- Back to Home »
- Ethical hacking
Posted by : Unknown
Tuesday, May 7, 2013
ABSTRACT:-
Ethical Hacking is legal. Ethical hacker is a computer and
network expert who attacks a security system on behalf of its owners. Black
hat-bad guy, white hat-good guy. It occurs due to Trojans and viruses. Foot
printing, enumeration and fingerprinting are the some of the processes of
ethical hacking. In this paper we are going to deal the topics
1. What is Ethical Hacking?
2. What do Ethical Hackers do?
3. Why Ethical Hacking?
4. What is Ethical Hacking process?
5. Case Studies
6. Ethical Hacking – Commandments
7. Reporting
INTRODUCTION
·
What is Ethical Hacking
Process of breaking into systems for:
- Personal
or Commercial Gains
- Malicious
Intent – Causing sever damage to Information & Assets
also Called –
Attack & Penetration Testing, White-hat hacking, Red teaming
Black-hat – Bad guy
White
Hat Hackers, also
known as Ethical Hackers, are Computer Security ... Such a cert covers
orderly ethical hacking approaches and team
Red
teaming and
alternative analysis help analysts and decision makers avoid surprise and
overcome cognitive biases by considering problems from alternative.
I.What is Ethical Hacking
·
It
is Legal
·
Permission
is obtained from the target
·
Part
of an overall security program
·
Identify
vulnerabilities visible from Internet at particular point of time
·
Ethical
hackers possesses same skills, mindset and tools of a hacker but the attacks
are done in a non-destructive manner
An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing, and red teaming. An ethical hacker is sometimes called a white hat , a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat
The term "cracker" is not to be confused with "hacker".
Hacker is a term used by some to mean "a clever
programmer" and by others, especially those in popular media, to mean
"someone who tries to break into computer systems."
A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
II.WHAT
DO ETHICAL HACKERS DO?
An ethical hacker's evaluation of a
system's security seeks answers to three basic questions:
- What
can an intruder see on the target systems?
- What
can an intruder do with that information?
- Does
anyone at the target notice the intruder's attempts or successes?
While the first and second of these are
clearly important, the third is even more important: If the owners or operators
of the target systems do not notice when someone is trying to break in, the
intruders can, and will, pend weeks or months trying and will usually
eventually succeed.
When the client requests an evaluation,
there is quite a bit of discussion and paperwork that must be done up front.
The discussion begins with the client's answers to questions similar to those
posed by Garfinkel and Spafford:
Ethical hackers come from three sources: malicious
hackers, bright
computer science graduates, and individuals from a systems or
administration background.
computer science graduates, and individuals from a systems or
administration background.
III.WHY
ETHICAL HACKING
1.
Viruses, Trojan Horses, and Worms
2.
Social Engineering
3.
Automated Attacks
4.
Accidental Breaches in Security
5.
Denial of Service (DoS)
6.
Organizational Attacks
7.
Restricted Data
8.
Protection from possible External Attacks
IV. Ethical Hacking - Process
·
Preparation
·
Foot printing
·
Enumeration & Fingerprinting
·
Identification of Vulnerabilities
·
Attack – Exploit the Vulnerabilities
1. Preparation:
v Identification of Targets – company
websites, mail servers, extranets, etc.
v Signing of Contract
o
Agreement
on protection against any legal issues
o
Contracts
to clearly specifies the limits and dangers of the test
o
Specifics
on Denial of Service Tests, Social Engineering, etc.
o Time window for Attacks
o Total time for the testing
o Prior Knowledge of the systems
o Key people who are made aware of the
testing
2. Foot printing:
ü
Collecting as much information about
the target
·
DNS
Servers
·
IP
Ranges
·
Administrative
Contacts
·
Problems
revealed by administrators
ü Information Sources
·
Search
engines
·
Forums
·
Databases
– whois, ripe, arin, apnic
·
Tools
– PING, whois, Traceroute, DIG, nslookup, sam spade
3. Enumeration & Fingerprinting :
·
Specific
targets determined
·
Identification
of Services / open ports
·
Operating
System Enumeration
Methods
·
Banner
grabbing
·
Responses
to various protocol (ICMP &TCP) commands
·
Port
/ Service Scans – TCP Connect, TCP SYN, TCP FIN, etc.
Tools
·
Nmap,
FScan, Hping, Firewalk, netcat, tcpdump, ssh, telnet, SNMP Scanner
Identification of Vulnerabilities:
Vulnerabilities
·
Insecure
Configuration
·
Weak
passwords
·
Unpatched
vulnerabilities in services, Operating systems, applications
·
Possible
Vulnerabilities in Services, Operating Systems
·
Insecure
programming
·
Weak
Access Control
Tools
1. Vulnerability Scanners - Nessus, ISS,
SARA, SAINT
2. Listening to Traffic – Ethercap,
tcpdump
3. Password Crackers – John the ripper,
LC4, Pwdump
4. Intercepting Web Traffic – Achilles,
Whisker, Legion
Methods
·
Unpatched
/ Possible Vulnerabilities – Tools, Vulnerability information Websites
·
Weak
Passwords – Default Passwords, Brute force, Social Engineering, Listening to
Traffic
·
Insecure
Programming – SQL Injection, Listening to Traffic
·
Weak
Access Control – Using the Application Logic, SQL Injection
5. Attack – Exploit the vulnerabilities:
·
Obtain
as much information (trophies) from the Target Asset
·
Gaining
Normal Access
·
Escalation
of privileges
·
Obtaining
access to other connected systems
Network
Infrastructure Attacks
·
Connecting
to the network through modem
·
Weaknesses
in TCP / IP, NetBIOS
·
Flooding
the network to cause DOS
Operating System
Attacks
·
Attacking
Authentication Systems
·
Exploiting
Protocol Implementations
·
Exploiting
Insecure configuration
·
Breaking
File-System Security
Application Specific Attacks
·
Exploiting
implementations of HTTP, SMTP protocols
·
Gaining
access to application Databases
·
SQL
Injection
·
Spamming
Exploits
·
Free
exploits from Hacker Websites
·
Customized
free exploits
·
Internally
Developed
Tools
–
Nessus,
Metasploit Framework
V.CASE STUDIES:
On February
18 this year, MasterCard and Visa announced that an unknown hacker had breached
their security system to gain access to 5.6
million credit card and debit card accounts, which amounted to 1 percent
of 574 million cards in the US .
Immediately after being notified of the incident, banks such as Citizens Bank
shut down all transactions on the affected accounts. The same week, Omaha-based
Data Processors International (DPI), one of the leading credit card processors
in the world, reported that eight million credit card numbers were stolen from
its system.
These
incidents highlight the challenges being faced by governments and corporate in
protecting privacy, confidentiality and security of information assets
accessible over the Internet. Getting ethical hacking conducted against one's
own network is one of the prime proactive defence mechanisms against such
threats. The term 'ethical hacking' is closely related to 'information ethics.'
VI.Ethical Hacking -
Commandments
·
Working
Ethically
o Trustworthiness
o Misuse for personal gain
·
Respecting
Privacy
·
Not
Crashing the Systems
VII.Reporting
·
Methodology
·
Exploited
Conditions & Vulnerabilities that could not be exploited
·
Proof
for Exploits - Trophies
Practical Security solutions
CONCLUSION:
Ethical hackers come
from three sources: malicious hackers, bright
computer science graduates, and individuals from a systems or
administration background
computer science graduates, and individuals from a systems or
administration background
All three types have
their advantages and disadvantages .A
reformed
hacker is best for simulating a very malicious attack. The ex-Unix or
NT guys do not always have the mindset of an ex-hacker. They tend to
use less devious methods
hacker is best for simulating a very malicious attack. The ex-Unix or
NT guys do not always have the mindset of an ex-hacker. They tend to
use less devious methods