Eh - Unit 4
Eh - Unit 4
G
Tracks
System Hacking
🔹 What is System Hacking?
● S
ystem hacking refers to hacking various software-based technological systems like
desktops, laptops, etc.
● I t means compromising computer systems and software to gain access to the target
system.
● The goal is tosteal or misuse sensitive informationwithout the user’s consent.
● H
ackers exploitweaknesses in computer systems ornetworksto gain
unauthorized access.
○ Systems
○ Networking
🔹 Who is at Risk?
● Anyone using a computer connected to the internetis vulnerable.
1. Viruses
2. Trojans
3. Malware
4. Worms
🔹 What is Linux?
● Linux is one of the most secure OS, but in hacking,nothing is 100% secure.
🔹 Login Security:
● I t’s good practice to keep astrong password (8+ characters)to secure files and
folders.
○ Usesocial engineeringto get access when the userleaves the system open.
● M
etasploitis one of the most powerful tools used inethical hacking and
penetration testing.
C
○ ommercial version(paid)
○ Community version(free)
🔹 What is Kali Linux?
2. 1 GB RAM
● G
o to:
Applications → Exploitation Tools → Metasploit
● After opening, a screen will appear showing the version info inred underlined text.
🔹 Scenario:
ss
c
CopyEdit
mfs> use [exploit path]
1.
gsql
p
CopyEdit
mfs> show options
2.
s hell
CopyEdit
mfs> set RHOST 192.168.1.101
mfs> set RPORT 21
3.
rduino
a
CopyEdit
mfs> run
.
4
5. If successful, you will get anactive sessionto interact with the target system.
Buffer Overflows
● It happens whentoo much data is sentto a field (variable)in an application.
🔹 How it works:
○ Oropen a command prompt, allowing the attacker torun other commands.
● The command prompt gained through buffer overflow is agatewayfor hackers to:
🔐 Privilege Escalation
🔹 What is Privilege Escalation?
🔹 Why is it needed?
● I f the hacker can’t get direct Admin access, they’ll try toescalate privilegesfrom a
lower-level account.
3. O
nce admin access is gained, hackers canrun powerfulprograms or exploit
further.
● Hk.exe:
Application Hacking
1. SMTP / Email-based Attacks
MTP (Simple Mail Transfer Protocol) is used to send emails. Hackers exploit vulnerabilities
S
in email systems to:
● Spoof Email Addresses: Sending emails that appear to be from trusted sources.
● P
hishing: Tricking users into clicking malicious links or sharing sensitive
information.
● O
pen Relay Abuse: Misconfigured SMTP servers usedto send spam emails
anonymously.
OIP (Voice Over IP) enables voice communication over the internet. It can be targeted in
V
the following ways:
● Denial of Service (DoS): Overloading the VOIP serverto disrupt service.
This attack allows hackers to access files and directories outside the web root folder.
http://example.com/view?file=../../etc/passwd
○ Example:
● Types:
This involves trying all possible combinations of usernames and passwords to gain access.
● Types:
○ Online Brute Force: Direct login attempts.
' OR '1'='1
○ Example:
● C
onsequences: Unauthorized access to database, dataleakage, or data
manipulation.
XSS involves injecting malicious scripts into webpages viewed by other users.
● Types:
○ Stored XSS: Script stored on the server and servedto users.
Mobile apps are often targets for hackers due to insecure development practices.
Malware Analysis
● D
efinition: Malware analysis is the process of understanding how malware works
and what impact it might have on the system.
● P
urpose: To identify malware's functionalities andpredict the potential outcome of
an infection.
○ Worms
○ Viruses
○ Spyware
● K
ey Point: Malware collects data from an infected devicewithout the user’s
knowledge or consent.
Netcat Trojan
○ A
Trojan that uses a command-line interface to openTCP or UDP portson a
target system.
● Function:
● Availability:
○ O
riginally developed for Unix and included in many Linux distributions like
BackTrack.
Wrappers
● D
efinition: Wrappers are software packages used todeliver a Trojanby binding it
to a legitimate file.
● Functionality:
2. Both get installed when the user runs the program.
2. These distract users while the Trojan installs silently in the background.
● Examples:
1. Graffiti: An animated game that entertains the user while the Trojan installs.
2. Silk Rope 2000: Wraps the Back Orifice server withanother app.
3. ELITeWrap:
■ C
an create setup programs that extract files, run programs or batch
files, display help, or copy files to target systems.
Reverse Engineering
Definition:
● T
he process ofdisassemblingsomething to understandhow it works, either to
duplicateorenhanceit.
● Purpose:
● How:
● Example:
○ A
processor manufacturer buys a competitor’s processor, studies it, and
creates a similar one (illegal in many countries).
● Challenges:
Forward Engineering:
● T
he opposite of reverse engineering — building something from scratch using
original specifications.
✅ Definition
● Once a hacker gainsAdministrator access, they attempt tocover their tracksto:
🛑 Disabling Auditing
● Windows usesauditingto log events like:
○ Logins
● Hackers disable this to stop new logs from being generated.
● Steps:
● Why?
○ Prevents future actions from being recorded.
🔸 What is it?
○ Images
○ Audio
○ Text
🔸 Examples:
○ Hides large text in image files without increasing file size.
● Blindside:
○ Command-line tool for hiding data inBMP images.
● MP3Stego:
🔸 Detection Tools:
● Stegdetect:
● Dskprobe:
🔸 Why is it done?
🔸 Suspicious Indicators:
🔸 Tools Used:
● elsave.exe:
● WinZapper:
● T
hese systemsinspect trafficandlook for known attack patternsorunusual
behavior signatures.
● T
hecommand center systemnotifies the administrator(via email, pager, or phone)
when a suspicious event is detected from the security event list.
🔄 Types of IDS
● Examples:
● Limitation:
○ Malware
● Passive system: Detects and logs security breaches, sends alerts to the console.
🧬 Signature-Based Detection
● Compares traffic withknown attack signatures/patterns.
Technique Description
rotocol
P sing a different protocol (e.g., UDP instead of TCP) to avoid
U
Substitution signature matches.
Session Splicing plitting attack into multiple packets to bypass IDS, but
S
reassembled at destination to perform the attack.
ession
S aking over a client's session by desynchronizing the IDS’s ability
T
Hijacking to track traffic.
● Best placement:In front of the firewall in DMZ, appearinglike a real server.
✅ Best Practices
● C
ryptographic functions should be implemented on atrusted system(e.g., the
server).