Hacking(2)
Hacking(2)
Hackers are people with technical skills that can thwart the security of any
network or computer. This circumvention usually involves unauthorized
entry in a computer system. These intruders are known as Black hat
hackers. However, sometimes such circumvention happens when a security
expert tries tounearththe vulnerabilities and bugs of a system (such hackers
are called white hat hackers or ethical hackers).Black hack hackers mostly
attack a system for monetary gain or with other malicious intentions.
Ethical hackers on the other hand use their knowledge and skills to
safeguard a system or a network against black hat hackers.
I want to thank you for choosing this book and hope you find it informative.
Have a good read!
Chapter 1: Penetration Testing
Nothing in this world is perfect and it is the same with electronic devices
and the software running in them. In spite of the best efforts of the
developers, the security vulnerabilities still continue to exist. A vulnerability
is nothing but an unintended security flaw. Attackers use these
vulnerabilities as loopholes or backdoors for exploiting the system or a
network. So, what can you do to prevent such an attack? Well, the answer is
Penetration Testing. Penetration testing is the attack done on the system by
security experts with an intention of enhancing its security. If these
vulnerabilities are not taken care of, attackers can make use of them for
stealing your data or to destroy the reputation of your organization.
Security interruptions and security breaches can cost you a lot of money.
The breaches in security or any performance related interruptions of the
applications or services can result in financial losses, significant penalties
and fines, attracting negative press, erode customer loyalties and threaten
reputation of the organization. The ponemon Institute conducted a recent
study and reported that an affected company loses $3.5 million due to data
breach. In the year 2013, the losses for target Data breach were estimated
to be $148 million by the first half of 2014.
You cannot safeguard your information at all times and it is not possible too.
For preventing breaches, organizations are traditionally installing and
maintaining several defensive security mechanism layers, firewalls, IDS, IPS
and cryptography. Due to the adoption of new technologies, it has become
hard to include these security systems for finding and eliminating the
vulnerabilities of an organization, for protecting them against potential
security incidents
Network services test: Out of all the types in penetration testing, the
network services test is the most common one. In this type of testing, a
target system on the network will be look for openings in its network
services and operating systems. These openings will be then remotely
exploited. Some network services testing will be done remotely on the
Internet by targeting the perimeter networks of the organization. Other
attacks will be launched at locally from their own facilities. This is done
with the main intention of assessing the DMZ or Internet work from within.
With this, they will know the kinds of vulnerabilities that and user from the
inside could learn.
Client side test: This type of penetration testing is done with the intention
of finding and exploiting the client side software vulnerabilities. Document
editing programs, media players, web browsers, etc., all come under the
client side software.
Every day, new vulnerabilities are being discovered and the attacks are
evolving constantly in terms of their social and technical sophistication.
There is evolution in their overall automation as well.
Chapter 2.Basic Security
With people like hackers, scammers and identity thieves on the Internet,
your personal information and money online are not safe. Here are a few
steps which can help you to protect yourself from such people. Some of
them include updating your computer software, revealing your personal
information only when required, using an antivirus etc. You should also
know that the antivirus programs cannot completely protect you. Antivirus
is like Microsoft Security essentials are not perfect. You will be risking your
data if you completely rely on the antivirus software for protection. Here
are some common sense security practices which will keep you safe from
attackers.
Use Antivirus
Using an antivirus is a wise thing to do. You may possibly be infected by the
browser plug-ins zero day vulnerability from Adobe Flash or even from your
browser. There are chances of you getting infected even after updating your
browser with the latest one. By visiting a web page, you can be infected by
the latest vulnerabilities that are not yet patched. It is not very common but
it is possible. An antivirus software acts as an important protective layer
and can handle such vulnerabilities.
Whenever you set up a new PC or when you install new software, the user
account control will ask you for your permission. This happens whenever
you try to install the new software. With the User Account Control, you can
block malware from modifying your system files without permissions. It is
similar to an antivirus and acts as an important protective layer too.
By selecting and installing a good antivirus you make your system perform
at its peak. When there are unwanted infections and spyware present on
your computer, its performance will be decreased. You can take care of
them by installing an antivirus.
You should be very careful when selecting an antivirus for your computer.
You should choose the correct antivirus depending on the type of work you
do. If you are using your computer at home, you can just get the basic
version of the antivirus. If you're working on the Internet, making online
transactions or when you are sending sensitive files over the Internet, you
can go with the Internet security version. If you wish to get the highest
protection from an antivirus, you can purchase the total security version. As
we have already discussed, they cannot completely remove the viruses from
your system. But they are very efficient in bringing the number down. You
don't have to buy the licensed antivirus software for trying it. Every
antivirus distributor provides users with a trial version of their product. You
can try this trial version to check if it meets your requirements. If it doesn't,
you can go with other options. You can buy an antivirus if you're completely
satisfied with its performance after checking it. There are many sites online
which review different ant viruses. You can refer to those websites for
choosing the right antivirus. They will be subjected to several performance
tests and they will be rated accordingly.
The Microsoft Windows operating system comes with its own firewall and
you don't have to use a third-party distributed firewall. It is advised that you
leave your firewall enabled at all times. Unsolicited incoming connections
will be blocked by your firewall and with that you can protect applications
on your computer that exploit the unhandled vulnerabilities listening to that
network. During the initial launch of Windows XP, worms like Blaster have
spread quickly because of its weak firewall. The firewall of the latest
operating systems is strong and capable of protecting your system from
such malware.
Uninstall Java
Most of the web users run an insecure and outdated version of Java and
simply visiting such web pages will infect you. There are many security
vulnerabilities in Java. On the web, Java applets are rare and for a few
people need Java pre installed.
Uninstall Java from your Control Panel if you have installed it. Browser will
prompt you to install Java if it actually needs it for something. For doing
something online like playing Minecraft, Java should be installed and Java
plug-in for the browser can be disabled after that.
From the security point of view, using cracked or pirated software is not a
good idea. Many people use peer to peer networks for downloading files and
become infected. A bigger risk than downloading pirated videos or music is
to download unauthorized software. Always remember that software is just
a machine code and it can be tampered. A video is nothing but a media file
that can play or not. Many untrustworthy individuals disguise malware as
videos and many less experienced users fall victim of it thinking that they
have downloaded a video.
Be cautious when you are disclosing your personal information on the web.
Before disclosing your password, make sure that the website or the
individuals are legitimate ones. If you wish to access your online bank
account, go directly to the bank's website and avoid clicking on links from
different websites or emails that claim to be genuine. They might redirect
you to imposter sites.
Here are some tips which will help you become a good ethical hacker.
You should also possess some decent knowledge on the areas related.
Your skills at hacking should be superior to those of a script kiddie.
You should know how to use the code of scripting languages and
programming languages like Python, Ruby, C, Perl etc,. It will be an
added advantage if you are strong with security and network analysis.
Rather than depending on the code written by others, it is better to
use your own code depending on the requirements.
If you are strong with your network , you should see that you possess
the required knowledge before you attack a network. You should
always have beforehand knowledge on your network before attacking
it. By knowing the layout of the network, you can plan your attack
with an appropriate strategy.
Writing down your steps and plans is a really good practice and it
proved to be extremely helpful. You can keep your steps clean and
organized by having a plan beforehand. By planning, you can keep a
track of the things completed and the things yet to be done. You can
constantly check your progress and can take the necessary steps. By
having a plan, you can avoid the repetition of steps and this will save
you a great deal of time. You will be creating obvious and unnecessary
traffic when you repeat the steps that you have already performed and
it is a risk. Generating unnecessary traffic might get you exposed.
You should know how your tools work. You should know the working
of each and every tool that you use. By possessing the required
knowledge on the tools’ functionalities, you will be able to choose the
right tool for the job. Some tools might take a lot of time for
completing the task and some tools might be an overkill. So, choosing
the right tool for the job is an important characteristic of an ethical
hacker. You can't use a crowbar for drilling a small hole in the wall
and similarly you can't use a hand drill for digging a pit. You should
use the right tool for the job. For instance, using the wrong Nmap
might result in you getting caught. Keep in mind that the hacking
tools are unpredictable. It is strongly recommended that you learn the
working of every tool before using it in an attack.
Making your own tools and using them is a really good way to become
successful ethical hacker. It is better than using the tools of others.
You might not be perfect in the beginning but, with practice, you will
definitely get a lot better. You cannot always find right tools for the
job. In such situations, you should be capable of designing the tools on
your own. For this, you don't have to start from scratch. There are
many open source tools readily available online and you can use them
to make your own custom tools.
Conclusion
With this, we have come to the end of the book and I hope you have enjoyed
learning the basic concepts of penetration testing, ethical hacking and basic
security. This book isonly intended for amateurs who are interested in
ethical hacking and it is important that you remember black hat hacking is
illegal and punishable by law. Hope this knowledge helps you gain a basic
understanding of what ethical hacking is all about.
I thank you for downloading this book and hope you have found the content
informative and easy to read.