What is Hacking ?
Ethical Hackingisthe protection of inter-connectedsystems,
includinghardware, softwareanddata, fromcyberattacks.
White Hat HackerGrey Hat HackerBlack Hat Hacker
Goals of ethical Hacking
•Protect the privacy of an Organization
•Transparently report all the identified bugs/weaknesses/vulnerabilities to
t
he organization.
•Inform the vendors about the security measures and patches.
Skills Required by Ethical Hackers
Operating
Systems
Programming
Languages
Networking
Tools Used by Ethical Hackers
Process of Ethical Hacking
Reconnaissance
Maintaining Access
Scanning
Gaining Access
Reporting
Clearing Tracks
Reconnaissance
Thisisthefirststepof hacking. Itisalso calledasFoot printingand
informationgathering phase.Thisisthepreparatoryphasewhere
wecollect asmuchas informationas possible about these the
target.Weusually collectinformationabout three groups:
•Network
•Host
•PeopleI
Scanning
Three typesofscanningareinvolved:
Portscanning: This phaseinvolvesscanning thetarget forthe
informationlikeopenports,livesystems,variousservices running
onthe host.
VulnerabilityScanning: Checking thetarget fortheweakness or
vulnerabilitieswhichcanbeexploited.Usuallydonewiththe helpof
automatedtools.
NetworkMapping: Finding thetopology of network, routers,
firewallsserversifany,and hostinformationand drawinganetwork
diagramwiththeavailable information.Thismap mayserveasa
valuablepiece ofinformation.Thismap mayserve asavaluable
pieceof informationthroughout the hackingprocess.
Clearing Tracks
Nothiefwantstoget caught.Anintelligenthacker always clearsall
the evidencesothatinlaterpointoftime,no onewillfind anytraces
leadingtohim.Thisinvolvesmodifying/corrupting/deleting the
values oflogs,modifyingregistryvaluesand uninstallingallthe
applications he used and deletingallfoldershecreated.
Web Application Domain
ClientDatabaseServer Application Server
example.com
Attacker
Web Application Domain
login Name: <script>alert("You are hacked")</script> Login Password:
login Name: 'Union select * from users'
Login Password:
login Name: <iframe src="....org"></iframe>
Login Password:
Common Web Application attacks
•InjectionF eg.SQLinjection,HTMLinjection,etc.
•Crosss
Scriptingeg.Reflected,Stored,etc.
•WebS
Attackseg.DNSCachePoising,Fileuploadsetc.
Web Application Domain
login: <script>alert(document.cookie)</script>
password:
subscribe:
email: <script>code to mail him user information</script>
Hacking Methodology
•WebF –GatheringInformation
•Vulnerability S
canners– w3af,Acunetix
•Identify E
Points andAttacksurface
Example : SQL injections
Victim
Attacker
Server
Select * from users where user_id=‘admin’ and
password=‘shadow’
Select * from users where user_id=‘blah’ or 1= 1-- and password=‘anything’
Mobile Domain
TheMobile Devicehas becomeaninseparable part oflifetoday.
Theattackersareeasilyabletocompromisethemobilenetwork
becauseofvariousvulnerabilities,themajority oftheattacksare
because ofthe untrusted apps.Themainoperatingsystemsused
are:
•Android
•IOS
•Windows
•Blackberry
Ransomware
The WannaCryransomwareattackwasaMay2017worldwide
cyberattackby the WannaCryransomware cyrptoworm,which
targetedcomputers running the Microsoft Windowsoperating
systemby encrypting data anddemanding ransompaymentsinthe
Bitcoincryptocurrency.