Introduction to
E th ical H ack in g
Module 01
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
In t r o d u c t io n to E t h ic a l
H a c k in g
M o d u le
0 1
E n g i n e e r e d b y H a c k e r s . P r e s e n t e d b y P r o f e s s io n a ls .
E
t h ic a l
H
M o d u le
a c k in g
0 1 :
a n d
o u n t e r m
In t r o d u c tio n
E x a m
Module 01 Page 2
C
to
e a s u r e s
E th ic a l
v 8
H a c k in g
3 1 2 -5 0
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
CEH
S e c u r ity N e w s
-
.
.
■ ■.
_
* י
ז י
■
• Iן
? י ! ■ ; ■־ ■ל־
■
H o m
e
| A b o u t
U s
P o r t f o lio
\
| C o n t a c t
U s
■ יי
| S e r v ic e
Oct 17 2012, 0:45am 1ST
Z e ro -d a y A tta c k s a r e M e an er, m o re
R a m p a n t th a n w e e v e r th o u g h t
C om puter attacks th a t ta rg e t undisclosed v u ln e ra b ilitie s are m ore com m on and last longer than
many security researchers previously th o u g h t. The fin d in g comes fro m a new study th a t tracked
the num ber and duration o f so-called zero-day exploits over three years.
The typical zero-day attack, by d e fin itio n , e xp lo its s o ftw a re fla w s before th e y are publicly
disclosed. It lasts on average 312 days, w ith some lasting as long as tw o and a half years,
according to th e study by researchers fro m antivirus p rovider Symantec. O f the 18 zero-day
attacks the researchers found betw een 2008 and 2 0 1 1 ,1 1 o f the m previously w e n t undetected.
Recent revelations th a t th e S tuxnet m alw are th a t sabotaged Iranian nuclear facilities relied on
five zero days already underscored th e th re a t posed by such attacks. But th e researchers said
th e ir findings suggest th e menace may be even greater.
h ttp : //a r s te c h n ic a .c o m
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
N
e w
s
Z e r o - d a y
e v e r
A tta c k s
a r e
M
e a n e r ,
m
o r e
R a m
p a n t th a n
w e
th o u g h t
S o u rce : h ttp ://a rs te c h n ic a .c o m
C o m p u te r
th a n
a tta c k s
th a t ta rg e t
u n d is c lo s e d
v u ln e ra b ilitie s
a re
m o re
com m on
m a n y s e c u rity re s e a rc h e rs p re v io u s ly th o u g h t. T h e fin d in g c o m e s f r o m
and
la s t
a new
lo n g e r
s tu d y th a t
tr a c k e d th e n u m b e r a n d d u r a tio n o f s o -c a lle d z e ro - d a y e x p lo its o v e r t h r e e y e a rs .
The
ty p ic a l
d is c lo s e d .
ze ro -d a y
It la s ts
a c c o rd in g to
th e
on
a tta c k ,
by
a ve ra g e
s tu d y
by
d e fin itio n ,
312
days,
e x p lo its
w ith
re se a rch e rs fro m
s o ftw a re
som e
la s tin g
a n tiv iru s
as
fla w s
b e fo re
th e y
lo n g
as t w o
and
p ro v id e r S y m a n te c .
a tta c k s th e re s e a rc h e rs fo u n d b e tw e e n 2 0 0 8 a n d 2 0 1 1 , 11 o f th e m
O f th e
a re
p u b lic ly
a h a lf ye a rs ,
18 z e ro -d a y
p re v io u s ly w e n t u n d e te c te d .
R e c e n t r e v e la tio n s t h a t t h e S t u x n e t m a lw a r e t h a t s a b o ta g e d Ira n ia n n u c le a r fa c ilitie s re lie d o n
fiv e z e ro d a y s a lre a d y u n d e r s c o r e d th e t h r e a t p o s e d
b y su ch a tta c k s . B u t th e
r e s e a r c h e r s s a id
t h e ir fin d in g s s u g g e s t th e m e n a c e m a y b e e v e n g re a te r.
"Z e ro -d a y
a tta c k s
a re
d iffic u lt
to
p re v e n t
because
th e y
e x p lo it
unknow n
v u ln e ra b ilitie s ,
fo r
w h ic h th e r e a re n o p a tc h e s a n d n o a n tiv iru s o r in t r u s io n - d e te c tio n s ig n a tu r e s ," th e y w r o te . "It
seem s
th a t,
Module 01 Page 3
as
lo n g
as
s o ftw a re
w ill
have
bugs
and
th e
d e v e lo p m e n t
of
e x p lo its
fo r
new
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
v u ln e ra b ilitie s w ill b e a p ro fita b le
a c tiv ity , w e w ill b e e x p o s e d
to
z e r o - d a y a t t a c k s . In f a c t , 6 0
p e r c e n t o f t h e z e r o - d a y v u l n e r a b i l i t i e s w e i d e n t i f y in o u r s t u d y w e r e
s u g g e s ts th a t th e r e
a re
m any
m o re
z e ro -d a y a tta c k s th a n
not known
b e fo re , w h ic h
p re v io u s ly t h o u g h t — p e rh a p s
m o re
t h a n t w ic e as m a n y . "
R e s e a rc h e rs
L e y la
B ilg e
and
Tudor
e x e c u ta b le file s c o lle c te d f r o m
M a rch
2012. T hre e
d is c lo s e d
in
2009,
o f th e
ze ro -d a y
s ix w e r e
D u m itra s
c o n d u c te d
e x p lo its t h e y
d is c lo s e d
in
2010,
fo u n d
and
tw o
r e p u ta tio n d a ta th e re s e a rc h e rs re lie d o n p r e v e n te d t h e m
a tta c k o n
m a n y v e rs io n s o f M ic r o s o ft W in d o w s , w h ic h
z e ro d a y u n til n o w , h a d th e
a
s y s te m a tic
s tu d y
11 m illio n c o m p u te rs a ro u n d th e w o rld fro m
th a t
a n a ly z e d
F e b ru a ry 2 0 0 8 to
w e re
d is c lo s e d
in
2008,
seven
w e re
d is c lo s e d
in
2011.
(The
fro m
w e re
b in a ry
i d e n t i f y i n g a t t a c k s in 2 0 1 2 . ) A n
a p p e a rs to
s h o rte s t d u ra tio n : ju s t 19 days. A n
have gone
u n d e te c te d
as a
e x p lo it o f a s e p a ra te s e c u rity
b u g in t h e W i n d o w s s h e ll h a d t h e l o n g e s t d u r a t i o n : 3 0 m o n t h s .
Of
th e
18
a tta c k s
m o n ito re d .
E ig h t
s tu d ie d ,
o f th e
c o n v e n tio n a l w is d o m
15
ta rg e te d
e x p lo its
w e re
102
or
d ire c te d
fe w e r
of
at th re e
or
th e
11
fe w e r
m illio n
h o s ts .
h o s ts
The
th a t
d a ta
w e re
c o n firm s
th a t z e ro -d a y a tta c k s a re ty p ic a lly re s e rv e d fo r h ig h -v a lu e ta rg e ts . O f th e
r e m a in in g t h r e e a tta c k s , o n e w a s e x p lo ite d b y S tu x n e t a n d a n o th e r w a s e x p lo ite d b y C o n fic k e r,
th e v iru le n t w o r m
d is c o v e re d
in 2 0 0 8 t h a t h a s i n f e c t e d
m illio n s o f c o m p u te r s
c o n t in u e s t o d o so ). T h e S t u x n e t a n d C o n fic k e r e x p lo it t a r g e t e d
re s p e c tiv e ly . T h e
re s u lts , t h e
r e s e a r c h e r s s a id , d e m o n s t r a t e d
1 .5 m illio n
th e
(and re p o rte d ly
a n d 4 5 0 ,0 0 0 h o s ts
d iv id e n d s
re tu rn e d
b y z e ro -
d a y e x p lo its , w h ic h c a n c o m m a n d p ric e s as h ig h as $ 2 5 0 ,0 0 0 .
"F or
e x a m p le ,
a p p ro x im a te ly
w ro te .
" T h is
C o n fic k e r
3 7 0 ,0 0 0
e x a m p le
e x p lo itin g
th e
v u ln e ra b ility
C V E -2 0 0 8 -4 2 5 0
m a c h in e s w it h o u t b e in g d e te c te d
illu s tra te s
th e
e ffe c tiv e n e s s
o ver m o re
o f z e ro -d a y
m anaged
th a n
tw o
v u ln e ra b ilitie s
to
in fe c t
m o n th s ," th e y
fo r
c o n d u c tin g
s te a lth c y b e r-a tta c k s ."
The
re se a rch e rs
c a u tio n e d
l im it a t io n s , c a u s in g it t o
T h re a ts
once
a tta c k s
th e ir
m e th o d
of
c o lle c tin g
m is s 2 4 z e r o - d a y a tta c k s t r a c k e d
R e p o rt o v e r th e
z e ro -d a y
th a t
tim e
p e rio d
becam e
s tu d ie d .
p u b lic
file s
b y S y m a n te c 's o w n
S u rp ris in g ly , th e
k n o w le d g e — b y
n u m b e r o f a t t a c k v a r ia n t s a ls o ro s e , w i t h
e x e c u ta b le
m a rg in s
had
s ig n ific a n t
In t e r n e t S e c u rity
num ber
o f a tta c k s
o f tw o -
to
o n ly
g re w
1 0 0 ,0 0 0 -fo ld .
The
183 to 8 5 ,0 0 0 m o re v a ria n ts d e te c te d ea ch day. O n e
p o s s i b l e c a u s e o f t h e s u r g e i n n e w f i l e s , t h e r e s e a r c h e r s s a i d , is t h a t t h e e x p l o i t s m a y h a v e b e e n
re p a c k a g e d v e rs io n s o f th e s a m e a tta c k .
" H o w e v e r , i t is d o u b t f u l t h a t r e p a c k i n g a l o n e c a n a c c o u n t f o r a n i n c r e a s e b y u p t o f i v e o r d e r s o f
m a g n i t u d e , " t h e y w r o t e . " M o r e l i k e l y , t h i s i n c r e a s e is t h e r e s u l t o f t h e e x t e n s i v e r e - u s e o f f i e l d p r o v e n e x p l o i t s in o t h e r m a l w a r e . "
Copyrights: ©2012 Conde Nast
Author: Dan Goodin
h t t p : / / a r s t e c h n i c a . c o m / s e c u r i t v / 2012 /
10/ z e r o - d a v - a t t a c k s - a r e - m e a r 1e r - a r 1d - m o r e - p l e n t i f u l -
th a n -th o u g h t/
Module 01 Page 4
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
CEH
M o d u le O b je c tiv e s
J
D a ta B re a c h In v e s tig a tio n s R e p o rt
J
H a c k in g P hases
J
E s s e n tia l T e rm in o lo g y
J
T yp e s o f A tta c k s o n a S yste m
J
E le m e n ts o f In f o r m a tio n S e c u rity
J
W h y E th ic a l H a c k in g Is N e c e s s a ry
J
T o p In fo r m a tio n S e c u rity A tta c k
.
J
S kills o f an E th ica l H a c k e r
r
j
In c id e n t M a n a g e m e n t P rocess
׳j
T yp e s o f S e c u rity P o licie s
V e c to rs
J
In f o r m a tio n S e c u rity T h re a ts
J
H a c k in g vs. E th ic a l H a c k in g
J
E ffe c ts o f H a c k in g o n B usiness
j
V u ln e r a b ility R esea rch
J
W h o Is a H a c k e r?
j
W h a t Is P e n e tra tio n T e s tin g ?
b
a s
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
M
Sf
o
d u l e
O
b je c t iv e s
—1
I t is i m p o r t a n t t o
b e a r in m i n d t h a t a t t a c k e r s b r e a k i n t o s y s t e m s f o r v a r i o u s r e a s o n s
a n d p u r p o s e s . T h e r e f o r e , i t is i m p o r t a n t t o c o m p r e h e n d h o w m a l i c i o u s h a c k e r s e x p l o i t s y s t e m s
a n d t h e p r o b a b l e r e a s o n s b e h i n d t h e a t t a c k s . A s S u n T z u p u t it in t h e A r t o f W a r , " I f y o u k n o w
y o u r s e l f b u t n o t t h e e n e m y , f o r e v e r y v i c t o r y g a i n e d , y o u w i l l a l s o s u f f e r a d e f e a t . " I t is t h e d u t y
of
s y s te m
a d m in is tra to rs
a g a in s t e x p lo its
and
b y k n o w in g
n e tw o rk
th e
s e c u rity
e n e m y — th e
p ro fe s s io n a ls
m a lic io u s
to
g u a rd
h a cke r(s)— w h o
th e ir
seek to
in fra s tru c tu re
use th e
sam e
in f r a s t r u c t u r e f o r ille g a l a c tiv itie s .
E t h i c a l h a c k i n g is t h e p r o c e s s o f c h e c k i n g a n d t e s t i n g t h e o r g a n i z a t i o n n e t w o r k f o r t h e p o s s i b l e
lo o p h o le s a n d v u ln e ra b ilitie s .
w h ite
h a ts .
They
p e rfo rm
T h e in d iv id u a ls o r e x p e rts w h o p e r fo r m
h a c k in g
in
e th ic a l
w ays,
w ith o u t
e th ic a l h a c k in g a re c a lle d
c a u s in g
any
dam age
to
th e
c o m p u t e r s y s te m , th e r e b y in c re a s in g th e s e c u rity p e r im e te r o f a n o rg a n iz a tio n .
Module 01 Page 5
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 312-50 Certified Ethical Hacker
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
T h is m o d u le c o v e rs :
0
H a c k in g P h a se s
E s s e n tia l T e r m in o l o g y
0
T y p e s o f A tta c k s o n a S y s te m
0
E le m e n ts o f I n fo r m a tio n S e c u rity
0
W h y E t h i c a l H a c k i n g Is N e c e s s a r y
0
T o p I n fo r m a tio n S e c u rity A tta c k
6
S k ills o f a n E th ic a l H a c k e r
0
In c id e n t M a n a g e m e n t P ro ce ss
0
T y p e s o f S e c u r it y P o lic ie s
0
V u ln e r a b ility R e s e a rch
0
W h a t Is P e n e t r a t i o n T e s t i n g ?
0
D a ta B re a c h In v e s tig a tio n s R e p o rt
0
V e c to rs
0
In fo r m a tio n S e c u rity T h re a ts
0
H a c k in g vs. E th ic a l H a c k in g
0
E ffe c ts o f H a c k in g o n B u s in e s s
0
W h o Is a H a c k e r ?
Module 01 Page 6
Ethical Hacking and Countermeasures Copyright © by EC-C0UI1Cil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
H a c k in g
P hases
T ypes of
A tta c k s
In fo rm a tio n S e c u r ity
C o n tro ls
Copyright © by EC-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
M
o
d u l e
F
lo w
'־
In fo rm a tio n
in fo rm a tio n
and
d is ru p tio n , a n d
s e c u rity
re fe rs
in fo rm a tio n
d e s tru c tio n .
a
g re a t
th re a t.
In
an
p ro te c tin g
s y s te m s
fro m
or
s a fe g u a rd in g
u n a u th o riz e d
access,
F o r m o s t o rg a n iz a tio n s , in fo r m a tio n
s e c u re d . If s e n s itiv e in f o r m a t io n
fa c e
to
fa lls in t o w r o n g
a tte m p t
to
is t h e
hands, th e n th e
u n d e rs ta n d
how
to
any
k in d
of
d is c lo s u re ,
s e n s itiv e
a lte ra tio n ,
c ritic a l re s o u rc e t o
re s p e c tiv e o rg a n iz a tio n
s e cu re
such
c ritic a l
be
m ay
in fo rm a tio n
re s o u rc e s , fir s t w e w ill lo o k a t an o v e r v ie w o f in f o r m a t io n s e c u rity .
i-g !
In f o r m a t io n S e c u rity O v e r v ie w
H a c k in g P h a se s
f c —־
s '
In fo r m a tio n S e c u rity T h re a ts
1— י
T yp e s o f A tta c k s
a n d A tta c k V e c to rs
4 k - !״
T h is s e c t io n
H a c k in g C o n c e p ts
c o v e rs e le m e n ts
ן
o f in fo rm a tio n
r^ U
In fo r m a tio n S e c u rity C o n tro ls
s e c u rity , th e
s tre n g th
o f th e
c o m p o n e n t tria n g le
(s e c u rity , fu n c tio n a lity , a n d u s a b ility ), a n d e s s e n tia l te r m in o lo g y .
Module 01 Page 7
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
I n
t e
r n
Exam 312-50 Certified Ethical Hacker
e
t
C
r i m
e
C
u
r r e
n
t
R
e p o r t :
I C
CEH
3
(•rtifwd
itk itjl
I n t e r n e t C r im e C o m p la in t C e n t e r (IC 3 )
20 0 5
20 0 6
2008
20 07
2009
___________
2010
2011
htp://www.ic3.gov
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
I n
t e
r n
e
t
C
r i m
e
C
u r r e n t
R
e p o r t :
I C
3
S o u rce : h ttp ://w w w .ic 3 .g o v
T h e f o l l o w i n g is t h e c r i m e r e p o r t d a t a f r o m
p a rtn e rs h ip a m o n g th e
F ederal B u re a u
C e n te r (N W 3 C ), a n d th e
B u re a u
I C 3 ; t h e I n t e r n e t C r i m e C o m p l a i n t C e n t e r ( I C 3 ) is a
o f In v e s tig a tio n
o f J u s tic e A s s is ta n c e
c r im e c o m p la in t s a re in c r e a s in g d a ily . F ro m
th e re
w e re
in c re a s e d
to
2 3 1 ,4 9 3
3 3 6 ,6 5 5 .
c r im e
W hen
c o m p la in ts ,
c o m p a re d
N a tio n a l W h ite
(B JA ). A c c o r d in g t o
C o lla r C rim e
IC 3 , o n l i n e
In te rn e t
t h e g r a p h , y o u c a n o b s e r v e t h a t in t h e y e a r 2 0 0 5 ,
w h e re a s
to
(F B I), t h e
2009,
in
th e
year
In te r n e t c rim e
2009,
c o m p la in ts
c o m p la in ts
in t h e
d ra s tic a lly
year
2011
d e c re a s e d to s o m e e x te n t.
Module 01 Page 8
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
3 5 0 ,0 0 0
336,655
303,809
3 0 0 .0 0 0
2 5 0 .0 0 0
275,284
231,493
207,492
2 0 0 .0 0 0
1 5 0 .0 0 0
1 0 0 .0 0 0
5 0 ,0 0 0
0
Module 01 Page 9
______ ״
206,884
314,246
r d
C o m p la in ts
r e c e iv e d
by I C 3
Yearly Comparison of Complaints Received via the IC3 Website
I n t e r n e t C r im e C o m p la in t C e n te r (IC 3 )
Ethical Hacking and Countermeasures Copyright © by EC-C0linCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
D a ta B re a c h In v e s tig a tio n s R e p o rt
Types of hacking by
CEH
and percent of records
r
28% / 97%
H a c k in g
P h y s ic a l
E n v ir o n m e n ta l
I
0% I 0%
P e rc e n t o f B re a c h e s a n d P e rc e n t o f R e c o rd s
h ttp : //w w w .v e r iz o n b u s in e s s .c o m
Copyright © by IC-CM ICil. All Rights Reserved. Reproduction Is Strictly Prohibited.
D
n
—
The
d a ta
a t a
B
r e a c h
I n v e
s t i g a t i o
n s
R
e p o r t
S o u rce : h ttp ://w w w .v e riz o n b u s in e s s .c o m
b re a c h
in v e s tig a tio n s
re p o rt fro m
V e riz o n
B u s in e s s
sh o w s th e
ty p e s
o f h a c k in g
by
p e r c e n t o f b r e a c h e s a n d p e r c e n t o f r e c o r d s . F r o m t h e r e p o r t , i t is c l e a r t h a t m o s t o f t h e s e c u r i t y
b r e a c h e s h a p p e n i n g t o d a y a r e b e c a u s e o f h a c k i n g . T h e r e f o r e , in o r d e r t o p r o t e c t y o u r s e l f f r o m
d a ta o r s e c u r it y b re a c h e s , y o u s h o u ld te s t y o u r n e t w o r k s e c u rity a g a in s t h a c k in g .
Module 01 Page 10
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
M a lw a r e
28% / 97%
H a c k in g
I 58 % / 99%
S o c ia l
22% I 38%
M is u s e
......... ..........
7% / <1%
P h y s ic a l
E rro r
E n v ir o n m e n ta l
17%
I
<1 %
tmrnmitmmt
H
7 % / <1%
I I
0% / 0%
P e rc e n t o f B re a c h e s a n d P e rc e n t o f R e c o rd s
FIGURE 1.1: D ata B rea ch In v e s tig a tio n R e p o rt
Module 01 Page 11
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
E s s e n tia l T e r m in o lo g y
H a c k V a lu e
CEH
T a r g e t o f E v a lu a t io n
It is the notion among hackers that
something is worth doing or is
interesting
An IT system, product, or component
that is identified/subjected to a
required security evaluation
E x p lo it
Z e ro -D a y A tta c k
An attack that exploits computer
application vulnerabilities before the
software developer releases a patch for
the vulnerability
A defined way to breach the
security of an IT system through
vulnerability
D a is y C h a in in g
V u ln e r a b ility
Existence of a weakness, design, or
implementation error that can lead to
an unexpected and undesirable event
compromising the security of the system
Hackers who get away with database
theft usually complete their task, then
backtrack to cover their tracks by
destroying logs, etc.
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
E
s s e n t ia l
x ן
T
H a c k
Hack
e
r m
i n
o
l o
g
y
V a lu e
v a lu e
in te re s tin g . H a c k e rs
is
th e
n o tio n
am ong
h a cke rs
m ig h t fe e l th a t b re a k in g d o w n
th a t
th e
s o m e th in g
is
w o rth
d o in g
or
is
t o u g h e s t n e t w o r k s e c u r ity m ig h t g iv e
t h e m g r e a t s a t i s f a c t i o n , a n d t h a t i t is s o m e t h i n g t h e y a c c o m p l i s h e d t h a t n o t e v e r y o n e c o u l d d o .
E x p lo it
An
e x p lo it
is
v u ln e ra b ility . T h e te r m
n e tw o rk . A n
u n a n tic ip a te d
a
d e fin e d
way
to
b re a c h
th e
s e c u rity
of
an
e x p l o i t is u s e d w h e n a n y k i n d o f a t t a c k h a s t a k e n
e x p lo it can
a ls o
b e h a v io r to
be d e fin e d
occur on
as m a lic io u s s o f t w a r e
le g itim a te
s o ftw a re
IT
s y s te m
th ro u g h
p la c e o n a s y s te m
o r c o m m a n d s th a t can
or h a rd w a re
or
cause
b y ta k in g a d v a n ta g e
of
th e v u ln e ra b ilitie s .
V
u ln e r a b ilit y
V u l n e r a b i l i t y is a w e a k n e s s i n d e s i g n o r a n i m p l e m e n t a t i o n e r r o r t h a t c a n l e a d t o a n
u n e x p e c t e d a n d u n d e s i r a b l e e v e n t c o m p r o m i s i n g t h e s e c u r i t y o f t h e s y s t e m . In s i m p l e w o r d s , a
v u ln e ra b ility
is l o o p
h o le ,
lim ita tio n ,
o r w e a kn e ss th a t
becom es
a so u rce
fo r an
a tta c k e r to
e n te r in to th e s y s te m b y b y p a s s in g v a rio u s u s e r a u th e n tic a tio n s .
Module 01 Page 12
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
T a r g e t
3
Exam 312-50 Certified Ethical Hacker
o f E v a lu a t io n
/
A ta rg e t
s u b je c te d
to
a
o f e v a lu a tio n
re q u ire d
is a n
s e c u rity
IT s y s t e m ,
e v a lu a tio n .
p ro d u c t,
T h is
k in d
o r c o m p o n e n t th a t
of
e v a lu a tio n
h e lp s
is i d e n t i f i e d
th e
/
e v a lu a to r
u n d e rs ta n d th e fu n c tio n in g , te c h n o lo g y , a n d v u ln e ra b ilitie s o f a p a rtic u la r s y s te m o r p ro d u c t.
Z e r o - d a y
In
a
A tta c k
z e ro -d a y
a tta c k ,
th e
a tta c k e r
e x p lo its
th e
v u ln e ra b ilitie s
in
th e
c o m p u te r
a p p lic a tio n b e fo r e th e s o ftw a r e d e v e lo p e r re le a s e s a p a tc h f o r t h e m .
D
a is y
A tta c k e rs
b a c k tra c k
to
s y s te m s a n d
C
h a in in g
w ho
get away
c o v e r th e ir tra c k s
use th e m
by
d a ta b a s e
d e s tro y in g
f o r m a lic io u s a c tiv itie s .
th e y use o th e rs ' s y s te m s to p e rfo r m
Module 01 Page 13
w ith
th e ft
lo g s ,
u s u a lly
e tc . T h e
c o m p le te
a tta c k e rs
It b e c o m e s d i f f i c u l t t o
th e ir ta s k
g a in
c o n tro l
id e n tify th e
and
th e n
o f o th e r
a t t a c k e r as
ille g a l a c tiv itie s .
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
E le m e n t s o f I n f o r m a t i o n S e c u r it y
CEH
A s ta te o f w e ll- b e in g o f in fo r m a t io n a n d in fr a s tr u c tu r e in w h ic h th e p o s s ib ility o f t h e f t ,
t a m p e r in g , a n d d is r u p t io n o f in f o r m a t io n a n d s e rv ic e s is k e p t lo w o r to le r a b le
Assurance that the
information is accessible
only to those authorized
to have access
Assurance that the systems responsible
for delivering, storing, and processing
information are accessible when
required by the authorized users
In te g rity
A v a ila b ility
The trustworthiness of data
or resources in terms of
preventing improper and
unauthorized changes
Guarantee that the sender of a message
cannot later deny having sent the
message and that the recipient cannot
deny having received the message
9 A u th e n tic ity
Authenticity refers to the
characteristic of a communication,
document or any data that ensures
the quality o f being genuine
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
,jp ►
E
׳'־'*"■״
le m
In fo rm a tio n
in fra s tru c tu re
s e rv ic e s
e n t s
is
lo w
f I n
s e c u rity
in w h i c h
kept
o
th e
or
f o
r m
a
is
d e fin e d
t i o
n
S
as:
"A
e c u r it y
s ta te
of
w e ll-b e in g
p o s s ib ility o f th e ft, ta m p e r in g , a n d
to le ra b le ."
It
re lie s
on
th e
fiv e
m a jo r
of
d is ru p tio n
e le m e n ts
in fo rm a tio n
and
o f in fo rm a tio n
o f:
and
c o n fid e n tia lity ,
in te g rity , a v a ila b ility , a u th e n tic ity , a n d n o n -r e p u d ia tio n .
-״
C
o n f id e n t ia lit y
C o n fid e n tia lity
a u th o riz e d to
is
th e
a ssu ra n ce
th a t
th e
in fo rm a tio n
is
a c c e s s ib le
h a ve access. C o n fid e n tia lity b re a c h e s m a y o c c u r d u e to
o n ly
im p ro p e r d a ta
to
th o s e
h a n d lin g
o r a h a c k in g a t t e m p t .
f r
I n t e g r it y
zL ----------
I n t e g r i t y is t h e t r u s t w o r t h i n e s s o f d a t a o r r e s o u r c e s i n t e r m s o f p r e v e n t i n g i m p r o p e r
a n d u n a u t h o r iz e d c h a n g e s , t h e a s s u ra n c e t h a t in f o r m a t io n ca n b e re lie d u p o n t o b e s u ffic ie n tly
a c c u r a t e f o r its p u r p o s e .
A
■ "f?
v a ila b ilit y
■
A v a i l a b i l i t y is t h e
Module 01 Page 14
a ssu ra n ce th a t th e
s y s te m s re s p o n s ib le f o r d e liv e rin g , s to rin g , a n d
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
p ro c e s s in g in f o r m a t io n a re a c c e s s ib le w h e n r e q u ir e d b y a u th o r iz e d u s e rs .
A
u t h e n t ic it y
A u th e n tic ity
re fe rs to th e
c h a ra c te ris tic o f a c o m m u n ic a tio n , d o c u m e n t, o r a n y d a ta
t h a t e n s u re s th e q u a lit y o f b e in g g e n u in e o r n o t c o r r u p te d f r o m
th e o rig in a l. T h e m a jo r ro le s o f
a u t h e n t i c a t i o n i n c l u d e c o n f i r m i n g t h a t t h e u s e r is w h o h e o r s h e c l a i m s t o
be a n d e n s u rin g th e
m e s s a g e is a u t h e n t i c a n d n o t a l t e r e d o r f o r g e d . B i o m e t r i c s , s m a r t c a r d s , a n d d i g i t a l c e r t i f i c a t e s
a re u se d t o e n s u re a u th e n tic ity o f d a ta , tra n s a c tio n s , c o m m u n ic a tio n s , o r d o c u m e n ts .
p g jj
N
o n - r e p u d ia t io n
N o n -re p u d ia tio n
re fe rs
to
th e
a b ility
to
e n s u re
th a t
a
p a rty
to
a
c o n tra c t
or
a
c o m m u n ic a tio n c a n n o t d e n y th e a u t h e n t ic it y o f t h e ir s ig n a tu r e o n a d o c u m e n t o r th e s e n d in g
o f a m e s s a g e t h a t t h e y o r i g i n a t e d . I t is a w a y t o g u a r a n t e e t h a t t h e s e n d e r o f a m e s s a g e c a n n o t
la te r d e n y
h a v in g
se n t th e
m essage
and
th a t th e
re c ip ie n t c a n n o t d e n y
h a v in g
re c e iv e d
th e
m essage.
Module 01 Page 15
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
T h e S e c u r ity , F u n c t io n a lit y , a n d
CEH
U s a b ilit y T r i a n g l e
|
j
:
M o vin g th e ball to w a rd s
se cu rity means less
fu n c tio n a lity and u sa b ility
|
F u n cc t i o n a l i t y
(F e a tu re s)
»
j
S e c u rity
( R e s tr ic tio n s )
W
.is
*
U s a b ility
(G U I)
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
T h e
S
e c u r it y ,
F
u
n
c t i o
n
a
l i t y ,
a n d
U
s a
b
i l i t y
T
r i a
n
g
l e
T e c h n o l o g y is e v o l v i n g a t a n u n p r e c e d e n t e d r a t e . A s a r e s u l t , n e w p r o d u c t s t h a t r e a c h
th e
m a rk e t te n d
o rig in a lly
sam e
to
be e n g in e e re d f o r e a s y -to -u s e
d e v e lo p e d
pace
o v e rlo o k
as
th e
in c re a s in g
fo r
th e
"h o n e s t"
u s e r's
p ro file .
v u ln e ra b ilitie s
b u ilt-in
rese a rch
and
M o re o v e r,
d u rin g
th e
ra th e r th a n
a c a d e m ic
d u rin g
in te n d e d
d e fa u lt s e c u rity m e c h a n is m s
th is
s e c u re c o m p u tin g . T e c h n o lo g y ,
p u rp o se s,
e v o lu tio n ,
d e p lo y m e n t
has
s y s te m
of
m e a n s u s e rs h a v e to
not
th e
be
e v o lv e d
d e s ig n e rs
s y s te m .
m o re
at th e
o fte n
H o w e v e r,
c o m p e te n t. As
c o m p u t e r s a r e u s e d f o r m o r e a n d m o r e r o u t i n e a c t i v i t i e s , i t is b e c o m i n g i n c r e a s i n g l y d i f f i c u l t f o r
s y s te m
a d m in is tr a to rs
and
o th e r
s y s te m
p ro fe s s io n a ls
to
a llo c a te
reso u rce s
e x c lu s iv e ly
fo r
s e c u r in g s y s te m s . T h is in c lu d e s t im e n e e d e d t o c h e c k lo g file s , d e t e c t v u ln e r a b ilit ie s , a n d a p p ly
s e c u rity u p d a te p a tc h e s .
R o u tin e
a c tiv itie s
consum e
a d m in is tra tio n . T h e re
re g u la r
and
p ro fe s s io n a ls
in n o v a tiv e
to
reso u rce s.
O rig in a lly ,
"hack"
c o m p u te r s y s te m s .
Module 01 Page 16
b a s is .
c o n s ta n tly
T e c h n o lo g y )
to
s y s te m
is l i t t l e t i m e
d e p lo y
T h is
has
m o n ito r
m e a n t to
H a c k in g
a d m in is tra to rs ׳
to
possess
re q u ire d
and
tim e ,
m e a su re s an d
in c re a s e d
d e fe n d
e x tra o rd in a ry
th e
IC T
le a v in g
s e cu re
dem and
fo r
( In fo rm a tio n
c o m p u te r
g re a t p ro fic ie n c y .
le s s
tim e
c o m p u tin g
s k ills t o
fo r
d e d ic a te d
and
a
s e c u rity
C o m m u n ic a tio n
e x te n d
H o w e v e r, to d a y th e re
v ig ila n t
reso u rce s on
th e
a re
lim its
of
a u to m a te d
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
to o ls a n d c o d e s a v a ila b le o n t h e I n t e r n e t t h a t m a k e it p o s s ib le f o r a n y o n e w it h a w ill a n d d e s ire
to hack and succeed.
M e r e c o m p r o m is e o f th e s e c u rity o f a s y s te m d o e s n o t d e n o te success. T h e re a re w e b s ite s th a t
in s is t o n " t a k i n g b a c k t h e n e t " as w e l l a s p e o p l e w h o b e l i e v e t h a t t h e y a r e d o i n g a ll a f a v o r b y
p o s tin g e x p lo it d e ta ils .
T h e s e c a n a c t as a d e t r i m e n t a n d c a n b r i n g d o w n t h e s k ill le v e l r e q u i r e d
t o b e c o m e a s u c c e s s fu l a tta c k e r.
T h e e a s e w it h w h ic h s y s te m v u ln e r a b ilitie s ca n b e e x p lo ite d h a s in c re a s e d w h ile t h e k n o w le d g e
c u rv e re q u ire d to p e rfo r m
su ch e x p lo its has s h o rte n e d . T h e c o n c e p t o f th e e lite /s u p e r a tta c k e r
is a n i l l u s i o n . H o w e v e r , t h e f a s t - e v o l v i n g g e n r e o f " s c r i p t k i d d i e s " is l a r g e l y c o m p r i s e d o f l e s s e r s k ille d
in d iv id u a ls
h a v in g
se co n d -h a n d
k n o w le d g e
im p e d im e n ts c o n trib u tin g to th e g ro w th
o f p e rfo rm in g
o f s e c u rity in fra s tr u c tu r e
e x p lo its .
One
lie s in t h e
o f th e
m a in
u n w illin g n e s s o f
e x p lo ite d o r c o m p r o m is e d v ic tim s t o r e p o r t t h e in c id e n t f o r fe a r o f lo s in g t h e g o o d w ill a n d fa ith
of
th e ir
e m p lo y e e s ,
in fo rm a tio n
a s s e ts
c u s to m e rs ,
in flu e n c in g
th e
p a rtn e rs ,
m a rke t
a n d /o r
has
seen
of
lo s in g
m o re
m a rke t
c o m p a n ie s
sh a re .
The
th in k in g
tre n d
tw ic e
of
b e fo re
r e p o r tin g in c id e n ts to la w e n fo r c e m e n t f o r fe a r o f b a d p re ss a n d n e g a tiv e p u b lic ity .
T h e in c r e a s in g ly n e t w o r k e d e n v ir o n m e n t , w i t h c o m p a n ie s o f t e n h a v in g t h e i r w e b s it e as a s in g le
p o in t
o f c o n ta c t
c o u n te rm e a s u re s
a cro ss g e o g ra p h ic a l
to
p re v e n t
e x p lo its
b o u n d a rie s ,
th a t
can
m akes
re s u lt
in
it c ritic a l f o r
lo s s
of
an
a d m in is tra to rs
im p o r ta n t
to
ta k e
re a so n
why
c o r p o r a t i o n s n e e d t o in v e s t in s e c u r i t y m e a s u r e s t o p r o t e c t t h e i r i n f o r m a t i o n a s s e ts .
Module 01 Page 17
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
M
o
d u l e
F
Exam 312-50 Certified Ethical Hacker
lo w
l r ' 5 ,ד
So fa r
we
d is c u s s e d
in fo rm a tio n
s e c u rity .
Now
we
w ill
d is c u s s
th re a ts
and
a tta c k
v e c to r s o f in fo r m a t io n s e c u rity .
|~ U
In fo r m a tio n S e c u rity O v e r v ie w
H a c k in g P h a se s
I n f o r m a tio n S e c u rity T h re a ts
* - . .
|
T yp e s o f A tta c k s
Eel-------
M
a n d A tta c k V e c to rs
H a c k in g C o n c e p ts
T h is s e c tio n
in tro d u c e s
you
to
L
to p
in fo rm a tio n
^
־
In fo r m a tio n S e c u rity C o n tro ls
s e c u rity
a tta c k
v e c to rs , th e
t h r e a t s t o v a lu a b le in fo r m a tio n , a n d th e g o a ls o f a tta c k e r s w h o p e r fo r m
p o s s ib le
s e c u rity
a tta c k s o n in fo rm a tio n
s y s te m s .
Module 01 Page 18
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
T o p I n f o r m a t i o n S e c u r it y
CEH
A tta c k V e c to rs
V irtua liza tion and
Organized
Un-patched
Targeted
Social
Cloud C om puting
Cyber Crime
Softw are
M alw ares
N etw o rkin g
?a
י
IF 3I
't t A
ויי,
Insider Threats
! j׳
In fo rm a tio n
S y s te m s
Complexity of
Computer Infrastructure
?ft
9
Compliance to Govt.
Laws and Regulations
Mobile
Device Security
Inadequate
Security Policies
Network
Applications
Lack o f Cyber
Security Professionals
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
T o p
An
in fo rm a tio n
I n
f o
a tta c k
s y s te m
r m
a
v e c to r
to
t i o
is
p e rfo rm
n
a
S
p a th
e c u r it y
or
m eans
A
t t a c k
by
w h ic h
V
e c t o r s
an
a tta c k e r
g a in s
access
to
an
m a lic io u s a c t iv it ie s . T h is a t t a c k v e c t o r e n a b le s a n a t t a c k e r t o
t a k e a d v a n t a g e o f t h e v u l n e r a b i l i t i e s p r e s e n t in t h e i n f o r m a t i o n s y s t e m
in o r d e r t o c a r r y o u t a
p a rtic u la r a tta c k .
A lth o u g h
th e re
a tta c k v e c to rs
a re
som e
com e
in
tra d itio n a l
m any
fo rm s ;
a tta c k s
one
v e c to rs
cannot
fro m
w h ic h
p r e d i c t in w h i c h
a tta c k
fo rm
can
an
be
p e rfo rm e d ,
a tta c k v e c to r can
com e.
The
fo llo w in g
a re
th e
p o s s ib le
to p
a tta c k
v e c to rs
th ro u g h
w h ic h
a tta c k e rs
can
a tta c k
in fo r m a tio n s y s te m s :
0
V ir t u a liz a t io n a n d C lo u d C o m p u t in g
0
O rg a n iz e d C y b e r C rim e
0
U n p a tc h e d S o ftw a re
0
T a rg e te d M a lw a re
0
S o c ia l N e t w o r k i n g
0
In s id e r T h re a ts
Module 01 Page 19
Ethical Hacking and Countermeasures Copyright © by EC-COUIlCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
0
B o tn e ts
0
Lack o f C y b e r S e c u rity P ro fe s s io n a ls
0
N e tw o r k A p p lic a tio n s
0
I n a d e q u a t e S e c u r it y P o lic ie s
0
M o b ile D e v ic e S e c u r ity
0
C o m p lia n c e w it h G o v t. L a w s a n d R e g u la tio n s
0
C o m p le x ity o f C o m p u te r In fra s tru c tu re
0
H a c k tiv is m
Module 01 Page 20
Exam 312-50 Certified Ethical Hacker
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
M
o
I n
f o
Exam 312-50 Certified Ethical Hacker
t i v e s ,
r m
a
G
t i o
o a ls ,
n
S
a n d
O
e c u r it y
b j e
A
c t i v e s
o
f
t t a c k s
A t t a c k s = M o t i v e ( G o a l) + M e t h o d + V u l n e r a b i l i t y
A tta c k s
A tta c k e rs ha ve m o tiv e s o r g o a ls such as d is r u p tin g
G o a ls
b u s in e s s c o n tin u ity , in fo r m a tio n t h e ft, d a ta
m a n ip u la tio n s , o r ta k in g re ve n g e
A m o tiv e o rig in a te s o u t o f th e n o tio n th a t th e ta r g e t
s y s te m s to re s o r p ro c e s s e s s o m e th in g v a lu a b le an d th is
M o tiv e s
lead s to th r e a t o f an a tta c k o n th e system
A tta c k e rs t r y v a rio u s to o ls , a tta c k m e th o d s , a n d
/
te c h n iq u e s to e x p lo it v u ln e r a b ilitie s in a c o m p u te r
'
/
O b je c tiv e s
s ystem o r s e c u rity p o lic y a n d c o n tro ls to a c h ie v e t h e ir
m o tiv e s
Copyright © by EG-G*ancil. All Rights Reserved. Reproduction Is Strictly Prohibited.
M
— -E l
S
o
t i v e s ,
e c u r it y
G
A
o a ls ,
a n d
O
b je c t iv e s
o
f I n
f o
r m
a
t i o
n
t t a c k s
A tta c k e r s g e n e r a lly h a v e m o tiv e s o r g o a ls o r o b je c tiv e s b e h in d p e r f o r m in g in fo r m a t io n s e c u rity
a tta c k s .
It
m ay
be
to
d is ru p t
th e
b u s in e s s
c o n tin u ity
of
th e
ta rg e t
o rg a n iz a tio n ,
to
s te a l
v a lu a b le in f o r m a t io n , f o r th e s a k e o f c u r io s ity , o r e v e n t o ta k e r e v e n g e o n t a r g e t o rg a n iz a tio n .
T h e r e f o r e , th e s e m o tiv e s o r g o a ls d e p e n d o n t h e a tta c k e r 's s ta te o f m in d , f o r w h a t re a s o n h e o r
s h e is c a r r y i n g o u t s u c h a n a c t i v i t y . O n c e , t h e a t t a c k e r d e t e r m i n e s
h is /h e r g o a l, h e o r s h e ca n
a c c o m p l i s h t h e g o a l b y a d o p t i n g v a r i o u s t e c h n i q u e s t o e x p l o i t v u l n e r a b i l i t i e s in a n i n f o r m a t i o n
s y s te m o r s e c u rity p o lic y a n d c o n tro ls .
Module 01 Page 21
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
In f o r m a t io n S e c u r ity T h r e a ts
0
0
©
0
0
CEH
0
0
N a tu ra l
P h y s ic a l
H um an
T h re a ts
S e c u rity T h re a ts
T h re a ts
©
N a tu ra l dis a s te rs
Loss o r d a m a g e o f
©
H ackers
©
In sid e rs
Q
S ocial e n g in e e rin g
s y ste m re so u rce s
Q
Q
Q
F lo o d s
©
P hysical in tru s io n
©
S a b o ta g e , e s p io n a g e
E a rth q u a k e s
H u rric a n e s
©
a n d e rro rs
Lack o f k n o w le d g e
a n d a w a re n e s s
0
0
0
0
0 ,
0
I
Copyright © by E C - G t n c i. All Rights Reserved. Reproduction is Strictly Prohibited.
I n
f o
r m
a
t i o
n
S
e c u r it y
T
h r e a t s
I n f o r m a t io n s e c u r ity t h r e a t s a re b r o a d ly c la s s ifie d in t o t h r e e c a te g o r ie s , as fo llo w s :
N
a tu r a l T h r e a ts
N a tu ra l th re a ts
an y n a tu re -c re a te d
in c lu d e
n a tu r a l d is a s te rs s u c h as e a rth q u a k e s , h u rric a n e s , flo o d s , o r
d is a s te r th a t c a n n o t b e s to p .
In fo rm a tio n
dam age
o r lo s t d u e t o
n a tu ra l
t h r e a t s c a n n o t b e p r e v e n t e d a s n o o n e k n o w s in a d v a n c e t h a t t h e s e t y p e s o f t h r e a t s w i l l o c c u r .
H o w e ve r, yo u
can
im p le m e n t a fe w
s a fe g u a r d s a g a in s t n a tu r a l d is a s te rs b y a d o p t in g d is a s te r
r e c o v e r y p la n s a n d c o n t in g e n c y p la n s .
P h y s ic a l
S e c u r it y
T h r e a ts
P h y s ic a l t h r e a t s m a y i n c lu d e lo s s o r d a m a g e o f s y s t e m
th e ft,
and
p h y s ic a l
im p a c t.
P h y s ic a l
im p a c t o n
d a m a g e , e ith e r in te n tio n a lly o r u n in te n tio n a lly .
reso u rce s
can
re s o u rc e s t h r o u g h fire , w a te r ,
be
due
to
a c o llis io n
o r o th e r
S o m e t im e s , p o w e r m a y a ls o d a m a g e h a r d w a r e
use d to s to re in fo rm a tio n .
H u m
a n
Hum an
Module 01 Page 22
T h r e a ts
th re a ts
in c lu d e th re a ts o f a tta c k s p e r fo r m e d
by b o th
in s id e rs a n d
o u ts id e rs .
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
In s id e r a tta c k s
a tta c k s
re fe r to
a tta c k e rs
p o s tu re
re fe r to
can
o f th e
a tta c k s
be
th e
Exam 312-50 Certified Ethical Hacker
a tta c k s
p e rfo rm e d
p e rfo rm e d
by
b ig g e s t t h r e a t
in fo rm a tio n
to
by
d is g ru n tle d
m a lic io u s
p e o p le
in fo rm a tio n
s y s te m , w h ile
or
m a lic io u s
n o t w ith in
s y s te m
th e
as t h e y
o u ts id e r a tta c k e rs a p p ly
e m p lo y e e s .
O u ts id e r
o rg a n iz a tio n .
m ay
know
th e
In s id e r
s e c u rity
m a n y tr ic k s s u c h as s o c ia l
e n g in e e r in g t o le a rn t h e s e c u rity p o s tu r e o f t h e in f o r m a t io n s y s te m .
Module 01 Page 23
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
I n
4r
f o
r m
a
t i o
Exam 312-50 Certified Ethical Hacker
n
S
e c u r it y
T
h r e a t s
( C
o n t ’ d )
K ir
H u m a n t h r e a t s c a n b e f u r t h e r c la s s ifie d in t o t h r e e t y p e s , as f o llo w s :
N
״
by
e tw
o r k
T h r e a ts
A n e t w o r k is d e f i n e d
c o m m u n ic a tio n
fro m
c h a n n e ls
to
as t h e
s h a re
c o lle c tio n
reso u rce s
o f c o m p u te rs a nd o th e r h a rd w a re
and
in fo rm a tio n .
As th e
c o n n e c te d
in fo rm a tio n
tra v e ls
o n e c o m p u te r to th e o th e r th r o u g h th e c o m m u n ic a tio n c h a n n e l, a m a lic io u s p e rs o n m a y
b re a k in to th e
c o m m u n ic a tio n
c h a n n e l a n d s te a l th e
in fo rm a tio n
tra v e lin g o v e r th e
n e tw o rk .
T h e a tta c k e r ca n im p o s e v a rio u s th re a ts o n a ta r g e t n e tw o r k :
0
In fo rm a tio n g a th e rin g
0
S n iffin g a n d e a v e s d r o p p in g
0
S p o o fin g
0
S e s s io n h ija c k in g a n d m a n - i n - t h e - m i d d le a tta c k s
0
SQL in je c tio n
0
A R P P o is o n in g
0
P a s s w o rd -b a s e d a tta c k s
Module 01 Page 24
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Introduction to Ethical Hacking
Exam 312-50 Certified Ethical Hacker
©
D e n ia l o f s e rv ic e a tta c k
©
C o m p ro m is e d -k e y a tta c k
vL
H o s t T h r e a ts
H o s t t h r e a t s a re d ir e c te d a t a p a r tic u la r s y s te m o n w h ic h v a lu a b le in f o r m a t io n re s id e s .
A tta c k e rs
try
to
b re a ch
th e
s e c u rity
o f th e
in fo rm a tio n
s y s te m
re so u rce . T he
fo llo w in g
a re
p o s s ib le th r e a t s t o t h e h o s t:
0
M a lw a re a tta c k s
0
T a rg e t F o o tp rin tin g
0
P a s s w o rd a tta c k s
0
D e n ia l o f s e rv ic e a tta c k s
0
A rb itra ry c o d e e x e c u tio n
©
U n a u th o riz e d access
©
P riv ile g e e s c a la tio n
0
B a ck d o o r A tta c k s
©
P h y s ic a l s e c u r it y t h r e a t s
A
p p lic a t io n
If th e
p a rtic u la r
a tta c k s .
p ro p e r
a p p lic a tio n ,
A tta c k e rs
ta k e
T h r e a ts
s e c u rity
th e
m e a su re s
a p p lic a tio n
a d v a n ta g e
of
a re
m ig h t
be
not
c o n s id e re d
v u ln e ra b le
v u ln e ra b ilitie s
to
p re se n t
d u rin g
d iffe re n t
in
th e
d e v e lo p m e n t
ty p e s
of
th e
o f a p p lic a tio n
a p p lic a tio n
to
s te a l
or
d a m a g e t h e in f o r m a t io n . T h e f o llo w in g a re p o s s ib le th r e a t s t o t h e a p p lic a tio n :
©
D a ta /In p u t v a lid a tio n
©
A u th e n tic a tio n a n d A u th o riz a tio n a tta c k s
©
C o n fig u ra tio n m a n a g e m e n t
©
In f o r m a t io n d is c lo s u re
©
S e s s io n m a n a g e m e n t is s u e s
©
B u f f e r o v e r f l o w is s u e s
0
C ry p to g ra p h y a tta c k s
0
P a ra m e te r m a n ip u la tio n
0
Im p r o p e r e r r o r h a n d lin g a n d e x c e p tio n m a n a g e m e n t
0
A u d it in g a n d lo g g in g is s u e s
Module 01 Page 25
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.