0% found this document useful (0 votes)
59 views25 pages

Lecture 2 Ehical Hacking Framework

Uploaded by

nikhilraval706
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views25 pages

Lecture 2 Ehical Hacking Framework

Uploaded by

nikhilraval706
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

3CS204ME24

Ethical Hacking and Vulnerability


Assessment
Ethical Hacking and Vulnerability Assessment
• Ethical hacking, also known as penetration testing or white-hat hacking,
refers to the practice of intentionally probing computer systems, networks,
and applications to find security vulnerabilities that could be exploited by
malicious hackers.
• The goal of ethical hacking is to identify and fix these vulnerabilities before
they can be used for unauthorized purposes.
• Vulnerability Assessment is the process of identifying, quantifying, and
prioritizing (or ranking) the vulnerabilities in a system.
• The goal is to determine the weaknesses that could be exploited by threats
and to assess the potential impact on the system.
• Key components: {Asset, Threat, Vulnerability} Identification, Risk
Assessment, Prioritization of Vulnerabilities, Reporting.
Quiz
• Which principle of the CIA triad ensures that data is not altered or
tampered with during storage or transmission?
• A. Confidentiality
B. Integrity
C. Availability
D. Authenticity
• Answer: B. Integrity
• Which aspect of the CIA triad is concerned with ensuring that
authorized users have reliable access to information and resources?
• A. Confidentiality
B. Integrity
C. Availability
D. Authentication

Answer: C. Availability
• Which of the following measures is primarily used to maintain
confidentiality?
• A. Redundant systems
B. Encryption
C. Checksums
D. Load balancing
• Answer: B. Encryption
• What is a common method to ensure the integrity of a file?
• A. Using a VPN
B. Employing firewalls
C. Implementing hash functions
D. Setting up multi-factor authentication

• Answer: C. Implementing hash functions


• Which of the following is the primary goal of information security?
• A. To prevent all unauthorized access to systems
B. To protect the confidentiality, integrity, and availability of
information
C. To ensure compliance with regulations
D. To monitor user activities
• Answer: B. To protect the confidentiality, integrity, and availability of
information
• What is a common type of attack that aims to disrupt the
availability of a system?
• A. Phishing
B. Man-in-the-middle attack
C. Denial-of-Service (DoS) attack
D. SQL injection
• Answer: C. Denial-of-Service (DoS) attack
• Which of the following is an example of a social engineering attack?
• A. Using a brute force attack to guess passwords
B. Exploiting a buffer overflow vulnerability
C. Sending phishing emails to trick users into revealing sensitive
information
D. Deploying malware to a network
• Answer: C. Sending phishing emails to trick users into revealing
sensitive information
• What is the primary purpose of a firewall in a network?
• A. To detect and remove malware
B. To encrypt network traffic
C. To prevent unauthorized access to or from a private network
D. To provide backup for data
• Answer: C. To prevent unauthorized access to or from a private
network
• Which of the following tasks is a primary responsibility of a
Cybersecurity Analyst?
• A. Designing and implementing security protocols
B. Monitoring network traffic for suspicious activity
C. Developing new encryption algorithms
D. Creating hardware security modules
• Answer: B. Monitoring network traffic for suspicious activity
• What is a key responsibility of a Cybersecurity Engineer?
• A. Conducting penetration testing and vulnerability assessments
B. Managing and configuring firewall settings
C. Monitoring compliance with security policies
D. Designing secure software architectures
• Answer: A. Conducting penetration testing and vulnerability
assessments
• Which role is most likely to be involved in the strategic planning of
network security infrastructure?
• A. Cybersecurity Analyst
B. Cybersecurity Engineer
C. Network Security Architect
D. Security Operations Center (SOC) Manager
• Answer: C. Network Security Architect
• A Cybersecurity Engineer is typically tasked with which of the
following activities?
• A. Writing detailed security policies and procedures
B. Implementing and maintaining security solutions such as firewalls
and IDS/IPS
C. Performing daily security log reviews and audits
D. Educating employees about cybersecurity best practices
• Answer: B. Implementing and maintaining security solutions such as
firewalls and IDS/IPS
• Which job role would most likely be responsible for designing the
overall security architecture of an organization’s network?
• A. Cybersecurity Analyst
B. Cybersecurity Engineer
C. Network Security Architect
D. IT Manager
• Answer: C. Network Security Architect
Ethical Hacking Framework
Dr Vipul Chudasama
Ethical Hacking Framework
• What is Ethical Hacking Framework?
• An Ethical Hacking Framework is a structured approach that ethical
hackers follow to systematically identify and exploit vulnerabilities in an
organization's systems, networks, or applications to improve their
security posture.

• This framework ensures that the process is conducted in a controlled


and authorized manner, aligning with legal and ethical standards.
Ethical Hacking Framework
• Key Components of an Ethical
Hacking Framework
1.Planning and Reconnaissance
2.Scanning and Enumeration
3.Gaining Access
4.Maintaining Access
5.Covering Tracks
6.Reporting and Remediation
Planning and Reconnaissance
• What is it??
• To gather information about the target to understand its structure, behavior,
and potential vulnerabilities.

• What are the techniques to do Reconnaissance?


• Passive Reconnaissance: Collecting data without directly interacting with the
target (e.g., using WHOIS databases, public records, social media).
• Active Reconnaissance: Collecting data directly interacting with the target to
gather information (e.g., network pinging, querying DNS).
Scanning and Enumeration
• What is it?
• The purpose of Enumeration is identify live systems, open ports, services,
and potential vulnerabilities.
• It servers as identifying entry point into the system.
• What are the techniques to do Enumeration?
• Network Scanning: Detecting active devices on a network.
• Port Scanning: Identifying open ports and services running on the target
system.
• Vulnerability Scanning: Using automated tools to detect known vulnerabilities
in the system.
Gaining Access
• What is it?
• The purpose of this process is to exploit identified vulnerabilities and gain
unauthorized access to the target system.
• Ethical hackers test the effectiveness of existing security measures and
understand the potential impact of a breach.
What are the techniques to do this process?
• Exploit Development: Creating or using existing exploits to take advantage of
vulnerabilities.
• Social Engineering: Manipulating individuals into exposing confidential
information or performing actions that compromise security.
Maintaining Access
• What is it?
• The phase where the hacker ensures they can continue to access the target
system over a prolonged period.
• The purpose is to assess the risk of prolonged unauthorized access and test
detection capabilities.
• What are the techniques??
• Rootkits: Software tools that enable continued access while hiding the
hacker’s presence.
• Backdoors: Hidden methods of bypassing authentication to regain access to a
system.
Covering Tracks
• What is it?
• The final phase where the hacker attempts to erase any evidence of their
presence and activities.
• The purpose of this phase also is to test the system's logging and monitoring
capabilities and to understand the ease of covering tracks.
• What are the techniques ??
• Log Manipulation: Altering or deleting log entries to remove evidence of
activities.
• Data Alteration: Modifying timestamps, metadata, or other information to
obfuscate actions.
Popular Ethical Hacking Tools
• Nmap: Network scanning tool used to discover hosts and services.
• Metasploit: Exploitation framework for developing and executing
exploit code.
• Wireshark: Network protocol analyser for network troubleshooting
and analysis.
• Burp Suite: Integrated platform for performing security testing of web
applications.
Ethical Considerations
• Authorization - Ethical hackers must have explicit permission from the
system owner before conducting any testing.
• Legal Compliance- Ensure adherence to relevant laws and regulations
(e.g., IT Act, Computer Fraud and Abuse Act, GDPR).
• Professional Conduct - Maintain integrity, honesty, and
professionalism throughout the process.

You might also like