DST - ch01 - Ethical Hacking - 2023
DST - ch01 - Ethical Hacking - 2023
DST - ch01 - Ethical Hacking - 2023
Hacking
Computer hacking is when someone modifies
computer hardware or software in a way that
alters the creator's original intent.
1
Hacker
Hackers break into computer systems by
exploiting security vulnerabilities, such as
poor configuration of Web servers
disabled security controls
poorly chosen or default passwords
2
Cyber Attack
3
Make the appropriate changes in the
C:\WINDOWS\system32\drivers\etc\Hosts
4
VULNERABILITY
Vulnerability
5
Weak Passwords
A password that is easy to detect both by
humans and by computer
Password Guessing
blank (none)
the word "password", "passcode", "admin" and their
derivatives
the user's name or login name
the name of their significant other or another
person (loved one) their birthplace or date of
birth
a pet's name
Weak Passwords
a dictionary word in any language
6
Default Password
A moderately high number of local and
online applications have inbuilt default
passwords that have been configured by
programmers during development stages of
software.
There are lots of applications running on the
internet on which default passwords are
enabled.
So, it is quite easy for an attacker to enter
default password and gain access to sensitive
information.
14
7
Ethical Hacking
An ethical hacker is a computer and network
expert who attacks a security system on
behalf of its owners, seeking vulnerabilities
that a malicious hacker could exploit.
Hackers think that what they do is like an art
form.
hacking gives them the opportunity to use
their problem-solving skills and a chance to
show off their abilities.
Most of them do not wish to harm others.
Consultant for law enforcement Agencies-
Ethical Hacking
Ethical hackers
Employed by companies to perform penetration
tests
Penetration test
Legal attempt to break into a company’s network
to find its weakest link
Tester only reports findings, does not solve
problems
Security test
More than an attempt to break in; also includes
analyzing company’s security policy and
procedures
Tester offers solutions to secure or protect the
network
8
Security Policy
Security policy (also called an information
security policy or IT security policy) is a
document that spells out the rules,
expectations, and overall approach that an
organization uses to maintain the
confidentiality, integrity, and availability of
its data.
Security Policy
9
Security Policy
Example of Policy
Definition of a Hacker
10
Types of Hackers (Terminology)
White hat
Grey hat
Black hat
Type of Hackers
Black hat hackers are criminals who break into
computer networks with malicious intent. They
may also release malware that destroys files,
holds computers hostage, or steals passwords,
credit card numbers, and other personal
information.
11
Ethical Hacker
1. Crack Password.
2. Identifying and recording security flaws and
breatches.
3. Bypass and crack the wireless encryption.
4. Hijack the web server and web application.
5. Install backdoor program to access attacker/victim
machine.
6. Perform the footprinting.
7. Sniffing network.
8. Evidence corelated.
9. Suggestion for security upgrade.
24
12
How the Hack in
General Steps
Locate the victim host by some scanning
program
Identify the victim host vulnerability
Attack the victim host via this vulnerability
Establish backdoors for later access
13
What You Cannot Do Legally
14
The Role of Security and Penetration
Testers
Script kiddies or packet monkeys
– Young inexperienced hackers
– Copy codes and techniques from knowledgeable
hackers
Experienced penetration testers write
programs or scripts using these languages
Practical Extraction and Report Language (Perl),
C, C++, Python, JavaScript, Visual Basic, SQL, and
many others Script
Set of instructions that runs in sequence
30
15
Hacker Hierarchy
Script kiddies – These are the wannabe
hackers. They are looked down upon in the
hacker community because they are the
people that make hackers look bad.
Script kiddies usually have no hacking skills
and use the tools developed by other.
hackers without any knowledge of what’s
happening behind the scenes.
Hacker Hierarchy
Intermediate hackers – These people usually
know about computers, networks, and have
enough programming knowledge to
understand relatively what a script might do,
but like the script kiddies they use pre-
developed well-known exploits
a piece of code that takes advantage of a bug or
vulnerability in a piece of software that allows
you to take control of a computer system) to
carry out attacks
16
Hacker Hierarchy
Elite Hackers – These are the skilled hackers.
They are the ones that write the many hacker
tools and exploits out there.
They can break into systems and hide their
tracks or make it look like someone else did
it. You should strive to eventually reach this
level.
Ports
• The Internet Assigned Numbers Authority (IANA)
recommends globally-unique names and numbers
for use in TCP and UDP.
• According to IANA recommendation (IAN 2009), the
port number are divided into three groups,
– the Well Known Ports (0 – 1023),
– the Registered Ports (1024 – 49151),
– and the Dynamic and/or Private Ports (49152 – 65535).
17
Network Scanning
PORT SCANNING
(what services are available?)
18
Ping Sweep
Ping sweep
A ping sweep (also known as an ICMP
sweep) is a basic network scanning technique
used to determine which of a range of IP
addresses map to live hosts (computers).
NMAP
19
Syntax for conducting port scanning through NMAP
20
Hacking Tools
protocol analyzer, or sniffer, that lets you
capture and interactively browse the
contents of network frames.
Wireshark
Ethereal
TCP Dump
Key logger
Steganography Tools
21
Reference
1. Ethical Hacking and Network Defense.
Michael T. Simpson, Kent Backman, James
Corley
2. SANS Institute InfoSec Reading Room : Three
Different Shades of Ethical Hacking: Black,
White and Gray
Available at :
http://www.sans.org/reading_room/whitep
apers/hackers/shades-ethical-hacking-black-
white-gray_1390
43
22