My Final Report
My Final Report
PROJECT REPORT
ON
Submitted by
NAMAN GROVER
21EJCEC089
Guided by
Dr. Shweta Sharda
Assistant Professor
i
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
CERTIFICATE
SHWETA SHARDA
(Assistant Professor)
Department of ECE
ii
iii
ABSTRACT
Today more and more software’s are developing and people are getting more
and moreoptions in their software’s. However, as more and more organizations
become partially orcompletely dependent on the internet, computer security and
the serious threat of computercriminals come to the foreground. The explosive
growth of internet has brought many goodthings like e-commerce, email, and
new avenues for advertising and information distribution,to nameafew.As with
most technical advances , there is also a dark side: criminal hackers.
Government,companies and private citizens around the world are anxious to be
a part of this revolution,but they are afraid that some hacker will break into
their web server and can hamper theirprivacy. Withthisconcern,
ethicalhackerscometo rescue.
Unfortunately, most organizations across the globe continue to remain
oblivious of the threatposed by the computer criminals, corporate espionage
and cyber terrorism. Ethical Hackingattempts to pro-actively increase security
protection by identifying and patching knownsecurity vulnerabilitiesonsystems
owned byotherparties.
iv
KEYWORDS
1. Hacker
2. Vulnerability
3. Phishing
4. SQL
5. Stumbler
6. SNIFFING
7. Payroll
8. Intruders
9. Cryptography
10. Contrary
11. DDOS
12. Exploitation
13. Ciphertext
14. Threat
15. Forensic
16. Legitimate
17. URL
18. HTTP
19. Unix
20. GNU
v
Contents
TableOfContents PageNo.
vi
2.4.4 Hacking WirelessNetworks --------------------------------- 5
ChapterIII:TOOLSANDTECHNIQUES 9-14
3.1.2 Metasploit-----------------------------------------------9
vii
3.2.1 Sniffing ----------------------------------------------- 11
16ChapterV:WHAT’SNEXT 17
19Chapter VII:Conclusion 20
viii
REFERENCES21APPENDICES22-34APPENDIX-I-
CHAPTER-
ix
IINTRODUCTIO
Ethical Hacking also known as penetration testing or white hat hacking , involves the
sametools and tricks that hackers use. The major difference is that Ethical Hacking is legal.
EthicalHacking is performed with target permission. The intent of Ethical Hacking is to
discovervulnerabilities from a hacker’s viewpoint so system can be better secured. This type
ofHackingalsoensuresthat vendorclaims about security oftheir productsarelegitimate.
1.1 SECURITYANDINTEGRITY
INTEGRITY
It means data cannot be modified without authorization. This means that the
data seen by theauthorizedpersonsshouldbecorrectorhedata
shouldmaintainthepropertyofintegrity.
Integrity is violated when a computer virus infects a computer like when
someone is able tocast a large number of votes in online poll, an employee is
able to modify his own salary in apayroll database and so on. In such cases the
data is modified and we can say that there is abreach in security.
x
protecting information and information systems from unauthorized access,
use, disclosure,disruption, modification or destruction. Usually, it is defined in
terms of CIA Triads. TheCIA are the basic principles of security in which C
denotes the confidentiality, I representsintegrity, and A represents availability.
For example, in case of a credit card transaction, theauthorized person should
see the credit card number and he should see the data. Nobodycould see that
data as they may use it for some other activities. Thus the confidentiality
isvery important. Confidentiality is necessary for maintaining the privacy of
people whosepersonal informationof asystemholds.
INTEGRITY
It means data cannot be modified without authorization. This means that the
data seen by theauthorizedpersonsshouldbecorrectorhedata
shouldmaintainthepropertyofintegrity.
Integrity is violated when a computer virus infects a computer like when
someone is able tocast a large number of votes in online poll, an employee is
able to modify his own salary in apayroll database and so on. In such cases the
data is modified and we can say that there is abreach in security.
1.2 NEEDFORSECURITY
xi
CHAPTER-II
HACKINGBASICS
2.1 HACKINGANDHACKERS
2.2 TYPESOFHACKERS
Hackersareofdifferenttypesandarenamedbasedontheirintentofthehackingsystem.
a) WhiteHatHackers
b) BlackHatHackers
c) GreyHatHackers
2.2.1 WhiteHatHacker
Ethical Hackers or White Hat Hackers do not intend to harm the system or
organization butthey do so , officially , to penetrate and locate the
vulnerabilities, providing solutions to fixthem and ensure safety. Companies
like Facebook , Microsoft and Google use white hathackers.
xii
Contrary to an ethical hacker , Black Hat Hackers or non-ethical hackers
perform hacking tofulfil theirselfishintentionsto collectmonetarybenefits.
2.2.2 GreyHatHacker
They are the combination of white and black hat hackers. They hack without
any
maliciousintentforfun.Theyperformhackingwithoutanyapprovalfromthetargete
dorganization.
2.3 BENEFITSOFETHICALHACKING
The primary benefit of ethical hacking is to prevent data from being stolen
and misused bymaliciousattackers, as wellas,
2.4 TYPESOFETHICALHACKING
xiii
2.4.1 WebApplicationHacking
2.4.2 SystemHacking
2.4.3 WebServerHacking
2.4.4 HackingWirelessNetworks
2.4.5 SocialEngineering
2.5 SKILLSREQUIRED
2.5.1 ComputerNetworkingSkills
Thecomputernetworkisnothingbuttheinterconnectionofmultipledevices,generall
ytermedasHostsconnectedusingmultiplepathstosend/receivedataormedia.
xiv
UnderstandingnetworkslikeDHCP,Superwetting,Subnetting,andmorewillprovid
eethicalhackerstoexplorethevariousinterconnectedcomputersinanetworkandthep
otentialsecuritythreatsthatthismightcreate,aswellashowtohandlethosethreats.
2.5.2 ComputerSkills
Computerskillsareknowledgeandabilitywhichallowonetousecomputersandrelatedt
echnology.Typically,basiccomputerskillsincludedataprocessing,managingcomput
erfiles,andcreatingpresentations.Advancedcomputerskillsincludemanagingdataba
ses,programming,andrunningcalculationsinspreadsheets.Someofthemostessential
.computerskillsareMSOffice,Spreadsheets,Email,DatabaseManagement,SocialMe
dia,Web,Enterprisesystems,etc.Anethicalhackerneedstobeacomputersystemsexpe
rt.
2.5.3 LinuxSkills
Linuxisacommunityofopen-
sourceUnixlikeoperatingsystemsthatarebasedontheLinuxKernel.Itisafreeandope
n-
sourceoperatingsystemandthesourcecodecanbemodifiedanddistributedtoanyonec
ommerciallyornoncommerciallyundertheGNUGeneralPublicLicense.Themainre
asontolearnLinuxforanethicalhackeris,intermsofsecurity,Linuxismoresecurethan
anyotheroperatingsystem.ItdoesnotmeanthatLinuxis100percentsecureithassome
malwareforitbutislessvulnerablethananyotheroperatingsystem.So,itdoesnotrequir
eanyanti-virussoftware.
xv
2.5.4 ProgrammingSkills
AnothermostimportantskilltobecomeanethicalhackerisProgrammingSkills.Sow
hatdoesthewordprogramminginthecomputerworldactuallymeans?Itmeans,“The
actofwritingcodeunderstoodbyacomputationaldevicetoperformvariousinstructio
ns.”So,togetbetteratprogramming,onewillbewritingalotofcode!Beforeonewrites
codehe/shemustchoosethebestprogramminglanguageforhis/herprogramming.He
reisthelistofprogramminglanguagesusedbyethicalhackers
1. Python
2. SQL
3.C++
4. Java
5. C
6. PHP
7. Ruby
8. Pearl
2.5.5 BasicHardwareKnowledge
Computerhardwarecomprisesthephysicalpartsofacomputer,likethecentralprocessi
ngunit(CPU),monitor,mouse,keyboard,computerdatastorage,graphicscard,soundc
ard,speakersandmotherboard,etc.
2.5.6 ReverseEngineering
ReverseEngineeringisaprocessofrecoveringthedesign,requirementspecification
s,andfunctionsofaproductfromananalysisofitscode.Itbuildsaprogramdatabasean
dgeneratesinformationfromthis.Theobjectiveofreverseengineeringistoexpeditet
hemaintenanceworkbyimprovingtheunderstandabilityofasystemandtoproducet
henecessarydocumentsforalegacysystem.Insoftwaresecurity,reverseengineerin
xvi
giswidelyusedtoensurethatthesystemlacksanymajorsecurityflawsorvulnerabiliti
es.
2.5.7 CryptographySkills
Cryptographyisthestudyandapplicationoftechniquesforreliablecommunicationi
nthepresenceofthirdpartiescalledadversaries.Itdealswithdevelopingandanalyzin
gprotocolsthatpreventmaliciousthirdpartiesfromretrievinginformationbeingshar
edbetweentwoentitiestherebyfollowingthevariousaspectsofinformationsecurity.
Cryptographydealswithconvertinganormaltext/messageknownasplaintexttoanon-
readableformknownasciphertextduringthetransmissiontomakeitincomprehensiblet
ohackers.Anethicalhackermustassurethatcommunicationbetweendifferentpeople
withintheorganizationdoesnotleak.
2.5.8 DatabaseSkills
DBMSisthecruxofcreatingandmanagingalldatabases.Accessingadatabasewhere
alltheinformationisstoredcanputthecompanyinatremendousthreat,soensuringtha
tthis
softwareishack-
proofisimportant.Anethicalhackermusthaveagoodunderstandingofthis,alongwit
hdifferentdatabaseenginesanddataschemastohelptheorganizationbuildastrongD
BMS.
2.5.9 ProblemSolvingSkills
Problem-
xvii
solvingskillshelponetodeterminethesourceofaproblemandfindaneffectivesolutio
n.Apartfromthetechnicalskillspointedabove,anethicalhackeralsomustbeacriticalt
hinkeranddynamicproblemsolver.Theymustbewantingtolearnnewwaysandensur
eallsecuritybreachesarethoroughlychecked.Thisrequirestonsoftestingandaninge
niouspenchanttodevicenewwaysofproblem-solving.
xviii
CHAPTER-
IIITOOLSANDTECHNIQU
3.1 TOOLS
3.1.1 Nmap
It stands for Network Mapper. It is an open source tool that is used widely for
networkdiscovery and security auditing. Nmap was originally designed for
large networks but it canworkequallywellfor singlehosts.
NmapusesrawIPpackets todetermine−
whathostsareavailableonthenetwork,
whatservices thosehostsareoffering,
whatoperatingsystems theyarerunningon,
whattypeoffirewallsareinuse,andothersuchcharacteristics.
NmaprunsonallmajorcomputeroperatingsystemssuchasWindows,MacOSX,andLi
nux.
3.1.2 Metasploit
Metasploitisoneofthemostpowerfulexploittools.It’s aproductofRapid7andmost
xix
ofitsresources can befound..Itcomes in twoversions
−commercialandfreeedition.MetasploitcanbeusedwithcommandpromptorwithWe
bUI.
WithMetasploit,youcanperformthefollowingoperations−
Conductbasicpenetrationtestsonsmallnetworks
Runspotchecks ontheexploitabilityofvulnerabilities
Discoverthenetworkorimportscandata
Browseexploitmodules andrunindividualexploitsonhosts
.
3.1.1 BurpSuit
Burp Suite is a popular platform that is widely used for performing security
testing of webapplications. It has various tools that work in collaboration to
support the entire testingprocess, from initial mapping and analysis of an
application's attack surface, through tofinding and
exploitingsecurityvulnerabilities.
Burp is easy to use and provides the administrators full control to combine
advanced
manualtechniqueswithautomationforefficienttesting.Burpcanbeeasilyconfigure
danditcontainsfeaturestoassisteventhemost experienced testerswith their work.
3.1.2 CainandAbel
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It
xx
helps in easyrecovery ofvariouskindsofpasswords byemploying any
ofthefollowingmethods−
sniffingthenetwork,
crackingencryptedpasswordsusingDictionary,Brute-
ForceandCryptanalysisattacks,
recordingVoIPconversations,
decodingscrambledpasswords,
recoveringwirelessnetworkkeys,
revealing passwordboxes,
uncoveringcachedpasswordsandanalyzing routingprotocols.
Cain&Abelisausefultoolforsecurityconsultants,professionalpenetrationtest
ersand everyoneelsewhoplansto useitfor ethical reasons.
3.1.3 NetStumbler
xxi
3.2 TECHNIQUES
3.2.1 Sniffing
Sniffing is the process of monitoring and capturing all the packets passing
through a givennetwork using sniffing tools. It is a form of “tapping phone
wires” and get to know about theconversation. It isalsocalledwiretapping
applied tothecomputernetworks.
In other words, Sniffing allows you to see all sorts of traffic, both protected
and
unprotected.Intherightconditionsandwiththerightprotocolsinplace,anattackin
gpartymaybeableto gather information that can be used for further attacks or
to cause other issues for thenetwork or systemowner.
3.2.2 SQLInjection
SQL injection is a set of SQL commands that are placed in a URL string or in
data structuresin order to retrieve a response that we want from the databases
that are connected with theweb applications. This type of attacks generally
takes place on webpages developed usingPHPor ASP.NET.
AnSQLinjectionattackcanbedonewiththefollowingintentions −
Todumpthewholedatabaseofasystem,
Tomodifythe contentofthedatabases,or
xxii
This type of attack works when the applications don’t validate the inputs
properly, beforepassing them to an SQL statement. Injections are normally
placed put in address bars, searchfields, or datafields.
SQLMAP
SQLMAP is one of the best tools available to detect SQL injections. It can be
downloadedfromhttp://sqlmap.org/
3.2.3 InformationGathering
xxiii
3.2.4 VulnerabilityScanner
Vulnerability scanners allow you to connect to a target system and check for
suchvulnerabilities as configuration errors and system vulnerabilities. A
popular vulnerabilityscanner is the freely available open source tool Nessus.
Nessus is an extremely powerfulnetwork scanner that can be configured to run
a variety of scans. While a Windows graphicalfront-endis available,thecore
Nessus productrequiresLinux to run.
3.2.5 Exploitation
3.2.6 PenTesting
whatwillbethetimeofpenetration test,
whatwillbethepenetrationfieldsofthesystem.
xxiv
Penetration testing is conducted by professional ethical hackers who mainly
use commercial,open-source tools, automate tools and manual checks. There
are no restrictions; the mostimportantobjectivehereis touncover as
manysecurity flaws aspossible.
TypesofPenetrationTesting
Wehavefivetypesofpenetrationtesting−
Black Box − Here, the ethical hacker doesn’t have any information
regarding theinfrastructure or the network of the organization that he is
trying to penetrate. Inblack-box penetration testing, the hacker tries to
find the information by his ownmeans.
RISK=Threat×Vulnerability
xxvi
CHAPTER-IV
ROLES,RESPONSIBILITIESANDCHALLENGESOFETHICALHAC
KERS
4.1ROLESANDRESPONSIBILITIES
Ethical hackers are similar to penetration testers, but the role of an ethical
hacker is broaderand involves a greater range of duties. Like penetration
testers, ethical hackers break intosystems legally and ethically. However,
ethical hackers are also responsible for fixing
thevulnerabilitiestheyidentify.Responsibilitiesofethicalhackers include:
xxvii
4.2CHALLENGES
For the ethical hacker to perform properly, access to the entire system or
network might beneeded. Because of the need for professionalism, the ethical
hacker must not violate the limitsimposed by theclientso that
professionalissuesareminimized.
Penetration testing is conducted by professional ethical hackers who mainly
use commercial,open-source tools, automate tools and manual checks. There
are no restrictions; the mostimportantobjectivehereis touncover as
manysecurity flaws aspossible.
Ethical hacking is conducted by hackers as well but their intention behind
hacking is notfor malicious purposes. Ethical hackers are referred to as White
Hats, who end up provideprotection from the Black Hats who are the unethical
hackers. Ethical hacking is adopted bymany almostevery organization.Chief
InformationSecurity Officer, Application Security Tester, Chief Application
Security Officer, etc. offerexciting prospects. They can work in Defense
organizations, law enforcement organizations,forensic organizations, detective
companies, investigative organizations, etc.Growing at a rate that is outpacing
all other areas of IT, cybersecurity has emerged as a high-growth-field of 2017,
and possibly of the entire decade. During the 5 years between 2012 and2017,
listings for cybersecurity jobs increased by a whopping 75% according to the
analysismade by the Bureau of Labor Statistics. This has led to a lot of unfilled
positions so jobs areplenty and theypay welltoo.
xxviii
CHAPTER-
VWHAT’SNEX
5.1CAREEROPPRTUNITIES
xxix
organizations, law enforcement organizations,forensic organizations, detective
companies, investigative organizations, etc.
xxx
Source:GoogleTrends
Growing at a rate that is outpacing all other areas of IT, cybersecurity has
emerged as a high-growth-field of 2017, and possibly of the entire decade.
During the 5 years between 2012 and2017, listings for cybersecurity jobs
increased by a whopping 75% according to the analysismade by the Bureau of
Labor Statistics. This has led to a lot of unfilled positions so jobs areplenty and
theypay welltoo.
Howmuchmoneydoesanethicalhackermake?
xxxi
CHAPTER-VI
Q1. Howmuchtimeittakestobreakintoasystem?
Q2.Whatisthedifferencebetweenethicalhackersandhackers ?
Ans: Ethical hacking is conducted by hackers as well but their intention behind
hacking is notfor malicious purposes. Ethical hackers are referred to as White
Hats, who end up provideprotection from the Black Hats who are the unethical
hackers. Ethical hacking is adopted bymany almostevery organization.The
average time it took ethical hackers to get to the internal network was four
days,but in onecaseitwas possiblein just thirtyminutes .
Q3.RoleofEthicalHackersinGovernmentAgencies.
Q4.Areaswhereethical hackersareemployed.
Ans:TheyHelpInEducatingTheOtherEmployees
Skilled ethical hackers are aware of the actions on the part of employees which
createsvulnerabilities.Thus,theycanwarnemployeesagainstvulnerableactionswhil
eusingcompany computing systems. An aware and educated workforce acts as a
fence to secure thenetwork of theorganization.
xxxiii
Chapter-
VIICONCLUSI
ON
Hacking has both its benefits and risks. Hackers are very diverse. They may
bankrupt
acompanyormayprotectthedata,increasingtherevenuesforthecompany.Thebattle
between the ethical or white hat hackers and the malicious or black hat hackers
is a long war,which has no end. While ethical hackers help to understand the
companies’ their securityneeds, the malicious hackers intrudes illegally and
harm the network for their personalbenefits. which may allow a malicious
hacker to breach their security system. EthicalHackers help organizations to
understand the present hidden problems in their servers andcorporate
network.[3] Ethical Hacking is a tool, which if properly utilized, can prove
usefulfor understanding the weaknesses of a network and how they might be
exploited.[2]This alsoconcludes that hacking is an important aspect of
computer world. It deals with both sides ofbeing good and bad. Ethical hacking
plays a vital role in maintaining and saving a lot ofsecret information, whereas
malicious hacking can destroy everything. What all depends isthe intension of
the hacker. It is almost impossible to fill a gap between ethical and
malicioushackingashuman mindcannot beconquered,butsecurity
measurescanbetighten[3].
xxxiv
becausedoesn’tmatterwhatit is nothing is unhackable.
References
[1] Wikipedia.
[2] C.Palmer,"EthicalHacking,"IBMSystems,vol.40,no.3,pp.769-780,2001.
xxxv
APPENDIX
HackingTerminologies
Adware−Adwareissoftwaredesignedtoforcepre-
chosenadstodisplayonyoursystem.
Attack − An attack is an action that is done on a system to get its access
and extractsensitive data.
xxxvi
isallocatedto hold.
DDoS−Distributeddenialofserviceattack.
xxxvii
xxxviii
xxxix
xl
xli
xlii
xliii
xliv
xlv
xlvi