Ethical Hacking Tutorial - RxJS, Ggplot2, Python Data .

2y ago
79 Views
3 Downloads
1,000.54 KB
15 Pages
Last View : 1d ago
Last Download : 3m ago
Upload by : Giovanna Wyche
Transcription

Ethical HackingAbout this TutorialHacking has been a part of computing for almost five decades and it is a very broaddiscipline, which covers a wide range of topics. The first known event of hacking had takenplace in 1960 at MIT and at the same time, the term "Hacker" was originated.In this tutorial, we will take you through the various concepts of Ethical Hacking andexplain how you can use them in a real-time environment.AudienceThis tutorial has been prepared for professionals aspiring to learn the basics of EthicalHacking and make a career as an ethical hacker.PrerequisitesBefore proceeding with this tutorial, you should have a good grasp over all thefundamental concepts of a computer and how it operates in a networked environment.Copyright & Disclaimer Copyright 2018 by Tutorials Point (I) Pvt. Ltd.All the content and graphics published in this e-book are the property of Tutorials Point (I)Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republishany contents or a part of contents of this e-book in any manner without written consentof the publisher.We strive to update the contents of our website and tutorials as timely and as precisely aspossible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt.Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of ourwebsite or its contents including this tutorial. If you discover any errors on our website orin this tutorial, please notify us at contact@tutorialspoint.comi

Ethical HackingTable of ContentsAbout this Tutorial . iAudience . iPrerequisites . iCopyright & Disclaimer . iTable of Contents . ii1.ETHICAL HACKING OVERVIEW . 1Types of Hacking. 1Advantages of Hacking . 1Disadvantages of Hacking . 2Purpose of Hacking . 22.ETHICAL HACKING HACKER TYPES . 3White Hat Hackers . 3Black Hat Hackers . 3Grey Hat Hackers . 3Miscellaneous Hackers . 33.ETHICAL HACKING FAMOUS HACKERS . 54.ETHICAL HACKING TERMINOLOGIES . 95.ETHICAL HACKING TOOLS . 126.ETHICAL HACKING SKILLS . 16Basic Skills . 16Courses & Certifications . 167.ETHICAL HACKING PROCESS . 18ii

Ethical Hacking8.ETHICAL HACKING RECONNAISSANCE . 209.ETHICAL HACKING FOOTPRINTING. 21Domain Name Information . 21Finding IP Address . 23Finding Hosting Company . 23IP Address Ranges . 24History of the Website . 2410. ETHICAL HACKING FINGERPRINTING . 26Basic Steps. 26Port Scanning . 28Ping Sweep . 29DNS Enumeration . 2911. ETHICAL HACKING SNIFFING . 31Types of Sniffing . 32Hardware Protocol Analyzers . 33Lawful Interception . 3412. ETHICAL HACKING SNIFFING TOOLS. 3513. ETHICAL HACKING ARP POISONING . 36What is ARP Spoofing? . 36What is MITM? . 36ARP Poisoning Exercise . 3714. ETHICAL HACKING DNS POISONING . 41DNS Poisoning Exercise . 41Defenses against DNS Poisoning . 42iii

Ethical Hacking15. ETHICAL HACKING EXPLOITATION . 4416. ETHICAL HACKING ENUMERATION . 4717. ETHICAL HACKING – METASPLOIT . 50Exploits of Metasploit . 51Metasploit Payloads . 5218. ETHICAL HACKING – TROJAN ATTACKS . 5519. ETHICAL HACKING – TCP/IP HIJACKING . 5620. ETHICAL HACKING – EMAIL HIJACKING. 59Email Spoofing . 59Social Engineering . 59Inserting Viruses in a User System . 6121. ETHICAL HACKING – PASSWORD HACKING . 62Dictionary Attack . 62Hybrid Dictionary Attack . 63Brute-Force Attack . 63Rainbow Tables . 6422. ETHICAL HACKING – WIRELESS HACKING . 66Kismet . 67NetStumbler . 68Wired Equivalent Privacy . 69Wireless DoS Attacks . 7123. ETHICAL HACKING SOCIAL ENGINEERING . 72iv

Ethical Hacking24. ETHICAL HACKING DDOS ATTACKS. 74What are Botnets?. 74Types of DDoS Attacks . 7525. ETHICAL HACKING – CROSS-SITE SCRIPTING . 7826. ETHICAL HACKING – SQL INJECTION . 8027. ETHICAL HACKING – PEN TESTING. 85v

1. Ethical Hacking OverviewEthical HackingHacking has been a part of computing for almost five decades and it is a very broaddiscipline, which covers a wide range of topics. The first known event of hacking had takenplace in 1960 at MIT and at the same time, the term "Hacker" was originated.Hacking is the act of finding the possible entry points that exist in a computer system ora computer network and finally entering into them. Hacking is usually done to gainunauthorized access to a computer system or a computer network, either to harm thesystems or to steal sensitive information available on the computer.Hacking is usually legal as long as it is being done to find weaknesses in a computer ornetwork system for testing purpose. This sort of hacking is what we call Ethical Hacking.A computer expert who does the act of hacking is called a "Hacker". Hackers are thosewho seek knowledge, to understand how systems operate, how they are designed, andthen attempt to play with these systems.Types of HackingWe can segregate hacking into different categories, based on what is being hacked. Hereis a set of examples: Website Hacking: Hacking a website means taking unauthorized control over aweb server and its associated software such as databases and other interfaces. Network Hacking: Hacking a network means gathering information about anetwork by using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with theintent to harm the network system and hamper its operation. Email Hacking: It includes getting unauthorized access on an Email account andusing it without taking the consent of its owner. Ethical Hacking: Ethical hacking involves finding weaknesses in a computer ornetwork system for testing purpose and finally getting them fixed. Password Hacking: This is the process of recovering secret passwords from datathat has been stored in or transmitted by a computer system. Computer Hacking: This is the process of stealing computer ID and password byapplying hacking methods and getting unauthorized access to a computer system.Advantages of HackingHacking is quite useful in the following scenarios: To recover lost information, especially in case you lost your password. To perform penetration testing to strengthen computer and network security. To put adequate preventative measures in place to prevent security breaches.1

Ethical Hacking To have a computer system that prevents malicious hackers from gaining access.Disadvantages of HackingHacking is quite dangerous if it is done with harmful intent. It can cause: Massive security breach. Unauthorized system access on private information. Privacy violation. Hampering system operation. Denial of service attacks Malicious attack on the system.Purpose of HackingThere could be various positive and negative intentions behind performing hackingactivities. Here is a list of some probable reasons why people indulge in hacking activities: Just for fun Show-off Steal important information Damaging the system Hampering privacy Money extortion System security testing To break policy compliance2

2. Ethical Hacking Hacker TypesEthical HackingHackers can be classified into different categories such as white hat, black hat, and greyhat, based on their intent of hacking a system. These different terms come from oldSpaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wearsa white hat.White Hat HackersWhite Hat hackers are also known as Ethical Hackers. They never intent to harm asystem, rather they try to find out weaknesses in a computer or a network system as apart of penetration testing and vulnerability assessments.Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry.There are numerous companies that hire ethical hackers for penetration testing andvulnerability assessments.Black Hat HackersBlack Hat hackers, also known as crackers, are those who hack in order to gainunauthorized access to a system and harm its operations or steal sensitive information.Black Hat hacking is always illegal because of its bad intent which includes stealingcorporate data, violating privacy, damaging the system, blocking network communication,etc.Grey Hat HackersGrey hat hackers are a blend of both black hat and white hat hackers. They act withoutmalicious intent but for their fun, they exploit a security weakness in a computer systemor network without the owner’s permission or knowledge.Their intent is to bring the weakness to the attention of the owners and gettingappreciation or a little bounty from the owners.Miscellaneous HackersApart from the above well-known classes of hackers, we have the following categories ofhackers based on what they hack and how they do it:Red Hat HackersRed hat hackers are again a blend of both black hat and white hat hackers. They areusually on the level of hacking government agencies, top-secret information hubs, andgenerally anything that falls under the category of sensitive information.3

Ethical HackingBlue Hat HackersA blue hat hacker is someone outside computer security consulting firms who is used tobug-test a system prior to its launch. They look for loopholes that can be exploited andtry to close these gaps. Microsoft also uses the term BlueHat to represent a series ofsecurity briefing events.Elite HackersThis is a social status among hackers, which is used to describe the most skilled. Newlydiscovered exploits will circulate among these hackers.Script KiddieA script kiddie is a non-expert who breaks into computer systems by using pre-packagedautomated tools written by others, usually with little understanding of the underlyingconcept, hence the term Kiddie.NeophyteA neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hackingor phreaking and has almost no knowledge or experience of the workings of technologyand hacking.HacktivistA hacktivist is a hacker who utilizes technology to announce a social, ideological, religious,or political message. In general, most hacktivism involves website defacement or denialof-service attacks.4

3. Ethical Hacking Famous HackersEthical HackingIn this chapter, we will have a brief synopsis of some of the famous Hackers and how theybecame famous.Jonathan JamesJonathan James was an American hacker, illfamous as the first juvenile sent to prison forcybercrime in United States. He committedsuicide in 2008 of a self-inflicted gunshotwound.In 1999, at the age of 16, he gained access toseveral computers by breaking the password ofa server that belonged to NASA and stole thesource code of the International Space Stationamong other sensitive information.Ian MurphyIan Murphy, also known as Captain Zap, at onepoint of time was having high school studentssteal computer equipment for him. Ian selfproclaims to have been "the first hacker everconvicted of a crime".Ian's career as a master hacker was fabricatedin 1986 after he and his unemployed wifedecided to form some type of business.He has a long history of computer and Internetfrauds. One of his favourite games is to forgeEmail headers and to send out third-partythreat letters.5

Ethical HackingKevin MitnickKevin Mitnick is a computer security consultantand author, who infiltrates his clients’companies to expose their security strengths,weaknesses, and potential loopholes.He is the first hacker to have his faceimmortalizedonan FBI "MostWanted"poster. He was formerly the most wantedcomputer criminal in the history of UnitedStates.From the 1970s up until his last arrest in 1995,he skilfully bypassed corporate securitysafeguards, and found his way into some of themost well-guarded systems such as SunMicrosystems, Digital Equipment Corporation,Motorola, Netcom, and Nokia.Mark AbeneMark Abene, known around the world byhis pseudonym Phiber Optik, is an informationsecurity expert and entrepreneur. He was ahigh-profile hacker in the 1980s and early1990s. He was one of the first hackers toopenly debate and defend the positive meritsof ethical hacking as a beneficial tool toindustry.His expertise spreads across penetrationstudies, on-site security assessments, securecode reviews, security policy review andgeneration, systems and network ment, among many others. Hisclientele includes American Express, UBS, FirstUSA, Ernst & Young, KPMG and others.6

Ethical HackingJohan HelsingiusJohan Helsingius, better known as Julf, cameinto the limelight in the 1980s when he startedoperating the world's most popular anonymousremailer, called penet.fi.Johan was also responsible for productdevelopment for the first Pan-Europeaninternet service provider, Eunet International.He is at present, a member of the board ofTechnologiaIncognita,ahackerspaceassociation in Amsterdam, and supports thecommunication companies worldwide with hiscyber knowledge.Linus TorvaldsLinus Torvalds is known as one of the besthackers of all time. He rose to fame by creatingLinux, the very popular Unix-based operatingsystem. Linux is open source and thousands ofdevelopers have contributed to its Kernel.However, Torvalds remains the ultimateauthority on what new code is incorporated intothe standard Linux kernel. As of 2006,approximately two percent of the Linux kernelwas written by Torvalds himself.He just aspires to be simple and have fun bymaking the world’s best operating system.Torvalds has received honorary doctoratesfrom Stockholm University and University ofHelsinki.Robert MorrisRobert Morris, known as the creator of theMorris Worm, the first computer worm to beunleashed on the Internet. The worm had thecapability to slow down computers and makethem no longer usable. As a result of this, hewas sentenced to three years’ probation, 400hours of community service and also had topay a penalty amount of 10,500.Morris is currently working as a tenuredprofessor at the MIT Computer Science andArtificial Intelligence Laboratory.7

Ethical HackingGary McKinnonGary McKinnon is a renowned systemsadministrator and hacker. He was famouslyaccused of the “biggest military computer hackof all time”. He had successfully hacked thenetworks of Army, Air Force, Navy and NASAsystems of the United States government.In his statements to the media, he has oftenmentioned that his motivation was only to findevidence of UFOs, antigravity technology, andthe suppression of “free energy” that couldpotentially be useful to the public.Kevin PoulsenKevin Poulsen, also known as Dark Dante,became famous for his notoriety when he tookover all the telephone lines of LosAngeles radio station KIIS-FM,guaranteeingthat he would be the 102nd caller and win theprize of a Porsche 944 S2.Poulsen also drew the ire of FBI, when hehacked into federal computers for wiretapinformation, for which he had to serve asentence of five years. He has reinventedhimself as a journalist and has carved a nichefor himself in this field.8

Ethical HackingEnd of ebook previewIf you liked what you saw Buy it from our store @ https://store.tutorialspoint.com9

Computer Hacking: This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system. Advantages of Hacking Hacking is quite useful in the following scenarios: To recover lost information, especially in case you lost your password.

Related Documents:

Hacking Concepts 1.10 What is Hacking? 1.11Who is a Hacker? 1.12 Hacker Classes 1.13 Hacking Phases o Reconnaissance o Scanning o Gaining Access o Maintaining Access o Clearing Tracks Ethical Hacking Concepts 1.14 What is Ethical Hacking? 1.15 Why Ethical Hacking is Necessary 1.16 Scope and Limitations of Ethical Hacking

private sectors is ethical hacking. Hacking and Ethical Hacking Ethical hacking can be conceptualized through three disciplinary perspectives: ethical, technical, and management. First, from a broad sociocultural perspective, ethical hacking can be understood on ethical terms, by the intentions of hackers. In a broad brush, ethical

Benefits of Ethical Hacking Topic 1: Ethical Hacking Discuss the main benefits and risks of ethical hacking. Provide examples and/or details to support your ideas. If you have seen examples of ethical hacking, please share thes

to as “ethical hacking”—hacking for an ethical reason—whereby it will be argued that law and policy ought not to be the same here as for those hacking activities that are purely for economic gain or to cause harm or mischief. As will be seen, I have grouped ethical hacking int

what is ethical hacking?-what is hacking and it's intent?-what determines if a person is a hacker? - what is ethical hacking?-in what ways can hackers gain unauthorized access into system?-common tools used by malicious hackers-ethical hacking and how it plays a role in combating unauthorized access by malicious hackers?

Why Ethical Hacking is Necessary Ethical Hacker needs to think like malicious Hacker. Ethical hacking is necessary to defend against malicious hackers attempts, by anticipating methods they can use to break into a system. To fight against cyber crimes. To protect information from getting into wrong hands.

Definition: Ethical Hacking Hacking - Manipulating things to do stuff beyond or contrary to what was intended by the designer or implementer. Ethical Hacking - Using hacking and attack techniques to find and exploit vulnerabilities for the purpose of improving security with the following: Permission of the owners

Contract HHSM-500-2015-00246C ; Enhanced Direct Enrollment (EDE) API Companion Guide Version 5.6 August 17, 2020 : CMS FFE Companion Guide ii . Document Control . Author Versio n Rev. date Summary of Changes Section Page Abigail Flock, Alexandra Astarita, Sean Song 1.0 . 1/23/2018 . Initial Version . All . All . Scott Bickle, Alexandra Astarita, Sean Song 2.0 . 3/15/2018 . Incorporated Client .