ethical hacking

27
ETHICAL HACKING A LICENCE TO HACK BY PRABHAT KUMAR SUMAN Follow me on facebook.com/prabhatksuman

Upload: prabhat-kumar-suman

Post on 26-Jun-2015

176 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Ethical hacking

ETHICAL HACKINGA LICENCE TO HACK

BY PRABHAT KUMAR SUMAN Follow me on facebook.com/prabhatksuman

Page 2: Ethical hacking

What do ethical hacker do? Ethical hackers are

motivated by different reasons,but their purpose is usually the same as that of crackers: they’re trying to determine what an intruder can see on a network or system and what the hacker can do with that information .This process of testing the security of a system or network is known as penetration test or pen test.

Page 3: Ethical hacking

Types of hackers

Page 4: Ethical hacking

Types of Hackers

White Hat Hackers: A White Hat who specializes in penetration testing and

in other testing methodologies to ensure the security of an organization's information systems.

Black Hat Hackers: A Black Hat is the villain or bad guy, especially in a

western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat.

Gray Hat Hackers: A Grey Hat, in the hacking community, refers to a

skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra

Page 5: Ethical hacking

Hacker Terms

Hacking - showing computer expertise Cracking - breaching security on software or

systems Phreaking - cracking telecom networks Spoofing - faking the originating IP address in a

datagram Denial of Service (DoS) - flooding a host with

sufficient network traffic so that it can’t respond anymore

Port Scanning - searching for vulnerabilities

Page 6: Ethical hacking

How to be ethical?

Gain authorization from the client and have a signed contract giving the tester permission to perform the test.

Maintain and follow a nondisclosure agreement(NDA) with the client in case of confidential information disclosed during the test.

Maintain confidentiality when performing the test.Information gathered may contain sensitive information.No information about the test or company confidential data should ever be disclosed to a third party

Perform the test up to but beyond the agreed upon limits. For example,DoS attacks should only be run as part of the test if they have previously been agreed upon with the client.Loss of revenue,goodwill, and worse could befall an organisation whose server or application are unavailable to customers as a result of test.

Page 7: Ethical hacking

Why Do We Need Ethical Hacking

Viruses, Trojan Horses,

and Worms

SocialEngineering

AutomatedAttacks

Accidental Breaches in

Security Denial ofService (DoS)

OrganizationalAttacks

RestrictedData

Protection from possible External Attacks

Page 8: Ethical hacking

Hacking through the ages

1969 - Unix ‘hacked’ together 1971 - Cap ‘n Crunch phone exploit discovered 1988 - Morris Internet worm crashes 6,000 servers 1994 - $10 million transferred from CitiBank accounts 1995 - Kevin Mitnick sentenced to 5 years in jail 2000 - Major websites succumb to DDoS 2000 - 15,700 credit and debit card numbers stolen from Western Union

(haked while web database was undergoing maintenance) 2001 Code Red

exploitedbug in MS IIS to penetrate & spread probes random IPs for systems running IIS had trigger time for denial-of-service attack 2nd wave infected 360000 servers in 14 hours

Code Red 2 - had backdoor installed to allow remote control Nimda -used multiple infection mechanisms email, shares, web client, IIS 2002 – Slammer Worm brings web to its knees by attacking MS SQL

Server

Page 9: Ethical hacking

Why Do People Hack

To make security stronger ( Ethical Hacking )

Just for funShow offHack other systems secretlyNotify many people their thoughtSteal important informationDestroy enemy’s computer network

during the war

Page 10: Ethical hacking

The Role of Security and Penetration Testers

Hackers

Access computer system or network without authorization

Breaks the law; can go to prison

Crackers

Break into systems to steal or destroy data

U.S. Department of Justice calls both hackers

Ethical hacker

Performs most of the same activities but with owner’s permission

Hands-On Ethical Hacking and Network Defense 10

Page 11: Ethical hacking

Types of attacks

Buffer overflow attack. Denial of service(DoS) attacks. Distributed Denial of Service(DDoS)

attacks Misconfigurations Abuse of trust Brute force attacks CGI and WWW services Backdoors and Trojans.

Page 12: Ethical hacking

Steps of Ethical hacking

1.Preparation2.Footprinting3.Enumeration & Fingerprinting4.Identitification of vulnerabilities5.Attack :- Exploit the vulnerabilities6.Gaining access7.Escalating privilage8.Covering tracks9.Creating backdoors

Page 14: Ethical hacking

5 Phases of Ethical Hacking

Reconnaissance Scanning Gaining access Maintaing Access Covering tracks

Page 15: Ethical hacking

Phase 1: Reconnaissance Reconnaissance refers to the

preparatory phase where an attacker gathers as much information as possible about the target prior to launching the attack. Also in this phase, the attacker draws on competitive intelligence to learn more about the target. This phase may also involve network scanning,either external or internal, without authorization

Page 16: Ethical hacking

Phase 2:Scanning

Scanning is the method an attacker performs prior to attacking the network. In scanning, the attacker uses the details gathered during reconnaissance to identify specific vulnerabilities. Scanning can be considered a logical extension (and overlap) of the active reconnaissance. Often attackers use automated tools such as network/host scanners, and war dialers to locate systems and attempt to discover vulnerabilities.

Page 17: Ethical hacking
Page 18: Ethical hacking

Phase 3 - Gaining Access

Gaining access is the most important phase of an attack in terms of potential damage. Attackers need not always gain access to the system to cause damage. For instance, denial-of-service attacks can either exhaust resources or stop services from running on the target system. Stopping of service can be carried out by killing processes, using a logic/time bomb, or even reconfiguring and crashing the system. Resources can be exhausted locally by filling up outgoing communication links.

Page 19: Ethical hacking
Page 20: Ethical hacking

Phase 4 - Maintaining Access Once an attacker gains access to the target

system, the attacker can choose to use both the system and its resources, and further use the system as a launch pad to scan and exploit other systems, or to keep a low profile and continue exploiting the system. Both these actions can damage the organization. For instance, the attacker can implement a sniffer to capture all network traffic, including telnet and ftp sessions with other systems.

Page 21: Ethical hacking
Page 22: Ethical hacking

Phase 5-Covering Tracks

An attacker would like to destroy evidence of his/her presence and activities for various reasons such as maintaining access and evading punitive action. Erasing evidence of a compromise is a requirement for any attacker who would like to remain obscure. This is one of the best methods to evade trace back. This usually starts with erasing the contaminated logins and any possible error messages that may have been generated from the attack process, e.g., a buffer overflow attack will usually leave a message in the systemlogs. Next, the attention is turned to effecting changes so that future logins are not logged. By manipulating and tweaking the event logs, the system administrator can be convinced that the output of his/her system is correct, and that no intrusion or compromise has actually taken place

Page 23: Ethical hacking
Page 24: Ethical hacking

Importance of Ethical Hacking

To protect cyber crime To protect secret information of any

country’s secret information If you know how to rob somebody

…..then atleast you know how to protect your self.

Page 25: Ethical hacking

PRECAUTIONS

Never use computer of untrusted person/Cyber Cafe for E-BANKING!!!

Be careful in using PUBLIC WI-FI Facebook can be FUN but if possible

avoid using FACEBOOK Apps Keep changing your PASSWORDS

once in a while !!! Be careful in using Torrents Never leave your PC unattended

Page 26: Ethical hacking

Conclusions

Ethical hacking is more than running hacking tools and gaining unauthorized access to system just to see what is accessible. When performed by a security professional, ethical hacking encompasses all aspects of reconnsissance and information gathering ,a structured approach, and post attack analysis. Ethical hacker require in-depth knowledge of systems and tools as well as a great deal of patience and restraint to ensure no damage is done to the target systems. Hacking can be performed ethically and in fact is being mandated by government and the private sector to ensure systems security.

Page 27: Ethical hacking