Ethical Hacking Unit-3
Ethical Hacking Unit-3
Ethical Hacking Unit-3
Syllabus topic:-
Page No.
1) Ethical Hacking :
……………………………………………………………..
2) Enterprise Security:
………………………………………………………...
3) Phases :
…………………………………………………………………………..
5) Systems hacking :
……………………………………………………………..
5.1) Windows and Linux - Metasploit and Kali Linux,
5.2) Keylogging,
5.3) Buffer Overflows
5.4) Privilege Escalation
5.5) Network hacking - ARP Poisoning,
5.6) Password Cracking,
5.7) WEP Vulnerabilities,
5.8) MAC Spoofing,
5.9) MAC Flooding,
5.10) IPSpoofing,
5.11) SYN Flooding,
5.12) Smurf attack,
6) Applications hacking :
……………………………………………………………
6.1) SMTP/Email-based attacks,VOIP vulnerabilities,
6.2) Directory traversal,
6.3) Input Manipulation,
6.4) Brute force attack,
6.5) Unsecured login mechanisms,
6.6) SQL injection,
6.7) XSS, Mobile apps security,
7) Malware analysis :
………………………………………………………………
7.1) Netcat Trojan,
7.2) wrapping definition,
7.3) reverse engineering
8) Phases :
……………………………………………………………………………
8.1) Covering your tracks :
8.1.1) Steganography,
8.1.2) Event Logs alteration
9) Additional Security Mechanisms :
………………………………………
9.1) IDS/IPS,
9.2) Honeypots and evasion techniques,
9.3) Secure Code Reviews (Fortify tool, OWASP Secure
Coding Guidelines)
3) Phases
Understanding the Different Phases Involved in Ethical Hacking and
Listing the Five Stages of Ethical Hacking
An ethical hacker follows processes similar to those of a malicious hacker. The steps to
gain
and maintain entry into a computer system are similar no matter what the hacker’s
intentions
are. Figure 1.1 illustrates the five phases that hackers generally follow in hacking a
system. The
following sections cover these five phases.
Phase 1—Reconnaissance
Phase 2—Scanning
Phase 3—Gaining Access
Sniffing the network is another means of passive reconnaissance and can yield
useful infor-mation such as IP address ranges, naming conventions, hidden servers or
networks, and other available services on the system or network. Sniffing network
traffic is similar to building monitoring: A hacker watches the flow of data to see
what time certain transactions take place and where the traffic is going.
Both passive and active reconnaissance can lead to the discovery of useful information
to use in an attack. For example, it’s usually easy to find the type of web server and the
operating system (OS) version number that a company is using. This information may
enable a hacker to find a vulnerability in that OS version and exploit the vulnerability to
gain more access.
Phase 2: Scanning
Scanning involves taking the information discovered during reconnaissance and using
it to examine the network. Tools that a hacker may employ during the scanning
phase can include dialers, port scanners, network mappers, sweepers, and
vulnerability scanners. Hackers are seeking any information that can help them
perpetrate attack such as computer names, IP addresses, and user accounts .
5) Systems hacking
System hacking is defined as the compromise of computer systems and
software to gain access to the target computer and steal or misuse their
sensitive information. Here the malicious hacker exploits the weaknesses in
a computer system or network to gain unauthorized access of its data or
take illegal advantage of it.
5.2) KeyLogging
If all other attempts to gather passwords fail, then a keystroke logger is the tool of
choice for hackers. Keystroke loggers (keyloggers) can be implemented either using
hardware or soft-ware. Hardware keyloggers are small hardware devices that
connect the keyboard to the PC and save every keystroke into a file or in the
memory of the hardware device. In order to install a hardware keylogger, a hacker
must have physical access to the system.
Software keyloggers are pieces of stealth software that sit between the keyboard
hardware and the operating system, so that they can record every keystroke.
Software keyloggers can be deployed on a system by Trojans or viruses.
When you obtain a password and gain access to an account, there is still more
work to do:
privilege escalation. The reality is that the account you’re compromising may
end up being a lower-privileged and less-defended one. If this is the case, you
must perform privilege escalation prior to carrying out the next phase. The goal
should be to gain a level where fewer restrictions exist on the account and you
have greater access to the system.
Every operating system ships with a number of user accounts and groups
already present.
In Windows, preconfigured users include the administrator and guest accounts.
Because
it is easy for an attacker to find information about the accounts that are
included with an
operating system, you should take care to ensure that such accounts are secured
properly,
even if they will never be used. An attacker who knows that these accounts exist
on a
system is more than likely to try to obtain their passwords.
There are two defined types of privilege escalation; each approaches the
problem of
obtaining greater privileges from a different angle:
Horizontal Privilege Escalation An attacker attempts to take over the
rights and
privileges of another user who has the same privileges as the current account.
Vertical Privilege Escalation The attacker gains access to an account and
then tries to
elevate the privileges of the account. It is also possible to carry out a vertical
escalation by
compromising an account and then trying to gain access to a higher-privileged
account.
One way to escalate privileges is to identify an account that has the desired
access and
then change the password. Several tools that offer this ability including the
following: