0% found this document useful (0 votes)
21 views11 pages

Day1 CEH June m8kxl

Day1_CEH_June_m8kxl (1)

Uploaded by

deodutta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views11 pages

Day1 CEH June m8kxl

Day1_CEH_June_m8kxl (1)

Uploaded by

deodutta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Introduction to Ethical Hacking- Terminology

Foot Printing and Reconnaissance – Information Gathering

Scanning networks- The objective is to scan the network received during Information Gathering

Enumeration – Gaining the details in depth

Vulnerability Analysis

System Hacking

Malware Threats

Sniffing

Social Engineering

Session Hijacking

SQL Injections

Wireless networks,IOT, IDS,IPS, Cloud Computing and Mobile Networks

Security is a process.

Data is getting generated ; the processes are responsible to share the data

Client Application

Network Transmission

Web Application Server

Network Layer

Operating System
Database Layer
Network Layer
Process- A program in execution

Kernel – A resource management tool

Operating System – Applications+SHELL+kernel

BIOS ->MBR->BootLoader->Kernel->start the 1st process- 512 bytes

Bootloader-446 bytes

Partition Table-64 bytes

16 bytes for new OS, 16 bytes for system reserve

OS signature-2 bytes

UEFI
OSI Architecture

Application Layer SSH,FTP,Browser,http,https,telnet


Presentation Layer Encoding Decoding
Session Layer Manage the various connections/sessions
Transport Layer TCP,UDP,Segmentation
Network Layer IP address
Data Link Layer MAC address
Physical Layer Digital or Analog Signals

TCP/IP stack

Application Layer (Application,Presentation,Session)


Transport Layer
Network Layer
Network Access Layer (Data Link ,Physical Layer)

Elements of Information Security

1. Confidentiality – Only authorized users/processes can access the data


2. Integrity – Only authorized users/processes can modify the data
3. Availability- Data should be available to authorized users/processes whenever required
4. Authenticity
5. Auditing and Accountability
6. Non Repudiation

Motive(Goal)+Method+Vulnerability = Attack

When Security goes up, usability and functionality goes down

Classification of Attacks

Passive Attack-objective is to monitor the network traffic and data flow for target network- Sniffing
or eavesdropping ;do not tamper with data

Active Attack-Tamper with the data in transit or disrupt the communication; Session hijacking or SQL
injection ,DoS;

Close-in Attacks-Are performed when the attacker is close proximity of target system or network

Insider Attack

Distribution Attack – Objective is to tamper with hardware or Software prior to installation.


CEH Hacking Methodology

1. Footprinting
2. Scanning
3. Enumeration
4. Vulnerability Analysis
5. System Hacking (Gaining the Access+ Escalating privileges, maintain the Access, clear the
logs)

Cyber Kill Chain Methodology

Objective is identify and prevent the malicious activities

1. Gather the Data


2. Weaponization –create a deliverable malicious payload using any exploit or backdoor
3. Delivery –Send the weaponized bundle to the victim using emails/USB etc
4. Exploitation –Exploit the vulnerability by executing the code on target machine
5. Installation-Install the malware on target system
6. Command and Control- Objective is to create communication channel to transmit the data
7. Actions on objective- Perform actions for intended objectives

Tactics, Techniques and Procedures

Tactics-guidelines which describes the way an attacker performs an attack from beginning to end

Techniques- Technical methods used by attacker to achieve intermediate results during attack

Procedures- Organizational approaches that the threat actor follows to launch an attack

Hacking – refers to exploiting system vulnerabilities and compromising security controls to gain
unauthorized access to system resource.

Hacker Classes

Black Hat-

White Hat

Gray Hat

Script Kiddies

Hacktivist
What is Ethical Hacking

Focuses on simulating the techniques used by attackers to verify the existence of exploitable
vulnerabilities in system security

Ethical Hacker always performs security assessment for an organization with the permission of
concerned authorities.

Information Assurance – Assurance that Integrity, confidentiality, availability, authenticity is always


protected during processing,storage usage and transmission of information

Adaptive Security Strategy

Predict

1. Risk and Vulnerability Assessment


2. Attack Surface Analysis
3. Threat Intelligence

Protect- Defense in Depth

1. Protect the endpoints


2. Protect Network
3. Protect Data

Respond

1. Incident Response

Detect

1. Continuous Threat Monitoring

Risk Management

 Risk Identification
 Risk Assessment
 Risk Treatment
 Risk Tracking
 Risk Review
Threat Modelling

1. Identify the Security Objectives


2. Application Overview (Identify the Processes , Identify the Components, Trust Boundaries )
3. Decompose the applications to identify threat
4. Identify the Vulnerabilities

Incident Management- is a set of processes to identify, analyze, prioritize and resolve the security
incidents to restore the normal business service operations.

PCIDSS

ISO 270001

HIPPA

SOX

IPV4 addressing Scheme – 32 bit Addressing scheme

Class A-11111111.00000000.00000000.00000000-/8 – 255.0.0.0

Class B-11111111.11111111.00000000.00000000-/16- 255.255.0.0

Class C-11111111.11111111.11111111.00000000- /24-255.255.255.0

Classless-11111111.11111111.1000000.00000000-/17

Classless IP addressing Scheme

Class A-1.0.0.0-126.255.255.255

Class B-128-191

Class C-192-223

Class D- Multicasting

Class E-Research Purpose


FootPrinting – first step of any attack on information system in which attacker collects information
about the target network

Passive Footprinting- Gathering the information about the target without direct interaction

Active Footprinting- Gathering the information with Direct interaction

[inurl:]-Restrict the result to documents containing the search keyword in URL

[intitle:]- Restrict the results to documents containing the search keyword in title

[site:]-restrict the results to those websites in given domain

Footprinting helps to:

 Know Security posture


 Reduce the attack Area
 Identify the Vulnerabilities
 Draw a Network Map
 Domain Name
 IP Addresses
 Namespaces
 Phone Numbers
 Job-information

Linux Commands

“/”- root partition

root – super user with UID 0

/root –Home directory for root user

“~” – home directory

“pwd”-Present working Directory

“user1” –“/home/user1”

“user2”-“/home/user2”
Create a directory and create a file using cat command in given directory

rmdir- remove empty directories

rm- removal of directories and files


DAC- Discretionary Access Control Subject->Object

MAC- Mandatory Access Control System Services which work in confined domain

RBAC- Role Based Access Control – Access permissions given according to job roles

User (owner of a file), Group ( group of users who are having similar requirement for
permissions),Others

777

r(4)w(2)x(1)(users) rwx(groups) rwx(others)

default permissions for files are 666

default permissions for directory 777

umask-022

777-022=755

666-022=644

Create a directory ; create a file in a directory; observe the umask and permissions, change
umask and create a new file; observe the permission

Provide rwx to user,rw to group for a file


Scanning Network

Network Scanning refers to set of procedures used for identifying hosts,ports and services in
the network

1. Whether the host is live or not:ping,netstat,traceroute,nmap


2. Find out the Open Ports:nmap
3. Find the services running:nmap

TCP : 3 way handshake

Syn

Node A Syn/Ack Node B

Ack

TCP flags

ACK- Acknowledgement

SYN-Synchronization

FIN-Finish

RST-Reset the connection

URG:Urgent

PSH: Push flag

nmap –sT -> full connect://ports are open

Syn

Node A Syn/Ack Node B

Ack
nmap –sS:Half Connect- Stealth Scan –Port is Open

Syn

Node A Syn/Ack Node B

RST

Nmap: -sF:FIN scan-Port is Open

FIN

Node A Node B

No Communication

Port is closed

Any Flag

Node A Node B

RST/ACK

You might also like