5-Basics of Hacking
Ethical hacking is the science of testing computers and network for security vulnerabilities and plugging the holes found before the unauthorized people get a chance to exploit them.
Or
It is identifying weakness in computer systems and/or computer networks and coming up with countermeasures that protect the weaknesses.
penetration testing,
Intrusion testing,
Red teaming.
Social engineering cycle: Social engineering is the art of exploiting the human elements to gain access to unauthorized resources.
Or
Social engineering is defined as the exploitation of the trusting nature of human beings to gain information for malicious purposes.
Social engineering cycle is
Hackers
A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access.
Hackers are problem solvers. They extract the problem and sorting out a solution.
An ethical hacker is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems.
How hackers beget ethical hackers
Hacker is word that has two 2 meaning:
Ethical hacking versus auditing
Rules abide by ethical hackers:
Classification of hackers according to their intent
How to become a qualified ethical hacker
Step 0: read the hacking
Step 1: learn to program in C.
Step 2: Learn More than one programming language.
Step 3: Learn UNIX.
Step 4: L
Step 5: Learn Networking concepts.
Step 6: start reading simple some tutorials about hacking.
Step 7: Learn cryptography.
Step 8: Experiment A lot.
Some of the things you may need to keep in mind when doing experiments.
Step 9: Read some good books from experts.
Step 10: participate in hacking challenges. Apart from that, there are some websites listed below that regularly offer hacking challenges online.
Hackquest.de
Page on hacktissite.org
Hacking-lab.com
Step 11: Go Next Level: write vulnerability.
Step 12: contribute to open source security projects
Step 13: continue Learning and Keep Listening to security talks.
Legality of ethical hacking:
Ethical hacking is legal if the hacker abides the rules. The International council of E-commerce(EC-Council) provides a certification program that tests individuals’ skill. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed.
Understanding the need to hack your own system
Understanding the dangers your system face
Systems are generally under fire from hackers around the world. There are some well-known attacks.
Nontechnical attacks
Hackers break into buildings, computer rooms or other areas containing critical information or property.
Network infrastructure attacks
4. Installing a network analyzer on a network and capturing every packet that travels across it.
5. Piggybacking into a network through an insecure wireless configuration.
Operating system attack
1.Exploiting specific protocol implementations
2. Attacking built-in authentication systems
3. Breaking file system security
4. Cracking passwords and encryption mechanism.
Application and other specialized attacks
What is penetration testing
A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF).
Pen testing can involve the attempted breaching of any number of application systems, (e.g., application protocol interfaces (APIs), frontend/backend servers) to uncover vulnerabilities.
CASe- 4 : Take Travel Agent
1. Planning and reconnaissance�The first stage involves:
Defining the scope and goals of a test, including the systems to be addressed and the testing methods to be used.
Gathering intelligence (e.g., network and domain names, mail server) to better understand how a target works and its potential vulnerabilities.
2. Scanning�The next step is to understand how the target application will respond to various intrusion attempts. This is typically done using:
Static analysis – Inspecting an application’s code to estimate the way it behaves while running. These tools can scan the entirety of the code in a single pass.
Dynamic analysis – Inspecting an application’s code in a running state. This is a more practical way of scanning, as it provides a real-time view into an application’s performance.
3. Gaining Access�This stage uses web application attacks, such as cross-site scripting, SQL injection and backdoors, to uncover a target’s vulnerabilities. Testers then try and exploit these vulnerabilities, typically by escalating privileges, stealing data, intercepting traffic, etc., to understand the damage they can cause.
4. Maintaining access�The goal of this stage is to see if the vulnerability can be used to achieve a persistent presence in the exploited system— long enough for a bad actor to gain in-depth access. The idea is to imitate advanced persistent threats, which often remain in a system for months in order to steal an organization’s most sensitive data.
5. Analysis�The results of the penetration test are then compiled into a report detailing:
Specific vulnerabilities that were exploited
Sensitive data that was accessed
The amount of time the pen tester was able to remain in the system undetected
This information is analyzed by security personnel to help configure an enterprise’s WAF settings and other application security solutions to patch vulnerabilities and protect against future attacks.
Penetration testing
CASe- 4 : Take Travel Agent
CASe- 4 : Take Travel Agent
CASe- 4 : Take Travel Agent
CASe- 4 : Take Travel Agent