Seminar Report
Seminar Report
Seminar Report
SEMINAR REPORT
Social
Engineering
Automated
Organizational Attacks
Attacks
Restric
ted
Accidental Breaches
in Security
Denial of
Viruses, Trojan Horses, Service (DoS)
and Worms
General hacking
ETHICAL HACKING
HISTORY HIGHLIGHTS:
In one early ethical hack, the United States Air Force
conducted a “security evaluation” of the Multics operating systems for
“potential use as a two-level (secret/top secret) system.” With the growth of
computer networking, and of the Internet in particular, computer and
network vulnerability studies began to appear outside of the military
establishment. Most notable of these was the work by Farmer and Venema,
which was originally posted to Usenet in December of 1993.
Methodology of Hacking:
As described above there are mainly five steps in hacking like
reconnaissance, scanning, gaining access, maintaining access and clearing
tracks. But it is not the end of the process. The actual hacking will be a
circular one. Once the hacker completed the five steps then the hacker will
start reconnaissance in that stage and the preceding stages to get in to the
next level.The various stages in the hacking methodology are
● Reconnaissance
● Scanning & Enumeration
● Gaining access
● Maintaining access
● Clearing tracks
Reconnaissance:
The literal meaning of the word reconnaissance means a preliminary
survey to gain information. This is also known as foot-printing. This is
the first stage in the methodology of hacking. As given in the analogy, this
is the stage in which the hacker collects information about the company
which the personal is going to hack. This is one of the pre-attacking phases.
Reconnaissance refers to the preparatory phase where an attacker learns
about all of the possible attack vectors that can be used in their plan.
Enumeration:
Enumeration is the ability of a hacker to convince some servers to give
them information that is vital to them to make an attack. By doing this the
hacker aims to find what resources and shares can be found in the system,
what valid user account and user groups are there in the network, what
applications will be there etc. Hackers may use this also to find other hosts
in the entire network.
Gaining access:
This is the actual hacking phase in which the hacker gains
access to the system. The hacker will make use of all the information
he collected in the pre-attacking phases. Usually the main hindrance to
gaining access to a system is the passwords. System hacking can be
considered as many steps. First the hacker will try to get in to the system.
Once he get in to the system the next thing he want will be to increase his
privileges so that he can have more control over the system. As a normal
user the hacker may not be able to see the confidential details or cannot
upload or run the different hack tools for his own personal interest. Another
way to crack in to a system is by the attacks like man in the middle attack.
• Password Cracking:
There are many methods for cracking the password and then
get in to the system. The simplest method is to guess the password. But
this is a tedious work. But in order to make this work easier there
are many automated tools for password guessing like legion. Legion
actually has an inbuilt dictionary in it and the software will automatically.
That is the software it self generates the password using the
dictionary and will check the responses.
Techniques used in password cracking are:
• Dictionary cracking
• Brute force cracking
• Hybrid cracking
• Social engineering
• Privilege escalation:
Privilege escalation is the process of raising the privileges
once the hacker gets in to the system. That is the hacker may get in as an
ordinary user. And now he tries to increase his privileges to that of an
administrator who can do many things. There are many types of tools
available for this. There are some tools like getadmin attaches the user to
some kernel routine so that the services run by the user look like a system
routine rather than user initiated program. The privilege escalation
process usually uses the vulnerabilities present in the host operating
system or the software. There are many tools like hk.exe, metasploit
etc. One such community of hackers is the metasploit.
Maintaining Access:
Now the hacker is inside the system by some means by password
guessing or exploiting some of it’s vulnerabilities. This means that he is
now in a position to upload some files and download some of them. The
next aim will be to make an easier path to get in when he comes the next
time. This is analogous to making a small hidden door in the building so that
he can directly enter in to the building through the door easily. In the
network scenario the hacker will do it by uploading some
softwares like Trojan horses, sniffers , key stroke loggers etc.
Clearing Tracks :
Now we come to the final step in the hacking. There
is a saying that “everybody knows a good hacker but nobody knows a
great hacker”. This means that a good hacker can always clear tracks or any
record that they may be present in the network to prove that he was here.
Whenever a hacker downloads some file or installs some software, its log
will be stored in the server logs. So in order to erase those the hacker
uses man tools. One such tool is windows resource kit’s auditpol.exe. This is
a command line tool with which the intruder can easily disable auditing.
Another tool which eliminates any physical evidence is the evidence
eliminator. Sometimes apart from the server logs some other in formations
may be stored temporarily. The Evidence Eliminator deletes all such
evidences.
The above fig 2.1 represents the GUI of the samspade tool. In the text
field in the top left corner of the window we just need to put the address
of the particular host. Then we can find out various information available.
The information given may be phone numbers, contact names, IP
addresses, email ids, address range etc. We may think that what is the
benefit of getting the phone numbers, email ids, addresses etc.
But one of the best ways to get information about a company is to just
pick up the phone and ask the details. Thus we can get much information
in just one click.
• Email Tracker and Visual Route:
We often used to receive many spam messages in our mail
box. We don’t know where it comes from. Email tracker is a software
which helps us to find from which server does the mail actually came
from. Every message we receive will have a header associated with it.
The email tracker uses this header information for find the location.
The above fig 2.2 shows the GUI of the email tracker
software. One of the options in the email tracker is to import the mail
header. In this software we just need to import the mails header to it.
Then the software finds from which area that mail comes from. That is
we will get information like from which region does the message come
from like Asia pacific, Europe etc. To be more specific we can use
another tool visual route to pinpoint the actual location of the server. The
option of connecting to visual route is available in the email tracker.
Visual route is a tool which displays the location a particular server with
the help of IP addresses. When we connect this with the email tracker
we can find the server which actually sends the mail. We can use this for
finding the location of servers of targets also visually in a map
The above fig 2.3 depicts the GUI of the visual route tool. The visual
route GUI have a world map drawn to it. The software will locate the
position of the server in that world map. It will also depict the path
though which the message came to our system. This software will
actually provide us with information about the routers through which
the message or the path traced by the mail from the source to the
Destination.
Some other important tools used are:
• War Dialing
• Pingers
• Super Scan
• Nmap etc…
Reporting:
Assess your results to see what you uncovered, assuming that the
vulnerabilities haven’t been made obvious before now. This is where
knowledge counts. Evaluating the results and correlating the specific
vulnerabilities discovered is a skill that gets better with experience. You’ll
end up knowing your systems as well as anyone else. This makes the
evaluation process much simpler moving forward. Submit a formal report to
upper management or to your customer, outlining your results
Advantages and disadvantages:
Ethical hacking nowadays is the backbone of network security. Each day
its relevance is increasing,the major pros & cons of ethical hacking are given
below:
Advantages
• “To catch a thief you have to think like a thief”
• Helps in closing the open holes in the system network
• Provides security to banking and financial establishments
• Prevents website defacements
• An evolving technique
Disadvantages
• All depends upon the trustworthiness of the ethical hacker
• Hiring professionals is expensive.
Future enhancements:
q As it an evolving branch the scope of enhancement in
technology is immense. No ethical hacker can ensure the
system security by using the same technique repeatedly. He
would have to improve, develop and explore new avenues
repeatedly.