Eti Unit5 Basics of Hacking
Eti Unit5 Basics of Hacking
Contents
5.1 Ethical Hacking
How Hackers Beget Ethical Hackers
Defining hacker, malicious users
Gather Information: This is the first stage, the learns as much as he can about the intended
victim. The information is gathered from company websites, other publications and sometimes
by talking to the users of the target system.
Plan Attack: The attackers outline how he/she intends to execute the attack
Acquire Tools: These include computer programs that an attacker will use when launching the
attack.
Attack: Exploit the weaknesses in the target system.
Use acquired knowledge: Information gathered during the social engineering tactics such as pet
names, birthdates of the organization founders, etc. is used in attacks such as password guessing.
Most techniques employed by social engineers involve manipulating human biases. To counter
such techniques, an organization can;
Social engineering is the art of exploiting the human elements to gain access to un-
authorized resources.
Social engineers use a number of techniques to fool the users into revealing sensitive
information.
Organizations must have security policies that have social engineering countermeasures.
Hacker's attitude:
A hacker-cracker separation give more emphasis to a range of different categories, such as white
hat (ethical hacking), grey hat, black hat and script kiddie. The term cracker refer to black hat
hackers, or more generally hackers with unlawful intentions.
Hackers are problem solvers. They get extract from understanding a problem and sorting out a
solution. Their motivation to meet challenges is internal. Hackers do what they do because its
extremely satisfying to solve puzzles and fix the up-until-now unfixable. The pleasure derived is
both intellectual and practical but one don't have to be a geek to be a hacker. Being a hacker is a
mind-set. In Raymond's dissertation, "How to Become a Hacker", he describes the fundamentals
of a hacker attitude.
These are very same principles apply to being innovative which are explained as below:
Freedom is good.
Hackers need freedom to work upon their ideas.
The good-guy (white-hat) hackers don't like being in the same category as the bad guy (black-
hat) hackers. Whatever the case, most people give hacker a negative meaning many malicious
hackers claim that they don't cause damage but instead are selflessly helping others. In other
words, many malicious hackers are electronic thieves. Hackers go for almost any system they
think they can compromise. Some prefer prestigious, well-protected systems, but hacking into
anyone's system increases their status in hacker circles.
If one need protection from hacker troubles; one has to become as savvy as the gays trying to
attack systems. A true security assessment professional possesses the skills, mind-set, and tools
of a hacker but is also trustworthy, He or she performs the hacks as security tests against systems
based on how hackers might work.
Ethical hacker's attitude encompasses formal and methodical penetration testing, white hat
hacking, and vulnerability testing ,which involves the same tools, tricks, and techniques that
criminal hackers use, but with one major difference: Ethical hacking is performed with the
target's permission in a professional setting The intent of ethical hacking is to discover
vulnerabilities from a malicious attacker's viewpoint to better secure systems. Ethical hacking is
part of an overall information risk management program that allows for on-going security
improvements. Ethical hacking can also ensure that vendors' claims about the security of their
products are genuine.
Policy considerations
If it is chosen to make ethical hacking an important part of business's information risk
management program, one really need to have a documented security testing policy. Such a
policy outlines who's doing the testing, the general type of testing that is performed, and how
often the testing takes place.
What is Hacking?
Hacking is identifying weakness in computer systems or networks to exploit its weaknesses
To gain access.
Example of Hacking:
Computers have become mandatory to run a successful businesses. It is not enough to have
isolated computers systems; they need to be networked to facilitate communication with external
businesses.
Definition
Ethical hacking:
Refers to the act of locating weaknesses and vulnerabilities of computer and information
systems by duplicating the intent and actions of malicious hackers.
known as penetration testing, intrusion testing, or red teaming,
An ethical hacker is a security professional who applies their hacking skills for defensive
purposes on behalf of the owners of information systems,
By conducting penetration tests, an ethical hacker looks to answer the following four basic
1. What information/locations/systems can an attacker gain access?
2. What can an attacker see on the target?
3. What can an attacker do with available information?
4. Does anyone at the target system notice the attempts?
An ethical hacker operates with the knowledge and permission of the organization for which they
are trying to defend. In some cases, the organization will neglect to inform their information
security team of the activities that will be carried out by an ethical hacker in an attempt to test the
effectiveness of the information security team. This is referred to as a double-blind environment.
In order to operate effectively and legally, an ethical hacker must be informed of the assets that
should be protected, potential threat sources, and the extent to which the organization will
support an ethical hacker's efforts.
Defining hacker, malicious users
Definition of Hacker: A Hacker is a person who finds and exploits the weakness in computer
systems and/or networks to gain access. Hackers are usually skilled computer programmers with
knowledge of computer security. An Ethical Hacker, also known as a white hat hacker, or
simply a white hat, is a security professional who applies their hacking skills for defensive
purposes on behalf of the owners of information systems.
Nowadays, certified ethical hackers are among the most sought after information security
employees in large organizations such as Wipro, Infosys, IBM, Airtel and Reliance among
others.
Users search through critical database systems to collect sensitive information, e-mail
confidential client information to the competition or elsewhere to the cloud, or delete sensitive
files from servers that they probably do not have access. There's also the occasional ignorant
insider whose intent is not malicious but who still causes security problems by moving, deleting,
or corrupting sensitive information. Even an innocent "fat-finger" on the keyboard can have
terrible consequences in the business world.
Malicious users are often the worst enemies of IT and information security professionals because
they know exactly where to go to get the goods and don't need to be computer savvy to
compromise sensitive information. These users have the access they need and the management
trusts them, often without question. In short they take the undue advantage the trust of the
management.
Hackers are classified according to the intent of their actions.
Table 5.1 Classifications of hackers according to their intent.
Symbol Description
Ethical Hacker (White hat): A hacker who
gains access to systems with a view to fix the
identified weaknesses. They may also perform
penetration Testing and vulnerability
assessments.
Cracker (Black hat): A hacker who gains
unauthorized access to computer systems for
The intent is usually to steal corporate data,
violate privacy rights, transfer funds from bank
accounts etc.
One cannot protect the systems from everything. The only protection against everything is to
unplug computer systems and lock them away so no one can touch them, not even you. That's
not the best approach to information security. What's important is to protect your systems from
known vulnerabilities and common hacker attacks, it’s impossible to support all possible
vulnerabilities on all systems. One can't plan for all possible attacks, especially the ones that are
currently unknown.
However, the more combinations you try - the more you test whole systems instead of individual
units, the better your chances of discovering vulnerabilities that affect everything as a whole.
Building the Foundation for Ethical Hacking
One should not forget about insider threats from malicious employees. One's overall goals as an
ethical hacker should be as follows:
Nontechnical attacks
Network-infrastructure attacks
Operating-system attacks
Application and other specialized attacks
Nontechnical attacks
Exploits that involve manipulating people or end users and even yourself are the greatest
vulnerability within any computer or network infrastructure. Humans are trusting by nature,
which can lead to social-engineering exploits. Social engineering is defined as the exploitation of
the trusting nature of human beings to gain information for malicious purposes.
Other common and effective attacks against information systems are physical. Hackers break
into buildings, computer rooms, or other areas containing critical information or property.
Physical attacks can include dumpster diving (searching through trash cans and dumpsters for
intellectual property, passwords, network diagrams, and other information).
Network-infrastructure attacks
Hacker attacks against network infrastructures can be easy, because many networks can be
reached from anywhere in the world via the Internet.
Here are some examples of network-infrastructure attacks:
Connecting into a network through a rogue modem attached to a computer behind a
firewall
Exploiting weaknesses in network transport mechanisms, such as TCPAP and NetBIOS.
Flooding a network with too many requests, creating a Denial of Service (DoS) for
legitimate requests
Installing a network analyzer on a network and capturing every packet that travels across
it, revealing confidential information in clear text
Piggybacking onto a network through an insecure wireless configuration.
Occasionally, some operating systems that are more secure out of the box, such as Novell Net
Ware and the flavors of BSD UNIX are attacked, and vulnerabilities turn up. But hackers prefer
attacking operating systems like Windows and Linux because they are widely used and better
known for their vulnerabilities. Here are some examples of attacks on operating systems:
Exploiting specific protocol implementations
Attacking built-in authentication systems
Breaking file-system security
Cracking passwords and encryption mechanisms
Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP)
applications are frequently attacked because most firewalls and other security
mechanisms are configured to allow full access to these programs from the Internet.
Malicious software (malware) includes viruses, worms, Trojan horses, and spyware.
Malware clogs networks and takes down systems.
Spam (junk e-mail) is wreaking havoc on system availability and storage space. And it
can carry malware. Ethical hacking helps reveal such attacks against computer systems.
Working ethically
The word ethical in this context can be defined as working with high professional morals and
principles. While performing ethical hacking tests against own systems or for someone who has
hired for, everything one need to do as an ethical hacker must be above board and must support
the company's goals. No hidden agendas are allowed. Trustworthiness is the ultimate principle.
The misuse of information is absolutely forbidden. That's what the bad guys or hackers do.
Respecting privacy
Treat the information gathered with the greatest respect. All information obtained during testing
from Web-application log files to clear-text passwords must be kept private. This information
shall not be used to watch into confidential corporate information or private lives. If you sense or
feel that someone should know there's a problem, consider sharing that information with the
appropriate manager. Involve others in process. This is a "watch the watcher" system that can
build trust and support ethical hacking projects.
For instance, one can test computer passwords or attempt social engineering attacks before
drilling down into more detailed systems. What if one is assessing the firewall or Web
application, and one takes it down? This can cause system unavailability, which can reduce
system performance or employee productivity. Even worse, it could cause loss of data integrity,
loss of data, and bad publicity.
Handle social-engineering and denial-of-service attacks carefully. Determine how they can affect
the systems you're testing and entire organization. Determining when the tests are performed is
something that one must think long and hard about. Do the tester test during normal business
hours? How about late at night or early in the morning so that production systems aren't
affected? Involve others to make sure they approve tester's timing.
The best approach is an unlimited attack, wherein any type of test is possible. The hackers aren't
hacking the systems within a limited scope. Some exceptions to this approach are performing
DoS, social engineering, and physical-security tests. One should not stop with one security hole.
This can lead to a false sense of security. One should keep going to see what else he/she can
discover. It's not like to keep hacking until the end of time or until one crash all his/ her systems,
Simply pursue the path he/she is going down until he//she can't hack it any longer. One of the
goals may be to perform the tests without being detected, For example, one may be performing
his/her tests on remote systems or on a remote office, and he/she doesn't want the users to be
aware of what they are doing Otherwise, the users may be on to him/her and be on their best
behavior.
Just a basic Extensive knowledge of the systems is not needed for testing understanding is
required to protect the tested systems. Understanding the systems which are being tested
shouldn't be difficult if one is hacking his/her own in-house systems. If hacking a customer's
systems, one may have to dig deeper. In fact, most people are scared of these assessments. Base
the type of test one will perform on his/her organization's or customer's needs.
• Selecting tools
If one don't have the right tools for ethical hacking, to accomplish the task is effectively difficult
just using the right tools doesn't mean that all vulnerabilities will be discovered. Know the
personal and technical limitations. Many security-assessment tools generate false positives and
negatives (incorrectly identifying vulnerabilities). Some tools may miss vulnerabilities. Many
tools focus on specific tests, but no one tool can test for everything. This is why a set of specific
tools are required that can call on for the task at hand. The more are the tools, the easier ethical
hacking efforts are. Make sure the right tool is being used for the task: To crack passwords, one
needs a cracking tool such as LC4, John the Ripper, or pwdump.
A general port scanner, such as Supers can, may not crack passwords.
EtherPeek
Nmap
SuperScan
QualysGuard
WebInspect
LC4 (formerly called LOphterack)
LANguard Network Security Scanner
Network Stumbler
ToneLoc
Here are some other popular tools:
Internet Scanner
Ethereal
Nessus:
Nikto
Kismet
THC-Scan
The capabilities of many security and hacking tools are often misunderstood. This
Misunderstanding has shed negative light on some excellent tools, such as SATAN (Security
Administrator Tool for Analyzing Networks) and Nmap (Network (1addeu some of these tools
are complex. Whichever tools are being used, one should be familiarized with them before
starting to use them. Here are ways to do that:
1. Search the Internet for own organization me, computer and network system names, and the IP
addresses. Google is a great place to start for this.
2. Narrow the scope, targeting the specific systems to be tested or being tested. Whether
physical-security structures or Web applications, a casual assessment can turn up much
information about the systems.
3. Further narrow down focus with a more critical eye. Perform actual scans and other detailed
tests on the systems.
4. Perform the attacks, if that's what one choose to do.
Evaluating results
Assess the results to see what has been uncovered, assuming that the vulnerabilities haven't been
made obvious before now. This is where knowledge counts. Evaluating the results and
correlating the specific vulnerabilities discovered is a skill that gets better with experience. One
will end up knowing his/her own systems as well as anyone else. This makes the evaluation
process much simpler moving forward. Submit a formal report to upper management or to the
customer, outlining results. Keep these other parties in the loop to show that efforts and their
money are well spent.
Moving on
When finished with ethical hacking tests, one still need to implement his analysis and
recommendations to make sure that the systems are secure.
New security vulnerabilities continually appear . Information systems constantly change and
become more complex. New hacker exploit and security vulnerabilities are regularly uncovered.
Security tests are snapshot of the security postures of the system.
At any time, everything can change, especially after software upgrades, adding computer
systems, or applying patches. Plan to testregularly (for example, once a week or once a month).
Knowing what hackers and malicious users want help understand how they work helps to look at
your information systems in a whole new way. This understanding better prepares for ethical
hacking tests.
Hackers hacked for the pursuit of knowledge and the thrill of the challenge. Hackers see what
others often overlook. They wonder that would happen if a cable was unplugged, a switch was
flipped, or lines of code were changed in a program. These old-school hackers think they can
improve electronic and mechanical devices by "rewiring them!" More recent evidence shows that
many hackers may also hack for political, social, competitive, and even financial purposes, so
times are changing. Hackers who perform malicious acts don't really think about the fact that
human beings are behind the firewalls, wireless networks, and web applications they're attacking.
They ignore that their actions often affect those human beings in negative ways, such as put in
danger their job security and putting their personal safety at risk.
These people don't hack in the way people normally suppose. Instead, they root around in files
on server shares; probe into databases they know they shouldn't be in; and sometimes steal,
modify. And delete sensitive information to which they have access. This behavior is often very
hard to detect. This activity is continued if these users passed their criminal Background and
credit checks before they were hired. Past behavior is often the best predictor of future behavior,
but just because someone has a clean record and authorization to access sensitive systems doesn't
mean he or she won't do anything bad. Criminals may have to start from somewhere.
As negative as breaking into computer systems often can be, hackers and malicious users
Play key roles in the advancement of technology. In a world without hackers, odds are good
That the latest intrusion prevention technology, data leakage protection, or vulnerability
Scanning tools would not exist. Such a world may not be bad, but technology docs keep security
professionals employed and keep the field moving forward. Unfortunately, the
Technical security solutions can't ward off all malicious attacks and unauthorized use
Because hackers and (sometimes) malicious users are usually a few steps ahead of the
Technology designed to protect against their disobedient actions.
However when the stereotypical hacker or malicious user is being viewed, one thing is
Certain: Somebody will always try to take down computer systems and compromise
Information by poking and prodding where he or she shouldn't, through denial of service
Attacks or by creating and launching malware. One must take the appropriate steps to
Protect his/her systems against this kind of intrusion.
Thinking like the bad guys
Malicious attackers often think and work just like thieves, kidnappers, and other organized
Criminals you hear about in the news every day. The smart ones constantly devise ways to
Fly under the radar and exploit coven the smallest weaknesses that lead them to their target.
The following are examples of how hackers and malicious users think and work:
Evading an intrusion prevention system by changing their MAC address or
IP address every few minutes to get further into a network without being
Completely blocked
Exploiting a physical security weakness by being aware of offices that have
Already been cleaned by the cleaning crew and are unoccupied (and thus easy to
Access with little chance of getting caught), which might be made obvious by,
For instance, the fact that the office blinds are opened and the curtains are pulled
Shut in the early morning.
Some common motives are revenge, basic bragging rights, curiosity, boredom,
Challenge, vandalism, theft for financial gain, sabotage, blackmail, extortion.
Corporate intelligence, and just generally speaking out against "the man." Hackers
Regularly cite these motives to explain their behavior, but these motivations tend to
Be cited more commonly during difficult economic conditions.
Many business owners and manages
Administrators believe that they don't have anything that a hacker wants or that
Hackers can't do much damage if they break in. This indifferent kind of thinking
Helps support the bad guys and promote their objectives.
Hackers can compromise a seemingly unimportant system to access the network and
Even
Some network and security
Use it as a launching pad for attacks on other systems, and many people would be
None the wiser because they don't have the proper controls to prevent and detect
Malicious use.
Hackers often hack just because they can. Some hackers go for high-profile systems,
But hacking into anyone's system helps them fit into hacker circles. Hackers exploit
Many people's false sense of security and go for almost any system they think them
Can compromise. Electronic information can be in more than one place at the same
Time, so if hackers merely copy information from the systems they break into, it's
Tough to prove that hackers possess that information.
Computer openings continue to get easier to execute yet harder to prevent for several
Reasons:
Widespread use of networks and Internet connectivity
Anonymity provided by computer systems working over the Internet and often on
The internal network (because, effectively, logging and especially log monitoring
Rarely takes place)
Greater number and availability of hacking tools
Large number of open wireless networks that help hackers cover their tracks
Greater complexity and size of the codebase in the applications and databases being
developed today
Computer-savvy children
Unlikelihood that attackers will be investigated or prosecuted if caught
A malicious hacker only needs to find one security hole whereas IT professionals and
Business owners must find and block them all.
Although many attacks go unnoticed or unreported, criminals who are discovered are
Often not pursued or prosecuted. When they're caught, hackers often rationalize their
Services as being unselfish and a benefit to society: They're merely pointing out
Vulnerabilities before someone else does.
The same goes for malicious users. Typically, their troubles go unnoticed, but if they're
Trapped, the security breach may be kept secret in the name of shareholder value or not
Wanting to disturb any customer or business partner. However, recent information security
And privacy laws and regulations are changing this because in most situations breach
Notification is required. Sometimes, the person is fired or asked to resign. Although public
Cases of internal breaches are becoming more common, these cases don't give a full
Picture of what's really taking place in the average organization.
Hacking in the name of liberty?
Many hackers exhibit behaviors that contradict their stated purposes. They fight for civil
Liberties and want to be left alone, while at the same time, they love prying into the
Business of others and controlling them in any way possible.
Many hackers call themselves civil libertarians and claim to support the principles of
Personal privacy and freedom. However, they contradict their words by intruding on the
Privacy and property of others. They often steal the property and violate the rights of
Others, but are willing to go to great lengths to get their own rights back from anyone who
Threatens them.
This applies to external hacks, internal breaches, and even something as seemingly gentle
As a lost mobile device or backup tapes.
Planning and Performing Attacks
Attack styles vary widely:
Some hackers prepare far in advance of an attack. They gather small bits
Of information and methodically carry out their hacks. These hackers are the
Most difficult to track.
Other hackers
They think through the consequences. Such hackers may try, for example,
To telnet directly into an organization's router without hiding their identities.
Other hackers may try to launch a Do’s attack against a Microsoft Exchange
Server without first determining the version of Exchange or the patches that
Are installed. These hackers usually are caught.
Malicious users are all over the map. Some can be quite savvy based on
Their knowledge of the network and of how IT operates inside the
Usually the inexperienced script kiddies - act before
Organization.
Many of the hackers, especially advanced hackers don't share information
With the crowd. Most hackers do much of their work independently in order
To remain anonymous.
Hackers who network with one another use private message boards, anonymous e-
Mail addresses, hacker websites, and Internet Relay Chat (IRC).One can log in to
Many of these sites to see what hackers are doing.
Following are the aspects of real-world security:
The majority of computer systems aren't managed properly. The
Computer systems aren't properly patched, hardened, or monitored.
Attackers can often fly below the radar of the average firewall, an Intrusion
Prevention system (IPS), or an access control system. This is especially true
For malicious users whose actions are often not monitored at all while, at the
Same time, they have full access to the very environment they can exploit.
Most network and security administrators simply can't keep up with
The deluge of new vulnerabilities and attack methods. These people often
Have too many tasks to stay on top of and too many other fires to put out.
Network and security administrators may also fail to notice or respond to
Security events because of poor time management and goal setting, but
That’s for another discussion.
Information systems grow more complex every year. This is yet another
Reason why overburdened administrators find it difficult to know what's
Happening across the wire and on the hard drives of all their systems,
Mobile devices such as laptops, tablets, and phones are making things
Exponentially worse.
Time is an attacker's friend and it's almost always on his or her side. By attacking
through computers rather than in person, hackers have more control over the timing
for their attacks:
Attacks can be carried out slowly, making them hard to detect.
Attacks are frequently carried out after typical business hours, often in
the middle of the night, and from home, in the case of malicious users.
If one wants detailed information on how some hackers work or want to kcep up
with the latest hacker methods, several magazines are worth checking out:
2600- The Hacker Quarterly magazine
Magazine
PHRACK
Malicious attackers usually learn from their mistakes. Every mistake moves them
one step closer to breaking into someone's system. They use this knowledge when
carrying out future attacks. As an ethical hacker, one needs to do the same.
Maintaining Anonymity
Smart attackers want to remain as low-key as possible. Covering their tracks is a
priority, and many times their success depends on them remaining unnoticed. They
want to avoid raising suspición so they can come back and access the systems in the
future.
Hackers often remain anonymous by using onc of the following resources:
Borrowed or stolen remote desktop and VPN accounts from friends or
previous cmployers
Public computers at libraries, schools, or kiosks at the local mall
Open wireless networks
Internet proxy servers
Anonymous or disposable e-mail accounts from free e-mail services
Open e-mail relays
Infected computers also called zombies or bots at other organizations
Workstations or servers on the victim's own network
If hackers use enough stepping stones for their attacks, they are hard to trace.
Above are few exhaustive steps that can teach how to be a hacker and help to walk the road of
Being an expert hacker. However, one should be a responsible citizen and be selective,
Ensuring one don't use this skill to breach the security of important institutions, as it may land
You in dire straits. One should always remember, for every hacking tool, there is always a
Counter hacking tool. Therefore, be a smart hacker and more importantly, be a responsible
Hacker.
Ethical Hacking Related Careers
Ethical hackers spend most of their time working on computers and must be capable of
Writing computer programming code. Those interested in this career field may be interested in
The other occupations linked to here that involve writing computer code, protecting data stored
On computer networks and creating secure computer networks.
Back-End Developer: Job Description & Salary
Become a Software Developer: Education and Career Roadmap
Computer Networking Specialist: Job Description and Requirements
Hacking Tools: are computer programs and scripts that help you find and exploit
Weaknesses in computer systems, web applications, servers and networks. There is a
Variety of such tools available on the market. Some of them are open source while others
Are commercial solution.