Report
Report
Essential Terminology
Threats:
An action or event that might compromise security.A threat is
a potential violation of security.
Vulnerability:
Existence of a weakness, design or implementation error
that can lead to an unexpacted and undesirable event
compromising the security of the system.
Target and evaluation:
An IT system, product or component that is
identified/subjected torequire security evaluation.
Attack:
An assault on the system security that is derived from an
intelligent threat. An attack is any action that violates
security.
Exploit:
A defined way to breach the security of an IT system through
vulnerability.
Hacktivism
1.Hacktivism refers to the idea if the hacking with or for a
caouse.
2.Comprises of hackers with a social or a poloticalagenda.
3.Aims at sending a messagethrough their hacking activity
and gaining visibility for their causeand themselves.
4.Comman targets includes govt. agencies, MNC’s or any
other entity percieved as bad or wrong by these group of
individuals.
Hackers Classes
There are mainly four types of hacker classes:
Black Hats:
Individuals with extraordinary computing skills, restoring
to malicious or destructive activities. These are also known
as crackers.
White Hats
Individuals proffessing hacker skill and using them for
defensive purposes. These are also known as security
analyst.
Gray Hats
Individuals who work both offensively at various times.
Suicide Hackers
Individuals who aim to bring down critical infrastructurefor a
cause and do not worry about the outcomes.
Ethical Hackers Classes
Formar Black Hats
Reformed crackers.
First hand experience.
Lesser credibility percieved
White Hats
Independent security consultants
Claim to be knowledgeable about black hack
activities.
Consulting Firms
Parts of ICT firms.
Good credentials.
MODULE 2: FOOTPRINTING
Module objectives:
This module will familarize you with:
Footprinting-an introduction
Information gathering mathedology of a hacker.
Competitive intelligence gathering.
Tools that aid in footprinting.
Footprinting steps.
Footprinting:
Footprinting is the blueprint of the security profile of an
organization, undertaken in a mathedological manner.
Footprinting Tools
Whois
Nslookup
ARIN
Neo Trace
VisualRoute Trace
Smart Whois
eMail Tracker pro
Web site watcher
Google Earth
GEO spider
HTTrack Web Copier
E-mail Spider
MODULE 3: Scanning
Module’s Objective:
Definition of scanning
Types and objectives of scanning
Checking live systems and open ports
Different tools present to perform Scanning
Scanning:-Definition
Scanning is one of the three components of intelligence gathering
for an hacker.
The attacker finds information about the:
Specific IP addresses
Operating System
System Architecture
Services running oneach computer
Types of scaning:-
Port scanning:-
A series of messages sent by someone attempting to
break into a computer to learn about the computer
network’s services.
Each associated with a “well known” port number.
Network Scanning:-
A procedure for identifyingactive hosts on a network.
Either for the purpose of attacking them or for network
security assessment.
Vulnerability Scanning:-
The automated process of proactivly identifying
vulnerability of computing systems present in a network.
Objectives of Scanning:-
To detect the live system running on the network.
To discover which ports are active/running.
To discover the operatring system running on the target
system
To discover the services running/listening on the target
system.
To discover the IP address of the target system.
Checking for the live systems:-ICMP scanning
In this type of scanning, it is found out which hosts are up in
a network by pinging them all.
ICMP scanning can be run parallel so that it can run fast.
It can also be helpful to tweek the ping timeout value with the
–t option.
MODULE 5: Trojans
This module will familiarize you with:
Trojans
Type of Trojans and how Trojan works
Indication of Trojan attack
Anti-Trojans
Introduction:
What is TROJAN?
Working of Turkojan
An attacker gets access to the Trojaned system as the system
goes online.
MODULE 5: Sniffers
Definition:- Sniffing
Sniffing is a data interception technology.
Type of sniffing:
There are two types of sniffing:-
Passive sniffing
Active sniffing
Passive Sniffing
It is called passive because it is difficult to detect.
Active Sniffing
It is done through the switch.
It is difficult to sniff.