Professional Documents
Culture Documents
Educators
Presented By
Regina DeLisse Hartley, Ph.D.
Caldwell Community College &
Technical Institute
Overview
(Source: www.eccouncil.org)
Learning Competencies
Required Skills of an Ethical
Hacker
Routers: knowledge of routers, routing
protocols, and access control lists
Microsoft: skills in operation, configuration and
management.
Linux: knowledge of Linux/Unix; security
setting, configuration, and services.
Firewalls: configurations, and operation of
intrusion detection systems.
Mainframes
Network Protocols: TCP/IP; how they function
and can be manipulated.
Project Management: knowledge of leading,
planning, organizing, and controlling a
penetration testing team.
(Source: http://www.examcram.com)
Modes of Ethical Hacking
Insider attack
Outsider attack
Stolen equipment attack
Physical entry
Bypassed authentication attack
(wireless access points)
Social engineering attack
(Source: http://www.examcram.com)
Anatomy of an attack:
• Reconnaissance – attacker gathers
information; can include social
engineering.
• Scanning – searches for open ports (port
scan) probes target for vulnerabilities.
• Gaining access – attacker exploits
vulnerabilities to get inside system; used
for spoofing IP.
• Maintaining access – creates backdoor
through use of Trojans; once attacker
gains access makes sure he/she can get
back in.
• Covering tracks – deletes files, hides
files, and erases log files. So that attacker
cannot be detected or penalized.
(Source: www.eccouncil.org)
Hacker classes
• Black hats – highly skilled,
malicious, destructive “crackers”
• White hats – skills used for
defensive security analysts
• Gray hats – offensively and
defensively; will hack for different
reasons, depends on situation.
Hactivism – hacking for social and
political cause.
Ethical hackers – determine what
attackers can gain access to, what they
will do with the information, and can they
be detected.
(Source: www.eccouncil.org)
Teaching Resources: Ethical
Hacking Textbooks
Ec-Council
www.eccouncil.org
ISBN 0-9729362-1-1
Ec-Council Topics Covered
Introduction to Ethical Hacking
Footprinting
Scanning
Enumeration
System Hacking
Trojans and Backdoors
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Hacking Web Servers
Ec-Council (Cont.)
http://www.examcram.com
ISBN 0-7897-3531-8
Certified Ethical Hacker Exam
Prep
The Business Aspects of Penetration
Testing
The Technical Foundations of Hacking
Footprinting and Scanning
Enumeration and System Hacking
Linux and automated Security Assessment
Tools
Trojans and Backdoors
Sniffers, Session Hyjacking, and Denial of
Service
Certified Ethical Hacker Exam
Prep (Cont.)
Web Server Hacking, Web Applications,
and Database Attacks
Wireless Technologies, Security, and
Attacks
IDS, Firewalls, and Honeypots
Buffer Overflows, Viruses, and Worms
Cryptographic Attacks and Defenses
Physical Security and Social Engineering
Hands-On Information Security
Lab Manual, Second Edition
1. Footprinting
2. Scanning and Enumeration
3. Operating System Vulnerabilities
and Resolutions
4. Network Security Tools and
Technologies
5. Security Maintenance
6. Information Security
Management
7. File System Security and
Cryptography
8. Computer Forensics http://www.course.com/
ISBN 0-619-21631-X
Hacking Tools: Footprinting and
Reconnaissance
Whois
Whois (cont.)
http://www.allwhois.com/
Whois (cont.)
Sam Spade
Sam Spade (Cont.)
Nslookup
Nslookup Options
Traceroute
Ping
Ping Options
Hacking Tools: Scanning and
Enumeration
nmap
NMapWin
SuperScan
SuperScan (Cont.)
IP Scanner
Hyena
Retina
LANguard
Hacking Tools: System Hacking
telnet
Snadboy
Password Cracking with
LOphtcrack
Keylogger
Hacking Tools: Trojans and
Backdoors
NetBus
Game Creates Backdoor for
NetBus
SubSeven
Hacking Tools: Sniffers
Spoofing a MAC address
Original Configuration
Spoofed Mac
Ethereal
Iris
Snort
Hacking Tools: Web Based
Password Cracking
Cain and Abel
Cain and Abel (Cont.)
Cain and Abel (Cont.)
Legion
Brutus
Hacking Tools: Covering Tracks
ImageHide
ClearLogs
ClearLogs (Cont.)
Hacking Tools: Google Hacking
and SQL Injection
Google Hacking
Google Cheat Sheet
SQL Injection
Allows a remote attacker to
execute arbitrary database
commands
Relies on poorly formed database queries
and insufficient
input validation
Often facilitated, but does not rely on
unhandled
exceptions and ODBC error messages
Impact: MASSIVE. This is one of the most
dangerous
vulnerabilities on the web.
Common Database Query
Problem: Unvalidated Input
Piggybacking Queries with
UNION
Hacker Challenge Websites
http://www.hackr.org/mainpage.php
Hackthissite.org
http://www.hackthissite.org
Answers revealed in code
Hackits
http://www.hackits.de/challenge/
Additional Web Sites
Legion of Ethical Hacking
Legion of Ethical Hacking (Cont.)
Hacker Highschool
http://www.hackerhighschool.org/
Hacker Highschool
johnny.ihackstuff.com/
HappyHacker.org
Foundstone
Insecure.org
SANS Institute
Questions & Answers