Unit 3 Ethical Hacking
Unit 3 Ethical Hacking
2. Vulnerability in detail
A vulnerability in the context of cybersecurity refers to a flaw or weakness in a system,
network, application, or software that could be exploited by an attacker to compromise its
confidentiality, integrity, or availability. These weaknesses can arise due to various
reasons such as design flaws, improper configurations, coding errors, or the absence of
necessary security measures. Understanding vulnerabilities in detail helps in their
identification, mitigation, and prevention.
Types of Vulnerabilities:
Software Vulnerabilities: These occur due to bugs, poor coding practices, or
misconfigurations in software. Common examples include:
a. Buffer Overflows: When more data is written to a buffer (temporary storage)
than it can handle, causing data corruption or enabling code execution.
b. SQL Injection: A web security vulnerability where an attacker manipulates a SQL
query to gain unauthorized access to the database.
c. Cross-Site Scripting (XSS): A vulnerability where an attacker injects malicious
scripts into web pages, executed by other users.
d. Insecure Deserialization: Occurs when untrusted data is used to reconstruct
objects, leading to code execution or attacks.
Network Vulnerabilities: These are weaknesses in a network's design, configuration, or
hardware. Examples include:
a. Open Ports: Unprotected open ports on a network can be exploited by attackers
to access services or sensitive data.
b. Man-in-the-Middle Attacks (MITM): When an attacker intercepts and possibly
alters communication between two parties.
c. Unencrypted Communication: Lack of encryption can expose sensitive data
during transmission.
Configuration Vulnerabilities: Misconfigured systems, networks, or applications that
allow unauthorized access. Examples include:
a. Default Credentials: Using default usernames and passwords (e.g., "admin" and
"password") leaves systems vulnerable to attacks.
b. Exposed APIs: Poorly secured APIs may leak data or allow unauthorized control.
c. Human-Induced Vulnerabilities: Human errors, such as weak passwords,
failing to apply security patches, or improper system administration, often lead to
exploitable vulnerabilities.
3. Ethical hacking
Ethical hacking, also known as white-hat hacking or penetration testing, involves
legally probing systems, networks, or applications for security vulnerabilities. The goal of
ethical hacking is to discover and fix security flaws before malicious hackers (black-hat
hackers) can exploit them. Ethical hackers work with the permission of the system owner
and adhere to professional standards and legal regulations.
Types of Hackers:
White-Hat Hackers (Ethical Hackers): These individuals use their skills to find and
fix security vulnerabilities with the system owner’s consent.
Black-Hat Hackers (Malicious Hackers): These hackers exploit vulnerabilities for
illegal or unethical purposes, such as theft or disruption.
Gray-Hat Hackers: These hackers fall between white and black hats. They may
explore systems without permission but do not intend to cause harm, and may later
inform the organization of their findings.
Common Tools Used in Ethical Hacking:
Nmap: A powerful tool for network scanning and mapping open ports and services.
Wireshark: A network protocol analyzer used for monitoring network traffic and
diagnosing issues.
Metasploit: A popular penetration testing framework that provides various tools for
discovering vulnerabilities, developing exploits, and executing attacks.
Burp Suite: A tool for web application security testing, commonly used for finding
vulnerabilities like SQL injection and XSS.
Aircrack-ng: A suite of tools used for wireless network security auditing and cracking
Wi-Fi passwords.
7. Netbrute scanner
NetBrute Scanner is a network-based vulnerability scanning tool that specializes in
identifying security weaknesses by performing brute-force attacks on services like SSH,
FTP, Telnet, and others. It is designed to test the strength of credentials and identify
network misconfigurations that could expose sensitive resources to attackers.
Key Features of NetBrute Scanner:
1. Brute-Force Attack Testing: NetBrute Scanner performs brute-force attacks on
various services to test the strength of user passwords and authentication
mechanisms.
2. Protocol Scanning: It scans network protocols such as SSH, FTP, HTTP, Telnet,
and others to identify open ports and weak security configurations.
3. Password Guessing: It systematically attempts different combinations of
usernames and passwords (from a predefined list or dictionary) to gain
unauthorized access to systems.
4. Multithreading: Supports multiple simultaneous connections to speed up the
scanning and brute-force processes.
Advantages of OpenVAS:
Disadvantages of OpenVAS: