Eti Unit v Basics of Hacking
Eti Unit v Basics of Hacking
BASICS OF
HACKING
MR. S. P. KHOLAMBE
LECTURER IN CO DEPTT., MET BKC IOTP NASHIK
Ethical Hacking
4
Defining Hacker, Malicious Users
5
Defining Hacker, Malicious Users
6
Understanding The Need To Hack Your Own
Systems
The law of averages works against security. With the increased
numbers and expanding knowledge of hackers combined with the
growing number of system vulnerabilities and other unknowns, the
time will come when all computer systems are hacked or compromised
in some way.
Protecting your systems from the bad guys and not just the generic
vulnerabilities that everyone knows about is absolutely critical.
When you know hacker tricks, you can see how vulnerable your
systems are.
Hacking preys on weak security practices and undisclosed
vulnerabilities. Firewalls, encryption, and virtual private networks
(VPNs) can create a false feeling of safety.
7
Understanding The Need To Hack Your Own
Systems
These security systems often focus on high-level vulnerabilities, such
as viruses and traffic through a firewall, without affecting how
hackers work. Attacking your own systems to discover
vulnerabilities is a step to making them more secure.
This is the only proven method of greatly hardening your systems
from attack. If you don’t identify weaknesses, it’s a matter of time
before the vulnerabilities are exploited.
As hackers expand their knowledge, so should you. You must think like
them to protect your systems from them. You, as the ethical hacker,
must know activities hackers carry out and how to stop their
efforts. You should know what to look for and how to use that
information to thwart hackers’ efforts.
8
Understanding The Need To Hack Your Own
Systems
You don’t have to protect your systems from everything. You can’t. The
only protection against everything is to unplug your computer
systems and lock them away so no one can touch them not even
you. That’s not the best approach to information security. What’s
important is to protect your systems from known vulnerabilities and
common hacker attacks.
It’s impossible to buttress all possible vulnerabilities on all your
systems. You can’t plan for all possible attacks especially the ones that
are currently unknown. However, the more combinations you try the
more you test whole systems instead of individual units the better your
chances of discovering vulnerabilities that affect everything as a whole.
9
Understanding The Need To Hack Your Own
Systems
Don’t take ethical hacking too far, though. It makes little sense to
harden your systems from unlikely attacks. For instance, if you don’t
have a lot of foot traffic in your office and no internal Web server
running, you may not have as much to worry about as an Internet
hosting provider would have. However, don’t forget about insider
threats from malicious employees!
Your overall goals as an ethical hacker should be as follows:
1. Hack your systems in a non destructive fashion.
2. Enumerate vulnerabilities and, if necessary, prove to upper
management that vulnerabilities exist.
3. Apply results to remove vulnerabilities and better secure your
systems.
10
Understanding The Dangers Your Systems Face
It’s one thing to know that your systems generally are under fire from
hackers around the world. It’s another to understand specific
attacks against your systems that are possible. This section offers
some well-known attacks but is by no means a comprehensive listing.
Many information security vulnerabilities aren’t critical by
themselves. However, exploiting several vulnerabilities at the same
time can take its toll.
For example, a default Windows OS configuration, a weak SQL Server
administrator password, and a server hosted on a wireless network
may not be major security concerns separately.
But exploiting all three of these vulnerabilities at the same time can be
a serious issue.
11
Nontechnical Attacks
Exploits that involve manipulating people end users and even yourself
are the greatest vulnerability within any computer or network
infrastructure.
Humans are trusting by nature, which can lead to social engineering
exploits. Social engineering is defined as the exploitation of the trusting
nature of human beings to gain information for malicious purposes.
Other common and effective attacks against information systems are
physical. Hackers break into buildings, computer rooms, or other areas
containing critical information or property.
Physical attacks can include dumpster diving(rummaging through trash
cans and dumpsters for intellectual property, passwords, network
diagrams, and other information).
12
Network Infrastructure Attacks
15
Obeying the Ethical hacking Principles
16
Working ethically
17
Working ethically
18
Respecting Privacy
Treat the information you gather with the utmost respect. All
information you obtain during your testing from Web-application log
files to clear-text passwords must be kept private.
Don’t use this information to snoop into confidential corporate
information or private lives.
If you sense that some one should know there’s a problem, consider
sharing that information with the appropriate manager.
Involve others in your process. This is a “watch the watcher” system
that can build trust and support your ethical hacking projects.
19
Not Crashing Your Systems
One of the biggest mistakes I’ve seen when people try to hack their own
systems is in advertently crashing their systems.
The main reason for this is poor planning. These testers have not read
the documentation or misunderstand the usage and power of the
security tools and techniques.
You can easily create DOS conditions on your systems when testing.
Running too many tests too quickly on a system causes many system
lockups.
I know because I’ve done this! Don’t rush things and assume that a
network or specific host can handle the beating that network scanners
and vulnerability-assessment tools can dish out.
20
Not Crashing Your Systems
21
The Ethical Hacking Process
22
Formulating Your Plan
25
Selecting Tools
As with any project, if you don’t have the right tools for ethical hacking,
accomplishing the task effectively is difficult.
Having said that, just because you use the right tools doesn’t mean that
you will discover all vulnerabilities.
Know the personal and technical limitations. Many security-assessment
tools generate false positives and negatives (incorrectly identifying
vulnerabilities).Others may miss vulnerabilities.
If you’re performing tests such as social-engineering or physical-
security assessments, you may miss weaknesses.
Many tools focus on specific tests, but no one tool can test for
everything.
26
Selecting Tools
Make sure you that you’re using the right tool for the task:
To crack passwords, you need a cracking tool such as LC4, John the
Ripper, or pwdump. A general port scanner, such as Super Scan, may
not crack passwords.
For an in-depth analysis of a Web application, a Web-application
assessment tool (such as Whisker or Web Inspect) is more
appropriate than a network analyzer (such as Ethereal).
27
Selecting Tools
28
The following list runs down Here are some other popular
some of commercial, freeware, tools:
and open-source security tools:
Internet
Nmap
Scanner
EtherPeek
SuperScan Ethereal
QualysGuard Nessus
WebInspect Nikto
LC4 Kismet
LANguard Network Security
THC-Scan
Scanner
Network Stumbler
ToneLoc
Selecting Tools
Some of these tools are complex. Whichever tools you use, familiarize
yourself with them before you start using them. Here are ways to do that:
Read the readme and/or online help files for your tools.
Assess your results to see what you uncovered, assuming that the
vulnerabilities haven’t been made obvious before now. This is where
knowledge counts.
Evaluating the results and correlating the specific vulnerabilities
discovered is a skill that gets better with experience.
You’ll end up knowing your systems as well as anyone else. This makes
the evaluation process much simpler moving forward.
Submit a formal report to upper management or to your customer,
outlining your results. Keep these other parties in the loop to show
that your efforts and their money are well spent.
32
Moving On
When you’ve finished your ethical hacking tests, you still need to implement
your analysis and recommendations to make sure your systems are
secure.
New security vulnerabilities continually appear. Information systems
constantly change and become more complex.
New hacker exploits and security vulnerabilities are regularly
uncovered. You may discover new ones! Security tests are a snapshot of the
security posture of your systems.
At any time, everything can change, especially after software upgrades,
adding computer systems, or applying patches. Plan to test regularly (for
example, once a week or once a month).
33
Cracking The Hacker Mindset
Before you start assessing the security of your systems, you may
want to know something about the people you’re up against.
Many information security product vendors and other
professionals claim that you should protect your systems
from the bad guys both internal and external. But what does
this mean? How do you know how these people think and work?
Knowing what hackers and malicious users want helps you
understand how they work. Understanding how they work helps
you to look at your information systems in a whole new way.
34
What You're Up Against?
Hackers hacked for the pursuit of knowledge and the thrill of the
challenge. Hackers see what others often overlook. The wonder what would
happen if a cable was unplugged, a switch was flipped, or lines of code were
changed in a program.
These old-school hackers think they can improve electronic and
mechanical devices by "rewiring them." More evidence shows that many
hackers may also hack for political, social, competitive, and even financial
purposes, so times are changing.
Hackers who perform malicious acts don't really think about the fact that
human beings are ad the firewall, wireless networks, and web
applications they're attacking. They ignore their actions often affect the
human beings in negative ways, such as put in danger their job security and
putting their personal safety at risk.
36
What You're Up Against?
39
Who Breaks In To Computer Systems?
Reasons:
Hacking is a casual hobby for some hackers. They and can't break into,
usually testing only their own systems.
Many hackers get a kick out of outsmarting corporate and government IT
and security administrators. They thrive on making headlines and being
notorious cyber outlaws.
Hackers often promote individualism or at least the decentralization of
information because many believe that all information should be free.
They think cyber-attacks are different from attacks in the real world. Hackers
may easily ignore or misunderstand their victims and the consequences
of hacking.
They don't think long-term about the choices they're making today. Many
hackers say they don't intend to harm or profit through their bad deeds, 43
Why they do it?
Reasons:
Some common motives are revenge, basic bragging rights, curiosity,
boredom, challenge, vandalism, theft for financial gain, sabotage, blackmail,
extortion corporate intelligence, and just generally speaking out against the
man.
Many business owners and managers administrators believe that they
don't have anything that a hacker wants or that hackers can't do much
damage if they break in.
Hackers can compromise a seemingly unimportant system to access the
network and use it as a launching pad for attacks on other systems, and
many people don't have the proper controls to prevent and
detect malicious use.
Hackers often hack just because they can. Some hackers go for high-profile
44
systems.
Why they do it?
46
Planning and Performing Attacks
48
Planning and Performing Attacks
49
Maintaining Anonymity