Ethical Hacking for Educators

Presented By

Regina DeLisse Hartley, Ph.D. Caldwell Community College & Technical Institute

Overview 
   

  

Old School Hackers: History of Hacking EcEc-Council: Certified Ethical Hacker Learning Competencies Teaching Resources: Ethical Hacking Textbooks Hacking Tools Hacker Challenge Websites Additional Web Sites Questions and Answers

Old School Hackers: History of Hacking

THE GOLDEN AGE (1980(1980-1991) 1980: Hacker Message Boards and Groups Hacking groups form. meant elegant. hacks were programming shortcuts ELDER DAYS (1970-1979) (1970 1970s: Phone Phreaks and Cap'n Crunch: One phreak. John Draper (aka "Cap'n Crunch"). 1983: Kids' Games Movie "War Games" introduces public to hacking. Steve Wozniak and Steve Jobs. . make and sell blue boxes.PREHISTORY  1960s: The Dawn of Hacking Original meaning of the word "hack" started at MIT. such as Legion of Doom (US). future founders of Apple Computer.     Draper builds a "blue box" used with whistle allows phreaks to make free calls. discovers a toy whistle inside Cap'n Crunch cereal gives 26002600hertz signal. and can access AT&T's longlongdistance switching system. Chaos Computer Club (Germany). witty or inspired way of doing almost anything.

. Jr.  1984: Hacker 'Zines Hacker magazine 2600 publication. German Hackers arrested for breaking into U. jamming phone lines. Morris.S. first person convicted under law against gaining access to interstate network for criminal purposes. computers. crime to break into computer systems.  1988: The Morris Worm Robert T. Kevin Mitnick convicted. publishes Hacker's Manifesto. launches self-replicating selfworm on ARPAnet. the KGB and Kevin Mitnick. Hacker "The Mentor³ arrested. online 'zine Phrack.     1989: The Germans . online warfare. CRACKDOWN (1986(19861994)  1986: Congress passes Computer Fraud and Abuse Act. sold information to Soviet KGB..THE GREAT HACKER WAR  Legion of Doom vs Masters of Deception.

FBI web sites.slais. disabled communication at airport disables runway lights. 1999: E-commerce company attacked.discovery.info. www.h2k2.info.ubc.com. 1999 hackers attack Pentagon.  (www.net. vacation trips.ca/. leader.com. www. charged with stealing 20. MIT. they allegedly get two Porsches.1993: Why Buy a Car  When You Can Hack One? Radio station call-in callcontest.com) www. www.000 cash.blackhat.ca/. Oct 1998 teenager hacks into Bell Atlantic phone system.h2k2.tlc. . Poulsen now a  freelance journalist covering computer crime.blackhat.  First Def Con hacking conference in Las Vegas  ZERO TOLERANCE (1994(19941998)  1995: The Mitnick Takedown: Arrested again.slais. hacker-fugitive hackerKevin Poulsen and friends  crack phone.com) 1995: Russian Hackers Siphon $10 million from Citibank.tlc. www.sptimes. www. $20. blackmail threats followed by 8 million credit card numbers stolen. Vladimir Levin.ubc. www. www.sptimes.discovery. www.net.000 credit card numbers.

EcEc-Council: Certified Ethical Hacker .

UK. Cingular Wireless. KPMG. Johnson & Johnson. HDFC Bank. MCI. Nortel Networks. Supreme Court of the Philippines. University of Memphis. Fedex. Trusecure.ECEC-Council has certified IT professionals from the following organizations as CEH: Novell. US Air Force Reserve. Marriott Hotel. PFIZER. Check Point Software. Canon. United Nations. Ministry of Defense. Columbia Daily Tribune. Dunlop. US Embassy. US Department of Defense. Tucson Electric Power Company. Verizon. Microsoft Corporation. Worldcom. Cisco. Singapore Police Force . Fleet International. British Telecom. Hewlett Packard.

Ontario Provincial Police. EDS. SONY. Harris Corporation. Wipro. Schering. New York City Dept Of IT & Telecom ± DoITT. Fujitsu. Army. United States Marine Corps. Kodak. US Air Force. Citibank Corporation. American Express.(Cont. Xerox. Boehringer Ingelheim. SAP. Bell Canada. Quantum Research. Reserve Bank of India. Deutsche Bank . Coca-Cola CocaCorporation. U. Bank One. Accenture.) PriceWaterhouseCoopers.S. Philips Electronics. US Military. FBI. SAIC. IBM Global Services. UPS.

One who programs enthusiastically or who enjoys programming rather than just theorizing about programming. Where are you?    The explosive growth of the Internet has brought many good things«As with most technological advances.Hackers are here. there is also a dark side: criminal hackers. 1. Originally. . the term was defined as: HACKER noun. A person who enjoys learning the details of computer systems and how to stretch their capabilities«. The term ³hacker´ has a dual usage in the computer industry today. 2.

com) www. have their own networks called ³zoos´. get caught due to bragging online.com) . (www. Script Kiddies or Cyber-Punks: Between 12-30. Professional Criminals or Crackers: Make a living by breaking into systems and selling the information.tlc. but do have lack of concern for privacy and proprietary information. Do not have malicious intent. Coders and Virus Writers: See themselves as an elite. They believe the Internet was designed to be an open system.discovery. bored in school.discovery.What is a Hacker?     Old School Hackers: 1960s style Stanford or MIT hackers. Cyber12predominantly white and male. programming background and write code but won¶t use it themselves. intent is to vandalize or disrupt systems. leave it to others to release their code into ³The Wild´ or Internet.tlc.

´ With the growth of the Internet. organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems. computer security has become a major concern for businesses and governments. In their search for a way to approach the problem.What is Ethical Hacking?    Ethical hacking ± defined ³methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems¶ operating environments. .

Who are Ethical Hackers?      ³One of the best ways to evaluate the intruder threat is to have an independent computer security professionals attempt to break their computer systems´ Successful ethical hackers possess a variety of skills.g. Ethical hackers typically have very strong programming and computer networking skills. Linux or Windows 2000) used on target systems. they must be completely trustworthy. . They are also adept at installing and maintaining systems that use the more popular operating systems (e.. First and foremost. These base skills are augmented with detailed knowledge of the hardware and software provided by the more popular computer and networking hardware vendors.

and money are you willing to expend to obtain adequate protection? . effort.What do Ethical Hackers do?  An ethical hacker¶s evaluation of a system¶s security seeks answers to these basic questions: ‡ What can an intruder see on the target systems? ‡ What can an intruder do with that information? ‡ Does anyone at the target notice the intruder¶s at tempts or successes? ‡ What are you trying to protect? ‡ What are you trying to protect against? ‡ How much time.

000 to $45. the hiring of ethical hackers is on the rise with most of them working with top consulting firms.000 for a standalone ethical hack. Some ranges from $15.000 per assignment. In the United States. .000 per annum. Freelance ethical hackers can expect to make $10. an ethical hacker can make upwards of $120.How much do Ethical Hackers get Paid?     Globally.

infosecacademy.eccouncil.Certified Ethical Hacker (C|EH) Training   InfoSec Academy http://www.595 Package)$3.com ‡ Five-day Certified Ethical Hacker (C|EH) FiveTraining Camp Certification Training Program ‡ (C|EH) examination ‡ C|EH Certified Ethical Hacker Training Camp (5(5-Day Package)$3.595 ($2.580 training only) (Source: www.org) .

Learning Competencies .

Mainframes Network Protocols: TCP/IP.Required Skills of an Ethical Hacker        Routers: knowledge of routers. how they function and can be manipulated. Project Management: knowledge of leading. Linux: knowledge of Linux/Unix. configuration. and operation of intrusion detection systems. and services. configuration and management. organizing. Firewalls: configurations. (Source: http://www.examcram.com) . security setting. and controlling a penetration testing team. planning. and access control lists Microsoft: skills in operation. routing protocols.

com) .Modes of Ethical Hacking       Insider attack Outsider attack Stolen equipment attack Physical entry Bypassed authentication attack (wireless access points) Social engineering attack (Source: http://www.examcram.

eccouncil. and erases log files. (Source: www.Anatomy of an attack: ‡ Reconnaissance ± attacker gathers information. once attacker gains access makes sure he/she can get back in. ‡ Scanning ± searches for open ports (port scan) probes target for vulnerabilities. ‡ Gaining access ± attacker exploits vulnerabilities to get inside system. can include social engineering. ‡ Maintaining access ± creates backdoor through use of Trojans. So that attacker cannot be detected or penalized. used for spoofing IP.org) . hides files. ‡ Covering tracks ± deletes files.

   Hacker classes ‡ Black hats ± highly skilled. depends on situation. destructive ³crackers´ ‡ White hats ± skills used for defensive security analysts ‡ Gray hats ± offensively and defensively. Hactivism ± hacking for social and political cause. malicious. what they will do with the information.org) . and can they be detected. will hack for different reasons.eccouncil. Ethical hackers ± determine what attackers can gain access to. (Source: www.

Teaching Resources: Ethical Hacking Textbooks .

EcEc-Council Certified Ethical Hacker www.eccouncil.org ISBN 0-9729362-1-1 .

EcEc-Council Topics Covered            Introduction to Ethical Hacking Footprinting Scanning Enumeration System Hacking Trojans and Backdoors Sniffers Denial of Service Social Engineering Session Hijacking Hacking Web Servers .

Firewalls and Honeypots Buffer Overflows Cryptography .EcEc-Council (Cont.)           Web Application Vulnerabilities Web Based Password Cracking Techniques SQL Injection Hacking Wireless Networks Viruses Novell Hacking Linux Hacking Evading IDS.

examcram.Certified Ethical Hacker Exam Prep http://www.com ISBN 0-7897-3531-8 .

Session Hyjacking.Certified Ethical Hacker Exam Prep        The Business Aspects of Penetration Testing The Technical Foundations of Hacking Footprinting and Scanning Enumeration and System Hacking Linux and automated Security Assessment Tools Trojans and Backdoors Sniffers. and Denial of Service .

Firewalls. and Worms Cryptographic Attacks and Defenses Physical Security and Social Engineering . Security. Web Applications. and Database Attacks Wireless Technologies. Viruses.)       Web Server Hacking. and Honeypots Buffer Overflows. and Attacks IDS.Certified Ethical Hacker Exam Prep (Cont.

Network Security Tools and Technologies 5. File System Security and Cryptography 8. Operating System Vulnerabilities and Resolutions 4.com/ ISBN 0-619-21631-X . Computer Forensics http://www.course. Second Edition 1.HandsHands-On Information Security Lab Manual. Footprinting 2. Information Security Management 7. Security Maintenance 6. Scanning and Enumeration 3.

Hacking Tools: Footprinting and Reconnaissance .

Whois .

) http://www.com/ .Whois (cont.allwhois.

) .Whois (cont.

Sam Spade .

Sam Spade (Cont.) .

Nslookup .

Nslookup Options .

Traceroute .

Ping .

Ping Options .

Hacking Tools: Scanning and Enumeration .

nmap .

NMapWin .

SuperScan .

) .SuperScan (Cont.

IP Scanner

Hyena

Retina

LANguard .

Hacking Tools: System Hacking .

telnet .

Snadboy .

Password Cracking with LOphtcrack .

Keylogger .

Hacking Tools: Trojans and Backdoors .

NetBus .

Game Creates Backdoor for NetBus .

SubSeven .

Hacking Tools: Sniffers .

Spoofing a MAC address Original Configuration .

Spoofed Mac .

Ethereal .

Iris .

Snort .

Hacking Tools: Web Based Password Cracking .

Cain and Abel .

) .Cain and Abel (Cont.

Cain and Abel (Cont.) .

Legion .

Brutus .

Hacking Tools: Covering Tracks .

ImageHide .

ClearLogs .

) .ClearLogs (Cont.

Hacking Tools: Google Hacking and SQL Injection .

Google Hacking .

Google Cheat Sheet .

but does not rely on unhandled exceptions and ODBC error messages Impact: MASSIVE. .SQL Injection     Allows a remote attacker to execute arbitrary database commands Relies on poorly formed database queries and insufficient input validation Often facilitated. This is one of the most dangerous vulnerabilities on the web.

Common Database Query .

Problem: Unvalidated Input .

Piggybacking Queries with UNION .

Hacker Challenge Websites .

http://www.php .org/mainpage.hackr.

.

org http://www.org .Hackthissite.hackthissite.

Answers revealed in code .

hackits.Hackits http://www.de/challenge/ .

Additional Web Sites .

Legion of Ethical Hacking .

) .Legion of Ethical Hacking (Cont.

org/ .Hacker Highschool http://www.hackerhighschool.

Hacker Highschool .

com/ .ihackstuff.johnny.

HappyHacker.org

Foundstone

Insecure.org

SANS Institute .

Questions & Answers .