Cyber Security - SG - Module 07
Cyber Security - SG - Module 07
ETHICAL HACKING:
(Source: https://www.synopsys.com)
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data.
Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to
identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit
them.
Types of Hackers:
There are generally 10-types of Hackers, they are:
1. White Hat Hackers:
White hat hackers are the one who is authorized or the certified hackers who work for the government and
organizations by performing penetration testing and identifying loopholes in their cybersecurity. They also
ensure the protection from the malicious cyber-crimes. They work under the rules and regulations provided by
the government, that’s why they are called Ethical hackers or Cybersecurity experts.
4. Script Kiddies:
They are the most dangerous people in terms of hackers. A Script kiddie is an unskilled person who uses scripts
or downloads tools available for hacking provided by other hackers. They attempt to attack computer systems
and networks and deface websites. Their main purpose is to impress their friends and society. Generally, Script
Kiddies are juveniles who are unskilled about hacking.
9. Hacktivist:
These are also called the online versions of the activists. Hacktivist is a hacker or a group of anonymous
hackers who gain unauthorized access to government’s computer files and networks for further social or
political ends.
3. Email Hacking:
In the digital world of the corporate sector, emails contain extremely sensitive data & information that hackers
may be interested in. Email hacking can include hacking into the network to get email passwords and gaining
unauthorized access to the email of an individual or employees of a business. This can expose an individual's
DIGITAL REGENESYS: CYBER SECURITY MODULE 07
personal life or reveal sensitive data from business emails. A phishing attack (widespread) can also lead to users
compromising their personal information or data security.
5. Password Hacking:
Password hacking can be a part of computer or system hacking. Hackers utilize the data stored on the computer
and on the servers to access the passwords to any website, computer, email, accounts, etc., and then use that
information for malicious purposes. Ethical hackers use similar methods to do so and identify any security
measures that can be followed to prevent this.
2. Scanning:
Scanning is the process of getting quick access to the outer level of the security framework of any network or
system. Once again, hackers look for relevant information in this phase. The first step is pre-attack scanning,
where information from reconnaissance is used to gather more information. The second step is sniffing or port
scanning, where a hacker uses tools like vulnerability scanners, port scanners, dialers, etc., to survey the network.
Lastly, information extraction is where information about the ports, physical machine, and system details is
gathered to prepare for the hacking attack.
3. Gaining Access:
Once all the relevant information is gathered, the next step for the hacker is to gain access to the network or the
system. Once this happens, the hacker gains access and complete control over the network details and individual
systems.
4. Maintaining Access:
After an ethical hacker gains access to the system, they will continue to maintain the attack to allow sufficient
time to gather the information required or complete the purpose of hacking. Additional attacks are also launched if
the hacker needs more time or wants to do more damage.
5. Covering Tracks:
Escaping the security personnel and the security framework built into the system is as important as gaining access.
This is done by following steps such as closing open ports, deleting the log files, clearing all cookies, etc. This
ensures that the hacking attempt cannot be tracked to the hacker.
DIGITAL REGENESYS: CYBER SECURITY MODULE 07
Programming Knowledge that is required while working in the field of network security.
Scripting knowledge to identify and deal with attacks.
Network skills, as most malicious hacking attacks are aimed at the network. Proper knowledge of computer
networking is required to help find the flaws in the system.
Basic knowledge of operating systems such as Windows, Mac OS, Linux, etc.
Up-to-date knowledge of new hacking methods, tools available, hacking patterns, etc.
A detailed introduction to ethical hacking can help you with the process of developing the required skill set.
An ethical hacker reports the identified vulnerabilities to the organization. Additionally, they provide remediation
advice. In many cases, with the organization’s consent, the ethical hacker performs a re-test to ensure the vulnerabilities
are fully resolved.
Malicious hackers intend to gain unauthorized access to a resource (the more sensitive the better) for financial gain or
personal recognition. Some malicious hackers deface websites or crash backend servers for fun, reputation damage, or
to cause financial loss. The methods used and vulnerabilities found remain unreported. They aren’t concerned with
improving the organizations security posture.
DIGITAL REGENESYS: CYBER SECURITY MODULE 07
Ethical hacking also helps businesses establish trust with their customers. Reliability among customers helps them build
a loyal customer base. Security of the product or service and the user data help businesses flourish in their sector. Data
is one of the most critical assets of businesses, and it is their responsibility to ensure that it is safe and sound.
Conclusion:
You can start your Ethical Hacking career by taking a certification course and gaining relevant practical experience.
Understanding the fundamentals and getting theoretical knowledge are essential. However, practical experience will
help you understand the process better. Cyber security is an extremely important part of today's security framework.
With tons of sensitive data stored with third-party services, protecting that data has become a significant task.
Information security protects sensitive information from unauthorized activities, including inspection, modification,
recording, and any disruption or destruction. The goal is to ensure the safety and privacy of critical data such as customer
account details, financial data or intellectual property.
The consequences of security incidents include theft of private information, data tampering, and data deletion. Attacks
can disrupt work processes and damage a company’s reputation, and also have a tangible cost.
DIGITAL REGENESYS: CYBER SECURITY MODULE 07
Organizations must allocate funds for security and ensure that they are ready to detect, respond to, and proactively
prevent, attacks such as phishing, malware, viruses, malicious insiders, and ransomware.
Integrity
Consistency includes protection against unauthorized changes (additions, deletions, alterations, etc.) to data. The
principle of integrity ensures that data is accurate and reliable and is not modified incorrectly, whether accidentally
or maliciously.
Availability
Availability is the protection of a system’s ability to make software systems and data fully available when a user
needs it (or at a specified time). The purpose of availability is to make the technology infrastructure, the applications
and the data available when they are needed for an organizational process or for an organization’s customers.
Cybersecurity primarily addresses technology-related threats, with practices and tools that can prevent or mitigate them.
Another related category is data security, which focuses on protecting an organization’s data from accidental or
malicious exposure to unauthorized parties.
Creating an effective security policy and taking steps to ensure compliance is an important step towards preventing and
mitigating security threats. To make your policy truly effective, update it frequently based on company changes, new
threats, conclusions drawn from previous breaches, and changes to security systems and tools.
Make your information security strategy practical and reasonable. To meet the needs and urgency of different
departments within the organization, it is necessary to deploy a system of exceptions, with an approval process, enabling
departments or individuals to deviate from the rules in specific circumstances.
DIGITAL REGENESYS: CYBER SECURITY MODULE 07
Social Engineering
Social engineering involves attackers sending emails and messages that trick users into performing actions that may
compromise their security or divulge private information. Attackers manipulate users using psychological triggers
like curiosity, urgency or fear.
Because the source of a social engineering message appears to be trusted, people are more likely to comply, for
example by clicking a link that installs malware on their device, or by providing personal information, credentials,
or financial details.
Organizations can mitigate social engineering by making users aware of its dangers and training them to identify
and avoid suspected social engineering messages. In addition, technological systems can be used to block social
engineering at its source, or prevent users from performing dangerous actions such as clicking on unknown links or
downloading unknown attachments.
Malware on Endpoints
Organizational users work with a large variety of endpoint devices, including desktop computers, laptops, tablets,
and mobile phones, many of which are privately owned and not under the organization’s control, and all of which
connect regularly to the Internet.
A primary threat on all these endpoints is malware, which can be transmitted by a variety of means, can result in
compromise of the endpoint itself, and can also lead to privilege escalation to other organizational systems.
Traditional antivirus software is insufficient to block all modern forms of malware, and more advanced approaches
are developing to securing endpoints, such as endpoint detection and response (EDR).
Lack of Encryption
Encryption processes encode data so that it can only be decoded by users with secret keys. It is very effective
in preventing data loss or corruption in case of equipment loss or theft, or in case organizational systems are
compromised by attackers.
Unfortunately, this measure is often overlooked due to its complexity and lack of legal obligations associated with
proper implementation. Organizations are increasingly adopting encryption, by purchasing storage devices or using
cloud services that support encryption, or using dedicated security tools.
DIGITAL REGENESYS: CYBER SECURITY MODULE 07
Security Misconfiguration
Modern organizations use a huge number of technological platforms and tools, in particular web applications,
databases, and Software as a Service (SaaS) applications, or Infrastructure as a Service (IaaS) from providers like
Amazon Web Services.
Enterprise grade platforms and cloud services have security features, but these must be configured by the
organization. Security misconfiguration due to negligence or human error can result in a security breach. Another
problem is “configuration drift”, where correct security configuration can quickly become out of date and make a
system vulnerable, unbeknownst to IT or security staff.
Organizations can mitigate security misconfiguration using technological platforms that continuously monitor
systems, identify configuration gaps, and alert or even automatically remediate configuration issues that make
systems vulnerable.
Active Attack:
An active attack involves intercepting a communication or message and altering it for malicious effect. There are three
common variants of an active attacks:
Interruption—the attacker interrupts the original communication and creates new, malicious messages,
pretending to be one of the communicating parties.
Modification—the attacker uses existing communications, and either replays them to fool one of the
communicating parties, or modifies them to gain an advantage.
Fabrication—creates fake, or synthetic, communications, typically with the aim of achieving denial of
service (DoS). This prevents users from accessing systems or performing normal operations.
Passive Attack:
In a passive attack, an attacker monitors, monitors a system and illicitly copies information without altering it. They
then use this information to disrupt networks or compromise target systems.
The attackers do not make any change to the communication or the target systems. This makes it more difficult to
detect. However, encryption can help prevent passive attacks because it obfuscates the data, making it more difficult
for attackers to make use of it.
Types of information security controls include security policies, procedures, plans, devices and software intended to
strengthen cybersecurity. There are three categories of information security controls:
Preventive security controls, designed to prevent cyber security incidents
Detective security controls, aimed at detecting a cyber security breach attempt (“event”) or successful breach
(“incident”) while it is in progress, and alerting cyber security personnel
Corrective security controls, used after a cyber-security incident to help minimize data loss and damage to the
system or network, and restore critical business systems and processes as quickly as possible (“resilience”)
2. Detective controls
Detective controls act as guardians, alerting you to potential breach attempts and ongoing data breaches. These
controls serve as early-warning systems, equipping your cybersecurity staff with timely information to take
immediate action. By detecting and responding to threats swiftly, you can limit the extent of the damage and
protect your valuable assets.
3. Corrective controls
Corrective controls enter the picture after an incident has happened. They exist to minimize damage, facilitate
recovery, and repair weaknesses so a similar attack doesn’t happen again. For example, robust backup mechanisms
are a corrective control because they let you restore compromised data. By employing effective backups, you can
mitigate data loss and expedite the restoration of your systems, reducing downtime and restoring normal operations
promptly.
For the sake of easy implementation, information security controls can also be classified into several types of data
protection:
Physical access controls. These controls include restrictions on physical access, (such as security guards at
building entrances), locks, closed-circuit security cameras, and perimeter fences.
Cyber access controls. These are cybersecurity controls and policies such as up-to-date firewalls, password
policies, and software applications that alert you to risks such as ransomware attacks and phishing.
Procedural controls. These controls include security awareness education, security framework compliance
training, incident response plans, and other procedures to enhance network security.
Technical controls. Increasingly common are controls such as multi-factor user authentication at login, to
assure internal control access on a need-to-know basis.
DIGITAL REGENESYS: CYBER SECURITY MODULE 07
Compliance controls. This means adherence to privacy laws, cybersecurity frameworks, and standards designed
to minimize security risks. These controls typically require an information security risk assessment and impose
information security requirements.
2. Deny/prevent Access
Establish strict access permissions and robust authentication mechanisms such as multi-factor authentication and
strong passwords to prevent unauthorized entry.
3. Detect
Deploy detection mechanisms such as endpoint protection software, intrusion detection systems, and network
monitoring tools to identify potential risks and threats swiftly. Log detections for analysis and understanding.
4. Delay
Introduce measures that slow down risks or attacks, such as implementing “too many attempts” functionality for
password entries, increasing complexity, and reducing success rates.
5. Correct
Have a well-defined incident response plan to respond promptly to security breaches. Isolate affected systems,
collect evidence, and take appropriate remedial actions to mitigate the impact.
6. Recover
Establish robust backup and recovery procedures to restore systems quickly to a secure and operational state.
Regularly backup critical data, test restoration processes, and maintain backup generators for essential
infrastructure.
With that in mind, it’s a good idea to review your remote IT infrastructure, as well as the use of mobile devices and
cloud-based web applications. For example, be sure to include your remote work IT environment when conducting
vulnerability scans on your IT systems and software configurations. (It’s easy to “forget” hardware that’s not right there
on campus, after all.)
Speaking of employees and emerging risks, also remember this: As your business grows and your IT structure becomes
more sophisticated, train employees to stay current with your organizations risk profile. Do so by conducting periodic
security awareness training for everyone and scheduling regular inspections of whether your established security
controls have kept up with the threat landscape.
DIGITAL REGENESYS: CYBER SECURITY MODULE 07
PENETRATION TESTING:
(Source: https://www.synopsys.com)
A penetration test (pen test) is an authorized simulated attack performed on a computer system to evaluate its security.
Penetration testers use the same tools, techniques, and processes as attackers to find and demonstrate the business
impacts of weaknesses in a system. Penetration tests usually simulate a variety of attacks that could threaten a business.
They can examine whether a system is robust enough to withstand attacks from authenticated and unauthenticated
positions, as well as a range of system roles. With the right scope, a pen test can dive into any aspect of a system.
Pen testing can involve the attempted breaching of any number of application systems, (e.g., application protocol
interfaces (APIs), frontend/backend servers) to uncover vulnerabilities, such as unsanitized inputs that are susceptible
to code injection attacks.
Insights provided by the penetration test can be used to fine-tune your WAF security policies and patch detected
vulnerabilities.
DIGITAL REGENESYS: CYBER SECURITY MODULE 07
2. Scanning:
The next step is to understand how the target application will respond to various intrusion attempts. This is
typically done using:
Static analysis – Inspecting an application’s code to estimate the way it behaves while running. These tools
can scan the entirety of the code in a single pass.
Dynamic analysis – Inspecting an application’s code in a running state. This is a more practical way of
scanning, as it provides a real-time view into an application’s performance.
3. Gaining Access:
This stage uses web application attacks, such as cross-site scripting, SQL injection and backdoors, to uncover a
target’s vulnerabilities. Testers then try and exploit these vulnerabilities, typically by escalating privileges,
stealing data, intercepting traffic, etc., to understand the damage they can cause.
4. Maintaining Access:
The goal of this stage is to see if the vulnerability can be used to achieve a persistent presence in the exploited
system— long enough for a bad actor to gain in-depth access. The idea is to imitate advanced persistent threats,
which often remain in a system for months in order to steal an organization’s most sensitive data.
5. Analysis
The results of the penetration test are then compiled into a report detailing:
Specific vulnerabilities that were exploited
Sensitive data that was accessed
The amount of time the pen tester was able to remain in the system undetected
This information is analyzed by security personnel to help configure an enterprise’s WAF settings and other
application security solutions to patch vulnerabilities and protect against future attacks.
2. Internal Testing:
In an internal test, a tester with access to an application behind its firewall simulates an attack by a malicious
insider. This isn’t necessarily simulating a rogue employee. A common starting scenario can be an employee
whose credentials were stolen due to a phishing attack.
DIGITAL REGENESYS: CYBER SECURITY MODULE 07
3. Blind Testing:
In a blind test, a tester is only given the name of the enterprise that’s being targeted. This gives security personnel
a real-time look into how an actual application assault would take place.
4. Double-blind Testing:
In a double blind test, security personnel have no prior knowledge of the simulated attack. As in the real world,
they won’t have any time to shore up their defenses before an attempted breach.
5. Targeted Testing:
In this scenario, both the tester and security personnel work together and keep each other appraised of their
movements. This is a valuable training exercise that provides a security team with real-time feedback from a
hacker’s point of view.
gain access to the system, whether through a weakness such as SQL injection or through malware, social
engineering, or something else.
Maintaining access. Once pen testers gain access to the target, their simulated attack must stay connected long
enough to accomplish their goals of exfiltrating data, modifying it, or abusing functionality. It’s about demonstrating
the potential impact.
Automated testing
Automated testing generates results faster and needs fewer specialized professionals than a fully manual pen testing
process. Automated testing tools track results automatically and can sometimes export them to a centralized
reporting platform. Also, the results of manual pen tests can vary from test to test, whereas running automated
testing repeatedly on the same system will produce the same results.
With the frequency and severity of security breaches increasing year after year, organizations have never had a greater
need for visibility into how they can withstand attacks. Regulations such as PCI DSS and HIPAA mandate periodic pen
testing to remain current with their requirements. With these pressures in mind, here are some pros and cons for this
type of defect discovery technique.
TYPES OF FOOTPRINTING:
(Source: https://www.itperfection.com)
There are two types of footprinting that can be used:
Active: This type is the process of using tools and techniques, such as performing a ping sweep or using the
traceroute command, to gather information on a target.
Passive: This type is the process of gathering information on a target by innocuous, or, passive, means.
Active Footprinting can trigger a target’s Intrusion Detection System (IDS) and may be logged but passive Footprinting
is the stealthier method since it will not trigger a target’s IDS or otherwise alert the target of information being gathered.
Google Hacking:
(Source: https://www.itperfection.com)
Footprinting using advanced Google hacking techniques gather information by locating strings of text within search
results. In order to confine a search, Google offers advanced search operators. These search operators help to narrow
down the search query and get the most relevant and accurate output.
Hackers can create complex search engine queries in order to filter large amounts of search results to obtain information
related to computer security. Hackers locate specific strings of text within the search results to detect websites and web
servers that are vulnerable to exploitation, as well as locate private, sensitive information about others. Once a vulnerable
site is identified, attackers try to launch various possible attacks such as SQL injection or buffer overflows that
compromise information security.
We know in footpring process, Information such as ip address, Whois records, DNS information, an operating system
used, employee email id, Phone numbers etc is collected. So, footprinting helps us to
Know Security Posture: The data gathered will help us to get an overview of the security posture of the company
such as details about the presence of a firewall, security configurations of applications etc.
Reduce Attack Area: Can identify a specific range of systems and concentrate on particular targets only.
Identify vulnerabilities: we can build an information database containing the vulnerabilities, threats, loopholes
available in the system of the target organization.
Draw Network map: helps to draw a network map of the networks in the target organization covering topology,
trusted routers, presence of server and other information.