Ethical hacking involves performing penetration tests with a company's permission to discover vulnerabilities from a hacker's perspective and improve security. An ethical hacking plan should establish goals, determine systems to test, define testing standards, and select appropriate tools. The plan helps structure the ethical hacking process and ensures proper authorization for legal testing.
Hacking refers to unauthorized access to computer systems or networks. There are different types of hackers, including black hat (malicious), white hat (ethical), and grey hat hackers. Ethical hacking involves legally testing systems for vulnerabilities to help organizations strengthen security. It can assess wireless, application, and network security. While hacking can enable privacy violations and system damage, ethical hacking helps identify issues and prevent unauthorized access. It is an important practice with a growing scope due to increasing cyber threats.
Inetsecurity.in Ethical Hacking presentationJoshua Prince
油
This document provides an overview of hacking and ethical hacking. It discusses different types of hackers like white hat, black hat and gray hat hackers. It explains why people hack and the hackers' language. The document describes the process of ethical hacking which includes preparation, footprinting, vulnerability identification, attacks, gaining access and escalating privileges. It discusses what hackers do after hacking like patching vulnerabilities, hiding themselves and installing backdoors. The document provides tips on system protection and recovery steps to take after being hacked. It identifies web vulnerabilities as prone to hacking attacks. In conclusion, it provides contact information for campus workshops on additional hacking topics.
Ethical hacking and email scraping techniques were discussed. Ethical hacking involves using the same tools as hackers but to test security and report vulnerabilities rather than cause damage. It was outlined that port scanning allows discovery of open ports and weaknesses. The document also categorized different types of hackers and explained the hacking process. Advantages of ethical hacking include improving security, while disadvantages include costs and trust in the ethical hacker.
This document discusses computer security and ethical hacking. It covers various types of hacking like interruption and interception. It defines different types of hackers like white hat, black hat and gray hat hackers. It explains the process of ethical hacking which includes preparation, footprinting, vulnerability identification and exploitation. The document provides details on what hackers do after gaining access like covering tracks, creating backdoors. It suggests ways to protect systems like patching vulnerabilities, encrypting data, and setting up firewalls and intrusion detection systems. It advises actions to take after being hacked like restoring from backups.
Hacking involves identifying and exploiting weaknesses in computer systems to gain unauthorized access, while ethical hacking (also called penetration testing or white-hat hacking) involves using the same tools and techniques as hackers but legally and without causing damage. There are different types of hackers, including black hat hackers who use their skills maliciously, white hat hackers who use their skills defensively, and grey hat hackers whose behavior cannot be predicted. Ethical hacking is important for evaluating security and reporting vulnerabilities to owners.
This document discusses ethical hacking and provides an overview of key concepts. It defines ethical hacking as legally breaking into computer systems to test defenses without damaging systems or stealing information. It describes different types of hackers including black hat, white hat, and grey hat hackers. The document outlines the hacking process and required skills of an ethical hacker such as knowledge of operating systems, firewalls, and networking protocols. It discusses why ethical hacking is important to protect against external attacks and close security vulnerabilities.
The document provides an overview of web hacking, including:
1. An agenda that outlines reconnaissance, scanning, exploitation, maintaining access, and covering tracks in a web hacking process.
2. Descriptions of different types of hackers like white hat and black hat hackers, and classifications like script kiddies and hacktivists.
3. Explanations of the reconnaissance, scanning, and exploitation phases of web hacking, including common tools used in each phase like Whois, Nmap, and Nessus.
The document discusses ethical hacking and penetration testing. It begins by defining hacking and clarifying that hacking is not always illegal, harmful, or unethical. It then differentiates between vulnerability assessments, penetration tests, and security tests. Various types of hackers (white hat, black hat, gray hat) and penetration tests (white box, black box, gray box) are defined. The stages of a penetration test are outlined as pre-engagement, information gathering, threat modeling, vulnerability analysis, exploitation/post-exploitation, and reporting. Different penetration testing methodologies and activities like network penetration tests and mobile application tests are also mentioned.
This document provides an overview of computer hacking and ethical hacking. It discusses the history of hacking, different types of hackers (e.g. white hat, black hat), why people hack, and the hacking process. The hacking process involves preparation, footprinting, enumeration/fingerprinting, identifying vulnerabilities, exploiting vulnerabilities to gain access, escalating privileges, covering tracks, and creating backdoors. It also discusses how to protect systems from hackers through actions like patching security holes, encrypting data, using firewalls and IDS systems. The document emphasizes that ethical hacking involves legally testing systems with permission to identify vulnerabilities.
Hacking refers to activities aimed at exploiting security flaws to obtain unauthorized access to secured networks and private information. There are different types of hackers, including black hats who hack maliciously, white hats who are ethical hackers, and script kiddies who use tools created by black hats. Common hacking methods include password guessing, software exploitation, backdoors, and trojans. Once inside a network, a hacker can steal or modify files, install backdoors, and attack other systems. Intrusion detection and prevention systems can help monitor for hacking attempts. Hacking is a felony in most countries and can carry heavy fines and prison sentences if prosecuted.
Network security and firewalls are important tools for protecting client-server networks. Firewalls act as a barrier between private networks and the public internet, controlling incoming and outgoing network traffic based on set rules. Common security threats to client-server networks include malicious software, phishing, hacking, and denial of service attacks. Encryption techniques like public key cryptography and digital signatures are important for ensuring data security and authenticity in electronic communications. Firewall types include packet filtering routers, application proxies, and hardened firewall hosts.
This document discusses ethics and computer ethics. Ethics is defined as applying values to human behavior to guide conduct. Computer ethics examines ethical issues related to technology, such as privacy, property, access, and accuracy of information. Some common computer ethics issues involve hacking, software piracy, and ensuring privacy, accessibility, and accuracy of data. The document also outlines the "Ten Commandments of Computer Ethics" and discusses threats to information systems like computer viruses, software piracy, and hacking.
This document discusses ethical hacking. It begins by defining hacking and distinguishing between black hat, white hat, and grey hat hackers. White hat hackers, also known as ethical hackers, hack systems with permission to identify vulnerabilities. The document outlines the different phases of ethical hacking including footprinting, scanning, enumeration, gaining access, and maintaining access. It provides examples of tools used in each phase and types of attacks like social engineering and SQL injection. The document emphasizes that for hacking to be ethical, hackers must have permission and respect privacy. It concludes by discussing how organizations can prevent hacking by closing vulnerabilities identified through ethical hacking activities.
This document discusses computer security and provides an overview of key concepts. It covers objectives like security threats and attacks, malicious software, and security mechanisms. Security threats can be passive or active attacks, while common types of malicious software include viruses, worms, Trojan horses, and spyware. The document also outlines security mechanisms like cryptography, digital signatures, firewalls, user identification/authentication, and intrusion detection systems. It defines security services that ensure confidentiality, integrity, authentication, and non-repudiation of data.
Introduction to Cyber Forensics Module 1Anpumathews
油
This document provides an introduction to cyber forensics. It discusses computer forensics techniques used to determine and reveal technical criminal evidence, often involving extracting electronic data for legal purposes. The document outlines several modules that will be covered, including information security investigations, corporate cyber forensics, the scientific method in forensic analysis, and investigating large scale data breach cases. It also discusses advantages and disadvantages of cyber forensics and some common cyber forensic techniques.
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptxSunipa Bera
油
Dive deep into the world of hackers in this comprehensive presentation that explores the different types of hackers, their techniques, and effective strategies to prevent cyber attacks. Learn about ethical hackers, black hat hackers, and grey hat hackers, along with real-world examples of hacking incidents. This presentation provides valuable insights for individuals and organizations looking to strengthen their cybersecurity measures. Perfect for IT professionals, cybersecurity enthusiasts, and anyone interested in understanding the hacker mindset.
Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. Ethical hacking is performed with the targets permission. The intent of ethical hacking is to discover vulnerabilities from a hackers
viewpoint so systems can be better secured. Its part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors claims about the security of their products are legitimate.
This document provides an overview of ethical hacking. It defines hacking and describes different types of hackers such as white-hat, black-hat, and grey-hat hackers. Ethical hacking, or white-hat hacking, involves legally testing a system's security to help strengthen it. The document outlines the typical hacking process and some common attack types such as denial of service attacks and SQL injection. It discusses the advantages and disadvantages of ethical hacking, required skills, and how ethical hackers have helped identify vulnerabilities. Lastly, it provides tips for protecting systems and future areas for enhancing security techniques.
Ethical hacking : Its methodologies and toolschrizjohn896
油
This Presentation gives you the knowledge about ethical hacking and its methodologies. This PPT also explains the type of hackers and tools used with example of hashcat which is used to break hash algorithms like MD5, SHA1, SHA256 Etc
Two Days National Level Workshop on Network Security on Februrary 27th and 28th 2015 organzied by Department of Computer Science, Rathinam College of Arts and Science, Eachanari, Coimbatore.
The sessions are handled by Mr. Neeraj Kumar, Associate Consultant Information and Network Security, UTL Technologies, Banagalore.
The program was organized in association with UTL Technologies, Bangalore.
The document discusses ethical hacking and penetration testing. It begins by defining hacking and clarifying that hacking is not always illegal, harmful, or unethical. It then differentiates between vulnerability assessments, penetration tests, and security tests. Various types of hackers (white hat, black hat, gray hat) and penetration tests (white box, black box, gray box) are defined. The stages of a penetration test are outlined as pre-engagement, information gathering, threat modeling, vulnerability analysis, exploitation/post-exploitation, and reporting. Different penetration testing methodologies and activities like network penetration tests and mobile application tests are also mentioned.
This document provides an overview of computer hacking and ethical hacking. It discusses the history of hacking, different types of hackers (e.g. white hat, black hat), why people hack, and the hacking process. The hacking process involves preparation, footprinting, enumeration/fingerprinting, identifying vulnerabilities, exploiting vulnerabilities to gain access, escalating privileges, covering tracks, and creating backdoors. It also discusses how to protect systems from hackers through actions like patching security holes, encrypting data, using firewalls and IDS systems. The document emphasizes that ethical hacking involves legally testing systems with permission to identify vulnerabilities.
Hacking refers to activities aimed at exploiting security flaws to obtain unauthorized access to secured networks and private information. There are different types of hackers, including black hats who hack maliciously, white hats who are ethical hackers, and script kiddies who use tools created by black hats. Common hacking methods include password guessing, software exploitation, backdoors, and trojans. Once inside a network, a hacker can steal or modify files, install backdoors, and attack other systems. Intrusion detection and prevention systems can help monitor for hacking attempts. Hacking is a felony in most countries and can carry heavy fines and prison sentences if prosecuted.
Network security and firewalls are important tools for protecting client-server networks. Firewalls act as a barrier between private networks and the public internet, controlling incoming and outgoing network traffic based on set rules. Common security threats to client-server networks include malicious software, phishing, hacking, and denial of service attacks. Encryption techniques like public key cryptography and digital signatures are important for ensuring data security and authenticity in electronic communications. Firewall types include packet filtering routers, application proxies, and hardened firewall hosts.
This document discusses ethics and computer ethics. Ethics is defined as applying values to human behavior to guide conduct. Computer ethics examines ethical issues related to technology, such as privacy, property, access, and accuracy of information. Some common computer ethics issues involve hacking, software piracy, and ensuring privacy, accessibility, and accuracy of data. The document also outlines the "Ten Commandments of Computer Ethics" and discusses threats to information systems like computer viruses, software piracy, and hacking.
This document discusses ethical hacking. It begins by defining hacking and distinguishing between black hat, white hat, and grey hat hackers. White hat hackers, also known as ethical hackers, hack systems with permission to identify vulnerabilities. The document outlines the different phases of ethical hacking including footprinting, scanning, enumeration, gaining access, and maintaining access. It provides examples of tools used in each phase and types of attacks like social engineering and SQL injection. The document emphasizes that for hacking to be ethical, hackers must have permission and respect privacy. It concludes by discussing how organizations can prevent hacking by closing vulnerabilities identified through ethical hacking activities.
This document discusses computer security and provides an overview of key concepts. It covers objectives like security threats and attacks, malicious software, and security mechanisms. Security threats can be passive or active attacks, while common types of malicious software include viruses, worms, Trojan horses, and spyware. The document also outlines security mechanisms like cryptography, digital signatures, firewalls, user identification/authentication, and intrusion detection systems. It defines security services that ensure confidentiality, integrity, authentication, and non-repudiation of data.
Introduction to Cyber Forensics Module 1Anpumathews
油
This document provides an introduction to cyber forensics. It discusses computer forensics techniques used to determine and reveal technical criminal evidence, often involving extracting electronic data for legal purposes. The document outlines several modules that will be covered, including information security investigations, corporate cyber forensics, the scientific method in forensic analysis, and investigating large scale data breach cases. It also discusses advantages and disadvantages of cyber forensics and some common cyber forensic techniques.
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptxSunipa Bera
油
Dive deep into the world of hackers in this comprehensive presentation that explores the different types of hackers, their techniques, and effective strategies to prevent cyber attacks. Learn about ethical hackers, black hat hackers, and grey hat hackers, along with real-world examples of hacking incidents. This presentation provides valuable insights for individuals and organizations looking to strengthen their cybersecurity measures. Perfect for IT professionals, cybersecurity enthusiasts, and anyone interested in understanding the hacker mindset.
Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. Ethical hacking is performed with the targets permission. The intent of ethical hacking is to discover vulnerabilities from a hackers
viewpoint so systems can be better secured. Its part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors claims about the security of their products are legitimate.
This document provides an overview of ethical hacking. It defines hacking and describes different types of hackers such as white-hat, black-hat, and grey-hat hackers. Ethical hacking, or white-hat hacking, involves legally testing a system's security to help strengthen it. The document outlines the typical hacking process and some common attack types such as denial of service attacks and SQL injection. It discusses the advantages and disadvantages of ethical hacking, required skills, and how ethical hackers have helped identify vulnerabilities. Lastly, it provides tips for protecting systems and future areas for enhancing security techniques.
Ethical hacking : Its methodologies and toolschrizjohn896
油
This Presentation gives you the knowledge about ethical hacking and its methodologies. This PPT also explains the type of hackers and tools used with example of hashcat which is used to break hash algorithms like MD5, SHA1, SHA256 Etc
Two Days National Level Workshop on Network Security on Februrary 27th and 28th 2015 organzied by Department of Computer Science, Rathinam College of Arts and Science, Eachanari, Coimbatore.
The sessions are handled by Mr. Neeraj Kumar, Associate Consultant Information and Network Security, UTL Technologies, Banagalore.
The program was organized in association with UTL Technologies, Bangalore.
Reinventando el CD_ Unificando Aplicaciones e Infraestructura con Crossplane-...Alberto Lorenzo
油
En esta charla, exploraremos c坦mo Crossplane puede transformar la forma en que gestionamos despliegues, yendo m叩s all叩 de un simple IaC para convertirse en una potente herramienta de Continuous Deployment (CD).
Aprenderemos que es Crossplane
Como usar Crossplane como IaC pero sobretodo Deployment as Code de manera eficiente
Unificar la gesti坦n de aplicaciones e infraestructura de forma nativa en Kubernetes
Electromobility, or e-mobility, refers to the use of electric powertrain technologies, in-vehicle information, and communication technologies, and connected infrastructure to enable electric vehicles (EVs) and reduce dependence on fossil fuels. As the world faces increasing environmental challenges such as climate change, air pollution, and the depletion of natural resources, electromobility has emerged as a promising solution for sustainable transportation.
At the heart of electromobility are electric vehicles, which include battery electric vehicles (BEVs), plug-in hybrid electric vehicles (PHEVs), and fuel cell electric vehicles (FCEVs). These vehicles use electricity either stored in batteries or generated through hydrogen fuel cells, drastically reducing or even eliminating tailpipe emissions. Compared to internal combustion engine (ICE) vehicles, EVs have significantly lower greenhouse gas emissions over their lifecycle, especially when powered by renewable energy sources like wind or solar.
One of the primary drivers of the electromobility revolution is the urgent need to decarbonize transportation. The transport sector contributes nearly one-quarter of global CO emissions, with road vehicles being the largest contributors. Transitioning to electric vehicles helps countries meet their climate goals under international agreements such as the Paris Accord. Furthermore, cities struggling with air pollution see electromobility as a way to improve public health by reducing harmful pollutants like nitrogen oxides and particulate matter.
In addition to environmental benefits, electromobility offers economic advantages. EVs have lower operating and maintenance costs due to fewer moving parts and greater energy efficiency. Governments around the world have supported this shift by offering subsidies, tax incentives, and investing in charging infrastructure. The development of fast-charging networks and home-charging solutions has made EV ownership more convenient than ever before.
Technological advancements in battery chemistry, such as lithium-ion and solid-state batteries, are improving driving range and reducing charging time. At the same time, smart charging systems and vehicle-to-grid (V2G) technologies are integrating EVs into the broader energy ecosystem. In V2G systems, EVs can feed electricity back into the grid during peak demand periods, creating a more resilient and balanced power network.
Electromobility extends beyond private passenger cars. It includes electric buses, trucks, bikes, scooters, and even ferries and airplanes. Public transportation authorities are increasingly adopting electric buses to reduce emissions and noise in urban areas. E-bikes and scooters provide convenient, zero-emission alternatives for short-distance travel, supporting the development of last mile mobility solutions.
1. MODULE - I
Building Foundation for Ethical Hacking
Introduction of ethical hacking, types of attacks, ethical hacking
commandments, ethical hacking process, cracking the hacker
mindset, developing hacking plan, hacking methodology
2. HOW HACKERS BEGET ETHICAL HACKERS: INTRODUCTION
Defining hacker
Traditionally, a hacker is someone who likes to tinker(work) with software or electronic
systems. Hackers enjoy exploring and learning how computer systems operate. They love
discovering new ways to work electronically.
Recently, hacker has taken on a new meaning someone who maliciously breaks into
systems for personal gain. Technically, these criminals are crackers (criminal hackers).
Crackers break into (crack) systems with malicious intent. They are out for personal gain:
fame, profit, and even revenge. They modify, delete, and steal critical information, often
making other people miserable.
3. The good-guy (white-hat) hackers dont like being in the same
category as the bad-guy (black-hat) hackers. (These terms come from
Western movies where the good guys wore white cowboy hats and
the bad guys wore black cowboy hats.) Whatever the case, most
people give hacker a negative connotation.
Hackers (or bad guys) try to compromise computers.
Ethical hackers (or good guys) protect computers against illicit(illegal)
entry.
4. Ethical Hacking
Ethical hacking also known as penetration testing or white-hat hacking
involves the same tools, tricks, and techniques that hackers use, but with
one major difference: Ethical hacking is legal.
Ethical hacking is performed with the targets permission. The intent of
ethical hacking is to discover vulnerabilities(quality) from a hackers
viewpoint so systems can be better secured.
Its part of an overall information risk management program that allows for
ongoing security improvements. Ethical hacking can also ensure that
vendors claims about the security of their products are legitimate(rule).
5. Understanding the Need to Hack Your Own Systems
To catch a thief, think like a thief. Thats the basis for ethical hacking.
Your overall goals as an ethical hacker should be as follows:
Hack your systems in a nondestructive fashion.
Enumerate vulnerabilities and, if necessary, prove to upper
management that vulnerabilities exist.
Apply results to remove vulnerabilities and better secure your
systems.
6. UNDERSTANDING THE DANGERS YOUR SYSTEMS FACE
TYPES OF ATTACKS
Nontechnical attacks
Physical attacks can include dumpster diving(Dumpster diving is a cyberattack where the attacker gets their hands on sensitive documents or data
you carelessly threw into the trash bin)
Network-infrastructure attacks
Connecting into a network through a rogue modem(A rogue access point is a wireless access point that has been installed on a secure network
without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker.) attached to a
computer behind a firewall
Exploiting weaknesses in network transport mechanisms, such as TCP/IP and NetBIOS
Flooding a network with too many requests, creating a denial of service (DoS) for legitimate requests
Installing a network analyzer on a network and capturing every packet that travels across it, revealing confidential information in
clear text
Piggybacking (to use something that someone else has made or done in order to get an advantage)onto a network through an insecure 802.11b
wireless configuration
7. Understanding the Dangers Your Systems Face
Operating-system attacks
Exploiting specific protocol implementations
Attacking built-in authentication systems
Breaking file-system security
Cracking passwords and encryption mechanisms
8. Application and other specialized attacks
Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol
(SMTP) applications
Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP)
applications are frequently attacked because most firewalls and other security
mechanisms are configured to allow full access to these programs from the Internet.
Malicious software (malware) includes viruses, worms, Trojan horses, and spyware.
Malware clogs networks and takes down systems.
Spam (junk e-mail) is wreaking havoc on system availability and storage space. And it can
carry malware.
Understanding the Dangers Your Systems Face
9. Working ethically
Respecting privacy
Not crashing your systems
Obeying the Ethical Hacking Commandments(RULE)
10. THE ETHICAL HACKING PROCESS
Formulating your plan
Specific systems to be tested
Risks that are involved
When the tests are performed and your overall timeline
How the tests are performed
How much knowledge of the systems you have before you start testing
What is done when a major vulnerability is discovered
The specific deliverables
11. THE ETHICAL HACKING PROCESS
Selecting tools
To crack passwords, you need a cracking tool such as LC4, John the Ripper, or
pwdump.
For an in-depth analysis of a Web application, a Web-application assessment
tool (such as Whisker or WebInspect) is more appropriate than a network
analyzer (such as Ethereal).
12. open-source security tools:
Nmap
EtherPeek
SuperScan
QualysGuard
WebInspect
LC4 (formerly called L0phtcrack)
LANguard Network Security Scanner
Network Stumbler
ToneLoc
The Ethical Hacking Process
13. other popular tools:
Internet Scanner
Ethereal
Nessus
Nikto
Kismet
THC-Scan
THE ETHICAL HACKING PROCESS
14. Characteristics In EH Tools
Adequate documentation.
Detailed reports on the discovered vulnerabilities, including how they may be
exploited and fixed.
Updates and support when needed.
High-level reports that can be presented to managers or nontechie types.
THE ETHICAL HACKING PROCESS
15. Executing the plan
Search the Internet for your organizations name, your computer and
network system names, and your IP addresses.
Narrow your scope, targeting the specific systems youre testing.
Further narrow your focus with a more critical eye. Perform actual
scans and other detailed tests on your systems.
Perform the attacks, if thats what you choose to do.
16. Evaluating results
Assess your results to see what you uncovered, assuming that the
vulnerabilities havent been made obvious before now. This is where
knowledge counts.
Evaluating the results and correlating the specific
vulnerabilities(quality) discovered is a skill that gets better with
experience. Youll end up knowing your systems as well as anyone
else.
17. CRACKING THE HACKER MINDSET
What Youre Up Against
The definition of hacker has transformed from harmless tinkerer to malicious
criminal. Hackers often state that the general public misunderstands them, which is
mostly true.
Its easy to prejudge what you dont understand. Hackers can be classified by both
their abilities and underlying motivations. Some are skilled, and their motivations are
benign; theyre merely seeking more knowledge.
At the other end of the spectrum, hackers with malicious intent seek some form of
personal gain. Unfortunately, the negative aspects of hacking usually overshadow the
positive aspects, resulting in the stereotyping.
18. Who Hacks
Script kiddies:
Intermediate hackers:
Elite hackers
Cyberterrorists
19. Why Hackers Hack
Many hackers get a kick out of outsmarting corporate and
government IT and security administrators.
Some common hacker motives are revenge, basic bragging rights,
curiosity, boredom, challenge, vandalism, theft for financial gain,
sabotage, blackmail, extortion, and corporate espionage.
Hackers often promote individualism or at least the
decentralization of information
20. Hacking continues to get easier for several reasons:
Increasing use of networks and Internet connectivity
Anonymity provided by computer systems working over the Internet
Increasing number and availability of hacking tools
Computer-savvy children
Unlikelihood that hackers are investigated or prosecuted if caught
21. Planning and Performing Attacks
Some hackers prepare far in advance of a large attack.
Other hackers usually, the inexperienced script kiddies act before they
think things through
22. Aspects Of Real-world Security
The majority of systems that hackers want to attack arent managed properly.
Most network and security administrators simply cant keep up with the
deluge of new vulnerabilities.
Information systems grow more complex every year. This is yet another
reason why overburdened administrators find it difficult to know whats
happening across the wire and on the hard drives of their systems.
23. Hack attacks can be carried out slowly, making them hard to detect.
Theyre frequently carried out after typical business hours often, in
the middle of the night.
Defenses are often weaker at night with less physical security and
less intrusion monitoring when the typical network administrator
(or security guard) is sleeping.
24. Maintaining Anonymity
Smart hackers want to be as low-key as possible. Covering their tracks
is a priority.
Hackers often remain anonymous by using one of the following
techniques:
Borrowed or stolen dial-up accounts from friends or previous employers
Public computers at libraries, schools, or kiosks at the local mall
Internet proxy servers or anonymizer services
Anonymous or disposable e-mail accounts from free e-mail services
Open e-mail relays
Unsecured computers also called zombies at other organizations
Workstations or servers on the victims own network
25. DEVELOPING YOUR ETHICAL HACKING PLAN
As an ethical hacker, you must plan your ethical hacking efforts before you start.
A detailed plan doesnt mean that your testing must be elaborate.
It just means that youre very clear and concise on whats done.
Given the seriousness of ethical hacking, make this as structured a process as
possible.
Even if youre just testing a single Web application or workgroup of computers,
its critical to establish your goals, define and document the scope of what youll
be testing, determine your testing standards, and gather and familiarize yourself
with the proper tools for the task.
26. Getting Your Plan Approved
Getting approval for ethical hacking is critical. First, obtain project sponsorship.
This approval can come from your manager, an executive, a customer, or yourself
(if youre the boss).
Otherwise, your testing may be canceled suddenly, or someone can deny
authorizing the tests.
There can even be legal consequences for unauthorized hacking.
Always make sure that what youre doing is known and visible at least to the
decision-makers.
27. Establishing Your Goals
Define more specific goals. Align these goals with your business
objectives.
Create a specific schedule with start and end dates. These dates are
critical components of your overall plan.
28. The following questions can start the ball rolling
Does ethical hacking support the mission of the business and its IT and security
departments?
What business goals are met by performing ethical hacking?
These goals may include the following:
Prepping for the internationally accepted security framework of ISO 17799 or a security seal
such as SysTrust or WebTrust
Meeting federal regulations
Improving the companys image
How will ethical hacking improve security, IT, and the general business?
What information are you protecting?
29. How much money, time, and effort are you and your organization willing to spend
on ethical hacking?
What specific deliverables will there be?
What specific outcomes do you want?
After you know your goals,
When will you start your ethical hacking?
Will your ethical hacking be blind, in which you know nothing about the
systems youre testing, or a knowledge-based attack, in which youre given
specific information about the systems youre testing such as IP addresses,
hostnames, and even usernames and passwords?
30. Will this testing be technical in nature or involve physical security assessments or
even social engineering?
Will you be part of a larger ethical hacking team, often called a tiger team or red
team?
Will you notify your customers of what youre doing? If so, how?
How will you notify customers that the organization is taking steps to enhance
the security of their information?
What measurements can ensure that these efforts are paying off?
31. Determining What Systems to Hack
You probably dont want or need to assess the security of all your
systems at the same time.
You may decide which systems to test based on a high-level risk analysis,
answering questions such as:
What are your most critical systems? Which systems, if hacked, would cause the
most trouble or the greatest losses?
Which systems appear to be most vulnerable to attack?
Which systems are not documented, are rarely administered, or are the ones you
know the least about?
32. The following list includes systems and applications that you may consider
performing your hacking tests on:
Routers
Firewalls
Network infrastructure as a whole
Wireless access points and bridges
Web, application, and database servers
E-mail and file/print servers
Workstations, laptops, and tablet PCs
Mobile devices (such as PDAs and cell phones) that store confidential
information
Client and server operating systems
Client and server applications, such as e-mail or other in-house systems
33. Start with the most vulnerable systems, and consider the
following factors:
Where the computer or application resides on the network
Which operating system and application(s) it runs
The amount or type of critical information stored on it
34. Creating Testing Standards
When the tests are performed, along with the overall timeline?
What tests are performed?
How the tests are performed, and from where?
How much knowledge of the systems you acquire in advance?
What you do when a major vulnerability is discovered?
35. Timing
he practice of having a computer dial large numbers of telephone
numbers in search of devices that can be exploited, such as fax
machines or modems.(war dial)
Password cracking is the process of using an application program to
identify an unknown or forgotten password to a computer or network
resource.
36. Specific tests
You may have been charged with performing a general penetration
test, or you may want to perform specific tests, such as cracking
passwords or war-dialing into a network.
A good way to provide evidence of what was tested, when it was
tested, and more is to enable logging on the systems youre testing.
37. Blind versus knowledge assessments
It may be good to have some knowledge of the systems youre
testing, but its not required.
The best approach is to plan on unlimited attacks, wherein any test is
possible.
A false sense of vigilance can be created if too many insiders know
about your testing which can end up negating the hard work youre
putting into this.
38. Location
The tests youre performing dictate where you must run them from. Your
goal is to hack your systems from locations where malicious hackers can
access the systems.
You can perform some tests, such as password cracking and network-
infrastructure assessments, from the comfort of your office inside the
network.
For your external hacks that require network connectivity, you may have
tog o off-site (a good excuse to work from home) or use an external proxy
server.
39. Reacting to major exploits that you find
Determine ahead of time whether youll stop or keep going when you
find a critical security hole.
Your manager or your customer may not ask you to, but I think its
best to keep going to see what else you can discover.
Im not saying to keep hacking until the end of time or until you crash
all your systems.
40. Silly assumptions
Computers, networks, and people are available when youre testing.
You have all the proper hacking tools.
The hacking tools youre using wont crash your systems.
Your hacking tools actually work.
You know all the risks of your tests.
41. Selecting Tools
The required security-assessment tools (hacking tools) depend on the
tests youre running.
You can perform some ethical hacking tests with a pair of sneakers, a
telephone, and a basic workstation on the network.
However, comprehensive testing is easier with hacking tools.
42. Opensource security tools:
@stake L0phtcrack (now called LC4)
Ethereal
Foundstone SuperScan
Qualys QualysGuard
GFI LANguard Network Security Scanner
John the Ripper
Network Stumbler
Nessus
Nikto
Nmap
Pwdump2
SPI Dynamics WebInspect
THC-RUT
ToneLoc
Wellenreiter
WildPackets EtherPeek and
AiroPeek
43. Characteristics In The Tools You Select For Ethical Hacking:
Adequate documentation.
Detailed reports on the vulnerabilities, including how they may be
exploited and fixed.
Updates and support when needed.
High-level reports that can be presented to managers or other non-
techie types.
44. HACKING METHODOLOGY
Setting the Stage
Track what worked in previous tests and why.
Help prove that you didnt maliciously hack the systems.
Correlate your testing with intrusion-detection systems and other
log files if questions arise.
45. If youre performing ethical hacking for a customer, you may go the
blind assessment route and start with just the company name and no
other information that gives you a leg up, such as:
IP addresses
Host names
Software versions
Firewall rules
Phone numbers
Employee names
46. Seeing What Others See
Start by using a Web browser to search the Web for information about your
organization.
Discover more-specific information about your systems from a hackers
viewpoint.
You can determine this information by running network scans, probing ports, and
assessing vulnerability.
47. Gathering public information
Web search
Employee names and contact info
Important company dates
Incorporation filings for private companies
SEC filings for public companies
Press releases on moves, organizational changes, and new products
Mergers and acquisitions
Patents and trademarks
Presentations, articles, and Webcasts
48. With Google, you can search the Internet several ways:
By typing keywords
By performing more advanced Web searches
By using switches to dig deeper into a Web site
Web crawling
The Web site layout and configuration offline.
The HTML source code of Web pages.
Comment fields.
49. Web sites
Government and business Web sites:
www.hoovers.com and finance.yahoo.com for detailed information about
public companies
www.sec.gov/edgar.shtml for SEC filings on public companies
www.uspto.gov for patent and trademark registrations
Background checks through companies such as ChoicePoint
(www.choicepoint.com) and USSearch (www.ussearch.com)
50. Mapping the network
Who is
The best starting point is to perform a Whois lookup by using any one of the
Whois tools available on the Internet.
Whois is the tool youve most likely used to check whether a particular Internet
domain name is available.
51. The following list runs down various lookup sites for other categories
Government: whois.nic.gov
Military: whois.nic.mil
AfriNIC: www.afrinic.org (emerging Regional Internet Registry for Africa)
APNIC: www.apnic.net/search/index.html (Regional Internet Registry for the Asia
Pacific Region)
ARIN: www.arin.net/whois/index.html (Regional Internet Registry for North America,
a portion of the Caribbean, and subequatorial Africa)
LACNIC: Latin American and Caribbean Internet Addresses Registry www.lacnic.net
RIPE Network Coordination Centre: www.ripe.net/db/whois/whois.html (Europe,
Central
52. Google Groups
The Google Groups at groups.google.com can reveal surprising public network
information. Search for such information as your hostnames, IP addresses,
and usernames.
You can search hundreds of millions of Usenet posts back to 1981 for public
and often very private information.
53. Scanning Systems
Use the information provided by your Whois lookups and start testing other
closely related IP addresses and host names.
Scan your internal hosts
Hosts
The basic ping utility thats built into your operating system
A third-party utility that allows you to ping multiple addresses at the same
time, such as SuperScan (www.foundstone.com) and NetScanTools Pro
(www.netscantools.com) for Windows and fping for UNIX (which allows you
to ping more than one address)
54. Modems and open ports
Check for unsecured modems with war-dialing software, such as ToneLoc,
PhoneSweep, and THC-Scan.
Scan network ports with SuperScan or Nmap (www.insecure.org/nmap). You
can use a happy-clicky-GUI version made for Windows called NMapWin,
Listen to network traffic with a network analyzer such as Ethereal. I cover this
topic in various chapters throughout the book.
55. Determining Whats Running on Open Ports
Protocols in use, such as IP, IPX, and NetBEUI
Services running on the hosts, such as e-mail and database applications
Available remote-access services, such as Windows Terminal Services and Secure
Shell (SSH) VPN services, such as PPTP, SSL, and IPSec
Required authentication for network shares
56. Assessing Vulnerabilities
Common Vulnerabilities and Exposures (cve.mitre.org/cve)
CERT/CC Vulnerability Notes Database (www.kb.cert.org/vuls)
NIST ICAT Metabase (icat.nist.gov/icat.cfm)
57. Penetrating the System
Gain further information about the host and its data.
Start or stop certain services or applications.
Access other systems.
Disable logging or other security controls.
Capture screen shots.
Install such hacker tools as rootkits (hacker programs that masquerade as
legitimate OS programs) and network analyzers for later backdoor entry.
Capture keystrokes.
Send an e-mail as the administrator.
Perform a buffer-overflow attack.
Launch another type of DoS attack.
Upload a file proving your victory.