\",\"dateModified\":\"2018-01-21T21:25:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/#webpage\"},\"publisher\":{\"@id\":\"https:\/\/www.caribou360.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.caribou360.com\/blog\/security-company-safe\/#primaryimage\"},\"keywords\":\"Hacking,IT-Security,Kali Linux,Metasploit,Web-Security\",\"articleSection\":\"Caribou360,Hacking,Kali Linux,Metasploit,VPN\",\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.caribou360.com\/blog\/#\/schema\/person\/ab9d766e213f226f255726e9d23d3303\",\"name\":\"caribou\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.caribou360.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a44c75f8c33c20644e5b338e4f1ad752?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a44c75f8c33c20644e5b338e4f1ad752?s=96&d=mm&r=g\",\"caption\":\"caribou\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","jetpack_featured_media_url":"https:\/\/www.caribou360.com\/blog\/wp-content\/uploads\/2018\/01\/caribou_hacking.jpg","jetpack_publicize_connections":[],"jetpack_shortlink":"https:\/\/wp.me\/p93bBe-4P","_links":{"self":[{"href":"https:\/\/www.caribou360.com\/blog\/wp-json\/wp\/v2\/posts\/299"}],"collection":[{"href":"https:\/\/www.caribou360.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.caribou360.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.caribou360.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.caribou360.com\/blog\/wp-json\/wp\/v2\/comments?post=299"}],"version-history":[{"count":0,"href":"https:\/\/www.caribou360.com\/blog\/wp-json\/wp\/v2\/posts\/299\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.caribou360.com\/blog\/wp-json\/wp\/v2\/media\/300"}],"wp:attachment":[{"href":"https:\/\/www.caribou360.com\/blog\/wp-json\/wp\/v2\/media?parent=299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.caribou360.com\/blog\/wp-json\/wp\/v2\/categories?post=299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.caribou360.com\/blog\/wp-json\/wp\/v2\/tags?post=299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}