Ebooks File Ethical Hacking Techniques Tools and Countermeasures Michael G. Solomon All Chapters
Ebooks File Ethical Hacking Techniques Tools and Countermeasures Michael G. Solomon All Chapters
Ebooks File Ethical Hacking Techniques Tools and Countermeasures Michael G. Solomon All Chapters
com
https://ebookmeta.com/product/ethical-hacking-techniques-
tools-and-countermeasures-michael-g-solomon/
OR CLICK BUTTON
DOWLOAD NOW
https://ebookmeta.com/product/ethical-hacking-techniques-and-
countermeasures-for-cybercrime-prevention-first-edition-nabie-y-
conteh/
https://ebookmeta.com/product/ethereum-for-dummies-michael-g-
solomon/
https://ebookmeta.com/product/python-penetration-testing-
essentials-techniques-for-ethical-hacking-with-python-2nd-
edition-mohit/
https://ebookmeta.com/product/fundamentals-of-information-
systems-security-4th-edition-david-kim-michael-g-solomon/
Ethical Hacking A Comprehensive Beginner s Guide to
Learn and Understand the Concept of Ethical Hacking
2023 1st Edition Joe Grant
https://ebookmeta.com/product/ethical-hacking-a-comprehensive-
beginner-s-guide-to-learn-and-understand-the-concept-of-ethical-
hacking-2023-1st-edition-joe-grant/
https://ebookmeta.com/product/global-health-ethical-
challenges-2nd-edition-solomon-benatar/
https://ebookmeta.com/product/beginning-ethical-hacking-with-
python-1st-edition-sanjib-sinha/
https://ebookmeta.com/product/coping-skills-tools-techniques-for-
every-stressful-situation-2nd-edition-faith-g-harper/
https://ebookmeta.com/product/certified-ethical-hacker-ceh-
preparation-guide-lesson-based-review-of-ethical-hacking-and-
penetration-testing-1st-edition-ahmed-sheikh-2/
World Headquarters
Jones & Bartlett Learning
25 Mall Road
Burlington, MA 01803
978-443-5000
[email protected]
www.jblearning.com
Jones & Bartlett Learning books and products are available through most
bookstores and online booksellers. To contact Jones & Bartlett Learning directly,
call 800-832-0034, fax 978-443-8000, or visit our website, www.jblearning.com.
Contents
Preface
Acknowledgments
About the Authors
CHAPTER 8 Malware
Malware
Malware’s Legality
Types of Malware
Malware’s Targets
Viruses
The History of Viruses
Types of Viruses
Prevention Techniques
Worms
How Worms Work
Stopping Worms
Trojans
Use of Trojans
Targets of Trojans
Known Symptoms of an Infection
Detection of Trojans
Distribution Methods
Backdoors
Covert Communication
Keystroke Loggers
Software
Hardware
Port Redirection
Spyware
Methods of Infection
Bundling with Software
Adware
Scareware
Ransomware
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 8 ASSESSMENT
Preface
Learning Features
The writing style of this text is practical and conversational. Each
chapter begins with a statement of learning objectives. Step-by-step
examples of information security concepts and procedures are
presented throughout the text. Illustrations are used to both clarify
the material and vary the presentation. Sprinkled throughout are a
wealth of Notes, Tips, FYIs, Warnings, and sidebars to alert the
reader to additional helpful information related to the subject under
discussion. Chapter Assessments appear at the end of each chapter,
with solutions provided in the back of the text.
Chapter summaries are included in the text to provide a rapid
review or preview of the material and to help students understand
the relative importance of the concepts presented.
Audience
This material is suitable for undergraduate or graduate computer
science majors or information science majors, students at a two-year
technical college or community college who have a basic technical
background, and readers who have a basic understanding of IT
security and want to expand their knowledge.
Cloud Labs
This text is accompanied by Cloud Labs. These hands-on virtual labs
provide immersive mock IT infrastructures where students can learn
and practice foundational cybersecurity skills as an extension of the
lessons in this text. For more information or to purchase the labs,
visit http://go.jblearning.com/ethicalhacking4e.
© Bocos Benedict/Shutterstock.
Acknowledgments
CHAPTER 1 TOPICS
This chapter covers the following topics and concepts:
CHAPTER 1 GOALS
When you complete this chapter, you will be able to:
NOTE
Don’t let the term “good guys” throw you. It doesn’t actually
imply that only one gender is a good fit for being an exceptional
InfoSec professional. Some of the best InfoSec people with
whom I have worked are not “guys.”
FYI
People who break the law or break into systems without
authorization are more correctly known as crackers. The media
do not usually make this distinction because “hacker” has
become such a universal term. In reality, many experienced
hackers never break the law and define hacking as producing an
outcome that the system’s designers never intended or
anticipated. In that respect, Albert Einstein can be considered to
have “hacked” Newtonian physics. In the interest of simplicity,
this book will use the term “hacker” to describe those individuals
who are either productive or destructive.
NOTE
Never underestimate the damage a determined individual can do
to computer systems. For example, the 2021 Cost of Data Breach
Study by IBM (available at www.ibm.com/security/data-breach)
found that breaches cost the large organizations reporting such
incidents a global annualized average of $4.24 million each.
Controls
Each organization is responsible for protecting itself from risks by
determining the controls that will be most effective in reducing or
mitigating the threats it faces. One approach to developing a
balanced and effective strategy for selecting security controls is the
TAP principle. TAP is an acronym for technical, administrative, and
physical—the three types of controls you can use to mitigate risk.
Here’s a look at each type, with a few examples:
NOTE
Although the mere act of writing malicious computer software,
such as a virus or ransomware, is not illegal, releasing it into the
“wild” is illegal.
NOTE
Although it is true that applications or data can be erased or
modified, even worse scenarios can happen under the right
circumstances. For example, consider what could happen if
someone broke into a system such as a 911 emergency service
and then maliciously or accidentally took it down.
Motivations of Hackers
Ethics are an important aspect of understanding hackers, but far
from the only salient point. One must also consider motivation.
Anyone who has watched one of the many television shows that
focus on solving crimes knows that three things are needed to
commit a crime:
Hacktivism
A relatively new form of hacking is hacking on behalf of a cause.
In the past, hacking was done for many different reasons, which
rarely included social expression. Over the past few decades,
however, an increasing number of security incidents have
occurred whose roots can be traced to social or political activism.
Examples include defacing websites of public officials,
candidates, or agencies with which an individual or group
disagrees or launching denial of service (DoS) attacks against
corporate or political websites. With the increased presence of,
and reliance on, social media, hacktivism can also manifest as
simply spreading rumors and false stories. Hacktivists generally
focus on attacks that lead to widespread disruption as opposed
to financial gain.
A Look at the History of Computer Hacking
Typical early hackers were curious about the new technology of
networks and computers and wanted to see just how far they could
push their capabilities. Hacking has changed quite a bit since then.
For example, in the 1970s, before the advent of the personal
computer (PC), hacking was mostly confined to mainframes that
were found only in corporate and university environments. When
PCs became widely available in the 1980s, anyone could get their
own copy of an operating system. Hackers soon realized that a hack
that worked on one PC would work on nearly every other PC as well.
Although the first Internet worm, introduced by Robert T. Morris, Jr.
in November 1988, exploited a weakness in the UNIX sendmail
command, the attention of worm and virus writers soon shifted to
the world of PCs, where most infections occur today.
As hackers’ skills and creativity evolved, so did their attacks. The
first web browser, Mosaic, was introduced in 1993. By 1995, hackers
were defacing websites. Some of the earliest hacks were quite
funny, if not somewhat offensive or vulgar. By May 2001, websites
were hacked at such a rate that the group that documented them
gave up trying to keep track these attacks (see
http://attrition.org/mirror/attrition).
By the turn of the century, hacks started to devolve from pranks to
malicious activity. DoS attacks took out companies’ Internet access,
affecting those firms’ stock prices and causing financial damage. As
websites began to process more credit card transactions, their back-
end databases became prime targets for attacks. As computer crime
laws came into being, the bragging rights for hacking a website
became less attractive—sure, a hacker could show off to friends, but
that didn’t produce a financial return. As online commerce grew,
skilled hackers started offering their services to the highest bidder,
with crime rings, organized crime, and nations with hostile interests
utilizing the Internet as an attack route.
To combat the growing tide of cybercrime, software and hardware
vendors released numerous security-related products in the 1990s
and early 2000s. Antivirus software, firewalls, IDSs, and remote
access controls were all designed to counter an increasing number of
new and diverse threats. As technology, hackers, and
countermeasures improved and evolved together, so did the types of
attacks and strategies used. Attackers started introducing new
threats in the form of worms, spam, spyware, adware, and rootkits.
These attacks went beyond harassing and irritating the public to
causing widespread disruptions by attacking the technologies that
society increasingly depended on.
Hackers also started to realize that it was possible to use their
skills to generate money in all sorts of interesting ways. For
example, attackers used techniques to redirect web browsers to
specific pages that generated revenue for themselves. Spammers
sent out thousands upon thousands of email messages advertising
various products and services. Because sending out bulk email costs
mere pennies, it takes only a small number of purchases to make a
nice profit.
The last two decades have seen the hacking community adopting
a new team ethic or work style. In the past, it was normal for a
“lone wolf” type to engage in hacking activities. Today, a new
pattern of a collective or group effort has emerged. Attackers found
that working together can produce greater results than just one
individual carrying out an attack. Such teams increase their
effectiveness not only by capitalizing on their sheer numbers,
diversity, or complementary skills, but also by adding clear
leadership structures. Another concern is the trend in which groups
of hackers receive financing from nefarious or resourceful sources,
such as criminal organizations, terrorists, or even foreign
governments. The proliferation of and increasing dependence on
technology has proved it to be an irresistible target for criminals.
FYI
In the 1960s, Intel scientist Gordon Moore noted that the density
of transistors was doubling every 18 to 24 months. Because
computing power is directly related to transistor density, the
statement “Computing power doubles every 18 months” became
known as Moore’s law. Cybersecurity author and expert G. Mark
Hardy has offered a corollary for security professionals, known as
G. Mark’s law: “Half of what you know about security will be
obsolete in 18 months.” Successful security professionals commit
to lifelong learning.
NOTE
Engaging in any hacking activity without the explicit permission
of the owner of the target you are attacking is a crime whether
or not you get caught. And the only way to prove that you have
explicit permission is to get it in writing—before you start!
InfoSec professionals often call this written permission their “get
out of jail free card.”
This is a pea like tumor growing from the tarsal cartilage, its
flattened side toward the mucosa, which is red and angry, and its
round surface toward the skin. When manipulated between the
fingers it moves with the tarsus. It is usually of slow growth and may
continue for years apparently unchanged. Some have thought it
tuberculous, but its true nature is uncertain. Warner records the
disease in the horse.
Treatment consists in incision and removal of the tumor,
curretting of the cavity, and after antiseptic douching, suturing the
lips.
TUBERCULOSIS OF THE EYELID.
In large dogs, in old age, debility, conjunctival swelling, cicatrized skin of lids,
distortions of lids. Symptoms: exposure of palpebral mucosa, weeping eyes,
conjunctival hypertrophy (chemosis). Treatment: scarify or excise a fold of
mucosa, astringent antiseptics, Snellen’s suture, Diefenbach’s operation, Wharton-
Jones operation.
These may come from the same causes as fractures and though
less violent may occasion inflammation which involves the eye or
even the brain with fatal results. Thus in horses it has been a cause of
infective inflammation, with a fatal extension (Robellet); in cattle a
similar inflammation has extended to the cerebral meninges and
caused death (Leblanc), and in dogs an advance to the eyeball
threatens its destruction (Möller). Short of this necrosis is not
uncommon (Rey).
Treatment. This does not differ materially from that demanded by
penetrating wounds with fracture. A perfect cleansing and antisepsis
of the wound is the first demand. A solution of boric acid (4 per
cent.) or of mercuric chloride (1 ∶ 5000) liberally applied, and
maintained thereafter on soft pledgets of surgical cotton, will often
have the best results. All foreign bodies must be carefully removed,
lacerated flaps and shreds may require suturing, dead portions
excision, and finally abscesses or excessive exudate may require the
lance, but cooling, antiseptic lotions and an elevated position of the
head, are among the most prominent resorts.
RETRO-BULBAR ABSCESS.
This may be shown by the firm swelling of the bone and, in case a
wound has been formed, by the contact of the probe with the
denuded, hard, rough bone. When thus exposed or necrosed on the
surface, or when an exostosis has formed, the bone may be laid open
and scraped down to the healthy tissue, and then dressed with
antiseptic pledgets.
TUMORS OF THE ORBIT.
Even in man these parts are remarkably free from disease, while in
the lower animals, we have literally no record of such conditions.
Inflammation of the gland (dacryo-adenitis) would be manifested by
a sensitive swelling under the outer part of the orbital process, and
upper eyelid and by lachrymation, and obstruction of the gland duct
and by a tense transparent rounded swelling inside the lid. A fistula
is possible from a penetrating wound of the lid in the same situation.
In both of the latter conditions an opening made through the
palpebral conjunctiva will allow the discharge of the tears in the
proper place, and healing of any external wound may be hastened by
suture or plaster.
OBSTRUCTION OF THE LACHRYMAL PUNCTA.
ATRESIA. INFLAMMATION.
The lachrymal sac, which receives the tears from the canaliculi, is
situated in the infundibulum at the upper end of the lachrymal canal
and is in great measure protected against external injuries by the
prominent orbital edge of the lachrymal bone. Yet violent blows with
or without fracture, sometimes lead to rupture of the mucous walls
and the formation of a fistula. Wounds made with penetrating
bodies, more or less pointed are also liable to involve the sac. The
fistulous orifice may be through the skin at the inner canthus or
through the mucosa by the side of the carnucle. The cutaneous
opening may be a minute orifice from which tears and muco-
purulent matter escapes, to mat together the hairs on the side of the
face. Sometimes there is a reddish elevation, the size of a pin head,
and in fistula through the mucosa this is the rule, and the orifice is
elevated so that the tears flow out over the face. For the symptoms of
the attendant catarrh of the sac see below. In infected cases with
obstruction of the lachrymo-nasal duct, it has been known to extend
to the bone and even to open into the sinuses, or tooth follicles.
(Gerard, Leblanc).
The condition is found in horses, cattle and dogs.
Treatment. In fistula resulting from simple traumatism, nothing
more may be requisite than rest and soothing astringent
applications. Sutures are sometimes resorted to but are liable to
cause itching and do more harm than good. It is above all important
to keep the lachrymo-nasal duct patent, and for this purpose a lead
or silver stilet, or a thick catgut suture may be worn in the canal until
healing has ensued.
CATARRH OF THE LACHRYMAL SAC.
DACRYOCYSTITIS.
Like other parts of the ocular apparatus, the third eyelid and gland
of Harder are subject to accidental injuries of various kinds. What is
worse, ignorant persons seeing the cartilage and membrane
projected over the eye in ophthalmias and tetanus, have mistaken it
for a morbid product and deliberately cut it off in part. The condition
of the organ may be ascertained by parting the lids with the fingers
and pressing gently on the front of the eyeball, when the nictitating
membrane will be fully exposed.
If detached portions cannot be restored, but threaten to slough, or
cause distortions or unsightly and irritating neoplasms they should
be seized with forceps and snipped off with scissors. Otherwise the
treatment consists in soothing astringent and anodyne Collyria as in
conjunctivitis.
TUMORS AND HYPERTROPHY OF THE
MEMBRANA NICTITANS.