ethical hacking
TRANSCRIPT
ETHICAL HACKINGA LICENCE TO HACK
BY PRABHAT KUMAR SUMAN Follow me on facebook.com/prabhatksuman
What do ethical hacker do? Ethical hackers are
motivated by different reasons,but their purpose is usually the same as that of crackers: they’re trying to determine what an intruder can see on a network or system and what the hacker can do with that information .This process of testing the security of a system or network is known as penetration test or pen test.
Types of hackers
Types of Hackers
White Hat Hackers: A White Hat who specializes in penetration testing and
in other testing methodologies to ensure the security of an organization's information systems.
Black Hat Hackers: A Black Hat is the villain or bad guy, especially in a
western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat.
Gray Hat Hackers: A Grey Hat, in the hacking community, refers to a
skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra
Hacker Terms
Hacking - showing computer expertise Cracking - breaching security on software or
systems Phreaking - cracking telecom networks Spoofing - faking the originating IP address in a
datagram Denial of Service (DoS) - flooding a host with
sufficient network traffic so that it can’t respond anymore
Port Scanning - searching for vulnerabilities
How to be ethical?
Gain authorization from the client and have a signed contract giving the tester permission to perform the test.
Maintain and follow a nondisclosure agreement(NDA) with the client in case of confidential information disclosed during the test.
Maintain confidentiality when performing the test.Information gathered may contain sensitive information.No information about the test or company confidential data should ever be disclosed to a third party
Perform the test up to but beyond the agreed upon limits. For example,DoS attacks should only be run as part of the test if they have previously been agreed upon with the client.Loss of revenue,goodwill, and worse could befall an organisation whose server or application are unavailable to customers as a result of test.
Why Do We Need Ethical Hacking
Viruses, Trojan Horses,
and Worms
SocialEngineering
AutomatedAttacks
Accidental Breaches in
Security Denial ofService (DoS)
OrganizationalAttacks
RestrictedData
Protection from possible External Attacks
Hacking through the ages
1969 - Unix ‘hacked’ together 1971 - Cap ‘n Crunch phone exploit discovered 1988 - Morris Internet worm crashes 6,000 servers 1994 - $10 million transferred from CitiBank accounts 1995 - Kevin Mitnick sentenced to 5 years in jail 2000 - Major websites succumb to DDoS 2000 - 15,700 credit and debit card numbers stolen from Western Union
(haked while web database was undergoing maintenance) 2001 Code Red
exploitedbug in MS IIS to penetrate & spread probes random IPs for systems running IIS had trigger time for denial-of-service attack 2nd wave infected 360000 servers in 14 hours
Code Red 2 - had backdoor installed to allow remote control Nimda -used multiple infection mechanisms email, shares, web client, IIS 2002 – Slammer Worm brings web to its knees by attacking MS SQL
Server
Why Do People Hack
To make security stronger ( Ethical Hacking )
Just for funShow offHack other systems secretlyNotify many people their thoughtSteal important informationDestroy enemy’s computer network
during the war
The Role of Security and Penetration Testers
Hackers
Access computer system or network without authorization
Breaks the law; can go to prison
Crackers
Break into systems to steal or destroy data
U.S. Department of Justice calls both hackers
Ethical hacker
Performs most of the same activities but with owner’s permission
Hands-On Ethical Hacking and Network Defense 10
Types of attacks
Buffer overflow attack. Denial of service(DoS) attacks. Distributed Denial of Service(DDoS)
attacks Misconfigurations Abuse of trust Brute force attacks CGI and WWW services Backdoors and Trojans.
Steps of Ethical hacking
1.Preparation2.Footprinting3.Enumeration & Fingerprinting4.Identitification of vulnerabilities5.Attack :- Exploit the vulnerabilities6.Gaining access7.Escalating privilage8.Covering tracks9.Creating backdoors
Recent hacking news via FBI
28.02.13The Cyber Threat: Planning for the Way Ahead Director says network intrusions pose urgent threat to
nation’s security and economy. 05.02.13Sextortion Cons Like ‘Bieber
Ruse’ Targeted Minor Girls Tricks like an Alabama man’s claim to be Justin Bieber
target minors on social websites.
5 Phases of Ethical Hacking
Reconnaissance Scanning Gaining access Maintaing Access Covering tracks
Phase 1: Reconnaissance Reconnaissance refers to the
preparatory phase where an attacker gathers as much information as possible about the target prior to launching the attack. Also in this phase, the attacker draws on competitive intelligence to learn more about the target. This phase may also involve network scanning,either external or internal, without authorization
Phase 2:Scanning
Scanning is the method an attacker performs prior to attacking the network. In scanning, the attacker uses the details gathered during reconnaissance to identify specific vulnerabilities. Scanning can be considered a logical extension (and overlap) of the active reconnaissance. Often attackers use automated tools such as network/host scanners, and war dialers to locate systems and attempt to discover vulnerabilities.
Phase 3 - Gaining Access
Gaining access is the most important phase of an attack in terms of potential damage. Attackers need not always gain access to the system to cause damage. For instance, denial-of-service attacks can either exhaust resources or stop services from running on the target system. Stopping of service can be carried out by killing processes, using a logic/time bomb, or even reconfiguring and crashing the system. Resources can be exhausted locally by filling up outgoing communication links.
Phase 4 - Maintaining Access Once an attacker gains access to the target
system, the attacker can choose to use both the system and its resources, and further use the system as a launch pad to scan and exploit other systems, or to keep a low profile and continue exploiting the system. Both these actions can damage the organization. For instance, the attacker can implement a sniffer to capture all network traffic, including telnet and ftp sessions with other systems.
Phase 5-Covering Tracks
An attacker would like to destroy evidence of his/her presence and activities for various reasons such as maintaining access and evading punitive action. Erasing evidence of a compromise is a requirement for any attacker who would like to remain obscure. This is one of the best methods to evade trace back. This usually starts with erasing the contaminated logins and any possible error messages that may have been generated from the attack process, e.g., a buffer overflow attack will usually leave a message in the systemlogs. Next, the attention is turned to effecting changes so that future logins are not logged. By manipulating and tweaking the event logs, the system administrator can be convinced that the output of his/her system is correct, and that no intrusion or compromise has actually taken place
Importance of Ethical Hacking
To protect cyber crime To protect secret information of any
country’s secret information If you know how to rob somebody
…..then atleast you know how to protect your self.
PRECAUTIONS
Never use computer of untrusted person/Cyber Cafe for E-BANKING!!!
Be careful in using PUBLIC WI-FI Facebook can be FUN but if possible
avoid using FACEBOOK Apps Keep changing your PASSWORDS
once in a while !!! Be careful in using Torrents Never leave your PC unattended
Conclusions
Ethical hacking is more than running hacking tools and gaining unauthorized access to system just to see what is accessible. When performed by a security professional, ethical hacking encompasses all aspects of reconnsissance and information gathering ,a structured approach, and post attack analysis. Ethical hacker require in-depth knowledge of systems and tools as well as a great deal of patience and restraint to ensure no damage is done to the target systems. Hacking can be performed ethically and in fact is being mandated by government and the private sector to ensure systems security.