Introduction Ethical Hacking - 01
Introduction Ethical Hacking - 01
hacking
Module 01
• Sun Tzu states in the Art of War, “If you know yourself but not the enemy, for
every victory gained, you will also suffer a defeat.”
• System administrators and security professionals must guard their
infrastructure against exploits by knowing the enemy—the malicious
hacker(s)—who seeks to use the same infrastructure for illegal
activities.
Information Security
• Information Security refers to the protection or safeguarding of
information systems that use store and transmit information from
unauthorized access disclosure alteration and destruction.
• Information is a critical asset that must be secured.
• Information security is the state of the well being of information and
infrastructure in which the possibility of theft tampering or disruption
of information services is kept loe
Elements of Information security
• Five Major Elements
• Confidentiality
• Integrity
• Availability
• Authenticity
• Non-repudiation
• Confidentiality is the assurance that the information is accessible only to
Confidentiality authorized. Confidentiality breaches may occur due to improper data handling
or a hacking attempt. Confidentiality controls include data classification, data
encryption, and proper disposal of equipment (such as DVDs, USB drives, and
Blu-ray discs).
Integrity
unauthorized changes—the assurance that information is sufficiently accurate for its
purpose. Measures to maintain data integrity may include a checksum (a number
produced by a mathematical function to verify that a given block of data is not
changed) and access control (which ensures that only authorized people can update,
add, or delete data).
• Availability is the assurance that the systems responsible for delivering, storing,
Availability and processing information are accessible when required by authorized users.
Measures to maintain data availability can include disk arrays for redundant
systems and clustered machines, antivirus software to combat malware, and
distributed denial-of-service (DDoS) prevention systems.
Non-Repudiation later deny having sent the message and that the recipient cannot deny having
received the message. Individuals and organizations use digital signatures to
ensure non-repudiation.
Motives, Goals and objectives of Information
Security attacks
• Attackers generally have motives (goals), and objectives behind their
information security attacks.
• A motive originates out of the notion that a target system stores or
processes something valuable, which leads to the threat of an attack
on the system.
• The purpose of the attack may be to disrupt the target organization’s
business operations, to steal valuable information for the sake of
curiosity, or even to exact revenge.
• Attacks = Motive (Goal) + Method + Vulnerability
Motives behind information security attacks
• Disrupt business continuity
• Perform information theft
• Manipulating data
• Create fear and chaos by disrupting critical infrastructures
• Bring financial loss to the target
Classification of Attacks
• Passive Attacks
• Passive attacks involve intercepting and monitoring network traffic and data
flow on the target network and do not tamper with the data.
• These attacks are very difficult to detect as the attacker has no active interaction
with the target system or network.
• Examples of passive attacks: Foot printing ,Sniffing and eavesdropping
• Active Attacks
• Active attacks tamper with the data in transit or disrupt communication or
services between the systems to bypass or break into secured systems.
• Attackers launch attacks on the target system or network by sending traffic
actively that can be detected
• Examples of Active Attacks: Denial of Service Attacks, spoofing attacks, replay
attacks
Classification of Attacks
• Close-in Attacks
• Close-in attacks are performed when the attacker is in close physical proximity with the target
system or network.
• The main goal of performing this type of attack is to gather or modify information or disrupt its
access.
• For example, an attacker might shoulder surf user credentials. Attackers gain close proximity
through surreptitious entry, open access, or both.
• Examples of close-in attacks: oSocial engineering (Eavesdropping, shoulder surfing, dumpster
diving, and other methods)
• Insider Attacks
• Insider attacks are performed by trusted persons who have physical access to the critical assets of
the target.
• An insider attack involves using privileged access to violate rules or intentionally cause a threat to
the organization’s information or information systems.
• Examples: eavesdropping and wiretapping, Planting keyloggers
Classification of Attacks
• Distribution Attacks
• Distribution attacks occur when attackers tamper with hardware or software
prior to installation.
• Attackers tamper the hardware or software at its source or when it is in
transit.
• Examples of distribution attacks include backdoors created by software or
hardware vendors at the time of manufacture.
Cyber Kill chain
• CyberKillchain is an efficient and effective way of illustrating how an
adversary can attack the target organization.
• This Model helps organizations understand the various possible
threats at every stage of an attack and develop the necessary
countermeasures to defend against such attacks.
Cyber Kill chain Methodology
What is Hacking?
• Hacking in the field of computer security refers to exploiting system
vulnerabilities and compromising security controls to gain unauthorized
or inappropriate access to system resources.
• It involves a modifying system or application features to achieve a goal
outside its creator’s original purpose.
• Hacking can be done to steal, pilfer, or redistribute intellectual property,
thus leading to business loss.
• The motive behind hacking could be to steal critical information or
services, for thrill, intellectual challenge, curiosity, experiment,
knowledge, financial gain, prestige, power, peer recognition, vengeance
and vindictiveness, among other reasons.
Who is a Hacker?
• A hacker is a person who breaks into a system or network without
authorization to destroy, steal sensitive data, or perform malicious
attacks. A hacker is an intelligent individual with excellent computer
skills, along with the ability to create and explore the computer’s
software and hardware.
Hacker Types