Tải bản đầy đủ (.pdf) (90 trang)

CEHV8 module 01 introduction to ethical hacking

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (3.94 MB, 90 trang )

Introduction to
E th ical H ack in g
Module 01


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

In t r o d u c t io n to E t h ic a l
H a c k in g
M o d u le

0 1

E n g i n e e r e d b y H a c k e r s . P r e s e n t e d b y P r o f e s s io n a ls .

E

t h ic a l

H

M o d u le

a c k in g

0 1 :

a n d



o u n t e r m

In t r o d u c tio n

E x a m

Module 01 Page 2

C

to

e a s u r e s

E th ic a l

v 8

H a c k in g

3 1 2 -5 0

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking


Exam 312-50 Certified Ethical Hacker

CEH

S e c u r ity N e w s

-

.

.

■ ■.

_
‫* י‬

‫ז י‬



• I‫ן‬

? ‫י ! ■ ; ■־ ■ל־‬

H o m

e

| A b o u t


U s

P o r t f o lio

\

| C o n t a c t

U s

■ ‫יי‬

| S e r v ic e

Oct 17 2012, 0:45am 1ST

Z e ro -d a y A tta c k s a r e M e an er, m o re
R a m p a n t th a n w e e v e r th o u g h t
C om puter attacks th a t ta rg e t undisclosed v u ln e ra b ilitie s are m ore com m on and last longer than
many security researchers previously th o u g h t. The fin d in g comes fro m a new study th a t tracked
the num ber and duration o f so-called zero-day exploits over three years.
The typical zero-day attack, by d e fin itio n , e xp lo its s o ftw a re fla w s before th e y are publicly
disclosed. It lasts on average 312 days, w ith some lasting as long as tw o and a half years,
according to th e study by researchers fro m antivirus p rovider Symantec. O f the 18 zero-day
attacks the researchers found betw een 2008 and 2 0 1 1 ,1 1 o f the m previously w e n t undetected.
Recent revelations th a t th e S tuxnet m alw are th a t sabotaged Iranian nuclear facilities relied on
five zero days already underscored th e th re a t posed by such attacks. But th e researchers said
th e ir findings suggest th e menace may be even greater.
h ttp : //a r s te c h n ic a .c o m


Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.

N

e w

s

Z e r o - d a y
e v e r

A tta c k s

a r e

M

e a n e r ,

m

o r e

R a m

p a n t th a n

w e


th o u g h t

S o u rce : h ttp ://a rs te c h n ic a .c o m
C o m p u te r
th a n

a tta c k s

th a t ta rg e t

u n d is c lo s e d

v u ln e ra b ilitie s

a re

m o re

com m on

m a n y s e c u rity re s e a rc h e rs p re v io u s ly th o u g h t. T h e fin d in g c o m e s f r o m

and

la s t

a new

lo n g e r


s tu d y th a t

tr a c k e d th e n u m b e r a n d d u r a tio n o f s o -c a lle d z e ro - d a y e x p lo its o v e r t h r e e y e a rs .
The

ty p ic a l

d is c lo s e d .

ze ro -d a y

It la s ts

a c c o rd in g to

th e

on

a tta c k ,

by

a ve ra g e

s tu d y

by

d e fin itio n ,


312

days,

e x p lo its

w ith

re se a rch e rs fro m

s o ftw a re

som e

la s tin g

a n tiv iru s

as

fla w s

b e fo re

th e y

lo n g

as t w o


and

p ro v id e r S y m a n te c .

a tta c k s th e re s e a rc h e rs fo u n d b e tw e e n 2 0 0 8 a n d 2 0 1 1 , 11 o f th e m

O f th e

a re

p u b lic ly

a h a lf ye a rs ,
18 z e ro -d a y

p re v io u s ly w e n t u n d e te c te d .

R e c e n t r e v e la tio n s t h a t t h e S t u x n e t m a lw a r e t h a t s a b o ta g e d Ira n ia n n u c le a r fa c ilitie s re lie d o n
fiv e z e ro d a y s a lre a d y u n d e r s c o r e d th e t h r e a t p o s e d

b y su ch a tta c k s . B u t th e

r e s e a r c h e r s s a id

t h e ir fin d in g s s u g g e s t th e m e n a c e m a y b e e v e n g re a te r.
"Z e ro -d a y

a tta c k s


a re

d iffic u lt

to

p re v e n t

because

th e y

e x p lo it

unknow n

v u ln e ra b ilitie s ,

fo r

w h ic h th e r e a re n o p a tc h e s a n d n o a n tiv iru s o r in t r u s io n - d e te c tio n s ig n a tu r e s ," th e y w r o te . "It
seem s

th a t,

Module 01 Page 3

as

lo n g


as

s o ftw a re

w ill

have

bugs

and

th e

d e v e lo p m e n t

of

e x p lo its

fo r

new

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures

Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

v u ln e ra b ilitie s w ill b e a p ro fita b le

a c tiv ity , w e w ill b e e x p o s e d

to

z e r o - d a y a t t a c k s . In f a c t , 6 0

p e r c e n t o f t h e z e r o - d a y v u l n e r a b i l i t i e s w e i d e n t i f y in o u r s t u d y w e r e
s u g g e s ts th a t th e r e

a re

m any

m o re

z e ro -d a y a tta c k s th a n

not known

b e fo re , w h ic h

p re v io u s ly t h o u g h t — p e rh a p s

m o re


t h a n t w ic e as m a n y . "
R e s e a rc h e rs

L e y la

B ilg e

and

Tudor

e x e c u ta b le file s c o lle c te d f r o m
M a rch

2012. T hre e

d is c lo s e d

in

2009,

o f th e

ze ro -d a y

s ix w e r e

D u m itra s


c o n d u c te d

e x p lo its t h e y

d is c lo s e d

in

2010,

fo u n d

and

tw o

r e p u ta tio n d a ta th e re s e a rc h e rs re lie d o n p r e v e n te d t h e m
a tta c k o n

m a n y v e rs io n s o f M ic r o s o ft W in d o w s , w h ic h

z e ro d a y u n til n o w , h a d th e

a

s y s te m a tic

s tu d y


11 m illio n c o m p u te rs a ro u n d th e w o rld fro m

th a t

a n a ly z e d

F e b ru a ry 2 0 0 8 to

w e re

d is c lo s e d

in

2008,

seven

w e re

d is c lo s e d

in

2011.

(The

fro m


w e re
b in a ry

i d e n t i f y i n g a t t a c k s in 2 0 1 2 . ) A n

a p p e a rs to

s h o rte s t d u ra tio n : ju s t 19 days. A n

have gone

u n d e te c te d

as a

e x p lo it o f a s e p a ra te s e c u rity

b u g in t h e W i n d o w s s h e ll h a d t h e l o n g e s t d u r a t i o n : 3 0 m o n t h s .
Of

th e

18

a tta c k s

m o n ito re d .

E ig h t


s tu d ie d ,

o f th e

c o n v e n tio n a l w is d o m

15

ta rg e te d

e x p lo its

w e re

102

or

d ire c te d

fe w e r

of

at th re e

or

th e


11

fe w e r

m illio n
h o s ts .

h o s ts

The

th a t

d a ta

w e re

c o n firm s

th a t z e ro -d a y a tta c k s a re ty p ic a lly re s e rv e d fo r h ig h -v a lu e ta rg e ts . O f th e

r e m a in in g t h r e e a tta c k s , o n e w a s e x p lo ite d b y S tu x n e t a n d a n o th e r w a s e x p lo ite d b y C o n fic k e r,
th e v iru le n t w o r m

d is c o v e re d

in 2 0 0 8 t h a t h a s i n f e c t e d

m illio n s o f c o m p u te r s


c o n t in u e s t o d o so ). T h e S t u x n e t a n d C o n fic k e r e x p lo it t a r g e t e d
re s p e c tiv e ly . T h e

re s u lts , t h e

r e s e a r c h e r s s a id , d e m o n s t r a t e d

1 .5 m illio n

th e

(and re p o rte d ly

a n d 4 5 0 ,0 0 0 h o s ts

d iv id e n d s

re tu rn e d

b y z e ro -

d a y e x p lo its , w h ic h c a n c o m m a n d p ric e s as h ig h as $ 2 5 0 ,0 0 0 .
"F or

e x a m p le ,

a p p ro x im a te ly
w ro te .

" T h is


C o n fic k e r
3 7 0 ,0 0 0

e x a m p le

e x p lo itin g

th e

v u ln e ra b ility

C V E -2 0 0 8 -4 2 5 0

m a c h in e s w it h o u t b e in g d e te c te d
illu s tra te s

th e

e ffe c tiv e n e s s

o ver m o re

o f z e ro -d a y

m anaged

th a n

tw o


v u ln e ra b ilitie s

to

in fe c t

m o n th s ," th e y
fo r

c o n d u c tin g

s te a lth c y b e r-a tta c k s ."
The

re se a rch e rs

c a u tio n e d

l im it a t io n s , c a u s in g it t o
T h re a ts
once

a tta c k s

th e ir

m e th o d

of


c o lle c tin g

m is s 2 4 z e r o - d a y a tta c k s t r a c k e d

R e p o rt o v e r th e

z e ro -d a y

th a t

tim e

p e rio d

becam e

s tu d ie d .

p u b lic

file s

b y S y m a n te c 's o w n

S u rp ris in g ly , th e

k n o w le d g e — b y

n u m b e r o f a t t a c k v a r ia n t s a ls o ro s e , w i t h


e x e c u ta b le

m a rg in s

had

s ig n ific a n t

In t e r n e t S e c u rity

num ber

o f a tta c k s

o f tw o -

to

o n ly

g re w

1 0 0 ,0 0 0 -fo ld .

The

183 to 8 5 ,0 0 0 m o re v a ria n ts d e te c te d ea ch day. O n e

p o s s i b l e c a u s e o f t h e s u r g e i n n e w f i l e s , t h e r e s e a r c h e r s s a i d , is t h a t t h e e x p l o i t s m a y h a v e b e e n

re p a c k a g e d v e rs io n s o f th e s a m e a tta c k .
" H o w e v e r , i t is d o u b t f u l t h a t r e p a c k i n g a l o n e c a n a c c o u n t f o r a n i n c r e a s e b y u p t o f i v e o r d e r s o f
m a g n i t u d e , " t h e y w r o t e . " M o r e l i k e l y , t h i s i n c r e a s e is t h e r e s u l t o f t h e e x t e n s i v e r e - u s e o f f i e l d p r o v e n e x p l o i t s in o t h e r m a l w a r e . "

Copyrights: ©2012 Conde Nast
Author: Dan Goodin
h t t p : / / a r s t e c h n i c a . c o m / s e c u r i t v / 2012 /

10/ z e r o - d a v - a t t a c k s - a r e - m e a r 1e r - a r 1d - m o r e - p l e n t i f u l -

th a n -th o u g h t/

Module 01 Page 4

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

CEH

M o d u le O b je c tiv e s

J

D a ta B re a c h In v e s tig a tio n s R e p o rt


J

H a c k in g P hases

J

E s s e n tia l T e rm in o lo g y

J

T yp e s o f A tta c k s o n a S yste m

J

E le m e n ts o f In f o r m a tio n S e c u rity

J

W h y E th ic a l H a c k in g Is N e c e s s a ry

J

T o p In fo r m a tio n S e c u rity A tta c k

.

J

S kills o f an E th ica l H a c k e r


r

j

In c id e n t M a n a g e m e n t P rocess

‫׳‬j

T yp e s o f S e c u rity P o licie s

V e c to rs
J

In f o r m a tio n S e c u rity T h re a ts

J

H a c k in g vs. E th ic a l H a c k in g

J

E ffe c ts o f H a c k in g o n B usiness

j

V u ln e r a b ility R esea rch

J


W h o Is a H a c k e r?

j

W h a t Is P e n e tra tio n T e s tin g ?

b

a s
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.

M

Sf

o

d u l e

O

b je c t iv e s

—1
I t is i m p o r t a n t t o

b e a r in m i n d t h a t a t t a c k e r s b r e a k i n t o s y s t e m s f o r v a r i o u s r e a s o n s

a n d p u r p o s e s . T h e r e f o r e , i t is i m p o r t a n t t o c o m p r e h e n d h o w m a l i c i o u s h a c k e r s e x p l o i t s y s t e m s
a n d t h e p r o b a b l e r e a s o n s b e h i n d t h e a t t a c k s . A s S u n T z u p u t it in t h e A r t o f W a r , " I f y o u k n o w

y o u r s e l f b u t n o t t h e e n e m y , f o r e v e r y v i c t o r y g a i n e d , y o u w i l l a l s o s u f f e r a d e f e a t . " I t is t h e d u t y
of

s y s te m

a d m in is tra to rs

a g a in s t e x p lo its

and

b y k n o w in g

n e tw o rk

th e

s e c u rity

e n e m y — th e

p ro fe s s io n a ls

m a lic io u s

to

g u a rd

h a cke r(s)— w h o


th e ir

seek to

in fra s tru c tu re
use th e

sam e

in f r a s t r u c t u r e f o r ille g a l a c tiv itie s .
E t h i c a l h a c k i n g is t h e p r o c e s s o f c h e c k i n g a n d t e s t i n g t h e o r g a n i z a t i o n n e t w o r k f o r t h e p o s s i b l e
lo o p h o le s a n d v u ln e ra b ilitie s .
w h ite

h a ts .

They

p e rfo rm

T h e in d iv id u a ls o r e x p e rts w h o p e r fo r m
h a c k in g

in

e th ic a l

w ays,


w ith o u t

e th ic a l h a c k in g a re c a lle d

c a u s in g

any

dam age

to

th e

c o m p u t e r s y s te m , th e r e b y in c re a s in g th e s e c u rity p e r im e te r o f a n o rg a n iz a tio n .

Module 01 Page 5

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Exam 312-50 Certified Ethical Hacker

Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

T h is m o d u le c o v e rs :
0


H a c k in g P h a se s

E s s e n tia l T e r m in o l o g y

0

T y p e s o f A tta c k s o n a S y s te m

0

E le m e n ts o f I n fo r m a tio n S e c u rity

0

W h y E t h i c a l H a c k i n g Is N e c e s s a r y

0

T o p I n fo r m a tio n S e c u rity A tta c k

6

S k ills o f a n E th ic a l H a c k e r

0

In c id e n t M a n a g e m e n t P ro ce ss

0


T y p e s o f S e c u r it y P o lic ie s

0

V u ln e r a b ility R e s e a rch

0

W h a t Is P e n e t r a t i o n T e s t i n g ?

0

D a ta B re a c h In v e s tig a tio n s R e p o rt

0

V e c to rs
0

In fo r m a tio n S e c u rity T h re a ts

0

H a c k in g vs. E th ic a l H a c k in g

0

E ffe c ts o f H a c k in g o n B u s in e s s

0


W h o Is a H a c k e r ?

Module 01 Page 6

Ethical Hacking and Countermeasures Copyright © by EC-C0UI1Cil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

H a c k in g
P hases

T ypes of
A tta c k s

In fo rm a tio n S e c u r ity
C o n tro ls

Copyright © by EC-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.

M

o

d u l e


F

lo w

‫'־‬
In fo rm a tio n
in fo rm a tio n

and

d is ru p tio n , a n d

s e c u rity

re fe rs

in fo rm a tio n

d e s tru c tio n .

a

g re a t

th re a t.

In

an


p ro te c tin g

s y s te m s

fro m

or

s a fe g u a rd in g

u n a u th o riz e d

access,

F o r m o s t o rg a n iz a tio n s , in fo r m a tio n

s e c u re d . If s e n s itiv e in f o r m a t io n
fa c e

to

fa lls in t o w r o n g

a tte m p t

to

is t h e


hands, th e n th e

u n d e rs ta n d

how

to

any

k in d

of

d is c lo s u re ,

s e n s itiv e
a lte ra tio n ,

c ritic a l re s o u rc e t o

re s p e c tiv e o rg a n iz a tio n

s e cu re

such

c ritic a l

be


m ay

in fo rm a tio n

re s o u rc e s , fir s t w e w ill lo o k a t an o v e r v ie w o f in f o r m a t io n s e c u rity .

i-g !

In f o r m a t io n S e c u rity O v e r v ie w

H a c k in g P h a se s

f c ‫—־‬

s '

In fo r m a tio n S e c u rity T h re a ts
1— ‫י‬

T yp e s o f A tta c k s

a n d A tta c k V e c to rs

4 k - ‫!״‬

T h is s e c t io n

H a c k in g C o n c e p ts


c o v e rs e le m e n ts

‫ן‬

o f in fo rm a tio n

r^ U

In fo r m a tio n S e c u rity C o n tro ls

s e c u rity , th e

s tre n g th

o f th e

c o m p o n e n t tria n g le

(s e c u rity , fu n c tio n a lity , a n d u s a b ility ), a n d e s s e n tia l te r m in o lo g y .

Module 01 Page 7

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

I n


t e

r n

Exam 312-50 Certified Ethical Hacker

e

t

C

r i m

e

C

u

r r e

n

t

R

e p o r t :


I C

CEH

3

(•rtifwd

itk itjl

I n t e r n e t C r im e C o m p la in t C e n t e r (IC 3 )

20 0 5

20 0 6

2008

20 07

2009
___________

2010

2011

htp://www.ic3.gov
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.


I n

t e

r n

e

t

C

r i m

e

C

u r r e n t

R

e p o r t :

I C

3

S o u rce : h ttp ://w w w .ic 3 .g o v

T h e f o l l o w i n g is t h e c r i m e r e p o r t d a t a f r o m
p a rtn e rs h ip a m o n g th e

F ederal B u re a u

C e n te r (N W 3 C ), a n d th e

B u re a u

I C 3 ; t h e I n t e r n e t C r i m e C o m p l a i n t C e n t e r ( I C 3 ) is a

o f In v e s tig a tio n

o f J u s tic e A s s is ta n c e

c r im e c o m p la in t s a re in c r e a s in g d a ily . F ro m
th e re

w e re

in c re a s e d

to

2 3 1 ,4 9 3
3 3 6 ,6 5 5 .

c r im e
W hen


c o m p la in ts ,
c o m p a re d

N a tio n a l W h ite

(B JA ). A c c o r d in g t o

C o lla r C rim e

IC 3 , o n l i n e

In te rn e t

t h e g r a p h , y o u c a n o b s e r v e t h a t in t h e y e a r 2 0 0 5 ,

w h e re a s
to

(F B I), t h e

2009,

in

th e

year

In te r n e t c rim e


2009,

c o m p la in ts

c o m p la in ts

in t h e

d ra s tic a lly
year

2011

d e c re a s e d to s o m e e x te n t.

Module 01 Page 8

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

3 5 0 ,0 0 0

336,655
303,809


3 0 0 .0 0 0

2 5 0 .0 0 0

275,284
231,493
207,492

2 0 0 .0 0 0
1 5 0 .0 0 0

1 0 0 .0 0 0
5 0 ,0 0 0

0

Module 01 Page 9

______ ‫״‬

206,884

314,246

r d

C o m p la in ts
r e c e iv e d
by I C 3

Yearly Comparison of Complaints Received via the IC3 Website

I n t e r n e t C r im e C o m p la in t C e n te r (IC 3 )

Ethical Hacking and Countermeasures Copyright © by EC-C0linCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

D a ta B re a c h In v e s tig a tio n s R e p o rt
Types of hacking by

CEH

and percent of records

r
28% / 97%

H a c k in g

P h y s ic a l

E n v ir o n m e n ta l

I


0% I 0%

P e rc e n t o f B re a c h e s a n d P e rc e n t o f R e c o rd s
h ttp : //w w w .v e r iz o n b u s in e s s .c o m

Copyright © by IC-CM ICil. All Rights Reserved. Reproduction Is Strictly Prohibited.

D

n

The

d a ta

a t a

B

r e a c h

I n v e

s t i g a t i o

n s

R


e p o r t

S o u rce : h ttp ://w w w .v e riz o n b u s in e s s .c o m
b re a c h

in v e s tig a tio n s

re p o rt fro m

V e riz o n

B u s in e s s

sh o w s th e

ty p e s

o f h a c k in g

by

p e r c e n t o f b r e a c h e s a n d p e r c e n t o f r e c o r d s . F r o m t h e r e p o r t , i t is c l e a r t h a t m o s t o f t h e s e c u r i t y
b r e a c h e s h a p p e n i n g t o d a y a r e b e c a u s e o f h a c k i n g . T h e r e f o r e , in o r d e r t o p r o t e c t y o u r s e l f f r o m
d a ta o r s e c u r it y b re a c h e s , y o u s h o u ld te s t y o u r n e t w o r k s e c u rity a g a in s t h a c k in g .

Module 01 Page 10

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.



Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

M a lw a r e

28% / 97%

H a c k in g

I 58 % / 99%

S o c ia l

22% I 38%

M is u s e

......... ..........

7% / <1%

P h y s ic a l

E rro r

E n v ir o n m e n ta l


17%

I

<1 %

tmrnmitmmt

H

7 % / <1%

I I

0% / 0%

P e rc e n t o f B re a c h e s a n d P e rc e n t o f R e c o rd s

FIGURE 1.1: D ata B rea ch In v e s tig a tio n R e p o rt

Module 01 Page 11

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker


E s s e n tia l T e r m in o lo g y

H a c k V a lu e

CEH

T a r g e t o f E v a lu a t io n

It is the notion among hackers that
something is worth doing or is
interesting

An IT system, product, or component
that is identified/subjected to a
required security evaluation

E x p lo it

Z e ro -D a y A tta c k
An attack that exploits computer
application vulnerabilities before the
software developer releases a patch for
the vulnerability

A defined way to breach the
security of an IT system through
vulnerability

D a is y C h a in in g


V u ln e r a b ility
Existence of a weakness, design, or
implementation error that can lead to
an unexpected and undesirable event
compromising the security of the system

Hackers who get away with database
theft usually complete their task, then
backtrack to cover their tracks by
destroying logs, etc.

Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.

E

s s e n t ia l

x ‫ן‬

T

H a c k

Hack

e

r m


i n

o

l o

g

y

V a lu e

v a lu e

in te re s tin g . H a c k e rs

is

th e

n o tio n

am ong

h a cke rs

m ig h t fe e l th a t b re a k in g d o w n

th a t


th e

s o m e th in g

is

w o rth

d o in g

or

is

t o u g h e s t n e t w o r k s e c u r ity m ig h t g iv e

t h e m g r e a t s a t i s f a c t i o n , a n d t h a t i t is s o m e t h i n g t h e y a c c o m p l i s h e d t h a t n o t e v e r y o n e c o u l d d o .

E x p lo it

An

e x p lo it

is

v u ln e ra b ility . T h e te r m
n e tw o rk . A n
u n a n tic ip a te d


a

d e fin e d

way

to

b re a c h

th e

s e c u rity

of

an

e x p l o i t is u s e d w h e n a n y k i n d o f a t t a c k h a s t a k e n

e x p lo it can

a ls o

b e h a v io r to

be d e fin e d

occur on


as m a lic io u s s o f t w a r e

le g itim a te

s o ftw a re

IT

s y s te m

th ro u g h

p la c e o n a s y s te m

o r c o m m a n d s th a t can

or h a rd w a re

or

cause

b y ta k in g a d v a n ta g e

of

th e v u ln e ra b ilitie s .

V


u ln e r a b ilit y

V u l n e r a b i l i t y is a w e a k n e s s i n d e s i g n o r a n i m p l e m e n t a t i o n e r r o r t h a t c a n l e a d t o a n
u n e x p e c t e d a n d u n d e s i r a b l e e v e n t c o m p r o m i s i n g t h e s e c u r i t y o f t h e s y s t e m . In s i m p l e w o r d s , a
v u ln e ra b ility

is l o o p

h o le ,

lim ita tio n ,

o r w e a kn e ss th a t

becom es

a so u rce

fo r an

a tta c k e r to

e n te r in to th e s y s te m b y b y p a s s in g v a rio u s u s e r a u th e n tic a tio n s .

Module 01 Page 12

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.



Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

T a r g e t

3

Exam 312-50 Certified Ethical Hacker

o f E v a lu a t io n

/
A ta rg e t

s u b je c te d

to

a

o f e v a lu a tio n

re q u ire d

is a n

s e c u rity

IT s y s t e m ,


e v a lu a tio n .

p ro d u c t,

T h is

k in d

o r c o m p o n e n t th a t
of

e v a lu a tio n

h e lp s

is i d e n t i f i e d
th e

/

e v a lu a to r

u n d e rs ta n d th e fu n c tio n in g , te c h n o lo g y , a n d v u ln e ra b ilitie s o f a p a rtic u la r s y s te m o r p ro d u c t.

Z e r o - d a y

In

a


A tta c k

z e ro -d a y

a tta c k ,

th e

a tta c k e r

e x p lo its

th e

v u ln e ra b ilitie s

in

th e

c o m p u te r

a p p lic a tio n b e fo r e th e s o ftw a r e d e v e lo p e r re le a s e s a p a tc h f o r t h e m .

D

a is y

A tta c k e rs
b a c k tra c k


to

s y s te m s a n d

C

h a in in g

w ho

get away

c o v e r th e ir tra c k s
use th e m

by

d a ta b a s e

d e s tro y in g

f o r m a lic io u s a c tiv itie s .

th e y use o th e rs ' s y s te m s to p e rfo r m

Module 01 Page 13

w ith


th e ft

lo g s ,

u s u a lly

e tc . T h e

c o m p le te

a tta c k e rs

It b e c o m e s d i f f i c u l t t o

th e ir ta s k

g a in

c o n tro l

id e n tify th e

and

th e n

o f o th e r

a t t a c k e r as


ille g a l a c tiv itie s .

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

E le m e n t s o f I n f o r m a t i o n S e c u r it y

CEH

A s ta te o f w e ll- b e in g o f in fo r m a t io n a n d in fr a s tr u c tu r e in w h ic h th e p o s s ib ility o f t h e f t ,
t a m p e r in g , a n d d is r u p t io n o f in f o r m a t io n a n d s e rv ic e s is k e p t lo w o r to le r a b le

Assurance that the
information is accessible
only to those authorized
to have access

Assurance that the systems responsible
for delivering, storing, and processing
information are accessible when
required by the authorized users

In te g rity


A v a ila b ility

The trustworthiness of data
or resources in terms of
preventing improper and
unauthorized changes

Guarantee that the sender of a message
cannot later deny having sent the
message and that the recipient cannot
deny having received the message

9 A u th e n tic ity

Authenticity refers to the
characteristic of a communication,
document or any data that ensures
the quality o f being genuine
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.

,jp ►

E

‫׳'־'*"■״‬

le m

In fo rm a tio n


in fra s tru c tu re
s e rv ic e s

e n t s

is

lo w

f I n

s e c u rity

in w h i c h

kept

o

th e

or

f o

r m

a

is


d e fin e d

t i o

n

S

as:

"A

e c u r it y

s ta te

of

w e ll-b e in g

p o s s ib ility o f th e ft, ta m p e r in g , a n d

to le ra b le ."

It

re lie s

on


th e

fiv e

m a jo r

of

d is ru p tio n
e le m e n ts

in fo rm a tio n

and

o f in fo rm a tio n
o f:

and

c o n fid e n tia lity ,

in te g rity , a v a ila b ility , a u th e n tic ity , a n d n o n -r e p u d ia tio n .

-‫״‬

C

o n f id e n t ia lit y


C o n fid e n tia lity
a u th o riz e d to

is

th e

a ssu ra n ce

th a t

th e

in fo rm a tio n

is

a c c e s s ib le

h a ve access. C o n fid e n tia lity b re a c h e s m a y o c c u r d u e to

o n ly

im p ro p e r d a ta

to

th o s e


h a n d lin g

o r a h a c k in g a t t e m p t .

f r

I n t e g r it y

zL ----------

I n t e g r i t y is t h e t r u s t w o r t h i n e s s o f d a t a o r r e s o u r c e s i n t e r m s o f p r e v e n t i n g i m p r o p e r

a n d u n a u t h o r iz e d c h a n g e s , t h e a s s u ra n c e t h a t in f o r m a t io n ca n b e re lie d u p o n t o b e s u ffic ie n tly
a c c u r a t e f o r its p u r p o s e .

A

■ "f?

v a ila b ilit y


A v a i l a b i l i t y is t h e

Module 01 Page 14

a ssu ra n ce th a t th e

s y s te m s re s p o n s ib le f o r d e liv e rin g , s to rin g , a n d


Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

p ro c e s s in g in f o r m a t io n a re a c c e s s ib le w h e n r e q u ir e d b y a u th o r iz e d u s e rs .

A

u t h e n t ic it y

A u th e n tic ity

re fe rs to th e

c h a ra c te ris tic o f a c o m m u n ic a tio n , d o c u m e n t, o r a n y d a ta

t h a t e n s u re s th e q u a lit y o f b e in g g e n u in e o r n o t c o r r u p te d f r o m

th e o rig in a l. T h e m a jo r ro le s o f

a u t h e n t i c a t i o n i n c l u d e c o n f i r m i n g t h a t t h e u s e r is w h o h e o r s h e c l a i m s t o

be a n d e n s u rin g th e

m e s s a g e is a u t h e n t i c a n d n o t a l t e r e d o r f o r g e d . B i o m e t r i c s , s m a r t c a r d s , a n d d i g i t a l c e r t i f i c a t e s

a re u se d t o e n s u re a u th e n tic ity o f d a ta , tra n s a c tio n s , c o m m u n ic a tio n s , o r d o c u m e n ts .

p g jj

N

o n - r e p u d ia t io n

N o n -re p u d ia tio n

re fe rs

to

th e

a b ility

to

e n s u re

th a t

a

p a rty

to


a

c o n tra c t

or

a

c o m m u n ic a tio n c a n n o t d e n y th e a u t h e n t ic it y o f t h e ir s ig n a tu r e o n a d o c u m e n t o r th e s e n d in g
o f a m e s s a g e t h a t t h e y o r i g i n a t e d . I t is a w a y t o g u a r a n t e e t h a t t h e s e n d e r o f a m e s s a g e c a n n o t
la te r d e n y

h a v in g

se n t th e

m essage

and

th a t th e

re c ip ie n t c a n n o t d e n y

h a v in g

re c e iv e d

th e


m essage.

Module 01 Page 15

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

T h e S e c u r ity , F u n c t io n a lit y , a n d
CEH

U s a b ilit y T r i a n g l e

|
j
:

M o vin g th e ball to w a rd s
se cu rity means less
fu n c tio n a lity and u sa b ility

|

F u n cc t i o n a l i t y
(F e a tu re s)


»

j

S e c u rity
( R e s tr ic tio n s )

W

.is

*

U s a b ility
(G U I)

Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.

T h e

S

e c u r it y ,

F

u

n


c t i o

n

a

l i t y ,

a n d

U

s a

b

i l i t y

T

r i a

n

g

l e

T e c h n o l o g y is e v o l v i n g a t a n u n p r e c e d e n t e d r a t e . A s a r e s u l t , n e w p r o d u c t s t h a t r e a c h

th e

m a rk e t te n d

o rig in a lly
sam e

to

be e n g in e e re d f o r e a s y -to -u s e

d e v e lo p e d

pace

o v e rlo o k

as

th e

in c re a s in g

fo r

th e

"h o n e s t"

u s e r's


p ro file .

v u ln e ra b ilitie s

b u ilt-in

rese a rch

and

M o re o v e r,

d u rin g

th e

ra th e r th a n

a c a d e m ic

d u rin g

in te n d e d

d e fa u lt s e c u rity m e c h a n is m s

th is

s e c u re c o m p u tin g . T e c h n o lo g y ,


p u rp o se s,
e v o lu tio n ,

d e p lo y m e n t

has

s y s te m

of

m e a n s u s e rs h a v e to

not

th e
be

e v o lv e d
d e s ig n e rs

s y s te m .
m o re

at th e
o fte n

H o w e v e r,


c o m p e te n t. As

c o m p u t e r s a r e u s e d f o r m o r e a n d m o r e r o u t i n e a c t i v i t i e s , i t is b e c o m i n g i n c r e a s i n g l y d i f f i c u l t f o r
s y s te m

a d m in is tr a to rs

and

o th e r

s y s te m

p ro fe s s io n a ls

to

a llo c a te

reso u rce s

e x c lu s iv e ly

fo r

s e c u r in g s y s te m s . T h is in c lu d e s t im e n e e d e d t o c h e c k lo g file s , d e t e c t v u ln e r a b ilit ie s , a n d a p p ly
s e c u rity u p d a te p a tc h e s .
R o u tin e

a c tiv itie s


consum e

a d m in is tra tio n . T h e re
re g u la r

and

p ro fe s s io n a ls

in n o v a tiv e
to

reso u rce s.

O rig in a lly ,

"hack"

c o m p u te r s y s te m s .

Module 01 Page 16

b a s is .

c o n s ta n tly

T e c h n o lo g y )
to


s y s te m

is l i t t l e t i m e

d e p lo y

T h is

has

m o n ito r

m e a n t to

H a c k in g

a d m in is tra to rs ‫׳‬

to

possess

re q u ire d

and

tim e ,

m e a su re s an d


in c re a s e d
d e fe n d

e x tra o rd in a ry

th e
IC T

le a v in g
s e cu re
dem and

fo r

( In fo rm a tio n

c o m p u te r

g re a t p ro fic ie n c y .

le s s

tim e

c o m p u tin g

s k ills t o

fo r


d e d ic a te d
and

a

s e c u rity

C o m m u n ic a tio n

e x te n d

H o w e v e r, to d a y th e re

v ig ila n t

reso u rce s on

th e

a re

lim its

of

a u to m a te d

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.



Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

to o ls a n d c o d e s a v a ila b le o n t h e I n t e r n e t t h a t m a k e it p o s s ib le f o r a n y o n e w it h a w ill a n d d e s ire
to hack and succeed.
M e r e c o m p r o m is e o f th e s e c u rity o f a s y s te m d o e s n o t d e n o te success. T h e re a re w e b s ite s th a t
in s is t o n " t a k i n g b a c k t h e n e t " as w e l l a s p e o p l e w h o b e l i e v e t h a t t h e y a r e d o i n g a ll a f a v o r b y
p o s tin g e x p lo it d e ta ils .

T h e s e c a n a c t as a d e t r i m e n t a n d c a n b r i n g d o w n t h e s k ill le v e l r e q u i r e d

t o b e c o m e a s u c c e s s fu l a tta c k e r.
T h e e a s e w it h w h ic h s y s te m v u ln e r a b ilitie s ca n b e e x p lo ite d h a s in c re a s e d w h ile t h e k n o w le d g e
c u rv e re q u ire d to p e rfo r m

su ch e x p lo its has s h o rte n e d . T h e c o n c e p t o f th e e lite /s u p e r a tta c k e r

is a n i l l u s i o n . H o w e v e r , t h e f a s t - e v o l v i n g g e n r e o f " s c r i p t k i d d i e s " is l a r g e l y c o m p r i s e d o f l e s s e r s k ille d

in d iv id u a ls

h a v in g

se co n d -h a n d

k n o w le d g e


im p e d im e n ts c o n trib u tin g to th e g ro w th

o f p e rfo rm in g

o f s e c u rity in fra s tr u c tu r e

e x p lo its .

One

lie s in t h e

o f th e

m a in

u n w illin g n e s s o f

e x p lo ite d o r c o m p r o m is e d v ic tim s t o r e p o r t t h e in c id e n t f o r fe a r o f lo s in g t h e g o o d w ill a n d fa ith
of

th e ir

e m p lo y e e s ,

in fo rm a tio n

a s s e ts

c u s to m e rs ,


in flu e n c in g

th e

p a rtn e rs ,
m a rke t

a n d /o r
has

seen

of

lo s in g

m o re

m a rke t

c o m p a n ie s

sh a re .

The

th in k in g

tre n d


tw ic e

of

b e fo re

r e p o r tin g in c id e n ts to la w e n fo r c e m e n t f o r fe a r o f b a d p re ss a n d n e g a tiv e p u b lic ity .
T h e in c r e a s in g ly n e t w o r k e d e n v ir o n m e n t , w i t h c o m p a n ie s o f t e n h a v in g t h e i r w e b s it e as a s in g le
p o in t

o f c o n ta c t

c o u n te rm e a s u re s

a cro ss g e o g ra p h ic a l
to

p re v e n t

e x p lo its

b o u n d a rie s ,
th a t

can

m akes
re s u lt


in

it c ritic a l f o r
lo s s

of

an

a d m in is tra to rs
im p o r ta n t

to

ta k e

re a so n

why

c o r p o r a t i o n s n e e d t o in v e s t in s e c u r i t y m e a s u r e s t o p r o t e c t t h e i r i n f o r m a t i o n a s s e ts .

Module 01 Page 17

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking


M

o

d u l e

F

Exam 312-50 Certified Ethical Hacker

lo w

l r ' 5 ,‫ד‬
So fa r

we

d is c u s s e d

in fo rm a tio n

s e c u rity .

Now

we

w ill


d is c u s s

th re a ts

and

a tta c k

v e c to r s o f in fo r m a t io n s e c u rity .

|~ U

In fo r m a tio n S e c u rity O v e r v ie w

H a c k in g P h a se s

I n f o r m a tio n S e c u rity T h re a ts

* - . .
|
T yp e s o f A tta c k s

Eel-------

M

a n d A tta c k V e c to rs

H a c k in g C o n c e p ts


T h is s e c tio n

in tro d u c e s

you

to

L

to p

in fo rm a tio n

^

‫־‬

In fo r m a tio n S e c u rity C o n tro ls

s e c u rity

a tta c k

v e c to rs , th e

t h r e a t s t o v a lu a b le in fo r m a tio n , a n d th e g o a ls o f a tta c k e r s w h o p e r fo r m

p o s s ib le


s e c u rity

a tta c k s o n in fo rm a tio n

s y s te m s .

Module 01 Page 18

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

T o p I n f o r m a t i o n S e c u r it y
CEH

A tta c k V e c to rs
V irtua liza tion and

Organized

Un-patched

Targeted

Social


Cloud C om puting

Cyber Crime

Softw are

M alw ares

N etw o rkin g

?a

‫י‬

IF 3I

't t A

‫ויי‬,

Insider Threats

! j‫׳‬

In fo rm a tio n

S y s te m s

Complexity of

Computer Infrastructure

?ft

9
Compliance to Govt.
Laws and Regulations

Mobile
Device Security

Inadequate
Security Policies

Network
Applications

Lack o f Cyber
Security Professionals

Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.

T o p

An
in fo rm a tio n

I n

f o


a tta c k
s y s te m

r m

a

v e c to r
to

t i o

is

p e rfo rm

n

a

S

p a th

e c u r it y

or

m eans


A

t t a c k

by

w h ic h

V

e c t o r s

an

a tta c k e r

g a in s

access

to

an

m a lic io u s a c t iv it ie s . T h is a t t a c k v e c t o r e n a b le s a n a t t a c k e r t o

t a k e a d v a n t a g e o f t h e v u l n e r a b i l i t i e s p r e s e n t in t h e i n f o r m a t i o n s y s t e m

in o r d e r t o c a r r y o u t a


p a rtic u la r a tta c k .
A lth o u g h

th e re

a tta c k v e c to rs

a re

som e

com e

in

tra d itio n a l

m any

fo rm s ;

a tta c k s
one

v e c to rs

cannot

fro m


w h ic h

p r e d i c t in w h i c h

a tta c k
fo rm

can

an

be

p e rfo rm e d ,

a tta c k v e c to r can

com e.
The

fo llo w in g

a re

th e

p o s s ib le

to p


a tta c k

v e c to rs

th ro u g h

w h ic h

a tta c k e rs

can

a tta c k

in fo r m a tio n s y s te m s :
0

V ir t u a liz a t io n a n d C lo u d C o m p u t in g

0

O rg a n iz e d C y b e r C rim e

0

U n p a tc h e d S o ftw a re

0


T a rg e te d M a lw a re

0

S o c ia l N e t w o r k i n g

0

In s id e r T h re a ts

Module 01 Page 19

Ethical Hacking and Countermeasures Copyright © by EC-COUIlCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

0

B o tn e ts

0

Lack o f C y b e r S e c u rity P ro fe s s io n a ls

0

N e tw o r k A p p lic a tio n s


0

I n a d e q u a t e S e c u r it y P o lic ie s

0

M o b ile D e v ic e S e c u r ity

0

C o m p lia n c e w it h G o v t. L a w s a n d R e g u la tio n s

0

C o m p le x ity o f C o m p u te r In fra s tru c tu re

0

H a c k tiv is m

Module 01 Page 20

Exam 312-50 Certified Ethical Hacker

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures

Introduction to Ethical Hacking

M

o

I n

f o

Exam 312-50 Certified Ethical Hacker

t i v e s ,
r m

a

G
t i o

o a ls ,
n

S

a n d

O

e c u r it y


b j e
A

c t i v e s

o

f

t t a c k s

A t t a c k s = M o t i v e ( G o a l) + M e t h o d + V u l n e r a b i l i t y

A tta c k s

A tta c k e rs ha ve m o tiv e s o r g o a ls such as d is r u p tin g

G o a ls

b u s in e s s c o n tin u ity , in fo r m a tio n t h e ft, d a ta
m a n ip u la tio n s , o r ta k in g re ve n g e

A m o tiv e o rig in a te s o u t o f th e n o tio n th a t th e ta r g e t
s y s te m s to re s o r p ro c e s s e s s o m e th in g v a lu a b le an d th is

M o tiv e s

lead s to th r e a t o f an a tta c k o n th e system


A tta c k e rs t r y v a rio u s to o ls , a tta c k m e th o d s , a n d

/

te c h n iq u e s to e x p lo it v u ln e r a b ilitie s in a c o m p u te r

'

/

O b je c tiv e s

s ystem o r s e c u rity p o lic y a n d c o n tro ls to a c h ie v e t h e ir
m o tiv e s

Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M
— -E l

S

o

t i v e s ,

e c u r it y

G
A


o a ls ,

a n d

O

b je c t iv e s

o

f I n

f o

r m

a

t i o

n

t t a c k s

A tta c k e r s g e n e r a lly h a v e m o tiv e s o r g o a ls o r o b je c tiv e s b e h in d p e r f o r m in g in fo r m a t io n s e c u rity
a tta c k s .

It


m ay

be

to

d is ru p t

th e

b u s in e s s

c o n tin u ity

of

th e

ta rg e t

o rg a n iz a tio n ,

to

s te a l

v a lu a b le in f o r m a t io n , f o r th e s a k e o f c u r io s ity , o r e v e n t o ta k e r e v e n g e o n t a r g e t o rg a n iz a tio n .
T h e r e f o r e , th e s e m o tiv e s o r g o a ls d e p e n d o n t h e a tta c k e r 's s ta te o f m in d , f o r w h a t re a s o n h e o r
s h e is c a r r y i n g o u t s u c h a n a c t i v i t y . O n c e , t h e a t t a c k e r d e t e r m i n e s


h is /h e r g o a l, h e o r s h e ca n

a c c o m p l i s h t h e g o a l b y a d o p t i n g v a r i o u s t e c h n i q u e s t o e x p l o i t v u l n e r a b i l i t i e s in a n i n f o r m a t i o n
s y s te m o r s e c u rity p o lic y a n d c o n tro ls .

Module 01 Page 21

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

In f o r m a t io n S e c u r ity T h r e a ts

0

0

©

0

0

CEH


0

0

N a tu ra l

P h y s ic a l

H um an

T h re a ts

S e c u rity T h re a ts

T h re a ts

©

N a tu ra l dis a s te rs

Loss o r d a m a g e o f

©

H ackers

©

In sid e rs


Q

S ocial e n g in e e rin g

s y ste m re so u rce s
Q
Q
Q

F lo o d s
©

P hysical in tru s io n

©

S a b o ta g e , e s p io n a g e

E a rth q u a k e s
H u rric a n e s

©

a n d e rro rs

Lack o f k n o w le d g e
a n d a w a re n e s s

0


0

0

0

0 ,

0

I
Copyright © by E C - G t n c i. All Rights Reserved. Reproduction is Strictly Prohibited.

I n

f o

r m

a

t i o

n

S

e c u r it y

T


h r e a t s

I n f o r m a t io n s e c u r ity t h r e a t s a re b r o a d ly c la s s ifie d in t o t h r e e c a te g o r ie s , as fo llo w s :

N

a tu r a l T h r e a ts

N a tu ra l th re a ts
an y n a tu re -c re a te d

in c lu d e

n a tu r a l d is a s te rs s u c h as e a rth q u a k e s , h u rric a n e s , flo o d s , o r

d is a s te r th a t c a n n o t b e s to p .

In fo rm a tio n

dam age

o r lo s t d u e t o

n a tu ra l

t h r e a t s c a n n o t b e p r e v e n t e d a s n o o n e k n o w s in a d v a n c e t h a t t h e s e t y p e s o f t h r e a t s w i l l o c c u r .
H o w e ve r, yo u

can


im p le m e n t a fe w

s a fe g u a r d s a g a in s t n a tu r a l d is a s te rs b y a d o p t in g d is a s te r

r e c o v e r y p la n s a n d c o n t in g e n c y p la n s .

P h y s ic a l

S e c u r it y

T h r e a ts

P h y s ic a l t h r e a t s m a y i n c lu d e lo s s o r d a m a g e o f s y s t e m
th e ft,

and

p h y s ic a l

im p a c t.

P h y s ic a l

im p a c t o n

d a m a g e , e ith e r in te n tio n a lly o r u n in te n tio n a lly .

reso u rce s


can

re s o u rc e s t h r o u g h fire , w a te r ,
be

due

to

a c o llis io n

o r o th e r

S o m e t im e s , p o w e r m a y a ls o d a m a g e h a r d w a r e

use d to s to re in fo rm a tio n .

H u m

a n

Hum an

Module 01 Page 22

T h r e a ts

th re a ts

in c lu d e th re a ts o f a tta c k s p e r fo r m e d


by b o th

in s id e rs a n d

o u ts id e rs .

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

In s id e r a tta c k s
a tta c k s

re fe r to

a tta c k e rs
p o s tu re

re fe r to

can
o f th e

a tta c k s

be


th e

Exam 312-50 Certified Ethical Hacker

a tta c k s

p e rfo rm e d

p e rfo rm e d

by

b ig g e s t t h r e a t

in fo rm a tio n

to

by

d is g ru n tle d

m a lic io u s

p e o p le

in fo rm a tio n

s y s te m , w h ile


or

m a lic io u s

n o t w ith in

s y s te m

th e

as t h e y

o u ts id e r a tta c k e rs a p p ly

e m p lo y e e s .

O u ts id e r

o rg a n iz a tio n .

m ay

know

th e

In s id e r
s e c u rity


m a n y tr ic k s s u c h as s o c ia l

e n g in e e r in g t o le a rn t h e s e c u rity p o s tu r e o f t h e in f o r m a t io n s y s te m .

Module 01 Page 23

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

I n

4r

f o

r m

a

t i o

Exam 312-50 Certified Ethical Hacker

n

S


e c u r it y

T

h r e a t s

( C

o n t ’ d )

K ir
H u m a n t h r e a t s c a n b e f u r t h e r c la s s ifie d in t o t h r e e t y p e s , as f o llo w s :

N

‫״‬
by

e tw

o r k

T h r e a ts

A n e t w o r k is d e f i n e d
c o m m u n ic a tio n

fro m


c h a n n e ls

to

as t h e
s h a re

c o lle c tio n
reso u rce s

o f c o m p u te rs a nd o th e r h a rd w a re
and

in fo rm a tio n .

As th e

c o n n e c te d

in fo rm a tio n

tra v e ls

o n e c o m p u te r to th e o th e r th r o u g h th e c o m m u n ic a tio n c h a n n e l, a m a lic io u s p e rs o n m a y

b re a k in to th e

c o m m u n ic a tio n

c h a n n e l a n d s te a l th e


in fo rm a tio n

tra v e lin g o v e r th e

n e tw o rk .

T h e a tta c k e r ca n im p o s e v a rio u s th re a ts o n a ta r g e t n e tw o r k :
0

In fo rm a tio n g a th e rin g

0

S n iffin g a n d e a v e s d r o p p in g

0

S p o o fin g

0

S e s s io n h ija c k in g a n d m a n - i n - t h e - m i d d le a tta c k s

0

SQL in je c tio n

0


A R P P o is o n in g

0

P a s s w o rd -b a s e d a tta c k s

Module 01 Page 24

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.


Ethical Hacking and Countermeasures
Introduction to Ethical Hacking

Exam 312-50 Certified Ethical Hacker

©

D e n ia l o f s e rv ic e a tta c k

©

C o m p ro m is e d -k e y a tta c k

vL

H o s t T h r e a ts

H o s t t h r e a t s a re d ir e c te d a t a p a r tic u la r s y s te m o n w h ic h v a lu a b le in f o r m a t io n re s id e s .

A tta c k e rs

try

to

b re a ch

th e

s e c u rity

o f th e

in fo rm a tio n

s y s te m

re so u rce . T he

fo llo w in g

a re

p o s s ib le th r e a t s t o t h e h o s t:
0

M a lw a re a tta c k s

0


T a rg e t F o o tp rin tin g

0

P a s s w o rd a tta c k s

0

D e n ia l o f s e rv ic e a tta c k s

0

A rb itra ry c o d e e x e c u tio n

©

U n a u th o riz e d access

©

P riv ile g e e s c a la tio n

0

B a ck d o o r A tta c k s

©

P h y s ic a l s e c u r it y t h r e a t s


A

p p lic a t io n

If th e
p a rtic u la r
a tta c k s .

p ro p e r

a p p lic a tio n ,

A tta c k e rs

ta k e

T h r e a ts

s e c u rity
th e

m e a su re s

a p p lic a tio n

a d v a n ta g e

of


a re

m ig h t

be

not

c o n s id e re d

v u ln e ra b le

v u ln e ra b ilitie s

to

p re se n t

d u rin g
d iffe re n t

in

th e

d e v e lo p m e n t
ty p e s

of


th e

o f a p p lic a tio n

a p p lic a tio n

to

s te a l

or

d a m a g e t h e in f o r m a t io n . T h e f o llo w in g a re p o s s ib le th r e a t s t o t h e a p p lic a tio n :
©

D a ta /In p u t v a lid a tio n

©

A u th e n tic a tio n a n d A u th o riz a tio n a tta c k s

©

C o n fig u ra tio n m a n a g e m e n t

©

In f o r m a t io n d is c lo s u re

©


S e s s io n m a n a g e m e n t is s u e s

©

B u f f e r o v e r f l o w is s u e s

0

C ry p to g ra p h y a tta c k s

0

P a ra m e te r m a n ip u la tio n

0

Im p r o p e r e r r o r h a n d lin g a n d e x c e p tio n m a n a g e m e n t

0

A u d it in g a n d lo g g in g is s u e s

Module 01 Page 25

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.



×