You are on page 1of 98

Ethical Hacking for

Educators

Presented By
Regina DeLisse Hartley, Ph.D.
Caldwell Community College &
Technical Institute
Overview

 Old School Hackers: History of Hacking


 Ec-Council: Certified Ethical Hacker
 Learning Competencies
 Teaching Resources: Ethical Hacking
Textbooks
 Hacking Tools
 Hacker Challenge Websites
 Additional Web Sites
 Questions and Answers
Old School Hackers:
History of Hacking
PREHISTORY  Draper builds a "blue box" used
 1960s: The Dawn of Hacking with whistle allows phreaks to make
Original meaning of the word free calls.
"hack" started at MIT; meant  Steve Wozniak and Steve Jobs,
elegant, witty or inspired way of future founders of Apple Computer,
doing almost anything; hacks were make and sell blue boxes.
programming shortcuts THE GOLDEN AGE (1980-1991)
ELDER DAYS (1970-1979)
 1980: Hacker Message Boards
and Groups
 1970s: Phone Phreaks and
Hacking groups form; such as
Cap'n Crunch: One phreak, John Legion of Doom (US), Chaos
Draper (aka "Cap'n Crunch"), Computer Club (Germany).
discovers a toy whistle inside Cap'n  1983: Kids' Games
Crunch cereal gives 2600-hertz Movie "War Games" introduces
signal, and can access AT&T's long- public to hacking.
distance switching system.
THE GREAT HACKER WAR  1989: The Germans , the
 Legion of Doom vs Masters of KGB and Kevin Mitnick.
Deception; online warfare;  German Hackers arrested
jamming phone lines. for breaking into U.S.
 1984: Hacker 'Zines
computers; sold information
Hacker magazine 2600 publication; to Soviet KGB.
online 'zine Phrack.  Hacker "The Mentor“
CRACKDOWN (1986-1994) arrested; publishes Hacker's
 1986: Congress passes Computer
Manifesto.
Fraud and Abuse Act; crime to
break into computer systems.  Kevin Mitnick convicted;
 1988: The Morris Worm
first person convicted under
Robert T. Morris, Jr., launches self- law against gaining access
replicating worm on ARPAnet. to interstate network for
criminal purposes.
 1993: Why Buy a Car When  1995: Russian Hackers
You Can Hack One?
Radio station call-in contest; Siphon $10 million from
hacker-fugitive Kevin Poulsen Citibank; Vladimir Levin,
and friends crack phone; they leader.
allegedly get two Porsches,  Oct 1998 teenager hacks
$20,000 cash, vacation trips; into Bell Atlantic phone
Poulsen now a freelance system; disabled
journalist covering computer
crime. communication at airport
 First Def Con hacking disables runway lights.
conference in Las Vegas  1999 hackers attack
ZERO TOLERANCE (1994- Pentagon, MIT, FBI web
1998) sites.
 1995: The Mitnick  1999: E-commerce
Takedown: Arrested again; company attacked;
charged with stealing 20,000 blackmail threats followed
credit card numbers. by 8 million credit card
numbers stolen. (
www.blackhat.info; www.h2k2.net;
www.slais.ubc.ca/; www.sptimes.com;
www.tlc.discovery.com)
Ec-Council: Certified Ethical
Hacker
EC-Council has certified IT
professionals from the following
organizations as CEH:
Novell, Canon, Hewlett Packard, US Air Force Reserve, US
Embassy, Verizon, PFIZER, HDFC Bank, University of
Memphis, Microsoft Corporation, Worldcom, Trusecure,
US Department of Defense, Fedex, Dunlop, British
Telecom, Cisco, Supreme Court of the Philippines, United
Nations, Ministry of Defense, UK, Nortel Networks, MCI,
Check Point Software, KPMG, Fleet International, Cingular
Wireless, Columbia Daily Tribune, Johnson & Johnson,
Marriott Hotel, Tucson Electric Power Company, Singapore
Police Force
(Cont.)

PriceWaterhouseCoopers, SAP, Coca-Cola Corporation,


Quantum Research, US Military, IBM Global Services, UPS,
American Express, FBI, Citibank Corporation, Boehringer
Ingelheim, Wipro, New York City Dept Of IT & Telecom –
DoITT, United States Marine Corps, Reserve Bank of India,
US Air Force, EDS, Bell Canada, SONY, Kodak, Ontario
Provincial Police, Harris Corporation, Xerox, Philips
Electronics, U.S. Army, Schering, Accenture, Bank One,
SAIC, Fujitsu, Deutsche Bank
Hackers are here. Where are
you?
 The explosive growth of the Internet has brought
many good things…As with most technological
advances, there is also a dark side: criminal
hackers.
 The term “hacker” has a dual usage in the
computer industry today. Originally, the term was
defined as:
 HACKER noun. 1. A person who enjoys learning
the details of computer systems and how to stretch
their capabilities…. 2. One who programs
enthusiastically or who enjoys programming rather
than just theorizing about programming.
What is a Hacker?
 Old School Hackers: 1960s style Stanford or MIT
hackers. Do not have malicious intent, but do have lack
of concern for privacy and proprietary information. They
believe the Internet was designed to be an open system.
 Script Kiddies or Cyber-Punks: Between 12-30;
predominantly white and male; bored in school; get
caught due to bragging online; intent is to vandalize or
disrupt systems.
 Professional Criminals or Crackers: Make a living by
breaking into systems and selling the information.
 Coders and Virus Writers: See themselves as an elite;
programming background and write code but won’t use it
themselves; have their own networks called “zoos”; leave
it to others to release their code into “The Wild” or
Internet. (www.tlc.discovery.com)
What is Ethical Hacking?
 Ethical hacking – defined “methodology adopted by
ethical hackers to discover the vulnerabilities existing in
information systems’ operating environments.”
 With the growth of the Internet, computer security has
become a major concern for businesses and
governments.
 In their search for a way to approach the problem,
organizations came to realize that one of the best ways
to evaluate the intruder threat to their interests would
be to have independent computer security professionals
attempt to break into their computer systems.
Who are Ethical Hackers?
 “One of the best ways to evaluate the intruder threat is
to have an independent computer security
professionals attempt to break their computer
systems”
 Successful ethical hackers possess a variety of skills. First and
foremost, they must be completely trustworthy.
 Ethical hackers typically have very strong programming and
computer networking skills.
 They are also adept at installing and maintaining systems that
use the more popular operating systems (e.g., Linux or
Windows 2000) used on target systems.
 These base skills are augmented with detailed knowledge of
the hardware and software provided by the more popular
computer and networking hardware vendors.
What do Ethical Hackers do?
 An ethical hacker’s evaluation of a system’s security
seeks answers to these basic questions:
• What can an intruder see on the target systems?
• What can an intruder do with that information?
• Does anyone at the target notice the intruder’s at
tempts or successes?
• What are you trying to protect?
• What are you trying to protect against?
• How much time, effort, and money are you willing
to expend to obtain adequate protection?
How much do Ethical Hackers
get Paid?
 Globally, the hiring of ethical hackers is on
the rise with most of them working with
top consulting firms.
 In the United States, an ethical hacker can
make upwards of $120,000 per annum.
 Freelance ethical hackers can expect to
make $10,000 per assignment.
 Some ranges from $15,000 to
$45,000 for a standalone ethical
hack.
Certified Ethical Hacker (C|EH)
Training
 InfoSec Academy
 http://www.infosecacademy.com
• Five-day Certified Ethical Hacker (C|EH)
Training Camp Certification Training Program
• (C|EH) examination
• C|EH Certified Ethical
Hacker Training Camp
(5-Day Package)$3,595
($2,580 training only)

(Source: www.eccouncil.org
)
Learning Competencies
Required Skills of an Ethical
Hacker
 Routers: knowledge of routers, routing protocols, and access
control lists
 Microsoft: skills in operation, configuration and
management.
 Linux: knowledge of Linux/Unix; security setting,
configuration, and services.
 Firewalls: configurations, and operation of intrusion
detection systems.
 Mainframes
 Network Protocols: TCP/IP; how they function and can be
manipulated.
 Project Management: knowledge of leading, planning,
organizing, and controlling a penetration testing team.

(Source: http://www.examcram.com)
Modes of Ethical Hacking

 Insider attack
 Outsider attack
 Stolen equipment attack
 Physical entry
 Bypassed authentication attack
(wireless access points)
 Social engineering attack
(Source: http://www.examcram.com)
Anatomy of an attack:
• Reconnaissance – attacker gathers information;
can include social engineering.
• Scanning – searches for open ports (port scan)
probes target for vulnerabilities.
• Gaining access – attacker exploits vulnerabilities
to get inside system; used for spoofing IP.
• Maintaining access – creates backdoor through
use of Trojans; once attacker gains access makes
sure he/she can get back in.
• Covering tracks – deletes files, hides files, and
erases log files. So that attacker cannot be
detected or penalized.

(Source: www.eccouncil.org)
 Hacker classes
• Black hats – highly skilled,
malicious, destructive “crackers”
• White hats – skills used for
defensive security analysts
• Gray hats – offensively and
defensively; will hack for different
reasons, depends on situation.
 Hactivism – hacking for social and political cause.
 Ethical hackers – determine what attackers can
gain access to, what they will do with the
information, and can they be detected.

(Source: www.eccouncil.org)
Teaching Resources: Ethical
Hacking Textbooks
Ec-Council

Certified Ethical Hacker

www.eccouncil.org
ISBN 0-9729362-1-1
Ec-Council Topics Covered
 Introduction to Ethical Hacking
 Footprinting
 Scanning
 Enumeration
 System Hacking
 Trojans and Backdoors
 Sniffers
 Denial of Service
 Social Engineering
 Session Hijacking
 Hacking Web Servers
Ec-Council (Cont.)

 Web Application Vulnerabilities


 Web Based Password Cracking Techniques
 SQL Injection
 Hacking Wireless Networks
 Viruses
 Novell Hacking
 Linux Hacking
 Evading IDS, Firewalls and Honeypots
 Buffer Overflows
 Cryptography
Certified Ethical Hacker Exam
Prep

http://www.examcram.com
ISBN 0-7897-3531-8
Certified Ethical Hacker Exam
Prep
 The Business Aspects of Penetration Testing
 The Technical Foundations of Hacking
 Footprinting and Scanning
 Enumeration and System Hacking
 Linux and automated Security Assessment Tools
 Trojans and Backdoors
 Sniffers, Session Hyjacking, and Denial of Service
Certified Ethical Hacker Exam
Prep (Cont.)
 Web Server Hacking, Web Applications,
and Database Attacks
 Wireless Technologies, Security, and
Attacks
 IDS, Firewalls, and Honeypots
 Buffer Overflows, Viruses, and Worms
 Cryptographic Attacks and Defenses
 Physical Security and Social Engineering
Hands-On Information Security
Lab Manual, Second Edition
1. Footprinting
2. Scanning and Enumeration
3. Operating System Vulnerabilities
and Resolutions
4. Network Security Tools and
Technologies
5. Security Maintenance
6. Information Security
Management
7. File System Security and
Cryptography
8. Computer Forensics http://www.course.com/
ISBN 0-619-21631-X
Hacking Tools: Footprinting and
Reconnaissance
Whois
Whois (cont.)

http://www.allwhois.com/
Whois (cont.)
Sam Spade
Sam Spade (Cont.)
Nslookup
Nslookup Options
Traceroute
Ping
Ping Options
Hacking Tools: Scanning and
Enumeration
nmap
NMapWin
SuperScan
SuperScan (Cont.)
IP Scanner
Hyena
Retina
LANguard
Hacking Tools: System Hacking
telnet
Snadboy
Password Cracking with
LOphtcrack
Keylogger
Hacking Tools: Trojans and
Backdoors
NetBus
Game Creates Backdoor for
NetBus
SubSeven
Hacking Tools: Sniffers
Spoofing a MAC address
Original Configuration
Spoofed Mac
Ethereal
Iris
Snort
Hacking Tools: Web Based
Password Cracking
Cain and Abel
Cain and Abel (Cont.)
Cain and Abel (Cont.)
Legion
Brutus
Hacking Tools: Covering Tracks
ImageHide
ClearLogs
ClearLogs (Cont.)
Hacking Tools: Google Hacking
and SQL Injection
Google Hacking
Google Cheat Sheet
SQL Injection
 Allows a remote attacker to
execute arbitrary database
commands
 Relies on poorly formed database queries and
insufficient
input validation
 Often facilitated, but does not rely on unhandled
exceptions and ODBC error messages
 Impact: MASSIVE. This is one of the most
dangerous
vulnerabilities on the web.
Common Database Query
Problem: Unvalidated Input
Piggybacking Queries with
UNION
Hacker Challenge Websites
http://www.hackr.org/mainpage.php
Hackthissite.org

http://www.hackthissite.org
Answers revealed in code
Hackits

http://www.hackits.de/challenge/
Additional Web Sites
Legion of Ethical Hacking
Legion of Ethical Hacking (Cont.)
Hacker Highschool

http://www.hackerhighschool.org/
Hacker Highschool
johnny.ihackstuff.com/
HappyHacker.org
Foundstone
Insecure.org
SANS Institute
Questions & Answers

You might also like