EHF M01 C01 PPT Introduction
EHF M01 C01 PPT Introduction
Introduction
Aim
To elaborate the meaning and nature of Ethical
Hacking and various concepts involved in it.
2
Instructional Objectives
Objectives of this chapter are:
• Explain the concept of Ethical Hacking, with its scope
• List the skills required for an Ethical hacker
• Explain Penetration testing and its types
• Describe the various steps for Ethical hacking
• Outline the steps involved in footprinting
• Explain the process of Scanning
3
Learning Outcomes
At the end of this chapter, you are expected to:
• Define Ethical hacking
• Describe the scope of Ethical hacking in Information Security
scenario
• Apply the most appropriate type of Penetration testing to a system, in
order to gather information
• Outline the steps to develop a footprint for an Organization s network
and systems
4
Ethical hacking and its scope
5
Introduction to hacking
6
Some hacking incidents
Morris Internet
Worm- a program Yahoo, Amazon,
written by Robert ZDNet and
Tappan Morris in Microsoft
1988, caused a Corporation came
Denial of Service under attacks
attack on Internet
Discovery of
blue box by
John Drapers
Hacking of
Mainframe
computers by
few students of
MIT
Ethical Hacking Concept
8
Who are ethical hacker?
Information Security
Professional
Is an
Skills Required by an
ethical hacker
9
CIA Triad
• Non-disclosure of information to either
unauthorised persons or processes
10
Terms used in Ethical hacking
TERMS MEANING
Vulnerability Weak point or a loophole which turns out to be an entry point for a
threat to enter and exploit the system
11
Quiz / Assessment
1) A person who steals information via communication system like credit card information, attacks
PBXs, or is able to make calls free of cost, is called as a
a) Hacker b) Ethical hacker c) Whacker d) Phreaker
2) A person who steals information via communication system like credit card information, attacks
PBXs, or is able to make calls free of cost, is called as a
a) Threat b) A Virus attack c)Cyber terrorism d)Hacktivism
12
Quiz / Assessment
4) A computer system or a Software that will go through a security evaluation is called as a
6) The ter used for the prote tio of a i di idual s i for atio that is ide tifia le is ____________
13
Security Testing
Security testing may be defined as “a process that is used to determine that the security
features of a system are implemented as par design”.
Security Testing
consists of
Verification • Process of evaluating a product in the development
stage, against specified requirements.
14
Penetration Testing and its classifications
Penetration Testing
- Professional is - It incorporates
- Professional has features of the
aware of the
no knowledge of the both white and
configurations of the
internal structure of black box testing,
system or the
the system or the Also known as
network he is
network hybrid testing.
hacking
Steps of Malicious Hacking
• Also known as
footprinting.
It’s a process
of gathering
data or
• This is the Maintaining
preliminary Scanning
inspection of
actual attack access • Rootkits is an
phase; so, the example of
an area of
• Collect more risk level is • If the intentions that.
interest over a
detailed considered of the hacker
short period of
information highest will not be Covering tracks,
time.
based on satisfied by clearing tracks
Reconnaissance previous Gaining access acquiring access and installing
phase. then back doors
• Known as maintaining that
enumeration. access is also
important.
Steps of Footprinting
7 Steps of Footprinting
Its is a method used by the attacker to collect all the information about the
orga izatio , ithout ei g oti ed Name
and
Authenticati
version on Programs
of OS and Access
To identify Finding Control list
active operating Network
Information machines systems mapping
gathering
Internet Domain
names and IP
addresses
Finding Fingerpr
Netw active inting
ork ports Web Server
range and VPN points
deter access version
mina points
tion
Types of Footprinting
Internet footprinting • Gather information from Internet
Website and E-mail • Phone numbers, e-mails and names are gathered from a
footprinting o pa y’s we site after irror i agi g
Quiz/Assessment
7) In what is called as the actual attack phase, the hacker can gain access to the system at four levels. OS level,
Application level, Network level and __________________.
Physical layer Denial of Service Transport layer Penetration layer
8) What is the full form of EC Council- a member supported organization which is known for Professional
certifications in the field of IT Security
a) International council of b) International c) International Council of d) None of the above
e-Commerce Consultants Congregation of Electronic Electronic Commerce
Commerce Consultants Consultants
9) Black box testing, White box testing and Grey box testing are the three types of Security testing. Among this,
Grey box testing is also called as
a) Penetration testing b) Hybrid testing c) Hybrid testing d) Pink testing
DNS Footprinting
DNS footprinting is used to retrieve all information about DNS servers and any corresponding records of the target
organization or computer system.
•It can ide tify target’s
•It also can identify DNS Infrastructure, IP
domain ant its servers
Tools used for DNS footprinting are: •Contacts for Technical as
addresses and IP of the
mail server.
• Nslokup well as Administrative
aspects of the target
•It is available in both
Windows and Linux
• DNSstuff system operating system
ARIN DNSstuff
Target's IP
address with
Aliasing Info
Responding
server's
infrastructure nslookup domain name (For
e.g. nslookup
www.gmail.com
IP address
of mail
server
DNS Footprinting using Whois
American RIPE Network
Registry for Coordination
Internet Numbers Centre (RIPE NCC)
(ARIN)
Address Details
Contact Information
Locating the Network Range
It is the second phase 7 steps footprinting.
Type the IP address (retrieved by the method of DNS fotprinting) for which network
range needs to be located
Intention of Hacker:
• Visualize network structure.
• Prepare a blueprint of network for hacking
• To know about the geographical location of
the router
Traceroute Visual Interface
http://www.visualroute.com/
https://www.pingplotter.com/
Scanning
Scanning
It is defined as the ‘investigation of an information system or network to identify any lapses in its
security, using tools and techniques’.
Goals of
• Port Scanning By examining
Scanning Telnet banners or
• Banner its File Transfer
Discovering services Protocol (FTP
grabbing
actively running on the Identifying the operating Servers), once a
• War dialling connection to
target, including TCP and system
• War walking these services is
UDP services
made
Scanning Tools
1) Hping
2) Nessus
3) NMAP
4) SNORT
5) TCPview
Quiz / Assessment
10) Which are the utilities used for identifying active machines on a network?
a) ping and Traceroute b)Nslookup and Whois c)Net view and Nbtscan d)None of the above
Detecting live machines Identifying the operating Process where ping is Identifying specific
on the target network system executed on a batch of applications
devices
) A port can be found in either open, closed or -------- state
13) TCP/IP stack fingerprinting exploits the fact that the ---------- protocol is implemented
differently by OS and vendor
EC- Council has defined seven steps in footprinting which is followed by every ethical hacker
Precise use of tools is a very important requirement for ethical hacker to conduct his analysis and
presenting the facts
e-References & External Resources
• introduction to ethical hacking, 1. The CEH Prep Guide, the comprehensive guide to
types of security testing, skills of Certified Ethical Hacking by Ronald L. Krutz and
ethical hacker and job Russell Dean Vines
responsibilities of an ethical 2. Official Certified Ethical Hacker Review Guide by
hacker https://www.sans.org/reading- Kimberly Graves
room/whitepapers/hackers/shades-
3. Unofficial Guide to Ethical Hacking by Ankit
ethical-hacking-black-white-gray-1390
Fadia
• www.telegraph.co.uk/technology/6670
127/Top-10-most-famous-hackers.html
Activity
Brief description of activity
Description:
1. Assume that you are a part of an ethical hacking team
that recently conducted a white box testing for a firm
Online Activity and you have your results with you. Prepare a report to
(30in)
present your facts before the firm using one of the
templates available on the internet or a sample report.
Note: You may make necessary assumptions as applicable