CH1 Introduction
CH1 Introduction
CH1 Introduction
Chapter 1
Introduction to Ethical Hacking
Text Books
CEH Certified Ethical Hacker Study Guide by Ric Messier
Reference Books
• Network Intrusion Alert:An Ethical Hacking Guide to Intrusion Detection by Ankit Fadia,
Manu Zacharia, Thomson Course Technology PTR
• Gray Hat Hacking: The Ethical Hacker's Handbook by Shon Harris
• Ethical Hacking, Thomas Mathew
• Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray,
and George Kurtz, McGraw-Hill
What is Hacking?
• Hacking is an attempt to exploit a computer system or a private
network inside a computer. Simply put, it is the unauthorised
access to or control over computer network security systems for
some illegal purpose.
– It was not his first attempt; he acclaimed that he was behind the Apple's
Developer site attack.
• Daisy Chaining
– Daisy Chaining is a sequential process of several hacking or attacking
attempts to gain access to network or systems, one after another, using the
same information and the information obtained from the previous attempt.
Essential Terminology
• Exploit
– Exploit is a breach of security of a system through Vulnerabilities, Zero-Day
Attacks or any other hacking techniques.
• Doxing
– The term Doxing refers to Publishing information or a set of information
associated with an individual. This information is collected publicly, mostly
from social media or other sources.
Essential Terminology
• Payload
– In information security, Payload is a section or part of a malicious and
exploited code that causes the potentially harmful activity and actions such
as exploit, opening backdoors, and hijacking.
Essential Terminology
• Bot
– The bots are software that is used to control the target remotely and to
execute predefined tasks. It is capable to run automated scripts over the
internet. The bots are also known as for Internet Bot or Web Robot.
Elements of Information Security
• Confidentiality
• Integrity
• Availability
• Authenticity
• Non-Repudiation
• We can use the term “CIA” to remember these basic yet most
important security concepts.
The Security, Functionality, and Usability Triangle
Motives, Goals, and Objectives of Information Security Attacks
• Host Threats
• Application Threats
Information Security Threat Categories
• Network Threats
– Information gathering
– Sniffing and eavesdropping
– Spoofing
– Session hijacking and Man-in-the-Middle attack
– DNS and ARP Poisoning
– Password-based attacks
– Denial-of-Service attack
– Compromised-key attack
– Firewall and IDS attacks
Information Security Threat Categories
• Host Threats
– Malware attacks
– Footprinting
– Password attacks
– Denial-of-Service attacks
– Arbitrary code execution
– Unauthorized access
– Backdoor attacks
– Physical security threats
Information Security Threat Categories
• Application Threats
– Improper data/Input validation
– Authentication and Authorization attacks
– Security misconfiguration
– Information disclosure
– Broken session management
– Buffer overflow attacks
– Cryptography attacks
– SQL injection
– Improper error handling and exception management
Hacker Types
White Hat Hackers
• White Hat hackers are also known as Ethical Hackers.
• They never intent to harm a system, rather they try to find out
weaknesses in a computer or a network system as a part of
penetration testing and vulnerability assessments.
• Black Hat hacking is always illegal because of its bad intent which
includes stealing corporate data, violating privacy, damaging the
system, blocking network communication, etc.
Hacker Types
Grey Hat Hackers
• Grey hat hackers are those who work for both, black hat and white
hat hackers.
• They act without malicious intent but for their fun, they exploit a
security weakness in a computer system or network without the
owner’s permission or knowledge.
Hacker Types
Script Kiddies
• Script Kiddies is a person who lacks programming knowledge and
IT security skills and uses existing security tools to launch cyber-
attacks.
• Many of these tools are free and even open source. Most of these
tools were not created for hacking purposes.
Hacker Types
Red Hat Hackers
• A Red Hat hacker sometimes refers to a person who targets Linux
based systems.
• Like the Script Kiddies, Blue hat hackers also have no desire to
learn.
Hacker Types
Grey Hat Hackers
• These are the “newbies” in the world of hacking.
• Green hat hackers are not aware of the security mechanism and
the inner workings of the web, but they are keen learners and
determined to elevate their position in the hacker community.