Ethical Hacking Final
Ethical Hacking Final
Ethical Hacking Final
to
Ethical Hacking
Restricted
Data
Accidental
Breaches in
Viruses, Denial of
Security
Trojan Service
Horses, (DoS)
and Worms
What do Ethical Hackers do?
An ethical hacker’s evaluation of a system’s security seeks
answers to these basic questions:
What can an intruder see on the target systems?
What can an intruder do with that information?
Does anyone at the target notice the intruder’s attempts or
successes?
– What are you trying to protect?
– What are you trying to protect against?
– How much time, effort, and money are you
willing to expend to obtain adequate protection?
Modes of Ethical Hacking
Insider attack
Outsider attack
Stolen equipment attack
Physical entry
Bypassed authentication attack (wireless
access points)
Social engineering attack
Hacker classes
White Hat Hackers: - specializes in penetration testing and in other
testing methodologies to ensure the security of an organization's
information systems.
Black Hat Hackers: - The villain or bad guy, especially in a western
movie in which such a character would stereotypically wear a black hat
in contrast to the hero's white hat.
Gray Hat Hackers: - A skilled hacker whose activities fall
somewhere between white and black hat hackers on a variety of spectra
Hactivism – hacking for social and political cause.
Ethical hackers – determine what attackers can gain
access to, what they will do with the information, and
can they be detected.
Why do people hack??
To make security stronger ( Ethical Hacking )
Just for fun, Show off
Hack other systems secretly & Steal important
information, Financial Gain
A large fraction of hacker attacks have been pranks
Venting anger at a company or organization
Terrorism
Modes of Hacker Attack
Over the Internet
Over LAN
Locally
Offline
Theft
Deception
Ethical Hacking - Process
1) Preparation
2) Foot Printing
3) Enumeration & Fingerprinting
4) Identification of Vulnerabilities
5) Attack – Exploit the Vulnerabilities
6) Gaining Access
7) Escalating Privilege
8) Covering Tracks
9) Creating Back Doors
1.Preparation
Identification of Targets – company websites, mail
servers, extranets, etc.
Signing of Contract
Agreement on protection against any legal issues
Contracts to clearly specifies the limits and dangers of
the test
Specifics on Denial of Service Tests, Social Engineering, etc.
Time window for Attacks
Total time for the testing
Prior Knowledge of the systems
Key people who are made aware of the testing
2.Footprinting
Collecting as much information about the target
DNS Servers
IP Ranges
Administrative Contacts
Problems revealed by administrators
Information Sources
Search engines
Forums
Databases – whois, ripe, arin, apnic
Tools – PING, whois, Traceroute, DIG, nslookup, sam
spade
Finding remote computer
Lets say a Hacker decides to break
into the computer of one of his
facebook friends.
Then his first step will be to find the
IP address of his friend computer.
So lets discuss what are the possible
ways of finding the IP address of any
remote computer.
Finding Remote Computer’s
IP Address
Through Instant messaging software
Through IRC Chat
MSN , Yahoo , g-talk
If you are chatting on other messengers like MSN, YAHOO etc. then the
following indirect connection exists between your system and your friend’s
system:
Thus in this case, you first have to establish a direct connection with your
friend’s computer by either sending him a file or by using the call feature.
Then, goto MSDOS or the command line and type:
netstat -n
This command will give you the IP Address of your friend’s computer.
Instant Messenger
Ask your friend to come online and chat with you.
Case I: If you are chatting on ICQ, then the following connection exists
between your system and your friend’s system:
netstat -n