0% found this document useful (0 votes)
49 views26 pages

Ethical Hacking Basics: CE33201 Eka Stephani Sinambela

The document discusses the history of hacking and provides an overview of ethical hacking. It describes how the original meaning of "hack" referred to an elegant way of problem-solving at MIT. It then covers different eras of hacking from the 1970s to the 1990s and mentions famous hackers. The document also defines the CIA triad of security - confidentiality, integrity, and availability. It explains ethical hackers, different hacker classes and hats, the steps of an ethical hacking engagement, types of ethical hacking tests, and common attack types.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views26 pages

Ethical Hacking Basics: CE33201 Eka Stephani Sinambela

The document discusses the history of hacking and provides an overview of ethical hacking. It describes how the original meaning of "hack" referred to an elegant way of problem-solving at MIT. It then covers different eras of hacking from the 1970s to the 1990s and mentions famous hackers. The document also defines the CIA triad of security - confidentiality, integrity, and availability. It explains ethical hackers, different hacker classes and hats, the steps of an ethical hacking engagement, types of ethical hacking tests, and common attack types.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

CE33201

Ethical Hacking Basics Eka Stephani Sinambela


Think: Do I really need to print this?

27-2-2019 KAJAR_1819/ESS 2
Old School Hackers: History of Hacking
• PREHISTORY
– 1960s: The Dawn of Hacking
Original Meaning of the word “hack” started at MIT; meant
elegant, witty or inspired way of doing almost anything; hacks
were programming shortcuts
• ELDERS DAYS (1970 -1979)
– 1970: Phone Phreaks and Cap’n Crunch: One phreak, John
Draper, discover a toy whistle inside cap’n crunch cereal gives
2600 herts signal, and can access AT&T’s long distance switching
system.
– Draper build a “blue box” used with whistle allows phreaks to
make free calls
– Steve Wozniak and Steve Jobs, futures founders of Apple
Computer, make and sell Blue Boxes

27-2-2019 KAJAR_1819/ESS 3
Old Scholl Hackers: History of Hacking
• 1980 : Hacker Message Board and Groups
– Hacking Groups form: such as legion of doom (US)
, Chaos Computer Club (Germany)
– 1983: Kid’s game movie “War Games” Introduces
public to hacking
• CARCKDOWN (1986- 1994)
– 1989: The German, the KGB and Kevin Mitnicks
– Hackers German arrested for breaking into U.S
computers; sold information to Soviet
27-2-2019 KAJAR_1819/ESS 4
Old Scholl Hackers: History of Hacking
• 1993: Why buy a car When you can hack one?
– Radio station call in contest; hacker Kevin Poulsen
and friend crack the phone; they got two
Porsches, $20,000
• Zero Tolerance (1994 – 1998)
– 1995: The Mitnick Takedown: arrested again;
charged with stealing 20,000 credit card numbers.
• 1999 hackers attack Pentagon, MIT, FBI web
sites

27-2-2019 KAJAR_1819/ESS 5
Famous Hacker in History

27-2-2019 KAJAR_1819/ESS 6
Security Basic: CIA
• It is not “Central Intelligence Agency”
• The holy trinity of IT security:
– Confidentiality,
– Integrity, and
– Availibity

27-2-2019 KAJAR_1819/ESS 7
Confidentiality
• Addressing the secrecy and privacy of
information, refers to the measures taken to
prevent disclosure of information or data to
unauthorized individuals or systems.
• Example:
– The use of passwords to ensure only you have the
access to a particular device or set of networks.
– Numerous other options are available to ensure
confidentiality such as encryption, biometrics, and
smart cards.
27-2-2019 KAJAR_1819/ESS 8
Integrity
• Refers to the methods and actions taken to protect
the information from unauthorized alteration
or revision (whether the data is at rest or in transit)
• Integrity measures ensure the data sent from the
sender arrives at the recipient with no alteration.
– Example, hash function (MD5 and SHA-1) often used to
ensure integrity
• Oftentimes, attacks on the integrity of information are
designed to cause embarrassment or legitimate
damage to the target

27-2-2019 KAJAR_1819/ESS 9
Availability
• Refers to the communications systems and
data being ready for use when legitimate
users need them.
• Attacks against availability all fall into the
“Denial of Service” (DoS).
– It is designed to prevent legitimate users from
having access to a computer resource or service.

27-2-2019 KAJAR_1819/ESS 10
The Security, Functionality, and Ease of
Use Triangle

27-2-2019 KAJAR_1819/ESS 11
The Security, Functionality, and Ease of
Use Triangle
Why is it represented as a triangle?
• If you start in the middle and move the point
toward Security, you’re moving further and
further away from Functionality and Ease of Use.
• Move the point toward Ease of Use, and you’re
moving away from Security and Functionality.
• Simply put, as security increases, the system’s
functionality and ease of use decrease.

27-2-2019 KAJAR_1819/ESS 12
Defining the Ethical Hacker
• Ethical hacker
– Someone who employs the same tools and techniques a
criminal might use, with customer’s full support and
approval, in order to help secure a network or system.
– Employed by customers to improve security
• Cracker/malicious hacker
– Uses those skills, tools, and techniques for either personal
gain or destructive purposes or, in purely technical terms,
to achieve a goal outside the interest of the system owner.
– Either act on their own or, in some cases, act as hired
agents to destroy or damage government or corporate
reputation

27-2-2019 KAJAR_1819/ESS 13
Hacker Classes: The Hats
• Black hats use their computer skills for illegal or
malicious purposes. This category of hacker is often
involved with criminal activities and is sought by law
enforcement agencies.
• White hats use their hacking ability for defensive
purposes. White hats include security analysts who are
knowledgeable about hacking countermeasures.
• Gray hats this hackers are neither good nor bad.
• Suicide hackers are hacktivists who are willing to
become martyrs for their causes. They attempt to
sabotage large-scale infrastructures and are fully
willing to accept any consequences of their actions.

27-2-2019 KAJAR_1819/ESS 14
Hacker Classes: The Hats
Coders
• Have ability to find unique vulnerability
• Have deep understanding of OSI Layer model and TCP/IP stacks

Admin
• Have experience with OS
• Exploit existing vulnerabilities

Script Kiddies
• Use script and programs developed by others
• Can cause serious problems

27-2-2019 KAJAR_1819/ESS 15
Ethical Hacking Steps

27-2-2019 KAJAR_1819/ESS 16
Ethical Hacking Steps
• Reconnaissance
– Gather evidence and information on the targets.
– Passive reconnaissance: Trying to collect the information about
the target without directly accessing the target. This involves
collecting information from social media, public websites etc.
– Active reconnaissance: Directly interacting with the target to
gather information about the target. E.g., Using Nmap tool to
scan the target
– Tool: NMAP, Hping, Maltego, and Google Dorks
• Scanning and enumeration
– Security professionals take the information they gathered in
recon and actively apply tools and techniques to gather more
in-depth information of the targets.
– Tool: Nessus, Nexpose, and NMAP

27-2-2019 KAJAR_1819/ESS 17
Ethical Hacking Steps
• Gaining access
– the vulnerability is located and you attempt to exploit it
in order to enter into the system.
– Tool: Metasploit
• Maintaining access
– The hacker has already gained access into a system.
– Tool: Metasploit
• Covering tracks
– Attacker attempts to conceal their success and avoid
detection by security professional.
– Example: removing or altering log files, hiding files with
hidden attributes or directories.

27-2-2019 KAJAR_1819/ESS 18
Ethical Hacking Steps
• Good ethical hackers performing a pen test
ensure these steps very well documented
(Reporting).
• The ethical hacker compiles a report with his
findings such as vulnerabilities found, tools
used, the success rate, the exploit process,
screenshots and log files.

27-2-2019 KAJAR_1819/ESS 19
Ethical Hacking Testing Types
• In order to get knowledge about the Target
Evaluation (TOE), ethical hacker may does
three different types of testing (pen test),
namely:
– Black box testing
• The ethical hacker has absolutely no knowledge of the
TOE.
• This type takes the most amount of time to complete
(usually use brute-force attack and automated process).
• Commonly called as “trial and error” approach.

27-2-2019 KAJAR_1819/ESS 20
Ethical Hacking Testing Types
– White box testing
• Pen testers have full knowledge of the network,
system, and infrastructure of the target.
• Quicker time frame
• Assumes that the attacker is an insider
– Gray box testing/partial knowledge testing
• Pen testers only have partial knowledge of the
network, system, and infrastructure of the target.
• Both manual and automated testing processes can be
utilized.

27-2-2019 KAJAR_1819/ESS 21
Attack Types
• Operating System Attacks
– Common mistake many people make when installing
operating systems by accepting and leaving all the
defaults
• Application Level Attacks
– Attacks on the actual programming codes of an
application.
– Many applications are not tested for the
vulnerabilities.
– Applications on network are a goldmine for most
hackers.

27-2-2019 KAJAR_1819/ESS 22
Attack Types
• Shrink-Wrap Code Attacks
– These attacks take advantage of the built-in code and
scripts most off-the-shelf applications come with.
– These scripts and code pieces are designed to make
installation and administration easier, but can lead to
vulnerabilities if not managed appropriately.
• Misconfiguration Attacks
– These attacks take advantage of systems that are, on
purpose or by accident, not configured appropriately
for security.
27-2-2019 KAJAR_1819/ESS 23
Hacking Terminologies
• Threat: An action or event that might compromise security. A threat is a
potential violation of security.

• Vulnerability: Existence of a weakness, design, or implementation error


that can lead to an unexpected and undesirable event compromising the
security of the system.

• Target of Evaluation: An IT system, product, or component that is


identified/subjected to require security evaluation.

• Attack: An assault on the system security that is derived from an


intelligent threat. An attack is any action that violates security

• Exploit: A defined way to breach the security of an IT system through


vulnerability

27-2-2019 KAJAR_1819/ESS 24
Conclusion

“To catch a thief think like a thief similarly to


catch a hacker think like a hacker”

27-2-2019 KAJAR_1819/ESS 25
Thank you

27-2-2019 KAJAR_1819/ESS 26

You might also like