Académique Documents
Professionnel Documents
Culture Documents
(Introduction)
By
CONTENTS
3 ............................................................................................................................................................ Introduction to Ethical Hacker
3 ..................... ................................................................................................................................................................
ethical hacking3 ................. ................................................................................................................................
3 ........ ................................................................................................................................
1.2 )4 .......... ................................................................................................ (Information security overview
4 .............................................................................................................................................................................................. IC3
)5 .......... ................................................................................................Data Breach Investigations Report (Verizon business
5 ....... ................................................................................................................................................................:
5 ................. ................................................................................................................................................................Hack Value
5 ........................................................................................................................................................................................ Exploit
5 .............. ................................................................................................................................................................Vulnerability
5 . ................................................................................................................................................................ Target of Evaluation
5 ........ ................................................................................................................................................................ Zero-day Attack
5 ........... ................................................................................................................................................................ Daisy chaining
6 ...................... ................................................................................................................................:
)6 ................... ................................................................................................ (element of information security
6 ..........................................................................................:
7 .............................................................................................................................. Information security threats and attack vector 1.3
Attack vector 7 ................ ................................................................................................................................
Goal of attack 7 ........... .................................................................................................................................
Security Threat 8 .......... ................................................................................................................................ .
) Information Warfare ( 9 ............ ................................................................................................................................
) IPv6 security threats 10 ................. ................................................................................................ (IPv6
10 ................. ................................................................................................................................IPv6
) Hack concept 1.4 (11 ..........................................................................................................................................................
12 .................. ................................................................................................................................................................
12 ................ ................................................................................................................................................................ :
13 .............. ................................................................................................................................................................:Hacktivism
) Hack Phase 1.5 ( 13 ..........................................................................................................................................................
https://www.facebook.com/tibea2004
2
14 ..................... ................................................................................................................................( ) Type of Attacks 1.6
15 ........................................................................................................................................................Operating System attacks-1
15 ......................................................................................................................................................... Application-level attacks-2
16 ........... ................................................................................................................................:
16 .........................................................................................................................................................Misconfiguration attacks-3
16 ........................................................................................................................................................... Shrink wrap code attacks-4
17 ..................... ................................................................................................( ) Information security control 1.7
18 ................ ................................................................ (scope and limitations of the ethical hackers)
18 .........................................................................................................................................................................................Scope
18 ............... ................................................................................................................................................................Limitations
18 .. ................................................................................................................................ :Ethical Hacker Skills
18 ................. ................................................................................................................................( ) Defense-in-Depth
19 ..................... ................................................................................................( ) Incident Management Process
20 ...................... ................................................................................................ Information Security Policies
20 .... ................................................................................................................................ : (security policies)
20 ............ ................................................................................................( ) Classification of security policy
21 ...................... ................................................................ structure and contents of security policies
21 .................... ................................................................................................(Structure of security policy)
21 .................. ................................................................................................ (Contents of security policy)
21 ................................................................................................................................ (Types of Security policy)
22 ............................................................ (Steps to Create and Implement Security Policies)
22 ..................... ................................................................................................................................ :
23 .................. ................................................................................................ (Research Vulnerability security)
23 ............................................................................................ Vulnerability research website
25 ........................................................................................................................ (what is penetration testing)
25 ..... ................................................................................................................................................................pen tester
25 ............... ................................................................................................ penetration testing methodology
https://www.facebook.com/tibea2004
" .
. "
16 20 .
.
.
. .
.
.
) (ADMIN ) (network security prof.
) (infrastructure )( )
( .
.
Graphical User Interface GUI
.
.
.
) (Crackers
.
.
Crack .
ETHICAL HACKING
.
) (white hacker
. .
.
) :(ethical hacker
.
.
https://www.facebook.com/tibea2004
4
:
IC3
Internet Crime complaint center
www.ic3.gov
https://www.facebook.com/tibea2004
5
)DATA BREACH INVESTIGATIONS REPORT (VERIZON BUSINESS
www.verizonbusiness.com
:
HACK VALUE
.
EXPLOIT
) (commands
.
VULNERABILITY
/ ) (design code
) (error/bugs .
.
TARGET OF EVALUATION
) (IT system .
.
ZERO-DAY ATTACK
.
DAISY CHAINING
) (destroy log file .
https://www.facebook.com/tibea2004
6
:
:Attack .
:Security .
:Threat .
)(ELEMENT OF INFORMATION SECURITY
) (Infrastructure
) Confidentiality(
) / ( .
Integrity
) (.
) Availability(
.
Authenticity
) ( ) (genuine .
authentication :
.1 .
.2 .
.3 biometric smart cards digital certificate
.
Non-repudiation
HTTPS.Kerberos
:
https://www.facebook.com/tibea2004
7
.
) (security )(Usability Functionality
INFORMATION SECURITY THREATS AND ATTACK VECTOR 1.3
:
Attack Vector .1
Security Threat .2 .
Goal of attack .3 .
ATTACK VECTOR
.
:Attack Vector .
:
GOAL OF ATTACK .
attack
https://www.facebook.com/tibea2004
8
SECURITY THREAT .
:
Natural Threats
earthquake floods hurricanes
.
.
Physical Threats
) (physical impact ).(hardware damage
Human Threat
) (Insider ).(Outsider
) Insider Attack ( :
. ) (security posture .
) Outsider Attack ( :
.
:
https://www.facebook.com/tibea2004
9
:Network Threats .A
:Network ) (
communication channel computer resources ) ...( .
communication channel
.
:
) Information gathering .1 (
) sniffing and eavesdropping .2 (
) spoofing .3(
session hijacking and man-in-middle attack .4
sql injection .5
ARP Poisoning .6
Denial of service attack .7
comprised key attack .8
:Host Threats .B
) (.
:
Malware attacks .1
Target Footprinting .2
Password attacks .3
Denial of service attacks .4
Arbitrary code execution .5
Unauthorized access .6 .
Privilege escalation .7
Back door attacks .8
Physical security threats .9
Application Threats .C
.
.
:
Data/Input validation .1
Authentication and Authorization attacks .2
Configuration management .3
Information disclosure .4
Session management issues .5
Cryptography attacks .6
Parameter manipulation .7
Improper error handling and exception management .8
Auditing and logging issues .9
) INFORMATION WARFARE (
) (Information Warfare/InfoWar ICT
.
.
.
https://www.facebook.com/tibea2004
10
.
.
:Defensive InfoWar
).(ICT assets
:Offensive InfoWar
InfoWar ) (ICT assets .
https://www.facebook.com/tibea2004
11
Complexity in Vulnerability Assessment-3
IPv6 128 bit ) (infrastructure .
Overloading of Perimeter Security Controls-4
IPv6 header 40 byte (extension header) add-on
) (security control firewall ,security gateways ,routers .IDS
IPv4 to IPv6 Translation Issues-5
IPv4 IPv6 ).(poor implementation
Security Information and Event Management (SIEM) Problems-6
IPv6 IPv6 log .event
Denial-of-service (DOS)-7
.DOS
Trespassing-8
IPv6
).(restricted resources
https://www.facebook.com/tibea2004
12
.
.
.
)(ATIM .
:
) Black Hats (
) (computer science
).(crackers
.
.
.
) White Hats (
)(
) .(security analysts
. .
) Gray Hats (
.
Black Hats .White Hats
) (software and hardware .
) Suicide Hackers (
.
30
. .
Script Kiddies
.
. .
Spy Hackers
.
) Cyber Terrorists (
.
.
.
State Sponsored Hackers
.
.
https://www.facebook.com/tibea2004
13
:HACKTIVISM
.
.hacktivist ) (
.
.
) (bad or wrong .
.
.
https://www.facebook.com/tibea2004
14
) Reconnaissance( :
:Passive Reconnaissance ;
dumpster diving
:Active reconnaissance ;
/ .
Scanning
.
) (Reconnaissance )(
.
network/host scanner war dialers .
Gaining Access
.potential damage
) (LAN
. password cracking session hijacking denial of servicebuffer overflows :
Maintaining Access
Backdoors
Rootkits Trojans
Clearing Tracks
.Log
) TYPE OF ATTACKS 1.6 (
.
. :
https://www.facebook.com/tibea2004
15
https://www.facebook.com/tibea2004
16
:
Session Hijacking-1
denial of service-2
MISCONFIGURATION ATTACKS-3
) (misconfiguration /
) (framework / illegal access .
/ .
SHRINK WRAP CODE ATTACKS-4
Admin . "
" .shrink-wrap code
https://www.facebook.com/tibea2004
17
.
) INFORMATION SECURITY CONTROL 1.7 (
.
) : (ethical hacking
.
) :(Defense-in-Depth Strategy " "
.
) :(Counter the Attacks
) (anticipating methods .
:
)(reconnaissance and scanning
)(Gaining Access and Maintaining Access
)(reconnaissance and covering tracks
https://www.facebook.com/tibea2004
18
.1 .
.2 .
.3 .
.4 .
)(SCOPE AND LIMITATIONS OF THE ETHICAL HACKERS
SCOPE
:
.
)(ICT .
LIMITATIONS
:
.
.
:ETHICAL HACKER SKILLS
pen tester .
:
.1 .
.2 .
.3 .
.4 .
.5 .
.6 .
.7 .
.8 .
.9 .
) DEFENSE-IN-DEPTH (
) (Defense-in-Depth .
.
) (Defense-in-Depth
.
) (Defense-in-Depth .
.
https://www.facebook.com/tibea2004
19
https://www.facebook.com/tibea2004
20
INFORMATION SECURITY POLICIES
) :(Security Policy
.
.
.
.
.
) . (Security infrastructure
.
.
.
.
): (SECURITY POLICIES
.
.
.
.
.
.
.
.
) CLASSIFICATION OF SECURITY POLICY (
.
:
) User Policy (
.
. .password management policy :
IT Policy
.
modification policy patch updates server configurationbackup policies :
General policies
.
crisis management business continuity planshigh-level program policy :
Partner policy
Issue-specific policies
.
.
https://www.facebook.com/tibea2004
21
https://www.facebook.com/tibea2004
22
) (malware .
.
Permissive Policy (2 : ) (internet traffic
.
. .
Prudent Policy (3 : . ) (administrator
. . .
Paranoid Policy (4 : .
. server
.
)(STEPS TO CREATE AND IMPLEMENT SECURITY POLICIES
. .
:
.1 .
.2 .
.3 .
.4 .
.5 .
.6 .
.7 .
.8 .
:
.
Acceptable-Use Policy
.
User-Account policy
) .(account .
.
https://www.facebook.com/tibea2004
23
Remote-Access Policy
.
Information-Protection Policy
Firewall-Management Policy
.
Special-access Policy
.
Network-Connection Policy
.
Email Security Policy
.
Password Policy
.
)(RESEARCH VULNERABILITY SECURITY
Research Vulnerability
, .
. :
) (
)) (local ).((remotely
:
.
.
.
.
.
.
VULNERABILITY RESEARCH WEBSITE
CodeRed Center .1
http://www.eccouncil.org :
) (admin
.
TechNet .2
http://blogs.technet.com :
) .(Microsoft Lync server teams Lync Server
documentation
.
.
https://www.facebook.com/tibea2004
24
Security Magazine .3
http://www.securitymagazine.com :
.
.
SecurityFocus .4
http://www.securityfocus.com :
.
:
BugTraq .
.
The SecurityFocus Vulnerability Database
.
Help Net Security .5
http://www.net-security.org :
.1998
.Mac OS X
HackerStorm .6
http://www.hackerstorm.com.uk :
.
SC Magazine .7
http://www.scmagazine.com :
Haymarket Media Inc. . .
North America U.S. and Canada
International U.K and mainland Europe .
Asia Pacific online -20 .
. .
.1989
Computerworld .8
http://www.computerworld.com :
40 computer world .
HackerJournals .9
http://www.hackerjournals.com :
.
.
. blogs
.
WindowsSecurity Blogs .10
http://blogs.windowsecurity.com :
.
https://www.facebook.com/tibea2004
25
)(WHAT IS PENETRATION TESTING
) :(penetration test .
.
. :
)(black box
.
)(white box
.
) (pen tester
.
.
PEN TESTER
) (ROSI
(ROSI = Return On Security Investment) .
: ) (policy
.
). (BS7799,HIPAA etc.
.
.
.
.
.
/ .
https://www.facebook.com/tibea2004
26
https://www.facebook.com/tibea2004