Cyber Security – Introduction Part 2

Hacking

a. Hacker types

Hacker
  • An individual who uses their computer and technical skills to gain access to systems and networks.
  • 🤗 A common theory is that a hacker meant initially anyone who possessed skills and knowledge and determination to solve problems in a creative way.
    • There are arguments against it never was a benign term and the malicious connotations of the word were a later perversion is untrue.
Black hat hackers
  • 📝 Uses knowledge and skills to discover and exploit security vulnerabilities for financial gain or other malicious reasons
  • Bad guys
  • No regard of law & regulations etc.
  • Activities include stealing personal and financial information or shutting down websites and networks
  • E.g. bank robbing
White hat hackers
  • Also known as ethical hackers
  • 📝 Uses knowledge and skills to improve a system’s security by discovering vulnerabilities before black hats do.
  • Will not break laws and regulations
  • Scope is determined by the client
  • E.g.
    • Publish vulnerabilities
    • Do penetration tests
    • ❗Participate in bounty programs to claim rewards.
      • Benefiting financially from hack is not illegal
Ethical hacking
  • Also known as white hat hacking
  • Performed by security specialists to help companies identify vulnerabilities in their networks and systems.
    • Helps them analyzing and strengthening their system and network security
    • Allows for creating preventive measures that should prevent any future security breaches as well as protect data and information stored in the system.
  • Difference from black-hat hacking:
    • Hacking with permission of system owner
    • They remain compliant to the law
    • Purpose is to prevent hackers from breaking into systems and networks.
  • Flow
    1. Find vulnerabilities
    2. Assess problems & threats about them
    3. Offer solutions e.g. you can do to fix this
    4. Inform within the company
  • Ethical hackers should ask themselves when evaluating a system: (also companies asks often “why would we fix it?” in three questions)
    • What is it that an attacker can see on this network/system?
    • What could the attacker do with that knowledge?
    • Are there any traces of attempted attacks on the system/network?
Ethical hacking scope
  • No test should be performed without appropriate permissions and authorization.
  • Test results should be kept confidential
  • Only those tests that the client requested should be performed
Grey hat hackers
  • Also known as grayhatgray hatgray-hatgrey hatgreyhat or grey-hat hackers.
  • 📝 Might break laws, regulations and ethical standards but do not have explicitly malicious indent.
  • Middleground; Not as bad as black, not as ethical as white hackers.
Suicide hackers
  • 📝 Perform attacks for a cause despite the risk of being caught and prosecuted.
  • E.g. they’ll know for sure that they’ll get caught but they still attempt the hack for a “cause”.
Script kiddies
  • 📝 Inexperienced hackers who don’t have enough knowledge or skills to perform hacks on their own
    • Instead, they use tools and scripts developed by more experienced hackers.
  • Dangerous because running the closed-sourced tools on one’s own system is a big risk.
Cyber terrorists
  • Money is not the priority, but to destroy stuff.
  • Influenced by religious or political beliefs.
  • 📝 Goal is to promote fear, unrest and disruption.
State sponsored hackers
  • 📝 Recruited by governments
  • Gain access to classified information of other governments
  • Information source can be governments, individuals or corporations.
Hacktivists
  • 📝 Break into government and corporate systems out of protest.
  • Promotes political or social agenda.
  • E.g. steal and leak data on public domain
 
 

 

CEH-in-bullet-points/chapters/01-introduction/hacker-types.md at master ·

b. Hacking stages

1. Reconnaissance
  • Also known as footprintingfingerprinting or information gathering
  • 📝 Reconnaissance, noun, preliminary surveying or research about the target.
  • 📝 Necessary first step as an attack would not be successful without it.
2. Scanning
  • Hacker utilizes information from previous stage to conduct more technical scan.
  • Often maps the routers and firewalls
  • Use tools such as port scanners, network mappers, vulnerability scanners, etc.
Reconnaissance vs Scanning
  • In scanning you’re acting on gathered information to gather information
  • Examples
ReconnaissanceScanning
Scan the perimeter network you need the IP addressesUse e.g. nmap to figure out what the configuration is.
Get e-mails.Use phishing to gather personal data
Learn where service physically areDo dumpster diving
3. Gaining Access
  • Attack stage
  • Steps:
    1. Find an entry point to the target OS or application on the system
    2. Use it to perform the attack
      • Hackers may escalate privileges to gain complete control over the system/network.
  • Examples:
    • Password crack with brute-force or dictionary attack
    • Exploit buffer overflow
    • Session hijack
    • DoS attacks
4. Maintaining Access
  • Keeping admin/root privileges so hacker can continue using the system.
    • After breaking into a system, you attempt to elevate privileges to do more.
  • Maintain persistent access, because your connection might break, then you start again
  • Can prevent other hackers from accessing the system by installing backdoors, rootkits, or trojans.
  • 💡 You can install tools to give you persistance access and gathers data to use compromise more such as keylogger.
  • 💡 You can use the machine as proxy so all traces are lead back to the proxy.
    • You can minimize the risks being discovered this way.
    • ❗ As pen-tester document those as you’ll get other people in trouble
5. Clearing tracks
  • Hackers do everything they can do to hide their activities
  • Goal is to maintain the access to the system but remain unnoticed in the process.
    • If you’re detected: the vulnerability will be patched and you’ll lose access.
  • Vital to clear all tracks as fast as possible, or if it’s possible generate none.
  • Activities:
    • Clear certain entries in log files: Not all, or it’ll be suspicious
    • Masquerade your activities: Make them as similar as possible as legitimate activities
      • E.g. a good keylogger masquerade itself behind legitimate activities
        • Mimics other programs behavior by adding more behavior.
 
 
CEH-in-bullet-points/chapters/01-introduction/hacking-stages.md at master · undergroundwires/CEH-in-bullet-points · GitHub
 
Tech Amplifier Final Logo