Ceh V10
Ceh V10
Ceh V10
Table of Contents
Module 4: Enumeration
Module 7: Sniffing
TOC
Information Security Overview
Terminology
interesting
system
action
then using the same info to gain access to multiple networks and
the message
unauthorized changes
Must be secure
Advanced Persistent Threats: APT focus on stealing info from victim machine
Mobile Threats: Many attackers see mobile phone as a way to gain access
person w/ access
information. Does not directly interact with the system, and relies on social
scanners to detect listening ports (companies should shut down ports that
etc.
Clearing Tracks: Hiding malicious acts while continuing to have access, avoiding
suspicion
authenticity of info
Promiscuous Policy
Permissive Policy
Prudent Policy
Paranoid Policy
Active Assessments
Passive Assessments
Host-Based assessment
Internal Assessment
External Assessment
Application Assessments
Network Assessments
Evaluation - Reports
grey-box(limited knowledge)
Systems
TOC
Sections
1. Footprinting Concepts
2. Footprinting Methodology
3. Footprinting Tools
4. Footprinting Countermeasures
Footprinting Concepts
target network
Footprinting Methodology
4. Website Footprinting
1. Looking at system information from websites, personal information,
sites etc
5. Email Footprinting
6. Competitive Intelligence
traffic etc.
7. WHOIS Footprinting
8. DNS Footprinting
network
9. Network Footprinting
target network
the TTL field in the header of ICMP packets to discover on the path
to a target host
10. Footprinting through Social Engineering
Footprinting Tools
Footprinting Countermeasures
information
4. Report Templates
TOC
Overview of Network Scanning
Types of scanning
immediately
2. Useful for locating active devices and if ICMP is passing through firewall
addresses
or DoS attacks
4. Network admins can use Nmap for network inventory, managing service
5. Attacker uses Nmap to extract info such as live hosts on the network,
versions
three-way handshake
set or with no flags. No responses means port is open, RST means the
port is closed
is closed
3. IDLE Scan
12. UDP Scanning: When UDP port is open ---There is not three-
way TCP handshake for UDP scan. System does not respond with a
me. The system does not respond with a message when the port is
open. When UDP port is closed -- the system responds with ICMP
port unreachable message. Spywares, Trojan Horses, and other apps use
UDP ports
5. Use custom rule set to lock down the network and block
unwanted ports
8. Ensure that anti scanning and anti spoofing rules are configured
4. Banner Grabbing
types
extensions (stealthy)
5. Tools like Netcat reads and writes data across network connections
6. Countermeasures for banner grabbing
3. Use ServerMask
system
7. Prepare Proxies
computers
3. Burp suite includes an intercepting proxy, which lets you inspect and
5. Tails is a live operating system, that user can start on any computer
IP address
scanner, colasoft)
connection
TOC
Module Objectives
Enumeration countermeasures
Enumeration Concepts
NetBIOS Enumeration
devices (15 of it are device name, 16 is reserved for service or name record
type)
name tables/cache
Net View utility is used to obtain a list of all the shared resources of
LDAP Enumeration
NTP Enumeration
computers
Enumeration Countermeasures
SNMP countermeasures
Remove SNMP agent on turn off the SNMP service (block 161)
anonymous connections”
Ensure that the access to null session pipes, null session shares, and
DNS countermeasures
Make sure private hosts and their IP addresses are not published into
SMTP countermeasures
Do not include sensitive mail server and local host information in mail
responses
LDAP countermeasures
shares
TOC
Module Objectives
system
System hacking is one of the most important and sometimes ultimate goal of an
attacker.
vulnerabilities
systems
bins etc)
party
Trojans can collect usernames and passwords and send to attacker, run in
background
Precomputed table which contains word lists like dictionary files, brute
precomputed tables
Microsoft Authentication
hashed.
NTLM Authentication
LM authentication protocol
Kerberos Authentication
Microsoft has upgraded its default authentication protocol
Password Salting
hashes
Enable SYSKEY with strong password to encrypt and protect the SAM
database
Escalating Privileges
An attacker can gain access to the network using a non-admin user account,
debugging
Executing Applications
Attackers execute malicious programs remotely in the victim's machine to
gather information
Backdoors
Crackers
Keyloggers
Spyware
programs/scripts
Spyware
Pop-up blocker
anti-spyware/virus
Firewall software
Anti-keylogging software
Rootkits are programs that hide their presence and an attacker's malicious
activities, granting them full access to the server or host at the time or in
future
Typical Rootkit has backdoor programs, DDos programs, packet
6 Types of Rootkits
Boot Loader level rootkit: replaces original boot loader with one
controlled by attacker
Library Level Rootkits: Replaces original system calls with fake ones to
Detecting Rootkits
records, or memory
fingerprints
normal activity
system such as system files, processes, and registry keys and compares
them to an algorithm to generate a similar data set that does not
contains metadata for the file such as attributes, word count, author
Steganography
compromised servers, source code for the hacking tools, plans for
hide
the LSB
algorithms
an image
Steganalysis
Covering Tracks
Clearing logs: attacker clears/delete the system log entries for their
activities
legal actions
wipe logs
Penetration Testing
Password Cracking
Privilege Escalation
Execute Applications
Hiding Files
Covering Tracks
TOC
Module Objectives
Malware countermeasures
Introduction to Malware
and give limited control or full control of the systems to the attacker for
cause damage, such as ruining a file allocation table on your hard disk
Trojans get activated upon user’s certain predefined actions, and conduct
computer
undetectable by antivirus
Break the trojan file into multiple pieces and zip them as a single file
Change the content of the Trojan using Hex Editor and also change the
Never use trojans downloaded from the web (antivirus can detect
these easily)
attacker to connect.
bots(chewbacca)
Proxy Server Trojans: Converts user’s computer into proxy servers, thus
VNC Trojan: VNC trojan starts a VNC server daemon in the infected
systems. Attacker can connect to the victim using any VNC viewer
ICMP Tunneling
Covert channels are methods in which an attacker can hide the data in
Remote Access Trojans: provide attackers with full control over the victim ’s
system
encrypted
attacker
the notification
Viruses and Worm Concepts
Virus: A self replicating program that produces its own copy by attacking
attachments
File Virus: Infects files which are executed or interpreted on the sys tem such
Multipartite Virus: Infect the system boot sector and the executable files at
these are written in macro language Visual Basic for Applications (VBA)
users to system processes to the virus code isntead of the actual program
There is only one copy of the virus on the disk infecting all the
Will launch itself first when any program on the computer system is
started
encrypted with different key for each infected file. AV Scanner cannot
Polymorphic Code: Code that mutates while keeping the original algorithm
intact. Well written polymorphic code has no parts that stay the same on
each infection
new executable
File Overwriting or Cavity Virus: Overwrites a part of the host file that is
constant (usually nulls), without increasing the length of the file and
Sparse Infector Viruses: Infects only occasionally, or only files whose length
falls within a narrow range. By infection less often, they try to minimize
file the viruses infects. Therefor, a companion virus may save itself as
notepad.com and every time the user executes notepad.exe (good program),
Shell Viruses: Virus code forms a shell around the target host program ’s
code, making itself the original program and host code as its sub-routine.
File Extension Viruses: changes the extensions of files. Ex. .TXT is a safe
file. Virus file is BAD.TXT.VBS but will only show up as bad.txt . When
Add-on Virus: adds on their code to the host code without making any
changes to the latter or relocate the host code to insert their own code at
the beginning
Intrusive Viruses: Overwrite the host code partly or completely with the
viral code
Transient/Direct Action Virus: Transfers all the controls of the host code to
where it resides in the memory. Virus runs when the host code is run and
during entire work session even after the host’s program is executed and
are created only to replicate and spread, but some have payloads
A worm is a special type of malware that can replicate itself and use
Sheep Dipping refers to the analysis of suspect files, incoming messages, for
malware
Run the virus and monitor the process actions and system information
netResident)
with tools
Collect Service requests and DNS tables information, attempts for
Malware Detection
handlers
Processes are visible but may look like a legitimate processes and helps
Trojans are installed along with device drivers downloaded from untrusted
sources
Scan suspicious drivers and verify they are genuine and downloaded
Trojans normally modify system’s files and folders. Use these tools to detect
changes
attackers
Counter-Measures
Trojan Countermeasures
protocols/services
Anti-viruses
Anti-Malware Software
Module 7: Sniffing
TOC
Sniffing Concepts
Anyone in same physical location can plug into network with ethernet
traffic into the LAN. Involves injecting address resolution packets (ARP) into
the network
bytes
Span Port: A port which is configured to receive a copy of every packet that
party
communication or traffic
Passive Wiretapping: It only monitors and records the traffic and gain
MAC Attacks
Each switch has a fixed size dynamic content addressable memory (CAM
table)
ports
If CAM table is flooded with more MAC address it can hold, then the switch
How to defend against MAC attacks: use a port security to restrict inbound
traffic from only a selected set of mac addresses and limit MAC flooding
attacks
DHCP Attacks
DHCP starvation attack: attacker broadcasts forged DHCP requests and tries
How to defend against DHCP starvation and Rogue Server Attack: Enable
port security for DHCP starvation, and enable DHCP snooping that allows
ARP Poisoning
All network devices broadcasts ARP queries in the network to find machine’s
MAC address
ARP table. If it’s not there, the ARP_REQUEST is broadcasted over the
network
Switch is set in ‘forwarding mode’ after the ARP table is flooded with
Attackers flood a target computer’s ARP cache with forged entries, which is
Using Fake ARP messages, an attacker can divert all communications between
spoofing detection
Spoofing
Attacker can sniff network for MAC addresses, then spoof them to receive
all the traffic destined for the user. Allows allows attacker to gain access to
the network
IRDP spoofing: ICMP Router discovery protocol allows host to discover the IP
DNS Poisoning
DNS poisoning is a technique that tricks a DNS server into believing that it
Intranet DNS spoofing: must be connected to LAN and able to sniff. Works
Proxy Server DNS poisoning: attacker sends a trojan to machine that changes
DNS Cache Poisoning: Refers to altering or adding forged DNS records into
Sniffing Tools
Wireshark
Counter-Measures
Use encryption
Runs IDS and notice if mac address of certain machines have changed
network packet
Sniffing pen test is used to check if the data transmission from an org is
TOC
testing
information
Depends on the fact people are unaware of their valuable info and
Insider attack
Disgruntled employee
Identify Theft
TOC
DoS/DDoS Concepts
service
packets
SYN Attack
ICMP flood attack: type of DoS where perpetrators send a large number of
requests
protection feature
Peer to Peer Attack: attackers instruct clients of p2p file sharing hubs to
disconnect for their p2p network and connect to victims fake website.
loss of services
Bots are software applications that run-automated tasks over the internet
LOIC, GoldenEye
Countermeasures
Techniques
Activity Profiling
etc
Changepoint detection
stores traffic flow data in a graph that shows the traffic flow
rate vs time
Post-Attack Forensics
countermeasures
TOC
Module Objectives
allows the attacker to gain access to the machine. He can take the
malicious site
Sniff>Monitor>Session Desynchronization>Session ID
prediction>Command Injection
Passive Attack: Attack hijacks a session but sits back and watches and
Hijackings
Network Level OSI Model: Network level hijacking can be defined as
server
Spoofing vs Hijacking
Session sniffing
Man-in-middle attack
Man-in-browser attack
security mechanisms
web pages
Session fixation
User visits banking site. Attacker has user somehow visit his site. His
site infects and adds onto her session and insert more commands into
ACK number , they can spoof bobs address and start a communication with
the server
TCP/IP Hijacking:
Blind Hijacking
The attacker can send the data or comments but has no access to see
the response
UDP Hijacking
tool
BURP Suite: inspect and modify traffic. Analyzes all kinds of content. Is an
interception proxy
Countermeasures
IPSec: protocol suite for securing IP communications by authenticating and
TOC
servers are more vulnerable to attack since they are available on the
web
Security conflicts
Improper Authentication
Default Accounts
Misconfigs
Bugs in OS
Webserver Attacks
DoS/DDoS Attacks: Attackers may send numerous fake requests to the web
DNS Server Hijacking: Attacker compromises DNS server and changes the
DNS settings so that all requests coming towards the target web server is
Attacker uses compromised PCs with spoofed IPs to amplify the DDoS
restricted directories outside of the web server root directory (trial and
error)
Phishing Attacks: Attacker tricks user to submit login details for website
injection
HTTP Responses Splitting Attack: involves adding header data into the input
field so that the server split the response into two responses. The attack
can control the second response to redirect user to malicious website whereas
Web Cache Poisoning: An attacker forces the web server’s cache to flush its
actual cache content and sends a specially crafted requests, which will be
stored in cache
SSH Bruteforce Attack: SSH protocols are used to create encrypted SSH
Tunnel between two hosts. Attackers can brute force the SSH login
credentials
Attack Methodology:
and files that website owner wants to hide from web crawlers
out buffers
Password Cracking: THC Hydra, Cain & Abel
Countermeasures
Placed the web server in DMZ of the network isolated from the public
Patches and Updates: Ensure service packs, hotfixes, and security patch levels
Protocols: block all unnecessary ports, ICMPs, and unnecessary protocols such
Detecting Hacking Attempts: Run scripts on the server that detects any
changes made in the existing executable file. Compare hash values of files on
detection
anti-virus
Patch Management
Hotfixes are an update to fix a specific customer issue
checks for available updates to OS, SQL Server, .NET framework etc
Syhunt helps automate web app security testing and guards. N Stalker is a
TOC
threats, understanding web app hacking methodology, web app hacking tools,
understanding web app countermeasures, web app security tools, overview of web
Web apps provide an interface between end users and web servers through a
set of pages
Web tech such as Web 2.0 support critical business functions such as CRM,
SCM
authentication process
Unvalidated Input: Tempering http requests, form field, hidden fields, query
strings, so on. Example of these attacks include SQL injection, XSS, buffer
overflows
Injection Flaws: Injecting malicious code, commands, scripts into input gates
of flawed apps
SQL Injection: type of attack where attackers inject SQL commands via input
client and server to modify app data such as user cred and permissions.
network
should behave when an error occurs. Otherwise, error may provide a c hance
for an attacker to break into the system. Improper error can lead to DoS
attack
Log Tampering: Attackers can inject, delete, or tamper with app logs to hide
their identities
Buffer Overflow: Occurs when app fails to guard its buffer property and
properly secured
Security Misconfigurations
recovery/reset
Insecure Storage: Users must maintain the proper security of their storage
locations
Platform Exploits: Each platform (BEA WEBLOGIC, COLD FUSION) has its
however
Network Access attacks: can allow levels of access that standard HTTP app
Cookie Snooping
Web Services Attack: Web services are based on XML protocols such SOAP
Hidden Manipulation
Obfuscation Application
Session Fixation Attack: Attacker tricks user to access a genuine web server
Hacking Methodology
Hackers first footprint the web infrastructure
identification)
Use Trace method for proxy, and cookie response for a firewall
Username enumeration
Cookie Exploitation
Session Attack
Password Attack:
implement
Attack Data connectivity: attacking database connection that forms link
Countermeasures
Tools
1. Info Gathering
3. Authentication Testing
5. Authorization Testings
7. DoS Testing
9. AJAX Testing
1. Metasploit
TOC
They can add info to your website, extract data, and insert new data
Error based SQL Injection: Attacker puts intentional bad input into app to
see the database-level error messages. Uses this to create carefully designed
SQL Injections
Blind SQL Injection: Attacker has no error messages from the system with
which to work. Instead, attack simply sends a malicious SQL query to the
database
queries
Attackers analyze web GET and POST requests to identify all input
fields
sanitized
Evasion Techniques
Evading IDS
Hex Encoding
Manipulating whitespace
Inline Comment
Char encoding
Countermeasures
TOC
Wireless Concepts
GSM: universal system used for mobile transportation for wireless network
worldwide
connection
BSSID: The MAC address of an access point that has set up a basic service
set
ISM band: a set of frequency for the international industrial, scientific, and
medical communities
Wireless Networks
WiFi Chalking
networks
single direction
Parabolic Grid Antenna: Based on the idea of a satellite dish. Can pick
Parabolic grid antennas let attackers attack from from farther away (10
miles!)
Wireless Encryption
Wireless Threats
access control measures, such as AP MAC filters and Wi-Fi port access
controls
wireless network
Authentication Attacks: Steal the identity of Wi-Fi clients, their PI, logins,
Rogue Access Point Attack: Hijacking connections and acting as a middle man
sniffing
with it
Misconfigured Access Point Attack: Accidents for configurations that you can
exploit
do not require AP to relay packet. Attack can attack OS direct since the
encryption is weak
AP MAC Spoofing: Hacker spoofs the MAC address of the WLAN client
create a database
point
5. Man in the middle attack MITM : Attacker spoofs his MAC, sends a
8. Evil Twin: Replicates another wireless APs name via common SSID
power (amplitude)
Bluetooth Hacking
bluetooth connection
its features
enabled devices
MITM: Modifying data between bluetooth enabled devices
communication on a piconet
Bluetooth Modes:
Pairing Modes
Countermeasures
TOC
encryption
other apps
Broken Cryptography
algoirhms
mechanism
Checksum controls
they think they are clicking. Attackers obtain sensitive info or take
control of device
elements in HTML
device
Phone/SMS-Based attacks
communications
Application-based attacks
Sensitive Data Storage: Some apps employ weak security in their
OS Based Attacks
malicious code
eavesdrop on calls
SSL/TLS implementation
Fake SSL certificates: Fake SSL certs represent another kind of MITM
Server Misconfiguration
XSS
CSRF
Weak Input Validation
Brute-Force Attacks
Database Attacks
SQL Injection
Data Dumping
OS command execution
Privilege Escalation
Sandboxing: helps protect systems and users by limiting the resources the
app can access in the mobile platform; however, malicious apps may exploit
vulnerabilities
Hacking Android OS
system level
Update OS regularly
Google Apps device policy: allows domain admin to set security policies for
Layers of the OS
Cocoa Touch: key framework that help in building iOS app. Defines
apps
Core OS: low level feature on which most on which most other
Hacking Blackberry
Malicious Code Signing: Blackberry apps must be signed by RIM. Attacker can
obtain code-signing keys for a malicious app and post it in the store
JAD file exploits: A jad file allows a user to go through app details and
him to use the infected device as a TCP proxy and gain access to
MDM provides platforms for over the air or wired distribution of application,
data and configuration settings for all types of mobile devices, smartphones,
tablets, etc.
General Guidelines
Do not load too many apps and avoid auto-upload of photos to social
networks
simultaneously
An IDS inspects all inbound and outbound network traffic for suspicious
Indications of Intrusions
System Intrusions
Rogue Files
Missing files
Network Intrusions
Firewall Architecture
Bastion Host
Screened Subnet
Multi-homed Firewall
interfaces
Types of Firewall
Packet Filters: works on the network layers of OSI. Can drop packets
if needed
Honeypot
2 Types of Honeypots
IDS Tools
Snort
Evading IDS
Obfuscating: encoding the attack payload in a way that the target computer
packets just to generate alerts. Causes IDS to generate large number of false
Session Splicing
Urgency Flag
A URG flag in the TCP header is used to mark the data that requires
urgent processing
Evading Firewalls
Port Scanning is used to identify open ports and services running on these
ports
Open ports can be further probed to identify the version of services,
filters
Tiny Fragments: Forcing some of the TCP packet’s header info into the next
fragment
Ack Tunneling: Allows tunneling a backdoor application with TCP packets with
target company has a public web server with port 80 used for HTTP traffic
Detecting Honeypots
Attackers craft malicious probe packets to scan for services such as HTTP
Ports that show a particular service running but deny a three-way handshake
Shut down switch ports associated with the known attack hosts
TOC
IaaS: Provides virtual machines and other abstracted hardware and OSs
applications
organization
or public)
Public Cloud: Services are rendered over a network that is open for
public use
TOC
Cryptography Concepts
The conversion of data into a scrambled code that is decrypted and sent
Types of Cryptography
Symmetric Encryption: Uses the same key for encryption as it does for
decryption
Encryption Algorithms
key.
(128 bit)
unclassified application
Digital Signature: Computed using a set of rules (I.e, the DSA) and a
set of parameters
MD5
Email Encryption
email
SSL (Secure Sockets Layer): SSL is an app protocol developed for netscape
between a client and a sever. Uses RSA algorithm with 1024 and 2048 bit
strengths
Cryptographic Attacks
Ciphertext only attack: goal of this attack to recover encryption key from
cipher text
queries
Chosen-plaintext attack: attacker defines his own plaintext, feeds it into the
text
in a ciphertext
Extra Resources:
TOC
Boson: https://quizlet.com/_3l8qep
"Tools": https://quizlet.com/_3la4dl
Workflowy: https://workflowy.com/s/De7u.dMnMILnDcu
switches-flash-cards/
hacker-ceh/ceh-assessment/
https://www.exam-labs.com/exam/312-50v9#!