Cours Ceh
Cours Ceh
Engineering
Chap04: System Pentesting: Password Cracking, Escalating Privileges, and Hiding Files
1 OBJECTIVES COVERED IN T H I S C H AP
01 Understand
Pentesting
06 What is
hacktivism?
terminology
11
In reality, a good hacker, or
Most people think hackers security professional acting
have extraordinary skill as an ethical hacker, just has
and knowledge that allow to understand how a
them to hack into computer system works and
computer systems and find know what tools to employ in
valuable information. order to find a security
weakness
This course will teach you the same techniques and software tools that
many hackers use to gather valuable data and attack computer systems
Any computer
Gaining the trust of the professional can learn
client and taking all the skills of Pentesting.
precautions to do no harm
to their systems
Chap
Chap
Defining Pentesting
03
- Work offensively or defensively.
Interested in Pentesting tools and technologies and are not
malicious black hats.
self-proclaimed ethical hackers,
Interested in hacker tools mostly from a curiosity
standpoint
Chap
Chap
What Do Ethical Hackers Do?
11 Ethical hackers are motivated by different reasons, but their purpose is usually the
same as that of crackers: they’re trying to determine what an intruder can see on
a targeted network or system, and what the hacker can do with that information.
This process of testing the security of a system or network is known as a
penetration test, or pen test.
CONFIDENTIALITY
AUTHENTICITY
INTEGRITY
AVAILABILITY
Chap
Chap
Ethical Hacker’s Skill Set
11 Ethical hackers who stay a step ahead of malicious hackers must be computer
systems experts who are very knowledgeable about :
11 01
Threat
Situation that could lead to a
potential breach of security.
Ethical hackers look for and
04 Attack
An attack occurs
when a system is
prioritize threats when compromised based
performing a security analysis. on a vulnerability.
Many attacks are
perpetuated via an
0 0 exploit.
02 Vulnerability
logic design, or 1 2
implementation
error that can lead
to an unexpected
0 0 05 Risk
The probability of a
threat exploiting a
instructions to the
system. Exploit
6 3 vulnerability.
code is written to
target a 0 0
vulnerability and
cause a fault in the 5 4 ToE
system in order to
retrieve
data
valuable
06 Target(of Evaluation)
A system, program, or
network that is the
Exploit A piece of software leading to subject of a security
unauthorized access, privilege escalation, or analysis or attack
11
05
04 Covering
Tracks
03 Maintaining
Access
02 Gaining
Access
01 Scanning
&
Reconnaissance
Enumeration
Introduction t o “ Pentesting”
Chap
Chap
Phases
Active Passive
11 1
Port scanning
This phase involves scanning the target for
the information like open ports, Live
systems, various services running on the
host
Vulnerability Scanning
02 1
Checking the target for weaknesses or
vulnerabilities which can be exploited.
Scanning
& Usually done with help of automated tools
Enumeration
Network Mapping
Finding the topology of network, routers,
1 firewalls servers if any, and host
information and drawing a network
diagram with the available information.
This map may serve as a valuable piece of
information throughout the haking process.
Introduction t o “ Pentesting”
Chap
Chap
Phases
11 Hacker designs the blueprint of the network of the target with the
help of data collected during Phase 1 and Phase 2.
03 The hacker decides to play it safe and use a simple phishing attack to gain
access. The hacker decides to infiltrate from the IT department. They see
Gaining that there have been some recent hires and they are likely not up to speed on
Access the procedures yet. A phishing email will be sent using the CTO’s actual
email address using a program and sent out to the techs. The email contains
a phishing website that will collect their login and passwords. Using any
number of options (phone app, website email spoofing, Zmail, etc) the
hacker sends a email asking the users to login to a new Google portal with
their credentials. They already have the Social Engineering Toolkit running
and have sent an email with the server address to the users masking it with a
bitly or tinyurl.
Maintaining
Access Rootkits provide the greatest means when it
comes to maintaining access. Uniquely crafted
rootkits that have been developed and installed on
the infected host will provide the hacker with the
best opportunity to achieving their goal.
Statistically, rootkits have proven to be the most
successful malware tool to use when it comes to
Advanced Persistent Threats (APT) and
maintaining access to a system.
Introduction t o “ Pentesting”
Chap
Chap
Phases
11 Many methods and tools exist for locating vulnerabilities, running exploits, and
com-promising systems.
Trojans, backdoors, and rootkits are all forms of malicious software, or malware.
Malware is installed on a hacked system after a vulnerability has been exploited.
11
In an ideal world, security professionals would like to have the highest level of
security on all systems; however, sometimes this isn’t possible. Too many security
barriers make it difficult for users to use the system and impede the system’s
functionality.
Introduction t o “ Pentesting”
Chap
Chap
Responsibilities of cyber security experts
11 Security Administrator
Installs and manages organization-wide
security systems. May also take on some of
the tasks of a security analyst in smaller
organizations.
Cryptanalyst
Breaks the code/cipher or to
Security Software determine the purpose of malicious
software.
Developer
Develops security software,
including tools for monitoring, Cryptographer
traffic analysis, intrusion Works as researcher to develop
detection, stronger encryption algorithms.
virus/spyware/malware
detection, anti-virus software,
and so on
Security
Engineer
CISO Investigates and
utilizes new
Computer Security Chief technologies and
Information processes to enhance
Incident Responder Security Officer
Mounts rapid response to security capabilities
security threats and attacks and implement
such as viruses and denial-of- improvements.
service attacks.
Security Analyst
Penetration Tester Analyzes and assesses vulnerabilities in
Exploits vulnerabilities to provide hard the infrastructure (software, hardware,
evidence that they are vulnerabilities. networks), investigates available tools and
countermeasures to remedy
Introduction t o “ Pentesting”
Chap
Chap
Performing a Penetration Test
11 Many ethical hackers acting in the role of security professionals use their skills to perform
security evaluations or penetration tests. These tests and evaluations have three phases,
generally ordered as follows:
Conduct Security
Preparation Conclusion
Evaluation
A. Testing type
B. Vulnerabilities discovered
C. Suggested countermeasures
D. Router configuration information