CEH v12
CEH v12
CEH v12
Footprinting
Reconnaissance
I. OSR Framework
https://www.kali.org/tools/osrframework/
II. theHarvester
is used to perform reconnaissance on email addresses subdomain
hosts and other online information which collects data from various
sources including search engines public databases and social media
platforms.
Syntax
theHarvester -d <target_domain> -l <limit> -b <data_sources>
theHarvester -d example.com -l 100 -b google,bing
III. FOCA
Windows tools
FOCA is an open-source software bundle that allows users to perform
basic metadata analyses in order to determine whether or not a
specific website may contain corrupted documents.
Port scanning
Service Identifications
OS Fingerprinting
Vulnerability Scanning
Network Mapping
Scanning Tools
Scanning Tools
I. Angry IP Scanner
II. Zenmap
III. Nmap
IS a open source tools for scanning networks based on CLI for
both windows, Linux and Mac-OS also available GUI version for
Windows (Zenmap).
Vulnerability Scanning
Simply, Vulnerabilities refers to weakness or flaws in computer system,
software, Hardware, or network that can be exploited by attacker to
compromise the confidentiality, availability, or functionality of the system.
System Hacking/Compromising/Exploiting
System hacking, also known as system exploitation or system compromise,
involves unauthorized access to computer systems, networks, or devices
with the intent to steal data, gain control, disrupt operations, or perform
other malicious activities.
Buffer Overflows
Metasploit
Metasploit is popular and widely used penetration testing and
exploitations framework in the field of cyber security which provides a
comprehensive suite of tools, libraries, and modules for ethical hacker,
security professionals, and penetration tester to identify, exploit and
validate vulnerabilities in computer system and networks.
Metasploit Frameworks
open source tools
Written mostly in ruby
Modules are organized into categories
For more https://nooblinux.com/metasploit-tutorial/
Keyloggers and Spyware
Key Loggers
A keylogger short for “keystroke Loggerr”, is a type of a malicious software or hardware
devices designed to secretly record and capture every keystroke made on a computer or
mobile device or network and can used along with spyware to transmit what you type to
third party for both Legitimate and malicious use
Keylogger Types
1. Hardware-based: Inserted between keyboard and computer
2. PC/BIOS Embedded
3. Keyboard keylogger
4. External Keylogger
5. Kernal/rootkit/Device driver
6. Hypervisor-based
7. Form Grabbing based
Some popular software based key logger are Metasploit payload
module, All in one keylogger, free keylogger, spyrix personal
monitor, Refog keylogger, Realtime-spy, Staffcop Standard.
Spyware
Spyware is a type of malicious software (malware) that is designed to
secretly gather information about a user's activities on a computer,
smartphone, or other device without their knowledge or consent. This
information can include keystrokes, web browsing history, login credentials,
personal data, and more.
Spyware Activities
Steal passwords
Log keystrokes
Location tracking
Record desktop activity
Monitor email
Audio/Video surveillance
Record/monitor Internet activity
Record software usage/timings
Change browser settings
Change Firewall Settings
Well-known Spyware
Agent Tesla
AzorUlt
TrickBot
Gator
Pegasus
Vidar
DarkHotel
Zlob
FlexiSpy
Cocospy
Mobistealth
Password Attacks
3. Offline Attacks
Grab a copy of the password database/file and
start cracking
Introduction to Malware
Malware: Malware is a file program or string of code used for malicious
activity, such as damaging device demanding ransom and stealing data
which are classified by payload or malicious action it performs. Typically
malware are delivered over a network, physical media. Mostly download from
the internet with or without the user’s knowledge. Social engineering is often
used to trick user into installing malware.
Types of Malwares:
Viruses
Worms
Trojans
Ransomware
Bots
Adware
Spyware
Browser hijackers
Rootkits
Keyloggers
Fileless malware
Malvertising
Malware vs Virus
All virus are malware but all malware are not virus
Virus vs worm
Basis of WORMS
Compariso VIRUS
n
A Virus is a malicious
A Worm is a form of malware executable code attached to
Definition that replicates itself and can another executable file
spread to different computers via which can be harmless or
Network. can modify or delete data.
Trojan
AKA Trojan Horse
A malicious program hidden inside of another program
Usually embedded into a legitimate application that the victim
willingly installs
Executes malicious activities in the background without the user's
knowledge
Rootkits:
A rootkit is a type of malicious software that is designed to gain
unauthorized access and maintain control over a computer or
computer system while remaining hidden from detection. Rootkits are
the most advanced and stealthy forms of malware, and they are
typically used by cybercriminals and attackers to compromise system
for various malicious purpose
Some characteristics of rootkits are:
Stealth and persistence
Privilege Escalation: Rootkits often seek to escalate their privileges to
gain the highest level of access on a system, such as "root" or "administrator"
privileges on Unix-like and Windows systems, respectively.
Hiding and Evasion
Backdoor Access
Kernal and hardware Level: Some rootkits target the kernel of the
operating system or even firmware and hardware components, making
them exceptionally difficult to detect and remove
Boot-kits: A subtype of rootkit, known as bootkits, infect the master
boot record (MBR) or other boot components of a system. This allows
them to execute before the operating system loads, providing an early
point of control.
File System and Registry Manipulation
Anit-Analysis Measures
Botnet:
A botnet is a network of computers that have been infected with malware
and controlled by a hacker or cybercriminal. These infected computers, also
known as "bots" or "zombies," are often used to carry out malicious activities
such as launching DDoS attacks, distributing spam emails, stealing sensitive
information, or conducting other types of cybercrime. The operator of the
botnet can remotely control and manipulate the infected computers,
typically without the knowledge or consent of their owners. Botnets can be
large-scale operations, consisting of thousands or even millions of
compromised computers, and they pose a significant threat to cybersecurity.
Botnet can be instructed to do malicious task including bitcoin mining,
Delivering ransomware.
Sniffing
Network sniffing, also known as packet sniffing or packet analysis, is
the process of capturing and inspecting data packets as they travel
over the computer network. This practice can used for both purpose
legitimate and malicious purpose.
MAC Attacks
MAC attacks, in the context of computer networking, refer to various types of
attacks that target the Media Access Control (MAC) address, which is a
hardware address unique to each network interface card (NIC). These attacks
can exploit vulnerabilities or weaknesses in the MAC address management
and communication processes in a network.
Some common attacks related to MAC are:
1. MAC Spoofing: MAC spoofing, MAC address impersonation, involves
changing the MAC address of a network interface to impersonate a
legitimate device on the network.
2. MAC Flooding: In a MAC flooding attack, an attacker sends a flood
of fake MAC addresses to overload the switch's MAC address table,
causing it to enter a state where it forwards traffic to all connected
ports
3. MAC Theft: MAC theft occurs when an attacker forcibly disconnects a
legitimate device from the network and takes over its MAC address.
This is often used for unauthorized network access.
4. MAC filtering Bypass: Some networks use MAC address
filtering as a security measure to allow only authorized devices
to connect. MAC filtering bypass attacks involve finding ways to
circumvent this filtering.
5. MAC Cloning: MAC cloning is a form of MAC spoofing where an
attacker clones the MAC address of an authorized device to gain
access to a network.
ARP Attacks
ARP (Address Resolution Protocol) attacks refer to a category of network
attacks that exploit vulnerabilities in the ARP protocol, which is responsible
for mapping IP addresses to MAC (Media Access Control) addresses on a local
network. These attacks can disrupt network communication, intercept traffic,
or carry out other malicious activities.
Here are some common ARP attacks:
Social Engineering
Social engineering is a type of cyberattack or manipulation technique that
exploits human psychology to deceive individuals or gain unauthorized
access to systems, data, or confidential information. It involves tricking
people into revealing sensitive information, performing certain actions, or
making decisions that benefit the attacker. Social engineering attacks do not
rely on technical vulnerabilities but instead exploit human trust, curiosity,
fear, and other emotions.
Some forms of social Engineering Attacks:
1. Phishing
2. Pretexting: Pretexting involves creating a fabricated
scenario or pretext to trick individuals into disclosing
information or performing actions. The attacker typically poses
as a trusted entity, such as a coworker, customer service
representative, or authority figure. Examples: Impersonating a
company executive to request sensitive data, pretending to be
a customer to gain access to an account.
Fragmentation Attacks:
1. Fragmentation Attack:
2. Teardrop Attack:
3. UDP & TCP Fragmentation:
4. Ping of Death:
5. Protocol Attacks:
6. BGP Hijacking
7. Land Attacks:
8. Permanent DOS:
9. P2P Attacks:
Session Hijacking
The Act of taking over someone else’s session after they established it
and are usually aimed for web browser which can done sometime at
network level where server doesn’t realize that someone is
masquerading as the client and even user or victim may not realize it.
The server usually not realize it because the attacker and victim might
be running parallel sessions or the server would see this two session
by same client.
Spoofing:
1. Process of initiating new session using stolen credentials
2. Attacker pretends to be a user/machine to gain access
Waya to obtain session Token:
1. Stealing: Attackers steals session IDs using various techniques
such as sniffing, XSS, Malicious site etc.
2. Guessing: Attackers looks at variable parts of session IDs to try to
guess what they are
3. Brute force: Attackers keeps trying different session IDs until the
right one is found
IDS
Intrusion Detection System
An intrusion detection system is a cybersecurity tool or system designed to
monitor network traffic or system activities for sign of malicious or
unauthorized activities. IDSs play a crucial role in identifying potential
security threats and responding to them.
Firewalls
A firewall is a network security devices or software that acts as a barrier
between a trusted internal network and untrusted external network, such as
the internet. Its primary purpose is to monitor and control incoming and
outgoing network traffic based on a set of predefined rules and policies.
Firewalls are fundamental components of network security and play a crucial
role in protecting networks and system from unauthorized access,
cyberattacks and other security threats.
Firewalls types:
1. Hardware-based:
2. Software-based:
3. Cloud Firewall:
4. Next-Generation firewall:
5. Network Firewall:
6. Host-Based Firewall:
7. Proxy Firewall:
8. Application firewall:
Packets Filtering
Packet filtering is a fundamental function performed by firewalls and
routers to control the flow of network traffic based on a set of
predefined rules or criteria. It involves inspecting data packets as they
traverse a network and making decisions about whether to allow or
block them. These decisions are typically based on various packet
attributes, including source and destination IP addresses, ports, and
protocols. Packet filtering is a core mechanism for enforcing network
security policies and protecting networks from unauthorized access
and malicious activities.