Professional Documents
Culture Documents
Book 1 of 4 PPT Ch01
Book 1 of 4 PPT Ch01
Countermeasures: Attack
Phases, Second Edition
Chapter 1
Introduction to Ethical Hacking
Objectives
• Vulnerability
– Weakness in a defined asset that could be taken
advantage of or exploited by some threat
• Threat
– Action or event that might compromise security
• Every vulnerability does not lead to an attack, and
all attacks do not result in success
• Factors that result in the success of an attack
– Degree of vulnerability, the strength of the attack,
and the extent to which countermeasures are
adopted
Ethical Hacking and Countermeasures: © Cengage Learning 2017 6
Attack Phases, Second Edition
Attacks
• Target of evaluation
– Information resource or asset that is being protected
from attacks
• Attack
– Deliberate assault on that system’s security
• Attacks can be classified as
– Active – modify the target system
– Passive – violate the confidentiality of a system’s
data without affecting the state of that system
• Example: electronic eavesdropping
• Exploit
– A specific way to breach the security of an IT system
through a vulnerability
• Exposure
– A breach in security
– Can vary from one company to another, or even
from one department to another
• Imperative for organizations to address both
penetration and protection issues
• Exposure
– Loss due to an exploit
• Examples of loss include
– Disclosure, deception, disruption, and usurpation
• Vulnerability is the primary entry point an attacker
can use to gain access to a system or to its data
– Once the system is exposed, an attacker can collect
confidential information with relative ease, and
usually erase his or her tracks afterwards
• Accountability
– System administrators or concerned authorities need
to be able to know by whom, when, how and why
system resources have been accessed
– An audit trail or log files can address this
• Reusability
– Generally, not all resources are available to all users
– Having access controls on predefined parameters
can help increase the level of security
– One user or program may not reuse or manipulate
objects that another user or program is currently
accessing in order to prevent violation of security
– Also known as availability
Figure 1-1 Moving toward security means moving away from functionality and ease of use
• Reconnaissance
– Preparatory phase where an attacker gathers as
much information as possible about the target prior
to launching the attack
• Reconnaissance may involve social engineering
– Convincing other people to reveal information such
as unlisted phone numbers, passwords, etc.
• Dumpster diving
– Looking through an organization’s trash for any
discarded sensitive information
• Reconnaissance types
– Passive: attacker does not interact with the system
directly
– Active: attacker interacts with the target system by
using tools to detect open ports, accessible hosts,
router locations, network mapping, details of
operating systems, and applications
• An ethical hacker must be able to distinguish
among various reconnaissance methods
– Advocate preventative measures
• Gaining access
– Where most of the damage is usually done, yet
hackers can cause damage without gaining any
access to the system
• Access can be gained locally, offline, over a LAN,
or over the Internet
• Spoofing
– Technique used to exploit the system be pretending
to be a legitimate user
• Smurf attacks
– Attempt to cause users on a network to flood each
other with data, making it appear as if everyone is
attacking each other
• A hacker’s chances of gaining access into a target
system are influenced by factors such as:
– Architecture and configuration of the target system
– Skill level of the perpetrator
– Initial level of access obtained
• Hacktivism
– When hackers break into government or corporate
computer systems as an act of protest
– Use it to increase awareness of their social or
political agendas
– Considered a crime, irrespective of intentions
• Black hats
– Use skills for illegal or malicious purposes
• White hats
– Use skills for defensive purposes
• Gray hats
– Believe in full disclosure (information is better out in
the open than kept in secret)
• Suicide hackers
– Hacktivists who are willing to become martyrs for
their cause
Ethical Hacking and Countermeasures: © Cengage Learning 2017 31
Attack Phases, Second Edition
Ethical Hackers
• Ethical hackers
– Information security professionals who specialize in
evaluating and defending against threats from
attackers
– Use excellent computer skills to protect the integrity
of computer systems rather than hurting them
• Ethical hackers categories:
– Former black hats
– White hats
– Consulting firms