Top Banner
INTRODUCTION TO ETHICAL HACKING By Neel kamal www.thehackbook.com
90

Introduction To Ethical Hacking

May 13, 2015

Download

Education

Neel Kamal

This PPT will give you a brief idea of Ethical Hacking
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Introduction To Ethical Hacking

INTRODUCTION TO

ETHICAL HACKING

By Neel kamal www.thehackbook.com

Page 2: Introduction To Ethical Hacking

Hackers

Page 3: Introduction To Ethical Hacking

What is Hacking ?

Hacking is the art of finding solutions to real life problems.

The word “ Hack “ is not directly related to computers.

Page 4: Introduction To Ethical Hacking

Hacking and Computers

The concept of hacking entered the computer culture at the MIT University in the 1960s.

There are two kinds of students 1. Tools 2. Hackers

Page 5: Introduction To Ethical Hacking

1. Tools

A ``tool'' is someone who attends class in the college regularly

is always to be found in the library when no class is meeting,

Always Try to get Excellent grades in the examination.

Sole Aim: get placed in high paying Company

Page 6: Introduction To Ethical Hacking

2. Hacker

 A ``hacker'' is the opposite: someone who never goes to class,

who in fact sleeps all day, and who spends the night pursuing recreational activities rather than

studying text books.What does this have to do with

computers? Originally, nothing.

Page 7: Introduction To Ethical Hacking

Hackers vs Tools

There are standards for success as a hacker, just as grades form a standard for success as a tool.

Overall Hackers are more successful in life and they emerge as a leader in their field.

Page 8: Introduction To Ethical Hacking

Computer Hackers

Hackers are developers. Hackers are those geeks and

scientists who provide IT solutions to real life problems.

Hackers think beyond the boundaries

Page 9: Introduction To Ethical Hacking

Traits of any Hack

It must be clever. It must produce more good than bad,

and it must not be malicious. It should be unexpected, or out of

the ordinary. It need not pertain to computers.

Page 10: Introduction To Ethical Hacking

Hack Ideas

Social Networking site for plants. Sending sms to smart phone

whenever a post man delivers the letter in the letter box.

Sending sms to near & dear ones whenever you reach the destination.

Page 11: Introduction To Ethical Hacking

Hackers

Development of Science <><> Hackers

Page 12: Introduction To Ethical Hacking

Misconception

What about those who break into systems?

Are they hacker? The answer is no.

Page 13: Introduction To Ethical Hacking

Who is Responsible for misconception

Media is the root cause of all this misconception.

Lack of Awareness among common students and people.

Page 14: Introduction To Ethical Hacking

Crackers

One who breaks into systems illegally are crackers.

They are bad guys or gals

Page 15: Introduction To Ethical Hacking

Hacker vs Cracker

o Qualities of hacker: Lots of knowledge Good Guy Strong Ethics Helps in catching cyber criminals

Page 16: Introduction To Ethical Hacking

Hacker vs Cracker

Qualities of cracker Lots of knowledge Bad ethics Cyber criminals

Page 17: Introduction To Ethical Hacking

Skills of Hacker

Learn Programming languages ( C, C++) Learn scripting languages ( JSP, Python,

PHP, perl ) Good knowledge of database and query

languages (SQL, YQL, FQL, etc) Learn Networking (TCP/IP) Learn to work in Unix Start playing with web api’s Learn Assembly Programming

Page 18: Introduction To Ethical Hacking

Important Subjects

C and M - I Data Structures and M-II DLD , JAVA & web Technology and M-III

(Probability) CSA, OS, DBMS Microprocessors, Data Communications Computer Networking Cryptography & Network Security Wireless Communication

Page 19: Introduction To Ethical Hacking

Getting started to learn Hacking

TCP/IP IP Address MAC Address Ports Web Architecture LAN Architecture DOS Commands

Page 20: Introduction To Ethical Hacking

Web Architecture

The Internet is a worldwide, publicly accessible network of interconnected computer networks that transmit data using the standard Internet Protocol (IP).

The terms World Wide Web (WWW) and Internet are not the same

Page 21: Introduction To Ethical Hacking

Internet, web, www

The Internet is a collection of interconnected computer networks, linked by copper wires, fiber-optic cables, wireless connections, etc.

Web is a collection of interconnected documents and other resources, linked by hyperlinks and URLs.

 The World Wide Web is one of the services accessible via the Internet, along with various others including e-mail, file sharing, online gaming etc

Page 22: Introduction To Ethical Hacking

TCP/IP

TCP/IP is the protocol for communication between computers on the Internet.

TCP stands for Transmission Control Protocol

IP stands for Internet Protocol TCP/IP defines how electronic devices

(like computers) should be connected to the Internet, and how data should be transmitted between them.

Page 23: Introduction To Ethical Hacking

TCP/IP

Inside the TCP/IP standard there are several protocols for handling data communication:

1. TCP 2. IP 3. ICMP 4. DHCP (Dynamic Host Configuration Protocol) for Dynamic Addressing

Page 24: Introduction To Ethical Hacking

TCP/IP

TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.

IP is responsible for sending the packets to the correct destination.

IP Routers:- The IP router is responsible for "routing" the packet to the correct destination, directly or via another router.

Page 25: Introduction To Ethical Hacking

IP Address

Every system connected to a network has a unique Internet Protocol (IP) Address which acts as its identity on that network.

An IP Address is a 32-bit address which is divided into four fields of 8-bits each. For Example, 203.94.35.12

TCP/IP uses four numbers to address a computer. The numbers are always between 0 and 255.

Page 26: Introduction To Ethical Hacking

DNS Servers

Names used for TCP/IP addresses are called domain names.

When you address a website e.g. www.thehackbook.com

the name is translated to its corresponding IP Address by DNS Servers. DNS servers contains the list of all

registered domain names and their corresponding IP addresses.

Page 27: Introduction To Ethical Hacking

MAC Address

Media Access Control (MAC) is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. They uniquely identify an adapter on a LAN

MAC addresses are 12-digit hexadecimal numbers (48 bits in length).

MM:MM:MM:SS:SS:SSMM-MM-MM-SS-SS-SS

The first half of a MAC address contains the ID number of the adapter manufacturer. The second half of a MAC address represents the serial number assigned to the adapter by the manufacturer.

Page 28: Introduction To Ethical Hacking

Commands

To find IP Address ipconfig

To find MAC Address: ipconfig /all

Page 29: Introduction To Ethical Hacking

Ports

1. Hardware Ports 2 Software Ports There are 65536 software ports in

an operating system.

Page 30: Introduction To Ethical Hacking

Sockets

The pair of IP address and port numbers separated by a colon is called the socket.e.g- 202.112.67.21:8080 is a socket.

Page 31: Introduction To Ethical Hacking

Classification of IP Address

1. Public IP Address 2. Private IP Address finding public and private IP Address 1. Static IP Address 2. Dynamic IP Address

Page 32: Introduction To Ethical Hacking

Network Address Translation (NAT)

The current implementation of IP addressing provides users with a very limited number of IP address .

To solve this shortage problem , a number of organizations have started implementing NAT addressing, which allows them to use a single public IP address for a large number of internal systems having unique private IP addresses.

If any external systems communicates with two different internal systems in NAT network, then it will be impossible to differentiate between two systems.

Page 33: Introduction To Ethical Hacking

Working of NAT

Typically a NAT network consists of a large number of the internal systems that are connected to the internet through a routing device known as NAT box.

This NAT box acts as the core & controls all routing , addressing , and interfacing requirements of the network.

Page 34: Introduction To Ethical Hacking

NAT

When an internal computer connects to external computer

Internal computer(192.168.153.67 :1024) NAT box ( Internal IP Address gets converted to external i.e. public IP address)==== External System (www.thehackbook.com)

Page 35: Introduction To Ethical Hacking

NAT

Reply from External SystemExternal system(www.facebook.com) NAT box ( NAT box identifies the internal system for which IP packets meant) Internal System(192.168.153.67)

Page 36: Introduction To Ethical Hacking

Lets start Hacking Now

Three stages of Hacking any Remote Computer

1. Planning and preparing the attack 2. Gathering information for the attack 3. Executing the attack

Page 37: Introduction To Ethical Hacking

Preparing the attack

Steps performed by a good hacker in this stage:

1. Decide which computer they want to hack2. Then they will find the IP address of the

remote computer.3. Find the exact geographical Location of

the computer.4. Hide their own IP address and identity

on internet

Page 38: Introduction To Ethical Hacking

Finding remote computer

Lets say a Hacker decides to break into the computer of one of his facebook friends.

Then his first step will be to find the IP address of his friend computer.

So lets discuss what are the possible ways of finding the IP address of any remote computer.

Page 39: Introduction To Ethical Hacking

Finding Remote Computer’s IP Address

1. Sending the link of www.whatstheirip.com

2. Through Instant messaging software

3. Through IRC Chat

4. Through your website

Page 40: Introduction To Ethical Hacking

MSN , Yahoo , g-talk

3. If you are chatting on other messengers like MSN, YAHOO etc. then the following indirect connection exists between your system and your friend’s system:

Your System------Chat Server---- Friend’s System

Friend’s System---------Chat Server------- Your System

Thus in this case, you first have to establish a direct connection with your friend’s computer by either sending him a file or by using the call feature.

Then, goto MSDOS or the command line and type:

C:\>netstat -n

This command will give you the IP Address of your friend’s computer.

Page 41: Introduction To Ethical Hacking

Instant Messanger

1. Ask your friend to come online and chat with you.

2. Case I: If you are chatting on ICQ, then the following connection exists between your system and your friend’s system:

Your System------DIRECT CONNECTION---- Friend’s System

Friend’s System---------DIRECT CONNECTION------- Your System

Now, goto MSDOS or the command line and type:

C:\>netstat -n

This command will give you the IP Address of your friend’s computer.

Page 42: Introduction To Ethical Hacking

Getting IP from Website

One can easily log the IP Addresses of all visitors to their website by using simply JAVA applets or JavaScript code.

By using PHP scripts it is possible to determine user’s O.S and Browser’s.

Same can be used to determine the exact geographical location of the visitors.

Page 43: Introduction To Ethical Hacking

Counter Measures

Do not accept File transfers or calls from unknown people.

Chat online ONLY after logging on through a Proxy Server.

Don’t click on any suspicious link.

Page 44: Introduction To Ethical Hacking

Finding Exact Location

Once you get the IP address of Remote computer try to perform IP lookup

Popular sites for IP Look Up 1. www.ipmango.com 2. www.whois.com

Page 45: Introduction To Ethical Hacking

Hiding your IP Address

Proxy Servers: Definition:A Proxy Server acts as a buffer between you and the Internet, hence it

protects your identity.

Working:

Case 1: Your System------Proxy Server---- Friend’s System

Case 2: Your System-----Proxy------Chat Server----Friend’s System

Good Proxy Servers:

Wingate & WinProxy (For Windows Platform) Squid (For Unix Platforms)

Page 46: Introduction To Ethical Hacking

Proxy Bouncing

PROXY BOUNCING

Definition:

Proxy Bouncing is the phenomenon wherein you connect to several proxy servers and then connect to the actual destination.

Working:

YOUR SYSTEM--------PROXY 1--------- PROXY 2---------- PROXY 3----------------PROXY 4----------PROXY 5----------Destination

Tools:

MultiProxy

Page 47: Introduction To Ethical Hacking

Onion Routing: Using Tor Network

download it from http://torproject.org

Page 48: Introduction To Ethical Hacking

DOS Commands

1. nslookup2. net view3. net use4. net user5. ping6. tracert7. arp8. route9. nbtstat10. netstat11. ipconfig

Page 49: Introduction To Ethical Hacking

Ping

This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the “ping” command. syntax : ping www.thehackbook.com or OBS: Keep in mind that if the host you pinging is blocking ICMP packets, then the result will be host down.

Page 50: Introduction To Ethical Hacking

nslookup

This command has many functionalities. One is for resolving DNS into IP. syntax:nslookup www.thehackbook.com

Page 51: Introduction To Ethical Hacking

nslookup

Now, another really nice function of nslookup is to find out IP of specific Mail Severs.

QUOTEnslookup (enter)set type=mx (enter)yahoo.com

This command will give you the mail server IP of yahoo.com. You can use whatever server you want and if it is listed on DNS, then you get the IP. Simple, isn’t it?

Page 52: Introduction To Ethical Hacking

tracert

This command will give you the hops that a packet will travel to reach its final destination.

OBS: This command is good to know the route a packet takes before it goes to the target box.

CODEtracert x.x.x.x (x is the IP address)

or tracert www.thehackbook.com

Page 53: Introduction To Ethical Hacking

arp

Address Resolution Protocol This command will show you the arp

table. This is good to know if someone is doing arp poisoning in your LAN.

command arp -a

Page 54: Introduction To Ethical Hacking

netstat

This command will show you connection to your box.

CODEnetstat

or CODE

netstat -a (this will show you all the listening ports and connection with DNS names)netstat -n (this will show you all the open connection with IP addresses)netstat -an (this will combined both of the above)

Page 55: Introduction To Ethical Hacking

nbtstat

This command will show you the netbios name of the target box.

CODEnbtstat -A x.x.x.x (x is the IP address)

nbtstat -a computername net view x.x.x.x or computername

(will list the available sharing folders on the target box

Page 56: Introduction To Ethical Hacking

route

This command will show you the routing table, gateway, interface and metric.

CODEroute print

Page 57: Introduction To Ethical Hacking

Help

And least but not last, the “help” command.

CODEwhatevercommand /help

CODEwhatevercommand /?

Page 58: Introduction To Ethical Hacking

Gathering Information about remote computer

Recap of first step i.e. preparation of attack

Hiding the IP using proxy bouncing Tracing IP address using Neotrace,

and online databases, Visual Route. Now change your MAC address

before starting Information Gathering step.

software :- MacAddressChanger

Page 59: Introduction To Ethical Hacking

Information Gathering

Typically during the information Gathering step attacker aims to determine the following information about the target system.

1. Network Topology 2. List of open ports 3. List of services 4. Determine the operating system 5. User Information

Page 60: Introduction To Ethical Hacking

Gathering Information

It is Possible to gather all these information using various techniques like

1. Network Reconnaissance - Ping sweeping and Traceroute 2. Port Scanning 3. Daemon Banner Grabbing and Port Enumeration 4. ICMP scanning 5. OS detection using OS Finger printing 6. Sniffing

Page 61: Introduction To Ethical Hacking

Scanning Using nmap

C:\program files\nmap>nmap –sP thehackbook.com

nmap sends ICMP echo request to thehackbook .com To Carry out UDP probing: C:\program files\nmap>nmap –PU thehackbook.com C:\program files\nmap>nmap –PN thehackbook.com

Page 62: Introduction To Ethical Hacking

OS Detection

C:\program files\nmap>nmap –O www.google.com

C:\program files\nmap>nmap –A www. google.com

Os detection using websites: use PHP script to detect visitors OS and browser

Page 63: Introduction To Ethical Hacking

Executing the Attack

DOS Attacks : Such an attack clogs up so much bandwidth on the target system that it cannot serve even legitimate users.

ATTACKER-----Infinite/ Malicious Data----- VICTIM

Target Network gets choked or cannot handle the malicious data and hence crashes.

As a result, even legitimate clients/ people cannot connect to the target network.

Page 64: Introduction To Ethical Hacking

Types of DOS Attacks

1. Ping of Death 2. Teardrop attacks 3. SYN flood attacks 4. Land Attacks 5. Smurf Attacks 6. UDP flood Attacks 7. DDOS Attacks 8. Modem-disconnect Attack

Page 65: Introduction To Ethical Hacking

Tear Drop Attack

Data sent from the source to the destination system, is broken down into smaller fragments at the source system and then reassembled into larger chunks at the destination system.

For Example,

Say data of 4000 bytes is to be sent across a network, then it is broken down into three chunks:

1.CHUNK A contains Bytes 1 to 1500.2.CHUNK B contains Bytes 1501 to

30003.CHUNK C contains Bytes 3001 to

4000

Page 66: Introduction To Ethical Hacking

Tear Drop Attack

However, in case of a Teardrop attack, these ranges of data chunks are overlapping. For Example, in case of a Teardrop attack, the same 4000 bytes would be broken down into the below three chunks:

1.CHUNK A contains Bytes 1 to 1500.2.CHUNK B contains Bytes 1499 to 30003.CHUNK C contains Bytes 2999 to 4000 In this example the range of CHUNK A is 1 to 1500,

range of CHUNK B is 1499 to 3000 while the range of CHUNK C is 2999 to 4000. Thus, the ranges are overlapping

Since here the ranges are overlapping, the target system gets DOS’ed!!!

Page 67: Introduction To Ethical Hacking

Trojan Attacks

Trojans act as RATs or Remote Administration Tools that allow remote control and remote access to the attacker.

Tools:

Netbus, Girlfriend, Back Orrifice and many others

Page 68: Introduction To Ethical Hacking

Sniffers Attack

Definition:

Sniffers are tools that can capture all data packets being sent across the entire network in the raw form.

Working: ATTACKER-----Uses sniffer for spying----- VICTIM

Threats:

Password Stealing, IP Violation, Spying etc.

Tools:

Tcpdump, Ethereal, Dsniff , wireshark and many more.

Page 69: Introduction To Ethical Hacking

Buffer Overflow

Buffer overflow tpically occur due to poor programming and a mismanagement of an application memory by the developer.

E.g. If 5 KB of buffer space has been allocated to an application. If the application then tries to store data of 7 KB in the buffer memory. Then the addition 2 KB of data will have nowhere to go and as a result will overflow.

This additional 2 KB of data which overflowed , will overwrite a legitimate piece of data at another memory location.

As a result system crashes or leads to unwanted execution of some other program.

Page 70: Introduction To Ethical Hacking

Types of Buffer Overflows 1. Stack Overflows 2. Format String Overflows 3. Heap Overflows 4. Integer overflows

Page 71: Introduction To Ethical Hacking

Stack Overflow

steps :1.Identify and take control of a vulnerable application running on the target computer

2.Identifying the malicious code that you would like to execute on the target computer

3. Exploit the priviledge and access of the victim application to execute the malicious code.

Page 72: Introduction To Ethical Hacking

Stack Overflow : Step 1 Identifying a vulnerable

application

Study the source code of the application and test it with different types and sizes of artificial input states (Identify the Test cases for which application fails)

Page 73: Introduction To Ethical Hacking

Buffer Overflow : Step 2 Planting the malicious code

Attacker sends malicious command as input or in the form of an argument to the vulnerable application. The malicious input is stored in the temporary buffer memory of the application and then remains ready to be executed as and when required.

Page 74: Introduction To Ethical Hacking

Executing the Malicious code

Whenever an application calls a function, a separate activation record for that particular function is created on the stack.

Each activation record contains a return address to which the program control is transferred once the function exits.

If one can change this return address to point to the address where malicious code is stored, then the application will jump to the malicious code as the function is over.

This will lead to the execution of malicious code.

Page 75: Introduction To Ethical Hacking

Social Networking Websites Hacking

There is no way to hack some one’s gmail account, orkut account, Facebook account, or yahoo account by breaking into servers.

Generally there are two ways of hacking these accounts

1. By finding the password of account 2. By resetting the password There is no any other way of hacking some one’s profile on social networking websites.

Page 76: Introduction To Ethical Hacking

Finding passwords

Social Enginnering Password guessing Phishing attacks Key Loggers Sniffing attacks Man in the middle attack Tab Nabbing- Latest kind of phishing

attack

Page 77: Introduction To Ethical Hacking

Phshing Attack

Fake login page: Demo. www.facebook.thehackbook.com www.gmail.thehackbook.com

Page 78: Introduction To Ethical Hacking

Tab Nabbing

Aza Raskin , a design expert discovered and extensively wrote about a deadly new phishing technique that he named TAB Nabbing.

All present day browsers are vulnerable to this kind of attack.

It is also a kind of phshing attack that impersonates other websites and fools users into revealing their personal data like usernames, passwords, credit card details, etc.

It makes use of multiple tabs by browsers to fool the victims.

Page 79: Introduction To Ethical Hacking

Steps of Tab Nabbing

Victims opens multiple tabs to his favorite websites & is browsing normally.

Using flash widgets, scripts, browser extensions or cross site scripting attacks, it is possible for an attacker to modify the contents of some other open tab in your browser to may be point to the victims bank, email or corporate login account.

Page 80: Introduction To Ethical Hacking

Resetting the password

It is possible for an attacker to find out the answer of secret questions available on gmail or yahoo account for password resetting.

Attacker can find it by means of social engineering.

Page 81: Introduction To Ethical Hacking

Windows Hacking

Host File: Directing the redirection windows Location- C:\windows\system 32 \ driver\etc Hosts file can be tweaked to carry out no of interesting hacks1. Blocking certain websites2. Redirecting the user to some other

website

Page 82: Introduction To Ethical Hacking

Recovering the deleted data When you delete a file , it first goes to the

recycle bin. After you empty the recycle bin, then file still remains on the hard disk .

Microsoft windows will only delete the link between the operating system & the deleted file.

This means that the file will not be accessible through windows & MS DOS.

The file will still remains on the hard disk and will be available until windows overwrites it with a new file.

Page 83: Introduction To Ethical Hacking

Email Forging

Definition:

Email Forging is the art of sending an email from the victim’s email account without knowing the password.

Working:

ATTACKER-----Sends Forged email----- FROM VICTIM

Page 84: Introduction To Ethical Hacking

SMS Forging

SMS spoofing became possible after many mobile/cellular operators had integrated their network communications with/in the Internet.

So anybody could send SMS from the Internet using forms at the websites of mobile operators or even through e-mail.

Page 85: Introduction To Ethical Hacking

SMS Forging

The working of SMS is explained as under. First of all the sender send the SMS via SMS

gateway.The identity of the sender is attached to the packer of the SMS.

The SMS once reach the SMS gateway is routed to the destination Gateway andthen to the receiver’s handset.

There are many ways by which we can send SMS to the SMS gateway.

One of them is to use internet.

Page 86: Introduction To Ethical Hacking

SMS Forging

Now the concept of SMS forging lies in changing the SCCP packer which containsthe sender information prior delivering to the SMS gateway.

The intruder can change the SCCP packet and can send that packet to any of the receiver as a spoofed SMS.

Some of the Website on the net also provide this facility.

To provide such service is not legal and the user using this may lead soserious consequences with law.

Website: http://www.spranked.com

Page 87: Introduction To Ethical Hacking

Software to Restore the deleted files

Restoration : An excellent recovery software

Download: www.aumha.org/a/recover.php

Page 88: Introduction To Ethical Hacking

Permanently Erasing the data

Software: Eraser download: http://eraser.heidi.ie/

Page 89: Introduction To Ethical Hacking

Windows Toolkit

You can remove the cracks of your windows using it.

Play with your logon screen.

Page 90: Introduction To Ethical Hacking

The End

About The Hackbook : The Hackbook is a social utility to promote awareness about Information Security and Ethical Hacking by integrating the concepts of social network and education network.