+ All Categories
Home > Technology > ETHICAL HACKING

ETHICAL HACKING

Date post: 07-Apr-2017
Category:
Upload: rakhav-krishna-g
View: 140 times
Download: 0 times
Share this document with a friend
37
ETHICAL hacking By G. RAKHAV KRISHNA II I M. GANDHI RAJAN II IT
Transcript
Page 1: ETHICAL HACKING

ETHICAL hacking

By G. RAKHAV KRISHNA II It M. GANDHI RAJAN II IT

Page 2: ETHICAL HACKING

WHAT IS HACKING ?

Act of Illegally entering a Computer System and making unauthorized changes to the files and data contained within. That causes se-vere damage to the files which are very sensitive.

Page 3: ETHICAL HACKING

Events that gave meaning to hacking

The first hacker appeared in 1960’s at the Massachusetts Institute of Technology (MIT).

During the 1970’s a different kind of hacker ap-peared: Phone Phreaker or Phone Hacker.

In the 1980’s, phreaks started to migrate to com-puters and the first Bulletin Board System (BBS) appeared.

During the 1990’s, when the use of Internet widespread around the world, hackers multi-plied!!

Page 4: ETHICAL HACKING

Why do people hack?

Just for fun. To Show off To Steal other information secretly To Notify many people their thoughts To Destroy enemy’s computer network

during the war To get others attention

Page 5: ETHICAL HACKING

Types of hackers White Hat Hackers: A White Hat who specializes in penetration testing and in other testing methodologies to ensure the security of an organization’s information systems. Black Hat Hackers: A Black Hat is the villain or bad guy, especially in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero’s white hat. Gray Hat Hackers: A Grey Hat in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra.

Page 6: ETHICAL HACKING

Types of hackersScript Kiddies: Use Scripts or programs developed by others to attack computer

Systems and Networks Objective – To impress their friends or gain credit in computer –

enthusiast communitiesHacktivism: Hacktivism is the act of hacking or breaking into a computer sys-

tem, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a

hacktivist. Ex: ANONYMOUS

Page 7: ETHICAL HACKING

Classes of Attack

1.Authentication2.Client – Side Attacks3.Command Execution4.Information Disclosure

Page 8: ETHICAL HACKING

What do hackers do after hacking!!!

Patch security hole hence the other hackers can’t intrude Clear logs and hide themselves Install rootkit(backdoor) * The hacker who hacked the System can use the system later. * It contains Trojan virus, and so on Install irc related program * identd, irc, eggdrop, bnc Install scanner program * mscan, sscan, nmap Install exploit program Install denial of service program Use all of installed programs silently

Page 9: ETHICAL HACKING

Hacking - Methodology

1. Preparation2. Foot Printing3. Enumeration & Fingerprinting4. Identification of Vulnerabilities5. Attack – Exploit the Vulnerabilities6. Gaining Access7. Escalating Privilege8. Covering Tracks9. Creating Back Doors

Page 10: ETHICAL HACKING

Why can’t We Defend Against Hackers?There are many unknown security holeHackers need to know only one security

hole to hack the systemAdmin need to know all security holes to

defend the systemSomehow it should defended by some-

thing that gave this Concept of Ethical Hacking ….

Page 11: ETHICAL HACKING

Definition on ETHICAL HACKINGEthical Hacking suits this quotes “If you know the enemy and know yourself, you need not fearthe result of a hundred battles.” 

An Ethical Hacker is a computer and network ex-pert who attacks a security system on behalf of its owners, seeking vulnerabilities that a mali-cious hacker could exploit. Ethical Hacking is also known as penetration testing.

 

Page 12: ETHICAL HACKING

Definition on ETHICAL HACKING -Cont

It is legal Permission is obtained from the targetPart of an overall security programIdentify vulnerabilities visible from the Internet Ethical hackers possesses same skills, mindset

and tools of a hacker but the attacks are done in a non-destructive manner.

Page 13: ETHICAL HACKING

Ethical Hackers but not Criminal Hackers

Completely trustworthyStrong programming and computer networking

skillsLearn about the system and trying to find its

weaknesses.Techniques of Criminal hackers – Detection –

PreventionPublished research papers or released security

softwareNo Ex-hackers

Page 14: ETHICAL HACKING

Its takes time to become an Ethical hacker!

The basic knowledge that an Ethical Hacker should have knowledge about different fields, is as follows:Microsoft: Skills in operation, configuration and

management.Should know about hacking wireless networksRouters: knowledge of routers, routing protocols and

access control lists.Should know how to handle virus and wormsFirewalls: configurations and operation of intrusion

detection systems.

Page 15: ETHICAL HACKING

Its takes time to become an Ethical hacker!

Should have the basic knowledge of web based password breaking procedure

Should have the basic knowledge of SQL injection Should have the knowledge of IP hacking Should have the knowledge of application hacking. Project Management: leading, planning, organization and control-

ling a penetration testing team.Ethical Hacking Commandments: Working Ethically Respecting privacy Not crashing your Systems.

Page 16: ETHICAL HACKING

Ethical Hacking - Methodology

Reconnaissance Probe and Attack Listening First Access Advancement Stealth Takeover Cleanup Ethical Hacking Process

Page 17: ETHICAL HACKING

1. Reconnaissance To be able to attack a system systematically, a hacker has to know

as much as possible about the target. It is important to get an overview of the network and the used sys-

tems. Information as DNS servers, administrator contacts and IP ranges

can be collected. Different kind of tools used are network mapping, network and

vulnerability scanning tools . Cheops for example is a very good network mapping tool which is

able to generate networking graphs. A network mapping tool is very helpful when doing an internal

ethical hack. At the end of the reconnaissance phase, an at-tacker should have a bunch of information about the target.

Page 18: ETHICAL HACKING

2. Probe and Attack

The probe and attack phase is about digging in, going closer and getting a feeling for the target.

It’s time to try the collected, possible vulnerabilities from the reconnaissance phase.

Tools used are many-sided as web exploits, buffer overflows as well as brute-force can be required.

Even Trojans like NetBus can be deployed to capture keystrokes , get screenshots or start applications and a host.

The probe and attack phase can be very time consuming, espe-cially if brute force attack techniques

Page 19: ETHICAL HACKING

3. Listening

This is again a phase 2 process i.e. scanning which is a combina-tion of Probe and attack and listening.

Listening to network traffic or to application data can sometimes help to attack a system or to advance deeper into a network.

Listening is especially powerful as soon as one has control of an important communication bottleneck.

Sniffers are heavily used during the listening phase. Multiple snif -fers, from very simple to more complexes, from console based to GUI driven exist for all operating systems.

Some sniffers, like ettercap can even poison ARP tables to enable sniffing in switched environments and open totally new opportuni-ties for listening to network traffic.

Page 20: ETHICAL HACKING

4. First Access

This is a phase 3 process. It is not about getting root access, it’s about getting any access to

a system be it a user or root account. Once this option is available it’s time to go for higher access levels

or new systems which are now reachable through the acquired system.

Page 21: ETHICAL HACKING

5. Advancement

Maintaining access is a combination of Advancement and Stealth process.

The advancement phase is probably the most creative demanding stage, as unlimited possibilities are open.

Sniffing network traffic may unveil certain passwords, needed usernames or e-mail traffic with usable information.

Sending mails to administrators faking some known users may help in getting desired information or even access to a new system.

Probably one also has to alter configuration files to enable or dis-able services or features.

Last but not least, installing new tools and helpful scripts may help to dig in deeper or to scan log files for more details.

Page 22: ETHICAL HACKING

6. Stealth

Some systems may be of high value – systems which act as routers or firewalls, systems where a root ac-count could be acquired.

To have access to such systems at a later time it is important clean relevant log files.

Page 23: ETHICAL HACKING

7. Takeover

Takeover is a phase 5 process. Once root access could be attained, the system can be considered

won. From there on it’s possible to install any tools, do every action and

start every services on that particular machine. Depending on the machine it can now be possible to misuse trust

relationships, create new relationships or disable certain secu-rity checks.

Page 24: ETHICAL HACKING

8. Cleanup

This could be instructions in the final report on how to remove cer-

tain trojans but most of the time this will be done by the hacker itself.

Removing all traces as far as possible is kind of a duty for the hacking craft.

An ethical hack always poses a certain risks if not properly done. A hacker could use the deployed tools or hide his attacks in all the

attacks from the ethical hack. He could also try to attack the attackers system, therefore gain entry to the ethical hackers system and collect all information free of charge and already sorted and prepared.

Preparing an ethical hack and hold a high level of security is a challenging task which should only be done by professionals.

Page 25: ETHICAL HACKING

Tools that could be used !!!

Page 26: ETHICAL HACKING

How can we Protect the System

Patch Security hole often Encrypt important data * pgp, ssh Do not run unused daemon Remove unused setuid/setgid program Setup loghost Backup the system often Setup firewall Setup IDS(Intrusion Detection Systems) * snort

Page 27: ETHICAL HACKING

What should do after hacked?

Shutdown the SystemSeparate the system from networkRestore the system with backupReinstall all programsConnect the system to the network

Page 28: ETHICAL HACKING

Certification program to be an Ethical Hacker

• This is a necessary certification course to be an Ethical Hacker• Only those who are clearing this course are taken as a member

of Ethical hacking team in a specific company

Page 29: ETHICAL HACKING

Things an Ethical Hacker should come to know!!!

Laws involving technology change as rapidly as tech-

nology itself Find what is legal for you locally Laws change from place to place Be aware of what is allowed and what is not allowed

Page 30: ETHICAL HACKING

What you cannot do legally as an Ethical hacker

Accessing a computer without permission is illegal Other illegal actions Installing worms or viruses Denial of Service attacks Denying users access to network resources Be careful your actions do not prevent customer from

doing their jobs

Page 31: ETHICAL HACKING

Ethical hacking Team

IBM started to hire and to maintain an Ethical Hacking Team due to some hacking incidents that really made them to stuck.

Now every company is having an Ethical Hacking Team. These Ethical Hackers will be asked to maintain fake identification

in their own organization. Some company’s are using these hackers to find the vulnerabili-

ties in their architecture in adding to that they use these hack-ers to hack the other company to access their information. Greedy!!!!!

Ethical hackers are paid a high salary. Normally their salary scale will be more than ₹50,00,000 per annum.

Page 32: ETHICAL HACKING

Advantage and Disadvantage

Ethical hacking nowadays is the backbone of network security. Each day its relevance is increasing, the major pros & cons of ethical hacking are given below:Advantages:• “To catch a thief you have to think like a thief”• Helps in closing the open holes in the system network.• Provides security to banking and financial establishments• Prevents website defacements.• An evolving technique.Disadvantages:• All depends upon the trust worthiness of the ethical hacker• Hiring professionals is expensive.

Page 33: ETHICAL HACKING

Future Enhancements: As it an evolving branch the scope of enhancement in technology

is immense. No ethical hacker can ensure the system security by using the same technique repeatedly. He would have to im-prove, develop and explore new avenues repeatedly.

More enhanced software’s should be used for optimum protection. Tools used, need to be updated regularly and more efficient once need to be developed.

Page 34: ETHICAL HACKING

Conclusion:

Student:A student should understand that no software is made with zero Vulnerability. So while they are studying they should study the various possibilities and should study how to prevent that be-cause they are the professionals of tomorrow.

Professionals:Professionals should understand that business is directly related to security. So they should make new software with vulnerabilities as less as possible. If they are aware of these then they won’t be cau-tious enough in security matters.

Page 35: ETHICAL HACKING

Conclusion: -cont The Security is a kind of trade off which has to be taken care off. Hacking has entered the age of mass production. People strongly disagree the concept of Ethical hacking and they

consider the Ethical hacking be like “Giving the keys to the thief”.

However it may be.. Ethical Hacking may be defined as legal or il-legal, ethical or unethical. With the present poor security on the internet, ethical hacking may be the most effective way to plug security holes and prevent intrusions.

Page 36: ETHICAL HACKING

Thank You!!!

Page 37: ETHICAL HACKING

ANY QUERIES???


Recommended