Introduction To EH
Introduction To EH
3 7
1 5
Attack
Assets Vulnerability Threats Cyberattack Exploit Payload
vector
2 4 6
An exploit is a piece of
Weaknesses, flaws or errors in a pathway or method used by a software, data or sequence of
technology, people or procedures hacker to illegally access a commands that takes advantage
that can be exploited by threat network or computer in an of a vulnerability to cause
actors to compromise, degrade or attempt to exploit system unintended behavior or to gain
abuse information resources. vulnerabilities. Example, unauthorized access to sensitive
malware, USB, etc data
Concepts
Cyber Risk: the potential of loss or harm related to
technology/cyber infrastructure within an organisation.
Risk exist as a result of the
interaction/intersection between
Vulnerability vulnerability, threats and the assets.
It is expressed as the product of
Risk
vulnerability, threats and assets, i.e.
The goals of securing digital assets of any entity is to ensure their confidentiality,
integrity and availability (CIA). This can be extended to cover non-repudiation and
authenticity.
Confidentiality
Non-Repudiation
Integrity
Cybersecurity
Goals
Authenticity
Availability
Fundamental Principles of Protecting Information systems
▪ Confidentiality is a set of rules that prevents sensitive information from
being disclosed to unauthorized people, resources and processes.
Methods to ensure confidentiality include data encryption, identity
proofing and two-factor authentication.
▪ Integrity ensures that system information or processes are protected
from intentional or accidental unauthorized modifications. One way to
ensure integrity is to use a hash function or checksum.
▪ Availability means that authorized users are able to access systems and
data when and where needed and those that do not meet established
conditions, are not. This can be achieved by maintaining
equipment, performing hardware repairs, keeping operating systems
and software up to date, and creating backups.
Fundamental Principles of Protecting Information systems
▪ Authenticity: The assurance that the information
communicated is genuine. It addresses the fact that
the source of the information as claimed is genuine.
Operating system
End point security security
Critical information
Identity management infrastructure security
Technology - Threats Categorisation – Network Threats
▪ Information gathering
▪ Sniffing and eavesdropping
▪ Spoofing
▪ Session hijacking and man-in-the-middle attack
▪ DNS and ARP Poisoning
▪ Password-based attacks
▪ Denial-of-Service attack
▪ Compromised-key attack
▪ Firewall and IDS attacks
Technology - Threats Categorisation – End-Points Threats
▪ Malware attacks
▪ Footprinting
▪ Password attacks
▪ Denial-of-Service
▪ attacks
▪ Arbitrary code
▪ execution
▪ Unauthorized access
▪ Privilege escalation
▪ Backdoor attacks
▪ Physical security threats
Technology - Threats Categorisation – Applications and OS Threats
▪ Improper data/input validation
▪ Authentication and Authorization attacks
▪ Security misconfiguration
▪ Information disclosure
▪ Broken session management
▪ Buffer overflow issues
▪ Cryptography attacks
▪ SQL injection
▪ Improper error handling and exception management
Network Basics Benefits of a Computer
Network Network
▪A network is a connection ▪ Cost-effective resource
sharing.
of two or more computing
devices through a media. ▪ Improving storage efficiency
and volume.
Types of Computer
Local Area Networks
Network
Metropolitan
Area Network
Network
Topologies
Point-to- Daisy
point BUS Star Ring Tree Chain Hybrid
Mesh
Network Topology – point-to-point
Application Layer
Application Layer
Presentation Layer TELNET, FTP, SMTP, POP3, SNMP, NNTP, DNS,NIS, NFS,
HTTP, etc.
Session Layer
HTTP Server
HTTP
Internet .COM
Client
www.binghamuni.edu.ng
The Transport Layer Security (TLS) protocol is added to HTTPS based on HTTP to enable:
▪ identify authentication,
▪ data encryption and integrity verification,
HTTPS uses port number 443 and HTTP uses port number 80
HTTP HTTP
▪ Identity authentication
TCP TLS
▪ Data encryption
▪ Integrity verification
IP TCP
IP
TCP/IP Protocols – Application Layer Protocols - DNS
▪ The Domain Name server (DNS) maps human readable domains or
website addresses unto machine readable IP addresses and maintains a
database of this mapping.
▪ FTP operates over TCP/IP and typically uses port 21 for control commands and
port 20 for data transfer.
proactive mode is when the client initiates the control connection, but the server
initiates the data connection. In this mode, the client sends the server the PORT
command, which includes the client's IP address and a port number that the client has
opened for the data connection. The server then uses this information to establish
the data connection back to the client. Active mode can be problematic when the
client is behind a firewall or NAT (Network Address Translation) because these often
block incoming connections, making it difficult for the server to initiate the data
connection.
TCP/IP Protocols – Application Layer Protocols - SFTP
▪ Secure file transfer protocol (SFTP) transfer files securely based on the secure shell
SSH
▪ SFTP encrypts the authentication information and data to be transmitted. With
higher security compared to FTP.
▪ SFTP is a single channel protocol and its default destination port is 22
▪ The client and server are securely connected using SSH to securely transfer files.
FTP SFTP
TCP/IP Protocols – Application Layer Protocols - TELNET
▪ Telnet is a network protocol used to provide a command-line interface for
communication with remote devices over a TCP/IP network
▪ It allows users to remotely access and manage devices such as servers, routers, and
switches.
▪ Network ID
▪Identifies the network to which the host belongs
▪Assigned by registry authority and cannot be
changed
▪ Host ID
▪Identifies the individual host
▪Assigned by organizations to individual devices
IP Address Format: Dotted Decimal Notation
32 bits, with 8 bit groupings
Example 172.16.128.17
Class D:
Multicast addresses *127 (011111111) is a Class A address reserved for
loopback testing and cannot be assigned to a network.
224 – 247.x.x.x
Class E:
248 – 255.x.x.x
Experimental purposes
IP Address Ranges
Class Range Number of Possible Networks Number of Possible Number of Usable
Hosts in One Hosts in One
Network Network
A 1-126
126 16,777,216 16,777,214
B 128 -191
16,382 65,536 65,534
C 192-223
2,097,150 256 254
▪ Number of Possible networks is = 2x-y, Where x = number of network bits,
▪ y = number of fix bits in the network bits. Note that y depends on the IP
address Class,
▪ Number of Possible Hosts in one network = 2x where x is the number of hosts
bits
▪ Number of usable hosts in one network is = 2x – 2, where x is the number of
host bits
Reserved IP Addresses
Private Networks (no public connections)
• 10.x.x.x – Class A
• 172.16.x.x – Class B
• 192.168.x.x – Class C
Local Network
• 127.x.x.x – local network (loopback)
Multicast
• 255.255.255.255 – broadcast – sends to everyone on the network
IP Address Shortage
▪ IPv4 has potential for 4 billion IP addresses, However, with increased
Internet Connectivity, this number is running out.
▪ A solution has been created through the 128 bits IPv6 but majority of
Internet users are yet to adopt IPv6 due to compatibility issues between
IPv4 and IPv6
NB: This has potentials to increase security as these IPs are not visible outside
IPv4 and IPv6
IPv6 was developed by the Internet Engineering Task Force (IETF) to
provide a long term solution to the problem of IP exhaustion in IPv4.
340,282,366,920,938,463,463,374,607,431,768,211,456 Ips
340 undecillion, approximately 3.4×1038
2001:0DB8:3C4D:0015:0000:0000:1A2F:1A2B
Most IPv6 addresses do not occupy all of their possible 128 bits. This
condition results in fields that are padded with zeros or contain only zeros
IPv4 and IPv6 – Abbreviating IPv6 addresses
Most IPv6 addresses do not occupy all of their possible 128 bits. This condition
results in fields that are padded with zeros or contain only zeros
The IPv6 addressing architecture allows one to use the two-colon (::) notation to
represent contiguous 16-bit fields of zeros. For example, you might abbreviate the
IPv6 address:
2001:0DB8:3C4D:0015:0000:0000:1A2F:1A2B to:
Purpose
❖ Reduce network congestions
❖ Improve network performance
❖ Improve security
Our first network commences from 00000000-01000000 (0 – 63), 2nd subnet 0100000000-01111111 (64-127), 3rd
network from 10000000 – 10111111(128-190) and 4th network from 11000000 – 11111111 (192-255)
Note that the number of bits borrowed is a function of the number of subnets required, for example, if we
need 8 subnets, we will borrow 3 bits, if we need 16 subnets, we will borrow 4 bits, etc.
Building subnets from a network - Example
You are given a network 192.168.4.0/24 to create three networks for department of
finance, engineering and manufacturing
Step 1: Create a Subnetting Table and identify the column that gives you the number of subnets
Subnet 1 2 4 8 16 32 64 128 256
Host 256 128 64 32 16 8 4 2 1
Subnet /24 /25 /26 /27 /28 /29 /30 /31 /32
Mask
Here, 4 represents the number of subnets, 64 is the number of possible host (host IDs)
and /26 is the new subnet mask.
Building subnets from a network
00-BB-BC 83-95-A2
Manufacturer’s ID Device ID
▪ White Hat: The good guys who carryout proactive hacking to prevent the success
of the Black Hat hackers. They break into systems for the purpose of assessing
and testing the level of network security in those systems. Thus, exposing the
vulnerabilities in systems before black hat hackers can detect and exploit them.
▪ Grey Hat: The activities of this group are sandwich between the Black and the
White Hats. They have unauthorised access to computers and networks with a
view to identify weaknesses and reveal them to the system owner.
Hackers’ Motivations
Motivation is the perception that the targeted system stores, processes or transmit
valuable assets and the attacker will gain while the victim loses.
▪ Financial gain: The primary motivation for some hackers is the money they can steal
by obtaining victim’s passwords, electronic payment details, etc.
▪ Revenge: hackers that are motivated by anger or hurt and use their skills to attack
the system of individuals, groups or company.
▪ Hacktivists: hackers that are motivated by politics or religion and use their hacking
capabilities harass victims by defacing their websites or causing other forms of
damage.
▪ Cyber Terrorists: motivated by religious or political persuasions and create fear and
chaos by disrupting critical infrastructures. The cascading effects of CI disruption
may cause huge effects in the form of wide spread fear, terror and deaths.
Hackers’ Motivations – cont’d
▪ State Sponsored: State actors across the world have use the cyberspace
as a force multiplier to further their national interest through espionage
and sometimes outright disruptions corporate, government and critical
infrastructure of other nations.
▪ Operating System Exploits: In-depth knowledge of operating systems, especially Linux and Windows,
including how to exploit and secure them, is vital. This includes familiarity with OS-specific tools and
techniques.
▪ Penetration Testing Tools: Expertise in using penetration testing tools such as Metasploit, Nmap, Burp
Suite, Wireshark, and Nessus to identify, analyze, and exploit security weaknesses.
▪ Web Application Security: Knowledge of web technologies and vulnerabilities like SQL injection,
XSS, CSRF, and other common web application attacks. Proficiency in using tools and techniques to
test and secure web applications.
Skills of an Ethical Hacker (Non-Technical)
▪ Problem-Solving Ability: Ethical hackers must think creatively to identify and solve
complex security challenges, often devising unique approaches to breach systems
ethically.
▪ Ethical Judgment: Strong moral principles guide ethical hackers to use their skills
responsibly and legally, maintaining trust and integrity in their professional activities.
▪ Management Network
• Purpose: Dedicated to administrative tasks and management of network
devices, servers, and security systems.
• Security: Restricted access to authorized personnel only, often with
additional authentication mechanisms and logging for auditing purposes.