ethical hacking adapted from zephyr gauray’s slides found here: and from achyut paudel’s
TRANSCRIPT
Ethical Hacking
Adapted from Zephyr Gauray’s slides found here:http://www.slideworld.com/slideshow.aspx/Ethical-Hacking-ppt-2766165
And from Achyut Paudel’s slides found here:http://www.wiziq.com/tutorial/183883-Computer-security-and-ethical-hacking-slide
And from This Research Paper:http://www.theecommercesolution.com/usefull_links/ethical_hacking.php
Keith BrooksCIO and Director of ServicesVanessa Brooks, Inc.Twitter/Skype: [email protected]
““How often have I said to you that when How often have I said to you that when you have eliminated the impossible, you have eliminated the impossible, whatever remains, however whatever remains, however improbable, must be the truth? “improbable, must be the truth? “
Or a modern variation:Or a modern variation:"If you eliminate the impossible, "If you eliminate the impossible, whatever remains, whatever remains, however however improbableimprobable, , mustmust be the be the truthtruth."."
2nd Quote is from Spock in Star Trek (2009) but really from Sir Arthur Conan Doyle’s infamous Detective, Sherlock Holmes as seen above
AnonymousAnonymous
As for the literal operation of Anonymous, becoming As for the literal operation of Anonymous, becoming part of it is as simple as going onto its Internet Relay part of it is as simple as going onto its Internet Relay Chat forums and typing away. Chat forums and typing away.
The real-life people involved in Anonymous could be The real-life people involved in Anonymous could be behind their laptops anywhere, from an Internet café behind their laptops anywhere, from an Internet café in Malaysia to a Michigan suburb. in Malaysia to a Michigan suburb.
Anonymous appears to have no spokesperson or leader. Anonymous appears to have no spokesperson or leader.
One could participate for a minute or a day in a chat One could participate for a minute or a day in a chat room, and then never go back again.room, and then never go back again.
Anonymous is the future form of Internet-based social Anonymous is the future form of Internet-based social activism. They laud the "hactivists" for their actions.activism. They laud the "hactivists" for their actions.
Underground Toolkit Arms Hackers For Java FlawBy Antone Gonsalves, CRN March 29, 2012 3:57 PM ET
A software toolkit popular among cyber-criminals has been updated to include malicious code targeting a critical Java vulnerability that experts say many Internet users have yet to patch.…A patch for the Java bug was released in February, but based on the Java patching behavior of 28 million Internet users, Rapid7 estimates that from 60 percent to 80 percent of computers running Java are vulnerable. The bug affects all operating systems, including Windows, starting with XP, Ubuntu and Mac OS X.
In general, up to 60 percent of Java installations are never updated to the latest version, according to Rapid7.
http://www.crn.com/news/security/232700528/underground-toolkit-arms-hackers-for-java-flaw.htm;jsessionid=aN-QwyraKe6tlMxNtzWh5A**.ecappj03?cid=nl_sec
Federal Statute 2B1.1. - Protected Computer - Civil Penalty
Protected Computer Cases.--In the case of an offense involving unlawfully accessing, or exceeding authorized access to, a "protected computer" as defined in 18 U.S.C. § 1030(e)(2), actual loss includes the following pecuniary harm, regardless of whether such pecuniary harm was reasonably foreseeable: reasonable costs to the victim of conducting a damage assessment, and restoring the system and data to their condition prior to the offense, and any lost revenue due to interruption of service.
(B) Gain.--The court shall use the gain that resulted from the offense as an alternative measure of loss only if there is a loss but it reasonably cannot be determined.
(C) Estimation of Loss.--The court need only make a reasonable estimate of the loss. The sentencing judge is in a unique position to assess the evidence and estimate the loss based upon that evidence.
Why Do People HackWhy Do People Hack To make security stronger ( Ethical Hacking )To make security stronger ( Ethical Hacking ) Just for funJust for fun Show offShow off Hack other systems secretlyHack other systems secretly Notify many people their thoughtNotify many people their thought Steal important informationSteal important information Destroy enemyDestroy enemy’’s computer network during s computer network during
the warthe war
What is Ethical HackingAlso Called – Attack & Penetration Testing, White-hat hacking, Red teaming
•It is Legal
•Permission is obtained from the target•Part of an overall security program•Identify vulnerabilities visible from the Internet•Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner
HackingProcess of breaking into systems for:Personal or Commercial GainsMalicious Intent – Causing sever damage to Information & AssetsConforming to accepted professional standards of conduct
Types of HackersTypes of Hackers White Hat Hackers:White Hat Hackers:
A A White HatWhite Hat who specializes in penetration testing and in who specializes in penetration testing and in other testing methodologies to ensure the security of an other testing methodologies to ensure the security of an organization's information systems.organization's information systems.
Black Hat Hackers:Black Hat Hackers:
A A Black HatBlack Hat is the villain or is the villain or bad guybad guy, especially in a , especially in a western movie in which such a character would western movie in which such a character would stereotypically wear a black stereotypically wear a black hat in contrast to the hero's in contrast to the hero's white hat.white hat.
Gray Hat Hackers:Gray Hat Hackers:
A A Grey HatGrey Hat, in the hacking community, refers to a skilled , in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and hacker whose activities fall somewhere between white and black hat hackers on a variety of spectrablack hat hackers on a variety of spectra
Why CanWhy Can’’t We Defend Against Hackers?t We Defend Against Hackers?
• There are many unknown security hole
• Hackers need to know only one security hole to hack the system
• Admin need to know all security holes to defend the system
Why Do We Need Ethical Hacking
Viruses, Trojan Horses,
and Worms
SocialEngineering
AutomatedAttacks
Accidental Breaches in
Security Denial ofService (DoS)
OrganizationalAttacks
RestrictedData
Protection from possible External Attacks
Ethical Hacking - CommandmentsWorking Ethically
TrustworthinessMisuse for personal gain
Respecting PrivacyNot Crashing the Systems
What do hackers do after hacking? (1)What do hackers do after hacking? (1)
• Patch security hole
• The other hackers can’t intrude
• Clear logs and hide themselves
• Install rootkit ( backdoor )
• The hacker who hacked the system can use the system later
• It contains trojan virus, and so on
• Install irc related program
• identd, irc, bitchx, eggdrop, bnc
What do hackers do after hacking? (2)What do hackers do after hacking? (2)
• Install scanner program
• mscan, sscan, nmap
• Install exploit program
• Install denial of service program
• Use all of installed programs silently
Basic Knowledge RequiredBasic Knowledge Required The basic knowledge that an Ethical Hacker should have The basic knowledge that an Ethical Hacker should have
about different fields, is as follows:about different fields, is as follows:
Should have basic knowledge of ethical and permissible issuesShould have basic knowledge of ethical and permissible issues
Should have primary level knowledge of session hijackingShould have primary level knowledge of session hijacking
Should know about hacking wireless networksShould know about hacking wireless networks
Should be good in sniffingShould be good in sniffing
Should know how to handle virus and wormsShould know how to handle virus and worms
Should have the basic knowledge of cryptographyShould have the basic knowledge of cryptography
Should have the basic knowledge of accounts administrationShould have the basic knowledge of accounts administration
Should know how to perform system hackingShould know how to perform system hacking
Basic Knowledge Required Basic Knowledge Required (con’t)(con’t)
Should have the knowledge of physical infrastructure hackingShould have the knowledge of physical infrastructure hacking
Should have the primary knowledge of social engineeringShould have the primary knowledge of social engineering
Should know to how to do sacking of web serversShould know to how to do sacking of web servers
Should have the basic knowledge of web application weaknessShould have the basic knowledge of web application weakness
Should have the knowledge of web based password breaking Should have the knowledge of web based password breaking procedureprocedure
Should have the basic knowledge of SQL injectionShould have the basic knowledge of SQL injection
Should know how to hack LinuxShould know how to hack Linux
Should have the knowledge of IP hackingShould have the knowledge of IP hacking
Should have the knowledge of application hackingShould have the knowledge of application hacking
Denial of ServiceDenial of Service If an attacker is unsuccessful in gaining access, they may If an attacker is unsuccessful in gaining access, they may
use readily available exploit code to disable a target as a use readily available exploit code to disable a target as a last resortlast resort
Techniques Techniques
SYN floodSYN flood
ICMP techniquesICMP techniques
Identical SYN requestsIdentical SYN requests
Overlapping fragment/offset bugsOverlapping fragment/offset bugs
Out of bounds TCP options (OOB)Out of bounds TCP options (OOB)
DDoSDDoS
How Can We Protect The How Can We Protect The System? System?
Patch security hole oftenPatch security hole often Encrypt important dataEncrypt important data
Ex) pgp, sshEx) pgp, ssh Do not run unused daemonDo not run unused daemon Remove unused setuid/setgid programRemove unused setuid/setgid program Setup loghostSetup loghost
• Backup the system oftenBackup the system often Setup firewallSetup firewall Setup IDSSetup IDS
Ex) snortEx) snort
What should do after hacked?What should do after hacked? Shutdown the systemShutdown the system
Or turn off the systemOr turn off the system Separate the system from networkSeparate the system from network
Restore the system with the backupRestore the system with the backup
Or reinstall all programsOr reinstall all programs Connect the system to the networkConnect the system to the network
Many topics of hacking still remain to be covered and Many topics of hacking still remain to be covered and there are more slides in this presentation for your there are more slides in this presentation for your review later.review later.
Thank You !!!Thank You !!!
Ethical Hacking - Process1. Preparation
2. Foot Printing
3. Enumeration & Fingerprinting
4. Identification of Vulnerabilities
5. Attack – Exploit the Vulnerabilities
6. Gaining Access
7. Escalating Privilege
8. Covering Tracks
9. Creating Back Doors
1.PreparationIdentification of Targets – company websites, mail
servers, extranets, etc.Signing of Contract
Agreement on protection against any legal issues Contracts to clearly specifies the limits and dangers of the
test Specifics on Denial of Service Tests, Social Engineering,
etc. Time window for Attacks Total time for the testing Prior Knowledge of the systems Key people who are made aware of the testing
2.FootprintingCollecting as much information about the target DNS Servers IP Ranges Administrative Contacts Problems revealed by administrators
Information Sources Search engines Forums Databases – whois, ripe, arin, apnic Tools – PING, whois, Traceroute, DIG, nslookup, sam
spade
3.Enumeration & Fingerprinting
Specific targets determined Identification of Services / open ports Operating System Enumeration
Methods Banner grabbing Responses to various protocol (ICMP &TCP)
commands Port / Service Scans – TCP Connect, TCP SYN, TCP
FIN, etc.
Tools Nmap, FScan, Hping, Firewalk, netcat, tcpdump,
ssh, telnet, SNMP Scanner
4.Identification of Vulnerabilities
Vulnerabilities
Insecure ConfigurationWeak passwordsUnpatched vulnerabilities in services,
Operating systems, applicationsPossible Vulnerabilities in Services,
Operating Systems Insecure programmingWeak Access Control
4.Identification of Vulnerabilities
MethodsUnpatched / Possible Vulnerabilities – Tools,
Vulnerability information WebsitesWeak Passwords – Default Passwords, Brute
force, Social Engineering, Listening to Traffic
Insecure Programming – SQL Injection, Listening to Traffic
Weak Access Control – Using the Application Logic, SQL Injection
4.Identification of Vulnerabilities
ToolsVulnerability Scanners - Nessus, ISS, SARA, SAINTListening to Traffic – Ethercap, tcpdumpPassword Crackers – John the ripper, LC4, PwdumpIntercepting Web Traffic – Achilles, Whisker, Legion
Websites Common Vulnerabilities & Exposures –
http://cve.mitre.org Bugtraq – www.securityfocus.com Other Vendor Websites
5.Attack – Exploit the Vulnerabilities
Obtain as much information (trophies) from the Target Asset
Gaining Normal AccessEscalation of privilegesObtaining access to other connected
systems
Last Ditch Effort – Denial of Service
5.Attack – Exploit the Vulnerabilities
Network Infrastructure Attacks Connecting to the network through modem Weaknesses in TCP / IP, NetBIOS Flooding the network to cause DOS
Operating System Attacks Attacking Authentication Systems Exploiting Protocol Implementations Exploiting Insecure configuration Breaking File-System Security
5.Attack – Exploit the Vulnerabilities
Application Specific AttacksExploiting implementations of HTTP, SMTP
protocolsGaining access to application DatabasesSQL InjectionSpamming
5.Attack – Exploit the Vulnerabilities
Exploits Free exploits from Hacker Websites Customised free exploits Internally Developed
Tools – Nessus, Metasploit Framework,
6. Gaining access:6. Gaining access: Enough data has been gathered at this point to make an Enough data has been gathered at this point to make an
informed attempt to access the targetinformed attempt to access the target
TechniquesTechniques
Password eavesdroppingPassword eavesdropping
File share brute forcingFile share brute forcing
Password file grabPassword file grab
Buffer overflowsBuffer overflows
7. Escalating Privileges7. Escalating Privileges If only user-level access was obtained in the last step, the If only user-level access was obtained in the last step, the
attacker will now seek to gain complete control of the attacker will now seek to gain complete control of the systemsystem
TechniquesTechniques
Password crackingPassword cracking
Known exploitsKnown exploits
8. Covering Tracks8. Covering Tracks Once total ownership of the target Once total ownership of the target
is secured, hiding this fact from is secured, hiding this fact from system administrators becomes system administrators becomes paramount, lest they quickly end paramount, lest they quickly end the romp.the romp.
TechniquesTechniques Clear logsClear logs Hide toolsHide tools
9. Creating Back Doors9. Creating Back Doors Trap doors will be laid in various parts of the system to Trap doors will be laid in various parts of the system to
ensure that privileged access is easily regained at the ensure that privileged access is easily regained at the whim of the intruderwhim of the intruder
TechniquesTechniques
Create rogue user accountsCreate rogue user accounts
Schedule batch jobsSchedule batch jobs
Infect startup filesInfect startup files
Plant remote control servicesPlant remote control services
Install monitoring mechanismsInstall monitoring mechanisms
Replace apps with trojansReplace apps with trojans