Notes on Ethical Hacking in Computer Intrusion Detection
BIT4233 Computer Intrusion Detection
Topic 1: Ethical Hacking
Overview & The Security Circus
Overview
- Types of Hackers
- White Hat Hackers
- Ethical hackers improve security systems.
- Black Hat Hackers
- Malicious hackers exploit systems for personal gain.
- Gray Hat Hackers
- Engage in a blend of both Black hat and White hat activities.
- Script Kiddies
- Inexperienced individuals who utilize pre-written tools for hacking.
- Hacktivists
- Promote political or social messages through hacking activities.
- State-Sponsored Hackers
- Conduct cyber espionage on behalf of governments.
- Cyber Terrorists
- Create fear and disruption for political or ideological reasons.
Ethical Hacking Overview
- Definition: Hacking traditionally means manipulating technology to do something it was not originally intended to do.
- Ethical Hacking: The act of hacking into a computer network to test or evaluate its security, which is performed without malicious or criminal intent.
- Source: Oxford Dictionaries.
Why Do We Need Ethical Hacking?
- Protection from External Attacks
- Protection against various forms of attacks such as:
- Social Engineering: Deception of individuals to gain sensitive information.
- Organizational Attacks: Targeting organizational vulnerabilities.
- Restricted Data: Safeguarding sensitive organizational data.
- Automated Attacks: Issues arising from automated systems.
- Accidental Breaches: Unintentional breaches due to human error.
- Denial of Service (DoS): Attacks aimed at rendering a service unavailable, using viruses, Trojan horses, and worms. - Key Objectives
- Discover vulnerabilities from an attacker's viewpoint to rectify weaknesses.
- Implement robust network security to prevent breaches.
- Defend against threats to national security.
- Gain trust by assuring product and data security.
- Provide real-world assessments to protect networks.
Three Main Concepts of Ethical Hacking
- Scanning
- Identifies the target network, devices, and configurations.
- Useful for determining vulnerabilities and deciding on effective ethical hacking techniques. - Enumeration
- Involves gathering detailed information about the target network, like usernames and passwords, for potential use in further hacking stages. - Exploitation
- Takes advantage of device vulnerabilities to access sensitive data or gain control over the device.
Types of Ethical Hacking
- Web Application Hacking
- Involves upgrading and administering web applications while downloading programs on numerous client computers.
- Common applications include webmail, online retail, auctions, and wikis. - System Hacking
- Exploits flaws in computer systems or networks for unauthorized access.
- Knowledge of computer functioning is critical for hacking. - Web Server Hacking
- Similar to system hacking, focuses on vulnerabilities in web servers that can lead to unauthorized access. - Wireless Network Hacking
- Identifies and exploits weaknesses in wireless communication systems.
- Utilizes specific tools and techniques under legal authorization to enhance security. - Social Engineering
- The art of inducing individuals into revealing personal information.
- Exploits human psychology—trust or misunderstanding—to extract sensitive data ethically.
Ethical Hacking Phases
- Open-Source Intelligence: Gathering publicly available data (websites, social media, articles) to understand the target’s digital footprint.
- Targeted Information Collection: Using specific tools to collect information about the target's network infrastructure.
Step 2: Scanning - Identifying Vulnerabilities
- Port Scanning: Identifying open ports on a system that could be exploited.
- Vulnerability Scanning: Automated scanning for known software vulnerabilities.
- Network Mapping: Visual representation of the target’s network structure, including devices and connections.
Step 3: Gaining Access - Exploiting Weaknesses
- Password Cracking: Methods to guess or decode passwords to access accounts.
- Exploiting Software Flaws: Leveraging known software vulnerabilities to gain unauthorized access.
- Social Engineering: Tricking individuals into revealing sensitive information or granting system access.
Step 4: Maintaining Access
- Backdoors: Secret entry points for ongoing unauthorized access post-intrusion.
- Rootkits: Hidden programs for persistent system access without detection.
- Remote Access Control Software: Tools that facilitate remote control of compromised systems.
Step 5: Clearing Tracks (Hiding Evidence)
- Log Manipulation: Altering or deleting logs to prevent detection of the intrusion.
- Data Modification: Changing files to hide unauthorized access evidence.
- Network Traffic Obfuscation: Disguising traffic to reduce detection risk.
Step 6: Reporting - Documenting the Process
- Findings: Summarization of discovered vulnerabilities and risks.
- Recommendations: Steps needed to mitigate identified vulnerabilities and improve security.
- Timeline: Detailed documentation of the ethical hacking process and methods employed.
Phases of Ethical Hacking Summary
- Scanning: Reconnaissance to uncover vulnerabilities using various tools.
- Maintaining Access: Employing methods to retain access after breaching.
- Reporting: Creates a collation of vulnerabilities, tools used, success rates, and procedural details.
Penetration Testing
- Objective: Focused on identifying vulnerabilities and goes further than standard ethical hacking to demonstrate breaches effectively.
- Interchangeability: Often confused with ethical hacking but typically indicates a more aggressive approach in proving a system's susceptibility.
Threat vs. Vulnerability vs. Risk
- Penetration Tester Role:
- Identify vulnerabilities
- Evaluate potential threats
- Recommend corrective actions to remediate vulnerabilities found.
Why Do We Do This?
- To locate vulnerabilities before malicious actors exploit them.
- Ensures management is cognizant of inherent risks.
- Informs Security Operations about monitoring priorities.
In Conclusion
- Ethical hackers use their skills to bolster defenses, ensuring systems stand resilient against attacks.
- By adhering to legal, ethical, and professional standards, they help organizations protect sensitive data, cultivate trust, and stay ahead of evolving cyber threats.