Unit III Vapt(Part i)
Unit III Vapt(Part i)
UNIT III
Introduction to Ethical Hacking Terminology-Five stages of hacking-Vulnerability Research-
Legal implication of hacking Impact of hacking. Foot printing & Social engineering.
Ethical hacking, also known as penetration testing or white-hat hacking, involves legally
breaking into computers and devices to test an organization's defenses. Ethical hackers use
their skills to identify vulnerabilities and help organizations secure their systems. Below are
some fundamental terminologies associated with ethical hacking:
1. Hacker Types
White-Hat Hacker: Ethical hackers who use their skills to improve security.
Black-Hat Hacker: Malicious hackers who exploit systems for personal gain.
Gray-Hat Hacker: Hackers who fall between ethical and malicious hacking, often
identifying vulnerabilities without permission.
2. Cybersecurity Terms
3. Attack Techniques
4. Security Measures
1
III CSE-CS II SEM VA&PT
Discovering vulnerabilities from an attacker’s POV so that weak points can be fixed.
Implementing a secure network that prevents security breaches.
Social Engineering
Types of Hacking/Hackers:
Hackers are of different types and are named based on their intent of the hacking system.
Broadly, there are two main types in hacking/hacker – White-Hat hacker and Black-Hat
hacker. The names are derived from old Spaghetti Westerns, where the good guy wears a
white hat and the bad guy wears a black hat.
2
III CSE-CS II SEM VA&PT
3
III CSE-CS II SEM VA&PT
An attacker or an ethical hacker follows the same five-step hacking process to breach the network or
system. The ethical hacking process begins with looking for various ways to hack into the system,
exploiting vulnerabilities, maintaining steady access to the system, and lastly, clearing one’s tracks.
1. Reconnaissance:(Information Gathering)
“Hackers gather information about the target, such as IP addresses, domain details, employee
emails, and technology stack.”
4
III CSE-CS II SEM VA&PT
Reconnaissance is the first step in ethical hacking. It’s often referred to as footprinting. Here,
a hacker tries collecting various kinds of data, such as employee information, IP addresses,
network topology, and domain names, using active and passive approaches. The purpose is to
create a diagram of the target’s digital and physical assets.
Active Reconnaissance: This method involves direct interaction with the target system,
which may warn the target about possible scans.
Passive Reconnaissance: This implies collecting data without direct contact with the target,
making it untraceable.
5
III CSE-CS II SEM VA&PT
3. Gaining Access:(Exploitation)
“The hacker exploits vulnerabilities found in the previous phase to gain unauthorized access.”
During this crucial stage, the intruder utilizes the weaknesses identified during scanning for
unauthorized entry into the target system. This may involve leveraging applications, operating
systems, or network flaws. The objective is establishing access at different privilege levels, from user
accounts to administrative control. Exploitation Methods comprise buffer overflows, SQL injection,
and cross-site scripting (XSS).
4. Maintaining Access:(Persistence)
“After gaining access, hackers create backdoors, rootkits, or install malware to ensure
continued access.”
Once inside, the intruder must maintain a presence on the target machine for further actions such as
gathering or monitoring sensitive data. Therefore, backdoors, rootkits, or Trojan horses can be
installed at this point to ensure continued access to the device even after it has been rebooted or
patched. Persistence Techniques: Employing malicious programs, establishing concealed user
accounts, or exploiting cron jobs.
Tools Used:
Netcat
Ngrok
Empire
C2 frameworks
6
III CSE-CS II SEM VA&PT
Trojan Horses: Integrating applications that look real but permit unlawful entry.
Tools Used:
CCleaner
Stealth Rootkit
Timestomp
Log wiping
Encryption
Vulnerability Research-:
“Vulnerability research in ethical hacking is the process of finding and analyzing potential
weaknesses in computer systems and software. The goal is to identify vulnerabilities that
could be exploited by attackers. ”
Vulnerability research is the process of identifying, analyzing, and understanding weaknesses
in information systems, software, or hardware that could be exploited by malicious actors.
This research is crucial for improving cyber security and protecting sensitive data. Here are
some key aspects of vulnerability research:
Identification: Researchers use various tools and techniques to discover vulnerabilities in
systems. This can include static analysis (examining code without executing it), dynamic
analysis (testing the system while it's running), and fuzz testing (inputting random data to
find unexpected behaviors).
Reviewing source code (static analysis)
7
III CSE-CS II SEM VA&PT