ETHICAL HACKING
UNIT-3
System Hacking
1. Unauthorized access: Gaining access to a system without permission.
2. Exploiting vulnerabilities: Using weaknesses to gain control or access sensitive data.
1. Network hacking: Exploiting network vulnerabilities.
2. Password cracking: Guessing or cracking passwords.
3. Malware: Using malicious software to gain access or control.
1. Data breaches: Sensitive data exposure.
2. System compromise: Loss of system integrity or control.
Default password databases
1. Vulnerability assessment: Identifying potential weaknesses in systems.
2. Penetration testing: Testing system security by attempting to login with default credentials.
1. Identify vulnerabilities: Detect systems with unchanged default passwords.
2. Improve security: Encourage password changes and stronger password policies.
1. Default Password List (DPL)
2. (link unavailable) Default Passwords Database
1. (link unavailable) Default Passwords Database: A comprehensive database of default passwords for various devices and systems.
2. Default Password List (DPL): A list of default passwords for routers, modems, and other network devices.
3. Router Default Passwords: A database of default passwords for routers from various manufacturers.
1. Ethical hackers: To identify potential vulnerabilities in systems.
2. Security researchers: To study and analyze system security.
Manual and Automated Password Cracking
1. Brute-force attacks: Trying all possible combinations of characters, numbers, and symbols.
2. Rainbow table attacks: Using precomputed tables of hash values to crack passwords.
3. Dictionary attacks: Using automated tools to try wordlists and dictionaries.
2. Hashcat: A powerful password cracking tool.
3. Aircrack-ng: A tool for cracking Wi-Fi passwords.
1. Guessing common passwords: Trying passwords like "password123" or "qwerty".
2. Using social engineering: Guessing passwords based on personal information.
3. Dictionary attacks: Trying words or phrases from a list.
1. Brute-force attacks with John the Ripper: Trying all possible combinations.
2. Rainbow table attacks with RainbowCrack: Using precomputed tables.
3. Dictionary attacks with Hydra: Trying wordlists.
1. John the Ripper: For brute-force and dictionary attacks.
2. Hashcat: For GPU-accelerated password cracking.
3. Hydra: For network authentication cracking.
Process of System Hacking
Step 1: Reconnaissance
Step 2: Scanning
Step 3: Gaining Access
Step 4: Maintaining Access
Step 5: Covering Tracks
Additional Steps:
Using Keyloggers
1. Software Keyloggers: Installed on a device through malware, phishing, or other means.
2. Hardware Keyloggers: Physical devices connected between the keyboard and computer.
1. Capturing Keystrokes: Recording every keystroke, including login credentials, credit card numbers, and other sensitive data.
2. Sending Data: Transmitting captured data to the hacker, often through email or FTP.
1. Malware-based Keyloggers: Installed through phishing emails or infected software downloads.
2. Physical Keyloggers: Used in public places, such as libraries or internet cafes, to capture sensitive information.
1. Identity Theft: Stolen personal data used for malicious purposes.
2. Financial Loss: Stolen credit card information or login credentials used for financial gain.
1. Antivirus Software: Detecting and removing malware-based keyloggers.
2. Regular System Updates: Patching vulnerabilities to prevent exploitation.
3. Strong Passwords: Using unique and complex passwords to minimize damage.
Trojans & Backdoors
Trojans: Malicious software: Disguised as legitimate programs, Trojans allow unauthorized access.
2. Types: Remote Access Trojans (RATs), Keyloggers, etc.
3. Purpose: Steal data, monitor activity, or gain control. Backdoors: 1. Hidden access: Secret entry points in software or systems, bypassing security.
2. Purpose: Allow hackers to access systems without detection.
3. Types: Intentionally created backdoors or those resulting from vulnerabilities.
1. Data breaches
2. System compromise
3. Unauthorized access
Protection:
1. Antivirus software
2. Regular system updates
3. Network monitoring
4. Secure coding practices
Working of Trojan
1. Disguise: Trojans disguise themselves as legitimate software or files.
2. Installation: Users unknowingly install Trojans, often through phishing or downloads.
3. Activation: Trojans activate, allowing hackers to access the system.
4. Remote Access: Trojans provide remote access to hackers, enabling:
1. Remote Access Trojans (RATs): Allow hackers to control systems remotely.
2. Keyloggers: Capture keystrokes to steal sensitive information.
3. Backdoor Trojans: Create secret entry points for future access.
1. Data breaches
2. System compromise
3. Financial loss
4. Identity theft
1. Antivirus software
2. Regular system updates
3. Caution with downloads and emails
4. Strong passwords
Infection Techniques
1. Phishing: Sending malicious emails or messages with infected attachments or links.
2. Drive-by Downloads: Infecting systems through compromised websites or malicious ads.
3. Malware-laced Software: Bundling malware with legitimate software or pirated copies.
4. USB Attacks: Infecting systems via malicious USB devices.
5. Exploit Kits: Using vulnerabilities to deliver malware.
1. Social Engineering: Manipulating users into installing malware.
2. Vulnerability Exploitation: Using unpatched vulnerabilities to infect systems.
3. Malicious Code: Executing malicious code to compromise systems.
1. Data breaches
2. System compromise
3. Financial loss
4. Malware propagation
1. Antivirus software
2. Regular system updates
3. User education
4. Network security measures
AttacK
Lifecycle and Classification of Viruses
1. Creation: A virus is created by a programmer with malicious intent.
2. Replication: The virus replicates itself by attaching to other programs or files.
3. Execution: The virus is executed, either intentionally or unintentionally, by the user.
4. Infection: The virus infects the system, causing damage or disruption.
5. Propagation: The virus spreads to other systems, either through user interaction or automated means.
1. Replication: The ability to create copies of themselves.
2. Infection: The ability to attach to other programs or files.
3. Execution: The ability to execute malicious code.
1. Data loss
2. System compromise
3. Financial loss
4. Disruption
1. Antivirus software
2. Regular system updates
3. User education
4. Network security measures
Worms
1. Self-replication: Worms create copies of themselves.
2. Autonomous: Worms spread without user interaction.
3. Propagation: Worms can spread through networks, exploiting vulnerabilities.
1. Email worms: Spread through email attachments or links.
2. Instant messaging worms: Spread through instant messaging platforms.
3. Network worms: Spread through network vulnerabilities.
Virus Construction Kit
1. Customization: Allows users to customize virus behavior and characteristics.
2. Ease of use: Simplifies the process of creating malware.
3. Variety: Can create various types of malware.
1. Virus generators: Create new viruses based on templates.
2. Malware builders: Allow users to build custom malware.
1. VBS Worm Generator: Creates VBScript-based worms.
2. PSWTool: Generates password-stealing malware.
3. Dark Comet RAT Builder: Creates remote access Trojans (RATs).
1. User-friendly interface: Simplifies malware creation.
2. Customizable options: Allows users to tailor malware behavior.
3. Variety of malware types: Can create different types of malware.
1. Increased malware threats: More malware is created.
2. Difficulty in detection: New malware can evade detection.
1. Antivirus software: Use advanced threat detection.
2. Regular system updates: Keep systems and software up-to-date.
3. User education: Educate users about safe computing practices.