Class 1 ‐ Introduction to Ethical Hacking - Justin-Boyd/Ethical-Hacking-Class GitHub Wiki

Hackers

Hacking

  • Altering the functionality or behavior of a system
  • Taking advantage of a system
  • Done by both attackers and defenders
  • Security professionals must always remain up to date regarding hacking methods.

Hacker Types

  • White hats:

    • Ethical hackers who are experts in compromising computer security systems with the aim of protecting them
  • Black hats:

    • Hackers who violate ethical cybersecurity codes for malicious purposes
  • Gray hats:

    • Hackers who fall somewhere between white hats and black hats

Hacker Teams

  • Red team:

    • Security experts and professionals who are recognized as penetration testers
  • Blue team:

    • Mainly involved in monitoring, investigating, and analyzing systems to protect them
  • Purple team:

    • Hackers who try to combine the methods and advantages of red teams and blue teams

Live Attack Map: Check Point

Check Point

  • Hacking attempts occur all the time, all over the world.
  • Hacking skills are often used maliciously to perform cybercrimes.
  • Check Point’s Live Cyber Threat Map displays attacks currently being launched around the world.

Live Attack Map: Fortinet

Fortinet

  • Similar to Check Point’s map, the Fortinet map displays live attacks that are launched around the world.

Certifications

  • CEH
  • OSCP
  • OSWE
  • CISA
  • CISM

Ethics: Penetration Testers

  • Principle

  • Must follow a code of ethics

  • Ethics

    • Use legal means.
  • Integrity

    • Sign non-disclosure agreements.
  • Legal awareness

    • Consider client’s local laws.
  • Professionalism

    • Have ethical and professional integrity.
  • Responsibilities

    • Do not take part in any malicious activity.
  • Reliability

    • Access only permitted systems.

Malware

Malware Definition

  • Malicious software
  • Created to inflict damage
  • Created to steal information
  • Exists in various forms

Malware Types

  • Virus
  • Ransomware
  • Trojan Horse
  • Worm
  • Botnet

Cyber Attack Cycle

Common Attack Flow

  • Reconnaissance

    • Scan an organization for vulnerabilities.
  • Weaponization

    • Generate a payload.
  • Deliver the payload.

  • Exploit & Execute

    • Run commands upon execution.
  • Command & Control

    • Possible full system access.

Attack Terminology

  • Vulnerability
  • Payload
  • Exploit
  • Malware
  • Backdoor

Significant Attacks in Recent Years

  • Stuxnet is a worm that was designed to damage the progress of Iran’s nuclear program.
  • Sony’s PlayStation network was attacked by a simple database attack (SQLi).
  • WannaCry distribution locked approximately 230,000 computers.

Unique Zero-Day Vulnerability

  • Newly discovered vulnerability
  • Unknown to others
  • Exploitable until mitigated
  • Can lead to devastating damage

WannaCry Attack Chain

WannaCry Attack Chain

  • The EternalBlue exploit used by WannaCry, exploits a vulnerability in the SMB service.
  • When WannaCry was executed, it tried to connect with the attacker’s C&C.
  • When executed, WannaCry encrypted personal files and sent pop-up messages.

Kali OS

  • Linux Debian-based OS distribution, specifically made for advanced PT (penetration testing)
  • Includes many tools for penetration testers
  • Kali 2019.3 (used in labs) provides better support for various tools than newer distributions.