Hacking Etico
Hacking Etico
Hacking Etico
E th ical H ack in g
Module 01
In t r o d u c t io n to E t h ic a l
H a c k in g
M o d u le
0 1
E n g i n e e r e d b y H a c k e r s . P r e s e n t e d b y P r o f e s s io n a ls .
t h ic a l
M o d u le
a c k in g
0 1 :
a n d
o u n t e r m
In t r o d u c tio n
E x a m
Module 01 Page 2
to
e a s u r e s
E th ic a l
v 8
H a c k in g
3 1 2 -5 0
CEH
S e c u r ity N e w s
_
*
? ! ;
H o m
| A b o u t
U s
P o r t f o lio
| C o n t a c t
U s
| S e r v ic e
Z e ro -d a y A tta c k s a r e M e an er, m o re
R a m p a n t th a n w e e v e r th o u g h t
C om puter attacks th a t ta rg e t undisclosed v u ln e ra b ilitie s are m ore com m on and last longer than
many security researchers previously th o u g h t. The fin d in g comes fro m a new study th a t tracked
the num ber and duration o f so-called zero-day exploits over three years.
The typical zero-day attack, by d e fin itio n , e xp lo its s o ftw a re fla w s before th e y are publicly
disclosed. It lasts on average 312 days, w ith some lasting as long as tw o and a half years,
according to th e study by researchers fro m antivirus p rovider Symantec. O f the 18 zero-day
attacks the researchers found betw een 2008 and 2 0 1 1 ,1 1 o f the m previously w e n t undetected.
Recent revelations th a t th e S tuxnet m alw are th a t sabotaged Iranian nuclear facilities relied on
five zero days already underscored th e th re a t posed by such attacks. But th e researchers said
th e ir findings suggest th e menace may be even greater.
h ttp : //a r s te c h n ic a .c o m
e w
Z e r o - d a y
e v e r
A tta c k s
a r e
e a n e r ,
o r e
R a m
p a n t th a n
w e
th o u g h t
a tta c k s
th a t ta rg e t
u n d is c lo s e d
v u ln e ra b ilitie s
a re
m o re
com m on
m a n y s e c u rity re s e a rc h e rs p re v io u s ly th o u g h t. T h e fin d in g c o m e s f r o m
and
la s t
a new
lo n g e r
s tu d y th a t
ty p ic a l
d is c lo s e d .
ze ro -d a y
It la s ts
a c c o rd in g to
th e
on
a tta c k ,
by
a ve ra g e
s tu d y
by
d e fin itio n ,
312
days,
e x p lo its
w ith
re se a rch e rs fro m
s o ftw a re
som e
la s tin g
a n tiv iru s
as
fla w s
b e fo re
th e y
lo n g
as t w o
and
p ro v id e r S y m a n te c .
a tta c k s th e re s e a rc h e rs fo u n d b e tw e e n 2 0 0 8 a n d 2 0 1 1 , 11 o f th e m
O f th e
a re
p u b lic ly
a h a lf ye a rs ,
18 z e ro -d a y
p re v io u s ly w e n t u n d e te c te d .
b y su ch a tta c k s . B u t th e
r e s e a r c h e r s s a id
t h e ir fin d in g s s u g g e s t th e m e n a c e m a y b e e v e n g re a te r.
"Z e ro -d a y
a tta c k s
a re
d iffic u lt
to
p re v e n t
because
th e y
e x p lo it
unknow n
v u ln e ra b ilitie s ,
fo r
th a t,
Module 01 Page 3
as
lo n g
as
s o ftw a re
w ill
have
bugs
and
th e
d e v e lo p m e n t
of
e x p lo its
fo r
new
to
z e r o - d a y a t t a c k s . In f a c t , 6 0
p e r c e n t o f t h e z e r o - d a y v u l n e r a b i l i t i e s w e i d e n t i f y in o u r s t u d y w e r e
s u g g e s ts th a t th e r e
a re
m any
m o re
z e ro -d a y a tta c k s th a n
not known
b e fo re , w h ic h
p re v io u s ly t h o u g h t p e rh a p s
m o re
t h a n t w ic e as m a n y . "
R e s e a rc h e rs
L e y la
B ilg e
and
Tudor
e x e c u ta b le file s c o lle c te d f r o m
M a rch
2012. T hre e
d is c lo s e d
in
2009,
o f th e
ze ro -d a y
s ix w e r e
D u m itra s
c o n d u c te d
e x p lo its t h e y
d is c lo s e d
in
2010,
fo u n d
and
tw o
r e p u ta tio n d a ta th e re s e a rc h e rs re lie d o n p r e v e n te d t h e m
a tta c k o n
m a n y v e rs io n s o f M ic r o s o ft W in d o w s , w h ic h
z e ro d a y u n til n o w , h a d th e
s y s te m a tic
s tu d y
th a t
a n a ly z e d
F e b ru a ry 2 0 0 8 to
w e re
d is c lo s e d
in
2008,
seven
w e re
d is c lo s e d
in
2011.
(The
fro m
w e re
b in a ry
i d e n t i f y i n g a t t a c k s in 2 0 1 2 . ) A n
a p p e a rs to
have gone
u n d e te c te d
as a
e x p lo it o f a s e p a ra te s e c u rity
b u g in t h e W i n d o w s s h e ll h a d t h e l o n g e s t d u r a t i o n : 3 0 m o n t h s .
Of
th e
18
a tta c k s
m o n ito re d .
E ig h t
s tu d ie d ,
o f th e
c o n v e n tio n a l w is d o m
15
ta rg e te d
e x p lo its
w e re
102
or
d ire c te d
fe w e r
of
at th re e
or
th e
11
fe w e r
m illio n
h o s ts .
h o s ts
The
th a t
d a ta
w e re
c o n firm s
th a t z e ro -d a y a tta c k s a re ty p ic a lly re s e rv e d fo r h ig h -v a lu e ta rg e ts . O f th e
d is c o v e re d
in 2 0 0 8 t h a t h a s i n f e c t e d
m illio n s o f c o m p u te r s
c o n t in u e s t o d o so ). T h e S t u x n e t a n d C o n fic k e r e x p lo it t a r g e t e d
re s p e c tiv e ly . T h e
re s u lts , t h e
r e s e a r c h e r s s a id , d e m o n s t r a t e d
1 .5 m illio n
th e
(and re p o rte d ly
a n d 4 5 0 ,0 0 0 h o s ts
d iv id e n d s
re tu rn e d
b y z e ro -
d a y e x p lo its , w h ic h c a n c o m m a n d p ric e s as h ig h as $ 2 5 0 ,0 0 0 .
"F or
e x a m p le ,
a p p ro x im a te ly
w ro te .
" T h is
C o n fic k e r
3 7 0 ,0 0 0
e x a m p le
e x p lo itin g
th e
v u ln e ra b ility
C V E -2 0 0 8 -4 2 5 0
m a c h in e s w it h o u t b e in g d e te c te d
illu s tra te s
th e
e ffe c tiv e n e s s
o ver m o re
o f z e ro -d a y
m anaged
th a n
tw o
v u ln e ra b ilitie s
to
in fe c t
m o n th s ," th e y
fo r
c o n d u c tin g
re se a rch e rs
c a u tio n e d
l im it a t io n s , c a u s in g it t o
T h re a ts
once
a tta c k s
th e ir
m e th o d
of
c o lle c tin g
m is s 2 4 z e r o - d a y a tta c k s t r a c k e d
R e p o rt o v e r th e
z e ro -d a y
th a t
tim e
p e rio d
becam e
s tu d ie d .
p u b lic
file s
b y S y m a n te c 's o w n
S u rp ris in g ly , th e
k n o w le d g e b y
n u m b e r o f a t t a c k v a r ia n t s a ls o ro s e , w i t h
e x e c u ta b le
m a rg in s
had
s ig n ific a n t
In t e r n e t S e c u rity
num ber
o f a tta c k s
o f tw o -
to
o n ly
g re w
1 0 0 ,0 0 0 -fo ld .
The
p o s s i b l e c a u s e o f t h e s u r g e i n n e w f i l e s , t h e r e s e a r c h e r s s a i d , is t h a t t h e e x p l o i t s m a y h a v e b e e n
re p a c k a g e d v e rs io n s o f th e s a m e a tta c k .
" H o w e v e r , i t is d o u b t f u l t h a t r e p a c k i n g a l o n e c a n a c c o u n t f o r a n i n c r e a s e b y u p t o f i v e o r d e r s o f
m a g n i t u d e , " t h e y w r o t e . " M o r e l i k e l y , t h i s i n c r e a s e is t h e r e s u l t o f t h e e x t e n s i v e r e - u s e o f f i e l d p r o v e n e x p l o i t s in o t h e r m a l w a r e . "
10/ z e r o - d a v - a t t a c k s - a r e - m e a r 1e r - a r 1d - m o r e - p l e n t i f u l -
th a n -th o u g h t/
Module 01 Page 4
CEH
M o d u le O b je c tiv e s
D a ta B re a c h In v e s tig a tio n s R e p o rt
H a c k in g P hases
E s s e n tia l T e rm in o lo g y
T yp e s o f A tta c k s o n a S yste m
E le m e n ts o f In f o r m a tio n S e c u rity
W h y E th ic a l H a c k in g Is N e c e s s a ry
S kills o f an E th ica l H a c k e r
In c id e n t M a n a g e m e n t P rocess
T yp e s o f S e c u rity P o licie s
V e c to rs
J
In f o r m a tio n S e c u rity T h re a ts
H a c k in g vs. E th ic a l H a c k in g
E ffe c ts o f H a c k in g o n B usiness
W h o Is a H a c k e r?
a s
Copyright by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
Sf
d u l e
b je c t iv e s
1
I t is i m p o r t a n t t o
b e a r in m i n d t h a t a t t a c k e r s b r e a k i n t o s y s t e m s f o r v a r i o u s r e a s o n s
a n d p u r p o s e s . T h e r e f o r e , i t is i m p o r t a n t t o c o m p r e h e n d h o w m a l i c i o u s h a c k e r s e x p l o i t s y s t e m s
a n d t h e p r o b a b l e r e a s o n s b e h i n d t h e a t t a c k s . A s S u n T z u p u t it in t h e A r t o f W a r , " I f y o u k n o w
y o u r s e l f b u t n o t t h e e n e m y , f o r e v e r y v i c t o r y g a i n e d , y o u w i l l a l s o s u f f e r a d e f e a t . " I t is t h e d u t y
of
s y s te m
a d m in is tra to rs
a g a in s t e x p lo its
and
b y k n o w in g
n e tw o rk
th e
s e c u rity
e n e m y th e
p ro fe s s io n a ls
m a lic io u s
to
g u a rd
h a cke r(s) w h o
th e ir
seek to
in fra s tru c tu re
use th e
sam e
h a ts .
They
p e rfo rm
T h e in d iv id u a ls o r e x p e rts w h o p e r fo r m
h a c k in g
in
e th ic a l
w ays,
w ith o u t
e th ic a l h a c k in g a re c a lle d
c a u s in g
any
dam age
to
th e
c o m p u t e r s y s te m , th e r e b y in c re a s in g th e s e c u rity p e r im e te r o f a n o rg a n iz a tio n .
Module 01 Page 5
T h is m o d u le c o v e rs :
0
H a c k in g P h a se s
E s s e n tia l T e r m in o l o g y
T y p e s o f A tta c k s o n a S y s te m
E le m e n ts o f I n fo r m a tio n S e c u rity
W h y E t h i c a l H a c k i n g Is N e c e s s a r y
S k ills o f a n E th ic a l H a c k e r
In c id e n t M a n a g e m e n t P ro ce ss
T y p e s o f S e c u r it y P o lic ie s
V u ln e r a b ility R e s e a rch
W h a t Is P e n e t r a t i o n T e s t i n g ?
D a ta B re a c h In v e s tig a tio n s R e p o rt
V e c to rs
0
In fo r m a tio n S e c u rity T h re a ts
H a c k in g vs. E th ic a l H a c k in g
E ffe c ts o f H a c k in g o n B u s in e s s
W h o Is a H a c k e r ?
Module 01 Page 6
H a c k in g
P hases
T ypes of
A tta c k s
In fo rm a tio n S e c u r ity
C o n tro ls
d u l e
lo w
'
In fo rm a tio n
in fo rm a tio n
and
d is ru p tio n , a n d
s e c u rity
re fe rs
in fo rm a tio n
d e s tru c tio n .
g re a t
th re a t.
In
an
p ro te c tin g
s y s te m s
fro m
or
s a fe g u a rd in g
u n a u th o riz e d
access,
F o r m o s t o rg a n iz a tio n s , in fo r m a tio n
s e c u re d . If s e n s itiv e in f o r m a t io n
fa c e
to
fa lls in t o w r o n g
a tte m p t
to
is t h e
hands, th e n th e
u n d e rs ta n d
how
to
any
k in d
of
d is c lo s u re ,
s e n s itiv e
a lte ra tio n ,
c ritic a l re s o u rc e t o
re s p e c tiv e o rg a n iz a tio n
s e cu re
such
c ritic a l
be
m ay
in fo rm a tio n
i-g !
In f o r m a t io n S e c u rity O v e r v ie w
H a c k in g P h a se s
f c
s '
In fo r m a tio n S e c u rity T h re a ts
1
T yp e s o f A tta c k s
a n d A tta c k V e c to rs
4 k - !
T h is s e c t io n
H a c k in g C o n c e p ts
c o v e rs e le m e n ts
o f in fo rm a tio n
r^ U
s e c u rity , th e
s tre n g th
o f th e
c o m p o n e n t tria n g le
Module 01 Page 7
I n
t e
r n
r i m
r r e
e p o r t :
I C
CEH
(rtifwd
itk itjl
I n t e r n e t C r im e C o m p la in t C e n t e r (IC 3 )
20 0 5
20 0 6
2008
20 07
2009
___________
2010
2011
htp://www.ic3.gov
Copyright by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
I n
t e
r n
r i m
u r r e n t
e p o r t :
I C
F ederal B u re a u
C e n te r (N W 3 C ), a n d th e
B u re a u
I C 3 ; t h e I n t e r n e t C r i m e C o m p l a i n t C e n t e r ( I C 3 ) is a
o f In v e s tig a tio n
o f J u s tic e A s s is ta n c e
c r im e c o m p la in t s a re in c r e a s in g d a ily . F ro m
th e re
w e re
in c re a s e d
to
2 3 1 ,4 9 3
3 3 6 ,6 5 5 .
c r im e
W hen
c o m p la in ts ,
c o m p a re d
N a tio n a l W h ite
(B JA ). A c c o r d in g t o
C o lla r C rim e
IC 3 , o n l i n e
In te rn e t
t h e g r a p h , y o u c a n o b s e r v e t h a t in t h e y e a r 2 0 0 5 ,
w h e re a s
to
(F B I), t h e
2009,
in
th e
year
In te r n e t c rim e
2009,
c o m p la in ts
c o m p la in ts
in t h e
d ra s tic a lly
year
2011
d e c re a s e d to s o m e e x te n t.
Module 01 Page 8
3 5 0 ,0 0 0
336,655
303,809
3 0 0 .0 0 0
2 5 0 .0 0 0
275,284
231,493
207,492
2 0 0 .0 0 0
1 5 0 .0 0 0
1 0 0 .0 0 0
5 0 ,0 0 0
Module 01 Page 9
______
206,884
314,246
r d
C o m p la in ts
r e c e iv e d
by I C 3
Yearly Comparison of Complaints Received via the IC3 Website
I n t e r n e t C r im e C o m p la in t C e n te r (IC 3 )
D a ta B re a c h In v e s tig a tio n s R e p o rt
Types of hacking by
CEH
r
28% / 97%
H a c k in g
P h y s ic a l
E n v ir o n m e n ta l
0% I 0%
P e rc e n t o f B re a c h e s a n d P e rc e n t o f R e c o rd s
h ttp : //w w w .v e r iz o n b u s in e s s .c o m
The
d a ta
a t a
r e a c h
I n v e
s t i g a t i o
n s
e p o r t
in v e s tig a tio n s
re p o rt fro m
V e riz o n
B u s in e s s
sh o w s th e
ty p e s
o f h a c k in g
by
p e r c e n t o f b r e a c h e s a n d p e r c e n t o f r e c o r d s . F r o m t h e r e p o r t , i t is c l e a r t h a t m o s t o f t h e s e c u r i t y
b r e a c h e s h a p p e n i n g t o d a y a r e b e c a u s e o f h a c k i n g . T h e r e f o r e , in o r d e r t o p r o t e c t y o u r s e l f f r o m
d a ta o r s e c u r it y b re a c h e s , y o u s h o u ld te s t y o u r n e t w o r k s e c u rity a g a in s t h a c k in g .
Module 01 Page 10
M a lw a r e
28% / 97%
H a c k in g
I 58 % / 99%
S o c ia l
22% I 38%
M is u s e
......... ..........
7% / <1%
P h y s ic a l
E rro r
E n v ir o n m e n ta l
17%
<1 %
tmrnmitmmt
7 % / <1%
I I
0% / 0%
P e rc e n t o f B re a c h e s a n d P e rc e n t o f R e c o rd s
Module 01 Page 11
E s s e n tia l T e r m in o lo g y
H a c k V a lu e
CEH
T a r g e t o f E v a lu a t io n
E x p lo it
Z e ro -D a y A tta c k
An attack that exploits computer
application vulnerabilities before the
software developer releases a patch for
the vulnerability
D a is y C h a in in g
V u ln e r a b ility
Existence of a weakness, design, or
implementation error that can lead to
an unexpected and undesirable event
compromising the security of the system
s s e n t ia l
H a c k
Hack
r m
i n
l o
V a lu e
v a lu e
in te re s tin g . H a c k e rs
is
th e
n o tio n
am ong
h a cke rs
m ig h t fe e l th a t b re a k in g d o w n
th a t
th e
s o m e th in g
is
w o rth
d o in g
or
is
t o u g h e s t n e t w o r k s e c u r ity m ig h t g iv e
t h e m g r e a t s a t i s f a c t i o n , a n d t h a t i t is s o m e t h i n g t h e y a c c o m p l i s h e d t h a t n o t e v e r y o n e c o u l d d o .
E x p lo it
An
e x p lo it
is
v u ln e ra b ility . T h e te r m
n e tw o rk . A n
u n a n tic ip a te d
d e fin e d
way
to
b re a c h
th e
s e c u rity
of
an
e x p l o i t is u s e d w h e n a n y k i n d o f a t t a c k h a s t a k e n
e x p lo it can
a ls o
b e h a v io r to
be d e fin e d
occur on
as m a lic io u s s o f t w a r e
le g itim a te
s o ftw a re
IT
s y s te m
th ro u g h
p la c e o n a s y s te m
o r c o m m a n d s th a t can
or h a rd w a re
or
cause
b y ta k in g a d v a n ta g e
of
th e v u ln e ra b ilitie s .
u ln e r a b ilit y
V u l n e r a b i l i t y is a w e a k n e s s i n d e s i g n o r a n i m p l e m e n t a t i o n e r r o r t h a t c a n l e a d t o a n
u n e x p e c t e d a n d u n d e s i r a b l e e v e n t c o m p r o m i s i n g t h e s e c u r i t y o f t h e s y s t e m . In s i m p l e w o r d s , a
v u ln e ra b ility
is l o o p
h o le ,
o r w e a kn e ss th a t
becom es
a so u rce
fo r an
a tta c k e r to
Module 01 Page 12
T a r g e t
o f E v a lu a t io n
/
A ta rg e t
s u b je c te d
to
o f e v a lu a tio n
re q u ire d
is a n
s e c u rity
IT s y s t e m ,
e v a lu a tio n .
p ro d u c t,
T h is
k in d
o r c o m p o n e n t th a t
of
e v a lu a tio n
h e lp s
is i d e n t i f i e d
th e
e v a lu a to r
Z e r o - d a y
In
A tta c k
z e ro -d a y
a tta c k ,
th e
a tta c k e r
e x p lo its
th e
v u ln e ra b ilitie s
in
th e
c o m p u te r
a is y
A tta c k e rs
b a c k tra c k
to
s y s te m s a n d
h a in in g
w ho
get away
c o v e r th e ir tra c k s
use th e m
by
d a ta b a s e
d e s tro y in g
Module 01 Page 13
w ith
th e ft
lo g s ,
u s u a lly
e tc . T h e
c o m p le te
a tta c k e rs
It b e c o m e s d i f f i c u l t t o
th e ir ta s k
g a in
c o n tro l
id e n tify th e
and
th e n
o f o th e r
a t t a c k e r as
E le m e n t s o f I n f o r m a t i o n S e c u r it y
CEH
A s ta te o f w e ll- b e in g o f in fo r m a t io n a n d in fr a s tr u c tu r e in w h ic h th e p o s s ib ility o f t h e f t ,
t a m p e r in g , a n d d is r u p t io n o f in f o r m a t io n a n d s e rv ic e s is k e p t lo w o r to le r a b le
In te g rity
A v a ila b ility
9 A u th e n tic ity
,jp
''*"
le m
In fo rm a tio n
in fra s tru c tu re
s e rv ic e s
e n t s
is
lo w
f I n
s e c u rity
in w h i c h
kept
th e
or
f o
r m
is
d e fin e d
t i o
as:
"A
e c u r it y
s ta te
of
w e ll-b e in g
p o s s ib ility o f th e ft, ta m p e r in g , a n d
to le ra b le ."
It
re lie s
on
th e
fiv e
m a jo r
of
d is ru p tio n
e le m e n ts
in fo rm a tio n
and
o f in fo rm a tio n
o f:
and
o n f id e n t ia lit y
is
th e
a ssu ra n ce
th a t
th e
in fo rm a tio n
is
a c c e s s ib le
o n ly
im p ro p e r d a ta
to
th o s e
h a n d lin g
o r a h a c k in g a t t e m p t .
f r
I n t e g r it y
zL ----------
I n t e g r i t y is t h e t r u s t w o r t h i n e s s o f d a t a o r r e s o u r c e s i n t e r m s o f p r e v e n t i n g i m p r o p e r
"f?
v a ila b ilit y
A v a i l a b i l i t y is t h e
Module 01 Page 14
a ssu ra n ce th a t th e
p ro c e s s in g in f o r m a t io n a re a c c e s s ib le w h e n r e q u ir e d b y a u th o r iz e d u s e rs .
u t h e n t ic it y
A u th e n tic ity
re fe rs to th e
t h a t e n s u re s th e q u a lit y o f b e in g g e n u in e o r n o t c o r r u p te d f r o m
th e o rig in a l. T h e m a jo r ro le s o f
a u t h e n t i c a t i o n i n c l u d e c o n f i r m i n g t h a t t h e u s e r is w h o h e o r s h e c l a i m s t o
be a n d e n s u rin g th e
m e s s a g e is a u t h e n t i c a n d n o t a l t e r e d o r f o r g e d . B i o m e t r i c s , s m a r t c a r d s , a n d d i g i t a l c e r t i f i c a t e s
a re u se d t o e n s u re a u th e n tic ity o f d a ta , tra n s a c tio n s , c o m m u n ic a tio n s , o r d o c u m e n ts .
p g jj
o n - r e p u d ia t io n
N o n -re p u d ia tio n
re fe rs
to
th e
a b ility
to
e n s u re
th a t
p a rty
to
c o n tra c t
or
c o m m u n ic a tio n c a n n o t d e n y th e a u t h e n t ic it y o f t h e ir s ig n a tu r e o n a d o c u m e n t o r th e s e n d in g
o f a m e s s a g e t h a t t h e y o r i g i n a t e d . I t is a w a y t o g u a r a n t e e t h a t t h e s e n d e r o f a m e s s a g e c a n n o t
la te r d e n y
h a v in g
se n t th e
m essage
and
th a t th e
re c ip ie n t c a n n o t d e n y
h a v in g
re c e iv e d
th e
m essage.
Module 01 Page 15
T h e S e c u r ity , F u n c t io n a lit y , a n d
CEH
U s a b ilit y T r i a n g l e
|
j
:
M o vin g th e ball to w a rd s
se cu rity means less
fu n c tio n a lity and u sa b ility
F u n cc t i o n a l i t y
(F e a tu re s)
S e c u rity
( R e s tr ic tio n s )
.is
U s a b ility
(G U I)
T h e
e c u r it y ,
c t i o
l i t y ,
a n d
s a
i l i t y
r i a
l e
T e c h n o l o g y is e v o l v i n g a t a n u n p r e c e d e n t e d r a t e . A s a r e s u l t , n e w p r o d u c t s t h a t r e a c h
th e
m a rk e t te n d
o rig in a lly
sam e
to
be e n g in e e re d f o r e a s y -to -u s e
d e v e lo p e d
pace
o v e rlo o k
as
th e
in c re a s in g
fo r
th e
"h o n e s t"
u s e r's
p ro file .
v u ln e ra b ilitie s
b u ilt-in
rese a rch
and
M o re o v e r,
d u rin g
th e
ra th e r th a n
a c a d e m ic
d u rin g
in te n d e d
d e fa u lt s e c u rity m e c h a n is m s
th is
s e c u re c o m p u tin g . T e c h n o lo g y ,
p u rp o se s,
e v o lu tio n ,
d e p lo y m e n t
has
s y s te m
of
m e a n s u s e rs h a v e to
not
th e
be
e v o lv e d
d e s ig n e rs
s y s te m .
m o re
at th e
o fte n
H o w e v e r,
c o m p e te n t. As
c o m p u t e r s a r e u s e d f o r m o r e a n d m o r e r o u t i n e a c t i v i t i e s , i t is b e c o m i n g i n c r e a s i n g l y d i f f i c u l t f o r
s y s te m
a d m in is tr a to rs
and
o th e r
s y s te m
p ro fe s s io n a ls
to
a llo c a te
reso u rce s
e x c lu s iv e ly
fo r
s e c u r in g s y s te m s . T h is in c lu d e s t im e n e e d e d t o c h e c k lo g file s , d e t e c t v u ln e r a b ilit ie s , a n d a p p ly
s e c u rity u p d a te p a tc h e s .
R o u tin e
a c tiv itie s
consum e
a d m in is tra tio n . T h e re
re g u la r
and
p ro fe s s io n a ls
in n o v a tiv e
to
reso u rce s.
O rig in a lly ,
"hack"
c o m p u te r s y s te m s .
Module 01 Page 16
b a s is .
c o n s ta n tly
T e c h n o lo g y )
to
s y s te m
is l i t t l e t i m e
d e p lo y
T h is
has
m o n ito r
m e a n t to
H a c k in g
a d m in is tra to rs
to
possess
re q u ire d
and
tim e ,
m e a su re s an d
in c re a s e d
d e fe n d
e x tra o rd in a ry
th e
IC T
le a v in g
s e cu re
dem and
fo r
( In fo rm a tio n
c o m p u te r
g re a t p ro fic ie n c y .
le s s
tim e
c o m p u tin g
s k ills t o
fo r
d e d ic a te d
and
s e c u rity
C o m m u n ic a tio n
e x te n d
H o w e v e r, to d a y th e re
v ig ila n t
reso u rce s on
th e
a re
lim its
of
a u to m a te d
T h e s e c a n a c t as a d e t r i m e n t a n d c a n b r i n g d o w n t h e s k ill le v e l r e q u i r e d
t o b e c o m e a s u c c e s s fu l a tta c k e r.
T h e e a s e w it h w h ic h s y s te m v u ln e r a b ilitie s ca n b e e x p lo ite d h a s in c re a s e d w h ile t h e k n o w le d g e
c u rv e re q u ire d to p e rfo r m
in d iv id u a ls
h a v in g
se co n d -h a n d
k n o w le d g e
im p e d im e n ts c o n trib u tin g to th e g ro w th
o f p e rfo rm in g
o f s e c u rity in fra s tr u c tu r e
e x p lo its .
One
lie s in t h e
o f th e
m a in
u n w illin g n e s s o f
th e ir
e m p lo y e e s ,
in fo rm a tio n
a s s e ts
c u s to m e rs ,
in flu e n c in g
th e
p a rtn e rs ,
m a rke t
a n d /o r
has
seen
of
lo s in g
m o re
m a rke t
c o m p a n ie s
sh a re .
The
th in k in g
tre n d
tw ic e
of
b e fo re
o f c o n ta c t
c o u n te rm e a s u re s
a cro ss g e o g ra p h ic a l
to
p re v e n t
e x p lo its
b o u n d a rie s ,
th a t
can
m akes
re s u lt
in
it c ritic a l f o r
lo s s
of
an
a d m in is tra to rs
im p o r ta n t
to
ta k e
re a so n
why
c o r p o r a t i o n s n e e d t o in v e s t in s e c u r i t y m e a s u r e s t o p r o t e c t t h e i r i n f o r m a t i o n a s s e ts .
Module 01 Page 17
d u l e
lo w
l r ' 5 ,
So fa r
we
d is c u s s e d
in fo rm a tio n
s e c u rity .
Now
we
w ill
d is c u s s
th re a ts
and
a tta c k
v e c to r s o f in fo r m a t io n s e c u rity .
|~ U
In fo r m a tio n S e c u rity O v e r v ie w
H a c k in g P h a se s
I n f o r m a tio n S e c u rity T h re a ts
* - . .
|
T yp e s o f A tta c k s
Eel-------
a n d A tta c k V e c to rs
H a c k in g C o n c e p ts
T h is s e c tio n
in tro d u c e s
you
to
to p
in fo rm a tio n
s e c u rity
a tta c k
v e c to rs , th e
t h r e a t s t o v a lu a b le in fo r m a tio n , a n d th e g o a ls o f a tta c k e r s w h o p e r fo r m
p o s s ib le
s e c u rity
a tta c k s o n in fo rm a tio n
s y s te m s .
Module 01 Page 18
T o p I n f o r m a t i o n S e c u r it y
CEH
A tta c k V e c to rs
V irtua liza tion and
Organized
Un-patched
Targeted
Social
Cloud C om puting
Cyber Crime
Softw are
M alw ares
N etw o rkin g
?a
IF 3I
't t A
Insider Threats
! j
In fo rm a tio n
S y s te m s
Complexity of
Computer Infrastructure
?ft
9
Compliance to Govt.
Laws and Regulations
Mobile
Device Security
Inadequate
Security Policies
Network
Applications
Lack o f Cyber
Security Professionals
T o p
An
in fo rm a tio n
I n
f o
a tta c k
s y s te m
r m
v e c to r
to
t i o
is
p e rfo rm
p a th
e c u r it y
or
m eans
t t a c k
by
w h ic h
e c t o r s
an
a tta c k e r
g a in s
access
to
an
m a lic io u s a c t iv it ie s . T h is a t t a c k v e c t o r e n a b le s a n a t t a c k e r t o
t a k e a d v a n t a g e o f t h e v u l n e r a b i l i t i e s p r e s e n t in t h e i n f o r m a t i o n s y s t e m
in o r d e r t o c a r r y o u t a
p a rtic u la r a tta c k .
A lth o u g h
th e re
a tta c k v e c to rs
a re
som e
com e
in
tra d itio n a l
m any
fo rm s ;
a tta c k s
one
v e c to rs
cannot
fro m
w h ic h
p r e d i c t in w h i c h
a tta c k
fo rm
can
an
be
p e rfo rm e d ,
a tta c k v e c to r can
com e.
The
fo llo w in g
a re
th e
p o s s ib le
to p
a tta c k
v e c to rs
th ro u g h
w h ic h
a tta c k e rs
can
a tta c k
in fo r m a tio n s y s te m s :
0
V ir t u a liz a t io n a n d C lo u d C o m p u t in g
O rg a n iz e d C y b e r C rim e
U n p a tc h e d S o ftw a re
T a rg e te d M a lw a re
S o c ia l N e t w o r k i n g
In s id e r T h re a ts
Module 01 Page 19
B o tn e ts
Lack o f C y b e r S e c u rity P ro fe s s io n a ls
N e tw o r k A p p lic a tio n s
I n a d e q u a t e S e c u r it y P o lic ie s
M o b ile D e v ic e S e c u r ity
C o m p lia n c e w it h G o v t. L a w s a n d R e g u la tio n s
H a c k tiv is m
Module 01 Page 20
I n
f o
t i v e s ,
r m
G
t i o
o a ls ,
n
a n d
e c u r it y
b j e
A
c t i v e s
t t a c k s
A t t a c k s = M o t i v e ( G o a l) + M e t h o d + V u l n e r a b i l i t y
A tta c k s
G o a ls
M o tiv e s
te c h n iq u e s to e x p lo it v u ln e r a b ilitie s in a c o m p u te r
'
O b je c tiv e s
M
-E l
t i v e s ,
e c u r it y
G
A
o a ls ,
a n d
b je c t iv e s
f I n
f o
r m
t i o
t t a c k s
It
m ay
be
to
d is ru p t
th e
b u s in e s s
c o n tin u ity
of
th e
ta rg e t
o rg a n iz a tio n ,
to
s te a l
v a lu a b le in f o r m a t io n , f o r th e s a k e o f c u r io s ity , o r e v e n t o ta k e r e v e n g e o n t a r g e t o rg a n iz a tio n .
T h e r e f o r e , th e s e m o tiv e s o r g o a ls d e p e n d o n t h e a tta c k e r 's s ta te o f m in d , f o r w h a t re a s o n h e o r
s h e is c a r r y i n g o u t s u c h a n a c t i v i t y . O n c e , t h e a t t a c k e r d e t e r m i n e s
h is /h e r g o a l, h e o r s h e ca n
a c c o m p l i s h t h e g o a l b y a d o p t i n g v a r i o u s t e c h n i q u e s t o e x p l o i t v u l n e r a b i l i t i e s in a n i n f o r m a t i o n
s y s te m o r s e c u rity p o lic y a n d c o n tro ls .
Module 01 Page 21
In f o r m a t io n S e c u r ity T h r e a ts
CEH
N a tu ra l
P h y s ic a l
H um an
T h re a ts
S e c u rity T h re a ts
T h re a ts
N a tu ra l dis a s te rs
Loss o r d a m a g e o f
H ackers
In sid e rs
S ocial e n g in e e rin g
s y ste m re so u rce s
Q
Q
Q
F lo o d s
P hysical in tru s io n
S a b o ta g e , e s p io n a g e
E a rth q u a k e s
H u rric a n e s
a n d e rro rs
Lack o f k n o w le d g e
a n d a w a re n e s s
0 ,
I
Copyright by E C - G t n c i. All Rights Reserved. Reproduction is Strictly Prohibited.
I n
f o
r m
t i o
e c u r it y
h r e a t s
a tu r a l T h r e a ts
N a tu ra l th re a ts
an y n a tu re -c re a te d
in c lu d e
d is a s te r th a t c a n n o t b e s to p .
In fo rm a tio n
dam age
o r lo s t d u e t o
n a tu ra l
t h r e a t s c a n n o t b e p r e v e n t e d a s n o o n e k n o w s in a d v a n c e t h a t t h e s e t y p e s o f t h r e a t s w i l l o c c u r .
H o w e ve r, yo u
can
im p le m e n t a fe w
s a fe g u a r d s a g a in s t n a tu r a l d is a s te rs b y a d o p t in g d is a s te r
r e c o v e r y p la n s a n d c o n t in g e n c y p la n s .
P h y s ic a l
S e c u r it y
T h r e a ts
P h y s ic a l t h r e a t s m a y i n c lu d e lo s s o r d a m a g e o f s y s t e m
th e ft,
and
p h y s ic a l
im p a c t.
P h y s ic a l
im p a c t o n
reso u rce s
can
re s o u rc e s t h r o u g h fire , w a te r ,
be
due
to
a c o llis io n
o r o th e r
S o m e t im e s , p o w e r m a y a ls o d a m a g e h a r d w a r e
use d to s to re in fo rm a tio n .
H u m
a n
Hum an
Module 01 Page 22
T h r e a ts
th re a ts
in c lu d e th re a ts o f a tta c k s p e r fo r m e d
by b o th
in s id e rs a n d
o u ts id e rs .
In s id e r a tta c k s
a tta c k s
re fe r to
a tta c k e rs
p o s tu re
re fe r to
can
o f th e
a tta c k s
be
th e
a tta c k s
p e rfo rm e d
p e rfo rm e d
by
b ig g e s t t h r e a t
in fo rm a tio n
to
by
d is g ru n tle d
m a lic io u s
p e o p le
in fo rm a tio n
s y s te m , w h ile
or
m a lic io u s
n o t w ith in
s y s te m
th e
as t h e y
o u ts id e r a tta c k e rs a p p ly
e m p lo y e e s .
O u ts id e r
o rg a n iz a tio n .
m ay
know
th e
In s id e r
s e c u rity
m a n y tr ic k s s u c h as s o c ia l
e n g in e e r in g t o le a rn t h e s e c u rity p o s tu r e o f t h e in f o r m a t io n s y s te m .
Module 01 Page 23
I n
4r
f o
r m
t i o
e c u r it y
h r e a t s
( C
o n t d )
K ir
H u m a n t h r e a t s c a n b e f u r t h e r c la s s ifie d in t o t h r e e t y p e s , as f o llo w s :
by
e tw
o r k
T h r e a ts
A n e t w o r k is d e f i n e d
c o m m u n ic a tio n
fro m
c h a n n e ls
to
as t h e
s h a re
c o lle c tio n
reso u rce s
o f c o m p u te rs a nd o th e r h a rd w a re
and
in fo rm a tio n .
As th e
c o n n e c te d
in fo rm a tio n
tra v e ls
o n e c o m p u te r to th e o th e r th r o u g h th e c o m m u n ic a tio n c h a n n e l, a m a lic io u s p e rs o n m a y
b re a k in to th e
c o m m u n ic a tio n
c h a n n e l a n d s te a l th e
in fo rm a tio n
tra v e lin g o v e r th e
n e tw o rk .
T h e a tta c k e r ca n im p o s e v a rio u s th re a ts o n a ta r g e t n e tw o r k :
0
In fo rm a tio n g a th e rin g
S n iffin g a n d e a v e s d r o p p in g
S p o o fin g
S e s s io n h ija c k in g a n d m a n - i n - t h e - m i d d le a tta c k s
SQL in je c tio n
A R P P o is o n in g
P a s s w o rd -b a s e d a tta c k s
Module 01 Page 24
D e n ia l o f s e rv ic e a tta c k
C o m p ro m is e d -k e y a tta c k
vL
H o s t T h r e a ts
H o s t t h r e a t s a re d ir e c te d a t a p a r tic u la r s y s te m o n w h ic h v a lu a b le in f o r m a t io n re s id e s .
A tta c k e rs
try
to
b re a ch
th e
s e c u rity
o f th e
in fo rm a tio n
s y s te m
re so u rce . T he
fo llo w in g
a re
p o s s ib le th r e a t s t o t h e h o s t:
0
M a lw a re a tta c k s
T a rg e t F o o tp rin tin g
P a s s w o rd a tta c k s
D e n ia l o f s e rv ic e a tta c k s
A rb itra ry c o d e e x e c u tio n
U n a u th o riz e d access
B a ck d o o r A tta c k s
P h y s ic a l s e c u r it y t h r e a t s
p p lic a t io n
If th e
p a rtic u la r
a tta c k s .
p ro p e r
a p p lic a tio n ,
A tta c k e rs
ta k e
T h r e a ts
s e c u rity
th e
m e a su re s
a p p lic a tio n
a d v a n ta g e
of
a re
m ig h t
be
not
c o n s id e re d
v u ln e ra b le
v u ln e ra b ilitie s
to
p re se n t
d u rin g
d iffe re n t
in
th e
d e v e lo p m e n t
ty p e s
of
th e
o f a p p lic a tio n
a p p lic a tio n
to
s te a l
or
C o n fig u ra tio n m a n a g e m e n t
In f o r m a t io n d is c lo s u re
S e s s io n m a n a g e m e n t is s u e s
B u f f e r o v e r f l o w is s u e s
C ry p to g ra p h y a tta c k s
P a ra m e te r m a n ip u la tio n
Im p r o p e r e r r o r h a n d lin g a n d e x c e p tio n m a n a g e m e n t
A u d it in g a n d lo g g in g is s u e s
Module 01 Page 25
CEH
In fo r m a tio n W a rfa re
T h e te r m in fo r m a t io n w a rfa re o r In fo W a r re fe rs to th e u se o f in f o r m a t io n a n d c o m m u n ic a tio n
te c h n o lo g ie s (IC T) to ta k e c o m p e titiv e a d v a n ta g e s o v e r an o p p o n e n t
D e fe n s iv e I n f o r m a t io n W a r fa r e
O ffe n s iv e I n f o r m a t io n W a r fa r e
D e fe n s iv e W a rfa re
a.
Prevention
Deterrence
Alerts
Detection
Emergency
Preparedness
Response
%
I n
f o
The
r m
te rm
t i o
in fo rm a tio n
a r f a r e
w a rfa re
or
In fo W a r
re fe rs
to
th e
use
of
in fo rm a tio n
and
c o m m u n i c a t i o n t e c h n o l o g i e s (IC T ) t o t a k e c o m p e t i t i v e a d v a n t a g e s o v e r a n o p p o n e n t .
D e f e n s i v e I n f o r m a t i o n W a r f a r e : It r e f e r s t o a ll s t r a t e g i e s a n d a c t i o n s t o d e f e n d a g a i n s t a t t a c k s
o n IC T a s s e t s .
O ffe n s iv e
In fo rm a tio n
W a rfa re :
It r e f e r s t o
in fo rm a tio n
w a rfa re
t h a t in v o lv e s a tta c k s a g a in s t
IC T a s s e t s o f a n o p p o n e n t .
D e fe n s iv e W a r fa r e
O ffe n s iv e W a r fa r e
P reve ntion
D ete rren ce
A le rts
D ete ctio n
Em ergency
Preparedness
Response
Module 01 Page 26
CEH
IP v 6 S e c u r ity T h r e a ts
A u to C o n f ig u r a t io n T h r e a t s
I n c o m p a t ib ilit y o f L o g g in g S y s te m s
IPv6 uses 128-bit addresses, which are stored as a 39-digit string whereas
IPv4 addresses stored in a 15-character field; logging solutions designed for
IPv4 may not w ork on IPv6 based networks
I P
v 6
e c u r it y
C o m p a re d
to
h r e a t s
IP v4 , IP v 6 h a s a n
im p ro v e d
le v e l o f s e c u rity a n d c o n f id e n t ia lit y f o r t h e
s e c u rity
m e c h a n is m
th a t a ssu re s a h ig h e r
o v e r a n e tw o rk .
H o w e v e r,
I P v 6 is s t i l l v u l n e r a b l e . I t s t i l l p o s s e s s e s i n f o r m a t i o n s e c u r i t y t h r e a t s t h a t i n c l u d e :
A u to
o n f ig u r a t io n
T h r e a ts
IP v 6 e n a b le s a u t o - c o n f ig u r a t io n
o f IP n e t w o r k s , w h i c h
m a y le a v e
u s e r v u ln e ra b le to
a t t a c k s i f t h e n e t w o r k is n o t c o n f i g u r e d p r o p e r l y a n d s e c u r e l y f r o m t h e b e g i n n i n g .
n a v a ila b ilit y
C u rre n t
s e c u rity
R e p u ta tio n - b a s e d
s o lu tio n s
use
th e
P r o te c tio n
re p u ta tio n
of
IP a d d r e s s e s
to
filte r
out
know n
s o u r c e s o f m a l w a r e ; v e n d o r s w i l l t a k e t i m e t o d e v e l o p r e p u t a t i o n - b a s e d p r o t e c t i o n f o r IP v 6 .
5
.
I n c o m
IP v 6
p a t ib ilit y
uses
a d d re s s e s a re s to re d
1 2 8 -b it
o f L o g g in g
a d d re s se s,
w h ic h
S y s te m
a re
s to re d
as
3 9 -d ig it
s trin g ,
w h e re a s
IP v 4
in a 1 5 - c h a r a c t e r f i e l d ; lo g g in g s o l u t i o n s d e s i g n e d f o r IP v 4 m a y n o t w o r k
o n IP v6 -b a se d n e tw o rk s .
Module 01 Page 27
R a te
L im
it in g
A d m in is tra to rs
P r o b le m
use a ra te
s lo w
down
th e
a u to m a te d
a tta c k to o l;
h o w e v e r , i t is i m p r a c t i c a l t o r a t e l i m i t a t t h e 1 2 8 - b i t a d d r e s s l e v e l .
Module 01 Page 28
IP v 6 S e c u r ity T h r e a ts
q e
( C o n t d )
(itifwtf
\\
ttfciu! Nm Im
C o m p le x ity o f N e tw o r k
M anagem ent Tasks
D e fa u lt IP v 6
A c tiv a tio n
<M>
N 4 <r
O v e r lo a d in g o f P e r im e te r
S e c u r it y C o n t r o ls
C o m p l e x i t y in V u l n e r a b i l i t y
A ssessm ent
IPv6 has a 40-byte fixed header w ith an addon "extension header" tha t may be chained,
which require a complex processing by various
security controls systems such as routers,
security gateways, firewalls and IDSes
OO
I P
v 6
e c u r it y
h r e a t s
( C
o n t d )
Y o u m a y a ls o f in d t h e f o l l o w i n g t h r e a t s w h e n u s in g IP v6 :
e fa u lt
IP v 6
A c t iv a t io n
IP v 6 m a y b e a c t iv a t e d
w ith o u t th e
a d m in is tr a to r's
k n o w le d g e , w h ic h
w ill le a v e IP v 4 -
[1
- j
o m
p le x it y
A d m in is tra to rs
o f N
m ay
e tw
o r k
adopt
a n a g e m
e n t
e a s y -to -re m e m b e r
T a s k s
a d d re s s e s
(: : 1 0 , : : 2 0 , : :
fo o d
c 5 c o o r s im p ly IP v 4 la s t o c t e t f o r d u a l s ta c k ) le a d in g t o a p o te n tia l v u ln e r a b ility .
c *
o m
p le x it y
in
u ln e r a b ilit y
A s s e s s m
e n t
I P v 6 s 1 2 8 - b i t a d d r e s s s p a c e m a k e s a c t i v e s c a n n i n g o f i n f r a s t r u c t u r e f o r u n a u t h o r i z e d
o r v u ln e ra b le s y s te m s m o r e c o m p le x .
v e r lo a d in g
IP v 6
c h a in e d ,
o f P e r im
has a 4 0 -b y te
w h ic h
re q u ire s
fix e d
c o m p le x
e te r
S e c u r it y
h e a d e r w ith
p ro c e s s in g
an
by
a d d -o n
v a rio u s
o n tr o ls
" e x te n s io n
s e c u rity
h e a d e rs"
c o n tro ls
th a t
s y s te m s
m ay
be
such
as
r o u t e r s , s e c u r i t y g a t e w a y s , f i r e w a l l s , a n d ID S .
Module 01 Page 29
IP v 6 S e c u r ity T h r e a ts
EH
( C o n t d )
tthKJl IlMkM
S e c u r i t y I n f o r m a t i o n a n d E v e n t M a n a g e m e n t ( S I E M ) P r o b le m s
Every IPv6 h o s t can have m u ltip le IPv6 addresses s im u lta n e o u sly, w h ic h leads to
c o m p le x ity o f log o r e ve n t c o rre la tio n
Denlal-of-Servlce (DOS)
O ve rlo a d in g o f n e tw o rk s e c u rity and c o n tro l devices can s ig n ific a n tly re d u ce th e
a v a ila b ility th re s h o ld o f n e tw o rk resources le a d in g to DoS attacks
Trespassing
IPv6's ad vanced n e tw o rk disco ve ry fe a tu re s can be e x p lo ite d by attackers tra v e rs in g
th ro u g h y o u r n e tw o rk an d accessing th e re s tric te d resources
I P
v 6
e c u r it y
h r e a t s
( C
o n t d )
W W W
T h e f o l l o w i n g IP v 6 s e c u r it y t h r e a t s c a n a ls o c a u s e s e r i o u s d a m a g e t o y o u r n e t w o r k :
IP v 4
to
IP v 6
T r a n s la t io n
Is s u e s
T r a n s l a t i n g IP v 4 t r a f f i c t o IP v 6 m a y r e s u l t in p o o r i m p l e m e n t a t i o n
a n d m a y p ro v id e a
p o te n tia l a tta c k v e c to r.
S e c u r it y
P r o b le m
I n f o r m
a t io n
a n d
E v e n t
a n a g e m
e n t
(S IE M
E v e r y IP v 6 h o s t c a n h a v e m u l t i p l e
IP v 6 a d d r e s s e s s im u l t a n e o u s l y , w h i c h le a d s t o c o m p l e x i t y o f
lo g o r e v e n t c o r r e la tio n .
e n ia l- o f- s e r v ic e
O v e rlo a d in g
of
n e tw o rk
(D O S )
s e c u rity
and
c o n tro l
d e v ic e s
can
s ig n ific a n tly
re d u ce
th e
T r e s p a s s in g
IP v 6 's a d v a n c e d
n e tw o rk
d is c o v e ry fe a tu r e s
can
be e x p lo ite d
by a tta c k e rs
w ho
can
Module 01 Page 30
CEH
F lo w
(rtifwd
itkitjl
^ ^ H a c k in g
P hases
In fo rm a tio n S e c u r ity
T ypes of
A tta c k s
C o n tro ls
d u l e
lo w
S o f a r w e h a v e d is c u s s e d i n f o r m a t i o n s e c u r i t y , its t h r e a t s a n d a t t a c k v e c t o r s . N o w w e
w ill d is c u s s h o w a n a t t a c k e r c o m p r o m i s e s i n f o r m a t i o n s e c u r it y w i t h t h e h e lp o f a t t a c k v e c t o r s .
|~ U
In fo r m a tio n S e c u rity O v e r v ie w
H a c k in g P h a se s
In fo r m a tio n S e c u rity T h re a ts
* - . .
|
T yp e s o f A tta c k s
Eel------^
a n d A tta c k V e c to rs
H a c k in g C o n c e p ts
h a c k in g ,
t h e e f f e c t s o f h a c k in g a c t iv it ie s o n b u s in e s s , a n d d i f f e r e n t c la s s e s o f a t t a c k e r s .
Module 01 Page 31
H a c k in g v s . E th ic a l H a c k in g
H a c k in g re fe rs t o e x p lo it in g s y s te m v u ln e r a b ilit ie s a n d
c o m p r o m is in g s e c u r it y c o n t r o ls t o g a in u n a u th o r iz e d o r
in a p p r o p r ia t e a c c e ss t o t h e s y s te m re s o u rc e s
It in v o lv e s m o d if y in g s y s te m o r a p p lic a t io n f e a t u r e s t o
a c h ie v e a g o a l o u ts id e o f t h e c r e a to r 's o r ig in a l p u rp o s e
E th ic a l h a c k in g in v o lv e s t h e u se o f h a c k in g to o ls , tr ic k s ,
a n d te c h n iq u e s t o i d e n t i f y v u ln e r a b ilit ie s so as t o
e n s u re s y s te m s e c u r ity
It fo c u s e s o n s im u la tin g te c h n iq u e s u s e d b y a tta c k e rs t o
v e r if y t h e e x is te n c e o f e x p lo it a b le v u ln e r a b ilit ie s in
t h e s y s te m s e c u r ity
a c k i n g
v s .
t h
i c a
a c k i n g
M o s t p e o p le d o n o t u n d e rs ta n d th e d iffe re n c e
These tw o
p e rfo rm in g
te rm s
can
h a c k in g
be d iffe re n tia te d
a c tiv ity .
H o w e ve r,
o n th e
b e tw e e n
b a s is o f t h e
u n d e rs ta n d in g
th e
h a c k in g a n d e th ic a l h a c k in g .
in te n tio n s
tru e
o f th e
in te n tio n s
p e o p le
of
h a cke rs
w ho
can
a re
be
a c k in g
H a c k in g
c o n tro ls
to
m o d ify in g
re fe rs
g a in
to
e x p lo itin g
u n a u th o riz e d
s y s te m
or
or
a p p lic a tio n
s y s te m
in a p p ro p ria te
fe a tu re s
to
v u ln e ra b ilitie s
access
a c h ie v e
to
th e
a goal
and
c o m p ro m is in g
s y s te m
o u ts id e
reso u rce s.
o f th e
It
c r e a to r 's
s e c u rity
in v o lv e s
o rig in a l
p u rp o se .
E t h ic a l H
E th ic a l
v u ln e ra b ilitie s
a c k in g
h a c k in g
so as to
in v o lv e s th e
e n s u re
s y s te m
use
o f h a c k in g to o ls ,
s e c u rity .
It f o c u s e s
tric k s , a n d
on
te c h n iq u e s to
s im u la tin g
te c h n iq u e s
id e n tify
used
by
a t t a c k e r s t o v e r i f y t h e e x i s t e n c e o f e x p l o i t a b l e v u l n e r a b i l i t i e s in t h e s y s t e m s e c u r i t y .
Module 01 Page 32
E f f e c t s o f H a c k i n g o n B u s in e s s
CEH
U rtifM
IthKJl lUckM
C o m p r o m is e In f o r m a t io n
f f e c t s
A c c o rd in g
to
a c k i n g
th e
o n
S y m a n te c
2012
u s in e s s
S ta te
of
In fo rm a tio n
su rve y,
in fo rm a tio n
c o s ts
b u s in e s s e s w o r l d w i d e $ 1 . 1 t r i l l i o n a n n u a l l y . E v e r y b u s in e s s m u s t p r o v i d e s t r o n g s e c u r i t y f o r its
c u s t o m e r s ; o t h e r w i s e t h e b u s in e s s m a y p u t its r e p u t a t i o n a t s ta k e a n d m a y e v e n fa c e la w s u it s .
A tta c k e rs
use
h a c k in g
b u s in e s s e s a n d
in t u r n
te c h n iq u e s
to
to
s te a l,
p ilfe r,
and
m a k e fin a n c ia l g a in . A tta c k e r s
re d is trib u te
in te lle c tu a l
p ro p e rty
of
b u s in e s s
m u s t f a c e h u g e f i n a n c i a l lo s s e s a n d m a y e v e n lo s e its r e p u t a t i o n .
O n c e a n a t t a c k e r g a in s c o n t r o l o v e r t h e u s e r 's s y s t e m , h e o r s h e c a n a c c e s s a ll t h e f ile s t h a t a r e
s to re d
on
th e
c o m p u te r,
in c lu d in g
p e rs o n a l
or
c o rp o ra te
fin a n c ia l
in fo rm a tio n ,
c re d it
ca rd
n u m b e r s , a n d c l i e n t o r c u s t o m e r d a t a s t o r e d o n t h a t s y s t e m . If a n y s u c h i n f o r m a t i o n fa lls i n t o
th e
w ro n g
hands,
O rg a n iz a tio n s
m ust
c u s to m e r d a ta
and
it
m ay
p ro v id e
c re a te
a
chaos
s tro n g
its u p c o m i n g
in
s e c u rity
th e
to
n o rm a l
its
fu n c tio n in g
c ritic a l
re le a s e s o r id e a s . If t h e
d a ta
of
in fo rm a tio n
is a l t e r e d
an
o rg a n iz a tio n .
s o u rce s
c o n ta in in g
o r s to le n , a c o m p a n y
m a y lo s e c r e d i b i l i t y a n d t h e t r u s t o f its c u s t o m e r s . In a d d i t i o n t o t h e p o t e n t i a l f i n a n c i a l lo s s t h a t
m a y o c c u r , t h e lo s s o f i n f o r m a t i o n m a y c a u s e a b u s in e s s t o lo s e a c r u c ia l c o m p e t i t i v e a d v a n t a g e
o v e r its riv a ls . S o m e t i m e s a t t a c k e r s u s e b o t n e t s t o la u n c h v a r i o u s t y p e s o f D o S a n d o t h e r w e b b a s e d a tta c k s . T h is c a u s e s t h e t a r g e t b u s in e s s s e rv ic e s t o g o d o w n , w h ic h
in t u r n
m a y le a d t o
lo s s o f r e v e n u e s .
Module 01 Page 33
T he re
a re
K n o w le d g e
m any
th in g s
th a t
b u s in e s s e s
can
do
to
p ro te c t
th e m s e lv e s
is a k e y c o m p o n e n t i n a d d r e s s i n g t h i s i s s u e . A s s e s s m e n t o f t h e
b u s in e s s a n d
how
p o in t o f v ie w . O n e
occur
when
a tta c k s c o u ld
does
com pany
th e ir
v ic tim iz e d
be
a s e c u rity e x p e rt to
by
an
e m p o w e r in g e m p lo y e e s to fa c ilita te p r o te c tio n
a tta c k e r.
By
re c o g n iz e
th e
u n d e rs ta n d in g
a s s e ts .
ris k p r e v a l e n t in a
p o t e n t i a l l y a f f e c t t h a t b u s i n e s s is p a r a m o u n t f r o m
n o t have to
is
and
a s e c u rity
dam age
th e
th a t can
p ro b le m
a g a in s t a tta c k s , t h e c o m p a n y w o u ld
and
b e a b le t o
d e a l w i t h a n y s e c u r it y is s u e s as t h e y a ris e .
Module 01 Page 34
CEH
W h o Is a H a c k e r?
E x c e lle n t C o m p u te r S k ills
H obby
D o I lle g a l T h in g s
M a lic io u s I n t e n t
h o
I s
hacker
a u th o r iz a tio n
to
is a
a c k e r ?
p e rs o n
d e s tro y ,
s te a l
w ho
ille g a lly
s e n s itiv e
b re a k s
d a ta ,
in to
o r p e rfo rm
s y s te m
m a lic io u s
or
n e tw o rk
a tta c k s .
w ith o u t
H a c k e rs
any
m ay
be
m o tiv a te d b y a m u ltitu d e o f re a s o n s :
In te llig e n t
in d iv id u a ls
w ith
e x c e lle n t
c o m p u te r
s k ills ,
w ith
th e
a b ility
to
c re a te
and
e x p lo re th e c o m p u te r 's s o ftw a r e a n d h a r d w a r e
Q
F o r s o m e h a c k e r s , h a c k i n g is a h o b b y t o s e e h o w m a n y c o m p u t e r s o r n e t w o r k s t h e y c a n
c o m p ro m is e
T h e ir i n t e n t i o n c a n e i t h e r b e t o g a in k n o w l e d g e o r t o p o k e a r o u n d d o in g ille g a l th in g s
Som e
hack
w ith
m a lic io u s
in te n t,
such
as
s te a lin g
b u s in e s s
d a ta ,
c re d it
c a rd
i n f o r m a t io n , s o c ia l s e c u r it y n u m b e r s , e m a il p a s s w o rd s , e tc .
Module 01 Page 35
H a c k e r C la s s e s
C EH
es
A
C5
B la c k H a t s
&
G ra y H a ts
S u ic id e H a c k e r s
Individuals w ith
extra ord ina ry com puting
Individuals professing
hacker skills and using
W h i t e H a ts
them fo r defensive
purposes and are also
at various tim es
Individuals w ho aim to
bring d ow n critical
infrastructure fo r a "cause
and are not w orried about
facing jail term s o r any
o the r kind o f punishm ent
&
AA
S ta te S p o n s o re d
H a c k e rs
Individuals em ployed by
the o rganization to
S py H a c k e rs
An unskilled hacker w ho
com prom ises system by
running scripts, tools, and
softw are d eveloped by real
hackers
C y b e r T e r r o r is ts
S c r i p t K id d ie s
a c k e r
la s s e s
H a c k e rs a re m a i n l y d iv id e d i n t o e ig h t c la s s e s :
B la c k
H a ts
B la c k h a ts a re in d iv id u a ls w i t h
e x t r a o r d i n a r y c o m p u t i n g s k ills , r e s o r tin g t o
m a lic io u s
o r d e s t r u c t i v e a c t iv it ie s a n d a r e a ls o k n o w n as c r a c k e r s . T h e s e i n d iv id u a ls m o s t l y u s e t h e i r s k ills
f o r o n l y d e s t r u c t i v e a c t iv it ie s , c a u s in g h u g e lo s s e s f o r c o m p a n i e s as w e ll as in d iv id u a ls . T h e y u s e
t h e i r s k ills in f i n d i n g v u l n e r a b i l i t i e s in t h e v a r i o u s n e t w o r k s i n c l u d i n g d e f e n s e a n d g o v e r n m e n t
w e b s ite s ,
b a n k in g
and
fin a n c e ,
e tc . S o m e
do
it t o
cause
d a m a g e , s te a l
in fo rm a tio n ,
d e s tro y
d a ta , o r e a r n m o n e y e a s ily b y h a c k in g ID s o f b a n k c u s to m e r s .
h ite
W h ite
H a ts
h a ts
p u rp o s e s ; th e y
s e c u rity
a re
a re
a n a ly s ts
to
a ls o
in d iv id u a ls
known
d e fe n d
w ho
h a c k in g
s k ills
as s e c u r it y a n a ly s ts . T h e s e
th e ir
s y s te m s
c o m p a n ie s s e c u re th e ir n e tw o rk s fr o m
Module 01 Page 36
possess
a g a in s t
th e
and
days,
m a lic io u s
use
th e m
a lm o s t e v e ry
a tta c k s .
fo r
d e fe n s iv e
com pany
W h ite
h a ts
has
h e lp
o u ts id e in tru d e rs .
r a y
G ray
H a ts
h a ts a re th e
tim e s . G r a y h a ts fa ll
in d iv id u a ls w h o
b e tw e e n
w h ite
v a rio u s v u ln e ra b ilitie s o f a s y s te m
and
w o rk
b o th
o ffe n s iv e ly
b la c k h a ts . G ra y h a ts
o r n e tw o rk and a t th e
and
d e fe n s iv e ly
m ig h t h e lp
sa m e tim e
S u ic id e
b y fin d in g
h e lp v e n d o r s t o
S u ic id e
h a c ke rs
a t v a rio u s
im p ro v e
m o r e s e c u re , e tc .
H a c k e r s
h a c ke rs
a re
in d iv id u a ls
w ho
a im
to
b rin g
down
c ritic a l
in fra s tru c tu re
fo r
a b o u t f a c i n g 3 0 y e a r s in ja i l f o r t h e i r a c t io n s . S u ic id e h a c k e r s a r e
c lo s e ly r e la t e d t o s u ic id e b o m b e r s , w h o s a c rific e t h e i r life f o r t h e a t t a c k a n d a re n o t c o n c e r n e d
w i t h t h e c o n s e q u e n c e s o f t h e i r a c t io n s . T h e r e h a s b e e n a r is e in c y b e r t e r r o r i s m
* jr
S c r ip t
S c rip t
to o ls ,
and
in r e c e n t y e a r s .
K id d ie s
k id d ie s
s o ftw a re
a re
th e
u n s k ille d
d e v e lo p e d
by
rea l
h a c k e rs
w ho
c o m p ro m is e
h a c k e rs . T h e y
u tiliz e
s y s te m s
s m a ll,
b y ru n n in g
e a s y -to -u s e
s c rip ts ,
p ro g ra m s
or
s c r ip ts as w e ll as d is t in g u is h e d t e c h n i q u e s t o f in d a n d e x p lo it t h e v u ln e r a b ilit ie s o f a m a c h in e .
S c rip t k id d ie s u s u a lly fo c u s o n t h e q u a n t it y o f a tta c k s r a t h e r t h a n t h e q u a lity o f t h e a tta c k s t h a t
th e y in itia te .
S p y
a c k e r s
S py h a c k e rs a re
g a in t r a d e s e c re ts o f t h e
in d iv id u a ls w h o
a re
e m p lo y e d
b y an o rg a n iz a tio n
c o m p e t it o r . T h e s e in s id e rs c a n ta k e
to
a d v a n ta g e o f th e
p e n e tra te
and
p riv ile g e s t h e y
ha ve to hack a s y s te m o r n e tw o rk .
y b e r
T e r r o r is t s
C y b e r t e r r o r is ts c o u ld
th a t have
la rg e -s c a le
a w id e
ra n g e
d is ru p tio n
be p e o p le , o rg a n iz e d g ro u p s fo rm e d
o f s k ills ,
m o tiv a te d
b y re lig io u s o r p o litic a l
o f c o m p u t e r n e t w o r k s . T h is t y p e
b y t e r r o r is t o rg a n iz a tio n s ,
b e lie fs , t o
o f h a c k e r is m o r e
c re a te
fe a r
by
d a n g e ro u s as th e y
ca n h a c k n o t o n ly a w e b s ite b u t w h o le In te r n e t zo n e s.
m
S ta te
S p o n s o r e d
S ta te s p o n s o re d
H a c k e r s
h a c k e rs a re
in d iv id u a ls e m p lo y e d
by th e g o v e rn m e n t to
p e n e tra te
a n d g a in t o p - s e c r e t in f o r m a t io n a n d t o d a m a g e i n f o r m a t i o n s y s te m s o f o t h e r g o v e r n m e n t s .
Module 01 Page 37
CEH
H a c k tiv is m
Hacktivism is an act o f
pro m o tin g a p o litica l agenda
by hacking, especially by
defacing o r disabling websites
J
Hacktivism is m otivated by
revenge, political o r social
reasons, ideology,
vandalism, protest, and a
desire to h u m iliate victim s
accessible
Aims at sending a message
through th e ir hacking activities
and gaining visibility fo r th e ir
cause
Comm on targets include
go vernm ent agencies,
m u ltin a tio n a l corpora tions, or
any o th e r e n tity perceived as
bad or w rong by these groups
or individuals
c k t i v i s m
H a c k tiv is m
is
an
act
of
p ro m o tin g
p o litic a l
agenda
by
h a c k in g ,
e s p e c ia lly
by
d e f a c i n g o r d i s a b l i n g w e b s i t e s . T h e p e r s o n w h o d o e s t h e s e t h i n g s is k n o w n a s a h a c k t i v i s t .
H a c k t i v i s m t h r i v e s i n a n e n v i r o n m e n t w h e r e i n f o r m a t i o n is e a s i l y a c c e s s i b l e
It a im s t o s e n d a m e s s a g e t h r o u g h h a c k in g a c t iv it ie s a n d g a in v is ib ilit y f o r a c a u s e .
C o m m o n ta r g e ts in c lu d e g o v e r n m e n t a g e n c ie s , m u ltin a t io n a l c o r p o r a tio n s , o r a n y o t h e r
e n t it y p e rc e iv e d as " b a d " o r " w r o n g " b y th e s e g ro u p s o r in d iv id u a ls .
I t r e m a i n s a f a c t , h o w e v e r , t h a t g a i n i n g u n a u t h o r i z e d a c c e s s is a c r i m e , n o m a t t e r w h a t
t h e i n t e n t i o n is.
H a c k tiv is m
is m o t i v a t e d
by
revenge,
p o lit ic a l o r s o c ia l
re a s o n s , id e o lo g y , v a n d a lis m ,
Module 01 Page 38
CEH
F lo w
(rtifwd
H a c k in g
T ypes of
A tta c k s
P hases
itkitjl
In fo rm a tio n S e c u r ity
C o n tro ls
5 5
d u l e
In t h e
lo w
p re v io u s s e c tio n , y o u
le a rn e d a b o u t v a rio u s h a c k in g c o n c e p ts . N o w
it's t i m e t o
d is c u s s t h e h a c k i n g m e t h o d . H a c k in g c a n n o t b e a c c o m p l i s h e d in a s in g le a c t i o n . It n e e d s t o
be
d o n e in p h a s e s . T h e i n f o r m a t i o n g a t h e r e d o r t h e p r i v i l e g e s g a i n e d in o n e p h a s e c a n b e u s e d in
t h e n e x t p h a s e f o r a d v a n c in g t h e p ro c e s s o f h a c k in g .
In fo r m a tio n S e c u rity O v e rv ie w
[ p s ^ j_
H a c k in g P h a s e s
>
In fo r m a tio n S e c u rity T h re a ts
T yp e s o f A tta c k s
a n d A tta c k V e c to rs
H a c k in g C o n c e p ts
T h i s s e c t i o n lis ts a n d d e s c r i b e s v a r i o u s p h a s e s i n v o l v e d in h a c k i n g .
Module 01 Page 39
H a c k in g P h a s e s
_l
CEH
-l
R e c o n n a is s a n c e T y p e s
P a s s iv e R e c o n n a is s a n c e
M a in t a in in g
A ccess
C le a r in g
T ra c k s
A c tiv e R e c o n n a is s a n c e
I
Copyright by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
a c k i n g
h a s e s
T h e v a r i o u s p h a s e s i n v o l v e d in h a c k i n g a r e :
R e c o n n a is s a n c e
S c a n n in g
G a in in g A cc e s s
M a in ta in in g Access
C le a rin g T ra c k s
R e c o n n a is s a n c e
R e c o n n a is s a n c e
in fo rm a tio n
re fe rs to th e
p re p a ra to ry
as p o s s ib le a b o u t t h e t a r g e t p r io r t o
phase w h e re
la u n c h in g th e
a n a tta c k e r g a th e r s as m u c h
a t t a c k . A ls o in t h i s p h a s e , t h e
a t t a c k e r d r a w s o n c o m p e t it iv e in t e llig e n c e t o le a r n m o r e a b o u t t h e t a r g e t . T h is p h a s e m a y a ls o
in v o lv e n e t w o r k s c a n n in g , e it h e r e x te rn a l o r in te rn a l, w i t h o u t a u th o r iz a tio n .
T h i s is t h e p h a s e t h a t a l l o w s t h e p o t e n t i a l a t t a c k e r t o s t r a t e g i z e h i s o r h e r a t t a c k . T h i s m a y t a k e
s o m e t im e as th e a tta c k e r w a its t o u n e a r th c ru c ia l in fo r m a tio n . P a rt o f th is re c o n n a is s a n c e m a y
Module 01 Page 40
in v o lv e
" s o c ia l
e n g in e e rin g ."
s o c ia l
e n g in e e r
is
p e rs o n
w ho
s m o o th -ta lk s
p e o p le
in to
re c o n n a is s a n c e
lo o k in g t h r o u g h
th e
te c h n iq u e
is
"d u m p s te r
d iv in g ."
a n o r g a n iz a tio n 's tr a s h f o r d is c a rd e d
In te rn e t to o b ta in
D u m p s te r
s e n s itiv e
d iv in g
is t h e
p ro ce ss
of
in f o r m a t io n s u c h as e m p lo y e e 's c o n t a c t in f o r m a t io n , b u s in e s s p a r tn e r s ,
t e c h n o l o g i e s in u s e , a n d o t h e r c r i t i c a l b u s i n e s s k n o w l e d g e , b u t " d u m p s t e r d i v i n g " m a y p r o v i d e
th e m
w ith
even
m o re
s e n s itiv e
in fo rm a tio n
s ta te m e n ts , b a n k s ta te m e n ts , A T M
such
as
u s e rn a m e s ,
p a ssw o rd s,
s lip s , s o c ia l s e c u r it y n u m b e r s , t e l e p h o n e
c re d it
ca rd
n u m b e r s , a n d so
a W h o is
n a m e s , a n d c o n ta c ts .
d a ta b a s e
can
p ro v id e
in fo rm a tio n
about
In te rn e t
a d d re sse s,
If a p o t e n t i a l a t t a c k e r o b t a i n s D N S i n f o r m a t i o n f r o m
d o m a in
t h e r e g i s t r a r , a n d is
a b le t o a c c e s s it, h e o r s h e c a n o b t a i n u s e fu l i n f o r m a t i o n s u c h as t h e m a p p i n g o f d o m a i n n a m e s
t o IP a d d r e s s e s , m a i l s e r v e r s , a n d h o s t i n f o r m a t i o n
r e c o r d s . I t is i m p o r t a n t t h a t a c o m p a n y h a s
p r e c a u t i o n s t h e y m u s t t a k e in o r d e r t o
p ro te c t th e ir
i n f o r m a t i o n a s s e t s is a c r i t i c a l f a c t o r i n t h i s c o n t e x t .
R e c o n n a is s a n c e
^
R e c o n n a is s a n c e
T y p e s
te c h n iq u e s
can
be
c a te g o riz e d
b ro a d ly
in to
a c tiv e
and
p a s s iv e
re c o n n a is s a n c e .
W hen
does
an a tta c k e r a p p ro a c h e s th e
not
in te ra c t w ith
th e
a t ta c k u s in g p a s s iv e
s y s te m
d ire c tly . T h e
re c o n n a is s a n c e te c h n iq u e s , h e o r she
a tta c k e r
uses
p u b lic ly
a v a ila b le
in fo rm a tio n ,
s o c ia l e n g in e e r in g , a n d d u m p s t e r d iv in g as a m e a n s o f g a t h e r in g i n f o r m a t i o n .
W hen
th e
a n a tta c k e r e m p lo y s a c tiv e
s y s te m
by
u s in g
to o ls
to
re c o n n a is s a n c e te c h n iq u e s ,
d e te c t
open
p o rts ,
he o r sh e trie s to
a c c e s s ib le
h o s ts ,
ro u te r
in te ra c t w ith
lo c a tio n s ,
n e tw o rk
next
e x p e rts
phase
do
d iffe re n c e
o f a tta c k in g
n o t d iffe re n tia te
as
s c a n n in g
is s c a n n i n g ,
w h ic h
s c a n n in g f r o m
in v o lv e s
m o re
is d i s c u s s e d
a c tiv e
in -d e p th
in
th e
re c o n n a is s a n c e .
p ro b in g
on
th e
fo llo w in g
s e c tio n .
H o w e v e r, th e re
p a rt
of
th e
Som e
is a s l i g h t
a tta c k e r.
O fte n
r e c o n n a i s s a n c e a n d s c a n n i n g p h a s e s o v e r l a p , a n d i t is n o t a l w a y s p o s s i b l e t o d e m a r c a t e t h e s e
p h a s e s as w a t e r t ig h t c o m p a r tm e n ts .
A c tiv e
re c o n n a is s a n c e
is
u s u a lly
e m p lo y e d
when
th e
a tta c k e r
d is c e rn s
th a t
th e re
is
lo w
an
e th ic a l
m e th o d s ,
and
h a ck e r,
be
you
a b le
C o m p a n ie s , f o r t h e ir
to
p a rt,
o p e ra tio n a l s tra te g y , a n d
m ust
be
a d v o c a te
a b le
to
d is tin g u is h
p re v e n tiv e
m e a su re s
m u s t a d d re s s s e c u rity as a n
be e q u ip p e d
w ith
am ong
in
th e
th e
in te g ra l
p r o p e r p o lic ie s a n d
v a rio u s
lig h t
of
re c o n n a is s a n c e
p o te n tia l
p a rt o f th e ir
p ro ce d u re s to
th re a ts .
b u s in e s s a n d / o r
check fo r such
a c tiv itie s .
Module 01 Page 41
H a c k in g P h a s e s
CEH
( C o n t d )
P re -A tta c k P h a s e
Scanning refers to the pre-attack phase when the attacker
scans th e n e tw o rk fo r specific info rm atio n on the basis o f
info rm atio n gathered during reconnaissance
P o rt S c a n n e r
ML
E x tr a c t In fo rm a tio n
Attackers extract info rm atio n such as live machines, port,
p o rt status, OS details, device type, system up tim e, etc.
to launch attack
a c k i n g
h a s e s
( C
o n t d )
S c a n n in g
S c a n n in g
a tta c k e r
uses
S c a n n in g
can
th e
be
is w h a t a n
d e ta ils
a tta c k e r does
g a th e re d
c o n s id e re d
d u rin g
lo g ic a l
p rio r to
a tta c k in g
re c o n n a is s a n c e
e x te n s io n
(and
to
th e
n e tw o rk .
id e n tify
o v e rla p )
o f th e
In s c a n n in g , t h e
s p e c ific
a c tiv e
v u ln e ra b ilitie s .
re c o n n a is s a n c e .
O fte n a tta c k e r s u se a u t o m a t e d to o ls s u c h as n e t w o r k / h o s t s c a n n e rs a n d w a r d ia le rs t o lo c a te
s y s te m s a n d a t t e m p t t o d is c o v e r v u ln e ra b ilitie s .
A n a t ta c k e r c a n g a th e r c ritic a l n e t w o r k
in fo rm a tio n
s u c h as th e
m a p p in g o f s y s te m s , ro u te rs ,
a n d f ir e w a lls b y u s in g s im p le t o o ls s u c h as T r a c e r o u t e . A lt e r n a t iv e ly , t h e y c a n u s e t o o ls s u c h as
C h e o p s t o a d d s w e e p in g fu n c tio n a lity a lo n g w ith w h a t T ra c e ro u te re n d e rs .
P o rt sca n n ers
can
be
used
to
d e te c t
lis te n in g
p o rts
to
fin d
in fo rm a tio n
a b o u t th e
n a tu re
of
s e r v i c e s r u n n i n g o n t h e t a r g e t m a c h i n e . T h e p r i m a r y d e f e n s e t e c h n i q u e i n t h i s r e g a r d is t o s h u t
down
s e rv ic e s t h a t a re
m e c h a n is m .
H o w e ve r,
n o t re q u ire d . A p p r o p r ia te
a tta c k e rs
can
s till
use
filte rin g
to o ls
to
m a y a ls o b e a d o p t e d
d e te rm in e
th e
ru le s
as a d e fe n s e
im p le m e n te d
fo r
filte rin g .
The
m o s t c o m m o n ly
used
to o ls
a re v u ln e ra b ility s c a n n e rs th a t can
se a rch fo r se v e ra l k n o w n
v u ln e r a b ilit ie s o n a t a r g e t n e t w o r k , a n d c a n p o t e n t i a l l y d e t e c t t h o u s a n d s o f v u ln e r a b ilit ie s . T h is
g iv e s t h e a t t a c k e r t h e a d v a n ta g e o f t i m e
Module 01 Page 42
b e c a u s e h e o r s h e o n ly h a s t o f in d a s in g le m e a n s o f
e n tr y w h ile th e s y s te m s p ro fe s s io n a l has t o s e c u re m a n y v u ln e ra b le a re a s b y a p p ly in g p a tc h e s .
O rg a n iz a tio n s
th a t
d e p lo y
in tru s io n
d e te c tio n
s y s te m s
(ID S e s )
s till
have
re a so n
to
w o rry
b e c a u s e a t t a c k e r s c a n u s e e v a s io n t e c h n i q u e s a t b o t h t h e a p p l i c a t i o n a n d n e t w o r k le v e ls .
Module 01 Page 43
H a c k in g P h a s e s
CEH
( C o n t d )
R econn
a is s a n c e
A *
a c k i n g
I e|
h a s e s
a in in g
( C
o n t d )
A c c e s s
G a i n i n g a c c e s s is t h e m o s t i m p o r t a n t p h a s e o f a n a t t a c k i n t e r m s o f p o t e n t i a l d a m a g e .
G a in in g a cce ss re fe rs t o th e p o in t w h e r e th e a tta c k e r o b ta in s a cce ss t o th e o p e r a tin g s y s te m o r
a p p lic a tio n s o n t h e c o m p u t e r o r n e t w o r k . T h e a t t a c k e r c a n g a in a c c e s s a t t h e o p e r a t in g s y s te m
le v e l,
a p p lic a tio n
g a in in g
le v e l,
access in to
s y s te m , th e
or
n e tw o rk
a ta rg e t s y s te m
s k ill le v e l o f t h e
le v e l.
F a c to rs t h a t
in c lu d e
th e
in flu e n c e
a rc h ite c tu re
p e rp e tra to r, and th e
e s c a la te
p riv ile g e s t o
and
chances
o f an
c o n fig u ra tio n
a tta c k e r
o f th e
ta rg e t
in itia l le v e l o f a c c e s s o b t a in e d . T h e a tta c k e r
in itia lly t r ie s t o g a in m in im a l a c c e s s t o t h e t a r g e t s y s te m
access, h e o r sh e trie s to
th e
o b ta in
o r n e t w o r k . O n c e h e o r s h e g a in s t h e
c o m p le te
c o n tro l o f th e
s y s t e m . In t h e
p ro c e s s , i n t e r m e d i a t e s y s te m s t h a t a re c o n n e c t e d t o it a re a ls o c o m p r o m i s e d .
A tta c k e r s n e e d n o t a lw a y s g a in a c c e s s t o t h e s y s te m t o c a u s e d a m a g e . F o r in s ta n c e , d e n ia l- o fs e rv ic e a tta c k s ca n e ith e r e x h a u s t re s o u rc e s o r s to p s e rv ic e s f r o m
S to p p in g o f s e rv ic e c a n
b e c a rrie d
o u t b y k illin g
ru n n in g o n th e ta rg e t s y s te m .
p ro c e s s e s , u s in g a l o g i c / t i m e
b o m b , o r even
e x p lo it
E x a m p le s
can
occur
in c lu d e
Module 01 Page 44
lo c a lly ,
s ta c k -b a s e d
o fflin e ,
b u ffe r
over
LAN
o v e rflo w s ,
or
th e
In te rn e t
d e n ia l-o f-s e rv ic e ,
as
d e c e p tio n
and
s e s s io n
or
th e ft.
h ija c k in g .
ta rg e t s y s te m
a v a ila b ility
of
in o r d e r t o
th e
e x p lo it v u ln e ra b ility .
e s s e n tia l
s e rv ic e s .
S m u rf
p a c k e t c o n ta in in g a b u g to
P a cke t flo o d in g
a tta c k s
try
to
m ay
e lic it
be
a
used to
response
re m o te ly
fro m
th e
Module 01 Page 45
H a c k in g P h a s e s
CEH
( C o n t d )
&
a c k i n g
h a s e s
( C
o n t d )
= r\
M
a in t a in in g
A c c e s s
O n c e a n a t t a c k e r g a in s a c ce ss t o
b o th
th e
s y s te m
and
its
re so u rce s
and
e x p lo it o th e r s y s te m s , o r to k e e p a lo w
a c tio n s
can
dam age
th e
o rg a n iz a tio n .
th e ta rg e t s y s te m , th e
fu rth e r
use th e
s y s te m
a tta c k e r can ch o o se to
as a la u n c h
pad
to
scan
use
and
th e
a tta c k e r can
im p le m e n t
a s n iffe r to
c a p t u r e a ll n e t w o r k t r a f f i c , i n c l u d i n g t e l n e t a n d f t p s e s s io n s w i t h o t h e r s y s t e m s .
A tta c k e rs ,
w ho
choose
to
re m a in
u n d e te c te d ,
re m o ve
e v id e n c e
of
th e ir
e n try
b a c k d o o r o r a T r o ja n t o g a in r e p e a t a c c e s s . T h e y c a n a ls o in s ta ll r o o t k i t s a t t h e
g a in
super
u se r access. T he
re a so n
b e h in d
th is
is t h a t
ro o tk its
g a in
access
and
use
k e rn e l le v e l to
at th e
o p e ra tin g
s y s t e m le v e l w h i le a T r o ja n h o r s e g a in s a c c e s s a t t h e a p p lic a t io n le v e l. B o th r o o t k it s a n d T r o ja n s
d e p e n d o n u s e rs t o in s ta ll t h e m . W i t h i n W i n d o w s s y s te m s , m o s t T r o ja n s in s ta ll t h e m s e lv e s as a
s e rv ic e a n d ru n as lo c a l s y s te m , w h ic h h a s a d m in is t r a t iv e a cce ss.
A tta c k e rs
can
use
T ro ja n
h o rs e s
to
tra n s fe r
user
nam es,
p a ssw o rd s,
and
even
c re d it
c a rd
in f o r m a t io n s to re d o n th e s y s te m . T h e y c a n m a in ta in c o n tr o l o v e r t h e ir s y s te m f o r a lo n g t im e
b y " h a rd e n in g " th e
s y s te m
a g a in s t o t h e r a t t a c k e r s , a n d s o m e t i m e s , in t h e
s o m e d e g re e o f p ro te c tio n to th e s y s te m fr o m
p ro ce ss, d o r e n d e r
s te a l d a t a , c o n s u m e C PU c y c le s , a n d t r a d e s e n s it iv e i n f o r m a t i o n o r e v e n r e s o r t t o e x t o r t i o n .
Module 01 Page 46
O rg a n iz a tio n s
d e te c t
can
in tru d e rs .
use
The
in tru s io n
la tte r
d e te c tio n
th o u g h
is
not
s y s te m s
or
d e p lo y
re c o m m e n d e d
h o n e y p o ts
u n le s s
th e
and
h o n e y n e ts
o rg a n iz a tio n
has
to
th e
r e q u ir e d s e c u r ity p r o fe s s io n a l t o le v e ra g e t h e c o n c e p t f o r p r o t e c t io n .
Module 01 Page 47
H a c k in g P h a s e s
( C o n t d )
C o v e rin g tra c k s
The attacker's
T h e a tta c k e r
re fe rs t o th e
in te n tio n s include:
o v e r w r ite s th e
s e rv e r, s y s te m , a n d
o u t b y a n a tta c k e r
a p p lic a tio n lo g s to
re m a in in g u n n o tic e d
to h id e m a lic io u s
a v o id s u s p ic io n
a c ts
evidence th a t m igh t
Clearing
Tracks
a c k i n g
h a s e s
le a r in g
An
( C
o n t d )
T r a c k s
a tta c k e r w o u ld
lik e t o
d e s tro y e v id e n c e
o f h is o r h e r p r e s e n c e a n d
a c tiv itie s fo r
to
d e s ig n e d t o
have
th e
lo g file s o r
b i n a r i e s w i t h t h e s a m e . O n c e t h e T r o j a n s a r e in p la c e , t h e a t t a c k e r c a n b e
g a in e d
h id e th e
to ta l
c o n tro l
o f th e
s y s te m .
R o o tk its
a re
a u to m a te d
to o ls
th a t
a re
p r e s e n c e o f t h e a t t a c k e r . B y e x e c u t i n g t h e s c r ip t, a v a r i e t y o f c r itic a l file s
a r e r e p l a c e d w i t h T r o j a n n e d v e r s i o n s , h i d i n g t h e a t t a c k e r in s e c o n d s .
O t h e r t e c h n i q u e s i n c l u d e s t e g a n o g r a p h y a n d t u n n e l i n g . S t e g a n o g r a p h y is t h e p r o c e s s o f h i d i n g
t h e d a t a , f o r i n s t a n c e in i m a g e s a n d s o u n d f i le s . T u n n e l i n g t a k e s a d v a n t a g e o f t h e t r a n s m i s s i o n
p r o t o c o l b y c a r r y i n g o n e p r o t o c o l o v e r a n o t h e r . E v e n t h e e x t r a s p a c e ( e .g ., u n u s e d b i t s ) in t h e
TCP a n d
IP h e a d e r s c a n
co ve r to
la u n c h fre s h
be
u s e d f o r h id in g
in fo rm a tio n . A n
a tta c k e r can
use th e
s y s te m
as a
a tta c k s a g a in s t o t h e r s y s te m s o r u s e it as a m e a n s o f r e a c h in g a n o t h e r
s y s te m o n th e n e t w o r k w i t h o u t b e in g d e te c te d . T h u s , th is p h a s e o f a tta c k c a n tu r n
in to a n e w
c y c l e o f a t t a c k b y u s in g r e c o n n a i s s a n c e t e c h n i q u e s a ll o v e r a g a in .
T he re
have
been
in s ta n c e s
w h e re
an
a tta c k e r
has
lu rk e d
on
s y s te m
even
as
s y s te m
a d m in is t r a t o r s h a v e c h a n g e d . T h e s y s te m a d m in is t r a t io n c a n d e p lo y h o s t - b a s e d ID S e s a n d a n ti-
Module 01 Page 48
v iru s
to o ls
th a t
can
e th ic a l h a c k e r, y o u
you
a re
a b le
to
d e te c t T ro ja n s
m u s t be a w a re
a d v o c a te
and
and
o th e r
s e e m in g ly
b e n ig n
file s
and
d ire c to rie s .
As
an
o f th e to o ls a n d te c h n iq u e s th a t a tta c k e rs d e p lo y , so th a t
ta k e
c o u n te rm e a s u re s
to
e n s u re
p ro te c tio n .
These
w ill
be
d e t a i l e d in s u b s e q u e n t m o d u l e s .
Module 01 Page 49
CEH
F lo w
(rtifw l
H a c k in g
Typos of
A tta c k s
P hases
itk itjl
In fo rm a tio n S e c u r ity
C o n tro ls
d u l e
lo w
So fa r w e d is c u s s e d h o w
i m p o r t a n t i t is f o r a n o r g a n i z a t i o n t o k e e p t h e i r i n f o r m a t i o n
In fo r m a tio n S e c u rity O v e rv ie w
H a c k in g P h a s e s
>
In fo r m a tio n S e c u rity T h re a ts
O
T yp e s o f A tta c k s
a n d A tta c k V e c to rs
H a c k in g C o n c e p ts
T h is s e c tio n c o v e r s v a r io u s t y p e s o f a tta c k s s u c h as o p e r a t i n g s y s t e m
le v e l a tta c k s .
Module 01 Page 50
T y p e s o f A tta c k s o n a S y s te m
A t t a c k e r s e x p lo i t v u l n e r a b i li t i e s in a n i n f o r m a t io n s y s te m
t o g a in u n a u t h o r iz e d a c c e s s t o t h e s y s te m r e s o u r c e s
J
T h e u n a u t h o r iz e d a c c e s s m a y r e s u lt in lo s s , d a m a g e o r
5 .
t h e f t o f s e n s it iv e i n f o r m a t io n
IIIIIIIIIIIIIIIIIIII
T y p e s o f A tta c k s
III
11
IV
T y p e s
f A
t t a c k s
o n
y s t e m
T h e r e a re s e v e ra l w a y s a n a t t a c k e r c a n g a in a c c e s s t o a s y s te m . T h e a t t a c k e r m u s t b e
a b le t o e x p l o i t a w e a k n e s s o r v u l n e r a b i l i t y in a s y s t e m :
O p e ra tin g s y s te m
a n d e x p lo it th e m
to
g a in a c c e s s t o a n e t w o r k s y s te m .
Q
T he re
is
d e a rth
of
a p p lic a tio n s c o m e
tim e
to
p e rfo rm
w ith
m y ria d
c o m p le te
fu n c tio n a litie s
te s tin g
b e fo re
and
r e le a s in g
M is c o n fig u ra tio n
a tta c k s :
M ost
a d m in is tra to rs
d o n 't
have
th e
ne ce ssary
s k ills
to
m a i n t a i n o r f ix is s u e s , w h i c h m a y le a d t o c o n f i g u r a t i o n e r r o r s . S u c h c o n f i g u r a t i o n e r r o r s
m a y b e c o m e th e s o u rc e s fo r an a tta c k e r to e n te r in to th e ta rg e t's n e tw o r k o r s y s te m .
Q
to
m ake
th e
jo b
of
a d m in is tra to r
a p p lic a tio n s c o m e w it h
easy,
but
th e
sam e
n u m e ro u s s a m p le
s c rip ts
have
v a rio u s
v u ln e r a b ilit ie s , w h ic h c a n le a d t o s h r in k w r a p c o d e a tta c k s .
Module 01 Page 51
O p e r a tin g S y s te m A tta c k s
v u ln e ra b ilitie s
Exploiting specific
protocol im ple m en tation s
Attacking built-in
A ttackers search fo r
B u ffe r o v e rflo w
v u ln e ra b ilitie s in an
o p e ra tin g system's
design, in sta lla tio n or
CEH
Breaking file-system
security
system
e x p lo it th e m to gain
access to a n e tw o rk
system
G a in in g A c c e s s
p e
r a t i n
y s t e m
t t a c k s
T o d a y 's o p e r a tin g s y s te m s , w h ic h a re lo a d e d w it h fe a tu r e s , a re in c r e a s in g ly c o m p le x .
W h ile u se rs ta k e a d v a n ta g e o f th e s e fe a tu re s , th e s y s te m
e n tic in g
a tta c k e rs .
(G U Is ). T h e s e
O p e ra tin g
s u p p o rts th e
s y s te m s
use
t w e a k i n g is r e q u i r e d t o l o c k t h e m
run
o f p o rts
m any
and
is p r o n e t o m o r e v u l n e r a b i l i t i e s , t h u s
s e rv ic e s
m odes
such
o f access to
as
g ra p h ic a l
th e
user
In te rn e t, a nd
in te rfa c e s
e x te n s iv e
so t h a t t h e y c a n e x p lo it a n d g a in a c c e s s t o
n e tw o r k s y s te m s . T o s to p a tta c k e rs fr o m
th e ir n e tw o rk , th e s y s te m o r n e tw o r k a d m in is tr a to rs
e n te rin g
m u s tk e e p a b re a s t o f v a rio u s n e w e x p lo its
le a d s a t t a c k e r s t o s e a rc h f o r v a r io u s v u ln e r a b ilit ie s . A p p ly in g p a t c h e s
a n d h o t f i x e s is n o t e a s y w i t h t o d a y ' s c o m p l e x n e t w o r k s . M o s t p a t c h e s a n d f i x e s t e n d t o s o l v e
a n i m m e d i a t e is s u e , b u t t h e y c a n n o t b e c o n s id e r e d a p e r m a n e n t s o lu t io n .
S o m e OS v u ln e r a b ilitie s in c lu d e :
Q
B u ffe r o v e r f lo w v u ln e ra b ilitie s
B u g s in t h e o p e r a t i n g s y s t e m
U n p a tc h e d o p e ra tin g s y s te m s
Module 01 Page 52
A tta c k s p e r f o r m e d a t t h e O S le v e l in c lu d e :
Q
E x p lo itin g s p e c ific n e t w o r k p r o t o c o l i m p le m e n t a t io n s
B re a k in g file s y s te m s e c u rity
C ra c k in g p a s s w o r d s a n d e n c r y p t io n m e c h a n is m s
Module 01 Page 53
CEH
i s c o
f i g
r a
t i o
t t a c k s
a re
d e p lo y e d
in t h e
n e tw o rk .
F a ilu re t o
d o th is a llo w s th e
u s e d t o a t t a c k t h e s y s t e m . In o r d e r t o o p t i m i z e t h e c o n f i g u r a t i o n o f t h e
o f t h e d e v ic e s
d e fa u lt s e ttin g s t o
be
m a c h in e , r e m o v e a n y
r e d u n d a n t s e rv ic e s o r s o ftw a re .
Module 01 Page 54
CEH
0
P oor o r n o n e x is te n t e r ro r ch e c kin g
in clu d e :
Denial-of-service attacks
Phishing
Session hijacking
Man-in-the-middle attack
Parameter/form tampering
l i c a
t i o
A p p lic a tio n s a re
- l e
b e in g
v e
t t a c k s
re le a s e d
w ith
m ore
fe a tu re s and
m o re
c o m p le x c o d in g . W it h
t h i s in c r e a s e d d e m a n d in f u n c t i o n a l i t y a n d f e a t u r e s , d e v e l o p e r s g e n e r a l l y o v e r l o o k t h e s e c u r i t y
o f t h e a p p lic a t io n , w h i c h g iv e s ris e t o v u l n e r a b i l i t i e s in a p p lic a t io n s . A t t a c k e r s f in d a n d e x p l o i t
t h e s e v u l n e r a b i l i t i e s in t h e
a re v u ln e ra b le to a tta c k b e c a u s e o f th e fo llo w in g re a so n s:
0
T h e r e is a d e a r t h o f t i m e t o p e r f o r m c o m p l e t e t e s t i n g b e f o r e r e l e a s i n g p r o d u c t s
S e c u r i t y is o f t e n a n a f t e r t h o u g h t , a n d f r e q u e n t l y d e l i v e r e d a s a n " a d d - o n " c o m p o n e n t
P o o r o r n o n e x i s t e n t e r r o r c h e c k i n g in a p p l i c a t i o n s le a d s t o :
0
A c tiv e c o n te n t
C ro s s -s ite s c r ip tin g
Module 01 Page 55
M a lic io u s b o ts
P h is h in g
S e s s io n h ija c k in g
M a n - in - th e - m id d le a tta c k s
P a ra m e te r/fo rm ta m p e rin g
D ir e c to r y tra v e rs a l a tta c k s
Module 01 Page 56
E x a m p le s o f A p p lic a t io n - L e v e l
A tta c k s
CEH
S e s s io n H ij a c k i n g
V u ln e ra b le C ode
S ecure Code
< configuration>
< configuration>
<system.web>
< s y s te m .w e b >
a u t h e n t ic a t io n mode="Forms">
a u t h e n t ic a t io n mode="Forn3n>
Attacker may
exploit session
inform ation in
the vulnerable
code to perform
session hijacking
U s e C o o k ie s
</system.web>
instead of
U seU ri
D e n ia l- o f- S e r v ic e
S ecure Code
V u ln e ra b le C ode
S ta te m e n t stm n t c o n n . c r e a te S ta te m e n t
< );
R e s u ltS e t r s l t s e t
< );
s tm n t .e x e c u t e Q u e r y
S ta te m e n t stm n t;
tr y
{ s tm n t c o n n . c r e a t e S t a t e m e n t
s t m n t .e x e c u t e Q u e r y
s t m n t .c lo s e
();
fin a lly
();
I f (stmnt! n u ll)
i f
();
Note: For m o re in fo rm a tio n a b o u t a p p lica tio n v u ln e ra b ilitie s and h o w to fix th e m a tten d EC-Council's ECSP program
Copyright by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
x a m
p le s
f A
S e s s io n
l i c a
t i o
- L
v e
l A
t t a c k s
ija c k in g
A tta c k e r s m a y e x p lo it s e s s io n in f o r m a t io n
in t h e v u l n e r a b l e c o d e t o
p e rfo rm
s e s s io n
h ija c k in g w h e n y o u e n a b l e c o o k ie le s s a u t h e n t i c a t i o n in y o u r a p p lic a t io n . W h e n t h e t a r g e t t r ie s
to
b ro w s e
in s te a d
th ro u g h
o f th e
s e cu re
URL,
th e
c o o k ie ,
s e s s io n
to
g iv e
or
a u th e n tic a tio n
access
to
th e
URL
to k e n
a p p e a rs
re q u e s te d
by
in
th e
th e
re q u e st
ta rg e t.
H e re,
URL
an
a t t a c k e r u s i n g h is o r h e r s k ills a n d m o n i t o r i n g t o o l s c a n h i j a c k t h e t a r g e t s s e s s io n a n d s t e a l a ll
s e n s itiv e in fo r m a tio n .
V u ln e ra b le C o d e
A t t a c k e r s m a y e x p lo it s e s s io n i n f o r m a t i o n
Module 01 Page 57
in t h e v u l n e r a b l e c o d e t o
p e rfo rm
s e s s io n h ija c k in g .
4r 4
< fo rm s
m o d e = "F o rm s ">
< /s y s te m .w e b >
< /c o n fig u r a tio n >
S e cu re C ode
T h e c o d e c a n b e s e c u r e d b y u s in g U s e C o o k ie s in s t e a d o f U s e L J ri.
< c o n fig u r a tio n >
< s y s te m .w e b >
< a u th e n t ic a tio n
< fo rm s
m o d e = "F o rm s ">
c o o k ie le s s = " U s e C o o k ie s ">
< /s y s te m .w e b >
< /c o n f ig u r a tio n >
D e n ia l- o f- S e r v ic e
V u ln e ra b le C o d e
The
code
th a t
fo llo w s
is
v u ln e ra b le
to
d e n ia l-o f-s e rv ic e
a tta c k ,
as
it
fa ils
to
re le a s e
c o n n e c tio n re s o u rc e .
S ta te m e n t
s tm n t =
c o n n . c re a te S ta te m e n t
();
R e s u lt S e t
r s lts e t
= s tm n t.e x e c u te Q u e ry
();
s t m n t.c lo s e
();
S e cu re C ode
T h e c o d e c a n b e s e c u r e d b y r e l e a s in g t h e r e s o u r c e s in a f i n a l l y b lo c k .
Module 01 Page 58
S ta te m e n t s t m n t ;
try
s tm n t.e x e c u te Q u e r y
fin a lly
I f
try
c a tc h
( S Q L E x c e p t io n
s q le x p )
c a tc h
( S Q L E x c e p t io n
s q le x p )
{ s tm n t = c o n n .c r e a te S ta te m e n t
}
(s tm n t!
{
();
();
= n u ll)
s tm n t.c lo s e
{
();
Module 01 Page 59
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
S h r in k W r a p
C o d e
A tta c k s
C E H
l iiB
S h r in k W r a p
C o d e A tta c k s
W hen you install an O S /a p plicatio n , it comes w ith many sample scripts to make the
a d m in istra to r's life easy.
M o d u le 0 1 P ag e 60
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
01522
01523
01524
01525
01526
01527
01528
01529
01530
01531
01532
01533
01534
01535
01536
01537
01538
01539
01540
01541
01542
01543
01544
01545
01546
01547
01548
01549
01550
P iirtk F
D im
D l
D u
D iik
1 w i n (l u ^ L
lQ u o t* C o u n t
lc o v n t
sC h ar
sP r v C h a r
' S t e r t s 1* n t h R em i t
s L i n t T r 1 ( s L 1n )
If
L ft< s L 1n ,
C l& nU pL 1 n
is
e com m ent
3) "Ram* T h e n
"*
E x it F u n c tio n
E nd I f
' S ta r ts w ith i t i s 4
- II t L
L e*t tf t ( s L i n , 1)
C l*
l *. n U p L 1 n
tExxi ti t F u n c t i o n
E nd I f
com m ent
Th*n
' C o n t a i n s * m i y * re f m e
body o f e s tr in g
~ I t I n S t r ( s L i n , 0 < ( * T h * n
s P r v C h ax
1 Q u o tC o u n t 0
-F o r
01552
01553
01554
30
t+ s t
i f
l c o v n t 1 To L n ( s L 1 n )
fC h r H1 d ( s L 1 n t , 1 c o u n t ,
1)
I f m
vnnum ber
fo u n d th e n e n
' m eens i t i s th e s t e r t o f
p e rt o f e s tr in g
01 SSI
it
is
c o u m r( o r m
th e
o f "c h t r e c t e r s
m fr o n t
c o m m e n t .e n d
o d d n u m b e rM eans i t
xs
rI f
s C h a r A nd s P r v C h * r T h n
r I f 1 0 u o t C o u n t n o d 2 0 T h e n
s L i n * T r i a ( L f t < sL 1 n , l c o v n t - 1 ) )
E x it For
L ln d I f
- l l s I f sC h ar T h e n
lQ u o t C o u n t lO u o tC o u n t 1
L In d I f
sP ra v C h a r * *C har
N ax t 1c o u n t
1 En d I f
01555
01556
01557
01558
01559
01560
01561
01562
01563
01564
01565
01566
C l a n U p L ln s L l n
In d F u n c tio n
M o d u le 0 1 P ag e 61
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
C E H
F lo w
(rtifwd
^/
Types o f
A tta cks
Hacking
Phases
itkitjl
M o d u le
In the
flo w
previous
section,
we
discussed
how
an
a ttacker can
an
in fo rm a tio n system and w h a t type o f attacks an a ttacker can perform . Now, we w ill discuss
in fo rm a tio n se curity co n tro ls. In fo rm a tio n security co ntrols p re ve n t u n w a n te d events fro m
occurring and reduces the risk to the in fo rm a tio n assets o f the organization w ith se curity
policies.
Hacking Phases
Types o f A ttacks
s '
Hacking Concepts
This section highlights the im portance o f ethical hacking and discusses various se curity policies.
M o d u le 0 1 P ag e 62
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
W h y E t h ic a l H a c k in g
is N e c e s s a r y
|}>
W h y E th ic a l H a c k in g
Is N e c e s s a ry
Ethical Hacking: As hacking involves creative thinking , v u ln e ra b ility te s tin g and se curity
audits cannot ensure th a t the n e tw o rk is secure.
need to
im p le m e n t a
M o d u le 0 1 P ag e 63
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
S c o p e
a n d
L im ita tio n s
o f E th ic a l
C E H
H a c k in g
Scope
Ethical hacking is a crucial com ponent o f risk assessment, au diting,
c ou nterfrau d, best practices, and good governance
It is used to id e n tify risks and highlight th e rem edial actions, and also
reduces info rm atio n and com m unications technology (ICT) costs by
resolving those vulnerabilities
'G
tJ
Limitations
However, unless the businesses first know w hat it is at th a t they are looking
fo r and why they are hiring an outside ven dor to hack systems in the first
place, chances are there w ould no t be much to gain fro m the experience
An ethical hacker thus can only help the organization to be tter understand
th e ir security system, but it is up to the organization to place the righ t
guards on the netw ork
S c o p e a n d L im ita tio n s
o f E t h ic a l H a c k in g
Ethical hacking has a scope, and th e re are various lim ita tio n s o f ethical hacking, as
w ell.
S cope
The fo llo w in g is the scope o f ethical hacking:
Q
It is used to id e n tify risks and h ig hligh t rem edial actions, and it reduces in fo rm a tio n and
c o m m u n ica tio n s te ch n o lo g y (ICT) costs by resolving those vu ln erabilities.
L im it a t io n s
Unless businesses firs t know w h a t it is th e y are looking fo r and w hy the y are hiring an
outside ve nd o r to hack systems in the firs t place; chances are th a t th e re w ill not be
much to gain fro m the experience.
M o d u le 0 1 P ag e 64
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
S k ills
P la tfo r m K n o w le d g e
o f a n
E t h ic a l H a c k e r
N e t w o r k K n o w le d g e
C o m p u te r E x p e r t
S e c u r ity K n o w le d g e
T e c h n ic a l K n o w le d g e
C E H
S k ills o f a n E th ic a l H a c k e r
Ethical hacking is the legal hacking p erfo rm ed by pen te ste r to fin d v u ln e ra b ilitie s in
the in fo rm a tio n technology e nviron m e n t. In o rd er to p e rfo rm ethical hacking, the ethical
hacker requires the skills o f a co m p u te r expert. Ethical hackers should also have strong
c o m p u te r know ledge including p ro g ra m m in g and n e tw o rk in g . They should be p ro ficie n t at
installing and m aintaining systems using popular operating systems (e.g. UNIX, W indow s, or
Linux).
Detailed know ledge o f h ard w a re and s o ftw a re provided by popular co m p u te r and netw o rkin g
hardw are vendors co m p lem en t this basic know ledge. It is n ot always necessary th a t ethical
hackers possess any a dditional specialization in security. However, it is an advantage to know
how various systems m aintain th e ir security. M a n a g e m e n t skills p ertaining to these systems
are necessary fo r actual vu ln e ra b ility testin g and fo r preparing the re p o rt a fte r the testin g is
carried out.
An ethical hacker should possess im m ense patience as the analysis stage consumes m ore tim e
than the testing stage. The tim e fra m e fo r an evaluation may va ry fro m a fe w days to several
weeks, depending on the nature o f the task. W hen an ethical hacker encounters a system w ith
w hich he or she is n ot fam ilia r, it is im perative th e person takes the tim e to learn everything
about the system and try to find its v u ln e ra b le spots.
M o d u le 0 1 P ag e 65
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
D e fe n s e i n D e p th
M u ltip le defense-in-depth counterm easures are taken to p ro te c t in fo rm a tio n assets
o f a com pany. The strategy is based on the m ilita ry principle th a t it is m ore d iffic u lt fo r an
enem y to defeat a com plex and m u lti-la y e re d defense system than to penetrate a single
barrier. If a hacker gains access to a system, defense-in-depth m inim izes the adverse im pact
and gives a dm inistrato rs and engineers tim e to deploy new o r updated counterm easures to
p revent a recurrence.
Q
It helps to prevent d ire ct attacks against an in fo rm a tio n system and data because a
break in one layer only leads the a ttacker to the next layer.
M o d u le 0 1 P ag e 66
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
D efense in D epth L a ye rs
FIGURE 1.4: D e fe n se in D e p th Layers D ia g ra m
M o d u le 0 1 P ag e 67
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
In c id e n t M a n a g e m e n t P r o c e s s
CEH
~i 11--- 3
<9J
Purpose of incident management process
a
a
/
7
*,'3
In c id e n t M a n a g e m e n t P ro c e s s
Incident m anagem ent is a set o f defined processes to id e ntify, analyze, p rio ritize , and
resolve security incidents to restore the system to norm al service operations as soon as
possible and p revent the recurrence o f the same incident.
The purpose o f th e in cid en t m anagem ent process:
Q
M o d u le 0 1 P ag e 68
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
In c id e n t M a n a g e m e n t P r o c e s s
E H
( C o n t 'd )
, f
\S N
',ha * 'ft
eW
% %
rlr
In c id e n t M a n a g e m e n t P ro c e s s (C o n td )
Incident m anagem ent is the process o f logging, recording, and resolving incidents
th a t take place in the organization. The incident may occur due to fa u lt, service degradation,
error, etc. The incidents are re p orte d by users, technical staff, or som etim es detected
auto m a tically by event m o n ito rin g to o ls. The main objective o f the in cident m anagem ent
process is to restore the service to a norm al stage as early as possible to custom ers, w hile
m aintaining a vailability and q u a lity o f service. Any occurrence o f the in cident in an organization
is handled and resolved by fo llo w in g these incident m anagem ent steps:
0
N o tifica tion
C ontainm ent
Forensic Investigation
P ost-incident A ctivities
M o d u le 0 1 P ag e 69
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
In f o r m a t io n S e c u r it y P o lic ie s
J
&
In fo r m a tio n
S e c u r ity P o lic ie s
A security policy is a docum ent or set o f docum ents th a t describes the security
co ntrols th a t should be im p le m e n te d in the com pany at a high level fo r safeguarding the
organizational n e tw o rk fro m inside and outside attacks. This d ocu m e n t defines the com plete
security arch itectu re o f an organization and the d ocum ent includes clear objectives, goals, rules
and regulations, fo rm a l procedures, and so on. It clearly m entions the assets to be protected
and the person w ho can log in and access sites, w ho can vie w the selected data, as w ell as the
people w ho are allow ed to change the data, etc.
p ro te c t the com pany fro m possible lawsuits, lost revenue, and so on.
Security policies are the fo u n d a tio n o f the se curity in fra s tru c tu re . These policies secure and
safeguard the in fo rm a tio n resources o f an organization and provide legal p ro te ctio n to the
organization. These policies are beneficial since th e y help bring awareness o f the s ta ff w orking
in the organization to w o rk to g e th e r to secure its co m m unication, as w ell as m inim izing the
risks o f security weaknesses throu g h "h u m a n -fa c to r" mistakes such as disclosing sensitive
in fo rm a tio n to unauthorized o r unknow n sources, im p ro p e r use o f Inte rn e t, etc. In a dd ition,
these policies provide p ro te ctio n against cyber-attacks, m alicious threats, foreign intelligence,
and so on. They m ainly address physical security, n e tw o rk security, access authorizations, virus
p ro te ctio n , and disaster recovery.
M o d u le 0 1 P ag e 70
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Ensure custom ers' in te g rity and prevent wasting o f com pany co m p utin g resources
Reduce risks caused by illegal use o f the system resources and loss o f sensitive,
co nfid e ntia l data and p ote n tia l p ro p e rty
disclosure
M o d u le 0 1 P ag e 71
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
C la s s ific a tio n
o f S e c u r ity
P o lic ie s
C E H
User Policy
<30<5X5X3
IT Policy
Partner Policy
General Policies
C la s s ific a tio n
o f S e c u r ity P o lic ie s
users, IT
departm ents, organization, and so on. For effe ctive security m anagem ent, security policies are
classified in to five d iffe re n t areas:
IU s e r P o lic y
0
Defines the lim ita tio n s th a t are applied on users to secure the n e tw o rk
Ex: backup policies, server co nfig u ra tion , patch updates, m o d ifica tio n policies, fire w a ll policies
G e n e r a l P o lic ie s
^
M o d u le 0 1 P ag e 72
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Ex: high-level program policy, business c o n tin u ity plans, crisis m anagem ent, disaster recovery
P a r tn e r P o lic y
Policy th a t is defined among a group o f partners
^
x
I s s u e - s p e c ific P o lic ie s
Recognize specific areas o f concern and describe the organization's status fo r to p -
M o d u le 0 1 P ag e 73
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
S tru c tu re
S e c u r ity
a n d
C o n te n ts
C E H
P o lic ie s
Contents of
S ecurity Policies
S ecurity
Policy S tructure
o f
S tru c tu re
a n d C o n te n ts o f S e c u r ity P o lic ie s
*I S tr u c tu r e o f S e c u r ity P o lic ie s
A security policy is the docum ent th a t provides the w ay o f securing the com pany's
physical personnel and data fro m threa ts o r se curity breaches. Security policies should be
stru cture d very carefully and should be review ed p ro pe rly to make sure th a t th e re is no
w o rd in g th a t som eone could take advantage of. The basic s tru c tu re o f security policies should
include the follo w in g :
0
w ith
the
organizational standards
r
C o n te n t o f S e c u r ity P o lic ie s
1
Security policies contain the fo llo w in g elem ents:
M o d u le 0 1 P ag e 74
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
D iscipline
S ecurity
re q u ire m e n t
includes various
security
Safeguard S ecurity R equirem ents: This re q u ire m e n t m ainly contains access co ntro l,
archive, audit, a u th e n ticity, a v a ila b ility , c o n fid e n tia lity , cryptography, id e n tifica tio n
and a u th e n tica tio n , in te g rity, interfaces, m arking, n o n -re p u d ia tio n , o bject reuse,
recovery, and virus p ro te c tio n .
P rocedural
S ecurity
R equirem ents:
This
re q u ire m e n t
m ainly
contains
access
policies, a c c o u n ta b ility rules, c o n tin u ity -o f-o p e ra tio n s plans, and docu m e n ta tio n.
t?
review s and
S ecurity Concept o f O p e ra tio n : M a inly defines the roles, re sp on sib ilitie s, and fu n c tio n s
o f a security policy. It focuses on mission, com m unications, e ncryption, user and
m aintenance rules, id le -tim e m anagem ent, use o f p riva tely ow ned versus public-dom ain
softw are, shareware softw are rules, and a virus p ro te ctio n policy.
M o d u le 0 1 P ag e 75
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
T y p e s
o f S e c u r it y
P o lic ie s
C E H
P ro m isc u o u s
P e rm issiv e
P ru d e n t
P a ra n o id
P o licy
P o licy
P o licy
P o licy
-----No restrictions on
In te rn e t o r re m ote
access
It provides maximum
security w h ile
It forbids everything,
no In te rn e t
k no w n dangerous
services/attacks
con nection , or
blocked, w hich
makes it d iffic u lt to
keep up w ith
c u rre n t exploits
H -|t
T y p e s o f S e c u r ity P o lic ie s
A security policy is a d o cu m e n t th a t contains in fo rm a tio n on the w ay th e com pany
plans to p ro te ct its in fo rm a tio n assets fro m kn ow n and u n kn o w n th re a ts. These policies help
to m aintain the co nfid e ntia lly, availability, and in te g rity o f in fo rm a tio n . The fo u r m ajor types o f
security policies are as follow s:
P r o m is c u o u s P o lic y
m rk
W ith a prom iscuous policy, the re is no re s tric tio n on In te rn e t access. A user can
access any site, dow nload any application, and access a co m p u te r or a n e tw o rk fro m a rem ote
location. W hile this can be useful in co rp orate businesses w here people w ho travel or w o rk at
branch offices need to access the organizational netw orks, many m alware, virus, and Trojan
threa ts are present on the Inte rn e t. Due to free In te rn e t access, this m alw are can come as
a ttachm ents w ith o u t the know ledge o f the user. N e tw o rk a d m in is tra to rs m ust be extrem ely
a le rt if this type o f policy is chosen.
P e r m is s iv e P o lic y
i!L
dangerous services and attacks are blocked. Because only know n attacks and exploits are
M o d u le 0 1 P ag e 76
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
blocked, it is im possible fo r adm inistrato rs to keep up w ith cu rre n t exploits. A dm in istra to rs are
always playing catch-up w ith new attacks and exploits.
P r u d e n t P o lic y
A p ru de n t policy starts w ith all services blocked. The a d m in istra to r enables safe and
necessary services individually. This provides m a xim u m security. Everything, such as system
and n e tw o rk activities, is logged.
P a r a n o id P o lic y
cw -
M o d u le 0 1 P ag e 77
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
S te p s to
C re a te
S e c u r ity
a n d
Im p le m e n t
P o lic ie s
organization's assets
S te p s to C r e a te
a n d I m p le m e n t S e c u r ity P o lic ie s
Im p lem enting se curity policies reduces the risk o f being attacked. Thus, every
com pany m ust have its own security policies based on its business. The fo llo w in g are the steps
to be fo llo w e d by every organization in o rd er to create and im p le m e n t security policies:
1.
2.
3.
4.
Set clear p enalties and enforce the m and also review and update the security policy
5.
6.
Ensure every m em ber o f yo u r sta ff reads, signs, and understands the policy
7.
8.
M o d u le 0 1 P ag e 78
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Acceptable-Use Policy
User-Account Policy
It defines the account creation process and authority, rights and responsibilities
of user accounts
Remote-Access Policy
It defines who can have remote access, and defines access medium and remote
access security controls
WT
It defines the sensitivity levels of information, who may have access, how is it
stored and transmitted, and how should it be deleted from storage media
It defines access, management, and monitoring of firewalls in the organization
Special-Access Policy
This policy defines the terms and conditions of granting special access to system
resources
It defines who can install new resources on the network, approve the installation
of new devices, document network changes, etc.
Passwords Policy
E x a m p le s o f S e c u r ity P o lic ie s
The fo llo w in g are some examples o f security polies th a t are created, accepted, and
used by organizations w o rld w id e to secure th e ir assets and im p o rta n t resources.
A cceptable-U se Policy
Defines the acceptable use o f system resources
U ser-A ccount Policy
Defines th e account creation process and a u th o rity , rights, and re sp o n sib ilitie s o f user
accounts
Remote-Access Policy
Defines w ho can have re m o te access, and defines access m e d ium and re m o te access security
controls
In fo rm a tio n -P ro te c tio n Policy
Defines the s e n s itiv ity levels o f in fo rm a tio n , w ho may have access, how is it stored and
tra n s m itte d , and how should it be deleted fro m storage media
F ire w a ll-M a n a g e m e n t Policy
M o d u le 0 1 P ag e 79
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Defines access, m anagem ent, and m o n ito rin g o f fire w a lls in the organization
Special-Access Policy
This policy defines th e te rm s and co n d itio n s o f granting special access to system resources
N e tw o rk-C o n n e ctio n Policy
Defines w ho can install n ew resources on the n etw o rk, approve the in stallation o f new devices,
d ocum ent n e tw o rk changes, etc.
Email S ecurity Policy
Created to govern the p ro pe r usage o f co rp o ra te em ail
Password Policy
Provides guidelines fo r using stro ng passw ord p ro te c tio n on organization's resources
M o d u le 0 1 P ag e 80
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
V u ln e r a b ilit y
R e s e a r c h
n e tw o rk a d m in istra to r before a
n e tw o rk attack
to prevent th e security
problem s
V u ln e r a b ility R e s e a rc h
V u ln e ra b ility research means discovering system design fa u lts and weaknesses th a t
m ight help attackers com prom ise the system. Once the a ttacker finds o u t the v u ln e ra b ility in
the p ro du ct or th e application, he or she trie s to e x p lo it it.
V u ln e ra b ility research helps both security adm inistrato rs and attackers:
Discovering system
design faults
and weaknesses th a t
m ight help
attackers to
Checking
new ly
released
alerts
regarding
relevant
innovations
and
p roduct
M o d u le 0 1 P ag e 81
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
V u ln e r a b ility
R e s e a r c h W e b s ite s
C o d e R e d C e n te r
http://www.eccouncil.org
TechN et
http://blogs. technet.com
3|
-11
S e c u r ity M a g a z in e
http://www.5ecuritymagazine.com
S e c u rity F o c u s
http://www.securityfocus. com
C E H
H a c k e r S to rm
http://www.hackerstorm.co.uk
SC M a g a z in e
/ f fp : / / w w w .s c m o g o z / n e .c o m
C o m p u te r w o r ld
http://www.computerworld. com
H a c k e rJ o u rn a ls
http://www.hackerjournals.com
<
H e lp N e t S e c u r ity
http://www.net-security.org
\o*M
v > ------
W in d o w s S e c u r ity B lo g s
http://blogs.windowsecurity.com
V u l n e r a b ilit y R e s e a r c h W e b s ite s
The fo llo w in g are the some v u ln e ra b ility research w ebsites th a t you can use:
ill......
f -L11lilll |
C o d e R e d C e n te r
Source: h ttp ://w w w .e c c o u n c il.o rg
The CodeRed Center is a com prehensive se curity resource a d m in is tra to rs can tu rn to fo r daily,
accurate, u p-to -d a te in fo rm a tio n on the latest viruses, Trojans, m alw are, threats, security tools,
risks, and vulnerabilities.
( P
TechN et
Source: h ttp ://b lo g s.te ch n e t.co m
TechN et is a p ro ject team fro m across M ic ro s o ft Lync Server team s and the co m m u n ity at
large. It is led by the Lync Server d o cu m e n ta tio n team ; th e ir w rite rs and technical review ers
come fro m all disciplines, including p ro du ct engineers, fie ld engineers, su pp o rt engineers,
d ocu m e n ta tio n engineers, and some o f the m ost respected technology bloggers and authors in
the Lync Server universe.
M o d u le 0 1 P ag e 82
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
X
mVn
S e c u r ity M a g a z in e
Source: h ttp ://w w w .se cu ritym a g a zin e .co m
The SecurityFocus V u ln e ra b ility Database provides security professionals w ith the m ost
u p-to -d a te in fo rm a tio n on vu ln era b ilitie s fo r all p la tfo rm s and services.
H e lp N e t S e c u r ity
Source: h ttp ://w w w .n e t-s e c u rity .o rg
Net Security is a daily security news site th a t has been covering th e latest co m p u te r and
n e tw o rk security news since its inception in 1998.
Besides covering news around the globe, HNS focuses on q u a lity technical articles and papers,
vu ln era b ilitie s, ve nd o r advisories, m alware, and hosts th e largest security softw are dow nload
area w ith so ftw a re fo r W indow s, Linux, and Mac OS X.
H a c k e rS to rm
Source: http://www.hackerstorm.co.uk
HackerStorm is a security resource fo r e thical hackers and p e n e tra tio n teste rs to create b e tte r
p en e tra tio n testin g plans and scopes, and conduct vu ln e ra b ility research.
S C M a g a z in e
^
SC Magazine is published by H aym arket Media Inc. and is part o f a global brand. There are
th re e separate editions o f the magazine:
M o d u le 0 1 P ag e 83
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Asia Pacific O nline - read by decision-m akers in over 20 co u n trie s in the Pacific Rim
region
The magazine is published m o n th ly, usually in the firs t w eek o f each m o n th . It is th e longest
running in fo rm a tio n security magazine in the w o rld , w ith the w idest d istrib u tio n .
SC Magazine provides IT security professionals w ith in -d ep th and unbiased in fo rm a tio n in one
incom parable publication. In each m o n th ly issue it has tim e ly news, com prehensive analysis,
cutting-edge features, co n trib u tio n s fro m th o u g h t leaders and the best, m ost extensive
co llection o f p ro du ct reviews in the business. They
began cam paigning fo r organizations' in fo rm a tio n security leaders, making it the longest
established IT security title in the United States.
C o m p u te r w o r ld
For m ore than 40 years, C o m p ute rw o rld has been the leading source o f technology news and
in fo rm a tio n fo r IT influencers w o rld w id e . C o m p u te rw o rld 's w e b site (C om puterw orld.com ),
tw ic e -m o n th ly publication, focused conference series, and custom research fo rm the hub o f the
w o rld 's largest global IT media netw ork.
W in d o w s S e c u r it y B lo g s
Source: h ttp ://b lo g s.w in d o w se cu rity.co m
W indow s security has blogs posted by fam ou s auth ors w ho are leading industry experts. It has
various features such as articles and tu to ria ls, blogs, message boards, security tests, and w h ite
papers.
M o d u le 0 1 P ag e 84
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
W h a t I s P e n e t r a t io n T e s t in g ?
C E H
UrtrfW* I ttfciul lUilwt
T e s tin g in v o lv e s a c tiv e a n a ly s is o f
s y s te m c o n fig u ra tio n s , d e s ig n
th e s e c u rity o f an in fo r m a t io n s y s te m o r
w e a k n e s s e s , n e tw o r k
n e tw o r k b y s im u la tin g a n a tta c k to
a r c h ite c tu re , te c h n ic a l fla w s ,
f in d o u t v u ln e r a b ilit ie s th a t an
a n d v u ln e r a b ilitie s
a tta c k e r c o u ld e x p lo it
B lack b o x te s tin g s im u la te s an
A c o m p re h e n s iv e r e p o r t w ith
a tta c k fr o m s o m e o n e w h o has
d e ta ils o f v u ln e ra b ilitie s
n o p r io r k n o w le d g e o f th e s y s te m ,
d is c o v e re d a n d s u ite o f
re c o m m e n d e d c o u n te rm e a s u re s
a n d w h ite b o x te s tin g s im u la te s an
is d e liv e re d to th e e x e c u tiv e ,
a tta c k fr o m s o m e o n e w h o has
m a n a g e m e n t, a n d te c h n ic a l a u d ie n c e s
c o m p le te k n o w le d g e a b o u t th e s y s te m
W h a t I s P e n e t r a t io n T e s tin g ?
P enetration testing is a m ethod o f e va lu a tin g se curity levels o f a p articula r system or
n etw o rk. This helps you d ete rm ine th e flaw s related to h a rd w a re and so ftw a re . The early
id e n tific a tio n helps p ro te c t th e n e tw o rk . If the vu ln era b ilitie s a re n 't id e n tifie d early, the n the y
becom e an easy source fo r the attacker fo r the intrusion.
During p en e tratio n testing, a pen te ste r analyzes all the se curity measures em ployed by the
organization fo r design weaknesses, technical flaws, and vu ln era b ilitie s. There are tw o types o f
testing; black box te s tin g and w h ite b o x te stin g . Black box testin g sim ulates an attack fro m
som eone w ho is u n fa m ilia r w ith the system, and w h ite box testing sim ulates an a ttacker th a t
has kn ow led g e abo u t the system. Once all the tests are conducted, th e pen te ste r prepares a
re p o rt and includes all the te st results and the tests conducted along w ith the vu ln era b ilitie s
fou n d and the respective counterm easures th a t can be applied. Finally, the pen te ste r delivers
the re p o rt to executive, m anagem ent, and technical audiences.
M o d u le 0 1 P ag e 85
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
h y
P e n e t r a t io n
T e s t in g
C E H
(rtifwd
A
S
itkitjl
W Focus on high-severity
vulnerabilities and emphasize
application-level security issues to
development teams and
management
Ip fe
W h y P e n e t r a t io n T e s t in g ?
P enetration testing is required because it helps you to:
Reduce
On
an
S ecurity
organization's
In ve stm e n t
IT
(ROSI)
security
by
costs
and
provide
id e n tifyin g
and
resolving
b e tte r
Return
vu ln era b ilitie s
and
weaknesses
Gain and m aintain ce rtifica tio n to an in dustry regulation (BS7799, HIPAA etc.)
Change or upgrade existing in fra stru ctu re o f softw are, hardw are, or n e tw o rk design
Focus on h ig h-se ve rity v u ln e ra b ilitie s and emphasize a p p lica tio n -le ve l se curity issues
to d eve lo p m en t team s and m anagem ent
Provide a com prehensive approach o f pre pa ra tio n steps th a t can be taken to prevent
upcom ing e xploita tio n
Evaluate the efficiency o f n e tw o rk security devices such as fire w a lls, routers, and web
servers
M o d u le 0 1 P ag e 86
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
P e n e tr a tio n T e s tin g
M e th o d o lo g y
As a pen tester, you should never overlook any in fo rm a tio n resource. All possible
in fo rm a tio n sources m ust be tested fo r vuln era b ilitie s. Not ju st the in fo rm a tio n sources, but
every m echanism and the s o ftw a re involved in yo u r business m ust be tested because if the
a ttacker is n ot able to com prom ise the in fo rm a tio n system, the n he o r she may try to gain
access to the system and then to th e sensitive in fo rm a tio n . A fe w attacks, such as d enial-ofservice attacks, d o n 't even need access to the system. Therefore, to ensure th a t you check all
possible ways o f com prom ising a system or n etw o rk, you should fo llo w the p en e tra tio n testing
m ethodology. This ensures the full scope o f the test.
M o d u le 0 1 P ag e 87
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
M o d u le 0 1 P ag e 88
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
P e n e tr a tio n T e s t in g M e t h o d o lo g y ( C o n t d )
Mobile
Devices
Penetration
Testing
Tff H
Email
Security
Penetration
Testing
SAP
Penetration
Testing
M o d u le 0 1 P ag e 8 9
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
M o d u le
S u m
a r y
C E H
C o m p le x ity o f s e c u rity r e q u ir e m e n ts is in c re a s in g d a y b y d a y as a re s u lt o f
e v o lv in g te c h n o lo g y , c h a n g in g h a c k in g ta c tic s , e m e rg in g s e c u rity v u ln e r a b ilitie s , e tc.
M o d u le
S u m m a ry
know ledge, n e tw o rk
know ledge, c o m p u te r
M o d u le 0 1 P ag e 9 0