ETI U-V Notes
ETI U-V Notes
Content:
5.1 Ethical Hacking How Hackers Beget Ethical Hackers Defining hacker, Malicious users
5.2 Understanding the need to hack your own systems
5.3 Understanding the dangers your systems face Nontechnical attacks Network-infrastructure attacks
Operating-system attacks Application and other specialized attacks
5.4 Obeying the Ethical hacking Principles Working ethically Respecting privacy Not crashing your systems
5.5 The Ethical hacking Process Formulating your plan Selecting tools Executing the plan Evaluating
results Moving on
5.6 Cracking the Hacker Mind-set What You’re Up Against? Who breaks in to computer systems? Why
they do it? Planning and Performing Attacks Maintaining Anonymity
Gather Information: This is the first stage, the learns as much as he can about the intended
victim. The information is gathered from company websites, other publications and
sometimes by talking to the users of the target system.
Plan Attack: The attackers outline how he/she intends to execute the attack
Acquire Tools: These include computer programs that an attacker will use when launching
the attack.
Attack: Exploit the weaknesses in the target system.
Use acquired knowledge: Information gathered during the social engineering tactics such
as pet names, birthdates of the organization founders, etc. is used in attacks such as
password guessing.
Computer Hacking
Computer Hackers have been in existence for more than a century. Originally, "hacker" did not
carry the negative implications. In the late 1950s and early 1960s, computers were much
different than the desktop or laptop systems most people are familiar with. In those days, most
companies and universities used mainframe computers: giant, slow-moving hunks of metal
locked away in temperature-controlled glass cages. It cost thousands of dollars to maintain and
operate those machines, and programmers had to fight for access time. Because of the time and
https://www.gunwantmankar.com 1
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
money involved, computer programmers began looking for ways to get the most out of the
machines. The best and brightest of those programmers created what they called "hacks" -
shortcuts that would modify and improve the performance of a computer's operating system or
applications and allow more tasks to be completed in a shorter time. Still, for all the negative
things hackers have done, they provide a necessary (and even valuable) service, which is
elaborated on after a brief timeline in the history of computer hacking.
What is Hacking?
Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to
gain access.
Example of Hacking: Computers have become mandatory to run a successful businesses. It is
not enough to have isolated computers systems; they need to be networked to facilitate
communication with external businesses.
Using password cracking algorithm to gain access to a system.
This exposes them to the outside world and hacking. Hacking means using computers
to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal
data, etc.
Cybercrimes cost many organizations millions of dollars every year. Businesses need
to protect themselves against such attacks.
https://www.gunwantmankar.com 2
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
Ethical Hacking is identifying weakness in computer systems and/or computer networks and
coming up with countermeasures that protect the weaknesses. Ethical hacking is a branch of
information security or information assurance which tests an organization's information
systems against a variety of attacks. Ethical hackers are also sometimes known as White Hats.
Many people are confused when the terms "Ethical" and "Hacking" are used together.
Usually the term "hacker" has a negative connotation due to media reports using incorrect
terminology.
https://www.gunwantmankar.com 3
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
Malicious attackers are, generally known as both, hackers and malicious users.
Malicious user means a rogue employee, contractor, intern, or other user who abuses
his or her trusted privileges .It is a common term in security circles.
https://www.gunwantmankar.com 4
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
https://www.gunwantmankar.com 5
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
how vulnerable the systems are. Hacking targets on weak security practices and undisclosed
vulnerabilities. Firewalls, encryption, and virtual private networks (VPNs) can create a false
feeling of safety. These security systems often focus on high-level vulnerabilities, such as
viruses and traffic through a firewall, without affecting how hackers work. Attacking your own
systems to discover vulnerabilities is a step to making them more secure. This is the only
proven method of greatly hardening your systems from attack. If weaknesses are not identified,
it’s a matter of time before the vulnerabilities are exploited.
https://www.gunwantmankar.com 6
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
Nontechnical attacks
Exploits that involve manipulating people or end users and even yourself are the greatest
vulnerability within any computer or network infrastructure. Humans are trusting by nature,
which can lead to social-engineering exploits. Social engineering is defined as the exploitation
of the trusting nature of human beings to gain information for malicious purposes.
Other common and effective attacks against information systems are physical. Hackers
break into buildings, computer rooms, or other areas containing critical information or
property. Physical attacks can include dumpster diving (searching through trash cans and
dumpsters for intellectual property, passwords, network diagrams, and other information).
Network-infrastructure attacks
Hacker attacks against network infrastructures can be easy, because many networks can be
reached from anywhere in the world via the Internet. Here are some examples of network-
infrastructure attacks:
Connecting into a network through a rogue modem attached to a computer behind a
firewall
Exploiting weaknesses in network transport mechanisms, such as TCP/IP and
NetBIOS.
Flooding a network with too many requests, creating a Denial of Service (DoS) for
legitimate requests Installing a network analyzer on a network and capturing every
packet that travels across it, revealing confidential information in clear text
Piggybacking onto a network through an insecure wireless configuration.
https://www.gunwantmankar.com 7
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
Working ethically
The word ethical in this context can be defined as working with high professional morals and
principles. While performing ethical hacking tests against own systems or for someone who
has hired for, everything one need to do as an ethical hacker must be above board and must
support the company’s goals. No hidden agendas are allowed. Trustworthiness is the ultimate
principle. The misuse of information is absolutely forbidden. That’s what the bad guys or
hackers do.
Respecting privacy
Treat the information gathered with the greatest respect. All information obtained during
testing from Web-application log files to clear-text passwords must be kept private. This
information shall not be used to watch into confidential corporate information or private lives.
If you sense or feel that someone should know there’s a problem, consider sharing that
https://www.gunwantmankar.com 8
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
information with the appropriate manager. Involve others in process. This is a “watch the
watcher” system that can build trust and support ethical hacking projects.
DoS-Denial of Service conditions on the systems are easily created when testing. Running too
many tests too quickly on a system causes many system lockups. Things should not be rushed
and assumed that a network or specific host can handle the beating that network scanners and
vulnerability assessment tools can be useless .
Many security-assessment tools can control how many tests are performed on a system at the
same time. These tools are especially handy if one needs to run the tests on production systems
during regular business hours. One can even create an account or system lockout condition by
social engineering, changing a password, not realizing that doing so might create a system
lockout condition.
https://www.gunwantmankar.com 9
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
a signed contract in place, stating the customer’s support and authorization. Get written
approval on this sponsorship as soon as possible to ensure that none of the time or effort is
wasted. This documentation works as a proof as what one is doing when someone asks or
demands.
A detailed plan is needed, but that doesn’t mean that it needs volumes of testing procedures.
One slip can crash your systems.
A well-defined scope includes the following information:
Specific systems to be tested
Risks that are involved
When the tests are performed and your overall timeline
How the tests are performed
How much knowledge of the systems you have before you start testing
What is done when a major vulnerability is discovered
The specific deliverables — this includes security-assessment reports and a higher-
level report outlining the general vulnerabilities to be addressed, along with
countermeasures that should be implemented.
When selecting systems to test, start with the most critical or vulnerable systems. For
instance, one can test computer passwords or attempt social engineering attacks before
drilling down into more detailed systems.
Selecting tools
If one don’t have the right tools for ethical hacking, to accomplish the task is effectively
difficult. just using the right tools doesn’t mean that all vulnerabilities will be discovered.
Know the personal and technical limitations.
Many security-assessment tools generate false positives and negatives (incorrectly identifying
vulnerabilities). Some tools may miss vulnerabilities. Many tools focus on specific tests, but
no one tool can test for everything. This is why a set of specific tools are required that can call
on for the task at hand. The more are the tools , the easier ethical hacking efforts are.
Make sure the right tool is being used for the task :
To crack passwords, one needs a cracking tool such as LC4, John the Ripper, or pwdump.
A general port scanner, such as SuperScan, may not crack passwords.
https://www.gunwantmankar.com 10
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
For an in-depth analysis of a Web application, a Web-application assessment tool (such as
Whisker or WebInspect) is more appropriate than a network analyzer (such as Ethereal).
When selecting the right security tool for the task, ask around. Get advice from the
colleagues and from other people online. A simple Groups search on Google
(www.google.com) or perusal of security portals, such as SecurityFocus.com,
SearchSecurity.com, and ITsecurity.com, often produces great feedback from other
security experts. Some of the widely used commercial, freeware, and open-source security
tools:
o Nmap
o EtherPeek
o SuperScan
o QualysGuard
o WebInspect
o LC4 (formerly called L0phtcrack)
o LANguard Network Security Scanner
o Network Stumbler
o ToneLoc
Here are some other popular tools:
Internet Scanner
Ethereal
Nessus
Nikto
Kismet
THC-Scan
The capabilities of many security and hacking tools are often misunderstood. This
misunderstanding has shed negative light on some excellent tools, such as SATAN (Security
Administrator Tool for Analysing Networks) and Nmap (Network mapper).
https://www.gunwantmankar.com 11
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
https://www.gunwantmankar.com 12
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
Bypassing web access controls by changing a malicious site’s URL to its dotted
decimal IP address equivalent and then converting it to hexadecimal for use in the web
browser
Using unauthorized software that would otherwise be blocked at the firewall by
changing the default TCP port that it runs on
Setting up a wireless “evil twin” near a local Wi-Fi hotspot to entice unsuspecting
Internet surfers onto a rogue network where their information can be captured and easily
manipulated
Using an overly trusting colleague’s user ID and password to gain access to sensitive
information that would otherwise be highly improbable to obtain
Unplugging the power cord or Ethernet connection to a networked security
camera that monitors access to the computer room or other sensitive areas and
subsequently gaining unmonitored access
Performing SQL injection or password cracking against a website via a neighbor’s
unprotected wireless network in order to hide the malicious user’s own identity
https://www.gunwantmankar.com 13
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
hackers use. These people also write such malware as viruses and worms. They can break
into systems and cover their tracks. Advanced hackers are often members of collectives
that prefer to remain nameless. These hackers are very secretive and share information with
their subordinates only when they are deemed worthy. Typically, for lower-ranked hackers
to be considered worthy, they must possess some unique information or prove themselves
through a high-profile hack.
https://www.gunwantmankar.com 14
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
Malicious users are all over the map. Some can be quite savvy based on their
knowledge of the network and of how IT operates inside the organization. Many of
the hackers, especially advanced hackers don’t share information with the crowd.
Most hackers do much of their work independently in order to remain anonymous.
Maintaining Anonymity
Smart attackers want to remain as low-key as possible. Covering their tracks is a priority, and
many times their success depends on them remaining unnoticed. They want to avoid raising
suspicion so they can come back and access the systems in the future. Hackers often remain
anonymous by using one of the following resources:
Borrowed or stolen remote desktop and VPN accounts from friends or previous
employers Public computers at libraries, schools, or kiosks at the local mall
Open wireless networks
Internet proxy servers
Anonymous or disposable e-mail accounts from free e-mail services
Open e-mail relays
Infected computers also called zombies or bots at other organizations
Workstations or servers on the victim’s own network If hackers use enough stepping
stones for their attacks, they are hard to trace.
https://www.gunwantmankar.com 15
Unit-V Basics of Hacking | ETI-22618
By Prof. Gunwant Mankar
Youtube: https://www.youtube.com/c/GunwantMankar
4) Ethical hacking will allow to________ all the massive security breaches.
a. remove b. measure
c. reject d. None of these
5) Sequential steps hackers use are: __, ___, __, __
A) Maintaining Access
B) Reconnaissance
C) Scanning
D) Gaining Access
a. B, C, D, A b. B, A, C, D
c. A, B, C, D d. D, C, B, A
https://www.gunwantmankar.com 16