Class 1 ‐ Introduction to Ethical Hacking - Justin-Boyd/Ethical-Hacking-Class GitHub Wiki
Hackers
Hacking
- Altering the functionality or behavior of a system
- Taking advantage of a system
- Done by both attackers and defenders
- Security professionals must always remain up to date regarding hacking methods.
Hacker Types
-
White hats:
- Ethical hackers who are experts in compromising computer security systems with the aim of protecting them
-
Black hats:
- Hackers who violate ethical cybersecurity codes for malicious purposes
-
Gray hats:
- Hackers who fall somewhere between white hats and black hats
Hacker Teams
-
Red team:
- Security experts and professionals who are recognized as penetration testers
-
Blue team:
- Mainly involved in monitoring, investigating, and analyzing systems to protect them
-
Purple team:
- Hackers who try to combine the methods and advantages of red teams and blue teams
Live Attack Map: Check Point
- Hacking attempts occur all the time, all over the world.
- Hacking skills are often used maliciously to perform cybercrimes.
- Check Point’s Live Cyber Threat Map displays attacks currently being launched around the world.
Live Attack Map: Fortinet
- Similar to Check Point’s map, the Fortinet map displays live attacks that are launched around the world.
Certifications
- CEH
- OSCP
- OSWE
- CISA
- CISM
Ethics: Penetration Testers
-
Principle
-
Must follow a code of ethics
-
Ethics
- Use legal means.
-
Integrity
- Sign non-disclosure agreements.
-
Legal awareness
- Consider client’s local laws.
-
Professionalism
- Have ethical and professional integrity.
-
Responsibilities
- Do not take part in any malicious activity.
-
Reliability
- Access only permitted systems.
Malware
Malware Definition
- Malicious software
- Created to inflict damage
- Created to steal information
- Exists in various forms
Malware Types
- Virus
- Ransomware
- Trojan Horse
- Worm
- Botnet
Cyber Attack Cycle
Common Attack Flow
-
Reconnaissance
- Scan an organization for vulnerabilities.
-
Weaponization
- Generate a payload.
-
Deliver the payload.
-
Exploit & Execute
- Run commands upon execution.
-
Command & Control
- Possible full system access.
Attack Terminology
- Vulnerability
- Payload
- Exploit
- Malware
- Backdoor
Significant Attacks in Recent Years
- Stuxnet is a worm that was designed to damage the progress of Iran’s nuclear program.
- Sony’s PlayStation network was attacked by a simple database attack (SQLi).
- WannaCry distribution locked approximately 230,000 computers.
Unique Zero-Day Vulnerability
- Newly discovered vulnerability
- Unknown to others
- Exploitable until mitigated
- Can lead to devastating damage
WannaCry Attack Chain
- The EternalBlue exploit used by WannaCry, exploits a vulnerability in the SMB service.
- When WannaCry was executed, it tried to connect with the attacker’s C&C.
- When executed, WannaCry encrypted personal files and sent pop-up messages.
Kali OS
- Linux Debian-based OS distribution, specifically made for advanced PT (penetration testing)
- Includes many tools for penetration testers
- Kali 2019.3 (used in labs) provides better support for various tools than newer distributions.