Notes on Ethical Hacking in Computer Intrusion Detection

BIT4233 Computer Intrusion Detection

Topic 1: Ethical Hacking

Overview & The Security Circus
Overview
  • Types of Hackers
      - White Hat Hackers
        - Ethical hackers improve security systems.
      - Black Hat Hackers
        - Malicious hackers exploit systems for personal gain.
      - Gray Hat Hackers
        - Engage in a blend of both Black hat and White hat activities.
      - Script Kiddies
        - Inexperienced individuals who utilize pre-written tools for hacking.
      - Hacktivists
        - Promote political or social messages through hacking activities.
      - State-Sponsored Hackers
        - Conduct cyber espionage on behalf of governments.
      - Cyber Terrorists
        - Create fear and disruption for political or ideological reasons.
Ethical Hacking Overview
  • Definition: Hacking traditionally means manipulating technology to do something it was not originally intended to do.
  • Ethical Hacking: The act of hacking into a computer network to test or evaluate its security, which is performed without malicious or criminal intent.
      - Source: Oxford Dictionaries.

Why Do We Need Ethical Hacking?

  • Protection from External Attacks
      - Protection against various forms of attacks such as:
        - Social Engineering: Deception of individuals to gain sensitive information.
        - Organizational Attacks: Targeting organizational vulnerabilities.
        - Restricted Data: Safeguarding sensitive organizational data.
        - Automated Attacks: Issues arising from automated systems.
        - Accidental Breaches: Unintentional breaches due to human error.
        - Denial of Service (DoS): Attacks aimed at rendering a service unavailable, using viruses, Trojan horses, and worms.
  • Key Objectives
      - Discover vulnerabilities from an attacker's viewpoint to rectify weaknesses.
      - Implement robust network security to prevent breaches.
      - Defend against threats to national security.
      - Gain trust by assuring product and data security.
      - Provide real-world assessments to protect networks.

Three Main Concepts of Ethical Hacking

  1. Scanning
       - Identifies the target network, devices, and configurations.
       - Useful for determining vulnerabilities and deciding on effective ethical hacking techniques.
  2. Enumeration
       - Involves gathering detailed information about the target network, like usernames and passwords, for potential use in further hacking stages.
  3. Exploitation
       - Takes advantage of device vulnerabilities to access sensitive data or gain control over the device.

Types of Ethical Hacking

  1. Web Application Hacking
       - Involves upgrading and administering web applications while downloading programs on numerous client computers.
       - Common applications include webmail, online retail, auctions, and wikis.
  2. System Hacking
       - Exploits flaws in computer systems or networks for unauthorized access.
       - Knowledge of computer functioning is critical for hacking.
  3. Web Server Hacking
       - Similar to system hacking, focuses on vulnerabilities in web servers that can lead to unauthorized access.
  4. Wireless Network Hacking
       - Identifies and exploits weaknesses in wireless communication systems.
       - Utilizes specific tools and techniques under legal authorization to enhance security.
  5. Social Engineering
       - The art of inducing individuals into revealing personal information.
       - Exploits human psychology—trust or misunderstanding—to extract sensitive data ethically.

Ethical Hacking Phases

Step 1: Reconnaissance (Gathering Information)
  • Open-Source Intelligence: Gathering publicly available data (websites, social media, articles) to understand the target’s digital footprint.
  • Targeted Information Collection: Using specific tools to collect information about the target's network infrastructure.
Step 2: Scanning - Identifying Vulnerabilities
  • Port Scanning: Identifying open ports on a system that could be exploited.
  • Vulnerability Scanning: Automated scanning for known software vulnerabilities.
  • Network Mapping: Visual representation of the target’s network structure, including devices and connections.
Step 3: Gaining Access - Exploiting Weaknesses
  • Password Cracking: Methods to guess or decode passwords to access accounts.
  • Exploiting Software Flaws: Leveraging known software vulnerabilities to gain unauthorized access.
  • Social Engineering: Tricking individuals into revealing sensitive information or granting system access.
Step 4: Maintaining Access
  • Backdoors: Secret entry points for ongoing unauthorized access post-intrusion.
  • Rootkits: Hidden programs for persistent system access without detection.
  • Remote Access Control Software: Tools that facilitate remote control of compromised systems.
Step 5: Clearing Tracks (Hiding Evidence)
  • Log Manipulation: Altering or deleting logs to prevent detection of the intrusion.
  • Data Modification: Changing files to hide unauthorized access evidence.
  • Network Traffic Obfuscation: Disguising traffic to reduce detection risk.
Step 6: Reporting - Documenting the Process
  • Findings: Summarization of discovered vulnerabilities and risks.
  • Recommendations: Steps needed to mitigate identified vulnerabilities and improve security.
  • Timeline: Detailed documentation of the ethical hacking process and methods employed.

Phases of Ethical Hacking Summary

  1. Scanning: Reconnaissance to uncover vulnerabilities using various tools.
  2. Maintaining Access: Employing methods to retain access after breaching.
  3. Reporting: Creates a collation of vulnerabilities, tools used, success rates, and procedural details.

Penetration Testing

  • Objective: Focused on identifying vulnerabilities and goes further than standard ethical hacking to demonstrate breaches effectively.
  • Interchangeability: Often confused with ethical hacking but typically indicates a more aggressive approach in proving a system's susceptibility.

Threat vs. Vulnerability vs. Risk

  • Penetration Tester Role:
      - Identify vulnerabilities
      - Evaluate potential threats
      - Recommend corrective actions to remediate vulnerabilities found.

Why Do We Do This?

  • To locate vulnerabilities before malicious actors exploit them.
  • Ensures management is cognizant of inherent risks.
  • Informs Security Operations about monitoring priorities.

In Conclusion

  • Ethical hackers use their skills to bolster defenses, ensuring systems stand resilient against attacks.
  • By adhering to legal, ethical, and professional standards, they help organizations protect sensitive data, cultivate trust, and stay ahead of evolving cyber threats.