Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
100%
(1)
100% found this document useful (1 vote)
495 views
291 pages
Module 6 System Hacking
Uploaded by
Nghia Tran Van
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Module 6 System Hacking For Later
Download
Save
Save Module 6 System Hacking For Later
100%
100% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
100%
(1)
100% found this document useful (1 vote)
495 views
291 pages
Module 6 System Hacking
Uploaded by
Nghia Tran Van
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Module 6 System Hacking For Later
Carousel Previous
Carousel Next
Download
Save
Save Module 6 System Hacking For Later
100%
100% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 291
Search
Fullscreen
. _~_— a y ; Certified Ethical Hacker LY Cfo [U [tel shs System HackingEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker ‘System Hacking Module Objectives 2 Overview of CEH Hacking Methodlony * LUnserstanaingTeenniquesta Gai Acces tthe System % Understanding rege Excaletion Techniques 2) 4 net eno pl Understanding Tehniques to Hide the Evidence of Compromise Understanding Diferent System Hacking Countermeasures Module Objectives ‘System hacking is one of the most important, and sometimes, the ultimate goal of an attacker. The attacker acquires information through techniques such as footprinting, scanning, enumeration, and vulnerability analysis and then uses this information to hack the target system. This module will focus on the tools and techniques used by an attacker to hack the target system. The module begins with an overview of the hacking methodology. Next, it discusses in detail the various hacking stages, such as gaining and maintaining access and clearing logs. At the end of this module, you will be able to do the following: "Describe the Certified Ethical Hacker hacking methodology Explain the different techniques to gain access to a system = Apply privilege escalation techniques "Explain different techniques to gain and maintain remote access to a system "Describe different types of rootkits = Explain steganography and steganalysis techniques "Apply different techniques to hide the evidence of compromise Apply various system hacking countermeasures Module 06 Page 585 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Sytem Hacking Module Flow System Hacking Concepts 3 escalating Privileges 2 Gaining Recess © smaintatning Necess Bo 8 System Hacking Concepts ‘An attacker engages in system hacking attempts using information collected in earlier footprinting, scanning, enumeration, and vulnerability analysis phases. The following is an overview of these phases and the information collected so far. We have already discussed the following in our previous modules: Footprinting Module: Footprinting is the process of accumulating data about a specific network environment. In the footprinting phase, the attacker creates a profile of the ‘target organization and obtains information such as its IP address range, namespace, and employees. Footprinting facilitates the process of system hacking by revealing its vulnerabilities. For example, the organization’s website may provide employee bios or a personnel directory, which the hacker can use for social engineering purposes. Conducting a Whois query on the web can provide information about the associated networks and domain names related to a specific organization. Scanning Module: Scanning is a procedure used for identifying active hosts, open ports, ‘and unnecessary services enabled on particular hosts. Attackers use different types of scanning methods for host discovery, port and service discovery, operating system (OS) discovery, and evading endpoint security devices such as intrusion detection systems (IDSs) and firewalls. These techniques help attackers identify possible vulnerabilities. Scanning procedures such as port scanning and ping sweeps return information about the services offered by the live hosts that are active on the Internet, and their IP addresses, Module 06 Page 586 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker ‘System Hacking Enumeration Module: Enumeration is a method of intrusive probing, through which attackers gather information such as network user lists, routing tables, security flaws, and Simple Network Management Protocol (SNMP) data. This is of significance, because the attacker ranges over the target territory to glean information about the network, and shared users, groups, applications, and banners. Enumeration involves making active connections to the target system or subjecting it to direct queries. Normally, an alert and secure system logs such attempts. Often, the information gathered, such as a DNS address, is publicly available; however, itis possible that the attacker might stumble upon a remote IPC share, such as IPCS in Windows, that can be probed with a null session, thereby allowing shares and accounts to be ‘enumerated. Vulnerability Analysis Module: Vulnerability assessment is an examination of the ability of a system or application, including its current security procedures and controls, to withstand assault. It recognizes, measures, and classifies security vulnerabilities in a computer system, network, and communication channels. Attackers perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems. The identified vulnerabilities are used by the attackers to perform further exploitation on that target network, Module 06 Page 587 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker ‘System Hacking CEH Hacking Methodology (CHM) el = (_vtrerabinyxponaton —) Escalating Privileges f { ( ing les ) (Clearing Legs Covering Tracks ) CEH Hacking Methodology (CHM) Attackers follow a certain methodology to hack a system. They first obtain information during the footprinting, scanning, enumeration, and vulnerability analysis phases, which they then use to exploit the target system. The figure shows the steps and flow mechanisms between steps in the CEH hacking methodology (CHM). — Gaining Recess Cracking Passwords ) Vulnerability Exploitation | Escalating Privileges ‘Maintaining Kecess | Enumeration t Executing Applications | Hiding Files ) oy Welnerability Analysis Clearing Loge t Covering Tacks Figure 6.1: CEH hacking methodology Modle 06 Page 548 thie Hacking and Countermeasures Copniht © by EECouncll ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker ‘System Hacking There are four steps in the CHM: Gaining Access The previous phases of hacking, including footprinting and reconnaissance, scanning, ‘enumeration, and vulnerability assessment, help attackers to identify security loopholes and vulnerabilities that exist in the target organizational IT assets. Attackers use this information, along with techniques such as cracking passwords and exploiting vulnerabilities such as buffer overflows, to gain access to the target organizational system. Password cracking involves gaining access to low-privileged user accounts by cracking passwords using techniques such as brute-forcing, password guessing, and social ‘engineering. Attackers exploit the identified vulnerabilities, such as buffer overflows, to gain root-level access to the target system Escalating Privileges After gaining access, attackers then escalate their privileges to administrative levels, to perform a protected operation. Attackers exploit vulnerabilities that exist in OSs and software applications to escalate privileges. Maintaining Access After successfully gaining access and escalating privileges to the target system, attackers ‘ensure that high levels of access are maintained to perform malicious activities such as ‘executing malicious applications and stealing, hiding, or tampering with sensitive system files. Clearing Logs To maintain future system access, attackers attempt to avoid recognition by legitimate system users. To remain undetected, attackers wipe out the entries corresponding to their activities in the system logs, thus avoiding detection by users. Module 06 Page 589 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker ‘System Hacking | System Hacking Goals CEH Hacking Stage Goat Technique/Exploit Used © Gaining acess p] [ection | | | Saiseisreaticeteee” © Escalating privieges >| a= © Evcangappaions |») Periasnteattnmtnacen || ton mre edn © Hising ries | Tole acer’ matious actos, | | peas, earogrnhy @ Covering tracks >| Tohide ne evidence ot compromise || >| | clearing gs System Hacking Goals Every criminal has a certain goal that they intend to achieve. Likewise, attackers can have certain goals for performing system attacks. The following are some examples of the goals of system attackers. The following diagram shows these goals at different hacking stages and the techniques used to achieve them. ~ r ~ Backing Stage Goat ] Technique/Exploit Used oun Dopo wancmwate nn, | (Panes cing winery a Access: access to the system: | exploitation, social engineering. Seal Ai © Escalating Privi ee >) Stherttes Taraaca esos] |, | sanyrearane © ExacutngAppications | [>| (Bewres >| me © Hiane ries |] (Eames mee | [5 we meme © Covering Tracks |) tonide ne evidencectcompromse || ceringioes L JK UK J igure 6.2: Hacking stags, goals, an techniques = Gaining Access In system hacking, the attacker first tries to gain access to a target system using information obtained and loopholes found in the access control mechanism of the Module 06 Page 550 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel Prohiated
You might also like
Mastering Linux Security and Hardening
PDF
0% (1)
Mastering Linux Security and Hardening
17 pages
Ethical Hacking Merged PDF
PDF
No ratings yet
Ethical Hacking Merged PDF
333 pages
Ethical Hacking Lab
PDF
100% (2)
Ethical Hacking Lab
146 pages
1737616367120
PDF
No ratings yet
1737616367120
37 pages
Module 20 Cryptography
PDF
No ratings yet
Module 20 Cryptography
124 pages
Module 16 Hacking Wireless Networks
PDF
No ratings yet
Module 16 Hacking Wireless Networks
209 pages
Module 9 Social Engineering
PDF
No ratings yet
Module 9 Social Engineering
83 pages
Module 11 Session Hijacking
PDF
No ratings yet
Module 11 Session Hijacking
86 pages
Ceh Exam Prep
PDF
100% (1)
Ceh Exam Prep
1,865 pages
Module 8 Sniffing
PDF
No ratings yet
Module 8 Sniffing
121 pages
1.intro To Ethical Hacking
PDF
50% (2)
1.intro To Ethical Hacking
67 pages
Windows Privilege Escalation
PDF
100% (1)
Windows Privilege Escalation
30 pages
Advanced-Ethical-Hacking - PPTX 20241001 092152 0000
PDF
No ratings yet
Advanced-Ethical-Hacking - PPTX 20241001 092152 0000
21 pages
Module 13 Hacking Web Server
PDF
100% (1)
Module 13 Hacking Web Server
117 pages
Eforensics 2014-2
PDF
No ratings yet
Eforensics 2014-2
136 pages
eJPT CheatSheet
PDF
100% (1)
eJPT CheatSheet
61 pages
Module 3 Scanning Networks
PDF
No ratings yet
Module 3 Scanning Networks
154 pages
WIRESHARK Sheet
PDF
No ratings yet
WIRESHARK Sheet
16 pages
The Power of Recon
PDF
No ratings yet
The Power of Recon
46 pages
Advanced Malware Analysis
PDF
100% (1)
Advanced Malware Analysis
570 pages
CEHv12 - Module 14 - Hacking Web Applications
PDF
No ratings yet
CEHv12 - Module 14 - Hacking Web Applications
348 pages
Metasploit Basic
PDF
100% (1)
Metasploit Basic
271 pages
Unit III Vapt(Part i)
PDF
No ratings yet
Unit III Vapt(Part i)
8 pages
CEH V13ai Brochure
PDF
100% (1)
CEH V13ai Brochure
29 pages
312 50v12
PDF
No ratings yet
312 50v12
4 pages
CSE Cyber Security LAB Manual
PDF
No ratings yet
CSE Cyber Security LAB Manual
59 pages
Module 12 Evading IDS Firewall and Honeybots
PDF
No ratings yet
Module 12 Evading IDS Firewall and Honeybots
136 pages
Penetration Testing Commands
PDF
No ratings yet
Penetration Testing Commands
22 pages
Docker Containers
PDF
No ratings yet
Docker Containers
126 pages
Module 10 Denial of Service
PDF
No ratings yet
Module 10 Denial of Service
91 pages
Pfsense - A Guide To NAT, Firewall Rules and Some Networking 101
PDF
No ratings yet
Pfsense - A Guide To NAT, Firewall Rules and Some Networking 101
28 pages
Module 1 Introduction To Ethical Hacking
PDF
No ratings yet
Module 1 Introduction To Ethical Hacking
91 pages
Lab 3 Enumeration
PDF
100% (1)
Lab 3 Enumeration
121 pages
Module 4 Enumeration
PDF
No ratings yet
Module 4 Enumeration
92 pages
DEF CON 25 - Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks PDF
PDF
No ratings yet
DEF CON 25 - Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks PDF
123 pages
Penetration Testing in Linux
PDF
No ratings yet
Penetration Testing in Linux
71 pages
CEH v12 Lesson 4 - NTP, DNS & Other Network en
PDF
No ratings yet
CEH v12 Lesson 4 - NTP, DNS & Other Network en
83 pages
Nmap Network Discovery III Reduced Size PDF
PDF
50% (2)
Nmap Network Discovery III Reduced Size PDF
937 pages
John The Ripper 1706883159
PDF
100% (1)
John The Ripper 1706883159
33 pages
Offensive Security - Advanced Windows Exploitation (AWE) PDF
PDF
No ratings yet
Offensive Security - Advanced Windows Exploitation (AWE) PDF
185 pages
67Hrs - The Complete Cyber Security Bundle - Beginner To Advanced
PDF
100% (1)
67Hrs - The Complete Cyber Security Bundle - Beginner To Advanced
6 pages
CEH Brochure
PDF
No ratings yet
CEH Brochure
24 pages
Honeypot Frameworks and Their Applications NG Pan Xiang 2018
PDF
No ratings yet
Honeypot Frameworks and Their Applications NG Pan Xiang 2018
88 pages
Hacking With Kali Linux A Beginner's Guide To Study Penetration
PDF
100% (3)
Hacking With Kali Linux A Beginner's Guide To Study Penetration
113 pages
My CEHpractica Lcheat Sheet
PDF
No ratings yet
My CEHpractica Lcheat Sheet
6 pages
CEH Lesson 5 - Web Server Hacking
PDF
No ratings yet
CEH Lesson 5 - Web Server Hacking
25 pages
Network Monitoring Using AlienVault
PDF
No ratings yet
Network Monitoring Using AlienVault
15 pages
Cpent
PDF
33% (3)
Cpent
6 pages
OSCP Syllabus 2023 Update
PDF
No ratings yet
OSCP Syllabus 2023 Update
20 pages
THM Hacking Encyclopedia
PDF
100% (1)
THM Hacking Encyclopedia
91 pages
Penetration Testing With Kali
PDF
33% (9)
Penetration Testing With Kali
16 pages
Advanced Web Hacking PDF
PDF
100% (2)
Advanced Web Hacking PDF
21 pages
Metasploit User Guide
PDF
100% (2)
Metasploit User Guide
99 pages
Recon For Web Pen-Testing
PDF
No ratings yet
Recon For Web Pen-Testing
17 pages
TCMS PNPT Training Overview
PDF
No ratings yet
TCMS PNPT Training Overview
16 pages
Lab Experiment #08 - Network & Host Detection Scans
PDF
No ratings yet
Lab Experiment #08 - Network & Host Detection Scans
3 pages