+ All Categories
Home > Documents > EthicalH

EthicalH

Date post: 06-Apr-2018
Category:
Upload: sahil-wadhwa
View: 215 times
Download: 0 times
Share this document with a friend

of 23

Transcript
  • 8/3/2019 EthicalH

    1/23

    #!@

    Ethical Hacking

    By:-Prant ChaudharyIT VIIth Semester

    11901

  • 8/3/2019 EthicalH

    2/23

    2

    #!@

    Ethical Hacking - ?

    Why Ethical Hacking ?

    Ethical Hacking - Process

    Ethical Hacking Commandments

    Reporting

  • 8/3/2019 EthicalH

    3/23

    3

    #!@

    Ethical

    Hacking

    Conforming to accepted professional standards of conduct

    What is Ethical Hacking

    Process of breaking into systems for:Personal or Commercial GainsMalicious Intent Causing sever damage to Information & Assets

    Also Called Attack & Penetration Testing,White-hat hacking, Red teaming

    White-hat - Good GuysBlack-hat Bad guys

  • 8/3/2019 EthicalH

    4/23

    4

    #!@

    What is Ethical Hacking

    It is Legal

    Permission is obtained from the target

    Part of an overall security program

    Identify vulnerabilities visible from Internet atparticular point of time

    Ethical hackers possesses same skills, mindsetand tools of a hacker but the attacks are done in

    a non-destructive manner

  • 8/3/2019 EthicalH

    5/23

    5

    #!@

    Why Ethical Hacking

    Source: CERT-India

    January - 2005June 01, 2004 to Dec.31, 2004

    Domains No of Defacements

    .com 922

    .gov.in 24

    .org 53

    .net 39

    .biz 12

    .co.in 48

    .ac.in 13

    .info 3

    .nic.in 2

    .edu 2

    other 13

    Total 1131

    Defacement Statistics for Indian Websites

  • 8/3/2019 EthicalH

    6/23

    6

    #!@

    Why Ethical Hacking

    Source: CERT/CCTotal Number of Incidents Incidents

  • 8/3/2019 EthicalH

    7/23

    7

    #!@

    Why Ethical Hacking

    Source: US - CERT

  • 8/3/2019 EthicalH

    8/23

    8

    #!@

    Why Ethical Hacking

    Viruses, TrojanHorses,

    and Worms

    SocialEngineering

    Automated

    Attacks

    AccidentalBreaches in

    Security Denial ofService (DoS)

    Organizational

    Attacks

    Restricted

    Data

    Protection from possible External Attacks

  • 8/3/2019 EthicalH

    9/23

    9

    #!@

    Ethical Hacking - Process

    1. Preparation

    2. Footprinting

    3. Enumeration & Fingerprinting

    4. Identification of Vulnerabilities

    5. Attack Exploit the Vulnerabilities

  • 8/3/2019 EthicalH

    10/23

    10

    #!@

    Preparation

    Identification of Targets company websites,mail servers, extranets, etc.

    Signing of Contract Agreement on protection against any legal issues

    Contracts to clearly specifies the limits and dangers ofthe test

    Specifics on Denial of Service Tests, Social Engineering,etc.

    Time window for Attacks

    Total time for the testing Prior Knowledge of the systems

    Key people who are made aware of the testing

  • 8/3/2019 EthicalH

    11/23

    11

    #!@

    Footprinting

    Collecting as much information about the target

    DNS Servers

    IP Ranges

    Administrative Contacts

    Problems revealed by administrators

    Information Sources

    Search engines

    Forums Databases whois, ripe, arin, apnic

    Tools PING, whois, Traceroute, DIG, nslookup, sam spade

  • 8/3/2019 EthicalH

    12/23

    12

    #!@

    Enumeration & Fingerprinting

    Specific targets determined

    Identification of Services / open ports

    Operating System Enumeration

    Methods Banner grabbing

    Responses to various protocol (ICMP &TCP) commands

    Port / Service Scans TCP Connect, TCP SYN, TCP FIN, etc.

    Tools Nmap, FScan, Hping, Firewalk, netcat, tcpdump, ssh,

    telnet, SNMP Scanner

  • 8/3/2019 EthicalH

    13/23

    13

    #!@

    Identification of Vulnerabilities

    Vulnerabilities

    Insecure Configuration

    Weak passwords Unpatched vulnerabilities in services, Operating

    systems, applications

    Possible Vulnerabilities in Services, Operating

    Systems Insecure programming

    Weak Access Control

  • 8/3/2019 EthicalH

    14/23

    14

    #!@

    Identification of Vulnerabilities

    Methods

    Unpatched / Possible Vulnerabilities Tools,Vulnerability information Websites

    Weak Passwords

    Default Passwords, Bruteforce, Social Engineering, Listening to Traffic

    Insecure Programming SQL Injection, Listeningto Traffic

    Weak Access Control

    Using the ApplicationLogic, SQL Injection

  • 8/3/2019 EthicalH

    15/23

    15

    #!@

    Identification of Vulnerabilities

    Tools

    Vulnerability Scanners - Nessus, ISS, SARA, SAINT

    Listening to Traffic Ethercap, tcpdump

    Password Crackers John the ripper, LC4, Pwdump

    Intercepting Web Traffic

    Achilles, Whisker, Legion

    Websites

    Common Vulnerabilities & Exposures http://cve.mitre.org

    Bugtraq www.securityfocus.com

    Other Vendor Websites

    http://cve.mitre.org/http://www.securityfocus.com/http://www.securityfocus.com/http://cve.mitre.org/
  • 8/3/2019 EthicalH

    16/23

    16

    #!@

    Attack Exploit the vulnerabilities

    Obtain as much information (trophies) from theTarget Asset

    Gaining Normal Access

    Escalation of privileges Obtaining access to other connected systems

    Last Ditch Effort Denial of Service

  • 8/3/2019 EthicalH

    17/23

    17

    #!@

    Attack Exploit the vulnerabilities

    Network Infrastructure Attacks

    Connecting to the network through modem

    Weaknesses in TCP / IP, NetBIOS

    Flooding the network to cause DOS

    Operating System Attacks

    Attacking Authentication Systems

    Exploiting Protocol Implementations

    Exploiting Insecure configuration Breaking File-System Security

  • 8/3/2019 EthicalH

    18/23

    18

    #!@

    Attack Exploit the vulnerabilities

    Application Specific Attacks

    Exploiting implementations of HTTP, SMTPprotocols

    Gaining access to application Databases

    SQL Injection

    Spamming

  • 8/3/2019 EthicalH

    19/23

    19

    #!@

    Attack Exploit the vulnerabilities

    Exploits

    Free exploits from Hacker Websites

    Customised free exploits

    Internally Developed

    Tools Nessus, Metasploit Framework,

  • 8/3/2019 EthicalH

    20/23

    20

    #!@

    Reporting

    Methodology

    Exploited Conditions & Vulnerabilities thatcould not be exploited

    Proof for Exploits - Trophies

    Practical Security solutions

  • 8/3/2019 EthicalH

    21/23

    21

    #!@

    Ethical Hacking - Commandments

    Working Ethically

    Trustworthiness

    Misuse for personal gain

    Respecting Privacy

    Not Crashing the Systems

  • 8/3/2019 EthicalH

    22/23

    22

    #!@

  • 8/3/2019 EthicalH

    23/23

    23

    #!@

    ANY QUERIES??