Uploaded by arjun05082002

CEHV8 - Module 01 - Introduction to Ethical Hacking

advertisement
Introduction to
E th ical H ack in g
Module 01
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
In t r o d u c t io n to E t h ic a l
H a c k in g
M o d u le
0 1
E n g i n e e r e d b y H a c k e r s . P r e s e n t e d b y P r o f e s s io n a ls .
E
t h ic a l
H
M o d u le
a c k in g
0 1 :
a n d
o u n t e r m
In t r o d u c tio n
E x a m
Module 01 Page 2
C
to
e a s u r e s
E th ic a l
v 8
H a c k in g
3 1 2 -5 0
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
CEH
S e c u r ity N e w s
-
.
.
■ ■.
_
‫* י‬
‫ז י‬
■
• I‫ן‬
? ‫י ! ■ ; ■־ ■ל־‬
■
H o m
e
| A b o u t
U s
P o r t f o lio
\
| C o n t a c t
U s
■ ‫יי‬
| S e r v ic e
Oct 17 2012, 0:45am 1ST
Z e ro -d a y A tta c k s a r e M e an er, m o re
R a m p a n t th a n w e e v e r th o u g h t
C om puter attacks th a t ta rg e t undisclosed v u ln e ra b ilitie s are m ore com m on and last longer than
many security researchers previously th o u g h t. The fin d in g comes fro m a new study th a t tracked
the num ber and duration o f so-called zero-day exploits over three years.
The typical zero-day attack, by d e fin itio n , e xp lo its s o ftw a re fla w s before th e y are publicly
disclosed. It lasts on average 312 days, w ith some lasting as long as tw o and a half years,
according to th e study by researchers fro m antivirus p rovider Symantec. O f the 18 zero-day
attacks the researchers found betw een 2008 and 2 0 1 1 ,1 1 o f the m previously w e n t undetected.
Recent revelations th a t th e S tuxnet m alw are th a t sabotaged Iranian nuclear facilities relied on
five zero days already underscored th e th re a t posed by such attacks. But th e researchers said
th e ir findings suggest th e menace may be even greater.
h ttp : //a r s te c h n ic a .c o m
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
N
e w
s
Z e r o - d a y
e v e r
A tta c k s
a r e
M
e a n e r ,
m
o r e
R a m
p a n t th a n
w e
th o u g h t
S o u rce : h ttp ://a rs te c h n ic a .c o m
C o m p u te r
th a n
a tta c k s
th a t ta rg e t
u n d is c lo s e d
v u ln e ra b ilitie s
a re
m o re
com m on
m a n y s e c u rity re s e a rc h e rs p re v io u s ly th o u g h t. T h e fin d in g c o m e s f r o m
and
la s t
a new
lo n g e r
s tu d y th a t
tr a c k e d th e n u m b e r a n d d u r a tio n o f s o -c a lle d z e ro - d a y e x p lo its o v e r t h r e e y e a rs .
The
ty p ic a l
d is c lo s e d .
ze ro -d a y
It la s ts
a c c o rd in g to
th e
on
a tta c k ,
by
a ve ra g e
s tu d y
by
d e fin itio n ,
312
days,
e x p lo its
w ith
re se a rch e rs fro m
s o ftw a re
som e
la s tin g
a n tiv iru s
as
fla w s
b e fo re
th e y
lo n g
as t w o
and
p ro v id e r S y m a n te c .
a tta c k s th e re s e a rc h e rs fo u n d b e tw e e n 2 0 0 8 a n d 2 0 1 1 , 11 o f th e m
O f th e
a re
p u b lic ly
a h a lf ye a rs ,
18 z e ro -d a y
p re v io u s ly w e n t u n d e te c te d .
R e c e n t r e v e la tio n s t h a t t h e S t u x n e t m a lw a r e t h a t s a b o ta g e d Ira n ia n n u c le a r fa c ilitie s re lie d o n
fiv e z e ro d a y s a lre a d y u n d e r s c o r e d th e t h r e a t p o s e d
b y su ch a tta c k s . B u t th e
r e s e a r c h e r s s a id
t h e ir fin d in g s s u g g e s t th e m e n a c e m a y b e e v e n g re a te r.
"Z e ro -d a y
a tta c k s
a re
d iffic u lt
to
p re v e n t
because
th e y
e x p lo it
unknow n
v u ln e ra b ilitie s ,
fo r
w h ic h th e r e a re n o p a tc h e s a n d n o a n tiv iru s o r in t r u s io n - d e te c tio n s ig n a tu r e s ," th e y w r o te . "It
seem s
th a t,
Module 01 Page 3
as
lo n g
as
s o ftw a re
w ill
have
bugs
and
th e
d e v e lo p m e n t
of
e x p lo its
fo r
new
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
v u ln e ra b ilitie s w ill b e a p ro fita b le
a c tiv ity , w e w ill b e e x p o s e d
to
z e r o - d a y a t t a c k s . In f a c t , 6 0
p e r c e n t o f t h e z e r o - d a y v u l n e r a b i l i t i e s w e i d e n t i f y in o u r s t u d y w e r e
s u g g e s ts th a t th e r e
a re
m any
m o re
z e ro -d a y a tta c k s th a n
not known
b e fo re , w h ic h
p re v io u s ly t h o u g h t — p e rh a p s
m o re
t h a n t w ic e as m a n y . "
R e s e a rc h e rs
L e y la
B ilg e
and
Tudor
e x e c u ta b le file s c o lle c te d f r o m
M a rch
2012. T hre e
d is c lo s e d
in
2009,
o f th e
ze ro -d a y
s ix w e r e
D u m itra s
c o n d u c te d
e x p lo its t h e y
d is c lo s e d
in
2010,
fo u n d
and
tw o
r e p u ta tio n d a ta th e re s e a rc h e rs re lie d o n p r e v e n te d t h e m
a tta c k o n
m a n y v e rs io n s o f M ic r o s o ft W in d o w s , w h ic h
z e ro d a y u n til n o w , h a d th e
a
s y s te m a tic
s tu d y
11 m illio n c o m p u te rs a ro u n d th e w o rld fro m
th a t
a n a ly z e d
F e b ru a ry 2 0 0 8 to
w e re
d is c lo s e d
in
2008,
seven
w e re
d is c lo s e d
in
2011.
(The
fro m
w e re
b in a ry
i d e n t i f y i n g a t t a c k s in 2 0 1 2 . ) A n
a p p e a rs to
s h o rte s t d u ra tio n : ju s t 19 days. A n
have gone
u n d e te c te d
as a
e x p lo it o f a s e p a ra te s e c u rity
b u g in t h e W i n d o w s s h e ll h a d t h e l o n g e s t d u r a t i o n : 3 0 m o n t h s .
Of
th e
18
a tta c k s
m o n ito re d .
E ig h t
s tu d ie d ,
o f th e
c o n v e n tio n a l w is d o m
15
ta rg e te d
e x p lo its
w e re
102
or
d ire c te d
fe w e r
of
at th re e
or
th e
11
fe w e r
m illio n
h o s ts .
h o s ts
The
th a t
d a ta
w e re
c o n firm s
th a t z e ro -d a y a tta c k s a re ty p ic a lly re s e rv e d fo r h ig h -v a lu e ta rg e ts . O f th e
r e m a in in g t h r e e a tta c k s , o n e w a s e x p lo ite d b y S tu x n e t a n d a n o th e r w a s e x p lo ite d b y C o n fic k e r,
th e v iru le n t w o r m
d is c o v e re d
in 2 0 0 8 t h a t h a s i n f e c t e d
m illio n s o f c o m p u te r s
c o n t in u e s t o d o so ). T h e S t u x n e t a n d C o n fic k e r e x p lo it t a r g e t e d
re s p e c tiv e ly . T h e
re s u lts , t h e
r e s e a r c h e r s s a id , d e m o n s t r a t e d
1 .5 m illio n
th e
(and re p o rte d ly
a n d 4 5 0 ,0 0 0 h o s ts
d iv id e n d s
re tu rn e d
b y z e ro -
d a y e x p lo its , w h ic h c a n c o m m a n d p ric e s as h ig h as $ 2 5 0 ,0 0 0 .
"F or
e x a m p le ,
a p p ro x im a te ly
w ro te .
" T h is
C o n fic k e r
3 7 0 ,0 0 0
e x a m p le
e x p lo itin g
th e
v u ln e ra b ility
C V E -2 0 0 8 -4 2 5 0
m a c h in e s w it h o u t b e in g d e te c te d
illu s tra te s
th e
e ffe c tiv e n e s s
o ver m o re
o f z e ro -d a y
m anaged
th a n
tw o
v u ln e ra b ilitie s
to
in fe c t
m o n th s ," th e y
fo r
c o n d u c tin g
s te a lth c y b e r-a tta c k s ."
The
re se a rch e rs
c a u tio n e d
l im it a t io n s , c a u s in g it t o
T h re a ts
once
a tta c k s
th e ir
m e th o d
of
c o lle c tin g
m is s 2 4 z e r o - d a y a tta c k s t r a c k e d
R e p o rt o v e r th e
z e ro -d a y
th a t
tim e
p e rio d
becam e
s tu d ie d .
p u b lic
file s
b y S y m a n te c 's o w n
S u rp ris in g ly , th e
k n o w le d g e — b y
n u m b e r o f a t t a c k v a r ia n t s a ls o ro s e , w i t h
e x e c u ta b le
m a rg in s
had
s ig n ific a n t
In t e r n e t S e c u rity
num ber
o f a tta c k s
o f tw o -
to
o n ly
g re w
1 0 0 ,0 0 0 -fo ld .
The
183 to 8 5 ,0 0 0 m o re v a ria n ts d e te c te d ea ch day. O n e
p o s s i b l e c a u s e o f t h e s u r g e i n n e w f i l e s , t h e r e s e a r c h e r s s a i d , is t h a t t h e e x p l o i t s m a y h a v e b e e n
re p a c k a g e d v e rs io n s o f th e s a m e a tta c k .
" H o w e v e r , i t is d o u b t f u l t h a t r e p a c k i n g a l o n e c a n a c c o u n t f o r a n i n c r e a s e b y u p t o f i v e o r d e r s o f
m a g n i t u d e , " t h e y w r o t e . " M o r e l i k e l y , t h i s i n c r e a s e is t h e r e s u l t o f t h e e x t e n s i v e r e - u s e o f f i e l d p r o v e n e x p l o i t s in o t h e r m a l w a r e . "
Copyrights: ©2012 Conde Nast
Author: Dan Goodin
h t t p : / / a r s t e c h n i c a . c o m / s e c u r i t v / 2012 /
10/ z e r o - d a v - a t t a c k s - a r e - m e a r 1e r - a r 1d - m o r e - p l e n t i f u l -
th a n -th o u g h t/
Module 01 Page 4
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
CEH
M o d u le O b je c tiv e s
J
D a ta B re a c h In v e s tig a tio n s R e p o rt
J
H a c k in g P hases
J
E s s e n tia l T e rm in o lo g y
J
T yp e s o f A tta c k s o n a S yste m
J
E le m e n ts o f In f o r m a tio n S e c u rity
J
W h y E th ic a l H a c k in g Is N e c e s s a ry
J
T o p In fo r m a tio n S e c u rity A tta c k
.
J
S kills o f an E th ica l H a c k e r
r
j
In c id e n t M a n a g e m e n t P rocess
‫׳‬j
T yp e s o f S e c u rity P o licie s
V e c to rs
J
In f o r m a tio n S e c u rity T h re a ts
J
H a c k in g vs. E th ic a l H a c k in g
J
E ffe c ts o f H a c k in g o n B usiness
j
V u ln e r a b ility R esea rch
J
W h o Is a H a c k e r?
j
W h a t Is P e n e tra tio n T e s tin g ?
b
a s
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
M
Sf
o
d u l e
O
b je c t iv e s
—1
I t is i m p o r t a n t t o
b e a r in m i n d t h a t a t t a c k e r s b r e a k i n t o s y s t e m s f o r v a r i o u s r e a s o n s
a n d p u r p o s e s . T h e r e f o r e , i t is i m p o r t a n t t o c o m p r e h e n d h o w m a l i c i o u s h a c k e r s e x p l o i t s y s t e m s
a n d t h e p r o b a b l e r e a s o n s b e h i n d t h e a t t a c k s . A s S u n T z u p u t it in t h e A r t o f W a r , " I f y o u k n o w
y o u r s e l f b u t n o t t h e e n e m y , f o r e v e r y v i c t o r y g a i n e d , y o u w i l l a l s o s u f f e r a d e f e a t . " I t is t h e d u t y
of
s y s te m
a d m in is tra to rs
a g a in s t e x p lo its
and
b y k n o w in g
n e tw o rk
th e
s e c u rity
e n e m y — th e
p ro fe s s io n a ls
m a lic io u s
to
g u a rd
h a cke r(s)— w h o
th e ir
seek to
in fra s tru c tu re
use th e
sam e
in f r a s t r u c t u r e f o r ille g a l a c tiv itie s .
E t h i c a l h a c k i n g is t h e p r o c e s s o f c h e c k i n g a n d t e s t i n g t h e o r g a n i z a t i o n n e t w o r k f o r t h e p o s s i b l e
lo o p h o le s a n d v u ln e ra b ilitie s .
w h ite
h a ts .
They
p e rfo rm
T h e in d iv id u a ls o r e x p e rts w h o p e r fo r m
h a c k in g
in
e th ic a l
w ays,
w ith o u t
e th ic a l h a c k in g a re c a lle d
c a u s in g
any
dam age
to
th e
c o m p u t e r s y s te m , th e r e b y in c re a s in g th e s e c u rity p e r im e te r o f a n o rg a n iz a tio n .
Module 01 Page 5
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 312-50 Certified Ethical Hacker
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
T h is m o d u le c o v e rs :
0
H a c k in g P h a se s
E s s e n tia l T e r m in o l o g y
0
T y p e s o f A tta c k s o n a S y s te m
0
E le m e n ts o f I n fo r m a tio n S e c u rity
0
W h y E t h i c a l H a c k i n g Is N e c e s s a r y
0
T o p I n fo r m a tio n S e c u rity A tta c k
6
S k ills o f a n E th ic a l H a c k e r
0
In c id e n t M a n a g e m e n t P ro ce ss
0
T y p e s o f S e c u r it y P o lic ie s
0
V u ln e r a b ility R e s e a rch
0
W h a t Is P e n e t r a t i o n T e s t i n g ?
0
D a ta B re a c h In v e s tig a tio n s R e p o rt
0
V e c to rs
0
In fo r m a tio n S e c u rity T h re a ts
0
H a c k in g vs. E th ic a l H a c k in g
0
E ffe c ts o f H a c k in g o n B u s in e s s
0
W h o Is a H a c k e r ?
Module 01 Page 6
Ethical Hacking and Countermeasures Copyright © by EC-C0UI1Cil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
H a c k in g
P hases
T ypes of
A tta c k s
In fo rm a tio n S e c u r ity
C o n tro ls
Copyright © by EC-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
M
o
d u l e
F
lo w
‫'־‬
In fo rm a tio n
in fo rm a tio n
and
d is ru p tio n , a n d
s e c u rity
re fe rs
in fo rm a tio n
d e s tru c tio n .
a
g re a t
th re a t.
In
an
p ro te c tin g
s y s te m s
fro m
or
s a fe g u a rd in g
u n a u th o riz e d
access,
F o r m o s t o rg a n iz a tio n s , in fo r m a tio n
s e c u re d . If s e n s itiv e in f o r m a t io n
fa c e
to
fa lls in t o w r o n g
a tte m p t
to
is t h e
hands, th e n th e
u n d e rs ta n d
how
to
any
k in d
of
d is c lo s u re ,
s e n s itiv e
a lte ra tio n ,
c ritic a l re s o u rc e t o
re s p e c tiv e o rg a n iz a tio n
s e cu re
such
c ritic a l
be
m ay
in fo rm a tio n
re s o u rc e s , fir s t w e w ill lo o k a t an o v e r v ie w o f in f o r m a t io n s e c u rity .
i-g !
In f o r m a t io n S e c u rity O v e r v ie w
H a c k in g P h a se s
f c ‫—־‬
s '
In fo r m a tio n S e c u rity T h re a ts
1— ‫י‬
T yp e s o f A tta c k s
a n d A tta c k V e c to rs
4 k - ‫!״‬
T h is s e c t io n
H a c k in g C o n c e p ts
c o v e rs e le m e n ts
‫ן‬
o f in fo rm a tio n
r^ U
In fo r m a tio n S e c u rity C o n tro ls
s e c u rity , th e
s tre n g th
o f th e
c o m p o n e n t tria n g le
(s e c u rity , fu n c tio n a lity , a n d u s a b ility ), a n d e s s e n tia l te r m in o lo g y .
Module 01 Page 7
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
I n
t e
r n
Exam 312-50 Certified Ethical Hacker
e
t
C
r i m
e
C
u
r r e
n
t
R
e p o r t :
I C
CEH
3
(•rtifwd
itk itjl
I n t e r n e t C r im e C o m p la in t C e n t e r (IC 3 )
20 0 5
20 0 6
2008
20 07
2009
___________
2010
2011
htp://www.ic3.gov
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
I n
t e
r n
e
t
C
r i m
e
C
u r r e n t
R
e p o r t :
I C
3
S o u rce : h ttp ://w w w .ic 3 .g o v
T h e f o l l o w i n g is t h e c r i m e r e p o r t d a t a f r o m
p a rtn e rs h ip a m o n g th e
F ederal B u re a u
C e n te r (N W 3 C ), a n d th e
B u re a u
I C 3 ; t h e I n t e r n e t C r i m e C o m p l a i n t C e n t e r ( I C 3 ) is a
o f In v e s tig a tio n
o f J u s tic e A s s is ta n c e
c r im e c o m p la in t s a re in c r e a s in g d a ily . F ro m
th e re
w e re
in c re a s e d
to
2 3 1 ,4 9 3
3 3 6 ,6 5 5 .
c r im e
W hen
c o m p la in ts ,
c o m p a re d
N a tio n a l W h ite
(B JA ). A c c o r d in g t o
C o lla r C rim e
IC 3 , o n l i n e
In te rn e t
t h e g r a p h , y o u c a n o b s e r v e t h a t in t h e y e a r 2 0 0 5 ,
w h e re a s
to
(F B I), t h e
2009,
in
th e
year
In te r n e t c rim e
2009,
c o m p la in ts
c o m p la in ts
in t h e
d ra s tic a lly
year
2011
d e c re a s e d to s o m e e x te n t.
Module 01 Page 8
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
3 5 0 ,0 0 0
336,655
303,809
3 0 0 .0 0 0
2 5 0 .0 0 0
275,284
231,493
207,492
2 0 0 .0 0 0
1 5 0 .0 0 0
1 0 0 .0 0 0
5 0 ,0 0 0
0
Module 01 Page 9
______ ‫״‬
206,884
314,246
r d
C o m p la in ts
r e c e iv e d
by I C 3
Yearly Comparison of Complaints Received via the IC3 Website
I n t e r n e t C r im e C o m p la in t C e n te r (IC 3 )
Ethical Hacking and Countermeasures Copyright © by EC-C0linCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
D a ta B re a c h In v e s tig a tio n s R e p o rt
Types of hacking by
CEH
and percent of records
r
28% / 97%
H a c k in g
P h y s ic a l
E n v ir o n m e n ta l
I
0% I 0%
P e rc e n t o f B re a c h e s a n d P e rc e n t o f R e c o rd s
h ttp : //w w w .v e r iz o n b u s in e s s .c o m
Copyright © by IC-CM ICil. All Rights Reserved. Reproduction Is Strictly Prohibited.
D
n
—
The
d a ta
a t a
B
r e a c h
I n v e
s t i g a t i o
n s
R
e p o r t
S o u rce : h ttp ://w w w .v e riz o n b u s in e s s .c o m
b re a c h
in v e s tig a tio n s
re p o rt fro m
V e riz o n
B u s in e s s
sh o w s th e
ty p e s
o f h a c k in g
by
p e r c e n t o f b r e a c h e s a n d p e r c e n t o f r e c o r d s . F r o m t h e r e p o r t , i t is c l e a r t h a t m o s t o f t h e s e c u r i t y
b r e a c h e s h a p p e n i n g t o d a y a r e b e c a u s e o f h a c k i n g . T h e r e f o r e , in o r d e r t o p r o t e c t y o u r s e l f f r o m
d a ta o r s e c u r it y b re a c h e s , y o u s h o u ld te s t y o u r n e t w o r k s e c u rity a g a in s t h a c k in g .
Module 01 Page 10
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
M a lw a r e
28% / 97%
H a c k in g
I 58 % / 99%
S o c ia l
22% I 38%
M is u s e
......... ..........
7% / <1%
P h y s ic a l
E rro r
E n v ir o n m e n ta l
17%
I
<1 %
tmrnmitmmt
H
7 % / <1%
I I
0% / 0%
P e rc e n t o f B re a c h e s a n d P e rc e n t o f R e c o rd s
FIGURE 1.1: D ata B rea ch In v e s tig a tio n R e p o rt
Module 01 Page 11
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
E s s e n tia l T e r m in o lo g y
H a c k V a lu e
CEH
T a r g e t o f E v a lu a t io n
It is the notion among hackers that
something is worth doing or is
interesting
An IT system, product, or component
that is identified/subjected to a
required security evaluation
E x p lo it
Z e ro -D a y A tta c k
An attack that exploits computer
application vulnerabilities before the
software developer releases a patch for
the vulnerability
A defined way to breach the
security of an IT system through
vulnerability
D a is y C h a in in g
V u ln e r a b ility
Existence of a weakness, design, or
implementation error that can lead to
an unexpected and undesirable event
compromising the security of the system
Hackers who get away with database
theft usually complete their task, then
backtrack to cover their tracks by
destroying logs, etc.
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
E
s s e n t ia l
x ‫ן‬
T
H a c k
Hack
e
r m
i n
o
l o
g
y
V a lu e
v a lu e
in te re s tin g . H a c k e rs
is
th e
n o tio n
am ong
h a cke rs
m ig h t fe e l th a t b re a k in g d o w n
th a t
th e
s o m e th in g
is
w o rth
d o in g
or
is
t o u g h e s t n e t w o r k s e c u r ity m ig h t g iv e
t h e m g r e a t s a t i s f a c t i o n , a n d t h a t i t is s o m e t h i n g t h e y a c c o m p l i s h e d t h a t n o t e v e r y o n e c o u l d d o .
E x p lo it
An
e x p lo it
is
v u ln e ra b ility . T h e te r m
n e tw o rk . A n
u n a n tic ip a te d
a
d e fin e d
way
to
b re a c h
th e
s e c u rity
of
an
e x p l o i t is u s e d w h e n a n y k i n d o f a t t a c k h a s t a k e n
e x p lo it can
a ls o
b e h a v io r to
be d e fin e d
occur on
as m a lic io u s s o f t w a r e
le g itim a te
s o ftw a re
IT
s y s te m
th ro u g h
p la c e o n a s y s te m
o r c o m m a n d s th a t can
or h a rd w a re
or
cause
b y ta k in g a d v a n ta g e
of
th e v u ln e ra b ilitie s .
V
u ln e r a b ilit y
V u l n e r a b i l i t y is a w e a k n e s s i n d e s i g n o r a n i m p l e m e n t a t i o n e r r o r t h a t c a n l e a d t o a n
u n e x p e c t e d a n d u n d e s i r a b l e e v e n t c o m p r o m i s i n g t h e s e c u r i t y o f t h e s y s t e m . In s i m p l e w o r d s , a
v u ln e ra b ility
is l o o p
h o le ,
lim ita tio n ,
o r w e a kn e ss th a t
becom es
a so u rce
fo r an
a tta c k e r to
e n te r in to th e s y s te m b y b y p a s s in g v a rio u s u s e r a u th e n tic a tio n s .
Module 01 Page 12
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
T a r g e t
3
Exam 312-50 Certified Ethical Hacker
o f E v a lu a t io n
/
A ta rg e t
s u b je c te d
to
a
o f e v a lu a tio n
re q u ire d
is a n
s e c u rity
IT s y s t e m ,
e v a lu a tio n .
p ro d u c t,
T h is
k in d
o r c o m p o n e n t th a t
of
e v a lu a tio n
h e lp s
is i d e n t i f i e d
th e
/
e v a lu a to r
u n d e rs ta n d th e fu n c tio n in g , te c h n o lo g y , a n d v u ln e ra b ilitie s o f a p a rtic u la r s y s te m o r p ro d u c t.
Z e r o - d a y
In
a
A tta c k
z e ro -d a y
a tta c k ,
th e
a tta c k e r
e x p lo its
th e
v u ln e ra b ilitie s
in
th e
c o m p u te r
a p p lic a tio n b e fo r e th e s o ftw a r e d e v e lo p e r re le a s e s a p a tc h f o r t h e m .
D
a is y
A tta c k e rs
b a c k tra c k
to
s y s te m s a n d
C
h a in in g
w ho
get away
c o v e r th e ir tra c k s
use th e m
by
d a ta b a s e
d e s tro y in g
f o r m a lic io u s a c tiv itie s .
th e y use o th e rs ' s y s te m s to p e rfo r m
Module 01 Page 13
w ith
th e ft
lo g s ,
u s u a lly
e tc . T h e
c o m p le te
a tta c k e rs
It b e c o m e s d i f f i c u l t t o
th e ir ta s k
g a in
c o n tro l
id e n tify th e
and
th e n
o f o th e r
a t t a c k e r as
ille g a l a c tiv itie s .
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
E le m e n t s o f I n f o r m a t i o n S e c u r it y
CEH
A s ta te o f w e ll- b e in g o f in fo r m a t io n a n d in fr a s tr u c tu r e in w h ic h th e p o s s ib ility o f t h e f t ,
t a m p e r in g , a n d d is r u p t io n o f in f o r m a t io n a n d s e rv ic e s is k e p t lo w o r to le r a b le
Assurance that the
information is accessible
only to those authorized
to have access
Assurance that the systems responsible
for delivering, storing, and processing
information are accessible when
required by the authorized users
In te g rity
A v a ila b ility
The trustworthiness of data
or resources in terms of
preventing improper and
unauthorized changes
Guarantee that the sender of a message
cannot later deny having sent the
message and that the recipient cannot
deny having received the message
9 A u th e n tic ity
Authenticity refers to the
characteristic of a communication,
document or any data that ensures
the quality o f being genuine
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
,jp ►
E
‫׳'־'*"■״‬
le m
In fo rm a tio n
in fra s tru c tu re
s e rv ic e s
e n t s
is
lo w
f I n
s e c u rity
in w h i c h
kept
o
th e
or
f o
r m
a
is
d e fin e d
t i o
n
S
as:
"A
e c u r it y
s ta te
of
w e ll-b e in g
p o s s ib ility o f th e ft, ta m p e r in g , a n d
to le ra b le ."
It
re lie s
on
th e
fiv e
m a jo r
of
d is ru p tio n
e le m e n ts
in fo rm a tio n
and
o f in fo rm a tio n
o f:
and
c o n fid e n tia lity ,
in te g rity , a v a ila b ility , a u th e n tic ity , a n d n o n -r e p u d ia tio n .
-‫״‬
C
o n f id e n t ia lit y
C o n fid e n tia lity
a u th o riz e d to
is
th e
a ssu ra n ce
th a t
th e
in fo rm a tio n
is
a c c e s s ib le
h a ve access. C o n fid e n tia lity b re a c h e s m a y o c c u r d u e to
o n ly
im p ro p e r d a ta
to
th o s e
h a n d lin g
o r a h a c k in g a t t e m p t .
f r
I n t e g r it y
zL ----------
I n t e g r i t y is t h e t r u s t w o r t h i n e s s o f d a t a o r r e s o u r c e s i n t e r m s o f p r e v e n t i n g i m p r o p e r
a n d u n a u t h o r iz e d c h a n g e s , t h e a s s u ra n c e t h a t in f o r m a t io n ca n b e re lie d u p o n t o b e s u ffic ie n tly
a c c u r a t e f o r its p u r p o s e .
A
■ "f?
v a ila b ilit y
■
A v a i l a b i l i t y is t h e
Module 01 Page 14
a ssu ra n ce th a t th e
s y s te m s re s p o n s ib le f o r d e liv e rin g , s to rin g , a n d
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
p ro c e s s in g in f o r m a t io n a re a c c e s s ib le w h e n r e q u ir e d b y a u th o r iz e d u s e rs .
A
u t h e n t ic it y
A u th e n tic ity
re fe rs to th e
c h a ra c te ris tic o f a c o m m u n ic a tio n , d o c u m e n t, o r a n y d a ta
t h a t e n s u re s th e q u a lit y o f b e in g g e n u in e o r n o t c o r r u p te d f r o m
th e o rig in a l. T h e m a jo r ro le s o f
a u t h e n t i c a t i o n i n c l u d e c o n f i r m i n g t h a t t h e u s e r is w h o h e o r s h e c l a i m s t o
be a n d e n s u rin g th e
m e s s a g e is a u t h e n t i c a n d n o t a l t e r e d o r f o r g e d . B i o m e t r i c s , s m a r t c a r d s , a n d d i g i t a l c e r t i f i c a t e s
a re u se d t o e n s u re a u th e n tic ity o f d a ta , tra n s a c tio n s , c o m m u n ic a tio n s , o r d o c u m e n ts .
p g jj
N
o n - r e p u d ia t io n
N o n -re p u d ia tio n
re fe rs
to
th e
a b ility
to
e n s u re
th a t
a
p a rty
to
a
c o n tra c t
or
a
c o m m u n ic a tio n c a n n o t d e n y th e a u t h e n t ic it y o f t h e ir s ig n a tu r e o n a d o c u m e n t o r th e s e n d in g
o f a m e s s a g e t h a t t h e y o r i g i n a t e d . I t is a w a y t o g u a r a n t e e t h a t t h e s e n d e r o f a m e s s a g e c a n n o t
la te r d e n y
h a v in g
se n t th e
m essage
and
th a t th e
re c ip ie n t c a n n o t d e n y
h a v in g
re c e iv e d
th e
m essage.
Module 01 Page 15
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
T h e S e c u r ity , F u n c t io n a lit y , a n d
CEH
U s a b ilit y T r i a n g l e
|
j
:
M o vin g th e ball to w a rd s
se cu rity means less
fu n c tio n a lity and u sa b ility
|
F u n cc t i o n a l i t y
(F e a tu re s)
»
j
S e c u rity
( R e s tr ic tio n s )
W
.is
*
U s a b ility
(G U I)
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
T h e
S
e c u r it y ,
F
u
n
c t i o
n
a
l i t y ,
a n d
U
s a
b
i l i t y
T
r i a
n
g
l e
T e c h n o l o g y is e v o l v i n g a t a n u n p r e c e d e n t e d r a t e . A s a r e s u l t , n e w p r o d u c t s t h a t r e a c h
th e
m a rk e t te n d
o rig in a lly
sam e
to
be e n g in e e re d f o r e a s y -to -u s e
d e v e lo p e d
pace
o v e rlo o k
as
th e
in c re a s in g
fo r
th e
"h o n e s t"
u s e r's
p ro file .
v u ln e ra b ilitie s
b u ilt-in
rese a rch
and
M o re o v e r,
d u rin g
th e
ra th e r th a n
a c a d e m ic
d u rin g
in te n d e d
d e fa u lt s e c u rity m e c h a n is m s
th is
s e c u re c o m p u tin g . T e c h n o lo g y ,
p u rp o se s,
e v o lu tio n ,
d e p lo y m e n t
has
s y s te m
of
m e a n s u s e rs h a v e to
not
th e
be
e v o lv e d
d e s ig n e rs
s y s te m .
m o re
at th e
o fte n
H o w e v e r,
c o m p e te n t. As
c o m p u t e r s a r e u s e d f o r m o r e a n d m o r e r o u t i n e a c t i v i t i e s , i t is b e c o m i n g i n c r e a s i n g l y d i f f i c u l t f o r
s y s te m
a d m in is tr a to rs
and
o th e r
s y s te m
p ro fe s s io n a ls
to
a llo c a te
reso u rce s
e x c lu s iv e ly
fo r
s e c u r in g s y s te m s . T h is in c lu d e s t im e n e e d e d t o c h e c k lo g file s , d e t e c t v u ln e r a b ilit ie s , a n d a p p ly
s e c u rity u p d a te p a tc h e s .
R o u tin e
a c tiv itie s
consum e
a d m in is tra tio n . T h e re
re g u la r
and
p ro fe s s io n a ls
in n o v a tiv e
to
reso u rce s.
O rig in a lly ,
"hack"
c o m p u te r s y s te m s .
Module 01 Page 16
b a s is .
c o n s ta n tly
T e c h n o lo g y )
to
s y s te m
is l i t t l e t i m e
d e p lo y
T h is
has
m o n ito r
m e a n t to
H a c k in g
a d m in is tra to rs ‫׳‬
to
possess
re q u ire d
and
tim e ,
m e a su re s an d
in c re a s e d
d e fe n d
e x tra o rd in a ry
th e
IC T
le a v in g
s e cu re
dem and
fo r
( In fo rm a tio n
c o m p u te r
g re a t p ro fic ie n c y .
le s s
tim e
c o m p u tin g
s k ills t o
fo r
d e d ic a te d
and
a
s e c u rity
C o m m u n ic a tio n
e x te n d
H o w e v e r, to d a y th e re
v ig ila n t
reso u rce s on
th e
a re
lim its
of
a u to m a te d
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
to o ls a n d c o d e s a v a ila b le o n t h e I n t e r n e t t h a t m a k e it p o s s ib le f o r a n y o n e w it h a w ill a n d d e s ire
to hack and succeed.
M e r e c o m p r o m is e o f th e s e c u rity o f a s y s te m d o e s n o t d e n o te success. T h e re a re w e b s ite s th a t
in s is t o n " t a k i n g b a c k t h e n e t " as w e l l a s p e o p l e w h o b e l i e v e t h a t t h e y a r e d o i n g a ll a f a v o r b y
p o s tin g e x p lo it d e ta ils .
T h e s e c a n a c t as a d e t r i m e n t a n d c a n b r i n g d o w n t h e s k ill le v e l r e q u i r e d
t o b e c o m e a s u c c e s s fu l a tta c k e r.
T h e e a s e w it h w h ic h s y s te m v u ln e r a b ilitie s ca n b e e x p lo ite d h a s in c re a s e d w h ile t h e k n o w le d g e
c u rv e re q u ire d to p e rfo r m
su ch e x p lo its has s h o rte n e d . T h e c o n c e p t o f th e e lite /s u p e r a tta c k e r
is a n i l l u s i o n . H o w e v e r , t h e f a s t - e v o l v i n g g e n r e o f " s c r i p t k i d d i e s " is l a r g e l y c o m p r i s e d o f l e s s e r s k ille d
in d iv id u a ls
h a v in g
se co n d -h a n d
k n o w le d g e
im p e d im e n ts c o n trib u tin g to th e g ro w th
o f p e rfo rm in g
o f s e c u rity in fra s tr u c tu r e
e x p lo its .
One
lie s in t h e
o f th e
m a in
u n w illin g n e s s o f
e x p lo ite d o r c o m p r o m is e d v ic tim s t o r e p o r t t h e in c id e n t f o r fe a r o f lo s in g t h e g o o d w ill a n d fa ith
of
th e ir
e m p lo y e e s ,
in fo rm a tio n
a s s e ts
c u s to m e rs ,
in flu e n c in g
th e
p a rtn e rs ,
m a rke t
a n d /o r
has
seen
of
lo s in g
m o re
m a rke t
c o m p a n ie s
sh a re .
The
th in k in g
tre n d
tw ic e
of
b e fo re
r e p o r tin g in c id e n ts to la w e n fo r c e m e n t f o r fe a r o f b a d p re ss a n d n e g a tiv e p u b lic ity .
T h e in c r e a s in g ly n e t w o r k e d e n v ir o n m e n t , w i t h c o m p a n ie s o f t e n h a v in g t h e i r w e b s it e as a s in g le
p o in t
o f c o n ta c t
c o u n te rm e a s u re s
a cro ss g e o g ra p h ic a l
to
p re v e n t
e x p lo its
b o u n d a rie s ,
th a t
can
m akes
re s u lt
in
it c ritic a l f o r
lo s s
of
an
a d m in is tra to rs
im p o r ta n t
to
ta k e
re a so n
why
c o r p o r a t i o n s n e e d t o in v e s t in s e c u r i t y m e a s u r e s t o p r o t e c t t h e i r i n f o r m a t i o n a s s e ts .
Module 01 Page 17
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
M
o
d u l e
F
Exam 312-50 Certified Ethical Hacker
lo w
l r ' 5 ,‫ד‬
So fa r
we
d is c u s s e d
in fo rm a tio n
s e c u rity .
Now
we
w ill
d is c u s s
th re a ts
and
a tta c k
v e c to r s o f in fo r m a t io n s e c u rity .
|~ U
In fo r m a tio n S e c u rity O v e r v ie w
H a c k in g P h a se s
I n f o r m a tio n S e c u rity T h re a ts
* - . .
|
T yp e s o f A tta c k s
Eel-------
M
a n d A tta c k V e c to rs
H a c k in g C o n c e p ts
T h is s e c tio n
in tro d u c e s
you
to
L
to p
in fo rm a tio n
^
‫־‬
In fo r m a tio n S e c u rity C o n tro ls
s e c u rity
a tta c k
v e c to rs , th e
t h r e a t s t o v a lu a b le in fo r m a tio n , a n d th e g o a ls o f a tta c k e r s w h o p e r fo r m
p o s s ib le
s e c u rity
a tta c k s o n in fo rm a tio n
s y s te m s .
Module 01 Page 18
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
T o p I n f o r m a t i o n S e c u r it y
CEH
A tta c k V e c to rs
V irtua liza tion and
Organized
Un-patched
Targeted
Social
Cloud C om puting
Cyber Crime
Softw are
M alw ares
N etw o rkin g
?a
‫י‬
IF 3I
't t A
‫ויי‬,
Insider Threats
! j‫׳‬
In fo rm a tio n
S y s te m s
Complexity of
Computer Infrastructure
?ft
9
Compliance to Govt.
Laws and Regulations
Mobile
Device Security
Inadequate
Security Policies
Network
Applications
Lack o f Cyber
Security Professionals
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
T o p
An
in fo rm a tio n
I n
f o
a tta c k
s y s te m
r m
a
v e c to r
to
t i o
is
p e rfo rm
n
a
S
p a th
e c u r it y
or
m eans
A
t t a c k
by
w h ic h
V
e c t o r s
an
a tta c k e r
g a in s
access
to
an
m a lic io u s a c t iv it ie s . T h is a t t a c k v e c t o r e n a b le s a n a t t a c k e r t o
t a k e a d v a n t a g e o f t h e v u l n e r a b i l i t i e s p r e s e n t in t h e i n f o r m a t i o n s y s t e m
in o r d e r t o c a r r y o u t a
p a rtic u la r a tta c k .
A lth o u g h
th e re
a tta c k v e c to rs
a re
som e
com e
in
tra d itio n a l
m any
fo rm s ;
a tta c k s
one
v e c to rs
cannot
fro m
w h ic h
p r e d i c t in w h i c h
a tta c k
fo rm
can
an
be
p e rfo rm e d ,
a tta c k v e c to r can
com e.
The
fo llo w in g
a re
th e
p o s s ib le
to p
a tta c k
v e c to rs
th ro u g h
w h ic h
a tta c k e rs
can
a tta c k
in fo r m a tio n s y s te m s :
0
V ir t u a liz a t io n a n d C lo u d C o m p u t in g
0
O rg a n iz e d C y b e r C rim e
0
U n p a tc h e d S o ftw a re
0
T a rg e te d M a lw a re
0
S o c ia l N e t w o r k i n g
0
In s id e r T h re a ts
Module 01 Page 19
Ethical Hacking and Countermeasures Copyright © by EC-COUIlCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
0
B o tn e ts
0
Lack o f C y b e r S e c u rity P ro fe s s io n a ls
0
N e tw o r k A p p lic a tio n s
0
I n a d e q u a t e S e c u r it y P o lic ie s
0
M o b ile D e v ic e S e c u r ity
0
C o m p lia n c e w it h G o v t. L a w s a n d R e g u la tio n s
0
C o m p le x ity o f C o m p u te r In fra s tru c tu re
0
H a c k tiv is m
Module 01 Page 20
Exam 312-50 Certified Ethical Hacker
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
M
o
I n
f o
Exam 312-50 Certified Ethical Hacker
t i v e s ,
r m
a
G
t i o
o a ls ,
n
S
a n d
O
e c u r it y
b j e
A
c t i v e s
o
f
t t a c k s
A t t a c k s = M o t i v e ( G o a l) + M e t h o d + V u l n e r a b i l i t y
A tta c k s
A tta c k e rs ha ve m o tiv e s o r g o a ls such as d is r u p tin g
G o a ls
b u s in e s s c o n tin u ity , in fo r m a tio n t h e ft, d a ta
m a n ip u la tio n s , o r ta k in g re ve n g e
A m o tiv e o rig in a te s o u t o f th e n o tio n th a t th e ta r g e t
s y s te m s to re s o r p ro c e s s e s s o m e th in g v a lu a b le an d th is
M o tiv e s
lead s to th r e a t o f an a tta c k o n th e system
A tta c k e rs t r y v a rio u s to o ls , a tta c k m e th o d s , a n d
/
te c h n iq u e s to e x p lo it v u ln e r a b ilitie s in a c o m p u te r
'
/
O b je c tiv e s
s ystem o r s e c u rity p o lic y a n d c o n tro ls to a c h ie v e t h e ir
m o tiv e s
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
M
— -E l
S
o
t i v e s ,
e c u r it y
G
A
o a ls ,
a n d
O
b je c t iv e s
o
f I n
f o
r m
a
t i o
n
t t a c k s
A tta c k e r s g e n e r a lly h a v e m o tiv e s o r g o a ls o r o b je c tiv e s b e h in d p e r f o r m in g in fo r m a t io n s e c u rity
a tta c k s .
It
m ay
be
to
d is ru p t
th e
b u s in e s s
c o n tin u ity
of
th e
ta rg e t
o rg a n iz a tio n ,
to
s te a l
v a lu a b le in f o r m a t io n , f o r th e s a k e o f c u r io s ity , o r e v e n t o ta k e r e v e n g e o n t a r g e t o rg a n iz a tio n .
T h e r e f o r e , th e s e m o tiv e s o r g o a ls d e p e n d o n t h e a tta c k e r 's s ta te o f m in d , f o r w h a t re a s o n h e o r
s h e is c a r r y i n g o u t s u c h a n a c t i v i t y . O n c e , t h e a t t a c k e r d e t e r m i n e s
h is /h e r g o a l, h e o r s h e ca n
a c c o m p l i s h t h e g o a l b y a d o p t i n g v a r i o u s t e c h n i q u e s t o e x p l o i t v u l n e r a b i l i t i e s in a n i n f o r m a t i o n
s y s te m o r s e c u rity p o lic y a n d c o n tro ls .
Module 01 Page 21
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
In f o r m a t io n S e c u r ity T h r e a ts
0
0
©
0
0
CEH
0
0
N a tu ra l
P h y s ic a l
H um an
T h re a ts
S e c u rity T h re a ts
T h re a ts
©
N a tu ra l dis a s te rs
Loss o r d a m a g e o f
©
H ackers
©
In sid e rs
Q
S ocial e n g in e e rin g
s y ste m re so u rce s
Q
Q
Q
F lo o d s
©
P hysical in tru s io n
©
S a b o ta g e , e s p io n a g e
E a rth q u a k e s
H u rric a n e s
©
a n d e rro rs
Lack o f k n o w le d g e
a n d a w a re n e s s
0
0
0
0
0 ,
0
I
Copyright © by E C - G t n c i. All Rights Reserved. Reproduction is Strictly Prohibited.
I n
f o
r m
a
t i o
n
S
e c u r it y
T
h r e a t s
I n f o r m a t io n s e c u r ity t h r e a t s a re b r o a d ly c la s s ifie d in t o t h r e e c a te g o r ie s , as fo llo w s :
N
a tu r a l T h r e a ts
N a tu ra l th re a ts
an y n a tu re -c re a te d
in c lu d e
n a tu r a l d is a s te rs s u c h as e a rth q u a k e s , h u rric a n e s , flo o d s , o r
d is a s te r th a t c a n n o t b e s to p .
In fo rm a tio n
dam age
o r lo s t d u e t o
n a tu ra l
t h r e a t s c a n n o t b e p r e v e n t e d a s n o o n e k n o w s in a d v a n c e t h a t t h e s e t y p e s o f t h r e a t s w i l l o c c u r .
H o w e ve r, yo u
can
im p le m e n t a fe w
s a fe g u a r d s a g a in s t n a tu r a l d is a s te rs b y a d o p t in g d is a s te r
r e c o v e r y p la n s a n d c o n t in g e n c y p la n s .
P h y s ic a l
S e c u r it y
T h r e a ts
P h y s ic a l t h r e a t s m a y i n c lu d e lo s s o r d a m a g e o f s y s t e m
th e ft,
and
p h y s ic a l
im p a c t.
P h y s ic a l
im p a c t o n
d a m a g e , e ith e r in te n tio n a lly o r u n in te n tio n a lly .
reso u rce s
can
re s o u rc e s t h r o u g h fire , w a te r ,
be
due
to
a c o llis io n
o r o th e r
S o m e t im e s , p o w e r m a y a ls o d a m a g e h a r d w a r e
use d to s to re in fo rm a tio n .
H u m
a n
Hum an
Module 01 Page 22
T h r e a ts
th re a ts
in c lu d e th re a ts o f a tta c k s p e r fo r m e d
by b o th
in s id e rs a n d
o u ts id e rs .
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
In s id e r a tta c k s
a tta c k s
re fe r to
a tta c k e rs
p o s tu re
re fe r to
can
o f th e
a tta c k s
be
th e
Exam 312-50 Certified Ethical Hacker
a tta c k s
p e rfo rm e d
p e rfo rm e d
by
b ig g e s t t h r e a t
in fo rm a tio n
to
by
d is g ru n tle d
m a lic io u s
p e o p le
in fo rm a tio n
s y s te m , w h ile
or
m a lic io u s
n o t w ith in
s y s te m
th e
as t h e y
o u ts id e r a tta c k e rs a p p ly
e m p lo y e e s .
O u ts id e r
o rg a n iz a tio n .
m ay
know
th e
In s id e r
s e c u rity
m a n y tr ic k s s u c h as s o c ia l
e n g in e e r in g t o le a rn t h e s e c u rity p o s tu r e o f t h e in f o r m a t io n s y s te m .
Module 01 Page 23
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
I n
4r
f o
r m
a
t i o
Exam 312-50 Certified Ethical Hacker
n
S
e c u r it y
T
h r e a t s
( C
o n t ’ d )
K ir
H u m a n t h r e a t s c a n b e f u r t h e r c la s s ifie d in t o t h r e e t y p e s , as f o llo w s :
N
‫״‬
by
e tw
o r k
T h r e a ts
A n e t w o r k is d e f i n e d
c o m m u n ic a tio n
fro m
c h a n n e ls
to
as t h e
s h a re
c o lle c tio n
reso u rce s
o f c o m p u te rs a nd o th e r h a rd w a re
and
in fo rm a tio n .
As th e
c o n n e c te d
in fo rm a tio n
tra v e ls
o n e c o m p u te r to th e o th e r th r o u g h th e c o m m u n ic a tio n c h a n n e l, a m a lic io u s p e rs o n m a y
b re a k in to th e
c o m m u n ic a tio n
c h a n n e l a n d s te a l th e
in fo rm a tio n
tra v e lin g o v e r th e
n e tw o rk .
T h e a tta c k e r ca n im p o s e v a rio u s th re a ts o n a ta r g e t n e tw o r k :
0
In fo rm a tio n g a th e rin g
0
S n iffin g a n d e a v e s d r o p p in g
0
S p o o fin g
0
S e s s io n h ija c k in g a n d m a n - i n - t h e - m i d d le a tta c k s
0
SQL in je c tio n
0
A R P P o is o n in g
0
P a s s w o rd -b a s e d a tta c k s
Module 01 Page 24
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
©
D e n ia l o f s e rv ic e a tta c k
©
C o m p ro m is e d -k e y a tta c k
vL
H o s t T h r e a ts
H o s t t h r e a t s a re d ir e c te d a t a p a r tic u la r s y s te m o n w h ic h v a lu a b le in f o r m a t io n re s id e s .
A tta c k e rs
try
to
b re a ch
th e
s e c u rity
o f th e
in fo rm a tio n
s y s te m
re so u rce . T he
fo llo w in g
a re
p o s s ib le th r e a t s t o t h e h o s t:
0
M a lw a re a tta c k s
0
T a rg e t F o o tp rin tin g
0
P a s s w o rd a tta c k s
0
D e n ia l o f s e rv ic e a tta c k s
0
A rb itra ry c o d e e x e c u tio n
©
U n a u th o riz e d access
©
P riv ile g e e s c a la tio n
0
B a ck d o o r A tta c k s
©
P h y s ic a l s e c u r it y t h r e a t s
A
p p lic a t io n
If th e
p a rtic u la r
a tta c k s .
p ro p e r
a p p lic a tio n ,
A tta c k e rs
ta k e
T h r e a ts
s e c u rity
th e
m e a su re s
a p p lic a tio n
a d v a n ta g e
of
a re
m ig h t
be
not
c o n s id e re d
v u ln e ra b le
v u ln e ra b ilitie s
to
p re se n t
d u rin g
d iffe re n t
in
th e
d e v e lo p m e n t
ty p e s
of
th e
o f a p p lic a tio n
a p p lic a tio n
to
s te a l
or
d a m a g e t h e in f o r m a t io n . T h e f o llo w in g a re p o s s ib le th r e a t s t o t h e a p p lic a tio n :
©
D a ta /In p u t v a lid a tio n
©
A u th e n tic a tio n a n d A u th o riz a tio n a tta c k s
©
C o n fig u ra tio n m a n a g e m e n t
©
In f o r m a t io n d is c lo s u re
©
S e s s io n m a n a g e m e n t is s u e s
©
B u f f e r o v e r f l o w is s u e s
0
C ry p to g ra p h y a tta c k s
0
P a ra m e te r m a n ip u la tio n
0
Im p r o p e r e r r o r h a n d lin g a n d e x c e p tio n m a n a g e m e n t
0
A u d it in g a n d lo g g in g is s u e s
Module 01 Page 25
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
CEH
In fo r m a tio n W a rfa re
T h e te r m in fo r m a t io n w a rfa re o r In fo W a r re fe rs to th e u se o f in f o r m a t io n a n d c o m m u n ic a tio n
te c h n o lo g ie s (IC T) to ta k e c o m p e titiv e a d v a n ta g e s o v e r an o p p o n e n t
t
\
D e fe n s iv e I n f o r m a t io n W a r fa r e
(
O ffe n s iv e I n f o r m a t io n W a r fa r e
It refers to all stra te g ie s an d a c tio n s to
It refers to in fo rm a tio n w a rfa re th a t involves
d e fe n d a g a in s t a tta c k s o n ICT assets
a tta c k s a g a in s t ICT assets o f an o p p o n e n t
\
D e fe n s iv e W a rfa re
a.
Prevention
Deterrence
Alerts
Detection
Emergency
Preparedness
Response
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
%
I n
f o
The
r m
te rm
a
t i o
n
W
in fo rm a tio n
a r f a r e
w a rfa re
or
In fo W a r
re fe rs
to
th e
use
of
in fo rm a tio n
and
c o m m u n i c a t i o n t e c h n o l o g i e s (IC T ) t o t a k e c o m p e t i t i v e a d v a n t a g e s o v e r a n o p p o n e n t .
D e f e n s i v e I n f o r m a t i o n W a r f a r e : It r e f e r s t o a ll s t r a t e g i e s a n d a c t i o n s t o d e f e n d a g a i n s t a t t a c k s
o n IC T a s s e t s .
O ffe n s iv e
In fo rm a tio n
W a rfa re :
It r e f e r s t o
in fo rm a tio n
w a rfa re
t h a t in v o lv e s a tta c k s a g a in s t
IC T a s s e t s o f a n o p p o n e n t .
D e fe n s iv e W a r fa r e
O ffe n s iv e W a r fa r e
P reve ntion
D ete rren ce
A le rts
D ete ctio n
Em ergency
Preparedness
Response
FIGURE 1.2: D e fe n s iv e a n d O ffe n s iv e W a rfa re D ia g ra m
Module 01 Page 26
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
CEH
IP v 6 S e c u r ity T h r e a ts
A u to C o n f ig u r a t io n T h r e a t s
IPv6 enables auto-configuration o f IP networks, which may leave user
vulnerable to attacks if the netw ork is not configured properly and securely
from the very beginning
U n a v a ila b ilit y R e p u ta tio n - b a s e d P r o t e c t io n
Current security solutions use reputation o f IP addresses to filte r ou t
known sources o f malware; vendors w ill take tim e to develop reputationbased protection fo r IPv6
I n c o m p a t ib ilit y o f L o g g in g S y s te m s
IPv6 uses 128-bit addresses, which are stored as a 39-digit string whereas
IPv4 addresses stored in a 15-character field; logging solutions designed for
IPv4 may not w ork on IPv6 based networks
Rate Limiting Problem
Administrators use rate lim itin g strategy to slow down the automated attack
tool; however, it is impractical to rate lim it at the 128-bit address level
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
I P
v 6
S
e c u r it y
C o m p a re d
to
T
h r e a t s
IP v4 , IP v 6 h a s a n
im p ro v e d
le v e l o f s e c u rity a n d c o n f id e n t ia lit y f o r t h e
s e c u rity
m e c h a n is m
in fo rm a tio n tra n s fe rre d
th a t a ssu re s a h ig h e r
o v e r a n e tw o rk .
H o w e v e r,
I P v 6 is s t i l l v u l n e r a b l e . I t s t i l l p o s s e s s e s i n f o r m a t i o n s e c u r i t y t h r e a t s t h a t i n c l u d e :
A u to
C
o n f ig u r a t io n
T h r e a ts
IP v 6 e n a b le s a u t o - c o n f ig u r a t io n
o f IP n e t w o r k s , w h i c h
m a y le a v e
u s e r v u ln e ra b le to
a t t a c k s i f t h e n e t w o r k is n o t c o n f i g u r e d p r o p e r l y a n d s e c u r e l y f r o m t h e b e g i n n i n g .
U
n a v a ila b ilit y
C u rre n t
s e c u rity
R e p u ta tio n - b a s e d
s o lu tio n s
use
th e
P r o te c tio n
re p u ta tio n
of
IP a d d r e s s e s
to
filte r
out
know n
s o u r c e s o f m a l w a r e ; v e n d o r s w i l l t a k e t i m e t o d e v e l o p r e p u t a t i o n - b a s e d p r o t e c t i o n f o r IP v 6 .
e
5
.—
I n c o m
.
IP v 6
p a t ib ilit y
uses
a d d re s s e s a re s to re d
1 2 8 -b it
o f L o g g in g
a d d re s se s,
w h ic h
S y s te m
a re
s to re d
s
as
a
3 9 -d ig it
s trin g ,
w h e re a s
IP v 4
in a 1 5 - c h a r a c t e r f i e l d ; lo g g in g s o l u t i o n s d e s i g n e d f o r IP v 4 m a y n o t w o r k
o n IP v6 -b a se d n e tw o rk s .
Module 01 Page 27
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
R a te
L im
Exam 312-50 Certified Ethical Hacker
it in g
A d m in is tra to rs
P r o b le m
use a ra te
lim itin g s tra te g y to
s lo w
down
th e
a u to m a te d
a tta c k to o l;
h o w e v e r , i t is i m p r a c t i c a l t o r a t e l i m i t a t t h e 1 2 8 - b i t a d d r e s s l e v e l .
Module 01 Page 28
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
IP v 6 S e c u r ity T h r e a ts
q e
( C o n t ’d )
(•itifwtf
|
\\
ttfciu! Nm Im
C o m p le x ity o f N e tw o r k
M anagem ent Tasks
D e fa u lt IP v 6
A c tiv a tio n
<M>
IPv6 may be activated w ith o u t
ad m in is tra to r's know ledge, which w ill
leave IPv4-based security controls
ineffective
A dm inistrators may a d o p t easy-torem em b er addresses (::10,::20,::FOOD,
::C 5 C 0 o r simply IPv4 last o cte t fo r dual
stack) leading to potential vulnerability
N 4 <r
*‫־־‬
±3
t±
O v e r lo a d in g o f P e r im e te r
S e c u r it y C o n t r o ls
C o m p l e x i t y in V u l n e r a b i l i t y
A ssessm ent
IPv6 has a 40-byte fixed header w ith an addon "extension header" tha t may be chained,
which require a complex processing by various
security controls systems such as routers,
security gateways, firewalls and IDSes
OO
IPv6's 128-bit address space makes
active scanning o f in fra stru ctu re fo r
unauthorized o r vulnerable systems
m ore com plex
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
I P
v 6
S
e c u r it y
T
h r e a t s
( C
o n t ’ d )
Y o u m a y a ls o f in d t h e f o l l o w i n g t h r e a t s w h e n u s in g IP v6 :
D
e fa u lt
IP v 6
A c t iv a t io n
IP v 6 m a y b e a c t iv a t e d
w ith o u t th e
a d m in is tr a to r's
k n o w le d g e , w h ic h
w ill le a v e IP v 4 -
b a se d s e c u rity c o n tro ls in e ffe c tiv e .
[1
- j
‫ם‬
C
o m
p le x it y
A d m in is tra to rs
o f N
m ay
e tw
o r k
adopt
M
a n a g e m
e n t
e a s y -to -re m e m b e r
T a s k s
a d d re s s e s
(: : 1 0 , : : 2 0 , : :
fo o d
,
c 5 c o o r s im p ly IP v 4 la s t o c t e t f o r d u a l s ta c k ) le a d in g t o a p o te n tia l v u ln e r a b ility .
C
c— ‫* ־‬
o m
p le x it y
in
V
u ln e r a b ilit y
A s s e s s m
e n t
I P v 6 ‫׳‬s 1 2 8 - b i t a d d r e s s s p a c e m a k e s a c t i v e s c a n n i n g o f i n f r a s t r u c t u r e f o r u n a u t h o r i z e d
o r v u ln e ra b le s y s te m s m o r e c o m p le x .
O
v e r lo a d in g
IP v 6
c h a in e d ,
o f P e r im
has a 4 0 -b y te
w h ic h
re q u ire s
fix e d
c o m p le x
e te r
S e c u r it y
h e a d e r w ith
p ro c e s s in g
an
by
C
a d d -o n
v a rio u s
o n tr o ls
" e x te n s io n
s e c u rity
h e a d e rs"
c o n tro ls
th a t
s y s te m s
m ay
be
such
as
r o u t e r s , s e c u r i t y g a t e w a y s , f i r e w a l l s , a n d ID S .
Module 01 Page 29
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
IP v 6 S e c u r ity T h r e a ts
EH
( C o n t ’d )
tthKJl IlMkM
IPv4 to IPv6 Translation Issu e s
T ra n sla tin g IPv4 tra ffic to IPv6 m ay re s u lt in a p o o r im p le m e n ta tio n and m ay p ro v id e
a p o te n tia l a tta c k v e c to r
S e c u r i t y I n f o r m a t i o n a n d E v e n t M a n a g e m e n t ( S I E M ) P r o b le m s
Every IPv6 h o s t can have m u ltip le IPv6 addresses s im u lta n e o u sly, w h ic h leads to
c o m p le x ity o f log o r e ve n t c o rre la tio n
Denlal-of-Servlce (DOS)
O ve rlo a d in g o f n e tw o rk s e c u rity and c o n tro l devices can s ig n ific a n tly re d u ce th e
a v a ila b ility th re s h o ld o f n e tw o rk resources le a d in g to DoS attacks
Trespassing
IPv6's ad vanced n e tw o rk disco ve ry fe a tu re s can be e x p lo ite d by attackers tra v e rs in g
th ro u g h y o u r n e tw o rk an d accessing th e re s tric te d resources
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
I P
v 6
S
e c u r it y
T
h r e a t s
( C
o n t ’ d )
W W W
T h e f o l l o w i n g IP v 6 s e c u r it y t h r e a t s c a n a ls o c a u s e s e r i o u s d a m a g e t o y o u r n e t w o r k :
a
IP v 4
to
IP v 6
T r a n s la t io n
Is s u e s
T r a n s l a t i n g IP v 4 t r a f f i c t o IP v 6 m a y r e s u l t in p o o r i m p l e m e n t a t i o n
a n d m a y p ro v id e a
p o te n tia l a tta c k v e c to r.
S e c u r it y
M
P r o b le m
I n f o r m
a t io n
a n d
E v e n t
M
a n a g e m
e n t
(S IE M
)
s
E v e r y IP v 6 h o s t c a n h a v e m u l t i p l e
IP v 6 a d d r e s s e s s im u l t a n e o u s l y , w h i c h le a d s t o c o m p l e x i t y o f
lo g o r e v e n t c o r r e la tio n .
D
e n ia l- o f- s e r v ic e
O v e rlo a d in g
of
n e tw o rk
(D O S )
s e c u rity
and
c o n tro l
d e v ic e s
can
s ig n ific a n tly
re d u ce
th e
a v a ila b ility th r e s h o ld o f n e t w o r k re s o u rc e s , le a d in g t o D oS a tta c k s .
T r e s p a s s in g
IP v 6 's a d v a n c e d
n e tw o rk
d is c o v e ry fe a tu r e s
can
be e x p lo ite d
by a tta c k e rs
w ho
can
tra v e rs e th ro u g h y o u r n e tw o rk a n d access th e re s tric te d re s o u rc e s .
Module 01 Page 30
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
CEH
F lo w
(•rtifwd
itkitjl
^ ‫ י ^יי ייי‬H a c k in g
P hases
In fo rm a tio n S e c u r ity
T ypes of
A tta c k s
C o n tro ls
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
M
o
d u l e
F
lo w
S o f a r w e h a v e d is c u s s e d i n f o r m a t i o n s e c u r i t y , its t h r e a t s a n d a t t a c k v e c t o r s . N o w w e
w ill d is c u s s h o w a n a t t a c k e r c o m p r o m i s e s i n f o r m a t i o n s e c u r it y w i t h t h e h e lp o f a t t a c k v e c t o r s .
|~ U
In fo r m a tio n S e c u rity O v e r v ie w
H a c k in g P h a se s
In fo r m a tio n S e c u rity T h re a ts
* - . .
|
T yp e s o f A tta c k s
Eel------^
a n d A tta c k V e c to rs
H a c k in g C o n c e p ts
L
^
‫־‬
In fo r m a tio n S e c u rity C o n tro ls
T h is s e c tio n w ill f a m ilia r iz e y o u w i t h t h e c o n c e p t o f e th ic a l h a c k in g , h o w it d iffe r s f r o m
h a c k in g ,
t h e e f f e c t s o f h a c k in g a c t iv it ie s o n b u s in e s s , a n d d i f f e r e n t c la s s e s o f a t t a c k e r s .
Module 01 Page 31
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
H a c k in g v s . E th ic a l H a c k in g
J
H a c k in g re fe rs t o e x p lo it in g s y s te m v u ln e r a b ilit ie s a n d
c o m p r o m is in g s e c u r it y c o n t r o ls t o g a in u n a u th o r iz e d o r
in a p p r o p r ia t e a c c e ss t o t h e s y s te m re s o u rc e s
J
It in v o lv e s m o d if y in g s y s te m o r a p p lic a t io n f e a t u r e s t o
a c h ie v e a g o a l o u ts id e o f t h e c r e a to r 's o r ig in a l p u rp o s e
J
E th ic a l h a c k in g in v o lv e s t h e u se o f h a c k in g to o ls , tr ic k s ,
a n d te c h n iq u e s t o i d e n t i f y v u ln e r a b ilit ie s so as t o
e n s u re s y s te m s e c u r ity
J
It fo c u s e s o n s im u la tin g te c h n iq u e s u s e d b y a tta c k e rs t o
v e r if y t h e e x is te n c e o f e x p lo it a b le v u ln e r a b ilit ie s in
t h e s y s te m s e c u r ity
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
H
-
— ‫״‬
a c k i n g
v s .
E
t h
i c a
l
H
a c k i n g
M o s t p e o p le d o n o t u n d e rs ta n d th e d iffe re n c e
These tw o
p e rfo rm in g
te rm s
can
h a c k in g
be d iffe re n tia te d
a c tiv ity .
H o w e ve r,
o n th e
b e tw e e n
b a s is o f t h e
u n d e rs ta n d in g
th e
h a c k in g a n d e th ic a l h a c k in g .
in te n tio n s
tru e
o f th e
in te n tio n s
p e o p le
of
h a cke rs
w ho
can
a re
be
q u ite d iffic u lt.
H
a c k in g
H a c k in g
c o n tro ls
to
m o d ify in g
re fe rs
g a in
to
e x p lo itin g
u n a u th o riz e d
s y s te m
or
or
a p p lic a tio n
s y s te m
in a p p ro p ria te
fe a tu re s
to
v u ln e ra b ilitie s
access
a c h ie v e
to
th e
a goal
and
c o m p ro m is in g
s y s te m
o u ts id e
reso u rce s.
o f th e
It
c r e a to r 's
s e c u rity
in v o lv e s
o rig in a l
p u rp o se .
E t h ic a l H
E th ic a l
v u ln e ra b ilitie s
a c k in g
h a c k in g
so as to
in v o lv e s th e
e n s u re
s y s te m
use
o f h a c k in g to o ls ,
s e c u rity .
It f o c u s e s
tric k s , a n d
on
te c h n iq u e s to
s im u la tin g
te c h n iq u e s
id e n tify
used
by
a t t a c k e r s t o v e r i f y t h e e x i s t e n c e o f e x p l o i t a b l e v u l n e r a b i l i t i e s in t h e s y s t e m s e c u r i t y .
Module 01 Page 32
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
E f f e c t s o f H a c k i n g o n B u s in e s s
CEH
U rtifM
IthKJl lUckM
According to the Symantec 2012 State of information survey,
information costs businesses worldwide $1.1 trillio n annually
Theft of customers' personal inform ation may risk the
business's reputation and invite lawsuits
Hacking can be used to steal, pilfer, and redistribute
intellectual property leading to business loss
Botnets can be used to launch various types of DoS and
other web-based attacks, which may lead to business
down-time and significant loss of revenues
Attackers may steal corporate secrets and sell them
to competitors, compromise critical financial
I
information, and leak information to rivals
I
C o m p r o m is e In f o r m a t io n
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
E
f f e c t s
o
A c c o rd in g
to
f
H
a c k i n g
th e
o n
S y m a n te c
B
2012
u s in e s s
S ta te
of
In fo rm a tio n
su rve y,
in fo rm a tio n
c o s ts
b u s in e s s e s w o r l d w i d e $ 1 . 1 t r i l l i o n a n n u a l l y . E v e r y b u s in e s s m u s t p r o v i d e s t r o n g s e c u r i t y f o r its
c u s t o m e r s ; o t h e r w i s e t h e b u s in e s s m a y p u t its r e p u t a t i o n a t s ta k e a n d m a y e v e n fa c e la w s u it s .
A tta c k e rs
use
h a c k in g
b u s in e s s e s a n d
in t u r n
te c h n iq u e s
to
to
s te a l,
p ilfe r,
and
m a k e fin a n c ia l g a in . A tta c k e r s
re d is trib u te
in te lle c tu a l
p ro p e rty
m a y p r o fit, b u t th e v ic tim 's
of
b u s in e s s
m u s t f a c e h u g e f i n a n c i a l lo s s e s a n d m a y e v e n lo s e its r e p u t a t i o n .
O n c e a n a t t a c k e r g a in s c o n t r o l o v e r t h e u s e r 's s y s t e m , h e o r s h e c a n a c c e s s a ll t h e f ile s t h a t a r e
s to re d
on
th e
c o m p u te r,
in c lu d in g
p e rs o n a l
or
c o rp o ra te
fin a n c ia l
in fo rm a tio n ,
c re d it
ca rd
n u m b e r s , a n d c l i e n t o r c u s t o m e r d a t a s t o r e d o n t h a t s y s t e m . If a n y s u c h i n f o r m a t i o n fa lls i n t o
th e
w ro n g
hands,
O rg a n iz a tio n s
m ust
c u s to m e r d a ta
and
it
m ay
p ro v id e
c re a te
a
chaos
s tro n g
its u p c o m i n g
in
s e c u rity
th e
to
n o rm a l
its
fu n c tio n in g
c ritic a l
re le a s e s o r id e a s . If t h e
d a ta
of
in fo rm a tio n
is a l t e r e d
an
o rg a n iz a tio n .
s o u rce s
c o n ta in in g
o r s to le n , a c o m p a n y
m a y lo s e c r e d i b i l i t y a n d t h e t r u s t o f its c u s t o m e r s . In a d d i t i o n t o t h e p o t e n t i a l f i n a n c i a l lo s s t h a t
m a y o c c u r , t h e lo s s o f i n f o r m a t i o n m a y c a u s e a b u s in e s s t o lo s e a c r u c ia l c o m p e t i t i v e a d v a n t a g e
o v e r its riv a ls . S o m e t i m e s a t t a c k e r s u s e b o t n e t s t o la u n c h v a r i o u s t y p e s o f D o S a n d o t h e r w e b b a s e d a tta c k s . T h is c a u s e s t h e t a r g e t b u s in e s s s e rv ic e s t o g o d o w n , w h ic h
in t u r n
m a y le a d t o
lo s s o f r e v e n u e s .
Module 01 Page 33
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
T he re
a re
K n o w le d g e
m any
th in g s
th a t
b u s in e s s e s
can
do
to
p ro te c t
th e m s e lv e s
is a k e y c o m p o n e n t i n a d d r e s s i n g t h i s i s s u e . A s s e s s m e n t o f t h e
b u s in e s s a n d
how
p o in t o f v ie w . O n e
occur
Exam 312-50 Certified Ethical Hacker
when
a
a tta c k s c o u ld
does
com pany
th e ir
v ic tim iz e d
be
a s e c u rity e x p e rt to
by
an
e m p o w e r in g e m p lo y e e s to fa c ilita te p r o te c tio n
a tta c k e r.
By
re c o g n iz e
th e
u n d e rs ta n d in g
a s s e ts .
ris k p r e v a l e n t in a
p o t e n t i a l l y a f f e c t t h a t b u s i n e s s is p a r a m o u n t f r o m
n o t have to
is
and
a s e c u rity
dam age
th e
th a t can
p ro b le m
a g a in s t a tta c k s , t h e c o m p a n y w o u ld
and
b e a b le t o
d e a l w i t h a n y s e c u r it y is s u e s as t h e y a ris e .
Module 01 Page 34
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
CEH
W h o Is a H a c k e r?
E x c e lle n t C o m p u te r S k ills
H obby
Intelligent individuals w ith excellent
com puter skills, w ith the ability to
create and explore into the
For some hackers, hacking is a
hobby to see how many
com puters o r networks they
com pute r's softw a re and hardw are
can com prom ise
D o I lle g a l T h in g s
M a lic io u s I n t e n t
Some do hacking w ith malicious intent behind
th e ir escapades, like stealing business data,
Their inte ntion can eith er be to
gain know ledge or to poke
credit card info rm atio n, social security
around to do illegal things
numbers, em ail passwords, etc.
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
W
A
h o
I s
a
hacker
a u th o r iz a tio n
to
is a
H
a c k e r ?
p e rs o n
d e s tro y ,
s te a l
w ho
ille g a lly
s e n s itiv e
b re a k s
d a ta ,
in to
o r p e rfo rm
a
s y s te m
m a lic io u s
or
n e tw o rk
a tta c k s .
w ith o u t
H a c k e rs
any
m ay
be
m o tiv a te d b y a m u ltitu d e o f re a s o n s :
©
In te llig e n t
in d iv id u a ls
w ith
e x c e lle n t
c o m p u te r
s k ills ,
w ith
th e
a b ility
to
c re a te
and
e x p lo re th e c o m p u te r 's s o ftw a r e a n d h a r d w a r e
Q
F o r s o m e h a c k e r s , h a c k i n g is a h o b b y t o s e e h o w m a n y c o m p u t e r s o r n e t w o r k s t h e y c a n
c o m p ro m is e
0
T h e ir i n t e n t i o n c a n e i t h e r b e t o g a in k n o w l e d g e o r t o p o k e a r o u n d d o in g ille g a l th in g s
0
Som e
hack
w ith
m a lic io u s
in te n t,
such
as
s te a lin g
b u s in e s s
d a ta ,
c re d it
c a rd
i n f o r m a t io n , s o c ia l s e c u r it y n u m b e r s , e m a il p a s s w o rd s , e tc .
Module 01 Page 35
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
H a c k e r C la s s e s
C EH
*‫י־‬
es
A
C5
B la c k H a t s
#
O
&
G ra y H a ts
S u ic id e H a c k e r s
Individuals w ith
extra ord ina ry com puting
Individuals professing
hacker skills and using
W h i t e H a ts
Individuals w ho w ork both
offensively and defensively
skills, resorting to m alicious
o r d estructive activitie s and
them fo r defensive
purposes and are also
at various tim es
are also k now n as crackers
know n as security analysts
Individuals w ho aim to
bring d ow n critical
infrastructure fo r a "cause”
and are not w orried about
facing jail term s o r any
o the r kind o f punishm ent
&
AA
S ta te S p o n s o re d
H a c k e rs
Individuals em ployed by
the o rganization to
Individuals w ith w ide range
o f skills, m o tivated by
penetrate and gain trade
secrets o f the com p e tito r
religious or p o litica l beliefs
to create fear by large-scale
d isrup tion o f com puter
netw orks
Individuals em ployed by the
governm ent to penetrate
and gain top-secret
inform ation and to damage
inform ation systems of
other governm ents
S py H a c k e rs
An unskilled hacker w ho
com prom ises system by
running scripts, tools, and
softw are d eveloped by real
hackers
a
C y b e r T e r r o r is ts
S c r i p t K id d ie s
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
H
a c k e r
C
la s s e s
H a c k e rs a re m a i n l y d iv id e d i n t o e ig h t c la s s e s :
B la c k
H a ts
B la c k h a ts a re in d iv id u a ls w i t h
e x t r a o r d i n a r y c o m p u t i n g s k ills , r e s o r tin g t o
m a lic io u s
o r d e s t r u c t i v e a c t iv it ie s a n d a r e a ls o k n o w n as c r a c k e r s . T h e s e i n d iv id u a ls m o s t l y u s e t h e i r s k ills
f o r o n l y d e s t r u c t i v e a c t iv it ie s , c a u s in g h u g e lo s s e s f o r c o m p a n i e s as w e ll as in d iv id u a ls . T h e y u s e
t h e i r s k ills in f i n d i n g v u l n e r a b i l i t i e s in t h e v a r i o u s n e t w o r k s i n c l u d i n g d e f e n s e a n d g o v e r n m e n t
w e b s ite s ,
b a n k in g
and
fin a n c e ,
e tc . S o m e
do
it t o
cause
d a m a g e , s te a l
in fo rm a tio n ,
d e s tro y
d a ta , o r e a r n m o n e y e a s ily b y h a c k in g ID s o f b a n k c u s to m e r s .
~
‫“יי‬
W
*
h ite
W h ite
H a ts
h a ts
p u rp o s e s ; th e y
s e c u rity
a re
a re
a n a ly s ts
to
a ls o
in d iv id u a ls
known
d e fe n d
w ho
h a c k in g
s k ills
as s e c u r it y a n a ly s ts . T h e s e
th e ir
s y s te m s
c o m p a n ie s s e c u re th e ir n e tw o rk s fr o m
Module 01 Page 36
possess
a g a in s t
th e
and
days,
m a lic io u s
use
th e m
a lm o s t e v e ry
a tta c k s .
fo r
d e fe n s iv e
com pany
W h ite
h a ts
has
h e lp
o u ts id e in tru d e rs .
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
*
G
r a y
G ray
Exam 312-50 Certified Ethical Hacker
H a ts
h a ts a re th e
tim e s . G r a y h a ts fa ll
in d iv id u a ls w h o
b e tw e e n
w h ite
v a rio u s v u ln e ra b ilitie s o f a s y s te m
and
w o rk
b o th
o ffe n s iv e ly
b la c k h a ts . G ra y h a ts
o r n e tw o rk and a t th e
and
d e fe n s iv e ly
m ig h t h e lp
sa m e tim e
S u ic id e
b y fin d in g
h e lp v e n d o r s t o
p r o d u c ts ( s o ftw a r e o r h a rd w a r e ) b y c h e c k in g lim ita tio n s a n d m a k in g t h e m
S u ic id e
h a c ke rs
a t v a rio u s
im p ro v e
m o r e s e c u re , e tc .
H a c k e r s
h a c ke rs
a re
"c a u s e " a n d a re n o t w o r rie d
in d iv id u a ls
w ho
a im
to
b rin g
down
c ritic a l
in fra s tru c tu re
fo r
a
a b o u t f a c i n g 3 0 y e a r s in ja i l f o r t h e i r a c t io n s . S u ic id e h a c k e r s a r e
c lo s e ly r e la t e d t o s u ic id e b o m b e r s , w h o s a c rific e t h e i r life f o r t h e a t t a c k a n d a re n o t c o n c e r n e d
w i t h t h e c o n s e q u e n c e s o f t h e i r a c t io n s . T h e r e h a s b e e n a r is e in c y b e r t e r r o r i s m
* jr
S c r ip t
S c rip t
to o ls ,
and
in r e c e n t y e a r s .
K id d ie s
k id d ie s
s o ftw a re
a re
th e
u n s k ille d
d e v e lo p e d
by
rea l
h a c k e rs
w ho
c o m p ro m is e
h a c k e rs . T h e y
u tiliz e
s y s te m s
s m a ll,
b y ru n n in g
e a s y -to -u s e
s c rip ts ,
p ro g ra m s
or
s c r ip ts as w e ll as d is t in g u is h e d t e c h n i q u e s t o f in d a n d e x p lo it t h e v u ln e r a b ilit ie s o f a m a c h in e .
S c rip t k id d ie s u s u a lly fo c u s o n t h e q u a n t it y o f a tta c k s r a t h e r t h a n t h e q u a lity o f t h e a tta c k s t h a t
th e y in itia te .
S p y
H
a c k e r s
S py h a c k e rs a re
g a in t r a d e s e c re ts o f t h e
in d iv id u a ls w h o
a re
e m p lo y e d
b y an o rg a n iz a tio n
c o m p e t it o r . T h e s e in s id e rs c a n ta k e
to
a d v a n ta g e o f th e
p e n e tra te
and
p riv ile g e s t h e y
ha ve to hack a s y s te m o r n e tw o rk .
C
y b e r
T e r r o r is t s
C y b e r t e r r o r is ts c o u ld
th a t have
la rg e -s c a le
a w id e
ra n g e
d is ru p tio n
be p e o p le , o rg a n iz e d g ro u p s fo rm e d
o f s k ills ,
m o tiv a te d
b y re lig io u s o r p o litic a l
o f c o m p u t e r n e t w o r k s . T h is t y p e
b y t e r r o r is t o rg a n iz a tio n s ,
b e lie fs , t o
o f h a c k e r is m o r e
c re a te
fe a r
by
d a n g e ro u s as th e y
ca n h a c k n o t o n ly a w e b s ite b u t w h o le In te r n e t zo n e s.
m
S ta te
S p o n s o r e d
S ta te s p o n s o re d
H a c k e r s
h a c k e rs a re
in d iv id u a ls e m p lo y e d
by th e g o v e rn m e n t to
p e n e tra te
a n d g a in t o p - s e c r e t in f o r m a t io n a n d t o d a m a g e i n f o r m a t i o n s y s te m s o f o t h e r g o v e r n m e n t s .
Module 01 Page 37
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
CEH
H a c k tiv is m
J
Hacktivism is an act o f
pro m o tin g a p o litica l agenda
It remains a fact, however,
th a t gaining unauthorized
access is a crim e, no m atter
w hat th e inte ntion is
by hacking, especially by
defacing o r disabling websites
J
It thrives in th e en vironm ent
w here info rm atio n is easily
Hacktivism is m otivated by
revenge, political o r social
reasons, ideology,
vandalism, protest, and a
desire to h u m iliate victim s
accessible
Aims at sending a message
through th e ir hacking activities
and gaining visibility fo r th e ir
cause
Comm on targets include
go vernm ent agencies,
m u ltin a tio n a l corpora tions, or
any o th e r e n tity perceived as
bad or w rong by these groups
or individuals
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
H
a
c k t i v i s m
H a c k tiv is m
is
an
act
of
p ro m o tin g
a
p o litic a l
agenda
by
h a c k in g ,
e s p e c ia lly
by
d e f a c i n g o r d i s a b l i n g w e b s i t e s . T h e p e r s o n w h o d o e s t h e s e t h i n g s is k n o w n a s a h a c k t i v i s t .
©
H a c k t i v i s m t h r i v e s i n a n e n v i r o n m e n t w h e r e i n f o r m a t i o n is e a s i l y a c c e s s i b l e
Q
It a im s t o s e n d a m e s s a g e t h r o u g h h a c k in g a c t iv it ie s a n d g a in v is ib ilit y f o r a c a u s e .
Q
C o m m o n ta r g e ts in c lu d e g o v e r n m e n t a g e n c ie s , m u ltin a t io n a l c o r p o r a tio n s , o r a n y o t h e r
e n t it y p e rc e iv e d as " b a d " o r " w r o n g " b y th e s e g ro u p s o r in d iv id u a ls .
©
I t r e m a i n s a f a c t , h o w e v e r , t h a t g a i n i n g u n a u t h o r i z e d a c c e s s is a c r i m e , n o m a t t e r w h a t
t h e i n t e n t i o n is.
Q
H a c k tiv is m
is m o t i v a t e d
by
revenge,
p o lit ic a l o r s o c ia l
re a s o n s , id e o lo g y , v a n d a lis m ,
p ro te s t, a n d a d e s ire t o h u m ilia te v ic tim s .
Module 01 Page 38
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
CEH
F lo w
(•rtifwd
H a c k in g
T ypes of
A tta c k s
P hases
itkitjl
In fo rm a tio n S e c u r ity
C o n tro ls
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
5 5
M
o
d u l e
In t h e
F
lo w
p re v io u s s e c tio n , y o u
le a rn e d a b o u t v a rio u s h a c k in g c o n c e p ts . N o w
it's t i m e t o
d is c u s s t h e h a c k i n g m e t h o d . H a c k in g c a n n o t b e a c c o m p l i s h e d in a s in g le a c t i o n . It n e e d s t o
be
d o n e in p h a s e s . T h e i n f o r m a t i o n g a t h e r e d o r t h e p r i v i l e g e s g a i n e d in o n e p h a s e c a n b e u s e d in
t h e n e x t p h a s e f o r a d v a n c in g t h e p ro c e s s o f h a c k in g .
In fo r m a tio n S e c u rity O v e rv ie w
[ p s ^ j_
H a c k in g P h a s e s
‫־‬
>
In fo r m a tio n S e c u rity T h re a ts
T yp e s o f A tta c k s
a n d A tta c k V e c to rs
»
H a c k in g C o n c e p ts
In fo r m a tio n S e c u rity C o n tro ls
T h i s s e c t i o n lis ts a n d d e s c r i b e s v a r i o u s p h a s e s i n v o l v e d in h a c k i n g .
Module 01 Page 39
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
H a c k in g P h a s e s
_l
CEH
Reconnaissance refers to th e p re p a ra to ry phase w h e re an a tta cke r
seeks to g a th e r in fo rm a tio n a b o u t a ta rg e t p rio r to laun ching an
attack
J
Could be th e fu tu re p o in t o f re tu rn , no ted fo r ease o f e n try fo r an
attack w hen m o re a b o u t th e ta rg e t is kn o w n on a broad scale
-l
Reconnaissance ta rg e t range m ay include th e ta rg e t organization's
clients, em ployees, op eratio ns, n e tw o rk, and systems
R e c o n n a is s a n c e T y p e s
P a s s iv e R e c o n n a is s a n c e
M a in t a in in g
A ccess
C le a r in g
T ra c k s
A c tiv e R e c o n n a is s a n c e
Passive reconnaissance involves
acquiring inform ation w ithou t
directly interacting w ith the target
s
Active reconnaissance involves
interacting w ith the target directly by
any means
For example, searching public
records or news releases
s
For example, telephone calls to the
help desk or technical departm ent
I
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
H
a c k i n g
P
h a s e s
T h e v a r i o u s p h a s e s i n v o l v e d in h a c k i n g a r e :
©
R e c o n n a is s a n c e
Q
S c a n n in g
Q
G a in in g A cc e s s
Q
M a in ta in in g Access
©
C le a rin g T ra c k s
R e c o n n a is s a n c e
R e c o n n a is s a n c e
in fo rm a tio n
re fe rs to th e
p re p a ra to ry
as p o s s ib le a b o u t t h e t a r g e t p r io r t o
phase w h e re
la u n c h in g th e
a n a tta c k e r g a th e r s as m u c h
a t t a c k . A ls o in t h i s p h a s e , t h e
a t t a c k e r d r a w s o n c o m p e t it iv e in t e llig e n c e t o le a r n m o r e a b o u t t h e t a r g e t . T h is p h a s e m a y a ls o
in v o lv e n e t w o r k s c a n n in g , e it h e r e x te rn a l o r in te rn a l, w i t h o u t a u th o r iz a tio n .
T h i s is t h e p h a s e t h a t a l l o w s t h e p o t e n t i a l a t t a c k e r t o s t r a t e g i z e h i s o r h e r a t t a c k . T h i s m a y t a k e
s o m e t im e as th e a tta c k e r w a its t o u n e a r th c ru c ia l in fo r m a tio n . P a rt o f th is re c o n n a is s a n c e m a y
Module 01 Page 40
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
in v o lv e
" s o c ia l
Exam 312-50 Certified Ethical Hacker
e n g in e e rin g ."
A
s o c ia l
e n g in e e r
is
a
p e rs o n
w ho
s m o o th -ta lk s
p e o p le
in to
re v e a lin g in fo r m a t io n s u c h as u n lis te d p h o n e n u m b e r s , p a s s w o rd s , a n d o t h e r s e n s itiv e d a ta .
A n o th e r
re c o n n a is s a n c e
lo o k in g t h r o u g h
th e
te c h n iq u e
is
"d u m p s te r
d iv in g ."
a n o r g a n iz a tio n 's tr a s h f o r d is c a rd e d
In te rn e t to o b ta in
D u m p s te r
s e n s itiv e
d iv in g
is t h e
p ro ce ss
of
in fo rm a tio n . A tta c k e rs can use
in f o r m a t io n s u c h as e m p lo y e e 's c o n t a c t in f o r m a t io n , b u s in e s s p a r tn e r s ,
t e c h n o l o g i e s in u s e , a n d o t h e r c r i t i c a l b u s i n e s s k n o w l e d g e , b u t " d u m p s t e r d i v i n g " m a y p r o v i d e
th e m
w ith
even
m o re
s e n s itiv e
in fo rm a tio n
s ta te m e n ts , b a n k s ta te m e n ts , A T M
such
as
u s e rn a m e s ,
p a ssw o rd s,
s lip s , s o c ia l s e c u r it y n u m b e r s , t e l e p h o n e
c re d it
ca rd
n u m b e r s , a n d so
o n . T h e r e c o n n a is s a n c e t a r g e t ra n g e m a y in c lu d e t h e t a r g e t o r g a n iz a tio n 's c lie n ts , e m p lo y e e s ,
o p e ra tio n s , n e tw o rk s , a n d s y s te m s .
F o r e x a m p le ,
a W h o is
n a m e s , a n d c o n ta c ts .
d a ta b a s e
can
p ro v id e
in fo rm a tio n
about
In te rn e t
a d d re sse s,
If a p o t e n t i a l a t t a c k e r o b t a i n s D N S i n f o r m a t i o n f r o m
d o m a in
t h e r e g i s t r a r , a n d is
a b le t o a c c e s s it, h e o r s h e c a n o b t a i n u s e fu l i n f o r m a t i o n s u c h as t h e m a p p i n g o f d o m a i n n a m e s
t o IP a d d r e s s e s , m a i l s e r v e r s , a n d h o s t i n f o r m a t i o n
r e c o r d s . I t is i m p o r t a n t t h a t a c o m p a n y h a s
a p p r o p r i a t e p o lic ie s t o p r o t e c t its i n f o r m a t i o n a s s e ts , a n d a ls o p r o v id e g u id e lin e s t o its u s e rs o f
th e s a m e . B u ild in g u s e r a w a re n e s s o f th e
p r e c a u t i o n s t h e y m u s t t a k e in o r d e r t o
p ro te c t th e ir
i n f o r m a t i o n a s s e t s is a c r i t i c a l f a c t o r i n t h i s c o n t e x t .
R e c o n n a is s a n c e
‫׳^־־־״‬
R e c o n n a is s a n c e
T y p e s
te c h n iq u e s
can
be
c a te g o riz e d
b ro a d ly
in to
a c tiv e
and
p a s s iv e
re c o n n a is s a n c e .
W hen
does
an a tta c k e r a p p ro a c h e s th e
not
in te ra c t w ith
th e
a t ta c k u s in g p a s s iv e
s y s te m
d ire c tly . T h e
re c o n n a is s a n c e te c h n iq u e s , h e o r she
a tta c k e r
uses
p u b lic ly
a v a ila b le
in fo rm a tio n ,
s o c ia l e n g in e e r in g , a n d d u m p s t e r d iv in g as a m e a n s o f g a t h e r in g i n f o r m a t i o n .
W hen
th e
a n a tta c k e r e m p lo y s a c tiv e
s y s te m
by
u s in g
to o ls
to
re c o n n a is s a n c e te c h n iq u e s ,
d e te c t
open
p o rts ,
he o r sh e trie s to
a c c e s s ib le
h o s ts ,
ro u te r
in te ra c t w ith
lo c a tio n s ,
n e tw o rk
m a p p in g , d e ta ils o f o p e r a tin g s y s te m s , a n d a p p lic a tio n s .
The
next
e x p e rts
phase
do
d iffe re n c e
o f a tta c k in g
n o t d iffe re n tia te
as
s c a n n in g
is s c a n n i n g ,
w h ic h
s c a n n in g f r o m
in v o lv e s
m o re
is d i s c u s s e d
a c tiv e
in -d e p th
in
th e
re c o n n a is s a n c e .
p ro b in g
on
th e
fo llo w in g
s e c tio n .
H o w e v e r, th e re
p a rt
of
th e
Som e
is a s l i g h t
a tta c k e r.
O fte n
r e c o n n a i s s a n c e a n d s c a n n i n g p h a s e s o v e r l a p , a n d i t is n o t a l w a y s p o s s i b l e t o d e m a r c a t e t h e s e
p h a s e s as w a t e r t ig h t c o m p a r tm e n ts .
A c tiv e
re c o n n a is s a n c e
is
u s u a lly
e m p lo y e d
when
th e
a tta c k e r
d is c e rn s
th a t
th e re
is
a
lo w
p r o b a b ility t h a t th e s e re c o n n a is s a n c e a c tiv itie s w ill b e d e te c te d . N e w b ie s a n d s c rip t k id d ie s a re
o ft e n f o u n d a t t e m p t in g th is t o g e t fa s te r, v is ib le re s u lts , a n d s o m e tim e s ju s t f o r t h e b ra g v a lu e
th e y can o b ta in .
As
an
e th ic a l
m e th o d s ,
and
h a ck e r,
be
you
a b le
C o m p a n ie s , f o r t h e ir
to
p a rt,
o p e ra tio n a l s tra te g y , a n d
m ust
be
a d v o c a te
a b le
to
d is tin g u is h
p re v e n tiv e
m e a su re s
m u s t a d d re s s s e c u rity as a n
be e q u ip p e d
w ith
am ong
in
th e
th e
in te g ra l
p r o p e r p o lic ie s a n d
v a rio u s
lig h t
of
re c o n n a is s a n c e
p o te n tia l
p a rt o f th e ir
p ro ce d u re s to
th re a ts .
b u s in e s s a n d / o r
check fo r such
a c tiv itie s .
Module 01 Page 41
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
H a c k in g P h a s e s
CEH
( C o n t ’d )
P re -A tta c k P h a s e
Scanning refers to the pre-attack phase when the attacker
scans th e n e tw o rk fo r specific info rm atio n on the basis o f
info rm atio n gathered during reconnaissance
P o rt S c a n n e r
ML
Scanning can include use o f dialers, p o rt scanners, netw ork
mappers, ping tools, vulne rab ility scanners, etc.
E x tr a c t In fo rm a tio n
Attackers extract info rm atio n such as live machines, port,
p o rt status, OS details, device type, system up tim e, etc.
to launch attack
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
H
a c k i n g
P
h a s e s
( C
o n t ’ d )
S c a n n in g
S c a n n in g
a tta c k e r
uses
S c a n n in g
can
th e
be
is w h a t a n
d e ta ils
a tta c k e r does
g a th e re d
c o n s id e re d
a
d u rin g
lo g ic a l
p rio r to
a tta c k in g
re c o n n a is s a n c e
e x te n s io n
(and
to
th e
n e tw o rk .
id e n tify
o v e rla p )
o f th e
In s c a n n in g , t h e
s p e c ific
a c tiv e
v u ln e ra b ilitie s .
re c o n n a is s a n c e .
O fte n a tta c k e r s u se a u t o m a t e d to o ls s u c h as n e t w o r k / h o s t s c a n n e rs a n d w a r d ia le rs t o lo c a te
s y s te m s a n d a t t e m p t t o d is c o v e r v u ln e ra b ilitie s .
A n a t ta c k e r c a n g a th e r c ritic a l n e t w o r k
in fo rm a tio n
s u c h as th e
m a p p in g o f s y s te m s , ro u te rs ,
a n d f ir e w a lls b y u s in g s im p le t o o ls s u c h as T r a c e r o u t e . A lt e r n a t iv e ly , t h e y c a n u s e t o o ls s u c h as
C h e o p s t o a d d s w e e p in g fu n c tio n a lity a lo n g w ith w h a t T ra c e ro u te re n d e rs .
P o rt sca n n ers
can
be
used
to
d e te c t
lis te n in g
p o rts
to
fin d
in fo rm a tio n
a b o u t th e
n a tu re
of
s e r v i c e s r u n n i n g o n t h e t a r g e t m a c h i n e . T h e p r i m a r y d e f e n s e t e c h n i q u e i n t h i s r e g a r d is t o s h u t
down
s e rv ic e s t h a t a re
m e c h a n is m .
H o w e ve r,
n o t re q u ire d . A p p r o p r ia te
a tta c k e rs
can
s till
use
filte rin g
to o ls
to
m a y a ls o b e a d o p t e d
d e te rm in e
th e
ru le s
as a d e fe n s e
im p le m e n te d
fo r
filte rin g .
The
m o s t c o m m o n ly
used
to o ls
a re v u ln e ra b ility s c a n n e rs th a t can
se a rch fo r se v e ra l k n o w n
v u ln e r a b ilit ie s o n a t a r g e t n e t w o r k , a n d c a n p o t e n t i a l l y d e t e c t t h o u s a n d s o f v u ln e r a b ilit ie s . T h is
g iv e s t h e a t t a c k e r t h e a d v a n ta g e o f t i m e
Module 01 Page 42
b e c a u s e h e o r s h e o n ly h a s t o f in d a s in g le m e a n s o f
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
e n tr y w h ile th e s y s te m s p ro fe s s io n a l has t o s e c u re m a n y v u ln e ra b le a re a s b y a p p ly in g p a tc h e s .
O rg a n iz a tio n s
th a t
d e p lo y
in tru s io n
d e te c tio n
s y s te m s
(ID S e s )
s till
have
re a so n
to
w o rry
b e c a u s e a t t a c k e r s c a n u s e e v a s io n t e c h n i q u e s a t b o t h t h e a p p l i c a t i o n a n d n e t w o r k le v e ls .
Module 01 Page 43
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
H a c k in g P h a s e s
CEH
( C o n t ’d )
■
R econn‫־‬
a is s a n c e
‫מ‬
A *
Gaining access refers to the point where the attacker
obtains access to the operating system or applications on
the computer or network
The attacker can gain access at the operating system level,
application level, or network level
n
The attacker can escalate privileges to obtain complete
control of the system. In the process, intermediate systems
that are connected to it are also compromised
a
Examples include password cracking, buffer overflows,
denial of service, session hijacking, etc.
J
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
H
a c k i n g
G
I e|
P
h a s e s
a in in g
( C
o n t ’ d )
A c c e s s
G a i n i n g a c c e s s is t h e m o s t i m p o r t a n t p h a s e o f a n a t t a c k i n t e r m s o f p o t e n t i a l d a m a g e .
G a in in g a cce ss re fe rs t o th e p o in t w h e r e th e a tta c k e r o b ta in s a cce ss t o th e o p e r a tin g s y s te m o r
a p p lic a tio n s o n t h e c o m p u t e r o r n e t w o r k . T h e a t t a c k e r c a n g a in a c c e s s a t t h e o p e r a t in g s y s te m
le v e l,
a p p lic a tio n
g a in in g
le v e l,
access in to
s y s te m , th e
or
n e tw o rk
a ta rg e t s y s te m
s k ill le v e l o f t h e
le v e l.
F a c to rs t h a t
in c lu d e
th e
in flu e n c e
a rc h ite c tu re
p e rp e tra to r, and th e
e s c a la te
p riv ile g e s t o
and
chances
o f an
c o n fig u ra tio n
a tta c k e r
o f th e
ta rg e t
in itia l le v e l o f a c c e s s o b t a in e d . T h e a tta c k e r
in itia lly t r ie s t o g a in m in im a l a c c e s s t o t h e t a r g e t s y s te m
access, h e o r sh e trie s to
th e
o b ta in
o r n e t w o r k . O n c e h e o r s h e g a in s t h e
c o m p le te
c o n tro l o f th e
s y s t e m . In t h e
p ro c e s s , i n t e r m e d i a t e s y s te m s t h a t a re c o n n e c t e d t o it a re a ls o c o m p r o m i s e d .
A tta c k e r s n e e d n o t a lw a y s g a in a c c e s s t o t h e s y s te m t o c a u s e d a m a g e . F o r in s ta n c e , d e n ia l- o fs e rv ic e a tta c k s ca n e ith e r e x h a u s t re s o u rc e s o r s to p s e rv ic e s f r o m
S to p p in g o f s e rv ic e c a n
b e c a rrie d
o u t b y k illin g
ru n n in g o n th e ta rg e t s y s te m .
p ro c e s s e s , u s in g a l o g i c / t i m e
b o m b , o r even
r e c o n fig u r in g a n d c ra s h in g t h e s y s te m . R e s o u rc e s ca n b e e x h a u s te d lo c a lly b y fillin g u p o u tg o in g
c o m m u n i c a t i o n lin k s .
The
e x p lo it
E x a m p le s
can
occur
in c lu d e
Module 01 Page 44
lo c a lly ,
s ta c k -b a s e d
o fflin e ,
b u ffe r
over
a
LAN
o v e rflo w s ,
or
th e
In te rn e t
d e n ia l-o f-s e rv ic e ,
as
a
d e c e p tio n
and
s e s s io n
or
th e ft.
h ija c k in g .
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
A tta c k e r s u s e a t e c h n iq u e c a lle d s p o o fin g t o e x p lo it t h e s y s te m b y p r e t e n d in g t o b e s tr a n g e r s o r
d iffe r e n t s y s te m s . T h e y can use th is te c h n iq u e to s e n d a m a lfo r m e d
th e
s to p
ta rg e t s y s te m
a v a ila b ility
of
in o r d e r t o
th e
e x p lo it v u ln e ra b ility .
e s s e n tia l
s e rv ic e s .
S m u rf
p a c k e t c o n ta in in g a b u g to
P a cke t flo o d in g
a tta c k s
try
to
m ay
e lic it
be
a
used to
response
re m o te ly
fro m
th e
a v a ila b le u s e rs o n a n e t w o r k a n d t h e n use t h e ir le g itim a te a d d re s s t o flo o d th e v ic tim .
Module 01 Page 45
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
H a c k in g P h a s e s
CEH
( C o n t ’d )
M
M a in ta in in g access refers to th e phase w h e n th e a tta cke r trie s to
re ta in his o r h e r o w n e rs h ip o f th e system
£
A ttackers m ay p re ve n t th e system fro m being o w n e d by o th e r
attackers by securing th e ir exclusive access w ith Backdoors,
R ootKits, o r Trojans
A ttackers can u p lo ad, d o w n lo a d , o r m a n ip u la te da ta, a p p lica tio n s,
and c o n fig u ra tio n s on th e o w n e d system
&
A ttackers use th e co m p ro m ise d system to launch fu r th e r attacks
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
H
a c k i n g
P
h a s e s
( C
o n t ’ d )
= r\
M
a in t a in in g
A c c e s s
O n c e a n a t t a c k e r g a in s a c ce ss t o
b o th
th e
s y s te m
and
its
re so u rce s
and
e x p lo it o th e r s y s te m s , o r to k e e p a lo w
a c tio n s
can
dam age
th e
o rg a n iz a tio n .
th e ta rg e t s y s te m , th e
fu rth e r
use th e
s y s te m
a tta c k e r can ch o o se to
as a la u n c h
pad
to
scan
use
and
p ro file a n d c o n tin u e e x p lo itin g th e s y s te m . B o th th e s e
F o r in s ta n c e ,
th e
a tta c k e r can
im p le m e n t
a s n iffe r to
c a p t u r e a ll n e t w o r k t r a f f i c , i n c l u d i n g t e l n e t a n d f t p s e s s io n s w i t h o t h e r s y s t e m s .
A tta c k e rs ,
w ho
choose
to
re m a in
u n d e te c te d ,
re m o ve
e v id e n c e
of
th e ir
e n try
b a c k d o o r o r a T r o ja n t o g a in r e p e a t a c c e s s . T h e y c a n a ls o in s ta ll r o o t k i t s a t t h e
g a in
super
u se r access. T he
re a so n
b e h in d
th is
is t h a t
ro o tk its
g a in
access
and
use
a
k e rn e l le v e l to
at th e
o p e ra tin g
s y s t e m le v e l w h i le a T r o ja n h o r s e g a in s a c c e s s a t t h e a p p lic a t io n le v e l. B o th r o o t k it s a n d T r o ja n s
d e p e n d o n u s e rs t o in s ta ll t h e m . W i t h i n W i n d o w s s y s te m s , m o s t T r o ja n s in s ta ll t h e m s e lv e s as a
s e rv ic e a n d ru n as lo c a l s y s te m , w h ic h h a s a d m in is t r a t iv e a cce ss.
A tta c k e rs
can
use
T ro ja n
h o rs e s
to
tra n s fe r
user
nam es,
p a ssw o rd s,
and
even
c re d it
c a rd
in f o r m a t io n s to re d o n th e s y s te m . T h e y c a n m a in ta in c o n tr o l o v e r t h e ir s y s te m f o r a lo n g t im e
b y " h a rd e n in g " th e
s y s te m
a g a in s t o t h e r a t t a c k e r s , a n d s o m e t i m e s , in t h e
s o m e d e g re e o f p ro te c tio n to th e s y s te m fr o m
p ro ce ss, d o r e n d e r
o th e r a tta c k s . T h e y can th e n use th e ir access to
s te a l d a t a , c o n s u m e C PU c y c le s , a n d t r a d e s e n s it iv e i n f o r m a t i o n o r e v e n r e s o r t t o e x t o r t i o n .
Module 01 Page 46
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
O rg a n iz a tio n s
d e te c t
can
in tru d e rs .
use
The
Exam 312-50 Certified Ethical Hacker
in tru s io n
la tte r
d e te c tio n
th o u g h
is
not
s y s te m s
or
d e p lo y
re c o m m e n d e d
h o n e y p o ts
u n le s s
th e
and
h o n e y n e ts
o rg a n iz a tio n
has
to
th e
r e q u ir e d s e c u r ity p r o fe s s io n a l t o le v e ra g e t h e c o n c e p t f o r p r o t e c t io n .
Module 01 Page 47
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
H a c k in g P h a s e s
( C o n t ’d )
C o v e rin g tra c k s
The attacker's
T h e a tta c k e r
re fe rs t o th e
in te n tio n s include:
o v e r w r ite s th e
a c tiv itie s c a rrie d
C ontin uing access to th e
s e rv e r, s y s te m , a n d
victim 's system.
o u t b y a n a tta c k e r
a p p lic a tio n lo g s to
re m a in in g u n n o tic e d
to h id e m a lic io u s
a v o id s u s p ic io n
and un caugh t, d e le tin g
a c ts
evidence th a t m igh t
►
►*
lead to his prosecutio n
©
O
‫ם‬
Clearing
Tracks
H
a c k i n g
C
E
P
h a s e s
le a r in g
An
( C
o n t ’ d )
T r a c k s
a tta c k e r w o u ld
lik e t o
d e s tro y e v id e n c e
o f h is o r h e r p r e s e n c e a n d
a c tiv itie s fo r
v a rio u s re a s o n s s u c h as m a in ta in in g a cce ss a n d e v a d in g p u n itiv e a c tio n . T ro ja n s s u c h as ps o r
n e t c a t c o m e in h a n d y f o r a n y a t t a c k e r w h o w a n t s t o d e s t r o y t h e e v i d e n c e f r o m
re p la c e th e s y s te m
assum ed
to
d e s ig n e d t o
have
th e
lo g file s o r
b i n a r i e s w i t h t h e s a m e . O n c e t h e T r o j a n s a r e in p la c e , t h e a t t a c k e r c a n b e
g a in e d
h id e th e
to ta l
c o n tro l
o f th e
s y s te m .
R o o tk its
a re
a u to m a te d
to o ls
th a t
a re
p r e s e n c e o f t h e a t t a c k e r . B y e x e c u t i n g t h e s c r ip t, a v a r i e t y o f c r itic a l file s
a r e r e p l a c e d w i t h T r o j a n n e d v e r s i o n s , h i d i n g t h e a t t a c k e r in s e c o n d s .
O t h e r t e c h n i q u e s i n c l u d e s t e g a n o g r a p h y a n d t u n n e l i n g . S t e g a n o g r a p h y is t h e p r o c e s s o f h i d i n g
t h e d a t a , f o r i n s t a n c e in i m a g e s a n d s o u n d f i le s . T u n n e l i n g t a k e s a d v a n t a g e o f t h e t r a n s m i s s i o n
p r o t o c o l b y c a r r y i n g o n e p r o t o c o l o v e r a n o t h e r . E v e n t h e e x t r a s p a c e ( e .g ., u n u s e d b i t s ) in t h e
TCP a n d
IP h e a d e r s c a n
co ve r to
la u n c h fre s h
be
u s e d f o r h id in g
in fo rm a tio n . A n
a tta c k e r can
use th e
s y s te m
as a
a tta c k s a g a in s t o t h e r s y s te m s o r u s e it as a m e a n s o f r e a c h in g a n o t h e r
s y s te m o n th e n e t w o r k w i t h o u t b e in g d e te c te d . T h u s , th is p h a s e o f a tta c k c a n tu r n
in to a n e w
c y c l e o f a t t a c k b y u s in g r e c o n n a i s s a n c e t e c h n i q u e s a ll o v e r a g a in .
T he re
have
been
in s ta n c e s
w h e re
an
a tta c k e r
has
lu rk e d
on
a
s y s te m
even
as
s y s te m
a d m in is t r a t o r s h a v e c h a n g e d . T h e s y s te m a d m in is t r a t io n c a n d e p lo y h o s t - b a s e d ID S e s a n d a n ti-
Module 01 Page 48
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
v iru s
to o ls
th a t
can
e th ic a l h a c k e r, y o u
you
a re
a b le
to
Exam 312-50 Certified Ethical Hacker
d e te c t T ro ja n s
m u s t be a w a re
a d v o c a te
and
and
o th e r
s e e m in g ly
b e n ig n
file s
and
d ire c to rie s .
As
an
o f th e to o ls a n d te c h n iq u e s th a t a tta c k e rs d e p lo y , so th a t
ta k e
c o u n te rm e a s u re s
to
e n s u re
p ro te c tio n .
These
w ill
be
d e t a i l e d in s u b s e q u e n t m o d u l e s .
Module 01 Page 49
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
CEH
F lo w
(•rtifw l
H a c k in g
Typos of
A tta c k s
P hases
itk itjl
In fo rm a tio n S e c u r ity
C o n tro ls
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
M
o
d u l e
F
lo w
So fa r w e d is c u s s e d h o w
i m p o r t a n t i t is f o r a n o r g a n i z a t i o n t o k e e p t h e i r i n f o r m a t i o n
re s o u rc e s s e c u re , v a rio u s s e c u rity th r e a t s a n d a tta c k v e c to rs , h a c k in g c o n c e p ts , a n d t h e h a c k in g
p h a s e s . N o w it's t im e t o e x a m in e t h e t e c h n i q u e s o r t h e t y p e o f a t ta c k s t h e a t t a c k e r a d o p t s t o
h a ck a s y s te m o r a n e tw o rk .
In fo r m a tio n S e c u rity O v e rv ie w
H a c k in g P h a s e s
‫־‬
>
In fo r m a tio n S e c u rity T h re a ts
O
—
T yp e s o f A tta c k s
a n d A tta c k V e c to rs
»
H a c k in g C o n c e p ts
In fo r m a tio n S e c u rity C o n tro ls
T h is s e c tio n c o v e r s v a r io u s t y p e s o f a tta c k s s u c h as o p e r a t i n g s y s t e m
a tta c k s a n d a p p lic a tio n -
le v e l a tta c k s .
Module 01 Page 50
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
T y p e s o f A tta c k s o n a S y s te m
J
A t t a c k e r s e x p lo i t v u l n e r a b i li t i e s in a n i n f o r m a t io n s y s te m
€5
t o g a in u n a u t h o r iz e d a c c e s s t o t h e s y s te m r e s o u r c e s
J
T h e u n a u t h o r iz e d a c c e s s m a y r e s u lt in lo s s , d a m a g e o r
5® .
t h e f t o f s e n s it iv e i n f o r m a t io n
IIIIIIIIIIIIIIIIIIII
T y p e s o f A tta c k s
I
O p e ra tin g S ystem A tta c k s
III
A p p lic a tio n Level A tta c k s
11
M is c o n fig u r a tio n A tta cks
IV
S h rin k W ra p C ode A tta cks
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
T y p e s
o
f A
t t a c k s
o n
a
S
y s t e m
T h e r e a re s e v e ra l w a y s a n a t t a c k e r c a n g a in a c c e s s t o a s y s te m . T h e a t t a c k e r m u s t b e
a b le t o e x p l o i t a w e a k n e s s o r v u l n e r a b i l i t y in a s y s t e m :
©
O p e ra tin g s y s te m
a tta c k s : A tta c k e rs se a rc h fo r OS v u ln e ra b ilitie s
a n d e x p lo it th e m
to
g a in a c c e s s t o a n e t w o r k s y s te m .
Q
A p p lic a tio n -le v e l a tta c k s : S o ftw a re
fe a tu re s .
T he re
is
a
d e a rth
of
a p p lic a tio n s c o m e
tim e
to
p e rfo rm
w ith
m y ria d
c o m p le te
fu n c tio n a litie s
te s tin g
b e fo re
and
r e le a s in g
p ro d u c ts . T h o s e a p p lic a tio n s h a v e v a rio u s v u ln e ra b ilitie s a n d b e c o m e a s o u rc e o f a tta c k .
0
M is c o n fig u ra tio n
a tta c k s :
M ost
a d m in is tra to rs
d o n 't
have
th e
ne ce ssary
s k ills
to
m a i n t a i n o r f ix is s u e s , w h i c h m a y le a d t o c o n f i g u r a t i o n e r r o r s . S u c h c o n f i g u r a t i o n e r r o r s
m a y b e c o m e th e s o u rc e s fo r an a tta c k e r to e n te r in to th e ta rg e t's n e tw o r k o r s y s te m .
Q
S h rin k w r a p c o d e a tta c k s : O p e ra tin g s y s te m
s c rip ts
to
m ake
th e
jo b
of
a d m in is tra to r
a p p lic a tio n s c o m e w it h
easy,
but
th e
sam e
n u m e ro u s s a m p le
s c rip ts
have
v a rio u s
v u ln e r a b ilit ie s , w h ic h c a n le a d t o s h r in k w r a p c o d e a tta c k s .
Module 01 Page 51
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
O p e r a tin g S y s te m A tta c k s
v u ln e ra b ilitie s
Exploiting specific
protocol im ple m en tation s
O
Bugs in o p e ra tin g system
Attacking built-in
O
U npa tched o p e ra tin g
O
A ttackers search fo r
B u ffe r o v e rflo w
v u ln e ra b ilitie s in an
o p e ra tin g system's
design, in sta lla tio n or
CEH
a u th e n tica tio n systems
co n fig u ra tio n and
Breaking file-system
security
system
e x p lo it th e m to gain
access to a n e tw o rk
Cracking passwords and
en cryption mechanisms
system
G a in in g A c c e s s
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
O
p e
r a t i n
g
S
y s t e m
A
t t a c k s
T o d a y 's o p e r a tin g s y s te m s , w h ic h a re lo a d e d w it h fe a tu r e s , a re in c r e a s in g ly c o m p le x .
W h ile u se rs ta k e a d v a n ta g e o f th e s e fe a tu re s , th e s y s te m
e n tic in g
a tta c k e rs .
(G U Is ). T h e s e
O p e ra tin g
s u p p o rts th e
s y s te m s
use
t w e a k i n g is r e q u i r e d t o l o c k t h e m
run
o f p o rts
m any
and
is p r o n e t o m o r e v u l n e r a b i l i t i e s , t h u s
s e rv ic e s
m odes
such
o f access to
as
g ra p h ic a l
th e
user
In te rn e t, a nd
in te rfa c e s
e x te n s iv e
d o w n . A tta c k e r s a re c o n s ta n tly lo o k in g f o r O S v u ln e r a b ilit ie s
so t h a t t h e y c a n e x p lo it a n d g a in a c c e s s t o
n e tw o r k s y s te m s . T o s to p a tta c k e rs fr o m
th e ir n e tw o rk , th e s y s te m o r n e tw o r k a d m in is tr a to rs
e n te rin g
m u s tk e e p a b re a s t o f v a rio u s n e w e x p lo its
a n d m e th o d s a d o p te d by a tta c k e rs a n d m o n ito r th e ir n e tw o rk s c o n tin u o u s ly .
M o s t o p e r a t in g s y s te m s ' in s ta lla tio n p r o g r a m s in s ta ll a la rg e n u m b e r o f s e rv ic e s a n d o p e n p o r t s
b y d e f a u lt . T h is s it u a t io n
le a d s a t t a c k e r s t o s e a rc h f o r v a r io u s v u ln e r a b ilit ie s . A p p ly in g p a t c h e s
a n d h o t f i x e s is n o t e a s y w i t h t o d a y ' s c o m p l e x n e t w o r k s . M o s t p a t c h e s a n d f i x e s t e n d t o s o l v e
a n i m m e d i a t e is s u e , b u t t h e y c a n n o t b e c o n s id e r e d a p e r m a n e n t s o lu t io n .
S o m e OS v u ln e r a b ilitie s in c lu d e :
Q
B u ffe r o v e r f lo w v u ln e ra b ilitie s
©
B u g s in t h e o p e r a t i n g s y s t e m
©
U n p a tc h e d o p e ra tin g s y s te m s
Module 01 Page 52
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
A tta c k s p e r f o r m e d a t t h e O S le v e l in c lu d e :
Q
E x p lo itin g s p e c ific n e t w o r k p r o t o c o l i m p le m e n t a t io n s
Q
A tta c k in g b u ilt-in a u th e n tic a tio n s y s te m s
Q
B re a k in g file s y s te m s e c u rity
©
C ra c k in g p a s s w o r d s a n d e n c r y p t io n m e c h a n is m s
Module 01 Page 53
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
M is c o n fig u r a tio n A tta c k s
CEH
If a system is m is c o n fig u re d , such as a change is m ade in th e file perm ission,
it can no long er be considered secure
M is c o n fig u ra tio n v u ln e ra b ilitie s affect w eb servers, ap p lica tio n platform s,
databases, ne tw orks, o r fra m e w o rks th a t may re sult in illega l access o r
possible o w n in g o f th e system
The a d m in is tra to rs are expected to change th e c o n fig u ra tio n o f th e devices
be fore th e y are de ployed in th e n e tw o rk. Failure to do th is allow s th e d e fa u lt
settings to be used to attack th e system
In o rd e r to o p tim ize th e co n fig u ra tio n o f th e m achine, re m ove any
re d u n d a n t services o r s o ftw a re
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
M
i s c o
n
f i g
u
r a
t i o
n
A
t t a c k s
M is c o n fig u r a tio n v u ln e ra b ilitie s a ffe c t w e b s e rv e rs , a p p lic a tio n p la tfo rm s , d a ta b a s e s ,
n e t w o r k s , o r f r a m e w o r k s t h a t m a y r e s u l t in i l l e g a l a c c e s s o r p o s s i b l e o w n i n g o f t h e s y s t e m . If a
s y s t e m is m i s c o n f i g u r e d , s u c h a s w h e n a c h a n g e is m a d e i n t h e f i l e p e r m i s s i o n , i t c a n n o l o n g e r
b e c o n s id e re d
b e fo re th e y
s e c u re . A d m in is tra to r s a re e x p e c te d to c h a n g e th e c o n fig u r a tio n
a re
d e p lo y e d
in t h e
n e tw o rk .
F a ilu re t o
d o th is a llo w s th e
u s e d t o a t t a c k t h e s y s t e m . In o r d e r t o o p t i m i z e t h e c o n f i g u r a t i o n o f t h e
o f t h e d e v ic e s
d e fa u lt s e ttin g s t o
be
m a c h in e , r e m o v e a n y
r e d u n d a n t s e rv ic e s o r s o ftw a re .
Module 01 Page 54
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
A p p lic a tio n -L e v e l A tta c k s
0
CEH
0
A tta c k e rs e x p lo it th e v u ln e r a b ilitie s in a p p lic a tio n s r u n n in g o n
o r g a n iz a tio n s ' in fo r m a t io n s y s te m to g a in u n a u th o r iz e d a cce ss
a n d s te a l o r m a n ip u la te d a ta
0
0
0
0
0
0
P oor o r n o n e x is te n t e r ro r ch e c kin g
O th e r a p p lic a tio n -le v e l a ttacks
in a p p lic a tio n s leads to :
in clu d e :
9
Buffer overflow attacks
9 Sensitive inform ation disclosure
9 Cross-site scripting
9 Session hijacking and man-in-themiddle attacks
9
Denial-of-service attacks
9
Phishing
9
Session hijacking
9
Man-in-the-middle attack
9
Parameter/form tampering
9
Directory traversal attacks
9 SQL injection attacks
0
0
0
0
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
A
p
p
l i c a
t i o
A p p lic a tio n s a re
n
- l e
b e in g
v e
l
A
t t a c k s
re le a s e d
w ith
m ore
fe a tu re s and
m o re
c o m p le x c o d in g . W it h
t h i s in c r e a s e d d e m a n d in f u n c t i o n a l i t y a n d f e a t u r e s , d e v e l o p e r s g e n e r a l l y o v e r l o o k t h e s e c u r i t y
o f t h e a p p lic a t io n , w h i c h g iv e s ris e t o v u l n e r a b i l i t i e s in a p p lic a t io n s . A t t a c k e r s f in d a n d e x p l o i t
t h e s e v u l n e r a b i l i t i e s in t h e
a p p lic a tio n s u s in g d if f e r e n t t o o ls a n d t e c h n iq u e s . T h e a p p lic a tio n s
a re v u ln e ra b le to a tta c k b e c a u s e o f th e fo llo w in g re a so n s:
0
S o ftw a re d e v e lo p e rs h a v e t ig h t s c h e d u le s t o d e liv e r p ro d u c ts o n tim e
0
S o ftw a re a p p lic a tio n s c o m e w ith a m u lt it u d e o f fe a tu r e s a n d fu n c t io n a lit ie s
0
T h e r e is a d e a r t h o f t i m e t o p e r f o r m c o m p l e t e t e s t i n g b e f o r e r e l e a s i n g p r o d u c t s
0
S e c u r i t y is o f t e n a n a f t e r t h o u g h t , a n d f r e q u e n t l y d e l i v e r e d a s a n " a d d - o n " c o m p o n e n t
P o o r o r n o n e x i s t e n t e r r o r c h e c k i n g in a p p l i c a t i o n s le a d s t o :
0
B u ffe r o v e rflo w a tta c k s
0
A c tiv e c o n te n t
0
C ro s s -s ite s c r ip tin g
0
D e n ia l- o f-s e rv ic e a n d SYN a tta c k s
Module 01 Page 55
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Q
SQL in je c tio n a tta c k s
Q
M a lic io u s b o ts
Exam 312-50 Certified Ethical Hacker
O th e r a p p lic a tio n - le v e l a tta c k s in c lu d e :
Q
P h is h in g
©
S e s s io n h ija c k in g
e
M a n - in - th e - m id d le a tta c k s
e
P a ra m e te r/fo rm ta m p e rin g
0
D ir e c to r y tra v e rs a l a tta c k s
Module 01 Page 56
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
E x a m p le s o f A p p lic a t io n - L e v e l
A tta c k s
CEH
S e s s io n H ij a c k i n g
V u ln e ra b le C ode
S ecure Code
< configuration>
< configuration>
<system.web>
< s y s te m .w e b >
a u t h e n t ic a t io n mode="Forms">
a u t h e n t ic a t io n mode="Forn£3n>
The code can
be secured by
<forms c o o k i e l e s s = " U s e C o o k i e s " > using
Attacker may
exploit session
inform ation in
the vulnerable
code to perform
session hijacking
<forms co o k ie ie ss = "U se U ri"> ■
</system.web>
< /co nfig ura tion >
U s e C o o k ie s
</system.web>
instead of
U seU ri
< /co nfig uration >
D e n ia l- o f- S e r v ic e
S ecure Code
V u ln e ra b le C ode
S ta te m e n t stm n t ■ c o n n . c r e a te S ta te m e n t
< );
R e s u ltS e t r s l t s e t
< );
-
s tm n t .e x e c u t e Q u e r y
S ta te m e n t stm n t;
tr y
{ s tm n t ■ c o n n . c r e a t e S t a t e m e n t
s t m n t .e x e c u t e Q u e r y
s t m n t .c lo s e
();
fin a lly
();
)
{
I f (stmnt! « n u ll)
The code can
be secured by
releasing the
resources in a
finally block
{
t r y { stm n t.clo s e ();
The code below is vulnerable to denial-ofservice attack, as it fails to release
connection resource
i f
();
} c atch (SQLException sqlexp) { }
} c atch (SQLException sqlexp) { )
Note: For m o re in fo rm a tio n a b o u t a p p lica tio n v u ln e ra b ilitie s and h o w to fix th e m a tten d EC-Council's ECSP program
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
E
x a m
p le s
o
f A
S e s s io n
H
p
p
l i c a
t i o
n
- L
e
v e
l A
t t a c k s
ija c k in g
A tta c k e r s m a y e x p lo it s e s s io n in f o r m a t io n
in t h e v u l n e r a b l e c o d e t o
p e rfo rm
s e s s io n
h ija c k in g w h e n y o u e n a b l e c o o k ie le s s a u t h e n t i c a t i o n in y o u r a p p lic a t io n . W h e n t h e t a r g e t t r ie s
to
b ro w s e
in s te a d
th ro u g h
o f th e
a
s e cu re
URL,
th e
c o o k ie ,
s e s s io n
to
g iv e
or
a u th e n tic a tio n
access
to
th e
URL
to k e n
a p p e a rs
re q u e s te d
by
in
th e
th e
re q u e st
ta rg e t.
H e re,
URL
an
a t t a c k e r u s i n g h is o r h e r s k ills a n d m o n i t o r i n g t o o l s c a n h i j a c k t h e t a r g e t s s e s s io n a n d s t e a l a ll
s e n s itiv e in fo r m a tio n .
V u ln e ra b le C o d e
A t t a c k e r s m a y e x p lo it s e s s io n i n f o r m a t i o n
Module 01 Page 57
in t h e v u l n e r a b l e c o d e t o
p e rfo rm
s e s s io n h ija c k in g .
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
< c o n f ig u r a tio n >
< s y s te m .w e b >
< a u th e n t ic a tio n
4r 4
< fo rm s
m o d e = "F o rm s ">
c o o k ie le s s = " U s e U r i" >
< /s y s te m .w e b >
< /c o n fig u r a tio n >
TABLE 1.1: S ession H ija c k in g V u ln e ra b le C ode
S e cu re C ode
T h e c o d e c a n b e s e c u r e d b y u s in g U s e C o o k ie s in s t e a d o f U s e L J ri.
< c o n fig u r a tio n >
< s y s te m .w e b >
< a u th e n t ic a tio n
< fo rm s
m o d e = "F o rm s ">
c o o k ie le s s = " U s e C o o k ie s ">
< /s y s te m .w e b >
< /c o n f ig u r a tio n >
TABLE 1.2: S ession H ija c k in g S ecure C ode
D e n ia l- o f- S e r v ic e
V u ln e ra b le C o d e
The
code
th a t
fo llo w s
is
v u ln e ra b le
to
a
d e n ia l-o f-s e rv ic e
a tta c k ,
as
it
fa ils
to
re le a s e
a
c o n n e c tio n re s o u rc e .
S ta te m e n t
s tm n t =
c o n n . c re a te S ta te m e n t
();
R e s u lt S e t
r s lts e t
= s tm n t.e x e c u te Q u e ry
();
s t m n t.c lo s e
();
TABLE 1.3: D e n ia l-o f-S e rv ic e V u ln e ra b le C ode
S e cu re C ode
T h e c o d e c a n b e s e c u r e d b y r e l e a s in g t h e r e s o u r c e s in a f i n a l l y b lo c k .
Module 01 Page 58
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
1
S ta te m e n t s t m n t ;
2
try
3
s tm n t.e x e c u te Q u e r y
4
fin a lly
5
I f
6
try
7
}
c a tc h
( S Q L E x c e p t io n
s q le x p )
{
}
8
}
c a tc h
( S Q L E x c e p t io n
s q le x p )
{
}
{ s tm n t = c o n n .c r e a te S ta te m e n t
}
{
(s tm n t!
{
();
();
= n u ll)
s tm n t.c lo s e
{
();
TABLE 1.4: D e n ia l-o f-S e rv ic e S ecure C ode
Module 01 Page 59
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
S h r in k W r a p
C o d e
A tta c k s
C E H
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
l iiB
S h r in k W r a p
C o d e A tta c k s
W hen you install an O S /a p plicatio n , it comes w ith many sample scripts to make the
a d m in istra to r's life easy.
©
The problem is "n o t fin e tu n in g " or custom izing these scripts
Q
This w ill lead to d e fa u lt code or sh rin k w ra p code attacks
Code fo r sh rin k w ra p s code attacks
M o d u le 0 1 P ag e 60
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
01522
01523
01524
01525
01526
01527
01528
01529
01530
01531
01532
01533
01534
01535
01536
01537
01538
01539
01540
01541
01542
01543
01544
01545
01546
01547
01548
01549
01550
P iirtk F
D im
D l»
D u
D iik
1 w i» n (l« u ^ L
lQ u o t* C o u n t
lc o v n t
sC h ar
sP r« v C h a r
m ( B v V a l1 L m .\1 S trin g ) A t S tring
As Long
As Long
As Sc r in g
As S tr i n g
' S t e r t s 1* n t h R em i t
s L i n t ■ T r 1 » ( s L 1n • )
[
[
If
L « ft< s L 1n • ,
C l«& nU pL 1 n •
is
e com m ent
3) ■ "Ram* T h e n
■ "*
E x it F u n c tio n
E nd I f
' S ta r ts w ith ‘ i t i s 4
- II t L
L e*t tf t ( s L i n • , 1) ■ ■ ‫• י‬
C l*
l♦ *. n U p L 1 n • ‫י‬
tExxi ti t F u n c t i o n
E nd I f
com m ent
Th*n
' C o n t a i n s * m i y * re f m e
• body o f e s tr in g
~ I t I n S t r ( s L i n « , 0 < (‫ ־ * ־‬T h * n
s P r •v C h ax » ■ •
1 Q u o t•C o u n t ■ 0
-F o r
01552
01553
01554
»•
30
t+ s t
i f
l c o v n t ■ 1 To L « n ( s L 1 n • )
fC h » r ■ H1 d ( s L 1 n t , 1 c o u n t ,
1)
‫ י‬I f m
«v«nnum ber
fo u n d ‫ • י ״‬th e n e n
' m eens i t i s th e s t e r t o f
• p e rt o f e s tr in g
01 SSI
e
it
is
e
c o u m r( o r m
th e
o f "c h t r e c t e r s
m fr o n t
c o m m e n t .e n d
o d d n u m b e rM eans i t
xs
r‫־‬I f
s C h a r ■ ‫ ־ • ־‬A nd s P r « v C h * r • ‫ ־ ־‬T h « n
r I f 1 0 u o t« C o u n t n o d 2 » 0 T h e n
s L i n * ■ T r i a ( L « f t < sL 1 n « , l c o v n t - 1 ) )
E x it For
L ln d I f
- l l s « I f sC h ar ■ ‫ ־ ־ ־ ־‬T h e n
lQ u o t• C o u n t ■ lO u o t•C o u n t ♦ 1
L In d I f
sP ra v C h a r * *C har
N ax t 1c o u n t
1 En d I f
01555
01556
01557
01558
01559
01560
01561
01562
01563
01564
01565
01566
Exam 3 1 2 -5 0 C ertified Ethical H acker
C l« a n U p L ln « ■ s L l n •
In d F u n c tio n
FIGURE 1.3: S h rin k W ra p s C ode
M o d u le 0 1 P ag e 61
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
C E H
F lo w
(•rtifwd
^/‫—ייייי‬
Types o f
A tta cks
Hacking
Phases
itkitjl
Inform ation S ecurity
Controls
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
M o d u le
In the
flo w
previous
section,
we
discussed
how
an
a ttacker can
com prom ise
an
in fo rm a tio n system and w h a t type o f attacks an a ttacker can perform . Now, we w ill discuss
in fo rm a tio n se curity co n tro ls. In fo rm a tio n security co ntrols p re ve n t u n w a n te d events fro m
occurring and reduces the risk to the in fo rm a tio n assets o f the organization w ith se curity
policies.
In fo rm a tio n S ecurity O vervie w
Hacking Phases
In fo rm a tio n S ecurity Threats
and A tta ck V ectors
Types o f A ttacks
£‫—־‬
s '
f
Hacking Concepts
In fo rm a tio n S ecurity C ontrols
• * 5OL
This section highlights the im portance o f ethical hacking and discusses various se curity policies.
M o d u le 0 1 P ag e 62
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
W h y E t h ic a l H a c k in g
is N e c e s s a r y
To beat a hacker, you need to think like one!
E th ic a l h a c k in g is n e c e s s a ry b e c a u s e it a llo w s t h e c o u n te r in g o f a tta c k s
fr o m m a lic io u s h a c k e rs b y a n tic ip a tin g m e th o d s th e y can use to b re a k
in to a s y s te m
Ethical Hackers Try to Answer
the Following Questions
Reasons why Organizations
Recruit Ethical Hackers
To prevent hackers from gaining access to information
breaches
What can the intruder see on the target system?
(Reconnaissance and Scanning phases)
To fight against terrorism and national security
breaches
What can an intruder do with that information?
(Gaining Access and Maintaining Access phases)
To build a system that avoids hackers from
penetrating
Does anyone at the target notice the intruders'
attempts or successes? (Reconnaissance and
Covering Tracks phases)
To test if organization's security settings are in fact
secure
If all the components of information system are
adequately protected, updated, and patched
How much effort, time, and money is required to
obtain adequate protection?
|}>
Does the information security measures are in
compliance to industry and legal standards?
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
W h y E th ic a l H a c k in g
Is N e c e s s a ry
There is rapid g ro w th in technology, so th e re is g ro w th in the risks associated w ith the
technology. Ethical hacking helps to p re d ic t the various possible v u ln e ra b ilitie s w ell in advance
and re ctify the m w ith o u t incurring any kind o f attack fro m outsiders.
©
Ethical Hacking: As hacking involves creative thinking , v u ln e ra b ility te s tin g and se curity
audits cannot ensure th a t the n e tw o rk is secure.
Q
D efense-in-D epth S trategy:
To achieve this, organizations
need to
im p le m e n t a
"d e fe n s e -in -d e p th " strategy by p en e tratin g th e ir netw orks to e stim a te v u ln e ra b ilitie s
and expose them .
0
C ounter th e A ttacks: Ethical hacking is necessary because it allows co un terin g o f attacks
fro m m alicious hackers by a n tic ip a tin g m e tho d s th e y can use to break in to a system.
M o d u le 0 1 P ag e 63
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
S c o p e
Exam 3 1 2 -5 0 C ertified Ethical H acker
a n d
L im ita tio n s
o f E th ic a l
C E H
H a c k in g
Scope
Ethical hacking is a crucial com ponent o f risk assessment, au diting,
c ou nterfrau d, best practices, and good governance
It is used to id e n tify risks and highlight th e rem edial actions, and also
reduces info rm atio n and com m unications technology (ICT) costs by
resolving those vulnerabilities
'G
tJ
Limitations
However, unless the businesses first know w hat it is at th a t they are looking
fo r and why they are hiring an outside ven dor to hack systems in the first
place, chances are there w ould no t be much to gain fro m the experience
An ethical hacker thus can only help the organization to be tter understand
th e ir security system, but it is up to the organization to place the righ t
guards on the netw ork
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
S c o p e a n d L im ita tio n s
o f E t h ic a l H a c k in g
Ethical hacking has a scope, and th e re are various lim ita tio n s o f ethical hacking, as
w ell.
S cope
The fo llo w in g is the scope o f ethical hacking:
Q
Ethical hacking is a crucial co m p on e nt o f risk assessment, a u d itin g , co u n te r fra u d , best
practices, and good governance.
©
It is used to id e n tify risks and h ig hligh t rem edial actions, and it reduces in fo rm a tio n and
c o m m u n ica tio n s te ch n o lo g y (ICT) costs by resolving those vu ln erabilities.
L im it a t io n s
e
The fo llo w in g are th e lim ita tio n s o f ethical hacking:
Q
Unless businesses firs t know w h a t it is th e y are looking fo r and w hy the y are hiring an
outside ve nd o r to hack systems in the firs t place; chances are th a t th e re w ill not be
much to gain fro m the experience.
©
An ethical hacker th e re fo re can help the organization only to b e tte r understand th e ir
se curity system , b ut it is up to the organization to im p le m e n t the rig h t safeguards on
the netw ork.
M o d u le 0 1 P ag e 64
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
S k ills
P la tfo r m K n o w le d g e
Exam 3 1 2 -5 0 C ertified Ethical H acker
o f a n
E t h ic a l H a c k e r
Has in-d epth know ledge o f m a jo r operating
en vironm ents, such as W indow s, Unix, and Linux
N e t w o r k K n o w le d g e
Has in-d epth know ledge o f n e tw o rkin g concepts,
technologies and related hardw are and softw a re
C o m p u te r E x p e r t
S e c u r ity K n o w le d g e
T e c h n ic a l K n o w le d g e
C E H
CwtMM IthKJl lUck•*
a
o
Should be a com p u te r exp ert ad ept at technical
dom ains
Has know ledge o f security areas and related issues
Has "h ig h te ch n ica l" know ledge to launch th e
sophisticated attacks
u
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
S k ills o f a n E th ic a l H a c k e r
Ethical hacking is the legal hacking p erfo rm ed by pen te ste r to fin d v u ln e ra b ilitie s in
the in fo rm a tio n technology e nviron m e n t. In o rd er to p e rfo rm ethical hacking, the ethical
hacker requires the skills o f a co m p u te r expert. Ethical hackers should also have strong
c o m p u te r know ledge including p ro g ra m m in g and n e tw o rk in g . They should be p ro ficie n t at
installing and m aintaining systems using popular operating systems (e.g. UNIX, W indow s, or
Linux).
Detailed know ledge o f h ard w a re and s o ftw a re provided by popular co m p u te r and netw o rkin g
hardw are vendors co m p lem en t this basic know ledge. It is n ot always necessary th a t ethical
hackers possess any a dditional specialization in security. However, it is an advantage to know
how various systems m aintain th e ir security. M a n a g e m e n t skills p ertaining to these systems
are necessary fo r actual vu ln e ra b ility testin g and fo r preparing the re p o rt a fte r the testin g is
carried out.
An ethical hacker should possess im m ense patience as the analysis stage consumes m ore tim e
than the testing stage. The tim e fra m e fo r an evaluation may va ry fro m a fe w days to several
weeks, depending on the nature o f the task. W hen an ethical hacker encounters a system w ith
w hich he or she is n ot fam ilia r, it is im perative th e person takes the tim e to learn everything
about the system and try to find its v u ln e ra b le spots.
M o d u le 0 1 P ag e 65
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2-50 C ertified Ethical H acker
D e fe n s e ‫־‬i n ‫־‬D e p th
M u ltip le defense-in-depth counterm easures are taken to p ro te c t in fo rm a tio n assets
o f a com pany. The strategy is based on the m ilita ry principle th a t it is m ore d iffic u lt fo r an
enem y to defeat a com plex and m u lti-la y e re d defense system than to penetrate a single
barrier. If a hacker gains access to a system, defense-in-depth m inim izes the adverse im pact
and gives a dm inistrato rs and engineers tim e to deploy new o r updated counterm easures to
p revent a recurrence.
Q
Defense-in-depth is a security strategy in w hich several p ro te c tio n layers are placed
th ro u g h o u t an in fo rm a tio n system.
©
It helps to prevent d ire ct attacks against an in fo rm a tio n system and data because a
break in one layer only leads the a ttacker to the next layer.
M o d u le 0 1 P ag e 66
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
D efense in D epth L a ye rs
FIGURE 1.4: D e fe n se in D e p th Layers D ia g ra m
M o d u le 0 1 P ag e 67
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
In c id e n t M a n a g e m e n t P r o c e s s
CEH
Urtifwl tthKJl lUck•*
~‫־‬i 11--- 3
<9J
Purpose of incident management process
Incid ent m a nagem ent is a set
o f defined processes to
id e n tify , analyze, p rio ritiz e ,
1
Improves service quality
2
Pro-active problem resolution
3
Reduces impact of incidents on business/organization
4
Meets service availability requirements
and resolve s e c u rity inc id e n ts
to restore n o rm a l service
o p e ra tio n s as q u ickly as
possible and prevent fu tu re
reoccurrence o f th e in c id e n t
/‫ץ ־‬
a
a
a
a
5
Increases staff efficiency and productivity
6
Improves user/customer satisfaction
/‫ץ ־׳‬
7
Assists in handling future incidents
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
O
‫־׳‬V
*,'3
^
^
In c id e n t M a n a g e m e n t P ro c e s s
‫י‬
Incident m anagem ent is a set o f defined processes to id e ntify, analyze, p rio ritize , and
resolve security incidents to restore the system to norm al service operations as soon as
possible and p revent the recurrence o f the same incident.
The purpose o f th e in cid en t m anagem ent process:
Q
Im proves service qua lity
Q
Pro-active problem resolution
Q
Reduces im pact o f incidents on business/organization
0
M eets service a vailability requirem ents
e
Increases staff efficiency and p ro d u ctivity
Q
Im proves u ser/cu sto m er satisfaction
Q
Assists in handling fu tu re incidents
M o d u le 0 1 P ag e 68
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0linCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
In c id e n t M a n a g e m e n t P r o c e s s
E H
( C o n t 'd )
, f
\S N
',ha * '°ft
‫׳‬eW
% ‫׳‬%
r«lr
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
In c id e n t M a n a g e m e n t P ro c e s s (C o n t’d )
Incident m anagem ent is the process o f logging, recording, and resolving incidents
th a t take place in the organization. The incident may occur due to fa u lt, service degradation,
error, etc. The incidents are re p orte d by users, technical staff, or som etim es detected
auto m a tically by event m o n ito rin g to o ls. The main objective o f the in cident m anagem ent
process is to restore the service to a norm al stage as early as possible to custom ers, w hile
m aintaining a vailability and q u a lity o f service. Any occurrence o f the in cident in an organization
is handled and resolved by fo llo w in g these incident m anagem ent steps:
0
Preparation fo r Incident Handling and Response
0
D etection and Analysis
0
Classification and P rioritization
0
N o tifica tion
0
C ontainm ent
0
Forensic Investigation
0
Eradication and Recovery
0
P ost-incident A ctivities
M o d u le 0 1 P ag e 69
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2-50 C ertified Ethical H acker
In f o r m a t io n S e c u r it y P o lic ie s
J
S e c u rity p o lic ie s a re th e fo u n d a tio n o f th e s e c u r ity in f r a s t r u c t u r e
J
A s e c u rity p o lic y is a d o c u m e n t o r s e t o f d o c u m e n ts th a t d e s c rib e s t h e s e c u r ity
c o n tr o ls th a t w ill be im p le m e n te d in th e c o m p a n y a t a h ig h le v e l
G oals o f S e c u rity P o licie s
M aintain an outline fo r the management and
adm inistration of netw ork security
&
©
Prevent unauthorized m odifications of
the data
‫־‬
‫־‬
Reduce risks caused by illegal use of the system
resource, loss of sensitive, confidential data, and
potential property
Protection of organization's com puting
resources
®
Elim ination o f legal lia b ility from employees
or th ird parties
©
D ifferentiate the user's access rights
Protect confidential, proprietary inform ation
fro m th e ft, misuse, unauthorized disclosure
Ensure customers' integrity and prevent waste
o f company com puting resources
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
In fo r m a tio n
S e c u r ity P o lic ie s
A security policy is a docum ent or set o f docum ents th a t describes the security
co ntrols th a t should be im p le m e n te d in the com pany at a high level fo r safeguarding the
organizational n e tw o rk fro m inside and outside attacks. This d ocu m e n t defines the com plete
security arch itectu re o f an organization and the d ocum ent includes clear objectives, goals, rules
and regulations, fo rm a l procedures, and so on. It clearly m entions the assets to be protected
and the person w ho can log in and access sites, w ho can vie w the selected data, as w ell as the
people w ho are allow ed to change the data, etc.
W ith o u t these policies, it is im possible to
p ro te c t the com pany fro m possible lawsuits, lost revenue, and so on.
Security policies are the fo u n d a tio n o f the se curity in fra s tru c tu re . These policies secure and
safeguard the in fo rm a tio n resources o f an organization and provide legal p ro te ctio n to the
organization. These policies are beneficial since th e y help bring awareness o f the s ta ff w orking
in the organization to w o rk to g e th e r to secure its co m m unication, as w ell as m inim izing the
risks o f security weaknesses throu g h "h u m a n -fa c to r" mistakes such as disclosing sensitive
in fo rm a tio n to unauthorized o r unknow n sources, im p ro p e r use o f Inte rn e t, etc. In a dd ition,
these policies provide p ro te ctio n against cyber-attacks, m alicious threats, foreign intelligence,
and so on. They m ainly address physical security, n e tw o rk security, access authorizations, virus
p ro te ctio n , and disaster recovery.
M o d u le 0 1 P ag e 70
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
The goals o f se curity policies include:
0
M a in tain an o u tlin e fo r the m anagem ent and a dm in istra tio n o f n e tw o rk security
0
P rotection o f organization's co m p utin g resources
0
E lim in a tio n o f legal lia b ility fro m em ployees or th ird parties
0
Ensure custom ers' in te g rity and prevent wasting o f com pany co m p utin g resources
0
P revent u n a u th o rize d m o d ific a tio n s o f data
0
Reduce risks caused by illegal use o f the system resources and loss o f sensitive,
co nfid e ntia l data and p ote n tia l p ro p e rty
0
D iffe re n tia te a user's access rights
0
P rotect confid e ntia l, p ro p rie ta ry in fo rm a tio n fro m
th e ft, misuse, or u n a u th o rize d
disclosure
M o d u le 0 1 P ag e 71
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
C la s s ific a tio n
o f S e c u r ity
P o lic ie s
C E H
User Policy
<30<5X5X3
»
Defines what kind of user is using the network
«
Defines the limitations that are applied on
users to secure the network
«
Ex: Password management policy
Issue Specific Policies
IT Policy
9 Recognize specific areas of
concern and describe the
organization's status for
top level management
»
Designed for IT department to
keep the network secure and
stable
w Ex: Backup policies, server
configuration, patch update,
and modification policies,
firewall policies
9 Ex: Physical security policy,
personnel security policy,
communications security
Partner Policy
General Policies
Policy that is defined among a
group of partners
«
e
Defines the responsibility for general
business purposes
Ex: High level program policy, business
continuity plans, crisis management,
disaster recovery
Copyright © by EG-GlOOCil. All Rights Reserved. Reproduction Is Strictly Prohibited.
C la s s ific a tio n
o f S e c u r ity P o lic ie s
Security policies are sets o f policies th a t are developed to p ro te ct or safeguard a
com pany's in fo rm a tio n
assets, netw orks, etc. These policies are applicable to
users, IT
departm ents, organization, and so on. For effe ctive security m anagem ent, security policies are
classified in to five d iffe re n t areas:
I—U s e r P o lic y
0
Defines w h a t kind o f user is using the n e tw o rk
0
Defines the lim ita tio n s th a t are applied on users to secure the n e tw o rk
0
Ex: Password M anagem ent Policy
I T P o lic y
Designed fo r an IT d e p a rtm e n t to keep th e n e tw o rk secure and stable
Ex: backup policies, server co nfig u ra tion , patch updates, m o d ifica tio n policies, fire w a ll policies
G e n e r a l P o lic ie s
^
Define th e responsibility fo r general business purposes
M o d u le 0 1 P ag e 72
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2-50 C ertified Ethical H acker
Ex: high-level program policy, business c o n tin u ity plans, crisis m anagem ent, disaster recovery
P a r tn e r P o lic y
Policy th a t is defined among a group o f partners
^
x
I s s u e - s p e c ific P o lic ie s
Recognize specific areas o f concern and describe the organization's status fo r to p -
level m anagem ent
Ex: physical security policy, personnel security policy, com m unications security
M o d u le 0 1 P ag e 73
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
S tru c tu re
S e c u r ity
a n d
C o n te n ts
C E H
P o lic ie s
Contents of
S ecurity Policies
S ecurity
Policy S tructure
»
Detailed description o f th e policy
issues
e
Description about the status o f th e
policy
«
A pplicability o f the policy to the
e n vironm ent
»
Functionalities o f those affected by the
policy
»
»
High-level security requirem ents:
Requirem ent o f a system to
im plem ent security policies
Policy de scription : Focuses on
security disciplines, safeguards,
procedures, con tinuity o f operations,
and docum entation
»
Security concept o f o p eratio n:
Defines the roles, responsibilities,
and functions o f a security policy
»
A llo cation o f security en forcem ent
to architectu re elem ents: Provides a
com puter system architecture
w C o m p a tib ility level o f the policy is
necessary
«
o f
End-consequences o f non-com pliance
allocation to each system o f the
program
X
Copyright © by EG-C*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
S tru c tu re
a n d C o n te n ts o f S e c u r ity P o lic ie s
*I S tr u c tu r e o f S e c u r ity P o lic ie s
A security policy is the docum ent th a t provides the w ay o f securing the com pany's
physical personnel and data fro m threa ts o r se curity breaches. Security policies should be
stru cture d very carefully and should be review ed p ro pe rly to make sure th a t th e re is no
w o rd in g th a t som eone could take advantage of. The basic s tru c tu re o f security policies should
include the follo w in g :
0
D etailed d e scrip tio n o f the policy issues
0
Description o f the status o f the policy
0
A p p lica b ility o f the policy to the e n viro n m e n t
0
Functionalities o f those affected by the policy
0
Specific consequences th a t w ill occur if the
policy is n ot com patible
w ith
the
organizational standards
r
C o n te n t o f S e c u r ity P o lic ie s
■‫־‬
‘1
Security policies contain the fo llo w in g elem ents:
M o d u le 0 1 P ag e 74
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
0
Exam 3 1 2 -5 0 C ertified Ethical H acker
H igh-level S ecurity R equirem ents: Explains the re q u ire m e n ts o f a system fo r the
security policies to be im plem ented. The fo u r d iffe re n t types o f re quirem ents are
discipline, safeguard, p ro cedural, and assurance.
t?
D iscipline
S ecurity
R equirem ents: This
re q u ire m e n t
includes various
security
policies such as co m m u n ica tio n s security, c o m p u te r security, o p e ra tio n s security,
e m a na tio ns security, n e tw o rk security, personnel security, in fo rm a tio n security,
and physical security.
ti
Safeguard S ecurity R equirem ents: This re q u ire m e n t m ainly contains access co ntro l,
archive, audit, a u th e n ticity, a v a ila b ility , c o n fid e n tia lity , cryptography, id e n tifica tio n
and a u th e n tica tio n , in te g rity, interfaces, m arking, n o n -re p u d ia tio n , o bject reuse,
recovery, and virus p ro te c tio n .
-
P rocedural
S ecurity
R equirem ents:
This
re q u ire m e n t
m ainly
contains
access
policies, a c c o u n ta b ility rules, c o n tin u ity -o f-o p e ra tio n s plans, and docu m e n ta tio n.
t?
Assurance S ecurity: This includes c e rtific a tio n
and a ccre d ita tio n
review s and
sustaining planning docum ents used in the assurance process.
©
Policy D e scription: Focuses on security disciplines, safeguards, procedures, c o n tin u ity o f
operations, and d o cu m e n ta tio n. Each subset o f this p o rtio n o f the policy describes how
the system 's arch itectu re w ill enforce security.
0
S ecurity Concept o f O p e ra tio n : M a inly defines the roles, re sp on sib ilitie s, and fu n c tio n s
o f a security policy. It focuses on mission, com m unications, e ncryption, user and
m aintenance rules, id le -tim e m anagem ent, use o f p riva tely ow ned versus public-dom ain
softw are, shareware softw are rules, and a virus p ro te ctio n policy.
0
A llo ca tio n o f S ecurity E nforcem ent to A rc h ite c tu re Elem ents: Provides a co m p u te r
system a rch itectu re allocation to each system o f the program .
M o d u le 0 1 P ag e 75
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2-50 C ertified Ethical H acker
T y p e s
o f S e c u r it y
‫י‬
P o lic ie s
C E H
m
P ro m isc u o u s
P e rm issiv e
P ru d e n t
P a ra n o id
P o licy
P o licy
P o licy
P o licy
□ -----No restrictions on
In te rn e t o r re m ote
access
Policy begins w ide
open and on ly
It provides maximum
security w h ile
It forbids everything,
no In te rn e t
k no w n dangerous
services/attacks
allow ing know n but
necessary dangers
con nection , or
blocked, w hich
makes it d iffic u lt to
It blocks all services
and only safe/
necessary services are
enabled individually;
everything is logged
keep up w ith
c u rre n t exploits
severely lim ite d
In te rn e t usage
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
H -|t‫־‬
T y p e s o f S e c u r ity P o lic ie s
A security policy is a d o cu m e n t th a t contains in fo rm a tio n on the w ay th e com pany
plans to p ro te ct its in fo rm a tio n assets fro m kn ow n and u n kn o w n th re a ts. These policies help
to m aintain the co nfid e ntia lly, availability, and in te g rity o f in fo rm a tio n . The fo u r m ajor types o f
security policies are as follow s:
A
P r o m is c u o u s P o lic y
m rk
W ith a prom iscuous policy, the re is no re s tric tio n on In te rn e t access. A user can
access any site, dow nload any application, and access a co m p u te r or a n e tw o rk fro m a rem ote
location. W hile this can be useful in co rp orate businesses w here people w ho travel or w o rk at
branch offices need to access the organizational netw orks, many m alware, virus, and Trojan
threa ts are present on the Inte rn e t. Due to free In te rn e t access, this m alw are can come as
a ttachm ents w ith o u t the know ledge o f the user. N e tw o rk a d m in is tra to rs m ust be extrem ely
a le rt if this type o f policy is chosen.
P e r m is s iv e P o lic y
i!L
1
‫•׳‬
In a permissive policy, the m a jo rity o f In te rn e t tra ffic is accepted, b ut several know n
dangerous services and attacks are blocked. Because only know n attacks and exploits are
M o d u le 0 1 P ag e 76
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
blocked, it is im possible fo r adm inistrato rs to keep up w ith cu rre n t exploits. A dm in istra to rs are
always playing catch-up w ith new attacks and exploits.
P r u d e n t P o lic y
A p ru de n t policy starts w ith all services blocked. The a d m in istra to r enables safe and
necessary services individually. This provides m a xim u m security. Everything, such as system
and n e tw o rk activities, is logged.
P a r a n o id P o lic y
cw -
In a paranoid policy, everything is fo rb id d e n . There is s tric t re s tric tio n on all usage o f
com pany com puters, w h e th e r it is system usage o r n e tw o rk usage. There is e ith e r no In te rn e t
connection o r severely lim ite d In te rn e t usage. Due to these overly severe restrictions, users
o fte n try to find ways around them .
M o d u le 0 1 P ag e 77
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2-50 C ertified Ethical H acker
S te p s to
C re a te
S e c u r ity
a n d
Im p le m e n t
P o lic ie s
Make fin a l version available to all
o f the staff in the organization
Include senior m anagem ent
Perform risk assessment
to iden tify risks to the
and all oth e r staff in policy
developm ent
organization's assets
4
Train your em ployees
and educate them
about the policy
Set clear penalties and
Learn fro m standard
guidelines and oth e r
organizations
enforce the m and also
review and update o f
the security policy
Ensure every m em ber o f
your staff read, sign, and
understand th e policy
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
S te p s to C r e a te
a n d I m p le m e n t S e c u r ity P o lic ie s
Im p lem enting se curity policies reduces the risk o f being attacked. Thus, every
com pany m ust have its own security policies based on its business. The fo llo w in g are the steps
to be fo llo w e d by every organization in o rd er to create and im p le m e n t security policies:
1.
Perform risk assessm ent to id e n tify risks to th e organization's assets
2.
Learn fro m standard g uidelines and o th e r organizations
3.
Include senior m anagem ent and all o th e r sta ff in policy deve lo p m en t
4.
Set clear p enalties and enforce the m and also review and update the security policy
5.
Make the final version available to all sta ff in the organization
6.
Ensure every m em ber o f yo u r sta ff reads, signs, and understands the policy
7.
Install the too ls you need to enforce th e policy
8.
Train yo ur em ployees and educate the m about the policy
M o d u le 0 1 P ag e 78
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
It defines the acceptable use of system resources
Acceptable-Use Policy
User-Account Policy
It defines the account creation process and authority, rights and responsibilities
of user accounts
Remote-Access Policy
It defines who can have remote access, and defines access medium and remote
access security controls
Inform ationProtection Policy
i
FirewallM anagem ent Policy
WT
It defines the sensitivity levels of information, who may have access, how is it
stored and transmitted, and how should it be deleted from storage media
It defines access, management, and monitoring of firewalls in the organization
Special-Access Policy
This policy defines the terms and conditions of granting special access to system
resources
N etw orkConnection Policy
It defines who can install new resources on the network, approve the installation
of new devices, document network changes, etc.
Email Security Policy
Passwords Policy
It is created to govern the proper usage of corporate email
It provides guidelines for using strong password protection on organization's
resources
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
E x a m p le s o f S e c u r ity P o lic ie s
The fo llo w in g are some examples o f security polies th a t are created, accepted, and
used by organizations w o rld w id e to secure th e ir assets and im p o rta n t resources.
A cceptable-U se Policy
Defines the acceptable use o f system resources
U ser-A ccount Policy
Defines th e account creation process and a u th o rity , rights, and re sp o n sib ilitie s o f user
accounts
Remote-Access Policy
Defines w ho can have re m o te access, and defines access m e d ium and re m o te access security
controls
In fo rm a tio n -P ro te c tio n Policy
Defines the s e n s itiv ity levels o f in fo rm a tio n , w ho may have access, how is it stored and
tra n s m itte d , and how should it be deleted fro m storage media
F ire w a ll-M a n a g e m e n t Policy
M o d u le 0 1 P ag e 79
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
Defines access, m anagem ent, and m o n ito rin g o f fire w a lls in the organization
Special-Access Policy
This policy defines th e te rm s and co n d itio n s o f granting special access to system resources
N e tw o rk-C o n n e ctio n Policy
Defines w ho can install n ew resources on the n etw o rk, approve the in stallation o f new devices,
d ocum ent n e tw o rk changes, etc.
Email S ecurity Policy
Created to govern the p ro pe r usage o f co rp o ra te em ail
Password Policy
Provides guidelines fo r using stro ng passw ord p ro te c tio n on organization's resources
M o d u le 0 1 P ag e 80
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2-50 C ertified Ethical H acker
V u ln e r a b ilit y
J
R e s e a r c h
T h e p ro c e s s o f d is c o v e r in g v u ln e r a b ilit ie s a n d d e s ig n fla w s th a t w ill
o p e n an o p e r a tin g s y s te m a n d its a p p lic a tio n s to a tta c k o r m is u s e
J
V u ln e r a b ilitie s a re c la s s ifie d b a s e d o n s e v e r ity le v e l (lo w , m e d iu m , o r
h ig h ) a n d e x p lo it ra n g e (lo c a l o r re m o te )
An administrator needs vulnerability research:
‫י‬
To gather in fo rm a tio n ab out
To find weaknesses and a le rt the
security trends, threats, and
attacks
n e tw o rk a d m in istra to r before a
n e tw o rk attack
o
To get in fo rm a tio n th a t helps
©
to prevent th e security
problem s
To know ho w to recover fro m a
n e tw o rk attack
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
V u ln e r a b ility R e s e a rc h
V u ln e ra b ility research means discovering system design fa u lts and weaknesses th a t
m ight help attackers com prom ise the system. Once the a ttacker finds o u t the v u ln e ra b ility in
the p ro du ct or th e application, he or she trie s to e x p lo it it.
V u ln e ra b ility research helps both security adm inistrato rs and attackers:
©
Discovering system
design faults
and weaknesses th a t
m ight help
attackers to
com prom ise the system
Q
Keeping abreast o f the latest v e n d o r-su p p o rte d p roducts and o th e r technologies in
o rd er to find news related to cu rre n t exploits
e
Checking
new ly
released
alerts
regarding
relevant
innovations
and
p roduct
im p rovem ents fo r security systems
e
V u ln e ra b ility research is based on the fo llo w in g classification:
Q
S everity level (low, m edium , or high)
Q
E xploit range (local or rem ote)
An a d m in is tra to r needs v u ln e ra b ility research:
Q
To gather in fo rm a tio n about security trends, threats, and attacks
©
To find weaknesses and a le rt the n e tw o rk a d m in istra to r before a n e tw o rk attack
Q
To get in fo rm a tio n th a t helps to p revent security problem s
Q
To know how to recover fro m a n e tw o rk attack
M o d u le 0 1 P ag e 81
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
V u ln e r a b ility
1
j
%
‫ןיין י ^ ו‬
Exam 3 1 2-50 C ertified Ethical H acker
R e s e a r c h W e b s ite s
C o d e R e d C e n te r
http://www.eccouncil.org
TechN et
http://blogs. technet.com
/
‫ץ‬
I
‫ר־־־‬
£3|
-1—1
S e c u r ity M a g a z in e
http://www.5ecuritymagazine.com
S e c u rity F o c u s
http://www.securityfocus. com
C E H
H a c k e r S to rm
http://www.hackerstorm.co.uk
SC M a g a z in e
/ » f fp : / / w w w .s c m o g o z / n e .c o m
C o m p u te r w o r ld
http://www.computerworld. com
H a c k e rJ o u rn a ls
http://www.hackerjournals.com
<
c
™
H e lp N e t S e c u r ity
http://www.net-security.org
\o*M
v > ------
W in d o w s S e c u r ity B lo g s
http://blogs.windowsecurity.com
Copyright © by EG-C*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
V u l n e r a b ilit y R e s e a r c h W e b s ite s
The fo llo w in g are the some v u ln e ra b ility research w ebsites th a t you can use:
ill......
f -L11lilll |
C o d e R e d C e n te r
Source: h ttp ://w w w .e c c o u n c il.o rg
The CodeRed Center is a com prehensive se curity resource a d m in is tra to rs can tu rn to fo r daily,
accurate, u p-to -d a te in fo rm a tio n on the latest viruses, Trojans, m alw are, threats, security tools,
risks, and vulnerabilities.
( P
TechN et
Source: h ttp ://b lo g s.te ch n e t.co m
TechN et is a p ro ject team fro m across M ic ro s o ft Lync Server team s and the co m m u n ity at
large. It is led by the Lync Server d o cu m e n ta tio n team ; th e ir w rite rs and technical review ers
come fro m all disciplines, including p ro du ct engineers, fie ld engineers, su pp o rt engineers,
d ocu m e n ta tio n engineers, and some o f the m ost respected technology bloggers and authors in
the Lync Server universe.
M o d u le 0 1 P ag e 82
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
X
mVn
Exam 3 1 2 -5 0 C ertified Ethical H acker
S e c u r ity M a g a z in e
Source: h ttp ://w w w .se cu ritym a g a zin e .co m
Security Magazine is uniquely focused on solutions fo r enterprise security leaders. It is designed
and w ritte n fo r business-m inded executives w ho manage e n te rp rise risk and security. Security
Magazine provides m anagem ent-focused features, opinions, and trends fo r leaders in business.
S e c u r ity F o c u s
Source: h ttp ://w w w .s e c u rity fo c u s .c o m
The Security Focus w ebsite focuses on a fe w key areas th a t are o f greatest im portance to the
security co m m unity.
Q
BugTraq is a high-volum e, full-disclosure m ailing list fo r the detailed discussion and
announcem ent o f co m p u te r security vu ln era b ilitie s. BugTraq serves as the cornerstone
o f th e In te rn e t-w id e security co m m unity.
0
The SecurityFocus V u ln e ra b ility Database provides security professionals w ith the m ost
u p-to -d a te in fo rm a tio n on vu ln era b ilitie s fo r all p la tfo rm s and services.
H e lp N e t S e c u r ity
Source: h ttp ://w w w .n e t-s e c u rity .o rg
Net Security is a daily security news site th a t has been covering th e latest co m p u te r and
n e tw o rk security news since its inception in 1998.
Besides covering news around the globe, HNS focuses on q u a lity technical articles and papers,
vu ln era b ilitie s, ve nd o r advisories, m alware, and hosts th e largest security softw are dow nload
area w ith so ftw a re fo r W indow s, Linux, and Mac OS X.
H a c k e rS to rm
Source: http://www.hackerstorm.co.uk
HackerStorm is a security resource fo r e thical hackers and p e n e tra tio n teste rs to create b e tte r
p en e tra tio n testin g plans and scopes, and conduct vu ln e ra b ility research.
S C M a g a z in e
^
Source: h ttp ://w w w .scm a g a zin e .co m
SC Magazine is published by H aym arket Media Inc. and is part o f a global brand. There are
th re e separate editions o f the magazine:
©
N orth Am erica - U.S. and Canada
©
Inte rn a tion a l - U.K. and m ainland Europe
M o d u le 0 1 P ag e 83
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Q
Exam 3 1 2 -5 0 C ertified Ethical H acker
Asia Pacific O nline - read by decision-m akers in over 20 co u n trie s in the Pacific Rim
region
The magazine is published m o n th ly, usually in the firs t w eek o f each m o n th . It is th e longest
running in fo rm a tio n security magazine in the w o rld , w ith the w idest d istrib u tio n .
SC Magazine provides IT security professionals w ith in -d ep th and unbiased in fo rm a tio n in one
incom parable publication. In each m o n th ly issue it has tim e ly news, com prehensive analysis,
cutting-edge features, co n trib u tio n s fro m th o u g h t leaders and the best, m ost extensive
co llection o f p ro du ct reviews in the business. They
been doing this since 1989, w hen it firs t
began cam paigning fo r organizations' in fo rm a tio n security leaders, making it the longest
established IT security title in the United States.
C o m p u te r w o r ld
““ “ —
Source: h ttp ://w w w .c o m p u te rw o rld .c o m
For m ore than 40 years, C o m p ute rw o rld has been the leading source o f technology news and
in fo rm a tio n fo r IT influencers w o rld w id e . C o m p u te rw o rld 's w e b site (C om puterw orld.com ),
tw ic e -m o n th ly publication, focused conference series, and custom research fo rm the hub o f the
w o rld 's largest global IT media netw ork.
Source: h ttp ://w w w .h a c k e rio u rn a ls .c o m
Hacker Journals is an online In fo rm a tio n S ecurity C o m m u n ity. It propagates news specifically
related to in fo rm a tio n security threa ts and issues fro m all over the w o rld . Its research team s
search and com pile news fro m tens o f thousands o f sites to bring you the m ost relevant Cyber
Security title s in one location. In a dd itio n to news, it hosts blogs and discussions, education
videos, as w ell as its W orld Famous Hack.ED colum n, providing education series in Ethical
Hacking and C ounterm easure Techniques and technologies.
\—
/
-
W in d o w s S e c u r it y B lo g s
Source: h ttp ://b lo g s.w in d o w se cu rity.co m
W indow s security has blogs posted by fam ou s auth ors w ho are leading industry experts. It has
various features such as articles and tu to ria ls, blogs, message boards, security tests, and w h ite
papers.
M o d u le 0 1 P ag e 84
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
W h a t I s P e n e t r a t io n T e s t in g ?
C E H
UrtrfW* I ttfciul lUilwt
T e s tin g in v o lv e s a c tiv e a n a ly s is o f
P e n e tra tio n te s tin g is a m e th o d o f e v a lu a tin g
s y s te m c o n fig u ra tio n s , d e s ig n
th e s e c u rity o f an in fo r m a t io n s y s te m o r
w e a k n e s s e s , n e tw o r k
n e tw o r k b y s im u la tin g a n a tta c k to
a r c h ite c tu re , te c h n ic a l fla w s ,
f in d o u t v u ln e r a b ilit ie s th a t an
a n d v u ln e r a b ilitie s
a tta c k e r c o u ld e x p lo it
B lack b o x te s tin g s im u la te s an
A c o m p re h e n s iv e r e p o r t w ith
a tta c k fr o m s o m e o n e w h o has
d e ta ils o f v u ln e ra b ilitie s
n o p r io r k n o w le d g e o f th e s y s te m ,
d is c o v e re d a n d s u ite o f
re c o m m e n d e d c o u n te rm e a s u re s
a n d w h ite b o x te s tin g s im u la te s an
is d e liv e re d to th e e x e c u tiv e ,
a tta c k fr o m s o m e o n e w h o has
m a n a g e m e n t, a n d te c h n ic a l a u d ie n c e s
c o m p le te k n o w le d g e a b o u t th e s y s te m
Copyright © by EG-G(IIIICil. All Rights Reserved. Reproduction is Strictly Prohibited.
W h a t I s P e n e t r a t io n T e s tin g ?
P enetration testing is a m ethod o f e va lu a tin g se curity levels o f a p articula r system or
n etw o rk. This helps you d ete rm ine th e flaw s related to h a rd w a re and so ftw a re . The early
id e n tific a tio n helps p ro te c t th e n e tw o rk . If the vu ln era b ilitie s a re n 't id e n tifie d early, the n the y
becom e an easy source fo r the attacker fo r the intrusion.
During p en e tratio n testing, a pen te ste r analyzes all the se curity measures em ployed by the
organization fo r design weaknesses, technical flaws, and vu ln era b ilitie s. There are tw o types o f
testing; black box te s tin g and w h ite b o x te stin g . Black box testin g sim ulates an attack fro m
som eone w ho is u n fa m ilia r w ith the system, and w h ite box testing sim ulates an a ttacker th a t
has kn ow led g e abo u t the system. Once all the tests are conducted, th e pen te ste r prepares a
re p o rt and includes all the te st results and the tests conducted along w ith the vu ln era b ilitie s
fou n d and the respective counterm easures th a t can be applied. Finally, the pen te ste r delivers
the re p o rt to executive, m anagem ent, and technical audiences.
M o d u le 0 1 P ag e 85
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
‫ב‬
W
h y
P e n e t r a t io n
T e s t in g
C E H
(•rtifwd
A
S
e
Identify the threats
facing an organization's
information assets
© For testing and
validating the efficiency
of security protections
and controls
Reduce an organization's expenditure
on IT security and enhance Return
^
On Security Investment (ROSI) by
identifying and remediating
vulnerabilities or weaknesses
8
itkitjl
a
For changing or upgrading existing
infrastructure of software,
hardware, or network design
W Focus on high-severity
vulnerabilities and emphasize
application-level security issues to
development teams and
management
Provide assurance with
comprehensive assessment of
organization's security including
policy, procedure, design, and
Implementation
»
Gain and maintain certification to an
industry regulation (BS7799, HIPAA
etc.)
Provide a comprehensive approach
of preparation steps that can be
taken to prevent upcoming
exploitation
w Evaluate the efficiency of network
security devices such as firewalls,
routers, and web servers
Adopt best practices in compliance
to legal and industry regulations
Copyright © by EG-C*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
Ip fe
W h y P e n e t r a t io n T e s t in g ?
P enetration testing is required because it helps you to:
©
Id e n tify the threa ts facing an organization's in fo rm a tio n assets
©
Reduce
On
an
S ecurity
organization's
In ve stm e n t
IT
(ROSI)
security
by
costs
and
provide
id e n tifyin g
and
resolving
a
b e tte r
Return
vu ln era b ilitie s
and
weaknesses
©
Provide an organization w ith assurance: a tho ro u gh and com prehensive assessment o f
organizational security covering policy, procedure, design, and im p le m e n ta tio n
©
Gain and m aintain ce rtifica tio n to an in dustry regulation (BS7799, HIPAA etc.)
©
A do p t best practices by co nfo rm ing to legal and in d u s try re g ula tio ns
©
Test and validate the efficiency o f se curity p ro te c tio n s and co n tro ls
©
Change or upgrade existing in fra stru ctu re o f softw are, hardw are, or n e tw o rk design
©
Focus on h ig h-se ve rity v u ln e ra b ilitie s and emphasize a p p lica tio n -le ve l se curity issues
to d eve lo p m en t team s and m anagem ent
©
Provide a com prehensive approach o f pre pa ra tio n steps th a t can be taken to prevent
upcom ing e xploita tio n
©
Evaluate the efficiency o f n e tw o rk security devices such as fire w a lls, routers, and web
servers
M o d u le 0 1 P ag e 86
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
P e n e tr a tio n T e s tin g
Exam 3 1 2 -5 0 C ertified Ethical H acker
M e th o d o lo g y
As a pen tester, you should never overlook any in fo rm a tio n resource. All possible
in fo rm a tio n sources m ust be tested fo r vuln era b ilitie s. Not ju st the in fo rm a tio n sources, but
every m echanism and the s o ftw a re involved in yo u r business m ust be tested because if the
a ttacker is n ot able to com prom ise the in fo rm a tio n system, the n he o r she may try to gain
access to the system and then to th e sensitive in fo rm a tio n . A fe w attacks, such as d enial-ofservice attacks, d o n 't even need access to the system. Therefore, to ensure th a t you check all
possible ways o f com prom ising a system or n etw o rk, you should fo llo w the p en e tra tio n testing
m ethodology. This ensures the full scope o f the test.
M o d u le 0 1 P ag e 87
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
FIGURE 1.5: P e n e tra tio n T e s tin g M e th o d o lo g y P a rt -1
M o d u le 0 1 P ag e 88
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
Exam 3 1 2 -5 0 C ertified Ethical H acker
P e n e tr a tio n T e s t in g M e t h o d o lo g y ( C o n t’ d )
Mobile
Devices
Penetration
Testing
►Tff ►H
►
Email
Security
Penetration
Testing
3
SAP
Penetration
Testing
FIGURE 1.6: P e n e tra tio n T e s tin g M e th o d o lo g y P a rt 2‫־‬
M o d u le 0 1 P ag e 8 9
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0l1nCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Ethical Hacking a n d C o u n te rm e a s u re s
In tro d u c tio n to Ethical H acking
M o d u le
Exam 3 1 2 -5 0 C ertified Ethical H acker
S u m
m
a r y
C E H
C o m p le x ity o f s e c u rity r e q u ir e m e n ts is in c re a s in g d a y b y d a y as a re s u lt o f
e v o lv in g te c h n o lo g y , c h a n g in g h a c k in g ta c tic s , e m e rg in g s e c u rity v u ln e r a b ilitie s , e tc.
□
□
H a c k e r o r c ra c k e r is o n e w h o acce sses a c o m p u te r s y s te m b y e v a d in g its s e c u rity s y s te m
E th ic a l h a c k in g in v o lv e s th e use o f h a c k in g to o ls , tric k s , a n d te c h n iq u e s to id e n tify
v u ln e r a b ilitie s so as to e n s u re s y s te m s e c u rity
E th ic a l h a c k e rs h e lp o r g a n iz a tio n to b e tte r u n d e rs ta n d t h e ir s e c u rity s y s te m s a n d id e n tify
th e risks, h ig h lig h t th e re m e d ia l a c tio n s , a n d a ls o re d u c e ICT c o s ts b y re s o lv in g th o s e
v u ln e r a b ilitie s
E th ic a l h a c k e r s h o u ld p o sses p la t fo r m k n o w le d g e , n e tw o r k k n o w le d g e , c o m p u te r e x p e rt,
s e c u rity k n o w le d g e , a n d te c h n ic a l k n o w le d g e s kills
E th ic a l h a c k in g is a c ru c ia l c o m p o n e n t o f ris k a s s e s s m e n t, a u d itin g , c o u n te r fra u d , b e s t
p ra c tic e s , a n d g o o d g o v e rn a n c e
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le
S u m m a ry
This m odule is sum m arized as follow s:
© The co m p lexity o f se curity re q u ire m e n ts is increasing day by day as a result o f
evolving technology, changing hacking tactics, em erging security vu ln era b ilitie s, etc.
© A hacker o r cracker is som eone w h o accesses a co m p u te r system by evading its se curity
system.
Q Ethical hacking involves the use o f hacking tools, tricks, and techniques to id e n tify
v u ln e ra b ilitie s to ensure system security.
0
Ethical hackers help organizations to b e tte r understand th e ir security systems and
id e n tify th e risks, highlight the re m e d ial actions, and also reduce ICT costs by resolving
those vu ln erabilities.
Q An ethical hacker possesses p la tfo rm
know ledge, n e tw o rk
know ledge, c o m p u te r
expert, se curity know ledge, and tech n ica l kn ow led g e skills.
Q Ethical hacking is a crucial co m p on e nt o f risk assessment, auditing, co u n te r fraud, best
practices, and good governance.
M o d u le 0 1 P ag e 9 0
Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil
All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .
Download