Ethical hacking process_U5_L3
Ethical hacking process_U5_L3
Evaluating Results
• Assess the result to see what has been uncovered
• Evaluating the result and correlating the specific vulnerabilities
discovered is a skill that gets better with experience
ETHICAL HACKING PROCESS
• Submit a formal report to upper management or customer, outlining the
results
Moving on
• When finished with ethical hacking tests, one still need to implement
his/her analysis and recommendations to make systems secure
• New security vulnerabilities continuously appear
• At any time, everything can change, especially after software upgrades,
adding computer systems or applying patches.
• So plan to test regularly
CRACKING THE HACKER MINDSET
• Knowing what hackers and malicious users want helps to understand
how they work
• This understanding better prepares for ethical hacking tests
• Hackers can be classified by both their abilities and underlying
motivations
• Some are skilled and their motivations are benign; they may be hacking
for the pursuit of knowledge and thrill of the challenge
• At the other end, hackers with malicious intent may hack for political,
social, competitive and financial purposes
• Malicious hackers are usually few steps ahead of the technology
designed to protect the systems
CRACKING THE HACKER MINDSET
Examples of how hackers work:
• Evading an Intrusion Prevention System by changing their MAC address
or IP address every few minutes to get into network without being
completely blocked
• Exploiting a physical security weakness
• Bypassing web access controls by changing a malicious site’s URL into
its dotted decimal IP address equivalent
• Using unauthorized software that would otherwise be blocked at the
firewall by changing the default TCP port that it runs on
• Setting up a wireless “evil twin” near a local Wi-Fi hotspot to attract
Internet surfers onto a rouge network where there information can be
captured and missued
CRACKING THE HACKER MINDSET
• Using an overly trusting colleague’s user ID and password to gain access
to sensitive information
• Unplugging the power cord or Ethernet connection to a networked
security camera that monitors access to the computer room or other
sensitive area and subsequently gaining unmonitored access
• Performing SQL injection or password cracking against a website