Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
85 views
Module 1 Introduction To Ethical Hacking
Uploaded by
Nghia Tran Van
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Module 1 Introduction to Ethical Hacking For Later
Download
Save
Save Module 1 Introduction to Ethical Hacking For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
85 views
Module 1 Introduction To Ethical Hacking
Uploaded by
Nghia Tran Van
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Module 1 Introduction to Ethical Hacking For Later
Carousel Previous
Carousel Next
Save
Save Module 1 Introduction to Ethical Hacking For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 91
Search
Fullscreen
ETHICAL HACKING Module 01: Introduction to Ethical HackingEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Introdction to tical Hacking Module Objectives o Understanding the Elements of information Securty . Understanding information Security Attacks and information Warfare (Overview of Cyber Kil Chain Methodology, TTP, and lots (Overview of Hacking Concepts, Types, and Phases Understanding Ethical Hacking Concepts and its Scope (Overview of information Security Controls ‘Overview of information Security Acts and tau Module Objectives Attackers break into systems for various reasons and purposes. Therefore, it is important to understand how malicious hackers attack and exploit systems and the probable reasons behind those attacks. As Sun Tzu states in the Art of War, “If you know yourself but not the enemy, for every victory gained, you will also suffer a defeat.” System administrators and security professionals must guard their infrastructure against exploits by knowing the enemy—the malicious hacker(s)—who seeks to use the same infrastructure for illegal activities. This module starts with an overview of the current security scenario and emerging threat vectors. It provides insight into the different elements of inform: . Later, the module discusses hacking and ethical hacking concepts and ends with a brief discussion on information security controls and information security laws and acts. At the end of this module, you will be able to: "Describe the elements of information security + Explain information security attacks and information warfare "Describe cyber kill chain methodology, TTPs, and loCs "Describe hacking concepts, types, and phases = Explain ethical hacking concepts and scope Understand information security controls (defense-in-depth, risk management, cyber threat intelligence, threat modeling, incident management process, and Al/ML) * Know about the information security acts and laws Module 04 Page? Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Introdction to tical Hacking Module Flow ¢ © ermatonsooiy Cyber Hm Chain © tacxing Concepts @ mame © Bermationsecuety razed x BS Information Security Overview Information security refers to the protection or safeguarding of information and information systems that use, store, and transmit information from unauthorized access, disclosure, alteration, and destruction. Information is a critical asset that organizations must secure. If sensitive information falls into the wrong hands, then the respective organization may suffer huge losses in terms of finances, brand reputation, customers, or in other ways. To provide an understanding of how to secure such critical information resources, this module starts with an overview of information security. This section introduces the elements of information security, classification of attacks, and information warfare. Module 04 Page 3 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthic! Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Introdction to tical Hacking Elements of Information Security € Information secu estate of wel-being of information and infrastructure in which the possibilty of thet, tampering, nd disuption of information and services sow or tolerable Contidentiatity || sian tet heinlrmation secession to tote muthorned to hw ccnes Integrity. ‘The trustworthiness of dat resources inerms of preventing improper or unauthores changes ezurance that tne asteme responsible for devering, string, and rocesng infomation are ‘Availability accessible when required by the authorized users Refers tothe characterise ofa communication, document, or any dsta that ensures the quality of Authonticity ines a Ser ‘guarantee thatthe sender ofa message cannot later deny having sent the messageand thatthe ‘eepiem cannot deny hang rece the message Elements of Information Security Information security is “the state of the well-being of information and infrastructure in which the possibility of theft, tampering, or disruption of information and services is kept low or tolerable.” It relies on five major elements: confidentiality, integrity, availability, authenticity, and non-repudiation, Confidentiality Confidentiality is the assurance that the information is accessible only to authorized. Confidentiality breaches may occur due to improper data handling or a hacking attempt. Confidentiality controls include data classification, data encryption, and proper disposal of equipment (such as DVDs, USB drives, and Blu-ray discs). Integrity Integrity is the trustworthiness of data or resources in the prevention of improper and unauthorized changes—the assurance that information is sufficiently accurate for its Purpose. Measures to maintain data integrity may include a checksum (a number produced by a mathematical function to verify that a given block of data is not changed) ‘and access control (which ensures that only authorized people can update, add, or delete data). Availability Availability is the assurance that the systems responsible for delivering, storing, and processing information are accessible when required by authorized users. Measures to maintain data availability can include disk arrays for redundant systems and clustered machines, antivirus software to combat malware, and distributed denial-of-service (0005) prevention systems. Module 04 Pages Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel Prohiatedethic Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Introdction to tical Hacking = Authenticity Authenticity refers to the characteristic of communication, documents, or any data that ensures the quality of being genuine or uncorrupted. The major role of authentication is to confirm that a user is genuine. Controls such as biometrics, smart cards, and digital certificates ensure the authenticity of data, transactions, communications, and documents. * Non-Repudiation Non-repudiation is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message. Individuals and organizations use digital signatures to ensure non-repudiation. Module 04 Pages Ethical Making and Countermeasures Copyight © by E-Caunedl ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Introdction to tical Hacking Motives, Goals, and Objectives of Information Security Attacks Attacks = Motive (Goal) + Method + Vulnerability |& Amotive originates out of the nation thatthe target system stores or processes something valuable, and this leads tothe tveat ofan attack ante system (a. Attackers try various tools and attack techniques to exploit vulnerabilities ina computer system orits security policy and coatrols in order to ful the menives, Motives behind Information security attacks © Disrupting business contiolty © ‘Stealing information and manipulating data Propagating religious or political belles Achieving state's itary objectives Damaging the reputation of the target Taking revenge Demanding ensom cresting fear and chaos by disrupting eal Infrastructures © Causing Francia! oss othe target Motives, Goals, and Objectives of Information Security Attacks Attackers generally have motives (goals), and objectives behind their information security attacks. A motive originates out of the notion that a target system stores or processes something valuable, which leads to the threat of an attack on the system. The purpose of the attack may be to disrupt the target organization’s business operations, to steal valuable information for the sake of curiosity, or even to exact revenge. Therefore, these motives or goals depend on the attacker's state of mind, their reason for carrying out such an activity, as well as their resources and capabilities. Once the attacker determines their goal, they can employ various tools, attack techniques, and methods to exploit vulnerabilities in a computer system or security policy and controls. Attacks = Motive (Goal) + Method + Vulnerability Motives behind information security attacks * Disrupt business continuity * Propagate religious or political beliefs = Perform information theft * Achieve a state’s military objectives "Manipulating data "Damage the reputation of the target Create fear and chaos by disrupting "Take revenge critical infrastructures @ Demandeancon = Bring financial loss to the target Module 04 Pages Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel Prohiated
You might also like
Immersive Labs The Ultimate Cyber Skills Strategy Cheat Sheet Ebook
PDF
No ratings yet
Immersive Labs The Ultimate Cyber Skills Strategy Cheat Sheet Ebook
19 pages
312 50v12
PDF
No ratings yet
312 50v12
4 pages
Cyber Intelligence and Information Retrieval. Proceedings of CIIR 2021 (João Manuel R. S. Tavares, Paramartha Dutta Etc.)
PDF
100% (1)
Cyber Intelligence and Information Retrieval. Proceedings of CIIR 2021 (João Manuel R. S. Tavares, Paramartha Dutta Etc.)
630 pages
The Threat Environment: Attackers and Their Attacks
PDF
No ratings yet
The Threat Environment: Attackers and Their Attacks
8 pages
Module 20 Cryptography
PDF
No ratings yet
Module 20 Cryptography
124 pages
Module 10 Denial of Service
PDF
No ratings yet
Module 10 Denial of Service
91 pages
Module 12 Evading IDS Firewall and Honeybots
PDF
No ratings yet
Module 12 Evading IDS Firewall and Honeybots
136 pages
Module 11 Session Hijacking
PDF
No ratings yet
Module 11 Session Hijacking
86 pages
Module 8 Sniffing
PDF
No ratings yet
Module 8 Sniffing
121 pages
Module 9 Social Engineering
PDF
No ratings yet
Module 9 Social Engineering
83 pages
Module 6 System Hacking
PDF
100% (1)
Module 6 System Hacking
291 pages
Module 4 Enumeration
PDF
No ratings yet
Module 4 Enumeration
92 pages
Module 16 Hacking Wireless Networks
PDF
No ratings yet
Module 16 Hacking Wireless Networks
209 pages
02 Reconnaissance Techniques
PDF
No ratings yet
02 Reconnaissance Techniques
34 pages
Module 3 Scanning Networks
PDF
No ratings yet
Module 3 Scanning Networks
154 pages
LAB - Footprinting and Recon
PDF
No ratings yet
LAB - Footprinting and Recon
6 pages
Ethical Hacking-Learn Penetration Testing
PDF
No ratings yet
Ethical Hacking-Learn Penetration Testing
114 pages
Windows Security
PDF
100% (1)
Windows Security
20 pages
Cryptography Info Sec Pro Guide - Sean-Philip Oriyano
PDF
No ratings yet
Cryptography Info Sec Pro Guide - Sean-Philip Oriyano
369 pages
Module 13 Hacking Web Server
PDF
100% (1)
Module 13 Hacking Web Server
117 pages
DEF CON 25 - Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks PDF
PDF
No ratings yet
DEF CON 25 - Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks PDF
123 pages
Lab Experiment #08 - Network & Host Detection Scans
PDF
No ratings yet
Lab Experiment #08 - Network & Host Detection Scans
3 pages
Network Security Lab: What Is Nmap?
PDF
No ratings yet
Network Security Lab: What Is Nmap?
4 pages
IS4560 Lab 1 Assessment Worksheet
PDF
No ratings yet
IS4560 Lab 1 Assessment Worksheet
4 pages
CEH v12 Lesson 9 - Social Engineering Exploits
PDF
No ratings yet
CEH v12 Lesson 9 - Social Engineering Exploits
7 pages
CEH v12 Lesson 4 - NTP, DNS & Other Network en
PDF
No ratings yet
CEH v12 Lesson 4 - NTP, DNS & Other Network en
83 pages
CST804 Ethical Hacking and Penetration Testing
PDF
No ratings yet
CST804 Ethical Hacking and Penetration Testing
170 pages
Cyber Security: ICDL Module
PDF
No ratings yet
Cyber Security: ICDL Module
13 pages
Tomas Guardia - Geometria Diferencial (2007, Universidad Central de Venezuela)
PDF
No ratings yet
Tomas Guardia - Geometria Diferencial (2007, Universidad Central de Venezuela)
282 pages
A Study For An Ideal Password Management System
PDF
No ratings yet
A Study For An Ideal Password Management System
7 pages
Cyber Security-Ethical Hacking: Letshack Foundation in Collaboration With 3girps Presents
PDF
No ratings yet
Cyber Security-Ethical Hacking: Letshack Foundation in Collaboration With 3girps Presents
4 pages
PTS Syllabus
PDF
100% (1)
PTS Syllabus
6 pages
Pentesting Report
PDF
No ratings yet
Pentesting Report
31 pages
Attacks and Vulnerabilities: Ilya Chalyt Nicholas Egebo
PDF
No ratings yet
Attacks and Vulnerabilities: Ilya Chalyt Nicholas Egebo
46 pages
Understanding AD Enumeration
PDF
No ratings yet
Understanding AD Enumeration
101 pages
Powershell 4n00bs
PDF
No ratings yet
Powershell 4n00bs
107 pages
Security Testing - Quick Guide
PDF
No ratings yet
Security Testing - Quick Guide
53 pages
Its Time To Go Hunting - IOC Vs IOA - OWASP Buc 2016
PDF
No ratings yet
Its Time To Go Hunting - IOC Vs IOA - OWASP Buc 2016
30 pages
(BurpSuiteMastery) LabManualV3 1514182492549
PDF
100% (1)
(BurpSuiteMastery) LabManualV3 1514182492549
14 pages
Cloud Computing Certification Training
PDF
100% (1)
Cloud Computing Certification Training
258 pages
I Want To Work in Cyber Security, Should I Major in Computer Science or Information Technology With A Focus in Cyber Security - Quora
PDF
No ratings yet
I Want To Work in Cyber Security, Should I Major in Computer Science or Information Technology With A Focus in Cyber Security - Quora
5 pages
The Elastic Guide To Threat Hunting
PDF
No ratings yet
The Elastic Guide To Threat Hunting
74 pages
Netcat Power Tools
PDF
No ratings yet
Netcat Power Tools
275 pages
Cryptography and Cyber Security
PDF
No ratings yet
Cryptography and Cyber Security
162 pages
Mem Intune
PDF
No ratings yet
Mem Intune
5,061 pages
Pentest Mag
PDF
No ratings yet
Pentest Mag
203 pages
Pen Testing: Active Directory Environments
PDF
100% (1)
Pen Testing: Active Directory Environments
34 pages
Defender PDF
PDF
No ratings yet
Defender PDF
124 pages
Email Forensics
PDF
No ratings yet
Email Forensics
57 pages
CEH v12 Lesson 11 - Compromising IoT & OT Plat
PDF
No ratings yet
CEH v12 Lesson 11 - Compromising IoT & OT Plat
23 pages
Breakthroughs For Defenders: Stellar Cyber's XDR Kill Chain - Delivering The Promise of EVERTHING Detection and Response
PDF
No ratings yet
Breakthroughs For Defenders: Stellar Cyber's XDR Kill Chain - Delivering The Promise of EVERTHING Detection and Response
4 pages
Digital Watermarking and Steganography Fundamentals and Techniques Second Edition by Frank Y. Shih PDF
PDF
No ratings yet
Digital Watermarking and Steganography Fundamentals and Techniques Second Edition by Frank Y. Shih PDF
293 pages
Masters Thesis
PDF
100% (1)
Masters Thesis
93 pages
Data-Security-Cloud-Storage Edited PDF
PDF
0% (1)
Data-Security-Cloud-Storage Edited PDF
178 pages
An To Cybersec and CTFS: D4Rkc0De Mehul (Sociallyencrypted)
PDF
100% (2)
An To Cybersec and CTFS: D4Rkc0De Mehul (Sociallyencrypted)
18 pages
Hakin9 EN 03 2014
PDF
100% (1)
Hakin9 EN 03 2014
74 pages
Introduction Ethical Hacking - 01
PDF
No ratings yet
Introduction Ethical Hacking - 01
35 pages
Module 1
PDF
No ratings yet
Module 1
90 pages
Introduction To ISA
PDF
No ratings yet
Introduction To ISA
35 pages
CYBERSECURITY AND ETHICAL HACKING
PDF
No ratings yet
CYBERSECURITY AND ETHICAL HACKING
3 pages