0% found this document useful (0 votes)
26 views28 pages

EH Unit 3

RGPV Ethical Hacking unit-3

Uploaded by

0126cy211026
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views28 pages

EH Unit 3

RGPV Ethical Hacking unit-3

Uploaded by

0126cy211026
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

Technical preparation is a critical and often underdocumented phase in penetration testing.

This stage ensures that all tools, systems, and processes are in place to execute a successful
test, maintain data security, and provide a meaningful deliverable. The following outlines key
components of technical preparation:

1. Operating System Selection


The foundation of the attacking system relies heavily on the operating system chosen.
• Purpose: The OS provides the base environment where tools and processes for the
attack will run.
• Considerations:
o Tool Compatibility: Certain tools are designed for specific operating systems.
For instance:
▪ Kali Linux is preferred for its pre-installed penetration testing tools.
▪ Windows may be chosen for enterprise tools or tests targeting
Windows environments.
o Performance: The OS should be robust enough to handle the intensive tasks
of scanning, data processing, and attack execution.
o Flexibility: The OS should allow for customization and the addition of tools as
needed.
2. Tool Selection
Tools are the lifeblood of a penetration test, enabling the execution of various attacks and
data collection.
• Categories of Tools:
o Reconnaissance Tools: For gathering initial information (e.g., Nmap, Recon-
ng).
o Exploitation Tools: To identify and exploit vulnerabilities (e.g., Metasploit,
Burp Suite).
o Post-Exploitation Tools: For maintaining access and pivoting (e.g., Cobalt
Strike, Mimikatz).
• Tailoring Tools to the Target:
o Tools must align with the specifics of the target environment (e.g., Windows-
based tools for Windows targets).
o Custom scripts or modified tools may be necessary for unique systems.
3. Data Management and Protection
Data security is paramount to maintain the test's integrity and client confidentiality.
• Types of Data Collected:
o Logs of test activities.
o Sensitive client information discovered during the test.
o Evidence of vulnerabilities or exploitation paths.
• Best Practices for Data Protection:
o Use encrypted storage for all collected data.
o Segregate data to prevent unauthorized access by team members.
o Implement secure backups to ensure recovery in case of corruption.
• Final Deliverable:
o Ensure data is organized and sanitized before presenting findings to the client.
4. Communication Security
Secure communication between the penetration testing team and stakeholders ensures that
sensitive information remains confidential.
• Establishing Secure Channels:
o Use encrypted messaging platforms (e.g., Signal, ProtonMail) for team
communication.
o Implement Virtual Private Networks (VPNs) to mask connections and secure
internet activity during the test.
• Role-Based Access:
o Ensure communication channels are limited to necessary personnel.
o Maintain audit trails of all communications for accountability.
5. Additional Considerations
• Hardware Requirements: Ensure systems have adequate hardware resources for the
selected tools and tasks.
• Documentation and Planning: Document all technical preparations and provide a
roadmap to maintain clarity and alignment among team members.
• Testing the Setup: Conduct dry runs of the attacking system to identify and fix
potential issues before the actual test.

By ensuring thorough technical preparation, penetration testers can streamline their efforts,
maintain client trust, and deliver accurate and actionable results.
Managing the Engagement in Ethical Hacking
Managing an ethical hacking engagement demands careful coordination, transparent
communication, and a structured approach to ensure it delivers value to the client while
maintaining the integrity of their systems. Below is an expanded outline of the critical
elements involved:

1. Project Initiation
a. Kick-off Meeting
This initial meeting sets the foundation for the entire engagement by aligning expectations
and defining processes:
• Sponsors and Contact Information: Identify all stakeholders involved in the project,
collecting their contact details and clarifying roles and responsibilities. This includes
defining escalation protocols, risk management roles, and decision-making
authorities to avoid confusion later.
• Building Teams:
o Red Team: Simulates realistic cyberattacks to uncover vulnerabilities.
o Blue Team: Focuses on detecting, preventing, and responding to threats.
o White Team: Mediates between teams, ensures rules are adhered to, and
acts as a bridge between the client and testers.
▪ Key Roles:
▪ CIO (Chief Information Officer): Provides executive-level
sponsorship to ensure alignment with business priorities and
acts as the ultimate authority on critical decisions during the
engagement.
▪ Firm Management: Ensures that the consulting firm’s activities
align with client goals, from resource allocation to managing
unexpected challenges.
▪ Client Technical Advisor: Serves as a knowledgeable liaison
between the client and the testers, minimizing disruptions by
addressing technical concerns efficiently.
o Shadow Consultant (if applicable): This additional resource, provided by the
consulting firm, can enhance the quality of the engagement by supporting
technical tasks and fostering trust with the client.
b. Planning and Scheduling
• Defining Schedule and Milestones: Create a detailed timeline for activities, such as
reconnaissance, scanning, and attack simulations. Ensure flexibility in timelines to
adapt to dynamic scenarios without compromising the test's depth.
• Risk Mitigation and Escalation Planning: Develop a comprehensive plan to handle
potential issues, such as adverse system impacts or data breaches, by outlining
specific escalation protocols and incident management measures.

2. During the Project


a. Status Reports
• Monitoring Progress: Regularly update all stakeholders on the tasks completed,
challenges faced, and upcoming activities. This ensures transparency and helps keep
the project on track.
• Demonstrating Value: Detailed status reports showcase the efforts made by the
consulting team, providing a tangible sense of progress and justifying the investment
in the engagement.
b. Scope Management
• Adjusting Scope: Flexibility is critical as the project evolves; this may include adding
networks, expanding system targets, or integrating additional attack methods like
social engineering. These changes ensure the engagement remains relevant and
comprehensive.
• Maintaining Clarity: Clearly document and communicate any modifications to avoid
misaligned expectations and potential conflicts later in the process.
c. Deliverable Review
• Creating Comprehensive Documentation: Begin drafting the final deliverable during
the engagement, capturing vulnerabilities, insights, and attack methodologies in
detail.
• Identifying Vulnerabilities Early: Regular review of findings ensures that potential
risks are addressed promptly and that the engagement's objectives are consistently
met.

3. Concluding the Engagement


a. Final Deliverables
• Detailed Documentation: Provide an exhaustive report summarizing vulnerabilities,
their potential impact, and actionable recommendations. Include technical details of
the tools and methodologies used, ensuring clarity for both technical and non-
technical stakeholders.
b. Closure Presentation
• Summarizing Key Findings: Share accomplishments, highlight lessons learned, and
provide insights into improving the organization’s security posture. This final
presentation serves as a critical step to ensure all stakeholders understand the results
and their implications.
c. Ensuring Clean-Up
• Removing Residual Artifacts: Verify that no remnants of the testing process, such as
scripts or temporary files, are left behind. This step prevents accidental disruptions or
vulnerabilities introduced during the engagement from persisting post-project.

Key Considerations
1. Flexibility and Adaptation: Ethical hacking engagements are dynamic and require the
ability to adjust strategies and timelines based on real-time findings to maximize
their effectiveness.
2. Clear Communication: Transparent and consistent updates between the service
provider and the client foster trust and ensure alignment on goals and expectations.
3. Balancing Testing Rigor and Risk: Ensure the testing process is thorough, uncovering
all potential vulnerabilities, while minimizing the risk of system disruptions or
damage during the engagement.
By addressing these aspects with a well-structured approach, ethical hacking engagements
can provide actionable insights that strengthen the client’s overall security framework while
maintaining trust and operational continuity.
Key Points on Social Engineering and Its Tactics:
Overview of Social Engineering:
1. Definition: Social engineering exploits human behavior to manipulate individuals into
revealing information or granting access.
2. Forms: Tactics range from emails and phone calls to face-to-face interactions or even
assuming identities to infiltrate organizations.
3. Example: A consultant impersonated a doctor to gain patient records and access
privileges over the phone.
The Physicality of Social Engineering:
1. Human Element: People are the weakest link in security due to mistakes or malicious
intent.
2. Motivators: Financial strain, political affiliations, or personal interests can lead
individuals to compromise security.
3. Testing Philosophy: Tests measure how well security controls protect against human
vulnerabilities and mimic real-world risks.
4. Consequences of Discovery: Catching the tester nullifies the test but adds realism by
increasing stakes similar to those of actual hackers.
Tactics in Social Engineering:
1. Email-Based Attacks:
o Email is a common medium due to its widespread usage and trust among
users.
o Hackers craft emails that appear familiar, using legitimate-looking sender
addresses to lower suspicion.
o Requests in emails often align with the recipient's role, making the request
seem valid.
o Awareness of past email-based viruses (e.g., "ILOVEYOU") has improved
vigilance, but trust in familiar sources remains a vulnerability.

Value of E-mail-Based Social Engineering Testing:


E-mail-based social engineering testing evaluates how employees handle fraudulent emails,
revealing vulnerabilities in security culture and individual awareness. Key aspects include:
Reasons for Value:
1. Inexpensive:
o E-mail phishing tests are cost-effective and simple to implement, requiring
minimal time and resources.
2. Understanding Employee Vulnerabilities:
o A few targeted emails can uncover which employees are most likely to share
sensitive information and the effort attackers might need to exploit them.
3. Evaluating Security Awareness:
oResponses to test emails provide empirical data about how well employees
understand and act on security protocols, helping assess the effectiveness of
previous training sessions.
4. Determining Sensitivity of Information:
o If sensitive data is shared during the test, it highlights the need for stronger
internal controls and targeted employee training.
5. Low Negative Impact:
o Compared to other forms of penetration testing, e-mail tests typically don't
disrupt company operations or employee morale, as they involve minimal
direct interaction.

Controlling Depth in E-mail-Based Attacks:


Controlling the depth of e-mail social engineering tests ensures they remain ethical,
manageable, and aligned with organizational goals. This involves defining parameters to
prevent unnecessary stress on employees or systems.
Control Options:
1. One Shot:
o Limit the test to a single e-mail.
o Ensures minimal disruption and provides a clear test of initial vulnerability.
o Ideal for cautious organizations.
2. Three Strikes:
o Allow up to three email exchanges to evaluate how much information an
attacker could gather.
o Balances depth with control, providing more insight without overwhelming
employees.
3. Illicit Content Restrictions:
o Prohibit unethical tactics, such as profanity, immoral comments, or personal
attacks.
o Maintains the test’s ethical integrity and avoids legal or reputational issues.
4. Subject Matter Control:
o Define acceptable topics, such as requesting access to systems or data
relevant to the employee's role.
o Focuses the test on realistic attack scenarios without overstepping
boundaries.
5. Length Restrictions:
o Limit the number of words (e.g., 200 words per email).
o Prevents overly elaborate or manipulative messages that could stress
employees.
6. Subject Line Specifications:
o Define permissible subjects (e.g., project-related queries or system access
requests).
o Narrowing the focus helps test specific vulnerabilities, like sharing merger
information or proprietary techniques.

2. Helpdesk Fraud:
Hackers exploit helpdesks, a critical point of contact in organizations, to gain unauthorized
access by manipulating helpdesk staff.
• Tactic:
o Call a helpdesk posing as an employee or legitimate user.
o Request password resets or access to restricted systems.
• Techniques:
o Impersonation: Provide fake credentials, such as fabricated HR IDs or
plausible answers to security questions, often sourced from public
information or prior breaches.
o Urgency and Pressure: Use scenarios like "a critical deadline" to rush the
helpdesk staff into bypassing standard procedures.
o Social Engineering: Build rapport with the helpdesk personnel to lower their
guard.
• Challenges:
o Even with verification mechanisms, helpdesk staff may be manipulated,
especially if the attacker is skilled at exploiting human emotions like sympathy
or urgency.

3. Prowling and Surfing:


Hackers gather information through physical or digital observation to identify vulnerabilities.
• Prowling (Physical Observation):
o Hackers may observe employees in their work environment or public spaces.
o Examples:
▪ Watching employees type passwords ("shoulder surfing").
▪ Monitoring badge access points to learn entry patterns.
• Surfing (Digital Observation):
o Browsing publicly accessible information online, such as:
▪ Employee directories or organizational charts.
▪ Discussions on professional forums and social media posts.
o Accessing misconfigured systems, such as unsecured shared drives or
outdated websites.
• Objective:
o Gain insights into security protocols, employee habits, or sensitive
information that could be exploited later.

4. Internal Relations and Collaboration:


Hackers manipulate the natural trust within teams and between departments to extract
information. External Threat Actor: In this case, the hacker is an external attacker
pretending to be someone within the organization. They manipulate internal relationships,
trust, and familiarity to gain access to sensitive information or systems.
• Tactic:
o Pose as a colleague or trusted partner within the organization.
o Request sensitive data or access by leveraging familiarity and trust.
• Techniques:
o Feign Authority: Pretend to be a senior manager or executive requiring
urgent access.
oShared Interests: Reference ongoing projects or common workplace issues to
build rapport.
o Exploit Complacency: Many employees may not question internal requests,
assuming their colleagues are trustworthy.
• Vulnerabilities:
o Lack of strict internal verification processes.
o Employees’ willingness to help colleagues without confirming identity.

5. Corporate Identity Assumption:


Hackers impersonate official identities within the organization to gain unauthorized access or
data.
• Tactic:
o Assume the identity of a legitimate employee, contractor, or partner to
exploit trust and authority.
o Methods include:
▪ Spoofing email addresses.
▪ Creating fake employee IDs or badges.
▪ Using insider lingo to appear credible.
• Techniques:
o Authority Figures: Impersonate high-ranking officials (e.g., CFO or IT admin)
to make urgent demands.
o IT Department Ploys: Pretend to be IT support to ask for passwords or access
permissions.
o Vendor or Partner Role: Claim to be a trusted third-party service provider
needing critical information.
• Risks:
o Highly effective against organizations with lax identity verification.
o Can lead to large-scale data breaches or unauthorized access to systems.

1. Phishing

Phishing is a cybercrime where attackers deceive individuals into revealing sensitive information, such as login credentials, financial details, or personal
information. This is usually done by pretending to be a trustworthy entity in electronic communications, like emails, messages, or websites. Phishing can cause
financial loss, identity theft, or unauthorized access to accounts.

Here are multiple types of phishing:

1. Email Phishing

• Definition: The most common form where attackers send fraudulent emails appearing to be from reputable organizations.
• Characteristics:
o Urgent calls to action (e.g., "Your account will be locked unless you act now").
o Fake links or attachments leading to malicious websites.
• Example: An email from a "bank" requesting you to verify your account details.

2. Spear Phishing

• Definition: A targeted form of phishing tailored to specific individuals or organizations.


• Characteristics:
o Personalized content, such as using your name, job title, or specific information.
o Usually aimed at high-value targets like company executives (known as "whaling").
• Example: A fake email addressed to a CEO requesting sensitive business data.

3. Smishing (SMS Phishing)

• Definition: Phishing conducted via text messages.


• Characteristics:
o Links to fraudulent websites.
o Requests for sensitive information through text.
• Example: A text claiming you won a prize, prompting you to click a link and enter your details.

4. Vishing (Voice Phishing)

• Definition: Phishing through phone calls or voice messages.


• Characteristics:
o Callers impersonate officials (e.g., bank representatives, government agents).
o Pressure tactics to share confidential information.
• Example: A scammer claiming your Social Security number has been compromised.

5. Clone Phishing

• Definition: Attackers duplicate legitimate communications and modify them slightly.


• Characteristics:
o Looks like a legitimate email/message.
o Contains malicious links or attachments.
• Example: A copy of a genuine email from your company, with a fake link replacing the original.

6. Pharming

• Definition: Redirecting victims to fake websites without their knowledge by compromising DNS (Domain Name System) settings.
• Characteristics:
o Happens even if you type the correct URL.
o Involves manipulating DNS or infected devices.
• Example: Visiting a "bank" website but unknowingly landing on a counterfeit page.

7. CEO Fraud (Business Email Compromise - BEC)

• Definition: Impersonating a company executive to deceive employees or partners.


• Characteristics:
o Requests for wire transfers or sensitive data.
o Appears urgent and authoritative.
• Example: An email from a "CEO" asking an employee to transfer money to a specific account.

8. Social Media Phishing

• Definition: Using social media platforms to trick users.


• Characteristics:
o Fake profiles or posts.
o Malicious links in messages or posts.
• Example: A fake "customer support" account on Twitter asking for your login details.

10. Search Engine Phishing

• Definition: Creating fake websites optimized for search engines to rank highly.
• Characteristics:
o Sites appear in search results for common queries.
o Steal information when victims interact.
• Example: A fake shopping website appearing in search results for "cheap electronics."

11. Pop-Up Phishing

• Definition: Using pop-up ads to trick users.


• Characteristics:
o Alerts claiming viruses or account issues.
o Prompts to click and download malicious software.
• Example: "Your computer is infected! Click here to fix it."

2. Baiting
Baiting relies on enticing the victim with something attractive, such as free software, music, or USB drives left in public areas.
• Digital Baiting:
o Offering "free" downloads that infect systems with malware.
o Fake advertisements that redirect to malicious sites.
• Physical Baiting:
o Leaving USB drives labeled "Confidential" or "Salary Details" in conspicuous places, hoping someone will plug them into a computer.
3. Pretexting
Pretexting involves fabricating a believable scenario (or pretext) to gain trust and extract information.
• Examples:
o Impersonating IT support to request login credentials.
o Pretending to be a colleague or partner needing sensitive documents urgently.
• Key Components:
o Extensive research to make the pretext convincing.
o Building rapport and establishing credibility.
4. Tailgating and Piggybacking
These are physical social engineering techniques used to gain access to secure areas.
• Tailgating: Following someone through a secure entry point without proper credentials.
• Piggybacking: Convincing someone to hold the door open, typically under a pretext (e.g., “I forgot my badge”).

5. Quid Pro Quo


This involves promising a service or benefit in exchange for information.
• Examples:
o Offering a "free" tech fix in exchange for credentials.
o Pretending to conduct a survey while collecting sensitive data.
o
PHYSICAL SECURITY IN ETHICAL HACKING
Physical security, while often overlooked in the realm of cybersecurity, is a critical
component of a comprehensive security assessment. Ethical hacking frequently evaluates
physical security measures to mimic real-world attack tactics. This encompasses traditional
measures like locks, alarms, and guards, as well as techniques that exploit human behavior
and organizational vulnerabilities.

1. Observation
Observation involves gathering information by watching activities, processes, and habits of a
target. It typically precedes an attack and helps identify exploitable patterns.
• Example 1: A company relying on a shredding service appeared secure but left
sensitive documents in unsecured trash bags. By switching the bags, the tester
gained access to sensitive data.
• Example 2: Observing employees in a smoking area enabled testers to piggyback into
a facility after gaining familiarity with the staff.
Value: Observation reveals vulnerabilities in routines and physical access systems without
directly attacking.

2. Dumpster Diving
This method involves retrieving discarded information from trash to uncover sensitive data.
• Common finds: Network diagrams, internal communications, bills, and human
resource documents.
• Example: Testers discovered a competitor’s previous penetration test deliverables in
a dumpster, demonstrating the risks of inadequate disposal methods.
Value: Provides high-value insights with minimal investment. Mitigation strategies, such as
shredding documents, are simple and effective.

3. Wardriving and Warchalking


Wireless networks, while convenient, are susceptible to attacks due to signal propagation
beyond intended boundaries.
• Wardriving: Using tools like NetStumbler to locate wireless networks while driving or
roaming.
• Warchalking: Marking physical locations with symbols to identify accessible
networks, including their bandwidth and encryption status.
• Risks: Signals often extend far beyond buildings, making networks vulnerable to
hackers in inconspicuous locations like parked cars or nearby areas.
• Example: A local business inadvertently projected its wireless signal into a harbor,
exposing its network to external access.
Value: Identifies vulnerabilities in wireless network configurations and propagation,
highlighting the need for secure design and policies.

4. Theft
Theft involves removing valuable items or information that have not been discarded.
• Examples: Stealing laptops, badges, or even servers.
• Risks: High-risk activity, requiring clear objectives and customer consent.
• Example: A tester removed a server from a facility to assess exposure to physical
threats but later found it did not contain the targeted database.
Value: Demonstrates the feasibility of physical breaches and theft of assets, emphasizing the
need for stringent physical access controls.

Conclusion
Physical security assessments in ethical hacking complement digital security measures by
addressing vulnerabilities in physical access and operational procedures. Strategies like
observation, dumpster diving, wardriving, and theft reveal critical gaps, helping
organizations implement comprehensive security protocols to mitigate risks.
Internet Reconnaissance:
1. General Information
Internet reconnaissance begins with gathering publicly available data about a target,
leveraging web content and discussions.
1.1 Web Sites
• Importance of Web Sites:
o Central to business operations since the 1990s.
o Companies often share excessive information inadvertently.
• Types of Exposed Information:
o Personal information, work history, photos of executives.
o Press releases, success stories, partnership details, locations, and
documentation.
• Risks of Overexposure:
o Hackers can infer sensitive operational details.
o Unintentional sharing of network security information (e.g., remote access
configurations).
• Sources Beyond Target Site:
o Partner or customer websites may reveal more data about the target.
o Case studies or news articles on external sites may expose security
vulnerabilities.
1.2 Newsgroups
• Definition:
Online discussion forums hosted on Usenet, covering diverse topics.
• Reconnaissance Potential:
o Employees or ex-employees discussing sensitive corporate details.
o E-mail signatures in posts revealing names and domains.
• Example Case:
o An employee revealed firewall misconfigurations while seeking technical help.
o Hacker exploited these details to penetrate the network.
• Value for Testers:
o Helps identify potential security lapses or attacks in progress.
o Provides clues about corporate vulnerabilities from user discussions.

2. Technical Reconnaissance
Technical reconnaissance examines systems and applications to gather information about
the target’s network infrastructure.
2.1 Ping Sweeps
• Purpose:
Discover active systems by sending ICMP (ping) requests.
• Challenges:
o Many networks block ICMP requests to prevent DoS attacks.
o Sequential pings can trigger intrusion detection systems (IDS).
• Alternative Use:
o Effective from inside the network after gaining access to a system.
2.2 Scanning
Network scanning involves sending requests to systems to determine services, ports, and
vulnerabilities.
2.2.1 Types of Scans
1. Passive Scans:
o Sends SYN packets to identify open ports.
o Helps detect active systems, even when ICMP is blocked.
o Focuses on standard ports (1–1023) but can include all ports (1–65535) for
comprehensive results.
o Risk: High-port scans may alert administrators or IDS.
2. Active Scans:
o Completes the connection to confirm service validity.
o Useful against decoys like honeypots or systems ghosting open ports.
o Balances detection risk with deeper verification.
3. Interactive Scans:
o Engages with the service to gather detailed information (e.g., banner data).
o Example: Testing an SMTP server by issuing commands like MAIL FROM or
RCPT.
o Risk: Interaction can resemble exploitation and increases detection likelihood.
2.2.2 Purpose and Caution
• Purpose:
Identify vulnerabilities and characteristics of target systems.
• Caution:
o Must balance thoroughness with stealth to avoid detection.
o Escalation to exploitation phase requires prior approval if ethical testing.

3. Recommendations for Ethical Testing


• Incorporate Web and Newsgroup Analysis:
o Evaluate online discussions and partner sites for potential leaks.
• Adapt Scanning Techniques:
o Use passive, active, or interactive scans depending on the scope of the test.
• Minimize Legal and Security Risks:
o Avoid actions that could be perceived as exploitation without explicit
approval.
• Address Systemic Issues:
o Focus on improving information management and employee training to
reduce vulnerabilities.
This organized approach ensures a structured and effective Internet reconnaissance process
while minimizing risks.

What Is Steganography?
A steganography technique involves hiding sensitive information within an ordinary, non-
secret file or message, so that it will not be detected. The sensitive information will then be
extracted from the ordinary file or message at its destination, thus avoiding
detection. Steganography is an additional step that can be used in conjunction with
encryption in order to conceal or protect data.
Steganography is a means of concealing secret information within (or even on top of) an
otherwise mundane, non-secret document or other media to avoid detection. It comes from
the Greek words steganos, which means “covered” or “hidden,” and graph, which means “to
write.” Hence, “hidden writing.”
You can use steganography to hide text, video, images, or even audio data. It’s a helpful bit
of knowledge, limited only by the type of medium and the author’s imagination.

Different Types of Steganography


1. Text Steganography − There is steganography in text files, which entails
secretly storing information. In this method, the hidden data is encoded into
the letter of each word.

2. Image Steganography − The second type of steganography is image steganography, which


entails concealing data by using an image of a different object as a cover. Pixel intensities are
the key to data concealment in image steganography.
Since the computer description of an image contains multiple bits, images are frequently
used as a cover source in digital steganography.
The various terms used to describe image steganography include:
• Cover-Image - Unique picture that can conceal data.
• Message - Real data that you can mask within pictures. The message may be in the
form of standard text or an image.
• Stego-Image − A stego image is an image with a hidden message.
• Stego-Key - Messages can be embedded in cover images and stego-images with the
help of a key, or the messages can be derived from the photos themselves.
3. Audio Steganography − It is the science of hiding data in sound. Used digitally, it protects
against unauthorized reproduction. Watermarking is a technique that encrypts one piece of
data (the message) within another (the "carrier"). Its typical uses involve media playback,
primarily audio clips.
4. Video Steganography − Video steganography is a method of secretly embedding data or
other files within a video file on a computer. Video (a collection of still images) can function
as the "carrier" in this scheme. Discrete cosine transform (DCT) is commonly used to insert
values that can be used to hide the data in each image in the video, which is undetectable to
the naked eye. Video steganography typically employs the following file formats: H.264,
MP4, MPEG, and AVI.
5. Network or Protocol Steganography − It involves concealing data by using a network
protocol like TCP, UDP, ICMP, IP, etc., as a cover object. Steganography can be used in the
case of covert channels, which occur in the OSI layer network model.
Steganography Examples Include
• Writing with invisible ink
• Embedding text in a picture (like an artist hiding their initials in a painting they’ve
done)
• Backward masking a message in an audio file (remember those stories of evil
messages recorded backward on rock and roll records?)
• Concealing information in either metadata or within a file header
• Hiding an image in a video, viewable only if the video is played at a particular frame
rate
• Embedding a secret message in either the green, blue, or red channels of an RGB
image
Steganography can be used both for constructive and destructive purposes. For example,
education and business institutions, intelligence agencies, the military, and certified ethical
hackers use steganography to embed confidential messages and information in plain sight.
On the other hand, criminal hackers use steganography to corrupt data files or hide malware
in otherwise innocent documents. For example, attackers can use BASH and PowerShell
scripts to launch automated attacks, embedding scripts in Word and Excel documents. When
a poor, unsuspecting user clocks one of those documents open, they activate the secret,
hidden script, and chaos ensues. This process is a favored ransomware delivery method.

Wireless hacking refers to the unauthorized access, manipulation, or exploitation of wireless


networks, often to steal data, disrupt services, or gain unauthorized control over network
resources. Wireless networks, such as Wi-Fi, Bluetooth, and other RF-based
communications, are inherently more susceptible to hacking because they broadcast signals
over the air, making them accessible to anyone within range.
Types of Wireless Hacking
1. Wi-Fi Hacking
Wi-Fi networks are a primary target for hackers because they often serve as gateways
to larger systems.
o Open Networks: Public Wi-Fi networks (e.g., in cafes or airports) are often
unencrypted, making them vulnerable.
o WEP/WPA/WPA2 Cracking: Older encryption protocols like WEP are easily
crackable, and even WPA2 can be compromised with advanced techniques
like brute force or dictionary attacks.
o Man-in-the-Middle (MITM) Attacks: An attacker intercepts communication
between a user and the router to steal sensitive data.
o Evil Twin Attack: A fake Wi-Fi access point mimics a legitimate one to trick
users into connecting and divulging information.
2. Bluetooth Hacking
Bluetooth-enabled devices can be exploited if not properly secured.
o Bluejacking: Sending unsolicited messages to nearby Bluetooth devices.
o Bluesnarfing: Accessing data (contacts, messages, etc.) from a device without
permission.
o Bluebugging: Taking control of a Bluetooth device (Using backdoor) to make
calls, send messages, or access data.
3. RFID/NFC Hacking
Wireless technologies used in contactless payment systems, key cards, and ID badges
can be exploited.
o Eavesdropping: Intercepting communications between an RFID/NFC tag and
reader.
o Cloning: Copying data from an RFID/NFC tag to create a duplicate.
4. Cellular Network Hacking
Cellular communication can be intercepted or manipulated by exploiting weaknesses
in protocols like SS7.
o IMSI Catchers (Stingrays): Devices that mimic cell towers to intercept calls
and texts.
5. IoT (Internet of Things) Hacking
Devices like smart home systems, cameras, and wearables connected to wireless
networks can be compromised due to weak security.
o Default Password Exploits: Many IoT devices come with weak or default
passwords.
o DDoS Attacks: Compromised IoT devices are often used in botnets for
Distributed Denial of Service attacks.
Techniques Used in Wireless Hacking
1. Packet Sniffing
Tools like Wireshark capture wireless data packets for analysis, potentially revealing
sensitive information like passwords and session cookies.
2. Wardriving
Hackers use tools to map and analyze wireless networks while driving or walking
through areas.
3. Brute Force Attacks
Automated tools attempt various password combinations to gain access to a wireless
network.
4. Replay Attacks
An attacker captures and replays communication data to exploit the authentication
process.
5. Deauthentication Attack
A hacker sends fake deauthentication packets to a device, forcing it to reconnect and
potentially reveal credentials during the process.
6. Rogue Access Points
A malicious AP is set up to capture data from unsuspecting users who connect to it.

Tools for Wireless Hacking


Some tools commonly used by ethical hackers and malicious actors include:
• Aircrack-ng: Used for cracking WEP and WPA/WPA2 keys.
• Kismet: Wireless network detector and sniffer.
• Wireshark: Packet analysis tool.
• Reaver: Exploits vulnerabilities in WPS-enabled routers.
• Ettercap: For MITM attacks.
• Metasploit: Comprehensive framework for exploiting vulnerabilities.

Preventive Measures Against Wireless Hacking


1. Encryption
Use strong encryption protocols (WPA3 is the most secure) for Wi-Fi networks.
2. Secure Authentication
Use strong, unique passwords and implement multi-factor authentication where
possible.
3. Turn Off Unused Features
Disable WPS, Bluetooth, or other features if they are not in use.
4. Regular Updates
Keep firmware and software for routers, IoT devices, and computers up-to-date.
5. Network Segmentation
Separate sensitive systems from public networks.
6. Use VPNs
Encrypt traffic on public Wi-Fi networks using a virtual private network.

Ethical Implications
While ethical hacking (penetration testing) aims to identify and fix vulnerabilities, malicious
hacking can lead to severe consequences, including data breaches, financial loss, and
compromised privacy. Governments and organizations globally enforce strict laws to prevent
and punish wireless hacking.

Types of Firewall

A firewall is a network security device, either hardware or software-based, which monitors


all incoming and outgoing traffic and based on a defined set of security rules accepts,
rejects, or drops that specific traffic.
• Accept: allow the traffic
• Reject: block the traffic but reply with an “unreachable error”
• Drop: block the traffic with no reply
A firewall is a type of network security device that filters incoming and outgoing network
traffic with security policies that have previously been set up inside an organization. A
firewall is essentially the wall that separates a private internal network from the open
Internet at its very basic level

Firewalls can be categorized based on their generation.


1. Packet Filtering Firewall
Packet filtering firewall is used to control network access by monitoring outgoing and
incoming packets and allowing them to pass or stop based on source and destination IP
address, protocols, and ports. It analyses traffic at the transport protocol layer (but mainly
uses first 3 layers). Packet firewalls treat each packet in isolation. They have no ability to tell
whether a packet is part of an existing stream of traffic. Only It can allow or deny the packets
based on unique packet headers. Packet filtering firewall maintains a filtering table that
decides whether the packet will be forwarded or discarded. From the given filtering table,
the packets will be filtered according to the following rules:

• Incoming packets from network 192.168.21.0 are blocked.


• Incoming packets destined for the internal TELNET server (port 23) are blocked.
• Incoming packets destined for host 192.168.21.3 are blocked.
• All well-known services to the network 192.168.21.0 are allowed.

2. Stateful Inspection Firewall


A stateful firewall is a type of network security firewall that monitors the state and
characteristics of active connections, such as TCP handshakes and packet sequences, to
determine whether to allow or block network traffic. Unlike stateless firewalls that inspect
each packet independently, stateful firewalls maintain a state table to track ongoing
sessions, enabling them to make more informed decisions based on the context of a
network conversation.

Here’s a basic example of a state table:


Destination Source Destination Connection
Source IP Protocol Timestamp
IP Port Port State
ESTABLISHED 2024-12-05
192.168.1.10 172.16.0.5 55000 80 TCP
(Open) 10:12:34
QUERY (In 2024-12-05
192.168.1.11 8.8.8.8 34001 53 UDP
Progress) 10:12:36
SYN_SENT 2024-12-05
10.0.0.5 198.51.100.2 62000 443 TCP
(Waiting Reply) 10:12:38
FIN_WAIT 2024-12-05
192.168.1.12 203.0.113.7 53000 22 TCP
(Closing) 10:12:40

3. Software Firewall
A software firewall is any firewall that is set up locally or on a cloud server. When it comes to
controlling the inflow and outflow of data packets and limiting the number of networks that
can be linked to a single device, they may be the most advantageous. But the problem with
software firewall is they are time-consuming.
4. Hardware Firewall
They also go by the name “firewalls based on physical appliances.” It guarantees that the
malicious data is halted before it reaches the network endpoint that is in danger.
5. Application Layer Firewall
Application layer firewall can inspect and filter the packets on any OSI layer, up to the
application layer. It has the ability to block specific content, also recognize when certain
application and protocols (like HTTP, FTP) are being misused. In other words, Application
layer firewalls are hosts that run proxy servers. A proxy firewall prevents the direct
connection between either side of the firewall, each packet has to pass through the proxy.
6. Next Generation Firewalls (NGFW)
• Description: Combine traditional firewall functions with advanced features like
intrusion prevention, deep packet inspection, and threat intelligence.
• Pros: Highly effective against modern threats, such as malware and ransomware.
• Cons: Expensive and resource-intensive.
7. Circuit Level Gateway Firewall
This works as the Sessions layer of the OSI Model’s . This allows for the simultaneous setup
of two Transmission Control Protocol (TCP) connections. It can effortlessly allow data packets
to flow without using quite a lot of computing power. These firewalls are ineffective because
they do not inspect data packets; if malware is found in a data packet, they will permit it to
pass provided that TCP connections are established properly.
8. Stateless firewall
A stateless firewall is a type of network security device that filters packets purely based on
predefined rules, without considering the context or state of a connection. It inspects each
incoming or outgoing packet independently, using criteria like source/destination IP
addresses, port numbers, and protocols. Stateless firewalls are simple and fast but lack the
ability to track active sessions or connections.
What is Honeypot?
In cybersecurity, A honeypot in cybersecurity is a decoy system, server, or application
designed to mimic a real, vulnerable target within a network.It is set up to attract attackers,
allowing defenders to observe and analyze their methods, tools, and tactics. Honeypots can
be used to:
1. Detect Threats: Identify unauthorized access attempts and understand the behavior
of malicious actors.
2. Divert Attacks: Serve as a distraction, reducing the likelihood of successful attacks on
actual systems.
3. Collect Intelligence: Gather data on new or emerging threats to improve defensive
strategies.
4. Improve Security Measures: Test the effectiveness of existing security controls and
learn from vulnerabilities.

Types of Honeypot
1. Based on their deployment, Honeypots are divided into
• Production Honeypots: Mimic real systems and are used in actual network
environments to distract attackers and protect critical assets.
• Research Honeypots: Designed for studying attack strategies and learning about the
latest cyber threats, typically used by security researchers.

3. Based on interaction, honeypots are classified into


• Low interaction honeypots: Low interaction honeypots gives very little insight and
control to the hacker about the network. It simulates only the services that are
frequently requested by the attackers. The main operating system is not involved in
the low interaction systems and therefore it is less risky. They require very fewer
resources and are easy to deploy. The only disadvantage of these honeypots lies in
the fact that experienced hackers can easily identify these honeypots and can avoid
it.
• Medium Interaction Honeypots: Medium interaction honeypots allows more
activities to the hacker as compared to the low interaction honeypots. They can
expect certain activities and are designed to give certain responses beyond what a
low-interaction honeypot would give.
• High Interaction honeypots: A high interaction honeypot offers a large no. of
services and activities to the hacker, therefore, wasting the time of the hackers and
trying to get complete information about the hackers. These honeypots involve the
real-time operating system and therefore are comparatively risky if a hacker
identifies the honeypot. High interaction honeypots are also very costly and are
complex to implement. But it provides us with extensively large information about
hackers.
How do Honeypots Work?
• Detection and Monitoring: By analyzing the activity on honeypots, security teams
gain insights into attack techniques, patterns, and vulnerabilities. They can identify
new threats or zero-day exploits.
• Diversion: Honeypots divert attackers away from critical systems. Instead of
compromising actual assets, cybercriminals waste time and resources on the decoy.
• Research and Analysis: Researchers study attacker behavior, tactics, and tools by
observing honeypot interactions. This knowledge informs better defense strategies.
• Early Warning: If an attacker targets a honeypot, it triggers an alert. Security teams
can respond promptly to potential threats
Advantages of Honeypot
• Acts as a rich source of information and helps collect real-time data.
• Identifies malicious activity even if encryption is used.
• Wastes hackers’ time and resources.
• Improves security.
Disadvantages of Honeypot
• Being distinguishable from production systems, it can be easily identified by
experienced attackers.
• Having a narrow field of view, it can only identify direct attacks.
• A honeypot once attacked can be used to attack other systems.
• Fingerprinting(an attacker can identify the true identity of a honeypot ).
What is Honeynet?
A honeynet is made up of two or more honeypots connected via a network. Having a linked
network of honeypots can be beneficial. It allows organisations to trace how an attacker
interacts with a single resource or network point while also monitoring how a hacker moves
between network points and interacts with numerous points at the same time. The goal is to
induce hackers to believe that they have successfully breached the network. Having more
false network destinations makes the arrangement appear more realistic.
Conclusion
Honeypots are effective cybersecurity technologies for detecting, analysing, and mitigating
cyber attacks. They help organisations strengthen their security measures by replicating
hackers’ targets. Despite their high cost and associated risks, honeypots play an important
role in diverting attackers away from real assets and improving overall security.
IDS and IPS are crucial network security technologies often confused or used
interchangeably. So, what’s the difference between IDS and IPS, and which one is the best
choice for your organizational needs?
What Is IDS (Intrusion Detection System)?
An Intrusion Detection System (IDS) is a security tool designed to detect unauthorized
access, misuse, or anomalies within a network or system. It analyzes network traffic, system
logs, or host activities to identify potential threats or attacks. IDS can be configured to alert
administrators when suspicious activity is detected, allowing them to take proactive steps to
prevent harm.
The types of IDS include:
• Network-based: A network-based IDS (NIDS) is deployed at strategic points within a
computer network, examining incoming and outgoing traffic. It focuses on
monitoring network protocols, traffic patterns, and packet headers.
• Host-based: A host-based IDS (HIDS) is installed on individual machines or servers
within an IT environment. It focuses on monitoring system logs and files to detect
events such as unauthorized access attempts and abnormal changes to the system.
• Hybrid: A hybrid IDS combines both network-based and host-based approaches. This
type of IDS provides a more complete view of events within the IT ecosystem.
• Protocol-Based Intrusion Detection System (PIDS): Protocol-based intrusion
detection system (PIDS) comprises a system or agent that would consistently reside
at the front end of a server, controlling and interpreting the protocol between a
user/device and the server. It is trying to secure the web server by regularly
monitoring the HTTPS protocol stream and accepting the related HTTP protocol. As
HTTPS is unencrypted and before instantly entering its web presentation layer then
this system would need to reside in this interface, between to use the HTTPS.
• Application Protocol-Based Intrusion Detection System (APIDS): An
application Protocol-based Intrusion Detection System (APIDS) is a system or agent
that generally resides within a group of servers. It identifies the intrusions by
monitoring and interpreting the communication on application-specific protocols.
For example, this would monitor the SQL protocol explicitly to the middleware as it
transacts with the database in the web server.

Signature-Based IDS
A Signature-Based IDS identifies intrusions by comparing incoming data packets or
activities against a database of known attack patterns or signatures.
Characteristics:
• Database-driven: Relies on pre-defined rules or signatures of known attacks.
• Effective against known threats: Quickly identifies and alerts administrators about
attacks already documented.
• Low false positives: Since it looks for specific patterns, legitimate activities rarely
trigger alerts.
• Requires updates: Needs frequent updates to stay current with new attack
signatures.
Example:
Detecting a SQL injection attempt based on a known malicious payload like:
sql
Copy code
' OR '1'='1' --
Drawback:
• Ineffective against unknown attacks or zero-day exploits, as no signature exists for
new threats.

Anomaly-Based IDS
An Anomaly-Based IDS uses machine learning or statistical analysis to detect unusual
patterns or behaviors that deviate from normal activity.
Characteristics:
• Behavior-driven: Builds a baseline of normal network or system behavior.
• Effective against unknown threats: Can identify zero-day attacks and new threat
patterns.
• High false positives: Legitimate activities that deviate from the baseline can be
flagged as anomalies.
• Requires tuning: Needs training and refinement to accurately distinguish between
normal and malicious activities.
Example:
Flagging a user account that suddenly downloads large amounts of sensitive data
outside of regular working hours.
Drawback:
• More prone to false alarms, especially during the initial stages of deployment.

Comparison Table:
Feature Signature-Based IDS Anomaly-Based IDS
Detection Matches known Detects deviations from
Approach signatures normal behavior
Strong against known Strong against unknown
Effectiveness
threats threats
Requires regular Requires training and
Maintenance
signature updates tuning
False Positives Low High
Example Detecting a virus from a Detecting unusual
Scenario known pattern network spikes
Both methods are often used together in a hybrid approach for comprehensive
security coverage.

IDS tools work by analyzing network packets and comparing them with known attack
signatures or behavioral patterns. If the IDS believes that it has identified an intruder, it
sends an alert to system administrators or security teams. These alerts contain detailed
information about the detected activity, letting employees quickly investigate and react. IDS
plays a vital role in maintaining the security and integrity of computer networks and systems.
The benefits of IDS include:
• Early threat detection: IDS tools can proactively defend against cyberattacks by
detecting potential threats at an early stage of the intrusion.
• Greater visibility: IDS solutions enhance organizations’ visibility into their IT
environment, helping security teams respond to attacks more quickly and effectively.
The limitations of IDS include:
• False positives and false negatives: IDS tools aren’t perfect; they can generate both
false positives (labeling benign events as threats) and false negatives (failing to detect
real threats).
• Inability to prevent attacks: IDS solutions can detect attacks once they occur, but
they are unable to prevent them from occurring in the first place.
What Is IPS (Intrusion Prevention System)?
What is IPS in networking, and how does it differ from IDS? An intrusion prevention system
(IPS) is a cybersecurity solution that builds on the capabilities of IDS. IPS cyber security tools
cannot only detect potential intrusions but also actively prevent and mitigate them.
As with IDS, the types of IPS include:
• Network-based: A network-based IPS (NIPS) is deployed at strategic points within a
computer network, often at network gateways. It can protect the organization’s
entire network, including multiple connected hosts and devices.
• Host-based: A host-based IPS (HIPS) is deployed on a specific machine or server,
offering protection to a single host. It monitors system activities and can take actions
to block or limit access to system resources.
• Hybrid: A hybrid IPS combines both network-based and host-based approaches. For
example, a hybrid IPS may be primarily network-based but also include features for
protecting individual hosts.
The benefits of IPS include:
• Real-time threat prevention: IPS can block or mitigate identified threats in real time,
providing 24/7 automated protection for IT environments.
• Enhanced network defense: Unlike IDS tools, IPS systems are able not only to detect
threats but take action to defend against them by blocking malicious and suspicious
traffic.
The limitations of IPS include:
• Performance impact: IPS tools must examine all incoming and outgoing traffic, which
can introduce latency and slow down network performance.
• Frequent updates: For maximum effectiveness, IPS solutions need to be regularly
updated with the latest information about threat signatures, which can require
significant time investment and expertise.
Differences Between IDS and IPS
Now that we’ve discussed IDS and IPS definitions, what can we say about IDS vs. IPS?
The main difference between IDS and IPS is that while IDS tools are only capable of detecting
intrusions, IPS tools can actively prevent them as well. This basic distinction has several
important repercussions for the question of IDS vs. IPS:
• Functionality: IDS tools are restricted to detecting threats, while IPS tools can both
detect and prevent them.
• Response: IDS tools send alerts when a threat is detected, while IPS tools can
automatically block threats based on predefined security policies or rules.
• Workflow: IDS tools passively monitor data flow, while IPS tools actively inspect
network packets and take action to prevent or mitigate threats.
Advances in IDS/IPS Technology
IDS/IPS technology has significantly evolved since it was introduced. Some developments in
IDS/IPS solutions include:
• Machine learning and AI: IDS/IPS tools can use machine learning and artificial
intelligence to enhance their detection capabilities, learning from historical data
about cyber threats.
• Behavioral analysis: IDS/IPS tools can use a technique known as behavioral analysis:
comparing network traffic or user behavior to a baseline that helps identify
anomalies or deviations.
• Cloud-based deployments: With the increasing adoption of cloud computing, many
IDS/IPS tools can now be deployed in cloud-based IT environments to make them
more flexible and scalable.
IDS/IPS and Regulatory Compliance
Installing IDS and IPS tools may be necessary for organizations to meet regulatory
compliance requirements. The use cases of IDS and IPS for regulatory compliance include:
• Threat detection and incident response: IDS and IPS solutions actively monitor
network traffic, system logs, and events to detect and defend against security
threats.
• Protecting sensitive data: By blocking unauthorized access to confidential
information, IDS and IPS are invaluable tools for complying with data privacy
standards.
• Logging and reporting: IDS and IPS solutions generate system logs and provide
reporting capabilities that companies can use in the event of an external audit.
Many data privacy and security regulations explicitly or implicitly require organizations to
implement IDS and IPS tools. For example, PCI DSS is a security standard for businesses that
handle payment card information. According to PCI DSS Requirement 11.4, companies must
“use network intrusion detection and/or intrusion prevention techniques to detect and/or
prevent intrusions into the network.”
The GDPR (General Data Protection Regulation) is another regulation that may require
IDS/IPS solutions. The GDPR is a law in the European Union that safeguards the privacy of
citizens’ personal data. According to the GDPR, businesses must take “appropriate technical
and organizational measures” to protect this data against breaches and unauthorized access,
which could include deploying an IDS/IPS.

Vulnerabilities are weaknesses in a system that gives threats the opportunity to compromise
assets. All systems have vulnerabilities. Even though the technologies are improving but the
number of vulnerabilities are increasing such as tens of millions of lines of code, many
developers, human weaknesses, etc. Vulnerabilities mostly happened because of Hardware,
Software, Network and Procedural vulnerabilities.
1. Hardware Vulnerability:
A hardware vulnerability is a weakness which can used to attack the system hardware
through physically or remotely.
For examples:
1. Old version of systems or devices
2. Unprotected storage
3. Unencrypted devices, etc.
2. Software Vulnerability:
A software error happen in development or configuration such as the execution of it can
violate the security policy. For examples:
1. Lack of input validation
2. Unverified uploads
3. Cross-site scripting
4. Unencrypted data, etc.
3. Network Vulnerability:
A weakness happen in network which can be hardware or software.
For examples:
1. Unprotected communication
2. Malware or malicious software (e.g.:Viruses, Keyloggers, Worms, etc)
3. Social engineering attacks
4. Misconfigured firewalls
4. Procedural Vulnerability:
A weakness happen in an organization operational methods.
For examples:
1. Password procedure – Password should follow the standard password policy.
2. Training procedure – Employees must know which actions should be taken and what
to do to handle the security. Employees must never be asked for user credentials
online. Make the employees know social engineering and phishing threats.

You might also like