Top Banner
Ethical Hacking
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ethical hacking

Ethical Hacking

Page 2: Ethical hacking
Page 3: Ethical hacking

Hacker Terms

•Hacking - showing computer expertise.•Cracking - breaking security on software or systems•Phreaking - cracking telecom networks•Spoofing - faking the originating IP address in a datagram•Denial of Service (DoS) - flooding a host with sufficient network traffic so that it can’t respond anymore•Port Scanning - searching for vulnerabilities

Page 4: Ethical hacking

Legal and ethical questions?

♦ What is Ethical Hacking?♦ Who are ethical hackers?♦ Attack exploit the vulnerabilities♦ Being prepared♦ Kinds of testing♦ Final Report♦ Ethical hacking-commandments♦ Suggestion

Page 5: Ethical hacking

Hacking through the ages♦ 1969 - Unix ‘hacked’ together♦ 1971 - Cap ‘n Crunch phone exploit discovered♦ 1988 - Morris Internet worm crashes 6,000 servers♦ 1994 - $10 million transferred from CitiBank accounts♦ 1995 - Kevin Mitnick sentenced to 5 years in jail♦ 2000 - Major websites succumb to DDoS♦ 2000 - 15,700 credit and debit card numbers stolen from Western Union

(hacked while web database was undergoing maintenance)♦ 2001 Code Red

– exploited bug in MS IIS to penetrate & spread– probes random IPs for systems running IIS– had trigger time for denial-of-service attack– 2nd wave infected 360000 servers in 14 hours

♦ Code Red 2 - had backdoor installed to allow remote control♦ Nimda -used multiple infection mechanisms email, shares, web client, IIS♦ 2002 – Slammer Worm brings web to its knees by attacking MS SQL Server

Page 6: Ethical hacking

Types of hacker♦ Professional hackers

– Black Hats – the Bad Guys– White Hats – Professional Security Experts

♦ Script kiddies– Mostly kids/students

• User tools created by black hats,– To get free stuff– Impress their peers– Not get caught

♦ Underemployed Adult Hackers – Former Script Kiddies

• Can’t get employment in the field• Want recognition in hacker community• Big in eastern European countries

♦ Ideological Hackers– hack as a mechanism to promote some political or ideological purpose– Usually coincide with political events

Page 7: Ethical hacking

Gaining access

♦ Front door– Password guessing

– Password/key stealing

♦ Back doors– Often left by original developers as debug and/or diagnostic tools

– Forgot to remove before release

♦ Trojan Horses– Usually hidden inside of software that we download and install

from the net (remember nothing is free)

– Many install backdoors

♦ Software vulnerability exploitation– Often advertised on the OEMs web site along with security

patches

– Fertile ground for script kiddies looking for something to do

Page 8: Ethical hacking

Back doors & Trojans

♦ e.g. Whack-a-mole / NetBus♦ Cable modems / DSL very vulnerable♦ Protect with Virus Scanners, Port Scanners,

Personal Firewalls

Page 9: Ethical hacking

Software vulnerability exploitation

♦ Buffer overruns♦ HTML / CGI scripts♦ Poor design of web applications

– Javascript hacks

– PHP/ASP/ColdFusion URL hacks

♦ Other holes / bugs in software and services♦ Tools and scripts used to scan ports for vulnerabilities

Page 10: Ethical hacking

Password guessing

♦ Default or null passwords♦ Password same as user name (use finger)♦ Password files, trusted servers♦ Brute force

– make sure login attempts audited!

Page 11: Ethical hacking

Ethical Hacking

♦ Independent computer security Professionals breaking into the computer systems.

♦ Neither damage the target systems nor steal information.

♦ Permission is obtain from target.♦ Part of an overall security

program.

Page 12: Ethical hacking

Ethical Hackers but not Criminal Hackers♦ Completely trustworthy.♦ Strong programming and computer

networking skills.♦ Learn about the system and trying to

find its weaknesses.♦ Techniques of Criminal hackers-

Detection-Prevention.♦ Published research papers or released

security software.♦ No Ex-hackers.

Page 13: Ethical hacking

Who are ethical hackers?♦ An ethical hacker is a computer and

networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.

♦ It posses same skills, mindset and tools of hacker but attack are done in non-destructive manner

Page 14: Ethical hacking

♦ Any organization that has a network connected to the Internet or provides an online service should consider subjecting it to a penetration test. Various standards such as the Payment Card Industry Data Security Standard require companies to conduct penetration testing from both an internal and external perspective on an annual basis and after any significant change in the infrastructure or applications. Many large companies, such as IBM, maintain employee teams of ethical hackers, while there are plenty of firms that offer ethical hacking as a service.

Page 15: Ethical hacking

Attack-exploit the vulnerabilities

♦ Exploiting implementation of HTTP, SMTP protocols.

♦ SQL injection.♦ Spamming.♦ Gaining access to application database.♦ Free exploits from hacker website.♦ Internally develpoed.

Page 16: Ethical hacking

Being Prepared♦ Identification of target-company websites, mail

servers, etc. ♦ Does anyone at the target What can an intruder do

with that information?♦ Notice the intruder's attempts or successes? ♦ Signing of contract

1. Time window for attacks.2. Total time for testing.3. Prior knowledge of the system.4. Key people who are made aware of the testing.

Page 17: Ethical hacking

Kinds of Testing ♦ Remote Network♦ Remote dial-up network♦ Local network♦ Stolen laptop computer♦ Social engineering♦ Physical entry

1.Total outsider2.Semi-outsider3.Valid user

Page 18: Ethical hacking

Final Report

♦ Collection of all discoveries made during evaluation.

♦ Specific advice on how to close the vulnerabilities.

♦ Testers techniques never revealed.♦ Delivered directly to an officer of the client

organization in hard-copy form.♦ Steps to be followed by clients in future.

Page 19: Ethical hacking

Ethical hacking-commandments

♦ Working ethically

1. Trustworthiness

2. Misuse for personal gain.♦ Respecting privacy♦ Not crashing the system.

Page 20: Ethical hacking

Suggestions?

Page 21: Ethical hacking