Information Security Chapter 2
Information Security Chapter 2
Information Security Chapter 2
and Audit
Chapter 2
Ethical Hacking
What is a Hacker?
Old School Hackers: 1960s style Stanford or MIT
hackers. Do not have malicious intent, but do have
lack of concern for privacy and proprietary
information. They believe the Internet was designed
to be an open system.
Script Kiddies or Cyber-Punks: Between 12-30;
predominantly white and male; bored in school; get
caught due to bragging online; intent is to vandalize
or disrupt systems.
Professional Criminals or Crackers: Make a living by
breaking into systems and selling the information.
Coders and Virus Writers: See themselves as an
elite; programming background and write code but
wont use it themselves; have their own networks
called zoos; leave it to others to release their code
into The Wild or Internet.
Anatomy of an attack:
Reconnaissance attacker gathers information;
can include social engineering.
Scanning searches for open ports (port scan)
probes target for vulnerabilities.
Gaining access attacker exploits vulnerabilities
to get inside your system; used for spoofing IP.
Maintaining access creates backdoor through
use of Trojans; once attacker gains access makes
sure he/she can get back in.
Covering tracks deletes files, hides files, and
erases log files. So that attacker cannot be
detected or penalized.
Classes/Types of Hackers
Black hats highly
skilled,
malicious, destructive
crackers
White hats skills used
for
defensive security
analysts
Gray hats offensively
and
defensively; will hack for
different
reasons, depends on
situation.
Hacker
Access computer system or network without
authorization
Breaks the law . So becomes a cracker
Ethical Hacker
Performs most of the same activities but with
owners permission
Employed by companies to perform Penetration Tests
Hactivism hacking for social and political cause.
Penetration Test
Protecting an organisations asset is a continual process.
The process involves an active analysis of the system for
any
weaknesses, technical flaws or vulnerabilities.
This analysis is carried out from a position of a potential
attacker, and can involve active exploitation of security
vulnerabilities.
Can be automated
Penetration testing:
IT security auditing:
Human awareness
Policy factors
Hardware or software misconfigurations
Poor assumptions
Ignorance
Failure to stay up-to-date
to
demonstrate
that
the
security
The good guys usually get some small piece of proof and exit
as quietly as they came
There are a number of ways that this can be undertaken, but the most common procedure is
that the security measures are actively analyzed for design weaknesses, technical flaws and
vulnerabilities; the results are then delivered comprehensively in a report, to Executive,
Management and Technical audiences.
security updates
f) Social Engineering
- Is a non-technical test to trick people into braking normal security
procedures.