Introduction to E th ical H ack in g Module 01 Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker In t r o d u c t io n to E t h ic a l H a c k in g M o d u le 0 1 E n g i n e e r e d b y H a c k e r s . P r e s e n t e d b y P r o f e s s io n a ls . E t h ic a l H M o d u le a c k in g 0 1 : a n d o u n t e r m In t r o d u c tio n E x a m Module 01 Page 2 C to e a s u r e s E th ic a l v 8 H a c k in g 3 1 2 -5 0 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker CEH S e c u r ity N e w s - . . ■ ■. _ * י ז י ■ • Iן ? י ! ■ ; ■־ ■ל־ ■ H o m e | A b o u t U s P o r t f o lio \ | C o n t a c t U s ■ יי | S e r v ic e Oct 17 2012, 0:45am 1ST Z e ro -d a y A tta c k s a r e M e an er, m o re R a m p a n t th a n w e e v e r th o u g h t C om puter attacks th a t ta rg e t undisclosed v u ln e ra b ilitie s are m ore com m on and last longer than many security researchers previously th o u g h t. The fin d in g comes fro m a new study th a t tracked the num ber and duration o f so-called zero-day exploits over three years. The typical zero-day attack, by d e fin itio n , e xp lo its s o ftw a re fla w s before th e y are publicly disclosed. It lasts on average 312 days, w ith some lasting as long as tw o and a half years, according to th e study by researchers fro m antivirus p rovider Symantec. O f the 18 zero-day attacks the researchers found betw een 2008 and 2 0 1 1 ,1 1 o f the m previously w e n t undetected. Recent revelations th a t th e S tuxnet m alw are th a t sabotaged Iranian nuclear facilities relied on five zero days already underscored th e th re a t posed by such attacks. But th e researchers said th e ir findings suggest th e menace may be even greater. h ttp : //a r s te c h n ic a .c o m Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. N e w s Z e r o - d a y e v e r A tta c k s a r e M e a n e r , m o r e R a m p a n t th a n w e th o u g h t S o u rce : h ttp ://a rs te c h n ic a .c o m C o m p u te r th a n a tta c k s th a t ta rg e t u n d is c lo s e d v u ln e ra b ilitie s a re m o re com m on m a n y s e c u rity re s e a rc h e rs p re v io u s ly th o u g h t. T h e fin d in g c o m e s f r o m and la s t a new lo n g e r s tu d y th a t tr a c k e d th e n u m b e r a n d d u r a tio n o f s o -c a lle d z e ro - d a y e x p lo its o v e r t h r e e y e a rs . The ty p ic a l d is c lo s e d . ze ro -d a y It la s ts a c c o rd in g to th e on a tta c k , by a ve ra g e s tu d y by d e fin itio n , 312 days, e x p lo its w ith re se a rch e rs fro m s o ftw a re som e la s tin g a n tiv iru s as fla w s b e fo re th e y lo n g as t w o and p ro v id e r S y m a n te c . a tta c k s th e re s e a rc h e rs fo u n d b e tw e e n 2 0 0 8 a n d 2 0 1 1 , 11 o f th e m O f th e a re p u b lic ly a h a lf ye a rs , 18 z e ro -d a y p re v io u s ly w e n t u n d e te c te d . R e c e n t r e v e la tio n s t h a t t h e S t u x n e t m a lw a r e t h a t s a b o ta g e d Ira n ia n n u c le a r fa c ilitie s re lie d o n fiv e z e ro d a y s a lre a d y u n d e r s c o r e d th e t h r e a t p o s e d b y su ch a tta c k s . B u t th e r e s e a r c h e r s s a id t h e ir fin d in g s s u g g e s t th e m e n a c e m a y b e e v e n g re a te r. "Z e ro -d a y a tta c k s a re d iffic u lt to p re v e n t because th e y e x p lo it unknow n v u ln e ra b ilitie s , fo r w h ic h th e r e a re n o p a tc h e s a n d n o a n tiv iru s o r in t r u s io n - d e te c tio n s ig n a tu r e s ," th e y w r o te . "It seem s th a t, Module 01 Page 3 as lo n g as s o ftw a re w ill have bugs and th e d e v e lo p m e n t of e x p lo its fo r new Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker v u ln e ra b ilitie s w ill b e a p ro fita b le a c tiv ity , w e w ill b e e x p o s e d to z e r o - d a y a t t a c k s . In f a c t , 6 0 p e r c e n t o f t h e z e r o - d a y v u l n e r a b i l i t i e s w e i d e n t i f y in o u r s t u d y w e r e s u g g e s ts th a t th e r e a re m any m o re z e ro -d a y a tta c k s th a n not known b e fo re , w h ic h p re v io u s ly t h o u g h t — p e rh a p s m o re t h a n t w ic e as m a n y . " R e s e a rc h e rs L e y la B ilg e and Tudor e x e c u ta b le file s c o lle c te d f r o m M a rch 2012. T hre e d is c lo s e d in 2009, o f th e ze ro -d a y s ix w e r e D u m itra s c o n d u c te d e x p lo its t h e y d is c lo s e d in 2010, fo u n d and tw o r e p u ta tio n d a ta th e re s e a rc h e rs re lie d o n p r e v e n te d t h e m a tta c k o n m a n y v e rs io n s o f M ic r o s o ft W in d o w s , w h ic h z e ro d a y u n til n o w , h a d th e a s y s te m a tic s tu d y 11 m illio n c o m p u te rs a ro u n d th e w o rld fro m th a t a n a ly z e d F e b ru a ry 2 0 0 8 to w e re d is c lo s e d in 2008, seven w e re d is c lo s e d in 2011. (The fro m w e re b in a ry i d e n t i f y i n g a t t a c k s in 2 0 1 2 . ) A n a p p e a rs to s h o rte s t d u ra tio n : ju s t 19 days. A n have gone u n d e te c te d as a e x p lo it o f a s e p a ra te s e c u rity b u g in t h e W i n d o w s s h e ll h a d t h e l o n g e s t d u r a t i o n : 3 0 m o n t h s . Of th e 18 a tta c k s m o n ito re d . E ig h t s tu d ie d , o f th e c o n v e n tio n a l w is d o m 15 ta rg e te d e x p lo its w e re 102 or d ire c te d fe w e r of at th re e or th e 11 fe w e r m illio n h o s ts . h o s ts The th a t d a ta w e re c o n firm s th a t z e ro -d a y a tta c k s a re ty p ic a lly re s e rv e d fo r h ig h -v a lu e ta rg e ts . O f th e r e m a in in g t h r e e a tta c k s , o n e w a s e x p lo ite d b y S tu x n e t a n d a n o th e r w a s e x p lo ite d b y C o n fic k e r, th e v iru le n t w o r m d is c o v e re d in 2 0 0 8 t h a t h a s i n f e c t e d m illio n s o f c o m p u te r s c o n t in u e s t o d o so ). T h e S t u x n e t a n d C o n fic k e r e x p lo it t a r g e t e d re s p e c tiv e ly . T h e re s u lts , t h e r e s e a r c h e r s s a id , d e m o n s t r a t e d 1 .5 m illio n th e (and re p o rte d ly a n d 4 5 0 ,0 0 0 h o s ts d iv id e n d s re tu rn e d b y z e ro - d a y e x p lo its , w h ic h c a n c o m m a n d p ric e s as h ig h as $ 2 5 0 ,0 0 0 . "F or e x a m p le , a p p ro x im a te ly w ro te . " T h is C o n fic k e r 3 7 0 ,0 0 0 e x a m p le e x p lo itin g th e v u ln e ra b ility C V E -2 0 0 8 -4 2 5 0 m a c h in e s w it h o u t b e in g d e te c te d illu s tra te s th e e ffe c tiv e n e s s o ver m o re o f z e ro -d a y m anaged th a n tw o v u ln e ra b ilitie s to in fe c t m o n th s ," th e y fo r c o n d u c tin g s te a lth c y b e r-a tta c k s ." The re se a rch e rs c a u tio n e d l im it a t io n s , c a u s in g it t o T h re a ts once a tta c k s th e ir m e th o d of c o lle c tin g m is s 2 4 z e r o - d a y a tta c k s t r a c k e d R e p o rt o v e r th e z e ro -d a y th a t tim e p e rio d becam e s tu d ie d . p u b lic file s b y S y m a n te c 's o w n S u rp ris in g ly , th e k n o w le d g e — b y n u m b e r o f a t t a c k v a r ia n t s a ls o ro s e , w i t h e x e c u ta b le m a rg in s had s ig n ific a n t In t e r n e t S e c u rity num ber o f a tta c k s o f tw o - to o n ly g re w 1 0 0 ,0 0 0 -fo ld . The 183 to 8 5 ,0 0 0 m o re v a ria n ts d e te c te d ea ch day. O n e p o s s i b l e c a u s e o f t h e s u r g e i n n e w f i l e s , t h e r e s e a r c h e r s s a i d , is t h a t t h e e x p l o i t s m a y h a v e b e e n re p a c k a g e d v e rs io n s o f th e s a m e a tta c k . " H o w e v e r , i t is d o u b t f u l t h a t r e p a c k i n g a l o n e c a n a c c o u n t f o r a n i n c r e a s e b y u p t o f i v e o r d e r s o f m a g n i t u d e , " t h e y w r o t e . " M o r e l i k e l y , t h i s i n c r e a s e is t h e r e s u l t o f t h e e x t e n s i v e r e - u s e o f f i e l d p r o v e n e x p l o i t s in o t h e r m a l w a r e . " Copyrights: ©2012 Conde Nast Author: Dan Goodin h t t p : / / a r s t e c h n i c a . c o m / s e c u r i t v / 2012 / 10/ z e r o - d a v - a t t a c k s - a r e - m e a r 1e r - a r 1d - m o r e - p l e n t i f u l - th a n -th o u g h t/ Module 01 Page 4 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker CEH M o d u le O b je c tiv e s J D a ta B re a c h In v e s tig a tio n s R e p o rt J H a c k in g P hases J E s s e n tia l T e rm in o lo g y J T yp e s o f A tta c k s o n a S yste m J E le m e n ts o f In f o r m a tio n S e c u rity J W h y E th ic a l H a c k in g Is N e c e s s a ry J T o p In fo r m a tio n S e c u rity A tta c k . J S kills o f an E th ica l H a c k e r r j In c id e n t M a n a g e m e n t P rocess ׳j T yp e s o f S e c u rity P o licie s V e c to rs J In f o r m a tio n S e c u rity T h re a ts J H a c k in g vs. E th ic a l H a c k in g J E ffe c ts o f H a c k in g o n B usiness j V u ln e r a b ility R esea rch J W h o Is a H a c k e r? j W h a t Is P e n e tra tio n T e s tin g ? b a s Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. M Sf o d u l e O b je c t iv e s —1 I t is i m p o r t a n t t o b e a r in m i n d t h a t a t t a c k e r s b r e a k i n t o s y s t e m s f o r v a r i o u s r e a s o n s a n d p u r p o s e s . T h e r e f o r e , i t is i m p o r t a n t t o c o m p r e h e n d h o w m a l i c i o u s h a c k e r s e x p l o i t s y s t e m s a n d t h e p r o b a b l e r e a s o n s b e h i n d t h e a t t a c k s . A s S u n T z u p u t it in t h e A r t o f W a r , " I f y o u k n o w y o u r s e l f b u t n o t t h e e n e m y , f o r e v e r y v i c t o r y g a i n e d , y o u w i l l a l s o s u f f e r a d e f e a t . " I t is t h e d u t y of s y s te m a d m in is tra to rs a g a in s t e x p lo its and b y k n o w in g n e tw o rk th e s e c u rity e n e m y — th e p ro fe s s io n a ls m a lic io u s to g u a rd h a cke r(s)— w h o th e ir seek to in fra s tru c tu re use th e sam e in f r a s t r u c t u r e f o r ille g a l a c tiv itie s . E t h i c a l h a c k i n g is t h e p r o c e s s o f c h e c k i n g a n d t e s t i n g t h e o r g a n i z a t i o n n e t w o r k f o r t h e p o s s i b l e lo o p h o le s a n d v u ln e ra b ilitie s . w h ite h a ts . They p e rfo rm T h e in d iv id u a ls o r e x p e rts w h o p e r fo r m h a c k in g in e th ic a l w ays, w ith o u t e th ic a l h a c k in g a re c a lle d c a u s in g any dam age to th e c o m p u t e r s y s te m , th e r e b y in c re a s in g th e s e c u rity p e r im e te r o f a n o rg a n iz a tio n . Module 01 Page 5 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures Introduction to Ethical Hacking T h is m o d u le c o v e rs : 0 H a c k in g P h a se s E s s e n tia l T e r m in o l o g y 0 T y p e s o f A tta c k s o n a S y s te m 0 E le m e n ts o f I n fo r m a tio n S e c u rity 0 W h y E t h i c a l H a c k i n g Is N e c e s s a r y 0 T o p I n fo r m a tio n S e c u rity A tta c k 6 S k ills o f a n E th ic a l H a c k e r 0 In c id e n t M a n a g e m e n t P ro ce ss 0 T y p e s o f S e c u r it y P o lic ie s 0 V u ln e r a b ility R e s e a rch 0 W h a t Is P e n e t r a t i o n T e s t i n g ? 0 D a ta B re a c h In v e s tig a tio n s R e p o rt 0 V e c to rs 0 In fo r m a tio n S e c u rity T h re a ts 0 H a c k in g vs. E th ic a l H a c k in g 0 E ffe c ts o f H a c k in g o n B u s in e s s 0 W h o Is a H a c k e r ? Module 01 Page 6 Ethical Hacking and Countermeasures Copyright © by EC-C0UI1Cil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker H a c k in g P hases T ypes of A tta c k s In fo rm a tio n S e c u r ity C o n tro ls Copyright © by EC-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. M o d u l e F lo w '־ In fo rm a tio n in fo rm a tio n and d is ru p tio n , a n d s e c u rity re fe rs in fo rm a tio n d e s tru c tio n . a g re a t th re a t. In an p ro te c tin g s y s te m s fro m or s a fe g u a rd in g u n a u th o riz e d access, F o r m o s t o rg a n iz a tio n s , in fo r m a tio n s e c u re d . If s e n s itiv e in f o r m a t io n fa c e to fa lls in t o w r o n g a tte m p t to is t h e hands, th e n th e u n d e rs ta n d how to any k in d of d is c lo s u re , s e n s itiv e a lte ra tio n , c ritic a l re s o u rc e t o re s p e c tiv e o rg a n iz a tio n s e cu re such c ritic a l be m ay in fo rm a tio n re s o u rc e s , fir s t w e w ill lo o k a t an o v e r v ie w o f in f o r m a t io n s e c u rity . i-g ! In f o r m a t io n S e c u rity O v e r v ie w H a c k in g P h a se s f c —־ s ' In fo r m a tio n S e c u rity T h re a ts 1— י T yp e s o f A tta c k s a n d A tta c k V e c to rs 4 k - !״ T h is s e c t io n H a c k in g C o n c e p ts c o v e rs e le m e n ts ן o f in fo rm a tio n r^ U In fo r m a tio n S e c u rity C o n tro ls s e c u rity , th e s tre n g th o f th e c o m p o n e n t tria n g le (s e c u rity , fu n c tio n a lity , a n d u s a b ility ), a n d e s s e n tia l te r m in o lo g y . Module 01 Page 7 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking I n t e r n Exam 312-50 Certified Ethical Hacker e t C r i m e C u r r e n t R e p o r t : I C CEH 3 (•rtifwd itk itjl I n t e r n e t C r im e C o m p la in t C e n t e r (IC 3 ) 20 0 5 20 0 6 2008 20 07 2009 ___________ 2010 2011 htp://www.ic3.gov Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. I n t e r n e t C r i m e C u r r e n t R e p o r t : I C 3 S o u rce : h ttp ://w w w .ic 3 .g o v T h e f o l l o w i n g is t h e c r i m e r e p o r t d a t a f r o m p a rtn e rs h ip a m o n g th e F ederal B u re a u C e n te r (N W 3 C ), a n d th e B u re a u I C 3 ; t h e I n t e r n e t C r i m e C o m p l a i n t C e n t e r ( I C 3 ) is a o f In v e s tig a tio n o f J u s tic e A s s is ta n c e c r im e c o m p la in t s a re in c r e a s in g d a ily . F ro m th e re w e re in c re a s e d to 2 3 1 ,4 9 3 3 3 6 ,6 5 5 . c r im e W hen c o m p la in ts , c o m p a re d N a tio n a l W h ite (B JA ). A c c o r d in g t o C o lla r C rim e IC 3 , o n l i n e In te rn e t t h e g r a p h , y o u c a n o b s e r v e t h a t in t h e y e a r 2 0 0 5 , w h e re a s to (F B I), t h e 2009, in th e year In te r n e t c rim e 2009, c o m p la in ts c o m p la in ts in t h e d ra s tic a lly year 2011 d e c re a s e d to s o m e e x te n t. Module 01 Page 8 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker 3 5 0 ,0 0 0 336,655 303,809 3 0 0 .0 0 0 2 5 0 .0 0 0 275,284 231,493 207,492 2 0 0 .0 0 0 1 5 0 .0 0 0 1 0 0 .0 0 0 5 0 ,0 0 0 0 Module 01 Page 9 ______ ״ 206,884 314,246 r d C o m p la in ts r e c e iv e d by I C 3 Yearly Comparison of Complaints Received via the IC3 Website I n t e r n e t C r im e C o m p la in t C e n te r (IC 3 ) Ethical Hacking and Countermeasures Copyright © by EC-C0linCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker D a ta B re a c h In v e s tig a tio n s R e p o rt Types of hacking by CEH and percent of records r 28% / 97% H a c k in g P h y s ic a l E n v ir o n m e n ta l I 0% I 0% P e rc e n t o f B re a c h e s a n d P e rc e n t o f R e c o rd s h ttp : //w w w .v e r iz o n b u s in e s s .c o m Copyright © by IC-CM ICil. All Rights Reserved. Reproduction Is Strictly Prohibited. D n — The d a ta a t a B r e a c h I n v e s t i g a t i o n s R e p o r t S o u rce : h ttp ://w w w .v e riz o n b u s in e s s .c o m b re a c h in v e s tig a tio n s re p o rt fro m V e riz o n B u s in e s s sh o w s th e ty p e s o f h a c k in g by p e r c e n t o f b r e a c h e s a n d p e r c e n t o f r e c o r d s . F r o m t h e r e p o r t , i t is c l e a r t h a t m o s t o f t h e s e c u r i t y b r e a c h e s h a p p e n i n g t o d a y a r e b e c a u s e o f h a c k i n g . T h e r e f o r e , in o r d e r t o p r o t e c t y o u r s e l f f r o m d a ta o r s e c u r it y b re a c h e s , y o u s h o u ld te s t y o u r n e t w o r k s e c u rity a g a in s t h a c k in g . Module 01 Page 10 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker M a lw a r e 28% / 97% H a c k in g I 58 % / 99% S o c ia l 22% I 38% M is u s e ......... .......... 7% / <1% P h y s ic a l E rro r E n v ir o n m e n ta l 17% I <1 % tmrnmitmmt H 7 % / <1% I I 0% / 0% P e rc e n t o f B re a c h e s a n d P e rc e n t o f R e c o rd s FIGURE 1.1: D ata B rea ch In v e s tig a tio n R e p o rt Module 01 Page 11 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker E s s e n tia l T e r m in o lo g y H a c k V a lu e CEH T a r g e t o f E v a lu a t io n It is the notion among hackers that something is worth doing or is interesting An IT system, product, or component that is identified/subjected to a required security evaluation E x p lo it Z e ro -D a y A tta c k An attack that exploits computer application vulnerabilities before the software developer releases a patch for the vulnerability A defined way to breach the security of an IT system through vulnerability D a is y C h a in in g V u ln e r a b ility Existence of a weakness, design, or implementation error that can lead to an unexpected and undesirable event compromising the security of the system Hackers who get away with database theft usually complete their task, then backtrack to cover their tracks by destroying logs, etc. Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. E s s e n t ia l x ן T H a c k Hack e r m i n o l o g y V a lu e v a lu e in te re s tin g . H a c k e rs is th e n o tio n am ong h a cke rs m ig h t fe e l th a t b re a k in g d o w n th a t th e s o m e th in g is w o rth d o in g or is t o u g h e s t n e t w o r k s e c u r ity m ig h t g iv e t h e m g r e a t s a t i s f a c t i o n , a n d t h a t i t is s o m e t h i n g t h e y a c c o m p l i s h e d t h a t n o t e v e r y o n e c o u l d d o . E x p lo it An e x p lo it is v u ln e ra b ility . T h e te r m n e tw o rk . A n u n a n tic ip a te d a d e fin e d way to b re a c h th e s e c u rity of an e x p l o i t is u s e d w h e n a n y k i n d o f a t t a c k h a s t a k e n e x p lo it can a ls o b e h a v io r to be d e fin e d occur on as m a lic io u s s o f t w a r e le g itim a te s o ftw a re IT s y s te m th ro u g h p la c e o n a s y s te m o r c o m m a n d s th a t can or h a rd w a re or cause b y ta k in g a d v a n ta g e of th e v u ln e ra b ilitie s . V u ln e r a b ilit y V u l n e r a b i l i t y is a w e a k n e s s i n d e s i g n o r a n i m p l e m e n t a t i o n e r r o r t h a t c a n l e a d t o a n u n e x p e c t e d a n d u n d e s i r a b l e e v e n t c o m p r o m i s i n g t h e s e c u r i t y o f t h e s y s t e m . In s i m p l e w o r d s , a v u ln e ra b ility is l o o p h o le , lim ita tio n , o r w e a kn e ss th a t becom es a so u rce fo r an a tta c k e r to e n te r in to th e s y s te m b y b y p a s s in g v a rio u s u s e r a u th e n tic a tio n s . Module 01 Page 12 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking T a r g e t 3 Exam 312-50 Certified Ethical Hacker o f E v a lu a t io n / A ta rg e t s u b je c te d to a o f e v a lu a tio n re q u ire d is a n s e c u rity IT s y s t e m , e v a lu a tio n . p ro d u c t, T h is k in d o r c o m p o n e n t th a t of e v a lu a tio n h e lp s is i d e n t i f i e d th e / e v a lu a to r u n d e rs ta n d th e fu n c tio n in g , te c h n o lo g y , a n d v u ln e ra b ilitie s o f a p a rtic u la r s y s te m o r p ro d u c t. Z e r o - d a y In a A tta c k z e ro -d a y a tta c k , th e a tta c k e r e x p lo its th e v u ln e ra b ilitie s in th e c o m p u te r a p p lic a tio n b e fo r e th e s o ftw a r e d e v e lo p e r re le a s e s a p a tc h f o r t h e m . D a is y A tta c k e rs b a c k tra c k to s y s te m s a n d C h a in in g w ho get away c o v e r th e ir tra c k s use th e m by d a ta b a s e d e s tro y in g f o r m a lic io u s a c tiv itie s . th e y use o th e rs ' s y s te m s to p e rfo r m Module 01 Page 13 w ith th e ft lo g s , u s u a lly e tc . T h e c o m p le te a tta c k e rs It b e c o m e s d i f f i c u l t t o th e ir ta s k g a in c o n tro l id e n tify th e and th e n o f o th e r a t t a c k e r as ille g a l a c tiv itie s . Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker E le m e n t s o f I n f o r m a t i o n S e c u r it y CEH A s ta te o f w e ll- b e in g o f in fo r m a t io n a n d in fr a s tr u c tu r e in w h ic h th e p o s s ib ility o f t h e f t , t a m p e r in g , a n d d is r u p t io n o f in f o r m a t io n a n d s e rv ic e s is k e p t lo w o r to le r a b le Assurance that the information is accessible only to those authorized to have access Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users In te g rity A v a ila b ility The trustworthiness of data or resources in terms of preventing improper and unauthorized changes Guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message 9 A u th e n tic ity Authenticity refers to the characteristic of a communication, document or any data that ensures the quality o f being genuine Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. ,jp ► E ׳'־'*"■״ le m In fo rm a tio n in fra s tru c tu re s e rv ic e s e n t s is lo w f I n s e c u rity in w h i c h kept o th e or f o r m a is d e fin e d t i o n S as: "A e c u r it y s ta te of w e ll-b e in g p o s s ib ility o f th e ft, ta m p e r in g , a n d to le ra b le ." It re lie s on th e fiv e m a jo r of d is ru p tio n e le m e n ts in fo rm a tio n and o f in fo rm a tio n o f: and c o n fid e n tia lity , in te g rity , a v a ila b ility , a u th e n tic ity , a n d n o n -r e p u d ia tio n . -״ C o n f id e n t ia lit y C o n fid e n tia lity a u th o riz e d to is th e a ssu ra n ce th a t th e in fo rm a tio n is a c c e s s ib le h a ve access. C o n fid e n tia lity b re a c h e s m a y o c c u r d u e to o n ly im p ro p e r d a ta to th o s e h a n d lin g o r a h a c k in g a t t e m p t . f r I n t e g r it y zL ---------- I n t e g r i t y is t h e t r u s t w o r t h i n e s s o f d a t a o r r e s o u r c e s i n t e r m s o f p r e v e n t i n g i m p r o p e r a n d u n a u t h o r iz e d c h a n g e s , t h e a s s u ra n c e t h a t in f o r m a t io n ca n b e re lie d u p o n t o b e s u ffic ie n tly a c c u r a t e f o r its p u r p o s e . A ■ "f? v a ila b ilit y ■ A v a i l a b i l i t y is t h e Module 01 Page 14 a ssu ra n ce th a t th e s y s te m s re s p o n s ib le f o r d e liv e rin g , s to rin g , a n d Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker p ro c e s s in g in f o r m a t io n a re a c c e s s ib le w h e n r e q u ir e d b y a u th o r iz e d u s e rs . A u t h e n t ic it y A u th e n tic ity re fe rs to th e c h a ra c te ris tic o f a c o m m u n ic a tio n , d o c u m e n t, o r a n y d a ta t h a t e n s u re s th e q u a lit y o f b e in g g e n u in e o r n o t c o r r u p te d f r o m th e o rig in a l. T h e m a jo r ro le s o f a u t h e n t i c a t i o n i n c l u d e c o n f i r m i n g t h a t t h e u s e r is w h o h e o r s h e c l a i m s t o be a n d e n s u rin g th e m e s s a g e is a u t h e n t i c a n d n o t a l t e r e d o r f o r g e d . B i o m e t r i c s , s m a r t c a r d s , a n d d i g i t a l c e r t i f i c a t e s a re u se d t o e n s u re a u th e n tic ity o f d a ta , tra n s a c tio n s , c o m m u n ic a tio n s , o r d o c u m e n ts . p g jj N o n - r e p u d ia t io n N o n -re p u d ia tio n re fe rs to th e a b ility to e n s u re th a t a p a rty to a c o n tra c t or a c o m m u n ic a tio n c a n n o t d e n y th e a u t h e n t ic it y o f t h e ir s ig n a tu r e o n a d o c u m e n t o r th e s e n d in g o f a m e s s a g e t h a t t h e y o r i g i n a t e d . I t is a w a y t o g u a r a n t e e t h a t t h e s e n d e r o f a m e s s a g e c a n n o t la te r d e n y h a v in g se n t th e m essage and th a t th e re c ip ie n t c a n n o t d e n y h a v in g re c e iv e d th e m essage. Module 01 Page 15 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker T h e S e c u r ity , F u n c t io n a lit y , a n d CEH U s a b ilit y T r i a n g l e | j : M o vin g th e ball to w a rd s se cu rity means less fu n c tio n a lity and u sa b ility | F u n cc t i o n a l i t y (F e a tu re s) » j S e c u rity ( R e s tr ic tio n s ) W .is * U s a b ility (G U I) Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. T h e S e c u r it y , F u n c t i o n a l i t y , a n d U s a b i l i t y T r i a n g l e T e c h n o l o g y is e v o l v i n g a t a n u n p r e c e d e n t e d r a t e . A s a r e s u l t , n e w p r o d u c t s t h a t r e a c h th e m a rk e t te n d o rig in a lly sam e to be e n g in e e re d f o r e a s y -to -u s e d e v e lo p e d pace o v e rlo o k as th e in c re a s in g fo r th e "h o n e s t" u s e r's p ro file . v u ln e ra b ilitie s b u ilt-in rese a rch and M o re o v e r, d u rin g th e ra th e r th a n a c a d e m ic d u rin g in te n d e d d e fa u lt s e c u rity m e c h a n is m s th is s e c u re c o m p u tin g . T e c h n o lo g y , p u rp o se s, e v o lu tio n , d e p lo y m e n t has s y s te m of m e a n s u s e rs h a v e to not th e be e v o lv e d d e s ig n e rs s y s te m . m o re at th e o fte n H o w e v e r, c o m p e te n t. As c o m p u t e r s a r e u s e d f o r m o r e a n d m o r e r o u t i n e a c t i v i t i e s , i t is b e c o m i n g i n c r e a s i n g l y d i f f i c u l t f o r s y s te m a d m in is tr a to rs and o th e r s y s te m p ro fe s s io n a ls to a llo c a te reso u rce s e x c lu s iv e ly fo r s e c u r in g s y s te m s . T h is in c lu d e s t im e n e e d e d t o c h e c k lo g file s , d e t e c t v u ln e r a b ilit ie s , a n d a p p ly s e c u rity u p d a te p a tc h e s . R o u tin e a c tiv itie s consum e a d m in is tra tio n . T h e re re g u la r and p ro fe s s io n a ls in n o v a tiv e to reso u rce s. O rig in a lly , "hack" c o m p u te r s y s te m s . Module 01 Page 16 b a s is . c o n s ta n tly T e c h n o lo g y ) to s y s te m is l i t t l e t i m e d e p lo y T h is has m o n ito r m e a n t to H a c k in g a d m in is tra to rs ׳ to possess re q u ire d and tim e , m e a su re s an d in c re a s e d d e fe n d e x tra o rd in a ry th e IC T le a v in g s e cu re dem and fo r ( In fo rm a tio n c o m p u te r g re a t p ro fic ie n c y . le s s tim e c o m p u tin g s k ills t o fo r d e d ic a te d and a s e c u rity C o m m u n ic a tio n e x te n d H o w e v e r, to d a y th e re v ig ila n t reso u rce s on th e a re lim its of a u to m a te d Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker to o ls a n d c o d e s a v a ila b le o n t h e I n t e r n e t t h a t m a k e it p o s s ib le f o r a n y o n e w it h a w ill a n d d e s ire to hack and succeed. M e r e c o m p r o m is e o f th e s e c u rity o f a s y s te m d o e s n o t d e n o te success. T h e re a re w e b s ite s th a t in s is t o n " t a k i n g b a c k t h e n e t " as w e l l a s p e o p l e w h o b e l i e v e t h a t t h e y a r e d o i n g a ll a f a v o r b y p o s tin g e x p lo it d e ta ils . T h e s e c a n a c t as a d e t r i m e n t a n d c a n b r i n g d o w n t h e s k ill le v e l r e q u i r e d t o b e c o m e a s u c c e s s fu l a tta c k e r. T h e e a s e w it h w h ic h s y s te m v u ln e r a b ilitie s ca n b e e x p lo ite d h a s in c re a s e d w h ile t h e k n o w le d g e c u rv e re q u ire d to p e rfo r m su ch e x p lo its has s h o rte n e d . T h e c o n c e p t o f th e e lite /s u p e r a tta c k e r is a n i l l u s i o n . H o w e v e r , t h e f a s t - e v o l v i n g g e n r e o f " s c r i p t k i d d i e s " is l a r g e l y c o m p r i s e d o f l e s s e r s k ille d in d iv id u a ls h a v in g se co n d -h a n d k n o w le d g e im p e d im e n ts c o n trib u tin g to th e g ro w th o f p e rfo rm in g o f s e c u rity in fra s tr u c tu r e e x p lo its . One lie s in t h e o f th e m a in u n w illin g n e s s o f e x p lo ite d o r c o m p r o m is e d v ic tim s t o r e p o r t t h e in c id e n t f o r fe a r o f lo s in g t h e g o o d w ill a n d fa ith of th e ir e m p lo y e e s , in fo rm a tio n a s s e ts c u s to m e rs , in flu e n c in g th e p a rtn e rs , m a rke t a n d /o r has seen of lo s in g m o re m a rke t c o m p a n ie s sh a re . The th in k in g tre n d tw ic e of b e fo re r e p o r tin g in c id e n ts to la w e n fo r c e m e n t f o r fe a r o f b a d p re ss a n d n e g a tiv e p u b lic ity . T h e in c r e a s in g ly n e t w o r k e d e n v ir o n m e n t , w i t h c o m p a n ie s o f t e n h a v in g t h e i r w e b s it e as a s in g le p o in t o f c o n ta c t c o u n te rm e a s u re s a cro ss g e o g ra p h ic a l to p re v e n t e x p lo its b o u n d a rie s , th a t can m akes re s u lt in it c ritic a l f o r lo s s of an a d m in is tra to rs im p o r ta n t to ta k e re a so n why c o r p o r a t i o n s n e e d t o in v e s t in s e c u r i t y m e a s u r e s t o p r o t e c t t h e i r i n f o r m a t i o n a s s e ts . Module 01 Page 17 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking M o d u l e F Exam 312-50 Certified Ethical Hacker lo w l r ' 5 ,ד So fa r we d is c u s s e d in fo rm a tio n s e c u rity . Now we w ill d is c u s s th re a ts and a tta c k v e c to r s o f in fo r m a t io n s e c u rity . |~ U In fo r m a tio n S e c u rity O v e r v ie w H a c k in g P h a se s I n f o r m a tio n S e c u rity T h re a ts * - . . | T yp e s o f A tta c k s Eel------- M a n d A tta c k V e c to rs H a c k in g C o n c e p ts T h is s e c tio n in tro d u c e s you to L to p in fo rm a tio n ^ ־ In fo r m a tio n S e c u rity C o n tro ls s e c u rity a tta c k v e c to rs , th e t h r e a t s t o v a lu a b le in fo r m a tio n , a n d th e g o a ls o f a tta c k e r s w h o p e r fo r m p o s s ib le s e c u rity a tta c k s o n in fo rm a tio n s y s te m s . Module 01 Page 18 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker T o p I n f o r m a t i o n S e c u r it y CEH A tta c k V e c to rs V irtua liza tion and Organized Un-patched Targeted Social Cloud C om puting Cyber Crime Softw are M alw ares N etw o rkin g ?a י IF 3I 't t A ויי, Insider Threats ! j׳ In fo rm a tio n S y s te m s Complexity of Computer Infrastructure ?ft 9 Compliance to Govt. Laws and Regulations Mobile Device Security Inadequate Security Policies Network Applications Lack o f Cyber Security Professionals Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. T o p An in fo rm a tio n I n f o a tta c k s y s te m r m a v e c to r to t i o is p e rfo rm n a S p a th e c u r it y or m eans A t t a c k by w h ic h V e c t o r s an a tta c k e r g a in s access to an m a lic io u s a c t iv it ie s . T h is a t t a c k v e c t o r e n a b le s a n a t t a c k e r t o t a k e a d v a n t a g e o f t h e v u l n e r a b i l i t i e s p r e s e n t in t h e i n f o r m a t i o n s y s t e m in o r d e r t o c a r r y o u t a p a rtic u la r a tta c k . A lth o u g h th e re a tta c k v e c to rs a re som e com e in tra d itio n a l m any fo rm s ; a tta c k s one v e c to rs cannot fro m w h ic h p r e d i c t in w h i c h a tta c k fo rm can an be p e rfo rm e d , a tta c k v e c to r can com e. The fo llo w in g a re th e p o s s ib le to p a tta c k v e c to rs th ro u g h w h ic h a tta c k e rs can a tta c k in fo r m a tio n s y s te m s : 0 V ir t u a liz a t io n a n d C lo u d C o m p u t in g 0 O rg a n iz e d C y b e r C rim e 0 U n p a tc h e d S o ftw a re 0 T a rg e te d M a lw a re 0 S o c ia l N e t w o r k i n g 0 In s id e r T h re a ts Module 01 Page 19 Ethical Hacking and Countermeasures Copyright © by EC-COUIlCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking 0 B o tn e ts 0 Lack o f C y b e r S e c u rity P ro fe s s io n a ls 0 N e tw o r k A p p lic a tio n s 0 I n a d e q u a t e S e c u r it y P o lic ie s 0 M o b ile D e v ic e S e c u r ity 0 C o m p lia n c e w it h G o v t. L a w s a n d R e g u la tio n s 0 C o m p le x ity o f C o m p u te r In fra s tru c tu re 0 H a c k tiv is m Module 01 Page 20 Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking M o I n f o Exam 312-50 Certified Ethical Hacker t i v e s , r m a G t i o o a ls , n S a n d O e c u r it y b j e A c t i v e s o f t t a c k s A t t a c k s = M o t i v e ( G o a l) + M e t h o d + V u l n e r a b i l i t y A tta c k s A tta c k e rs ha ve m o tiv e s o r g o a ls such as d is r u p tin g G o a ls b u s in e s s c o n tin u ity , in fo r m a tio n t h e ft, d a ta m a n ip u la tio n s , o r ta k in g re ve n g e A m o tiv e o rig in a te s o u t o f th e n o tio n th a t th e ta r g e t s y s te m s to re s o r p ro c e s s e s s o m e th in g v a lu a b le an d th is M o tiv e s lead s to th r e a t o f an a tta c k o n th e system A tta c k e rs t r y v a rio u s to o ls , a tta c k m e th o d s , a n d / te c h n iq u e s to e x p lo it v u ln e r a b ilitie s in a c o m p u te r ' / O b je c tiv e s s ystem o r s e c u rity p o lic y a n d c o n tro ls to a c h ie v e t h e ir m o tiv e s Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. M — -E l S o t i v e s , e c u r it y G A o a ls , a n d O b je c t iv e s o f I n f o r m a t i o n t t a c k s A tta c k e r s g e n e r a lly h a v e m o tiv e s o r g o a ls o r o b je c tiv e s b e h in d p e r f o r m in g in fo r m a t io n s e c u rity a tta c k s . It m ay be to d is ru p t th e b u s in e s s c o n tin u ity of th e ta rg e t o rg a n iz a tio n , to s te a l v a lu a b le in f o r m a t io n , f o r th e s a k e o f c u r io s ity , o r e v e n t o ta k e r e v e n g e o n t a r g e t o rg a n iz a tio n . T h e r e f o r e , th e s e m o tiv e s o r g o a ls d e p e n d o n t h e a tta c k e r 's s ta te o f m in d , f o r w h a t re a s o n h e o r s h e is c a r r y i n g o u t s u c h a n a c t i v i t y . O n c e , t h e a t t a c k e r d e t e r m i n e s h is /h e r g o a l, h e o r s h e ca n a c c o m p l i s h t h e g o a l b y a d o p t i n g v a r i o u s t e c h n i q u e s t o e x p l o i t v u l n e r a b i l i t i e s in a n i n f o r m a t i o n s y s te m o r s e c u rity p o lic y a n d c o n tro ls . Module 01 Page 21 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker In f o r m a t io n S e c u r ity T h r e a ts 0 0 © 0 0 CEH 0 0 N a tu ra l P h y s ic a l H um an T h re a ts S e c u rity T h re a ts T h re a ts © N a tu ra l dis a s te rs Loss o r d a m a g e o f © H ackers © In sid e rs Q S ocial e n g in e e rin g s y ste m re so u rce s Q Q Q F lo o d s © P hysical in tru s io n © S a b o ta g e , e s p io n a g e E a rth q u a k e s H u rric a n e s © a n d e rro rs Lack o f k n o w le d g e a n d a w a re n e s s 0 0 0 0 0 , 0 I Copyright © by E C - G t n c i. All Rights Reserved. Reproduction is Strictly Prohibited. I n f o r m a t i o n S e c u r it y T h r e a t s I n f o r m a t io n s e c u r ity t h r e a t s a re b r o a d ly c la s s ifie d in t o t h r e e c a te g o r ie s , as fo llo w s : N a tu r a l T h r e a ts N a tu ra l th re a ts an y n a tu re -c re a te d in c lu d e n a tu r a l d is a s te rs s u c h as e a rth q u a k e s , h u rric a n e s , flo o d s , o r d is a s te r th a t c a n n o t b e s to p . In fo rm a tio n dam age o r lo s t d u e t o n a tu ra l t h r e a t s c a n n o t b e p r e v e n t e d a s n o o n e k n o w s in a d v a n c e t h a t t h e s e t y p e s o f t h r e a t s w i l l o c c u r . H o w e ve r, yo u can im p le m e n t a fe w s a fe g u a r d s a g a in s t n a tu r a l d is a s te rs b y a d o p t in g d is a s te r r e c o v e r y p la n s a n d c o n t in g e n c y p la n s . P h y s ic a l S e c u r it y T h r e a ts P h y s ic a l t h r e a t s m a y i n c lu d e lo s s o r d a m a g e o f s y s t e m th e ft, and p h y s ic a l im p a c t. P h y s ic a l im p a c t o n d a m a g e , e ith e r in te n tio n a lly o r u n in te n tio n a lly . reso u rce s can re s o u rc e s t h r o u g h fire , w a te r , be due to a c o llis io n o r o th e r S o m e t im e s , p o w e r m a y a ls o d a m a g e h a r d w a r e use d to s to re in fo rm a tio n . H u m a n Hum an Module 01 Page 22 T h r e a ts th re a ts in c lu d e th re a ts o f a tta c k s p e r fo r m e d by b o th in s id e rs a n d o u ts id e rs . Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking In s id e r a tta c k s a tta c k s re fe r to a tta c k e rs p o s tu re re fe r to can o f th e a tta c k s be th e Exam 312-50 Certified Ethical Hacker a tta c k s p e rfo rm e d p e rfo rm e d by b ig g e s t t h r e a t in fo rm a tio n to by d is g ru n tle d m a lic io u s p e o p le in fo rm a tio n s y s te m , w h ile or m a lic io u s n o t w ith in s y s te m th e as t h e y o u ts id e r a tta c k e rs a p p ly e m p lo y e e s . O u ts id e r o rg a n iz a tio n . m ay know th e In s id e r s e c u rity m a n y tr ic k s s u c h as s o c ia l e n g in e e r in g t o le a rn t h e s e c u rity p o s tu r e o f t h e in f o r m a t io n s y s te m . Module 01 Page 23 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking I n 4r f o r m a t i o Exam 312-50 Certified Ethical Hacker n S e c u r it y T h r e a t s ( C o n t ’ d ) K ir H u m a n t h r e a t s c a n b e f u r t h e r c la s s ifie d in t o t h r e e t y p e s , as f o llo w s : N ״ by e tw o r k T h r e a ts A n e t w o r k is d e f i n e d c o m m u n ic a tio n fro m c h a n n e ls to as t h e s h a re c o lle c tio n reso u rce s o f c o m p u te rs a nd o th e r h a rd w a re and in fo rm a tio n . As th e c o n n e c te d in fo rm a tio n tra v e ls o n e c o m p u te r to th e o th e r th r o u g h th e c o m m u n ic a tio n c h a n n e l, a m a lic io u s p e rs o n m a y b re a k in to th e c o m m u n ic a tio n c h a n n e l a n d s te a l th e in fo rm a tio n tra v e lin g o v e r th e n e tw o rk . T h e a tta c k e r ca n im p o s e v a rio u s th re a ts o n a ta r g e t n e tw o r k : 0 In fo rm a tio n g a th e rin g 0 S n iffin g a n d e a v e s d r o p p in g 0 S p o o fin g 0 S e s s io n h ija c k in g a n d m a n - i n - t h e - m i d d le a tta c k s 0 SQL in je c tio n 0 A R P P o is o n in g 0 P a s s w o rd -b a s e d a tta c k s Module 01 Page 24 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker © D e n ia l o f s e rv ic e a tta c k © C o m p ro m is e d -k e y a tta c k vL H o s t T h r e a ts H o s t t h r e a t s a re d ir e c te d a t a p a r tic u la r s y s te m o n w h ic h v a lu a b le in f o r m a t io n re s id e s . A tta c k e rs try to b re a ch th e s e c u rity o f th e in fo rm a tio n s y s te m re so u rce . T he fo llo w in g a re p o s s ib le th r e a t s t o t h e h o s t: 0 M a lw a re a tta c k s 0 T a rg e t F o o tp rin tin g 0 P a s s w o rd a tta c k s 0 D e n ia l o f s e rv ic e a tta c k s 0 A rb itra ry c o d e e x e c u tio n © U n a u th o riz e d access © P riv ile g e e s c a la tio n 0 B a ck d o o r A tta c k s © P h y s ic a l s e c u r it y t h r e a t s A p p lic a t io n If th e p a rtic u la r a tta c k s . p ro p e r a p p lic a tio n , A tta c k e rs ta k e T h r e a ts s e c u rity th e m e a su re s a p p lic a tio n a d v a n ta g e of a re m ig h t be not c o n s id e re d v u ln e ra b le v u ln e ra b ilitie s to p re se n t d u rin g d iffe re n t in th e d e v e lo p m e n t ty p e s of th e o f a p p lic a tio n a p p lic a tio n to s te a l or d a m a g e t h e in f o r m a t io n . T h e f o llo w in g a re p o s s ib le th r e a t s t o t h e a p p lic a tio n : © D a ta /In p u t v a lid a tio n © A u th e n tic a tio n a n d A u th o riz a tio n a tta c k s © C o n fig u ra tio n m a n a g e m e n t © In f o r m a t io n d is c lo s u re © S e s s io n m a n a g e m e n t is s u e s © B u f f e r o v e r f l o w is s u e s 0 C ry p to g ra p h y a tta c k s 0 P a ra m e te r m a n ip u la tio n 0 Im p r o p e r e r r o r h a n d lin g a n d e x c e p tio n m a n a g e m e n t 0 A u d it in g a n d lo g g in g is s u e s Module 01 Page 25 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker CEH In fo r m a tio n W a rfa re T h e te r m in fo r m a t io n w a rfa re o r In fo W a r re fe rs to th e u se o f in f o r m a t io n a n d c o m m u n ic a tio n te c h n o lo g ie s (IC T) to ta k e c o m p e titiv e a d v a n ta g e s o v e r an o p p o n e n t t \ D e fe n s iv e I n f o r m a t io n W a r fa r e ( O ffe n s iv e I n f o r m a t io n W a r fa r e It refers to all stra te g ie s an d a c tio n s to It refers to in fo rm a tio n w a rfa re th a t involves d e fe n d a g a in s t a tta c k s o n ICT assets a tta c k s a g a in s t ICT assets o f an o p p o n e n t \ D e fe n s iv e W a rfa re a. Prevention Deterrence Alerts Detection Emergency Preparedness Response Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. % I n f o The r m te rm a t i o n W in fo rm a tio n a r f a r e w a rfa re or In fo W a r re fe rs to th e use of in fo rm a tio n and c o m m u n i c a t i o n t e c h n o l o g i e s (IC T ) t o t a k e c o m p e t i t i v e a d v a n t a g e s o v e r a n o p p o n e n t . D e f e n s i v e I n f o r m a t i o n W a r f a r e : It r e f e r s t o a ll s t r a t e g i e s a n d a c t i o n s t o d e f e n d a g a i n s t a t t a c k s o n IC T a s s e t s . O ffe n s iv e In fo rm a tio n W a rfa re : It r e f e r s t o in fo rm a tio n w a rfa re t h a t in v o lv e s a tta c k s a g a in s t IC T a s s e t s o f a n o p p o n e n t . D e fe n s iv e W a r fa r e O ffe n s iv e W a r fa r e P reve ntion D ete rren ce A le rts D ete ctio n Em ergency Preparedness Response FIGURE 1.2: D e fe n s iv e a n d O ffe n s iv e W a rfa re D ia g ra m Module 01 Page 26 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker CEH IP v 6 S e c u r ity T h r e a ts A u to C o n f ig u r a t io n T h r e a t s IPv6 enables auto-configuration o f IP networks, which may leave user vulnerable to attacks if the netw ork is not configured properly and securely from the very beginning U n a v a ila b ilit y R e p u ta tio n - b a s e d P r o t e c t io n Current security solutions use reputation o f IP addresses to filte r ou t known sources o f malware; vendors w ill take tim e to develop reputationbased protection fo r IPv6 I n c o m p a t ib ilit y o f L o g g in g S y s te m s IPv6 uses 128-bit addresses, which are stored as a 39-digit string whereas IPv4 addresses stored in a 15-character field; logging solutions designed for IPv4 may not w ork on IPv6 based networks Rate Limiting Problem Administrators use rate lim itin g strategy to slow down the automated attack tool; however, it is impractical to rate lim it at the 128-bit address level Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. I P v 6 S e c u r it y C o m p a re d to T h r e a t s IP v4 , IP v 6 h a s a n im p ro v e d le v e l o f s e c u rity a n d c o n f id e n t ia lit y f o r t h e s e c u rity m e c h a n is m in fo rm a tio n tra n s fe rre d th a t a ssu re s a h ig h e r o v e r a n e tw o rk . H o w e v e r, I P v 6 is s t i l l v u l n e r a b l e . I t s t i l l p o s s e s s e s i n f o r m a t i o n s e c u r i t y t h r e a t s t h a t i n c l u d e : A u to C o n f ig u r a t io n T h r e a ts IP v 6 e n a b le s a u t o - c o n f ig u r a t io n o f IP n e t w o r k s , w h i c h m a y le a v e u s e r v u ln e ra b le to a t t a c k s i f t h e n e t w o r k is n o t c o n f i g u r e d p r o p e r l y a n d s e c u r e l y f r o m t h e b e g i n n i n g . U n a v a ila b ilit y C u rre n t s e c u rity R e p u ta tio n - b a s e d s o lu tio n s use th e P r o te c tio n re p u ta tio n of IP a d d r e s s e s to filte r out know n s o u r c e s o f m a l w a r e ; v e n d o r s w i l l t a k e t i m e t o d e v e l o p r e p u t a t i o n - b a s e d p r o t e c t i o n f o r IP v 6 . e 5 .— I n c o m . IP v 6 p a t ib ilit y uses a d d re s s e s a re s to re d 1 2 8 -b it o f L o g g in g a d d re s se s, w h ic h S y s te m a re s to re d s as a 3 9 -d ig it s trin g , w h e re a s IP v 4 in a 1 5 - c h a r a c t e r f i e l d ; lo g g in g s o l u t i o n s d e s i g n e d f o r IP v 4 m a y n o t w o r k o n IP v6 -b a se d n e tw o rk s . Module 01 Page 27 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking R a te L im Exam 312-50 Certified Ethical Hacker it in g A d m in is tra to rs P r o b le m use a ra te lim itin g s tra te g y to s lo w down th e a u to m a te d a tta c k to o l; h o w e v e r , i t is i m p r a c t i c a l t o r a t e l i m i t a t t h e 1 2 8 - b i t a d d r e s s l e v e l . Module 01 Page 28 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker IP v 6 S e c u r ity T h r e a ts q e ( C o n t ’d ) (•itifwtf | \\ ttfciu! Nm Im C o m p le x ity o f N e tw o r k M anagem ent Tasks D e fa u lt IP v 6 A c tiv a tio n <M> IPv6 may be activated w ith o u t ad m in is tra to r's know ledge, which w ill leave IPv4-based security controls ineffective A dm inistrators may a d o p t easy-torem em b er addresses (::10,::20,::FOOD, ::C 5 C 0 o r simply IPv4 last o cte t fo r dual stack) leading to potential vulnerability N 4 <r *־־ ±3 t± O v e r lo a d in g o f P e r im e te r S e c u r it y C o n t r o ls C o m p l e x i t y in V u l n e r a b i l i t y A ssessm ent IPv6 has a 40-byte fixed header w ith an addon "extension header" tha t may be chained, which require a complex processing by various security controls systems such as routers, security gateways, firewalls and IDSes OO IPv6's 128-bit address space makes active scanning o f in fra stru ctu re fo r unauthorized o r vulnerable systems m ore com plex Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. I P v 6 S e c u r it y T h r e a t s ( C o n t ’ d ) Y o u m a y a ls o f in d t h e f o l l o w i n g t h r e a t s w h e n u s in g IP v6 : D e fa u lt IP v 6 A c t iv a t io n IP v 6 m a y b e a c t iv a t e d w ith o u t th e a d m in is tr a to r's k n o w le d g e , w h ic h w ill le a v e IP v 4 - b a se d s e c u rity c o n tro ls in e ffe c tiv e . [1 - j ם C o m p le x it y A d m in is tra to rs o f N m ay e tw o r k adopt M a n a g e m e n t e a s y -to -re m e m b e r T a s k s a d d re s s e s (: : 1 0 , : : 2 0 , : : fo o d , c 5 c o o r s im p ly IP v 4 la s t o c t e t f o r d u a l s ta c k ) le a d in g t o a p o te n tia l v u ln e r a b ility . C c— * ־ o m p le x it y in V u ln e r a b ilit y A s s e s s m e n t I P v 6 ׳s 1 2 8 - b i t a d d r e s s s p a c e m a k e s a c t i v e s c a n n i n g o f i n f r a s t r u c t u r e f o r u n a u t h o r i z e d o r v u ln e ra b le s y s te m s m o r e c o m p le x . O v e r lo a d in g IP v 6 c h a in e d , o f P e r im has a 4 0 -b y te w h ic h re q u ire s fix e d c o m p le x e te r S e c u r it y h e a d e r w ith p ro c e s s in g an by C a d d -o n v a rio u s o n tr o ls " e x te n s io n s e c u rity h e a d e rs" c o n tro ls th a t s y s te m s m ay be such as r o u t e r s , s e c u r i t y g a t e w a y s , f i r e w a l l s , a n d ID S . Module 01 Page 29 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker IP v 6 S e c u r ity T h r e a ts EH ( C o n t ’d ) tthKJl IlMkM IPv4 to IPv6 Translation Issu e s T ra n sla tin g IPv4 tra ffic to IPv6 m ay re s u lt in a p o o r im p le m e n ta tio n and m ay p ro v id e a p o te n tia l a tta c k v e c to r S e c u r i t y I n f o r m a t i o n a n d E v e n t M a n a g e m e n t ( S I E M ) P r o b le m s Every IPv6 h o s t can have m u ltip le IPv6 addresses s im u lta n e o u sly, w h ic h leads to c o m p le x ity o f log o r e ve n t c o rre la tio n Denlal-of-Servlce (DOS) O ve rlo a d in g o f n e tw o rk s e c u rity and c o n tro l devices can s ig n ific a n tly re d u ce th e a v a ila b ility th re s h o ld o f n e tw o rk resources le a d in g to DoS attacks Trespassing IPv6's ad vanced n e tw o rk disco ve ry fe a tu re s can be e x p lo ite d by attackers tra v e rs in g th ro u g h y o u r n e tw o rk an d accessing th e re s tric te d resources Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. I P v 6 S e c u r it y T h r e a t s ( C o n t ’ d ) W W W T h e f o l l o w i n g IP v 6 s e c u r it y t h r e a t s c a n a ls o c a u s e s e r i o u s d a m a g e t o y o u r n e t w o r k : a IP v 4 to IP v 6 T r a n s la t io n Is s u e s T r a n s l a t i n g IP v 4 t r a f f i c t o IP v 6 m a y r e s u l t in p o o r i m p l e m e n t a t i o n a n d m a y p ro v id e a p o te n tia l a tta c k v e c to r. S e c u r it y M P r o b le m I n f o r m a t io n a n d E v e n t M a n a g e m e n t (S IE M ) s E v e r y IP v 6 h o s t c a n h a v e m u l t i p l e IP v 6 a d d r e s s e s s im u l t a n e o u s l y , w h i c h le a d s t o c o m p l e x i t y o f lo g o r e v e n t c o r r e la tio n . D e n ia l- o f- s e r v ic e O v e rlo a d in g of n e tw o rk (D O S ) s e c u rity and c o n tro l d e v ic e s can s ig n ific a n tly re d u ce th e a v a ila b ility th r e s h o ld o f n e t w o r k re s o u rc e s , le a d in g t o D oS a tta c k s . T r e s p a s s in g IP v 6 's a d v a n c e d n e tw o rk d is c o v e ry fe a tu r e s can be e x p lo ite d by a tta c k e rs w ho can tra v e rs e th ro u g h y o u r n e tw o rk a n d access th e re s tric te d re s o u rc e s . Module 01 Page 30 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker CEH F lo w (•rtifwd itkitjl ^ י ^יי יייH a c k in g P hases In fo rm a tio n S e c u r ity T ypes of A tta c k s C o n tro ls Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. M o d u l e F lo w S o f a r w e h a v e d is c u s s e d i n f o r m a t i o n s e c u r i t y , its t h r e a t s a n d a t t a c k v e c t o r s . N o w w e w ill d is c u s s h o w a n a t t a c k e r c o m p r o m i s e s i n f o r m a t i o n s e c u r it y w i t h t h e h e lp o f a t t a c k v e c t o r s . |~ U In fo r m a tio n S e c u rity O v e r v ie w H a c k in g P h a se s In fo r m a tio n S e c u rity T h re a ts * - . . | T yp e s o f A tta c k s Eel------^ a n d A tta c k V e c to rs H a c k in g C o n c e p ts L ^ ־ In fo r m a tio n S e c u rity C o n tro ls T h is s e c tio n w ill f a m ilia r iz e y o u w i t h t h e c o n c e p t o f e th ic a l h a c k in g , h o w it d iffe r s f r o m h a c k in g , t h e e f f e c t s o f h a c k in g a c t iv it ie s o n b u s in e s s , a n d d i f f e r e n t c la s s e s o f a t t a c k e r s . Module 01 Page 31 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker H a c k in g v s . E th ic a l H a c k in g J H a c k in g re fe rs t o e x p lo it in g s y s te m v u ln e r a b ilit ie s a n d c o m p r o m is in g s e c u r it y c o n t r o ls t o g a in u n a u th o r iz e d o r in a p p r o p r ia t e a c c e ss t o t h e s y s te m re s o u rc e s J It in v o lv e s m o d if y in g s y s te m o r a p p lic a t io n f e a t u r e s t o a c h ie v e a g o a l o u ts id e o f t h e c r e a to r 's o r ig in a l p u rp o s e J E th ic a l h a c k in g in v o lv e s t h e u se o f h a c k in g to o ls , tr ic k s , a n d te c h n iq u e s t o i d e n t i f y v u ln e r a b ilit ie s so as t o e n s u re s y s te m s e c u r ity J It fo c u s e s o n s im u la tin g te c h n iq u e s u s e d b y a tta c k e rs t o v e r if y t h e e x is te n c e o f e x p lo it a b le v u ln e r a b ilit ie s in t h e s y s te m s e c u r ity Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. H - — ״ a c k i n g v s . E t h i c a l H a c k i n g M o s t p e o p le d o n o t u n d e rs ta n d th e d iffe re n c e These tw o p e rfo rm in g te rm s can h a c k in g be d iffe re n tia te d a c tiv ity . H o w e ve r, o n th e b e tw e e n b a s is o f t h e u n d e rs ta n d in g th e h a c k in g a n d e th ic a l h a c k in g . in te n tio n s tru e o f th e in te n tio n s p e o p le of h a cke rs w ho can a re be q u ite d iffic u lt. H a c k in g H a c k in g c o n tro ls to m o d ify in g re fe rs g a in to e x p lo itin g u n a u th o riz e d s y s te m or or a p p lic a tio n s y s te m in a p p ro p ria te fe a tu re s to v u ln e ra b ilitie s access a c h ie v e to th e a goal and c o m p ro m is in g s y s te m o u ts id e reso u rce s. o f th e It c r e a to r 's s e c u rity in v o lv e s o rig in a l p u rp o se . E t h ic a l H E th ic a l v u ln e ra b ilitie s a c k in g h a c k in g so as to in v o lv e s th e e n s u re s y s te m use o f h a c k in g to o ls , s e c u rity . It f o c u s e s tric k s , a n d on te c h n iq u e s to s im u la tin g te c h n iq u e s id e n tify used by a t t a c k e r s t o v e r i f y t h e e x i s t e n c e o f e x p l o i t a b l e v u l n e r a b i l i t i e s in t h e s y s t e m s e c u r i t y . Module 01 Page 32 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker E f f e c t s o f H a c k i n g o n B u s in e s s CEH U rtifM IthKJl lUckM According to the Symantec 2012 State of information survey, information costs businesses worldwide $1.1 trillio n annually Theft of customers' personal inform ation may risk the business's reputation and invite lawsuits Hacking can be used to steal, pilfer, and redistribute intellectual property leading to business loss Botnets can be used to launch various types of DoS and other web-based attacks, which may lead to business down-time and significant loss of revenues Attackers may steal corporate secrets and sell them to competitors, compromise critical financial I information, and leak information to rivals I C o m p r o m is e In f o r m a t io n Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. E f f e c t s o A c c o rd in g to f H a c k i n g th e o n S y m a n te c B 2012 u s in e s s S ta te of In fo rm a tio n su rve y, in fo rm a tio n c o s ts b u s in e s s e s w o r l d w i d e $ 1 . 1 t r i l l i o n a n n u a l l y . E v e r y b u s in e s s m u s t p r o v i d e s t r o n g s e c u r i t y f o r its c u s t o m e r s ; o t h e r w i s e t h e b u s in e s s m a y p u t its r e p u t a t i o n a t s ta k e a n d m a y e v e n fa c e la w s u it s . A tta c k e rs use h a c k in g b u s in e s s e s a n d in t u r n te c h n iq u e s to to s te a l, p ilfe r, and m a k e fin a n c ia l g a in . A tta c k e r s re d is trib u te in te lle c tu a l p ro p e rty m a y p r o fit, b u t th e v ic tim 's of b u s in e s s m u s t f a c e h u g e f i n a n c i a l lo s s e s a n d m a y e v e n lo s e its r e p u t a t i o n . O n c e a n a t t a c k e r g a in s c o n t r o l o v e r t h e u s e r 's s y s t e m , h e o r s h e c a n a c c e s s a ll t h e f ile s t h a t a r e s to re d on th e c o m p u te r, in c lu d in g p e rs o n a l or c o rp o ra te fin a n c ia l in fo rm a tio n , c re d it ca rd n u m b e r s , a n d c l i e n t o r c u s t o m e r d a t a s t o r e d o n t h a t s y s t e m . If a n y s u c h i n f o r m a t i o n fa lls i n t o th e w ro n g hands, O rg a n iz a tio n s m ust c u s to m e r d a ta and it m ay p ro v id e c re a te a chaos s tro n g its u p c o m i n g in s e c u rity th e to n o rm a l its fu n c tio n in g c ritic a l re le a s e s o r id e a s . If t h e d a ta of in fo rm a tio n is a l t e r e d an o rg a n iz a tio n . s o u rce s c o n ta in in g o r s to le n , a c o m p a n y m a y lo s e c r e d i b i l i t y a n d t h e t r u s t o f its c u s t o m e r s . In a d d i t i o n t o t h e p o t e n t i a l f i n a n c i a l lo s s t h a t m a y o c c u r , t h e lo s s o f i n f o r m a t i o n m a y c a u s e a b u s in e s s t o lo s e a c r u c ia l c o m p e t i t i v e a d v a n t a g e o v e r its riv a ls . S o m e t i m e s a t t a c k e r s u s e b o t n e t s t o la u n c h v a r i o u s t y p e s o f D o S a n d o t h e r w e b b a s e d a tta c k s . T h is c a u s e s t h e t a r g e t b u s in e s s s e rv ic e s t o g o d o w n , w h ic h in t u r n m a y le a d t o lo s s o f r e v e n u e s . Module 01 Page 33 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking T he re a re K n o w le d g e m any th in g s th a t b u s in e s s e s can do to p ro te c t th e m s e lv e s is a k e y c o m p o n e n t i n a d d r e s s i n g t h i s i s s u e . A s s e s s m e n t o f t h e b u s in e s s a n d how p o in t o f v ie w . O n e occur Exam 312-50 Certified Ethical Hacker when a a tta c k s c o u ld does com pany th e ir v ic tim iz e d be a s e c u rity e x p e rt to by an e m p o w e r in g e m p lo y e e s to fa c ilita te p r o te c tio n a tta c k e r. By re c o g n iz e th e u n d e rs ta n d in g a s s e ts . ris k p r e v a l e n t in a p o t e n t i a l l y a f f e c t t h a t b u s i n e s s is p a r a m o u n t f r o m n o t have to is and a s e c u rity dam age th e th a t can p ro b le m a g a in s t a tta c k s , t h e c o m p a n y w o u ld and b e a b le t o d e a l w i t h a n y s e c u r it y is s u e s as t h e y a ris e . Module 01 Page 34 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker CEH W h o Is a H a c k e r? E x c e lle n t C o m p u te r S k ills H obby Intelligent individuals w ith excellent com puter skills, w ith the ability to create and explore into the For some hackers, hacking is a hobby to see how many com puters o r networks they com pute r's softw a re and hardw are can com prom ise D o I lle g a l T h in g s M a lic io u s I n t e n t Some do hacking w ith malicious intent behind th e ir escapades, like stealing business data, Their inte ntion can eith er be to gain know ledge or to poke credit card info rm atio n, social security around to do illegal things numbers, em ail passwords, etc. Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. W A h o I s a hacker a u th o r iz a tio n to is a H a c k e r ? p e rs o n d e s tro y , s te a l w ho ille g a lly s e n s itiv e b re a k s d a ta , in to o r p e rfo rm a s y s te m m a lic io u s or n e tw o rk a tta c k s . w ith o u t H a c k e rs any m ay be m o tiv a te d b y a m u ltitu d e o f re a s o n s : © In te llig e n t in d iv id u a ls w ith e x c e lle n t c o m p u te r s k ills , w ith th e a b ility to c re a te and e x p lo re th e c o m p u te r 's s o ftw a r e a n d h a r d w a r e Q F o r s o m e h a c k e r s , h a c k i n g is a h o b b y t o s e e h o w m a n y c o m p u t e r s o r n e t w o r k s t h e y c a n c o m p ro m is e 0 T h e ir i n t e n t i o n c a n e i t h e r b e t o g a in k n o w l e d g e o r t o p o k e a r o u n d d o in g ille g a l th in g s 0 Som e hack w ith m a lic io u s in te n t, such as s te a lin g b u s in e s s d a ta , c re d it c a rd i n f o r m a t io n , s o c ia l s e c u r it y n u m b e r s , e m a il p a s s w o rd s , e tc . Module 01 Page 35 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker H a c k e r C la s s e s C EH *י־ es A C5 B la c k H a t s # O & G ra y H a ts S u ic id e H a c k e r s Individuals w ith extra ord ina ry com puting Individuals professing hacker skills and using W h i t e H a ts Individuals w ho w ork both offensively and defensively skills, resorting to m alicious o r d estructive activitie s and them fo r defensive purposes and are also at various tim es are also k now n as crackers know n as security analysts Individuals w ho aim to bring d ow n critical infrastructure fo r a "cause” and are not w orried about facing jail term s o r any o the r kind o f punishm ent & AA S ta te S p o n s o re d H a c k e rs Individuals em ployed by the o rganization to Individuals w ith w ide range o f skills, m o tivated by penetrate and gain trade secrets o f the com p e tito r religious or p o litica l beliefs to create fear by large-scale d isrup tion o f com puter netw orks Individuals em ployed by the governm ent to penetrate and gain top-secret inform ation and to damage inform ation systems of other governm ents S py H a c k e rs An unskilled hacker w ho com prom ises system by running scripts, tools, and softw are d eveloped by real hackers a C y b e r T e r r o r is ts S c r i p t K id d ie s Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. H a c k e r C la s s e s H a c k e rs a re m a i n l y d iv id e d i n t o e ig h t c la s s e s : B la c k H a ts B la c k h a ts a re in d iv id u a ls w i t h e x t r a o r d i n a r y c o m p u t i n g s k ills , r e s o r tin g t o m a lic io u s o r d e s t r u c t i v e a c t iv it ie s a n d a r e a ls o k n o w n as c r a c k e r s . T h e s e i n d iv id u a ls m o s t l y u s e t h e i r s k ills f o r o n l y d e s t r u c t i v e a c t iv it ie s , c a u s in g h u g e lo s s e s f o r c o m p a n i e s as w e ll as in d iv id u a ls . T h e y u s e t h e i r s k ills in f i n d i n g v u l n e r a b i l i t i e s in t h e v a r i o u s n e t w o r k s i n c l u d i n g d e f e n s e a n d g o v e r n m e n t w e b s ite s , b a n k in g and fin a n c e , e tc . S o m e do it t o cause d a m a g e , s te a l in fo rm a tio n , d e s tro y d a ta , o r e a r n m o n e y e a s ily b y h a c k in g ID s o f b a n k c u s to m e r s . ~ “יי W * h ite W h ite H a ts h a ts p u rp o s e s ; th e y s e c u rity a re a re a n a ly s ts to a ls o in d iv id u a ls known d e fe n d w ho h a c k in g s k ills as s e c u r it y a n a ly s ts . T h e s e th e ir s y s te m s c o m p a n ie s s e c u re th e ir n e tw o rk s fr o m Module 01 Page 36 possess a g a in s t th e and days, m a lic io u s use th e m a lm o s t e v e ry a tta c k s . fo r d e fe n s iv e com pany W h ite h a ts has h e lp o u ts id e in tru d e rs . Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking * G r a y G ray Exam 312-50 Certified Ethical Hacker H a ts h a ts a re th e tim e s . G r a y h a ts fa ll in d iv id u a ls w h o b e tw e e n w h ite v a rio u s v u ln e ra b ilitie s o f a s y s te m and w o rk b o th o ffe n s iv e ly b la c k h a ts . G ra y h a ts o r n e tw o rk and a t th e and d e fe n s iv e ly m ig h t h e lp sa m e tim e S u ic id e b y fin d in g h e lp v e n d o r s t o p r o d u c ts ( s o ftw a r e o r h a rd w a r e ) b y c h e c k in g lim ita tio n s a n d m a k in g t h e m S u ic id e h a c ke rs a t v a rio u s im p ro v e m o r e s e c u re , e tc . H a c k e r s h a c ke rs a re "c a u s e " a n d a re n o t w o r rie d in d iv id u a ls w ho a im to b rin g down c ritic a l in fra s tru c tu re fo r a a b o u t f a c i n g 3 0 y e a r s in ja i l f o r t h e i r a c t io n s . S u ic id e h a c k e r s a r e c lo s e ly r e la t e d t o s u ic id e b o m b e r s , w h o s a c rific e t h e i r life f o r t h e a t t a c k a n d a re n o t c o n c e r n e d w i t h t h e c o n s e q u e n c e s o f t h e i r a c t io n s . T h e r e h a s b e e n a r is e in c y b e r t e r r o r i s m * jr S c r ip t S c rip t to o ls , and in r e c e n t y e a r s . K id d ie s k id d ie s s o ftw a re a re th e u n s k ille d d e v e lo p e d by rea l h a c k e rs w ho c o m p ro m is e h a c k e rs . T h e y u tiliz e s y s te m s s m a ll, b y ru n n in g e a s y -to -u s e s c rip ts , p ro g ra m s or s c r ip ts as w e ll as d is t in g u is h e d t e c h n i q u e s t o f in d a n d e x p lo it t h e v u ln e r a b ilit ie s o f a m a c h in e . S c rip t k id d ie s u s u a lly fo c u s o n t h e q u a n t it y o f a tta c k s r a t h e r t h a n t h e q u a lity o f t h e a tta c k s t h a t th e y in itia te . S p y H a c k e r s S py h a c k e rs a re g a in t r a d e s e c re ts o f t h e in d iv id u a ls w h o a re e m p lo y e d b y an o rg a n iz a tio n c o m p e t it o r . T h e s e in s id e rs c a n ta k e to a d v a n ta g e o f th e p e n e tra te and p riv ile g e s t h e y ha ve to hack a s y s te m o r n e tw o rk . C y b e r T e r r o r is t s C y b e r t e r r o r is ts c o u ld th a t have la rg e -s c a le a w id e ra n g e d is ru p tio n be p e o p le , o rg a n iz e d g ro u p s fo rm e d o f s k ills , m o tiv a te d b y re lig io u s o r p o litic a l o f c o m p u t e r n e t w o r k s . T h is t y p e b y t e r r o r is t o rg a n iz a tio n s , b e lie fs , t o o f h a c k e r is m o r e c re a te fe a r by d a n g e ro u s as th e y ca n h a c k n o t o n ly a w e b s ite b u t w h o le In te r n e t zo n e s. m S ta te S p o n s o r e d S ta te s p o n s o re d H a c k e r s h a c k e rs a re in d iv id u a ls e m p lo y e d by th e g o v e rn m e n t to p e n e tra te a n d g a in t o p - s e c r e t in f o r m a t io n a n d t o d a m a g e i n f o r m a t i o n s y s te m s o f o t h e r g o v e r n m e n t s . Module 01 Page 37 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker CEH H a c k tiv is m J Hacktivism is an act o f pro m o tin g a p o litica l agenda It remains a fact, however, th a t gaining unauthorized access is a crim e, no m atter w hat th e inte ntion is by hacking, especially by defacing o r disabling websites J It thrives in th e en vironm ent w here info rm atio n is easily Hacktivism is m otivated by revenge, political o r social reasons, ideology, vandalism, protest, and a desire to h u m iliate victim s accessible Aims at sending a message through th e ir hacking activities and gaining visibility fo r th e ir cause Comm on targets include go vernm ent agencies, m u ltin a tio n a l corpora tions, or any o th e r e n tity perceived as bad or w rong by these groups or individuals Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. H a c k t i v i s m H a c k tiv is m is an act of p ro m o tin g a p o litic a l agenda by h a c k in g , e s p e c ia lly by d e f a c i n g o r d i s a b l i n g w e b s i t e s . T h e p e r s o n w h o d o e s t h e s e t h i n g s is k n o w n a s a h a c k t i v i s t . © H a c k t i v i s m t h r i v e s i n a n e n v i r o n m e n t w h e r e i n f o r m a t i o n is e a s i l y a c c e s s i b l e Q It a im s t o s e n d a m e s s a g e t h r o u g h h a c k in g a c t iv it ie s a n d g a in v is ib ilit y f o r a c a u s e . Q C o m m o n ta r g e ts in c lu d e g o v e r n m e n t a g e n c ie s , m u ltin a t io n a l c o r p o r a tio n s , o r a n y o t h e r e n t it y p e rc e iv e d as " b a d " o r " w r o n g " b y th e s e g ro u p s o r in d iv id u a ls . © I t r e m a i n s a f a c t , h o w e v e r , t h a t g a i n i n g u n a u t h o r i z e d a c c e s s is a c r i m e , n o m a t t e r w h a t t h e i n t e n t i o n is. Q H a c k tiv is m is m o t i v a t e d by revenge, p o lit ic a l o r s o c ia l re a s o n s , id e o lo g y , v a n d a lis m , p ro te s t, a n d a d e s ire t o h u m ilia te v ic tim s . Module 01 Page 38 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker CEH F lo w (•rtifwd H a c k in g T ypes of A tta c k s P hases itkitjl In fo rm a tio n S e c u r ity C o n tro ls Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. 5 5 M o d u l e In t h e F lo w p re v io u s s e c tio n , y o u le a rn e d a b o u t v a rio u s h a c k in g c o n c e p ts . N o w it's t i m e t o d is c u s s t h e h a c k i n g m e t h o d . H a c k in g c a n n o t b e a c c o m p l i s h e d in a s in g le a c t i o n . It n e e d s t o be d o n e in p h a s e s . T h e i n f o r m a t i o n g a t h e r e d o r t h e p r i v i l e g e s g a i n e d in o n e p h a s e c a n b e u s e d in t h e n e x t p h a s e f o r a d v a n c in g t h e p ro c e s s o f h a c k in g . In fo r m a tio n S e c u rity O v e rv ie w [ p s ^ j_ H a c k in g P h a s e s ־ > In fo r m a tio n S e c u rity T h re a ts T yp e s o f A tta c k s a n d A tta c k V e c to rs » H a c k in g C o n c e p ts In fo r m a tio n S e c u rity C o n tro ls T h i s s e c t i o n lis ts a n d d e s c r i b e s v a r i o u s p h a s e s i n v o l v e d in h a c k i n g . Module 01 Page 39 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker H a c k in g P h a s e s _l CEH Reconnaissance refers to th e p re p a ra to ry phase w h e re an a tta cke r seeks to g a th e r in fo rm a tio n a b o u t a ta rg e t p rio r to laun ching an attack J Could be th e fu tu re p o in t o f re tu rn , no ted fo r ease o f e n try fo r an attack w hen m o re a b o u t th e ta rg e t is kn o w n on a broad scale -l Reconnaissance ta rg e t range m ay include th e ta rg e t organization's clients, em ployees, op eratio ns, n e tw o rk, and systems R e c o n n a is s a n c e T y p e s P a s s iv e R e c o n n a is s a n c e M a in t a in in g A ccess C le a r in g T ra c k s A c tiv e R e c o n n a is s a n c e Passive reconnaissance involves acquiring inform ation w ithou t directly interacting w ith the target s Active reconnaissance involves interacting w ith the target directly by any means For example, searching public records or news releases s For example, telephone calls to the help desk or technical departm ent I Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. H a c k i n g P h a s e s T h e v a r i o u s p h a s e s i n v o l v e d in h a c k i n g a r e : © R e c o n n a is s a n c e Q S c a n n in g Q G a in in g A cc e s s Q M a in ta in in g Access © C le a rin g T ra c k s R e c o n n a is s a n c e R e c o n n a is s a n c e in fo rm a tio n re fe rs to th e p re p a ra to ry as p o s s ib le a b o u t t h e t a r g e t p r io r t o phase w h e re la u n c h in g th e a n a tta c k e r g a th e r s as m u c h a t t a c k . A ls o in t h i s p h a s e , t h e a t t a c k e r d r a w s o n c o m p e t it iv e in t e llig e n c e t o le a r n m o r e a b o u t t h e t a r g e t . T h is p h a s e m a y a ls o in v o lv e n e t w o r k s c a n n in g , e it h e r e x te rn a l o r in te rn a l, w i t h o u t a u th o r iz a tio n . T h i s is t h e p h a s e t h a t a l l o w s t h e p o t e n t i a l a t t a c k e r t o s t r a t e g i z e h i s o r h e r a t t a c k . T h i s m a y t a k e s o m e t im e as th e a tta c k e r w a its t o u n e a r th c ru c ia l in fo r m a tio n . P a rt o f th is re c o n n a is s a n c e m a y Module 01 Page 40 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking in v o lv e " s o c ia l Exam 312-50 Certified Ethical Hacker e n g in e e rin g ." A s o c ia l e n g in e e r is a p e rs o n w ho s m o o th -ta lk s p e o p le in to re v e a lin g in fo r m a t io n s u c h as u n lis te d p h o n e n u m b e r s , p a s s w o rd s , a n d o t h e r s e n s itiv e d a ta . A n o th e r re c o n n a is s a n c e lo o k in g t h r o u g h th e te c h n iq u e is "d u m p s te r d iv in g ." a n o r g a n iz a tio n 's tr a s h f o r d is c a rd e d In te rn e t to o b ta in D u m p s te r s e n s itiv e d iv in g is t h e p ro ce ss of in fo rm a tio n . A tta c k e rs can use in f o r m a t io n s u c h as e m p lo y e e 's c o n t a c t in f o r m a t io n , b u s in e s s p a r tn e r s , t e c h n o l o g i e s in u s e , a n d o t h e r c r i t i c a l b u s i n e s s k n o w l e d g e , b u t " d u m p s t e r d i v i n g " m a y p r o v i d e th e m w ith even m o re s e n s itiv e in fo rm a tio n s ta te m e n ts , b a n k s ta te m e n ts , A T M such as u s e rn a m e s , p a ssw o rd s, s lip s , s o c ia l s e c u r it y n u m b e r s , t e l e p h o n e c re d it ca rd n u m b e r s , a n d so o n . T h e r e c o n n a is s a n c e t a r g e t ra n g e m a y in c lu d e t h e t a r g e t o r g a n iz a tio n 's c lie n ts , e m p lo y e e s , o p e ra tio n s , n e tw o rk s , a n d s y s te m s . F o r e x a m p le , a W h o is n a m e s , a n d c o n ta c ts . d a ta b a s e can p ro v id e in fo rm a tio n about In te rn e t a d d re sse s, If a p o t e n t i a l a t t a c k e r o b t a i n s D N S i n f o r m a t i o n f r o m d o m a in t h e r e g i s t r a r , a n d is a b le t o a c c e s s it, h e o r s h e c a n o b t a i n u s e fu l i n f o r m a t i o n s u c h as t h e m a p p i n g o f d o m a i n n a m e s t o IP a d d r e s s e s , m a i l s e r v e r s , a n d h o s t i n f o r m a t i o n r e c o r d s . I t is i m p o r t a n t t h a t a c o m p a n y h a s a p p r o p r i a t e p o lic ie s t o p r o t e c t its i n f o r m a t i o n a s s e ts , a n d a ls o p r o v id e g u id e lin e s t o its u s e rs o f th e s a m e . B u ild in g u s e r a w a re n e s s o f th e p r e c a u t i o n s t h e y m u s t t a k e in o r d e r t o p ro te c t th e ir i n f o r m a t i o n a s s e t s is a c r i t i c a l f a c t o r i n t h i s c o n t e x t . R e c o n n a is s a n c e ׳^־־־״ R e c o n n a is s a n c e T y p e s te c h n iq u e s can be c a te g o riz e d b ro a d ly in to a c tiv e and p a s s iv e re c o n n a is s a n c e . W hen does an a tta c k e r a p p ro a c h e s th e not in te ra c t w ith th e a t ta c k u s in g p a s s iv e s y s te m d ire c tly . T h e re c o n n a is s a n c e te c h n iq u e s , h e o r she a tta c k e r uses p u b lic ly a v a ila b le in fo rm a tio n , s o c ia l e n g in e e r in g , a n d d u m p s t e r d iv in g as a m e a n s o f g a t h e r in g i n f o r m a t i o n . W hen th e a n a tta c k e r e m p lo y s a c tiv e s y s te m by u s in g to o ls to re c o n n a is s a n c e te c h n iq u e s , d e te c t open p o rts , he o r sh e trie s to a c c e s s ib le h o s ts , ro u te r in te ra c t w ith lo c a tio n s , n e tw o rk m a p p in g , d e ta ils o f o p e r a tin g s y s te m s , a n d a p p lic a tio n s . The next e x p e rts phase do d iffe re n c e o f a tta c k in g n o t d iffe re n tia te as s c a n n in g is s c a n n i n g , w h ic h s c a n n in g f r o m in v o lv e s m o re is d i s c u s s e d a c tiv e in -d e p th in th e re c o n n a is s a n c e . p ro b in g on th e fo llo w in g s e c tio n . H o w e v e r, th e re p a rt of th e Som e is a s l i g h t a tta c k e r. O fte n r e c o n n a i s s a n c e a n d s c a n n i n g p h a s e s o v e r l a p , a n d i t is n o t a l w a y s p o s s i b l e t o d e m a r c a t e t h e s e p h a s e s as w a t e r t ig h t c o m p a r tm e n ts . A c tiv e re c o n n a is s a n c e is u s u a lly e m p lo y e d when th e a tta c k e r d is c e rn s th a t th e re is a lo w p r o b a b ility t h a t th e s e re c o n n a is s a n c e a c tiv itie s w ill b e d e te c te d . N e w b ie s a n d s c rip t k id d ie s a re o ft e n f o u n d a t t e m p t in g th is t o g e t fa s te r, v is ib le re s u lts , a n d s o m e tim e s ju s t f o r t h e b ra g v a lu e th e y can o b ta in . As an e th ic a l m e th o d s , and h a ck e r, be you a b le C o m p a n ie s , f o r t h e ir to p a rt, o p e ra tio n a l s tra te g y , a n d m ust be a d v o c a te a b le to d is tin g u is h p re v e n tiv e m e a su re s m u s t a d d re s s s e c u rity as a n be e q u ip p e d w ith am ong in th e th e in te g ra l p r o p e r p o lic ie s a n d v a rio u s lig h t of re c o n n a is s a n c e p o te n tia l p a rt o f th e ir p ro ce d u re s to th re a ts . b u s in e s s a n d / o r check fo r such a c tiv itie s . Module 01 Page 41 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker H a c k in g P h a s e s CEH ( C o n t ’d ) P re -A tta c k P h a s e Scanning refers to the pre-attack phase when the attacker scans th e n e tw o rk fo r specific info rm atio n on the basis o f info rm atio n gathered during reconnaissance P o rt S c a n n e r ML Scanning can include use o f dialers, p o rt scanners, netw ork mappers, ping tools, vulne rab ility scanners, etc. E x tr a c t In fo rm a tio n Attackers extract info rm atio n such as live machines, port, p o rt status, OS details, device type, system up tim e, etc. to launch attack Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. H a c k i n g P h a s e s ( C o n t ’ d ) S c a n n in g S c a n n in g a tta c k e r uses S c a n n in g can th e be is w h a t a n d e ta ils a tta c k e r does g a th e re d c o n s id e re d a d u rin g lo g ic a l p rio r to a tta c k in g re c o n n a is s a n c e e x te n s io n (and to th e n e tw o rk . id e n tify o v e rla p ) o f th e In s c a n n in g , t h e s p e c ific a c tiv e v u ln e ra b ilitie s . re c o n n a is s a n c e . O fte n a tta c k e r s u se a u t o m a t e d to o ls s u c h as n e t w o r k / h o s t s c a n n e rs a n d w a r d ia le rs t o lo c a te s y s te m s a n d a t t e m p t t o d is c o v e r v u ln e ra b ilitie s . A n a t ta c k e r c a n g a th e r c ritic a l n e t w o r k in fo rm a tio n s u c h as th e m a p p in g o f s y s te m s , ro u te rs , a n d f ir e w a lls b y u s in g s im p le t o o ls s u c h as T r a c e r o u t e . A lt e r n a t iv e ly , t h e y c a n u s e t o o ls s u c h as C h e o p s t o a d d s w e e p in g fu n c tio n a lity a lo n g w ith w h a t T ra c e ro u te re n d e rs . P o rt sca n n ers can be used to d e te c t lis te n in g p o rts to fin d in fo rm a tio n a b o u t th e n a tu re of s e r v i c e s r u n n i n g o n t h e t a r g e t m a c h i n e . T h e p r i m a r y d e f e n s e t e c h n i q u e i n t h i s r e g a r d is t o s h u t down s e rv ic e s t h a t a re m e c h a n is m . H o w e ve r, n o t re q u ire d . A p p r o p r ia te a tta c k e rs can s till use filte rin g to o ls to m a y a ls o b e a d o p t e d d e te rm in e th e ru le s as a d e fe n s e im p le m e n te d fo r filte rin g . The m o s t c o m m o n ly used to o ls a re v u ln e ra b ility s c a n n e rs th a t can se a rch fo r se v e ra l k n o w n v u ln e r a b ilit ie s o n a t a r g e t n e t w o r k , a n d c a n p o t e n t i a l l y d e t e c t t h o u s a n d s o f v u ln e r a b ilit ie s . T h is g iv e s t h e a t t a c k e r t h e a d v a n ta g e o f t i m e Module 01 Page 42 b e c a u s e h e o r s h e o n ly h a s t o f in d a s in g le m e a n s o f Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker e n tr y w h ile th e s y s te m s p ro fe s s io n a l has t o s e c u re m a n y v u ln e ra b le a re a s b y a p p ly in g p a tc h e s . O rg a n iz a tio n s th a t d e p lo y in tru s io n d e te c tio n s y s te m s (ID S e s ) s till have re a so n to w o rry b e c a u s e a t t a c k e r s c a n u s e e v a s io n t e c h n i q u e s a t b o t h t h e a p p l i c a t i o n a n d n e t w o r k le v e ls . Module 01 Page 43 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker H a c k in g P h a s e s CEH ( C o n t ’d ) ■ R econn־ a is s a n c e מ A * Gaining access refers to the point where the attacker obtains access to the operating system or applications on the computer or network The attacker can gain access at the operating system level, application level, or network level n The attacker can escalate privileges to obtain complete control of the system. In the process, intermediate systems that are connected to it are also compromised a Examples include password cracking, buffer overflows, denial of service, session hijacking, etc. J Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. H a c k i n g G I e| P h a s e s a in in g ( C o n t ’ d ) A c c e s s G a i n i n g a c c e s s is t h e m o s t i m p o r t a n t p h a s e o f a n a t t a c k i n t e r m s o f p o t e n t i a l d a m a g e . G a in in g a cce ss re fe rs t o th e p o in t w h e r e th e a tta c k e r o b ta in s a cce ss t o th e o p e r a tin g s y s te m o r a p p lic a tio n s o n t h e c o m p u t e r o r n e t w o r k . T h e a t t a c k e r c a n g a in a c c e s s a t t h e o p e r a t in g s y s te m le v e l, a p p lic a tio n g a in in g le v e l, access in to s y s te m , th e or n e tw o rk a ta rg e t s y s te m s k ill le v e l o f t h e le v e l. F a c to rs t h a t in c lu d e th e in flu e n c e a rc h ite c tu re p e rp e tra to r, and th e e s c a la te p riv ile g e s t o and chances o f an c o n fig u ra tio n a tta c k e r o f th e ta rg e t in itia l le v e l o f a c c e s s o b t a in e d . T h e a tta c k e r in itia lly t r ie s t o g a in m in im a l a c c e s s t o t h e t a r g e t s y s te m access, h e o r sh e trie s to th e o b ta in o r n e t w o r k . O n c e h e o r s h e g a in s t h e c o m p le te c o n tro l o f th e s y s t e m . In t h e p ro c e s s , i n t e r m e d i a t e s y s te m s t h a t a re c o n n e c t e d t o it a re a ls o c o m p r o m i s e d . A tta c k e r s n e e d n o t a lw a y s g a in a c c e s s t o t h e s y s te m t o c a u s e d a m a g e . F o r in s ta n c e , d e n ia l- o fs e rv ic e a tta c k s ca n e ith e r e x h a u s t re s o u rc e s o r s to p s e rv ic e s f r o m S to p p in g o f s e rv ic e c a n b e c a rrie d o u t b y k illin g ru n n in g o n th e ta rg e t s y s te m . p ro c e s s e s , u s in g a l o g i c / t i m e b o m b , o r even r e c o n fig u r in g a n d c ra s h in g t h e s y s te m . R e s o u rc e s ca n b e e x h a u s te d lo c a lly b y fillin g u p o u tg o in g c o m m u n i c a t i o n lin k s . The e x p lo it E x a m p le s can occur in c lu d e Module 01 Page 44 lo c a lly , s ta c k -b a s e d o fflin e , b u ffe r over a LAN o v e rflo w s , or th e In te rn e t d e n ia l-o f-s e rv ic e , as a d e c e p tio n and s e s s io n or th e ft. h ija c k in g . Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker A tta c k e r s u s e a t e c h n iq u e c a lle d s p o o fin g t o e x p lo it t h e s y s te m b y p r e t e n d in g t o b e s tr a n g e r s o r d iffe r e n t s y s te m s . T h e y can use th is te c h n iq u e to s e n d a m a lfo r m e d th e s to p ta rg e t s y s te m a v a ila b ility of in o r d e r t o th e e x p lo it v u ln e ra b ility . e s s e n tia l s e rv ic e s . S m u rf p a c k e t c o n ta in in g a b u g to P a cke t flo o d in g a tta c k s try to m ay e lic it be a used to response re m o te ly fro m th e a v a ila b le u s e rs o n a n e t w o r k a n d t h e n use t h e ir le g itim a te a d d re s s t o flo o d th e v ic tim . Module 01 Page 45 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker H a c k in g P h a s e s CEH ( C o n t ’d ) M M a in ta in in g access refers to th e phase w h e n th e a tta cke r trie s to re ta in his o r h e r o w n e rs h ip o f th e system £ A ttackers m ay p re ve n t th e system fro m being o w n e d by o th e r attackers by securing th e ir exclusive access w ith Backdoors, R ootKits, o r Trojans A ttackers can u p lo ad, d o w n lo a d , o r m a n ip u la te da ta, a p p lica tio n s, and c o n fig u ra tio n s on th e o w n e d system & A ttackers use th e co m p ro m ise d system to launch fu r th e r attacks Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. H a c k i n g P h a s e s ( C o n t ’ d ) = r\ M a in t a in in g A c c e s s O n c e a n a t t a c k e r g a in s a c ce ss t o b o th th e s y s te m and its re so u rce s and e x p lo it o th e r s y s te m s , o r to k e e p a lo w a c tio n s can dam age th e o rg a n iz a tio n . th e ta rg e t s y s te m , th e fu rth e r use th e s y s te m a tta c k e r can ch o o se to as a la u n c h pad to scan use and p ro file a n d c o n tin u e e x p lo itin g th e s y s te m . B o th th e s e F o r in s ta n c e , th e a tta c k e r can im p le m e n t a s n iffe r to c a p t u r e a ll n e t w o r k t r a f f i c , i n c l u d i n g t e l n e t a n d f t p s e s s io n s w i t h o t h e r s y s t e m s . A tta c k e rs , w ho choose to re m a in u n d e te c te d , re m o ve e v id e n c e of th e ir e n try b a c k d o o r o r a T r o ja n t o g a in r e p e a t a c c e s s . T h e y c a n a ls o in s ta ll r o o t k i t s a t t h e g a in super u se r access. T he re a so n b e h in d th is is t h a t ro o tk its g a in access and use a k e rn e l le v e l to at th e o p e ra tin g s y s t e m le v e l w h i le a T r o ja n h o r s e g a in s a c c e s s a t t h e a p p lic a t io n le v e l. B o th r o o t k it s a n d T r o ja n s d e p e n d o n u s e rs t o in s ta ll t h e m . W i t h i n W i n d o w s s y s te m s , m o s t T r o ja n s in s ta ll t h e m s e lv e s as a s e rv ic e a n d ru n as lo c a l s y s te m , w h ic h h a s a d m in is t r a t iv e a cce ss. A tta c k e rs can use T ro ja n h o rs e s to tra n s fe r user nam es, p a ssw o rd s, and even c re d it c a rd in f o r m a t io n s to re d o n th e s y s te m . T h e y c a n m a in ta in c o n tr o l o v e r t h e ir s y s te m f o r a lo n g t im e b y " h a rd e n in g " th e s y s te m a g a in s t o t h e r a t t a c k e r s , a n d s o m e t i m e s , in t h e s o m e d e g re e o f p ro te c tio n to th e s y s te m fr o m p ro ce ss, d o r e n d e r o th e r a tta c k s . T h e y can th e n use th e ir access to s te a l d a t a , c o n s u m e C PU c y c le s , a n d t r a d e s e n s it iv e i n f o r m a t i o n o r e v e n r e s o r t t o e x t o r t i o n . Module 01 Page 46 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking O rg a n iz a tio n s d e te c t can in tru d e rs . use The Exam 312-50 Certified Ethical Hacker in tru s io n la tte r d e te c tio n th o u g h is not s y s te m s or d e p lo y re c o m m e n d e d h o n e y p o ts u n le s s th e and h o n e y n e ts o rg a n iz a tio n has to th e r e q u ir e d s e c u r ity p r o fe s s io n a l t o le v e ra g e t h e c o n c e p t f o r p r o t e c t io n . Module 01 Page 47 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker H a c k in g P h a s e s ( C o n t ’d ) C o v e rin g tra c k s The attacker's T h e a tta c k e r re fe rs t o th e in te n tio n s include: o v e r w r ite s th e a c tiv itie s c a rrie d C ontin uing access to th e s e rv e r, s y s te m , a n d victim 's system. o u t b y a n a tta c k e r a p p lic a tio n lo g s to re m a in in g u n n o tic e d to h id e m a lic io u s a v o id s u s p ic io n and un caugh t, d e le tin g a c ts evidence th a t m igh t ► ►* lead to his prosecutio n © O ם Clearing Tracks H a c k i n g C E P h a s e s le a r in g An ( C o n t ’ d ) T r a c k s a tta c k e r w o u ld lik e t o d e s tro y e v id e n c e o f h is o r h e r p r e s e n c e a n d a c tiv itie s fo r v a rio u s re a s o n s s u c h as m a in ta in in g a cce ss a n d e v a d in g p u n itiv e a c tio n . T ro ja n s s u c h as ps o r n e t c a t c o m e in h a n d y f o r a n y a t t a c k e r w h o w a n t s t o d e s t r o y t h e e v i d e n c e f r o m re p la c e th e s y s te m assum ed to d e s ig n e d t o have th e lo g file s o r b i n a r i e s w i t h t h e s a m e . O n c e t h e T r o j a n s a r e in p la c e , t h e a t t a c k e r c a n b e g a in e d h id e th e to ta l c o n tro l o f th e s y s te m . R o o tk its a re a u to m a te d to o ls th a t a re p r e s e n c e o f t h e a t t a c k e r . B y e x e c u t i n g t h e s c r ip t, a v a r i e t y o f c r itic a l file s a r e r e p l a c e d w i t h T r o j a n n e d v e r s i o n s , h i d i n g t h e a t t a c k e r in s e c o n d s . O t h e r t e c h n i q u e s i n c l u d e s t e g a n o g r a p h y a n d t u n n e l i n g . S t e g a n o g r a p h y is t h e p r o c e s s o f h i d i n g t h e d a t a , f o r i n s t a n c e in i m a g e s a n d s o u n d f i le s . T u n n e l i n g t a k e s a d v a n t a g e o f t h e t r a n s m i s s i o n p r o t o c o l b y c a r r y i n g o n e p r o t o c o l o v e r a n o t h e r . E v e n t h e e x t r a s p a c e ( e .g ., u n u s e d b i t s ) in t h e TCP a n d IP h e a d e r s c a n co ve r to la u n c h fre s h be u s e d f o r h id in g in fo rm a tio n . A n a tta c k e r can use th e s y s te m as a a tta c k s a g a in s t o t h e r s y s te m s o r u s e it as a m e a n s o f r e a c h in g a n o t h e r s y s te m o n th e n e t w o r k w i t h o u t b e in g d e te c te d . T h u s , th is p h a s e o f a tta c k c a n tu r n in to a n e w c y c l e o f a t t a c k b y u s in g r e c o n n a i s s a n c e t e c h n i q u e s a ll o v e r a g a in . T he re have been in s ta n c e s w h e re an a tta c k e r has lu rk e d on a s y s te m even as s y s te m a d m in is t r a t o r s h a v e c h a n g e d . T h e s y s te m a d m in is t r a t io n c a n d e p lo y h o s t - b a s e d ID S e s a n d a n ti- Module 01 Page 48 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking v iru s to o ls th a t can e th ic a l h a c k e r, y o u you a re a b le to Exam 312-50 Certified Ethical Hacker d e te c t T ro ja n s m u s t be a w a re a d v o c a te and and o th e r s e e m in g ly b e n ig n file s and d ire c to rie s . As an o f th e to o ls a n d te c h n iq u e s th a t a tta c k e rs d e p lo y , so th a t ta k e c o u n te rm e a s u re s to e n s u re p ro te c tio n . These w ill be d e t a i l e d in s u b s e q u e n t m o d u l e s . Module 01 Page 49 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker CEH F lo w (•rtifw l H a c k in g Typos of A tta c k s P hases itk itjl In fo rm a tio n S e c u r ity C o n tro ls Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. M o d u l e F lo w So fa r w e d is c u s s e d h o w i m p o r t a n t i t is f o r a n o r g a n i z a t i o n t o k e e p t h e i r i n f o r m a t i o n re s o u rc e s s e c u re , v a rio u s s e c u rity th r e a t s a n d a tta c k v e c to rs , h a c k in g c o n c e p ts , a n d t h e h a c k in g p h a s e s . N o w it's t im e t o e x a m in e t h e t e c h n i q u e s o r t h e t y p e o f a t ta c k s t h e a t t a c k e r a d o p t s t o h a ck a s y s te m o r a n e tw o rk . In fo r m a tio n S e c u rity O v e rv ie w H a c k in g P h a s e s ־ > In fo r m a tio n S e c u rity T h re a ts O — T yp e s o f A tta c k s a n d A tta c k V e c to rs » H a c k in g C o n c e p ts In fo r m a tio n S e c u rity C o n tro ls T h is s e c tio n c o v e r s v a r io u s t y p e s o f a tta c k s s u c h as o p e r a t i n g s y s t e m a tta c k s a n d a p p lic a tio n - le v e l a tta c k s . Module 01 Page 50 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker T y p e s o f A tta c k s o n a S y s te m J A t t a c k e r s e x p lo i t v u l n e r a b i li t i e s in a n i n f o r m a t io n s y s te m €5 t o g a in u n a u t h o r iz e d a c c e s s t o t h e s y s te m r e s o u r c e s J T h e u n a u t h o r iz e d a c c e s s m a y r e s u lt in lo s s , d a m a g e o r 5® . t h e f t o f s e n s it iv e i n f o r m a t io n IIIIIIIIIIIIIIIIIIII T y p e s o f A tta c k s I O p e ra tin g S ystem A tta c k s III A p p lic a tio n Level A tta c k s 11 M is c o n fig u r a tio n A tta cks IV S h rin k W ra p C ode A tta cks Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. T y p e s o f A t t a c k s o n a S y s t e m T h e r e a re s e v e ra l w a y s a n a t t a c k e r c a n g a in a c c e s s t o a s y s te m . T h e a t t a c k e r m u s t b e a b le t o e x p l o i t a w e a k n e s s o r v u l n e r a b i l i t y in a s y s t e m : © O p e ra tin g s y s te m a tta c k s : A tta c k e rs se a rc h fo r OS v u ln e ra b ilitie s a n d e x p lo it th e m to g a in a c c e s s t o a n e t w o r k s y s te m . Q A p p lic a tio n -le v e l a tta c k s : S o ftw a re fe a tu re s . T he re is a d e a rth of a p p lic a tio n s c o m e tim e to p e rfo rm w ith m y ria d c o m p le te fu n c tio n a litie s te s tin g b e fo re and r e le a s in g p ro d u c ts . T h o s e a p p lic a tio n s h a v e v a rio u s v u ln e ra b ilitie s a n d b e c o m e a s o u rc e o f a tta c k . 0 M is c o n fig u ra tio n a tta c k s : M ost a d m in is tra to rs d o n 't have th e ne ce ssary s k ills to m a i n t a i n o r f ix is s u e s , w h i c h m a y le a d t o c o n f i g u r a t i o n e r r o r s . S u c h c o n f i g u r a t i o n e r r o r s m a y b e c o m e th e s o u rc e s fo r an a tta c k e r to e n te r in to th e ta rg e t's n e tw o r k o r s y s te m . Q S h rin k w r a p c o d e a tta c k s : O p e ra tin g s y s te m s c rip ts to m ake th e jo b of a d m in is tra to r a p p lic a tio n s c o m e w it h easy, but th e sam e n u m e ro u s s a m p le s c rip ts have v a rio u s v u ln e r a b ilit ie s , w h ic h c a n le a d t o s h r in k w r a p c o d e a tta c k s . Module 01 Page 51 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker O p e r a tin g S y s te m A tta c k s v u ln e ra b ilitie s Exploiting specific protocol im ple m en tation s O Bugs in o p e ra tin g system Attacking built-in O U npa tched o p e ra tin g O A ttackers search fo r B u ffe r o v e rflo w v u ln e ra b ilitie s in an o p e ra tin g system's design, in sta lla tio n or CEH a u th e n tica tio n systems co n fig u ra tio n and Breaking file-system security system e x p lo it th e m to gain access to a n e tw o rk Cracking passwords and en cryption mechanisms system G a in in g A c c e s s Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. O p e r a t i n g S y s t e m A t t a c k s T o d a y 's o p e r a tin g s y s te m s , w h ic h a re lo a d e d w it h fe a tu r e s , a re in c r e a s in g ly c o m p le x . W h ile u se rs ta k e a d v a n ta g e o f th e s e fe a tu re s , th e s y s te m e n tic in g a tta c k e rs . (G U Is ). T h e s e O p e ra tin g s u p p o rts th e s y s te m s use t w e a k i n g is r e q u i r e d t o l o c k t h e m run o f p o rts m any and is p r o n e t o m o r e v u l n e r a b i l i t i e s , t h u s s e rv ic e s m odes such o f access to as g ra p h ic a l th e user In te rn e t, a nd in te rfa c e s e x te n s iv e d o w n . A tta c k e r s a re c o n s ta n tly lo o k in g f o r O S v u ln e r a b ilit ie s so t h a t t h e y c a n e x p lo it a n d g a in a c c e s s t o n e tw o r k s y s te m s . T o s to p a tta c k e rs fr o m th e ir n e tw o rk , th e s y s te m o r n e tw o r k a d m in is tr a to rs e n te rin g m u s tk e e p a b re a s t o f v a rio u s n e w e x p lo its a n d m e th o d s a d o p te d by a tta c k e rs a n d m o n ito r th e ir n e tw o rk s c o n tin u o u s ly . M o s t o p e r a t in g s y s te m s ' in s ta lla tio n p r o g r a m s in s ta ll a la rg e n u m b e r o f s e rv ic e s a n d o p e n p o r t s b y d e f a u lt . T h is s it u a t io n le a d s a t t a c k e r s t o s e a rc h f o r v a r io u s v u ln e r a b ilit ie s . A p p ly in g p a t c h e s a n d h o t f i x e s is n o t e a s y w i t h t o d a y ' s c o m p l e x n e t w o r k s . M o s t p a t c h e s a n d f i x e s t e n d t o s o l v e a n i m m e d i a t e is s u e , b u t t h e y c a n n o t b e c o n s id e r e d a p e r m a n e n t s o lu t io n . S o m e OS v u ln e r a b ilitie s in c lu d e : Q B u ffe r o v e r f lo w v u ln e ra b ilitie s © B u g s in t h e o p e r a t i n g s y s t e m © U n p a tc h e d o p e ra tin g s y s te m s Module 01 Page 52 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker A tta c k s p e r f o r m e d a t t h e O S le v e l in c lu d e : Q E x p lo itin g s p e c ific n e t w o r k p r o t o c o l i m p le m e n t a t io n s Q A tta c k in g b u ilt-in a u th e n tic a tio n s y s te m s Q B re a k in g file s y s te m s e c u rity © C ra c k in g p a s s w o r d s a n d e n c r y p t io n m e c h a n is m s Module 01 Page 53 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker M is c o n fig u r a tio n A tta c k s CEH If a system is m is c o n fig u re d , such as a change is m ade in th e file perm ission, it can no long er be considered secure M is c o n fig u ra tio n v u ln e ra b ilitie s affect w eb servers, ap p lica tio n platform s, databases, ne tw orks, o r fra m e w o rks th a t may re sult in illega l access o r possible o w n in g o f th e system The a d m in is tra to rs are expected to change th e c o n fig u ra tio n o f th e devices be fore th e y are de ployed in th e n e tw o rk. Failure to do th is allow s th e d e fa u lt settings to be used to attack th e system In o rd e r to o p tim ize th e co n fig u ra tio n o f th e m achine, re m ove any re d u n d a n t services o r s o ftw a re Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. M i s c o n f i g u r a t i o n A t t a c k s M is c o n fig u r a tio n v u ln e ra b ilitie s a ffe c t w e b s e rv e rs , a p p lic a tio n p la tfo rm s , d a ta b a s e s , n e t w o r k s , o r f r a m e w o r k s t h a t m a y r e s u l t in i l l e g a l a c c e s s o r p o s s i b l e o w n i n g o f t h e s y s t e m . If a s y s t e m is m i s c o n f i g u r e d , s u c h a s w h e n a c h a n g e is m a d e i n t h e f i l e p e r m i s s i o n , i t c a n n o l o n g e r b e c o n s id e re d b e fo re th e y s e c u re . A d m in is tra to r s a re e x p e c te d to c h a n g e th e c o n fig u r a tio n a re d e p lo y e d in t h e n e tw o rk . F a ilu re t o d o th is a llo w s th e u s e d t o a t t a c k t h e s y s t e m . In o r d e r t o o p t i m i z e t h e c o n f i g u r a t i o n o f t h e o f t h e d e v ic e s d e fa u lt s e ttin g s t o be m a c h in e , r e m o v e a n y r e d u n d a n t s e rv ic e s o r s o ftw a re . Module 01 Page 54 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker A p p lic a tio n -L e v e l A tta c k s 0 CEH 0 A tta c k e rs e x p lo it th e v u ln e r a b ilitie s in a p p lic a tio n s r u n n in g o n o r g a n iz a tio n s ' in fo r m a t io n s y s te m to g a in u n a u th o r iz e d a cce ss a n d s te a l o r m a n ip u la te d a ta 0 0 0 0 0 0 P oor o r n o n e x is te n t e r ro r ch e c kin g O th e r a p p lic a tio n -le v e l a ttacks in a p p lic a tio n s leads to : in clu d e : 9 Buffer overflow attacks 9 Sensitive inform ation disclosure 9 Cross-site scripting 9 Session hijacking and man-in-themiddle attacks 9 Denial-of-service attacks 9 Phishing 9 Session hijacking 9 Man-in-the-middle attack 9 Parameter/form tampering 9 Directory traversal attacks 9 SQL injection attacks 0 0 0 0 Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. A p p l i c a t i o A p p lic a tio n s a re n - l e b e in g v e l A t t a c k s re le a s e d w ith m ore fe a tu re s and m o re c o m p le x c o d in g . W it h t h i s in c r e a s e d d e m a n d in f u n c t i o n a l i t y a n d f e a t u r e s , d e v e l o p e r s g e n e r a l l y o v e r l o o k t h e s e c u r i t y o f t h e a p p lic a t io n , w h i c h g iv e s ris e t o v u l n e r a b i l i t i e s in a p p lic a t io n s . A t t a c k e r s f in d a n d e x p l o i t t h e s e v u l n e r a b i l i t i e s in t h e a p p lic a tio n s u s in g d if f e r e n t t o o ls a n d t e c h n iq u e s . T h e a p p lic a tio n s a re v u ln e ra b le to a tta c k b e c a u s e o f th e fo llo w in g re a so n s: 0 S o ftw a re d e v e lo p e rs h a v e t ig h t s c h e d u le s t o d e liv e r p ro d u c ts o n tim e 0 S o ftw a re a p p lic a tio n s c o m e w ith a m u lt it u d e o f fe a tu r e s a n d fu n c t io n a lit ie s 0 T h e r e is a d e a r t h o f t i m e t o p e r f o r m c o m p l e t e t e s t i n g b e f o r e r e l e a s i n g p r o d u c t s 0 S e c u r i t y is o f t e n a n a f t e r t h o u g h t , a n d f r e q u e n t l y d e l i v e r e d a s a n " a d d - o n " c o m p o n e n t P o o r o r n o n e x i s t e n t e r r o r c h e c k i n g in a p p l i c a t i o n s le a d s t o : 0 B u ffe r o v e rflo w a tta c k s 0 A c tiv e c o n te n t 0 C ro s s -s ite s c r ip tin g 0 D e n ia l- o f-s e rv ic e a n d SYN a tta c k s Module 01 Page 55 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Q SQL in je c tio n a tta c k s Q M a lic io u s b o ts Exam 312-50 Certified Ethical Hacker O th e r a p p lic a tio n - le v e l a tta c k s in c lu d e : Q P h is h in g © S e s s io n h ija c k in g e M a n - in - th e - m id d le a tta c k s e P a ra m e te r/fo rm ta m p e rin g 0 D ir e c to r y tra v e rs a l a tta c k s Module 01 Page 56 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker E x a m p le s o f A p p lic a t io n - L e v e l A tta c k s CEH S e s s io n H ij a c k i n g V u ln e ra b le C ode S ecure Code < configuration> < configuration> <system.web> < s y s te m .w e b > a u t h e n t ic a t io n mode="Forms"> a u t h e n t ic a t io n mode="Forn£3n> The code can be secured by <forms c o o k i e l e s s = " U s e C o o k i e s " > using Attacker may exploit session inform ation in the vulnerable code to perform session hijacking <forms co o k ie ie ss = "U se U ri"> ■ </system.web> < /co nfig ura tion > U s e C o o k ie s </system.web> instead of U seU ri < /co nfig uration > D e n ia l- o f- S e r v ic e S ecure Code V u ln e ra b le C ode S ta te m e n t stm n t ■ c o n n . c r e a te S ta te m e n t < ); R e s u ltS e t r s l t s e t < ); - s tm n t .e x e c u t e Q u e r y S ta te m e n t stm n t; tr y { s tm n t ■ c o n n . c r e a t e S t a t e m e n t s t m n t .e x e c u t e Q u e r y s t m n t .c lo s e (); fin a lly (); ) { I f (stmnt! « n u ll) The code can be secured by releasing the resources in a finally block { t r y { stm n t.clo s e (); The code below is vulnerable to denial-ofservice attack, as it fails to release connection resource i f (); } c atch (SQLException sqlexp) { } } c atch (SQLException sqlexp) { ) Note: For m o re in fo rm a tio n a b o u t a p p lica tio n v u ln e ra b ilitie s and h o w to fix th e m a tten d EC-Council's ECSP program Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. E x a m p le s o f A S e s s io n H p p l i c a t i o n - L e v e l A t t a c k s ija c k in g A tta c k e r s m a y e x p lo it s e s s io n in f o r m a t io n in t h e v u l n e r a b l e c o d e t o p e rfo rm s e s s io n h ija c k in g w h e n y o u e n a b l e c o o k ie le s s a u t h e n t i c a t i o n in y o u r a p p lic a t io n . W h e n t h e t a r g e t t r ie s to b ro w s e in s te a d th ro u g h o f th e a s e cu re URL, th e c o o k ie , s e s s io n to g iv e or a u th e n tic a tio n access to th e URL to k e n a p p e a rs re q u e s te d by in th e th e re q u e st ta rg e t. H e re, URL an a t t a c k e r u s i n g h is o r h e r s k ills a n d m o n i t o r i n g t o o l s c a n h i j a c k t h e t a r g e t s s e s s io n a n d s t e a l a ll s e n s itiv e in fo r m a tio n . V u ln e ra b le C o d e A t t a c k e r s m a y e x p lo it s e s s io n i n f o r m a t i o n Module 01 Page 57 in t h e v u l n e r a b l e c o d e t o p e rfo rm s e s s io n h ija c k in g . Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker < c o n f ig u r a tio n > < s y s te m .w e b > < a u th e n t ic a tio n 4r 4 < fo rm s m o d e = "F o rm s "> c o o k ie le s s = " U s e U r i" > < /s y s te m .w e b > < /c o n fig u r a tio n > TABLE 1.1: S ession H ija c k in g V u ln e ra b le C ode S e cu re C ode T h e c o d e c a n b e s e c u r e d b y u s in g U s e C o o k ie s in s t e a d o f U s e L J ri. < c o n fig u r a tio n > < s y s te m .w e b > < a u th e n t ic a tio n < fo rm s m o d e = "F o rm s "> c o o k ie le s s = " U s e C o o k ie s "> < /s y s te m .w e b > < /c o n f ig u r a tio n > TABLE 1.2: S ession H ija c k in g S ecure C ode D e n ia l- o f- S e r v ic e V u ln e ra b le C o d e The code th a t fo llo w s is v u ln e ra b le to a d e n ia l-o f-s e rv ic e a tta c k , as it fa ils to re le a s e a c o n n e c tio n re s o u rc e . S ta te m e n t s tm n t = c o n n . c re a te S ta te m e n t (); R e s u lt S e t r s lts e t = s tm n t.e x e c u te Q u e ry (); s t m n t.c lo s e (); TABLE 1.3: D e n ia l-o f-S e rv ic e V u ln e ra b le C ode S e cu re C ode T h e c o d e c a n b e s e c u r e d b y r e l e a s in g t h e r e s o u r c e s in a f i n a l l y b lo c k . Module 01 Page 58 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Introduction to Ethical Hacking Exam 312-50 Certified Ethical Hacker 1 S ta te m e n t s t m n t ; 2 try 3 s tm n t.e x e c u te Q u e r y 4 fin a lly 5 I f 6 try 7 } c a tc h ( S Q L E x c e p t io n s q le x p ) { } 8 } c a tc h ( S Q L E x c e p t io n s q le x p ) { } { s tm n t = c o n n .c r e a te S ta te m e n t } { (s tm n t! { (); (); = n u ll) s tm n t.c lo s e { (); TABLE 1.4: D e n ia l-o f-S e rv ic e S ecure C ode Module 01 Page 59 Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker S h r in k W r a p C o d e A tta c k s C E H Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. l iiB S h r in k W r a p C o d e A tta c k s W hen you install an O S /a p plicatio n , it comes w ith many sample scripts to make the a d m in istra to r's life easy. © The problem is "n o t fin e tu n in g " or custom izing these scripts Q This w ill lead to d e fa u lt code or sh rin k w ra p code attacks Code fo r sh rin k w ra p s code attacks M o d u le 0 1 P ag e 60 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking 01522 01523 01524 01525 01526 01527 01528 01529 01530 01531 01532 01533 01534 01535 01536 01537 01538 01539 01540 01541 01542 01543 01544 01545 01546 01547 01548 01549 01550 P iirtk F D im D l» D u D iik 1 w i» n (l« u ^ L lQ u o t* C o u n t lc o v n t sC h ar sP r« v C h a r m ( B v V a l1 L m .\1 S trin g ) A t S tring As Long As Long As Sc r in g As S tr i n g ' S t e r t s 1* n t h R em i t s L i n t ■ T r 1 » ( s L 1n • ) [ [ If L « ft< s L 1n • , C l«& nU pL 1 n • is e com m ent 3) ■ "Ram* T h e n ■ "* E x it F u n c tio n E nd I f ' S ta r ts w ith ‘ i t i s 4 - II t L L e*t tf t ( s L i n • , 1) ■ ■ • י C l* l♦ *. n U p L 1 n • י tExxi ti t F u n c t i o n E nd I f com m ent Th*n ' C o n t a i n s * m i y * re f m e • body o f e s tr in g ~ I t I n S t r ( s L i n « , 0 < ( ־ * ־T h * n s P r •v C h ax » ■ • 1 Q u o t•C o u n t ■ 0 -F o r 01552 01553 01554 »• 30 t+ s t i f l c o v n t ■ 1 To L « n ( s L 1 n • ) fC h » r ■ H1 d ( s L 1 n t , 1 c o u n t , 1) יI f m «v«nnum ber fo u n d • י ״th e n e n ' m eens i t i s th e s t e r t o f • p e rt o f e s tr in g 01 SSI e it is e c o u m r( o r m th e o f "c h t r e c t e r s m fr o n t c o m m e n t .e n d o d d n u m b e rM eans i t xs r־I f s C h a r ■ ־ • ־A nd s P r « v C h * r • ־ ־T h « n r I f 1 0 u o t« C o u n t n o d 2 » 0 T h e n s L i n * ■ T r i a ( L « f t < sL 1 n « , l c o v n t - 1 ) ) E x it For L ln d I f - l l s « I f sC h ar ■ ־ ־ ־ ־T h e n lQ u o t• C o u n t ■ lO u o t•C o u n t ♦ 1 L In d I f sP ra v C h a r * *C har N ax t 1c o u n t 1 En d I f 01555 01556 01557 01558 01559 01560 01561 01562 01563 01564 01565 01566 Exam 3 1 2 -5 0 C ertified Ethical H acker C l« a n U p L ln « ■ s L l n • In d F u n c tio n FIGURE 1.3: S h rin k W ra p s C ode M o d u le 0 1 P ag e 61 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker C E H F lo w (•rtifwd ^/—ייייי Types o f A tta cks Hacking Phases itkitjl Inform ation S ecurity Controls Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. M o d u le In the flo w previous section, we discussed how an a ttacker can com prom ise an in fo rm a tio n system and w h a t type o f attacks an a ttacker can perform . Now, we w ill discuss in fo rm a tio n se curity co n tro ls. In fo rm a tio n security co ntrols p re ve n t u n w a n te d events fro m occurring and reduces the risk to the in fo rm a tio n assets o f the organization w ith se curity policies. In fo rm a tio n S ecurity O vervie w Hacking Phases In fo rm a tio n S ecurity Threats and A tta ck V ectors Types o f A ttacks £—־ s ' f Hacking Concepts In fo rm a tio n S ecurity C ontrols • * 5OL This section highlights the im portance o f ethical hacking and discusses various se curity policies. M o d u le 0 1 P ag e 62 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker W h y E t h ic a l H a c k in g is N e c e s s a r y To beat a hacker, you need to think like one! E th ic a l h a c k in g is n e c e s s a ry b e c a u s e it a llo w s t h e c o u n te r in g o f a tta c k s fr o m m a lic io u s h a c k e rs b y a n tic ip a tin g m e th o d s th e y can use to b re a k in to a s y s te m Ethical Hackers Try to Answer the Following Questions Reasons why Organizations Recruit Ethical Hackers To prevent hackers from gaining access to information breaches What can the intruder see on the target system? (Reconnaissance and Scanning phases) To fight against terrorism and national security breaches What can an intruder do with that information? (Gaining Access and Maintaining Access phases) To build a system that avoids hackers from penetrating Does anyone at the target notice the intruders' attempts or successes? (Reconnaissance and Covering Tracks phases) To test if organization's security settings are in fact secure If all the components of information system are adequately protected, updated, and patched How much effort, time, and money is required to obtain adequate protection? |}> Does the information security measures are in compliance to industry and legal standards? Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. W h y E th ic a l H a c k in g Is N e c e s s a ry There is rapid g ro w th in technology, so th e re is g ro w th in the risks associated w ith the technology. Ethical hacking helps to p re d ic t the various possible v u ln e ra b ilitie s w ell in advance and re ctify the m w ith o u t incurring any kind o f attack fro m outsiders. © Ethical Hacking: As hacking involves creative thinking , v u ln e ra b ility te s tin g and se curity audits cannot ensure th a t the n e tw o rk is secure. Q D efense-in-D epth S trategy: To achieve this, organizations need to im p le m e n t a "d e fe n s e -in -d e p th " strategy by p en e tratin g th e ir netw orks to e stim a te v u ln e ra b ilitie s and expose them . 0 C ounter th e A ttacks: Ethical hacking is necessary because it allows co un terin g o f attacks fro m m alicious hackers by a n tic ip a tin g m e tho d s th e y can use to break in to a system. M o d u le 0 1 P ag e 63 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking S c o p e Exam 3 1 2 -5 0 C ertified Ethical H acker a n d L im ita tio n s o f E th ic a l C E H H a c k in g Scope Ethical hacking is a crucial com ponent o f risk assessment, au diting, c ou nterfrau d, best practices, and good governance It is used to id e n tify risks and highlight th e rem edial actions, and also reduces info rm atio n and com m unications technology (ICT) costs by resolving those vulnerabilities 'G tJ Limitations However, unless the businesses first know w hat it is at th a t they are looking fo r and why they are hiring an outside ven dor to hack systems in the first place, chances are there w ould no t be much to gain fro m the experience An ethical hacker thus can only help the organization to be tter understand th e ir security system, but it is up to the organization to place the righ t guards on the netw ork Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. S c o p e a n d L im ita tio n s o f E t h ic a l H a c k in g Ethical hacking has a scope, and th e re are various lim ita tio n s o f ethical hacking, as w ell. S cope The fo llo w in g is the scope o f ethical hacking: Q Ethical hacking is a crucial co m p on e nt o f risk assessment, a u d itin g , co u n te r fra u d , best practices, and good governance. © It is used to id e n tify risks and h ig hligh t rem edial actions, and it reduces in fo rm a tio n and c o m m u n ica tio n s te ch n o lo g y (ICT) costs by resolving those vu ln erabilities. L im it a t io n s e The fo llo w in g are th e lim ita tio n s o f ethical hacking: Q Unless businesses firs t know w h a t it is th e y are looking fo r and w hy the y are hiring an outside ve nd o r to hack systems in the firs t place; chances are th a t th e re w ill not be much to gain fro m the experience. © An ethical hacker th e re fo re can help the organization only to b e tte r understand th e ir se curity system , b ut it is up to the organization to im p le m e n t the rig h t safeguards on the netw ork. M o d u le 0 1 P ag e 64 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking S k ills P la tfo r m K n o w le d g e Exam 3 1 2 -5 0 C ertified Ethical H acker o f a n E t h ic a l H a c k e r Has in-d epth know ledge o f m a jo r operating en vironm ents, such as W indow s, Unix, and Linux N e t w o r k K n o w le d g e Has in-d epth know ledge o f n e tw o rkin g concepts, technologies and related hardw are and softw a re C o m p u te r E x p e r t S e c u r ity K n o w le d g e T e c h n ic a l K n o w le d g e C E H CwtMM IthKJl lUck•* a o Should be a com p u te r exp ert ad ept at technical dom ains Has know ledge o f security areas and related issues Has "h ig h te ch n ica l" know ledge to launch th e sophisticated attacks u Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. S k ills o f a n E th ic a l H a c k e r Ethical hacking is the legal hacking p erfo rm ed by pen te ste r to fin d v u ln e ra b ilitie s in the in fo rm a tio n technology e nviron m e n t. In o rd er to p e rfo rm ethical hacking, the ethical hacker requires the skills o f a co m p u te r expert. Ethical hackers should also have strong c o m p u te r know ledge including p ro g ra m m in g and n e tw o rk in g . They should be p ro ficie n t at installing and m aintaining systems using popular operating systems (e.g. UNIX, W indow s, or Linux). Detailed know ledge o f h ard w a re and s o ftw a re provided by popular co m p u te r and netw o rkin g hardw are vendors co m p lem en t this basic know ledge. It is n ot always necessary th a t ethical hackers possess any a dditional specialization in security. However, it is an advantage to know how various systems m aintain th e ir security. M a n a g e m e n t skills p ertaining to these systems are necessary fo r actual vu ln e ra b ility testin g and fo r preparing the re p o rt a fte r the testin g is carried out. An ethical hacker should possess im m ense patience as the analysis stage consumes m ore tim e than the testing stage. The tim e fra m e fo r an evaluation may va ry fro m a fe w days to several weeks, depending on the nature o f the task. W hen an ethical hacker encounters a system w ith w hich he or she is n ot fam ilia r, it is im perative th e person takes the tim e to learn everything about the system and try to find its v u ln e ra b le spots. M o d u le 0 1 P ag e 65 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2-50 C ertified Ethical H acker D e fe n s e ־i n ־D e p th M u ltip le defense-in-depth counterm easures are taken to p ro te c t in fo rm a tio n assets o f a com pany. The strategy is based on the m ilita ry principle th a t it is m ore d iffic u lt fo r an enem y to defeat a com plex and m u lti-la y e re d defense system than to penetrate a single barrier. If a hacker gains access to a system, defense-in-depth m inim izes the adverse im pact and gives a dm inistrato rs and engineers tim e to deploy new o r updated counterm easures to p revent a recurrence. Q Defense-in-depth is a security strategy in w hich several p ro te c tio n layers are placed th ro u g h o u t an in fo rm a tio n system. © It helps to prevent d ire ct attacks against an in fo rm a tio n system and data because a break in one layer only leads the a ttacker to the next layer. M o d u le 0 1 P ag e 66 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker D efense in D epth L a ye rs FIGURE 1.4: D e fe n se in D e p th Layers D ia g ra m M o d u le 0 1 P ag e 67 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker In c id e n t M a n a g e m e n t P r o c e s s CEH Urtifwl tthKJl lUck•* ~־i 11--- 3 <9J Purpose of incident management process Incid ent m a nagem ent is a set o f defined processes to id e n tify , analyze, p rio ritiz e , 1 Improves service quality 2 Pro-active problem resolution 3 Reduces impact of incidents on business/organization 4 Meets service availability requirements and resolve s e c u rity inc id e n ts to restore n o rm a l service o p e ra tio n s as q u ickly as possible and prevent fu tu re reoccurrence o f th e in c id e n t /ץ ־ a a a a 5 Increases staff efficiency and productivity 6 Improves user/customer satisfaction /ץ ־׳ 7 Assists in handling future incidents Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. O ־׳V *,'3 ^ ^ In c id e n t M a n a g e m e n t P ro c e s s י Incident m anagem ent is a set o f defined processes to id e ntify, analyze, p rio ritize , and resolve security incidents to restore the system to norm al service operations as soon as possible and p revent the recurrence o f the same incident. The purpose o f th e in cid en t m anagem ent process: Q Im proves service qua lity Q Pro-active problem resolution Q Reduces im pact o f incidents on business/organization 0 M eets service a vailability requirem ents e Increases staff efficiency and p ro d u ctivity Q Im proves u ser/cu sto m er satisfaction Q Assists in handling fu tu re incidents M o d u le 0 1 P ag e 68 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0linCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker In c id e n t M a n a g e m e n t P r o c e s s E H ( C o n t 'd ) , f \S N ',ha * '°ft ׳eW % ׳% r«lr Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited. In c id e n t M a n a g e m e n t P ro c e s s (C o n t’d ) Incident m anagem ent is the process o f logging, recording, and resolving incidents th a t take place in the organization. The incident may occur due to fa u lt, service degradation, error, etc. The incidents are re p orte d by users, technical staff, or som etim es detected auto m a tically by event m o n ito rin g to o ls. The main objective o f the in cident m anagem ent process is to restore the service to a norm al stage as early as possible to custom ers, w hile m aintaining a vailability and q u a lity o f service. Any occurrence o f the in cident in an organization is handled and resolved by fo llo w in g these incident m anagem ent steps: 0 Preparation fo r Incident Handling and Response 0 D etection and Analysis 0 Classification and P rioritization 0 N o tifica tion 0 C ontainm ent 0 Forensic Investigation 0 Eradication and Recovery 0 P ost-incident A ctivities M o d u le 0 1 P ag e 69 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2-50 C ertified Ethical H acker In f o r m a t io n S e c u r it y P o lic ie s J S e c u rity p o lic ie s a re th e fo u n d a tio n o f th e s e c u r ity in f r a s t r u c t u r e J A s e c u rity p o lic y is a d o c u m e n t o r s e t o f d o c u m e n ts th a t d e s c rib e s t h e s e c u r ity c o n tr o ls th a t w ill be im p le m e n te d in th e c o m p a n y a t a h ig h le v e l G oals o f S e c u rity P o licie s M aintain an outline fo r the management and adm inistration of netw ork security & © Prevent unauthorized m odifications of the data ־ ־ Reduce risks caused by illegal use of the system resource, loss of sensitive, confidential data, and potential property Protection of organization's com puting resources ® Elim ination o f legal lia b ility from employees or th ird parties © D ifferentiate the user's access rights Protect confidential, proprietary inform ation fro m th e ft, misuse, unauthorized disclosure Ensure customers' integrity and prevent waste o f company com puting resources Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. In fo r m a tio n S e c u r ity P o lic ie s A security policy is a docum ent or set o f docum ents th a t describes the security co ntrols th a t should be im p le m e n te d in the com pany at a high level fo r safeguarding the organizational n e tw o rk fro m inside and outside attacks. This d ocu m e n t defines the com plete security arch itectu re o f an organization and the d ocum ent includes clear objectives, goals, rules and regulations, fo rm a l procedures, and so on. It clearly m entions the assets to be protected and the person w ho can log in and access sites, w ho can vie w the selected data, as w ell as the people w ho are allow ed to change the data, etc. W ith o u t these policies, it is im possible to p ro te c t the com pany fro m possible lawsuits, lost revenue, and so on. Security policies are the fo u n d a tio n o f the se curity in fra s tru c tu re . These policies secure and safeguard the in fo rm a tio n resources o f an organization and provide legal p ro te ctio n to the organization. These policies are beneficial since th e y help bring awareness o f the s ta ff w orking in the organization to w o rk to g e th e r to secure its co m m unication, as w ell as m inim izing the risks o f security weaknesses throu g h "h u m a n -fa c to r" mistakes such as disclosing sensitive in fo rm a tio n to unauthorized o r unknow n sources, im p ro p e r use o f Inte rn e t, etc. In a dd ition, these policies provide p ro te ctio n against cyber-attacks, m alicious threats, foreign intelligence, and so on. They m ainly address physical security, n e tw o rk security, access authorizations, virus p ro te ctio n , and disaster recovery. M o d u le 0 1 P ag e 70 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker The goals o f se curity policies include: 0 M a in tain an o u tlin e fo r the m anagem ent and a dm in istra tio n o f n e tw o rk security 0 P rotection o f organization's co m p utin g resources 0 E lim in a tio n o f legal lia b ility fro m em ployees or th ird parties 0 Ensure custom ers' in te g rity and prevent wasting o f com pany co m p utin g resources 0 P revent u n a u th o rize d m o d ific a tio n s o f data 0 Reduce risks caused by illegal use o f the system resources and loss o f sensitive, co nfid e ntia l data and p ote n tia l p ro p e rty 0 D iffe re n tia te a user's access rights 0 P rotect confid e ntia l, p ro p rie ta ry in fo rm a tio n fro m th e ft, misuse, or u n a u th o rize d disclosure M o d u le 0 1 P ag e 71 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker C la s s ific a tio n o f S e c u r ity P o lic ie s C E H User Policy <30<5X5X3 » Defines what kind of user is using the network « Defines the limitations that are applied on users to secure the network « Ex: Password management policy Issue Specific Policies IT Policy 9 Recognize specific areas of concern and describe the organization's status for top level management » Designed for IT department to keep the network secure and stable w Ex: Backup policies, server configuration, patch update, and modification policies, firewall policies 9 Ex: Physical security policy, personnel security policy, communications security Partner Policy General Policies Policy that is defined among a group of partners « e Defines the responsibility for general business purposes Ex: High level program policy, business continuity plans, crisis management, disaster recovery Copyright © by EG-GlOOCil. All Rights Reserved. Reproduction Is Strictly Prohibited. C la s s ific a tio n o f S e c u r ity P o lic ie s Security policies are sets o f policies th a t are developed to p ro te ct or safeguard a com pany's in fo rm a tio n assets, netw orks, etc. These policies are applicable to users, IT departm ents, organization, and so on. For effe ctive security m anagem ent, security policies are classified in to five d iffe re n t areas: I—U s e r P o lic y 0 Defines w h a t kind o f user is using the n e tw o rk 0 Defines the lim ita tio n s th a t are applied on users to secure the n e tw o rk 0 Ex: Password M anagem ent Policy I T P o lic y Designed fo r an IT d e p a rtm e n t to keep th e n e tw o rk secure and stable Ex: backup policies, server co nfig u ra tion , patch updates, m o d ifica tio n policies, fire w a ll policies G e n e r a l P o lic ie s ^ Define th e responsibility fo r general business purposes M o d u le 0 1 P ag e 72 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2-50 C ertified Ethical H acker Ex: high-level program policy, business c o n tin u ity plans, crisis m anagem ent, disaster recovery P a r tn e r P o lic y Policy th a t is defined among a group o f partners ^ x I s s u e - s p e c ific P o lic ie s Recognize specific areas o f concern and describe the organization's status fo r to p - level m anagem ent Ex: physical security policy, personnel security policy, com m unications security M o d u le 0 1 P ag e 73 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker S tru c tu re S e c u r ity a n d C o n te n ts C E H P o lic ie s Contents of S ecurity Policies S ecurity Policy S tructure » Detailed description o f th e policy issues e Description about the status o f th e policy « A pplicability o f the policy to the e n vironm ent » Functionalities o f those affected by the policy » » High-level security requirem ents: Requirem ent o f a system to im plem ent security policies Policy de scription : Focuses on security disciplines, safeguards, procedures, con tinuity o f operations, and docum entation » Security concept o f o p eratio n: Defines the roles, responsibilities, and functions o f a security policy » A llo cation o f security en forcem ent to architectu re elem ents: Provides a com puter system architecture w C o m p a tib ility level o f the policy is necessary « o f End-consequences o f non-com pliance allocation to each system o f the program X Copyright © by EG-C*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. S tru c tu re a n d C o n te n ts o f S e c u r ity P o lic ie s *I S tr u c tu r e o f S e c u r ity P o lic ie s A security policy is the docum ent th a t provides the w ay o f securing the com pany's physical personnel and data fro m threa ts o r se curity breaches. Security policies should be stru cture d very carefully and should be review ed p ro pe rly to make sure th a t th e re is no w o rd in g th a t som eone could take advantage of. The basic s tru c tu re o f security policies should include the follo w in g : 0 D etailed d e scrip tio n o f the policy issues 0 Description o f the status o f the policy 0 A p p lica b ility o f the policy to the e n viro n m e n t 0 Functionalities o f those affected by the policy 0 Specific consequences th a t w ill occur if the policy is n ot com patible w ith the organizational standards r C o n te n t o f S e c u r ity P o lic ie s ■־ ‘1 Security policies contain the fo llo w in g elem ents: M o d u le 0 1 P ag e 74 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking 0 Exam 3 1 2 -5 0 C ertified Ethical H acker H igh-level S ecurity R equirem ents: Explains the re q u ire m e n ts o f a system fo r the security policies to be im plem ented. The fo u r d iffe re n t types o f re quirem ents are discipline, safeguard, p ro cedural, and assurance. t? D iscipline S ecurity R equirem ents: This re q u ire m e n t includes various security policies such as co m m u n ica tio n s security, c o m p u te r security, o p e ra tio n s security, e m a na tio ns security, n e tw o rk security, personnel security, in fo rm a tio n security, and physical security. ti Safeguard S ecurity R equirem ents: This re q u ire m e n t m ainly contains access co ntro l, archive, audit, a u th e n ticity, a v a ila b ility , c o n fid e n tia lity , cryptography, id e n tifica tio n and a u th e n tica tio n , in te g rity, interfaces, m arking, n o n -re p u d ia tio n , o bject reuse, recovery, and virus p ro te c tio n . - P rocedural S ecurity R equirem ents: This re q u ire m e n t m ainly contains access policies, a c c o u n ta b ility rules, c o n tin u ity -o f-o p e ra tio n s plans, and docu m e n ta tio n. t? Assurance S ecurity: This includes c e rtific a tio n and a ccre d ita tio n review s and sustaining planning docum ents used in the assurance process. © Policy D e scription: Focuses on security disciplines, safeguards, procedures, c o n tin u ity o f operations, and d o cu m e n ta tio n. Each subset o f this p o rtio n o f the policy describes how the system 's arch itectu re w ill enforce security. 0 S ecurity Concept o f O p e ra tio n : M a inly defines the roles, re sp on sib ilitie s, and fu n c tio n s o f a security policy. It focuses on mission, com m unications, e ncryption, user and m aintenance rules, id le -tim e m anagem ent, use o f p riva tely ow ned versus public-dom ain softw are, shareware softw are rules, and a virus p ro te ctio n policy. 0 A llo ca tio n o f S ecurity E nforcem ent to A rc h ite c tu re Elem ents: Provides a co m p u te r system a rch itectu re allocation to each system o f the program . M o d u le 0 1 P ag e 75 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2-50 C ertified Ethical H acker T y p e s o f S e c u r it y י P o lic ie s C E H m P ro m isc u o u s P e rm issiv e P ru d e n t P a ra n o id P o licy P o licy P o licy P o licy □ -----No restrictions on In te rn e t o r re m ote access Policy begins w ide open and on ly It provides maximum security w h ile It forbids everything, no In te rn e t k no w n dangerous services/attacks allow ing know n but necessary dangers con nection , or blocked, w hich makes it d iffic u lt to It blocks all services and only safe/ necessary services are enabled individually; everything is logged keep up w ith c u rre n t exploits severely lim ite d In te rn e t usage Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. H -|t־ T y p e s o f S e c u r ity P o lic ie s A security policy is a d o cu m e n t th a t contains in fo rm a tio n on the w ay th e com pany plans to p ro te ct its in fo rm a tio n assets fro m kn ow n and u n kn o w n th re a ts. These policies help to m aintain the co nfid e ntia lly, availability, and in te g rity o f in fo rm a tio n . The fo u r m ajor types o f security policies are as follow s: A P r o m is c u o u s P o lic y m rk W ith a prom iscuous policy, the re is no re s tric tio n on In te rn e t access. A user can access any site, dow nload any application, and access a co m p u te r or a n e tw o rk fro m a rem ote location. W hile this can be useful in co rp orate businesses w here people w ho travel or w o rk at branch offices need to access the organizational netw orks, many m alware, virus, and Trojan threa ts are present on the Inte rn e t. Due to free In te rn e t access, this m alw are can come as a ttachm ents w ith o u t the know ledge o f the user. N e tw o rk a d m in is tra to rs m ust be extrem ely a le rt if this type o f policy is chosen. P e r m is s iv e P o lic y i!L 1 •׳ In a permissive policy, the m a jo rity o f In te rn e t tra ffic is accepted, b ut several know n dangerous services and attacks are blocked. Because only know n attacks and exploits are M o d u le 0 1 P ag e 76 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker blocked, it is im possible fo r adm inistrato rs to keep up w ith cu rre n t exploits. A dm in istra to rs are always playing catch-up w ith new attacks and exploits. P r u d e n t P o lic y A p ru de n t policy starts w ith all services blocked. The a d m in istra to r enables safe and necessary services individually. This provides m a xim u m security. Everything, such as system and n e tw o rk activities, is logged. P a r a n o id P o lic y cw - In a paranoid policy, everything is fo rb id d e n . There is s tric t re s tric tio n on all usage o f com pany com puters, w h e th e r it is system usage o r n e tw o rk usage. There is e ith e r no In te rn e t connection o r severely lim ite d In te rn e t usage. Due to these overly severe restrictions, users o fte n try to find ways around them . M o d u le 0 1 P ag e 77 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2-50 C ertified Ethical H acker S te p s to C re a te S e c u r ity a n d Im p le m e n t P o lic ie s Make fin a l version available to all o f the staff in the organization Include senior m anagem ent Perform risk assessment to iden tify risks to the and all oth e r staff in policy developm ent organization's assets 4 Train your em ployees and educate them about the policy Set clear penalties and Learn fro m standard guidelines and oth e r organizations enforce the m and also review and update o f the security policy Ensure every m em ber o f your staff read, sign, and understand th e policy Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. S te p s to C r e a te a n d I m p le m e n t S e c u r ity P o lic ie s Im p lem enting se curity policies reduces the risk o f being attacked. Thus, every com pany m ust have its own security policies based on its business. The fo llo w in g are the steps to be fo llo w e d by every organization in o rd er to create and im p le m e n t security policies: 1. Perform risk assessm ent to id e n tify risks to th e organization's assets 2. Learn fro m standard g uidelines and o th e r organizations 3. Include senior m anagem ent and all o th e r sta ff in policy deve lo p m en t 4. Set clear p enalties and enforce the m and also review and update the security policy 5. Make the final version available to all sta ff in the organization 6. Ensure every m em ber o f yo u r sta ff reads, signs, and understands the policy 7. Install the too ls you need to enforce th e policy 8. Train yo ur em ployees and educate the m about the policy M o d u le 0 1 P ag e 78 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker It defines the acceptable use of system resources Acceptable-Use Policy User-Account Policy It defines the account creation process and authority, rights and responsibilities of user accounts Remote-Access Policy It defines who can have remote access, and defines access medium and remote access security controls Inform ationProtection Policy i FirewallM anagem ent Policy WT It defines the sensitivity levels of information, who may have access, how is it stored and transmitted, and how should it be deleted from storage media It defines access, management, and monitoring of firewalls in the organization Special-Access Policy This policy defines the terms and conditions of granting special access to system resources N etw orkConnection Policy It defines who can install new resources on the network, approve the installation of new devices, document network changes, etc. Email Security Policy Passwords Policy It is created to govern the proper usage of corporate email It provides guidelines for using strong password protection on organization's resources Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. E x a m p le s o f S e c u r ity P o lic ie s The fo llo w in g are some examples o f security polies th a t are created, accepted, and used by organizations w o rld w id e to secure th e ir assets and im p o rta n t resources. A cceptable-U se Policy Defines the acceptable use o f system resources U ser-A ccount Policy Defines th e account creation process and a u th o rity , rights, and re sp o n sib ilitie s o f user accounts Remote-Access Policy Defines w ho can have re m o te access, and defines access m e d ium and re m o te access security controls In fo rm a tio n -P ro te c tio n Policy Defines the s e n s itiv ity levels o f in fo rm a tio n , w ho may have access, how is it stored and tra n s m itte d , and how should it be deleted fro m storage media F ire w a ll-M a n a g e m e n t Policy M o d u le 0 1 P ag e 79 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker Defines access, m anagem ent, and m o n ito rin g o f fire w a lls in the organization Special-Access Policy This policy defines th e te rm s and co n d itio n s o f granting special access to system resources N e tw o rk-C o n n e ctio n Policy Defines w ho can install n ew resources on the n etw o rk, approve the in stallation o f new devices, d ocum ent n e tw o rk changes, etc. Email S ecurity Policy Created to govern the p ro pe r usage o f co rp o ra te em ail Password Policy Provides guidelines fo r using stro ng passw ord p ro te c tio n on organization's resources M o d u le 0 1 P ag e 80 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2-50 C ertified Ethical H acker V u ln e r a b ilit y J R e s e a r c h T h e p ro c e s s o f d is c o v e r in g v u ln e r a b ilit ie s a n d d e s ig n fla w s th a t w ill o p e n an o p e r a tin g s y s te m a n d its a p p lic a tio n s to a tta c k o r m is u s e J V u ln e r a b ilitie s a re c la s s ifie d b a s e d o n s e v e r ity le v e l (lo w , m e d iu m , o r h ig h ) a n d e x p lo it ra n g e (lo c a l o r re m o te ) An administrator needs vulnerability research: י To gather in fo rm a tio n ab out To find weaknesses and a le rt the security trends, threats, and attacks n e tw o rk a d m in istra to r before a n e tw o rk attack o To get in fo rm a tio n th a t helps © to prevent th e security problem s To know ho w to recover fro m a n e tw o rk attack Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. V u ln e r a b ility R e s e a rc h V u ln e ra b ility research means discovering system design fa u lts and weaknesses th a t m ight help attackers com prom ise the system. Once the a ttacker finds o u t the v u ln e ra b ility in the p ro du ct or th e application, he or she trie s to e x p lo it it. V u ln e ra b ility research helps both security adm inistrato rs and attackers: © Discovering system design faults and weaknesses th a t m ight help attackers to com prom ise the system Q Keeping abreast o f the latest v e n d o r-su p p o rte d p roducts and o th e r technologies in o rd er to find news related to cu rre n t exploits e Checking new ly released alerts regarding relevant innovations and p roduct im p rovem ents fo r security systems e V u ln e ra b ility research is based on the fo llo w in g classification: Q S everity level (low, m edium , or high) Q E xploit range (local or rem ote) An a d m in is tra to r needs v u ln e ra b ility research: Q To gather in fo rm a tio n about security trends, threats, and attacks © To find weaknesses and a le rt the n e tw o rk a d m in istra to r before a n e tw o rk attack Q To get in fo rm a tio n th a t helps to p revent security problem s Q To know how to recover fro m a n e tw o rk attack M o d u le 0 1 P ag e 81 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking V u ln e r a b ility 1 j % ןיין י ^ ו Exam 3 1 2-50 C ertified Ethical H acker R e s e a r c h W e b s ite s C o d e R e d C e n te r http://www.eccouncil.org TechN et http://blogs. technet.com / ץ I ר־־־ £3| -1—1 S e c u r ity M a g a z in e http://www.5ecuritymagazine.com S e c u rity F o c u s http://www.securityfocus. com C E H H a c k e r S to rm http://www.hackerstorm.co.uk SC M a g a z in e / » f fp : / / w w w .s c m o g o z / n e .c o m C o m p u te r w o r ld http://www.computerworld. com H a c k e rJ o u rn a ls http://www.hackerjournals.com < c ™ H e lp N e t S e c u r ity http://www.net-security.org \o*M v > ------ W in d o w s S e c u r ity B lo g s http://blogs.windowsecurity.com Copyright © by EG-C*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. V u l n e r a b ilit y R e s e a r c h W e b s ite s The fo llo w in g are the some v u ln e ra b ility research w ebsites th a t you can use: ill...... f -L11lilll | C o d e R e d C e n te r Source: h ttp ://w w w .e c c o u n c il.o rg The CodeRed Center is a com prehensive se curity resource a d m in is tra to rs can tu rn to fo r daily, accurate, u p-to -d a te in fo rm a tio n on the latest viruses, Trojans, m alw are, threats, security tools, risks, and vulnerabilities. ( P TechN et Source: h ttp ://b lo g s.te ch n e t.co m TechN et is a p ro ject team fro m across M ic ro s o ft Lync Server team s and the co m m u n ity at large. It is led by the Lync Server d o cu m e n ta tio n team ; th e ir w rite rs and technical review ers come fro m all disciplines, including p ro du ct engineers, fie ld engineers, su pp o rt engineers, d ocu m e n ta tio n engineers, and some o f the m ost respected technology bloggers and authors in the Lync Server universe. M o d u le 0 1 P ag e 82 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking X mVn Exam 3 1 2 -5 0 C ertified Ethical H acker S e c u r ity M a g a z in e Source: h ttp ://w w w .se cu ritym a g a zin e .co m Security Magazine is uniquely focused on solutions fo r enterprise security leaders. It is designed and w ritte n fo r business-m inded executives w ho manage e n te rp rise risk and security. Security Magazine provides m anagem ent-focused features, opinions, and trends fo r leaders in business. S e c u r ity F o c u s Source: h ttp ://w w w .s e c u rity fo c u s .c o m The Security Focus w ebsite focuses on a fe w key areas th a t are o f greatest im portance to the security co m m unity. Q BugTraq is a high-volum e, full-disclosure m ailing list fo r the detailed discussion and announcem ent o f co m p u te r security vu ln era b ilitie s. BugTraq serves as the cornerstone o f th e In te rn e t-w id e security co m m unity. 0 The SecurityFocus V u ln e ra b ility Database provides security professionals w ith the m ost u p-to -d a te in fo rm a tio n on vu ln era b ilitie s fo r all p la tfo rm s and services. H e lp N e t S e c u r ity Source: h ttp ://w w w .n e t-s e c u rity .o rg Net Security is a daily security news site th a t has been covering th e latest co m p u te r and n e tw o rk security news since its inception in 1998. Besides covering news around the globe, HNS focuses on q u a lity technical articles and papers, vu ln era b ilitie s, ve nd o r advisories, m alware, and hosts th e largest security softw are dow nload area w ith so ftw a re fo r W indow s, Linux, and Mac OS X. H a c k e rS to rm Source: http://www.hackerstorm.co.uk HackerStorm is a security resource fo r e thical hackers and p e n e tra tio n teste rs to create b e tte r p en e tra tio n testin g plans and scopes, and conduct vu ln e ra b ility research. S C M a g a z in e ^ Source: h ttp ://w w w .scm a g a zin e .co m SC Magazine is published by H aym arket Media Inc. and is part o f a global brand. There are th re e separate editions o f the magazine: © N orth Am erica - U.S. and Canada © Inte rn a tion a l - U.K. and m ainland Europe M o d u le 0 1 P ag e 83 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Q Exam 3 1 2 -5 0 C ertified Ethical H acker Asia Pacific O nline - read by decision-m akers in over 20 co u n trie s in the Pacific Rim region The magazine is published m o n th ly, usually in the firs t w eek o f each m o n th . It is th e longest running in fo rm a tio n security magazine in the w o rld , w ith the w idest d istrib u tio n . SC Magazine provides IT security professionals w ith in -d ep th and unbiased in fo rm a tio n in one incom parable publication. In each m o n th ly issue it has tim e ly news, com prehensive analysis, cutting-edge features, co n trib u tio n s fro m th o u g h t leaders and the best, m ost extensive co llection o f p ro du ct reviews in the business. They been doing this since 1989, w hen it firs t began cam paigning fo r organizations' in fo rm a tio n security leaders, making it the longest established IT security title in the United States. C o m p u te r w o r ld ““ “ — Source: h ttp ://w w w .c o m p u te rw o rld .c o m For m ore than 40 years, C o m p ute rw o rld has been the leading source o f technology news and in fo rm a tio n fo r IT influencers w o rld w id e . C o m p u te rw o rld 's w e b site (C om puterw orld.com ), tw ic e -m o n th ly publication, focused conference series, and custom research fo rm the hub o f the w o rld 's largest global IT media netw ork. Source: h ttp ://w w w .h a c k e rio u rn a ls .c o m Hacker Journals is an online In fo rm a tio n S ecurity C o m m u n ity. It propagates news specifically related to in fo rm a tio n security threa ts and issues fro m all over the w o rld . Its research team s search and com pile news fro m tens o f thousands o f sites to bring you the m ost relevant Cyber Security title s in one location. In a dd itio n to news, it hosts blogs and discussions, education videos, as w ell as its W orld Famous Hack.ED colum n, providing education series in Ethical Hacking and C ounterm easure Techniques and technologies. \— / - W in d o w s S e c u r it y B lo g s Source: h ttp ://b lo g s.w in d o w se cu rity.co m W indow s security has blogs posted by fam ou s auth ors w ho are leading industry experts. It has various features such as articles and tu to ria ls, blogs, message boards, security tests, and w h ite papers. M o d u le 0 1 P ag e 84 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker W h a t I s P e n e t r a t io n T e s t in g ? C E H UrtrfW* I ttfciul lUilwt T e s tin g in v o lv e s a c tiv e a n a ly s is o f P e n e tra tio n te s tin g is a m e th o d o f e v a lu a tin g s y s te m c o n fig u ra tio n s , d e s ig n th e s e c u rity o f an in fo r m a t io n s y s te m o r w e a k n e s s e s , n e tw o r k n e tw o r k b y s im u la tin g a n a tta c k to a r c h ite c tu re , te c h n ic a l fla w s , f in d o u t v u ln e r a b ilit ie s th a t an a n d v u ln e r a b ilitie s a tta c k e r c o u ld e x p lo it B lack b o x te s tin g s im u la te s an A c o m p re h e n s iv e r e p o r t w ith a tta c k fr o m s o m e o n e w h o has d e ta ils o f v u ln e ra b ilitie s n o p r io r k n o w le d g e o f th e s y s te m , d is c o v e re d a n d s u ite o f re c o m m e n d e d c o u n te rm e a s u re s a n d w h ite b o x te s tin g s im u la te s an is d e liv e re d to th e e x e c u tiv e , a tta c k fr o m s o m e o n e w h o has m a n a g e m e n t, a n d te c h n ic a l a u d ie n c e s c o m p le te k n o w le d g e a b o u t th e s y s te m Copyright © by EG-G(IIIICil. All Rights Reserved. Reproduction is Strictly Prohibited. W h a t I s P e n e t r a t io n T e s tin g ? P enetration testing is a m ethod o f e va lu a tin g se curity levels o f a p articula r system or n etw o rk. This helps you d ete rm ine th e flaw s related to h a rd w a re and so ftw a re . The early id e n tific a tio n helps p ro te c t th e n e tw o rk . If the vu ln era b ilitie s a re n 't id e n tifie d early, the n the y becom e an easy source fo r the attacker fo r the intrusion. During p en e tratio n testing, a pen te ste r analyzes all the se curity measures em ployed by the organization fo r design weaknesses, technical flaws, and vu ln era b ilitie s. There are tw o types o f testing; black box te s tin g and w h ite b o x te stin g . Black box testin g sim ulates an attack fro m som eone w ho is u n fa m ilia r w ith the system, and w h ite box testing sim ulates an a ttacker th a t has kn ow led g e abo u t the system. Once all the tests are conducted, th e pen te ste r prepares a re p o rt and includes all the te st results and the tests conducted along w ith the vu ln era b ilitie s fou n d and the respective counterm easures th a t can be applied. Finally, the pen te ste r delivers the re p o rt to executive, m anagem ent, and technical audiences. M o d u le 0 1 P ag e 85 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker ב W h y P e n e t r a t io n T e s t in g C E H (•rtifwd A S e Identify the threats facing an organization's information assets © For testing and validating the efficiency of security protections and controls Reduce an organization's expenditure on IT security and enhance Return ^ On Security Investment (ROSI) by identifying and remediating vulnerabilities or weaknesses 8 itkitjl a For changing or upgrading existing infrastructure of software, hardware, or network design W Focus on high-severity vulnerabilities and emphasize application-level security issues to development teams and management Provide assurance with comprehensive assessment of organization's security including policy, procedure, design, and Implementation » Gain and maintain certification to an industry regulation (BS7799, HIPAA etc.) Provide a comprehensive approach of preparation steps that can be taken to prevent upcoming exploitation w Evaluate the efficiency of network security devices such as firewalls, routers, and web servers Adopt best practices in compliance to legal and industry regulations Copyright © by EG-C*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. Ip fe W h y P e n e t r a t io n T e s t in g ? P enetration testing is required because it helps you to: © Id e n tify the threa ts facing an organization's in fo rm a tio n assets © Reduce On an S ecurity organization's In ve stm e n t IT (ROSI) security by costs and provide id e n tifyin g and resolving a b e tte r Return vu ln era b ilitie s and weaknesses © Provide an organization w ith assurance: a tho ro u gh and com prehensive assessment o f organizational security covering policy, procedure, design, and im p le m e n ta tio n © Gain and m aintain ce rtifica tio n to an in dustry regulation (BS7799, HIPAA etc.) © A do p t best practices by co nfo rm ing to legal and in d u s try re g ula tio ns © Test and validate the efficiency o f se curity p ro te c tio n s and co n tro ls © Change or upgrade existing in fra stru ctu re o f softw are, hardw are, or n e tw o rk design © Focus on h ig h-se ve rity v u ln e ra b ilitie s and emphasize a p p lica tio n -le ve l se curity issues to d eve lo p m en t team s and m anagem ent © Provide a com prehensive approach o f pre pa ra tio n steps th a t can be taken to prevent upcom ing e xploita tio n © Evaluate the efficiency o f n e tw o rk security devices such as fire w a lls, routers, and web servers M o d u le 0 1 P ag e 86 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking P e n e tr a tio n T e s tin g Exam 3 1 2 -5 0 C ertified Ethical H acker M e th o d o lo g y As a pen tester, you should never overlook any in fo rm a tio n resource. All possible in fo rm a tio n sources m ust be tested fo r vuln era b ilitie s. Not ju st the in fo rm a tio n sources, but every m echanism and the s o ftw a re involved in yo u r business m ust be tested because if the a ttacker is n ot able to com prom ise the in fo rm a tio n system, the n he o r she may try to gain access to the system and then to th e sensitive in fo rm a tio n . A fe w attacks, such as d enial-ofservice attacks, d o n 't even need access to the system. Therefore, to ensure th a t you check all possible ways o f com prom ising a system or n etw o rk, you should fo llo w the p en e tra tio n testing m ethodology. This ensures the full scope o f the test. M o d u le 0 1 P ag e 87 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker FIGURE 1.5: P e n e tra tio n T e s tin g M e th o d o lo g y P a rt -1 M o d u le 0 1 P ag e 88 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking Exam 3 1 2 -5 0 C ertified Ethical H acker P e n e tr a tio n T e s t in g M e t h o d o lo g y ( C o n t’ d ) Mobile Devices Penetration Testing ►Tff ►H ► Email Security Penetration Testing 3 SAP Penetration Testing FIGURE 1.6: P e n e tra tio n T e s tin g M e th o d o lo g y P a rt 2־ M o d u le 0 1 P ag e 8 9 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0l1nCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d . Ethical Hacking a n d C o u n te rm e a s u re s In tro d u c tio n to Ethical H acking M o d u le Exam 3 1 2 -5 0 C ertified Ethical H acker S u m m a r y C E H C o m p le x ity o f s e c u rity r e q u ir e m e n ts is in c re a s in g d a y b y d a y as a re s u lt o f e v o lv in g te c h n o lo g y , c h a n g in g h a c k in g ta c tic s , e m e rg in g s e c u rity v u ln e r a b ilitie s , e tc. □ □ H a c k e r o r c ra c k e r is o n e w h o acce sses a c o m p u te r s y s te m b y e v a d in g its s e c u rity s y s te m E th ic a l h a c k in g in v o lv e s th e use o f h a c k in g to o ls , tric k s , a n d te c h n iq u e s to id e n tify v u ln e r a b ilitie s so as to e n s u re s y s te m s e c u rity E th ic a l h a c k e rs h e lp o r g a n iz a tio n to b e tte r u n d e rs ta n d t h e ir s e c u rity s y s te m s a n d id e n tify th e risks, h ig h lig h t th e re m e d ia l a c tio n s , a n d a ls o re d u c e ICT c o s ts b y re s o lv in g th o s e v u ln e r a b ilitie s E th ic a l h a c k e r s h o u ld p o sses p la t fo r m k n o w le d g e , n e tw o r k k n o w le d g e , c o m p u te r e x p e rt, s e c u rity k n o w le d g e , a n d te c h n ic a l k n o w le d g e s kills E th ic a l h a c k in g is a c ru c ia l c o m p o n e n t o f ris k a s s e s s m e n t, a u d itin g , c o u n te r fra u d , b e s t p ra c tic e s , a n d g o o d g o v e rn a n c e Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited. M o d u le S u m m a ry This m odule is sum m arized as follow s: © The co m p lexity o f se curity re q u ire m e n ts is increasing day by day as a result o f evolving technology, changing hacking tactics, em erging security vu ln era b ilitie s, etc. © A hacker o r cracker is som eone w h o accesses a co m p u te r system by evading its se curity system. Q Ethical hacking involves the use o f hacking tools, tricks, and techniques to id e n tify v u ln e ra b ilitie s to ensure system security. 0 Ethical hackers help organizations to b e tte r understand th e ir security systems and id e n tify th e risks, highlight the re m e d ial actions, and also reduce ICT costs by resolving those vu ln erabilities. Q An ethical hacker possesses p la tfo rm know ledge, n e tw o rk know ledge, c o m p u te r expert, se curity know ledge, and tech n ica l kn ow led g e skills. Q Ethical hacking is a crucial co m p on e nt o f risk assessment, auditing, co u n te r fraud, best practices, and good governance. M o d u le 0 1 P ag e 9 0 Ethical H acking a n d C o u n te rm e a s u re s C opyright © by EC-C0UnCil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .