Introduction of Ethical Hacking
Introduction of Ethical Hacking
1. Application layer
This is the top layer of TCP/IP protocol suite. This layer includes
applications or processes that use transport layer protocols to deliver the
data to destination computers.
At each layer there are certain protocol options to carry out the task
designated to that particular layer. So, application layer also has various
protocols that applications use to communicate with the second layer, the
transport layer. Some of the popular application layer protocols are :
2. Transport layer
This layer provides backbone to data flow between two hosts. This layer
receives data from the application layer above it.
1. It divides the data(coming from the application layer) into proper sized
chunks and then passes these chunks onto the network.
UDP:
2. UDP does not take any extra measures to ensure that the data sent is
received by the target host or not.
3. Network layer
This layer is also known as Internet layer. The main purpose of this layer is
to organize or handle the movement of data on network.
This layer normally consists of device drivers in the OS and the network
interface card attached to the system.
Both the device drivers and the network interface card take care of the
communication details with the media being used to transfer the data over
the network.
In most of the cases, this media is in the form of cables. Some of the famous
protocols that are used at this layer include ARP(Address resolution
protocol), PPP(Point to point protocol) etc.
The Internet Protocol layer in the TCP/IP protocol stack is the first layer that
introduces the virtual network abstraction that is the basic principle of the
Internet model.
All physical implementation details (ideally even though this is not quite true)
are hidden below the IP layer.
The basic unit of data exchange in the IP layer is the Internet Datagram. The
format of an IP datagram and a short description of the most important fields
are included below:
LEN
TYPE OF SERVICE
TYPE OF SERVICE
TIME
1. Reconnaissance
2. Scanning
Hackers are seeking any information that can help them perpetrate attack
such as computer names, IP addresses, and user accounts.
3. Gaining Access
After scanning, the hacker designs the blueprint of the network of the target
with the help of data collected during Phase 1 and Phase 2.
This is the phase where the real hacking takes place. Vulnerabilities
discovered during the reconnaissance and scanning phase are now
exploited to gain access.
The method of connection the hacker uses for an exploit can be a local
area network (LAN, either wired or wireless), local access to a PC, the
Internet, or offline. Examples include stack based buffer overflows, denial of
service (DoS), and session hijacking. These topics will be discussed in later
chapters.
4. Maintaining Access
Once a hacker has gained access, they want to keep that access for future
exploitation and attacks. Sometimes, hackers harden the system from other
hackers or security personnel by securing their exclusive access with
backdoors, rootkits, and Trojans.
Once the hacker owns the system, they can use it as a base to launch
additional attacks. In this case, the owned system is sometimes referred to
as a zombie system.
5. Covering Attacks
Once hackers have been able to gain and maintain access, they cover their
tracks to avoid detection by security personnel, to continue to use the
owned system, to remove evidence of hacking, or to avoid legal action.
Hackers try to remove all traces of the attack, such as log files or intrusion
detection system (IDS) alarms.