Free Essay

The Ethical Hacker

In:

Submitted By kevindream1234
Words 1206
Pages 5
When you are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain thank them for givinging you the oportunity to do the job make sure you sign the necesarry documentation, protecting you from all laibility and legalities associated with the job. Now structure how you want to get you information through reconnaissance,Scanning Enumeration then Attacking and Post attacking if possible fall back attacks.
In my research from the book Network Security, Firewalls, and VPNs the process will start of by exploring discovery and information gathering phase also know as footprinting or reconnaissance. this will be your pre-attack phase to learn more about the target before the first actual attack. this can be done online and offline. Be carefull not to tip off the the target that its being investigated. through archieves.org you will find alot of information on the companies older versions of their web sites, analyse search engine contents, review current Web site, do some investigatative background of the employees, Map out the location of the company, analyse job postings. be on the look out for leaks of information online, newspaper and magazine articles, frequent blogs, newsgroups,chat and forums that are visited by the company and staff, Audit financial records or review public filings, review pubic records and other court cases. Query who personels are, domain registeration, and public IP assignments, listen in on emails and other forms of communications, find out what softwares they use and finally visit the pysical location and check out what the pysical security situation is?
Once you have created a structured and meaningful file about the target you can proceed to scanning the of the target. Scanning is a process of confirming all the info you have learned about you subject and finding out new details. during scanning you will have to find live andactive systems. You will will have to employ the war dailing, war driving, ping sweeps and port scanning.
War dailing is an old tactict use to located all active modems which answered on telephone systems. during reconnaissance all phone numbers collected or within the specific area code of the location mapping will be automatically dailed using a computer hooked to a modem fo find other modems in the area.
War driving is a method of finding wireless network with the aid of a wireless device. you will want to drive around the traget business or just get into the lobby and see what networks you might find.
Then a ping sweep will be preformed to find which network will respond to Internet Control Messaging Protocol(ICMP) echo request. In this proccess a network mapping utility or ping command sends ICMP echo request to all possible reciepients within an IP address range or subnet. All up and running networks will send ICMP echo response back validating a working IP address.
Now to do a port scan which not alone will let us know the open, closed or filtered ports on the network but will also help find already known and determine the existance of a system at a specific IP address.
With the reconnaissance it generally secretive, silent and unobstructive where as with scanning you become very noticable on the network due to the number of scans performed to find open ports of various IP addresses, it is advicable to do alot aof scans to find multiple access points.
Enumeration which has to be performed before attack. In this phase OS identification is performed by probing the open and closed ports of the target networks. A multiple of softwares can be uses to perform this task. Zenmap will be employed for this case because is gives you a GUI interface of your analysis and shows you all open and closed ports as well as the OS it runs the best part of it all is it has a cross platform capabitity. which makes it very ideal not to mention its free to download. this phase provides found potential attack points. the national vulnerability database will have to be evaluated find mre avenues of exposure. time to collect exploit tools and prepare to wage the attack.
Attacking the business should be swift and fast based on all the collected data. Once a vulnerability is tested and it fails be quick to abandon it refere to the enumeration data and then re-luanch a new attack. Since the aim is to go in for MSQL data the software preference will be Havij Hacking Software which can be used to download the database and retrieve the administrator password for later exploits.
"Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.
It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system." http://hackinvasion.blogspot.com/2013/01/hacking-website-with-havij.html#! Hacking website with Havij Hack Ethically
If this attack is succesful, the next stage will be the post attack phase. however if the attack fails we will have to to go back to the reconnaissance the enumeration phase to develop a new approch to attack.
During the post attack phase keystroke loggers can be dumped in the system to steal administrator or system access and even trojan horses to activate at a later time send access codes to base for later log-in into the system.
Once in and out the clean-up will have to start to clean all traces or evidence of entry into the system. If this is done successfully the system can be considered owned. the Fall back attack will be the alternate plans incase the initial actions does not go as planed, social engineering will be the next cause of action, "Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.
A social engineer runs what used to be called a "con game." For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network's security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical social engineering techniques." social engineering http://searchsecurity.techtarget.com/definition/social-engineering

A detailed log of all activities should be kept and a final document prepared, to be presented for the investigation commitee to access at the end of the assignment. This i find will be helpfull as a point of reference for both parties to establish an ethical hacking agreement.

Similar Documents

Free Essay

Certified Ethical Hacker

...http://www.ipass4sure.com 312-50 ECCouncil Certified Ethical Hacker http://www.ipass4sure.com/exams.asp?examcode=312-50 The 312-50 practice exam is written and formatted by Certified Senior IT Professionals working in today's prospering companies and data centers all over the world! The 312-50 Practice Test covers all the exam topics and objectives and will prepare you for success quickly and efficiently. The 312-50 exam is very challenging, but with our 312-50 questions and answers practice exam, you can feel confident in obtaining your success on the 312-50 exam on your FIRST TRY! ECCouncil 312-50 Exam Features - Detailed questions and answers for 312-50 exam - Try a demo before buying any ECCouncil exam - 312-50 questions and answers, updated regularly - Verified 312-50 answers by Experts and bear almost 100% accuracy - 312-50 tested and verified before publishing - 312-50 exam questions with exhibits - 312-50 same questions as real exam with multiple choice options Acquiring ECCouncil certifications are becoming a huge task in the field of I.T. More over these exams like 312-50 exam are now continuously updating and accepting this challenge is itself a task. This 312-50 test is an important part of ECCouncil certifications. We have the resources to prepare you for this. The 312-50 exam is essential and core part of ECCouncil certifications and once you clear the exam you will be able to solve the real life problems yourself.Want to take advantage of the Real 312-50...

Words: 1963 - Pages: 8

Free Essay

Ceh Course

...defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50 Who Should Attend This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Duration 5 days (9:00 – 5:00) Certification The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional). Students need to pass the online Prometric exam to receive CEH certification. Page 2 EC-Council Legal Agreement Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these...

Words: 458 - Pages: 2

Premium Essay

Ethical Hacking

...Ethical Hacking – Is There Such A Thing? Alexander Nevermind Nelson Stewart, PhD CIS 324 December 9, 2011 ABSTRACT ------------------------------------------------- When someone hears the word hacker, many things come to mind. Bad, thief, terrorist, crook and unethical are some words that may be used to describe a hacker. The reputation of a hacker is well deserved as many company networks have been compromised with viruses and spyware causing untold millions in damage, the theft of sensitive consumer information such as Social Security numbers and financial data and the unauthorized access of classified government information. To combat these issues, many companies employ individuals called ethical hackers who, by their direction and supervision look for vulnerabilities in network systems. There are naysayers who bristle at the term “ethical hacker” saying that a hacker is a hacker but those who hold such views could be missing the point. These subjects will be discussed in detail later in the text. ------------------------------------------------- Is there such a thing as “Ethical Hacking?” Define ethical hacking and support an argument in favor or against the concept. Consider who might believe/use ethical hacking and discuss if hacking, even for the purpose of protecting human rights, is ethical. You should extend the paper beyond the topics suggested in the questions within the paper description. Ethical hacking does exist, in fact, companies...

Words: 904 - Pages: 4

Premium Essay

Security Analyst

...Contents 1. Introduction 2. Assessment Test 3. Chapter 1: Getting Started with Ethical Hacking 1. Hacking: A Short History 2. What Is an Ethical Hacker? 3. Summary 4. Exam Essentials 5. Review Questions 4. Chapter 2: System Fundamentals 1. Exploring Network Topologies 2. Working with the Open Systems Interconnection Model 3. Dissecting the TCP/IP Suite 4. IP Subnetting 5. Hexadecimal vs. Binary 6. Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions...

Words: 71242 - Pages: 285

Premium Essay

Diagnostic Medical Sonographer, Database Administrator, And Ethical Hacker

...security. The careers I researched were Diagnostic Medical Sonographer, Database Administrator, and Ethical Hacker. The career of my own personal choice was a Diagnostic medical sonographer. I chose this career because sonography is what I would like to major in. A Database Administrator was my technology career and an Ethical Hacker was my choice for an IT security profession. I chose these two occupations because I had very little...

Words: 903 - Pages: 4

Premium Essay

Ethical Hacking

...What is Ethical Hacking Ethical hacking provides a way to determine the security of an information technology environment – at least from a technical point of view. As the name ethical hacking already tells, the idea has something to do with hacking. But what does “hacking” mean “The word hacking has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts(who refer to cyber-criminals as "crackers"), the second definition is much more commonly used.” – Definition by Internet Security Systems In the context of “ethical hacking”, hacking refers to the second definition –breaking into computer systems. It can be assumed that hacking is illegal, as breaking into a house would be. At this point, “ethical” comes into play. Ethical has a very positive touch and describes something noble which leads us to the following definition of ethical hacking: Ethical hacking describes the process of attacking and penetrating computer systems and networks to discover and point out potential security weaknesses for a client which is responsible for the attacked information technology environment. An ethical hacker is therefore a “good” hacker, somebody who uses the methods and tools of the blackhat4 community to test the security of networks and servers. The goal of an ethical hack is neither to do damage...

Words: 1321 - Pages: 6

Premium Essay

Ethical Hacking

...basic language for understanding machine language and very useful to ubderstand when anything is disassembled and decoded) 12. Learn to use a Unix os. (a Unix system is generally loaded with networking tools as well as a few hacking tools) 13. Learn how to use Exploits and compile them. (Perl and c++ is must) ETHICAL HACKER Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Hackers enjoy Exploring and Learning how Computer systems operate. They love discovering new ways to work electronically. Hacker is a word that has two meanings: 1-Recently, Hacker has taken on a new meaning someone who maliciously breaks into systems for personal gain. 2-Technically, these criminals are Crackers as Criminal Hackers. Crackers break into systems with malicious Intentions An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing...

Words: 2587 - Pages: 11

Premium Essay

Challenges and Prospects of Ethical Hacking

...Ethical /acking to ensure the sa,ety o, your computer system. /ere is a list o, 0ene,its that you can derive ,rom hiring *hite hat hackers4$. 3hite hat hackers increase the security levels o, computer systems. 1hey help increase your protection against 0lack hat hackers *ho are out to get your personal in,ormation.>. + *hite hat hacker prevents 0lack hat hackers ,rom entering your computer system. 3hite hat hackers employ high level computer science to evaluate and increase the security o, your computer system.?. 3hite hat hackers per,orm Ethical /acking to improve the de,ense mechanism o, your computer system.. 3hite hat hackers evaluate and assess the capa0ility o, your system to ,ind out potential loopholes and cracks that 0lack hat hackers can enter. 1hey make sure that your system is protected ,rom the sneaky techni2ues o, 0lack hat hackers.1hese are some o, the 0ene,its that *hite hat hackers can o,,er. %, *hite hat hackers per,orm Ethical /acking! 0lack hat hackers are their antithesis. Black hat hackers are illegal hackers that *ant to steal your personal in,ormation. Black hat hackers are 0ad ,or your system. 1hey *reck your system and prevent it ,rom per,orming *ell. Black hat hackers leave your system in sham0les. %t is 0est to hire a *hite hat hacker to create a line o, de,ense against 0lack hat hackers. The Ethical Hacker infl"ences processes and techni'"es in various ,ields namely • 'arketing A "ticking to ethical pricing and re,raining ,rom • manipulation...

Words: 1053 - Pages: 5

Premium Essay

Hacking

...Danish Jamil et al. / International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always...

Words: 3982 - Pages: 16

Free Essay

Hackers: Scourge of the Internet, or Information Superhero?

...Hackers: Scourge of the Internet, or Information Superhero? Kyle Gonzalez ITT Technical Institute Introduction “And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencys is sought... a bored is found.” – Hackers Manifesto It can be seen all over the news. Visa and PayPal taken offline by hackers, Sony’s PlayStation Network brought to its knees, a cyber defense contractor named Stratfor had its servers hacked and corporate emails leaked. Everything that people know about hacking can be summed up in news articles written by the uninformed. Hacking is bad, and there is no arguing that… Or is there? Most of what people know of hacking comes from the news or Hollywood movies such as Hackers and Swordfish. What they see is only one facet of this fascinating, yet misunderstood world. Hacking is not the evil act that some make it out to be. Hacking can also be a good thing. Enter the White Hat, or Ethical Hackers. These are the network security professionals in which no movies are based. Ethical hacking is used to help analyze networks for security flaws, stop attacks in progress and help keep companies in compliance with government regulations such as PCI or SOX. What is Ethical Hacking? Ethical hacking sounds like an oxymoron, but it does exist and is a very handsomely paying career field. The average ethical hacker can make anywhere...

Words: 2096 - Pages: 9

Premium Essay

Ethical Hacking

...Danish Jamil et al. / International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some type...

Words: 3974 - Pages: 16

Premium Essay

Ethical Hacking

...------------------------------------------------- When someone hears the word hacker, many things come to mind. Bad, thief, terrorist, crook and unethical are some words that may be used to describe a hacker. The reputation of a hacker is well deserved as many company networks have been compromised with viruses and spyware causing untold millions in damage, the theft of sensitive consumer information such as Social Security numbers and FINANCIAL data and the unauthorized access of classified government information. To combat these issues, many companies employ individuals called ethical hackers who, by their direction and supervision look for vulnerabilities in network systems. There are naysayers who bristle at the term “ethical hacker” saying that a hacker is a hacker but those who hold such views could be missing the point. These subjects will be discussed in detail later in the text. ------------------------------------------------- Is there such a thing as “Ethical Hacking?” Define ethical hacking and support an argument in favor or against the concept. Consider who might believe/use ethical hacking and discuss if hacking, even for the purpose of protecting human rights, is ethical. You should extend the paper beyond the topics suggested in the questions within the paper description. Ethical hacking does exist, in fact, companies employ individuals to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer...

Words: 271 - Pages: 2

Free Essay

Ethical Hacking

...Ethical Hacking Computer Ethics – CIS 324 Dr. Nelson Stewart June 7, 2013 INTRODUCTION When most people hear the term “hacker” they think of an evil person committing crimes by hacking into their computers to steal, destroy and/or steal identities. This is so in some cases, but not all hackers are bad. Hackers are merely curious technically skilled individuals who gain unauthorized access to computers, networks of various companies, organizations and individuals. Good hackers are considered white hat hackers. They are the ones that are hired to break into systems as a way of testing the vulnerabilities and security issues that may be present in the computer system. Bad hackers are considered black hat hackers. They are the “evil” hackers, or should I say “crackers” who hack into systems to steal identities, information, crack into software programs and create nasty viruses. What is Ethical Hacking? Ethical hacking provides a way to determine the security of an information technology environment – at least from a technical point of view. As the name ethical hacking already tells, the idea has something to do with hacking. But what does “hacking” mean? The word hacking has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as “crackers”), the...

Words: 1280 - Pages: 6

Premium Essay

Ethical Hacking

...Chapter-1 1.0 Introduction With the tremendous advancement of Internet, different aspects of it are achieving the highest peak of growth. An example of it is e-commerce. More and more computers get connected to the Internet, wireless devices and networks are booming and sooner or later, nearly every electronic device may have its own IP address. The complexity of networks is increasing, the software on devices gets more sophisticated and user friendly – interacting with other devices and people are a main issues. At the same time, the complexity of the involved software grows, life cycles are getting shorter and maintaining high quality is difficult. Most users want (or need) to have access to information from all over the world around the clock. Highly interconnected devices which have access to the global network are the consequence. As a result, privacy and security concerns are getting more important. In a word, information is money. There is a serious need to limit access to personal or confidential information – access controls are needed. Unfortunately most software is not bug free due to their complexity or carelessness of their inventors. Some bugs may have a serious impact on the access controls in place or may even open up some unintended backdoors. Security therefore is a hot topic and quite some effort is spent in securing services, systems and networks. On the internet, there is a silent war going on between the good and the bad guys – between the ones...

Words: 8365 - Pages: 34

Free Essay

Ethical Hacking Today

...Ethical Hacking in Today’s Society Patrick Bryant ECPI UNIVERSITY IS530 May 12, 2012 DR. BRYANT Abstract Over the years technology has advanced just as Moore’s Law has predicted. Not only does the technology double every year in a compounding way, but those who understand these concepts grow as well. These talented individuals can be looked at from several different viewpoints and depending on who that person may be could in fact determine whether it is a positive viewpoint or a negative one. In this paper I will prove why it is necessary to have Ethical Hackers in today’s security models and how they have come a long way to improve how our information systems operate in a more secure manner. Ethical Hacking in today’s Society Hacker’s for years have been able to do things that the normal individuals have never even thought of pursuing and for several different reasons. There are several different types of hackers out there, but they all have one thing in common and that is their knowledge of Information System exploits and vulnerabilities. The constant issues highlighted by the media always reporting some type of cyber crime, a study showing that nearly 90% of attacks happen on the inside (Durant, 2007). The biggest key is that of understanding the hacker’s true intention and determining whether or not it was ethical or malicious. This leads us to first understand what an ethical hacker is and help determine their purpose is a positive venture when wanting...

Words: 2916 - Pages: 12