You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/343064340

Practice of Ethical Hacking in the Banking Sector

Conference Paper · July 2020

CITATIONS READS

0 4,345

2 authors:

Zoya Ahmad M S Minu Sanjudharan


SRM Institute of Science and Technology SRM Institute of Science and Technology
5 PUBLICATIONS   3 CITATIONS    45 PUBLICATIONS   36 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Used Car Value Predictor View project

All content following this page was uploaded by Zoya Ahmad on 20 July 2020.

The user has requested enhancement of the downloaded file.


Practice of Ethical Hacking in the Banking Sector

Zoya Ahmad M S Minu


Deparment of Computer Science and Deparment of Computer Science and
Engineering Engineering
SRM Institute of Science and SRM Institute of Science and
Technology Technology
Chennai, India Chennai, India
ahmadzoya811@gmail.com msminu1990@gmail.com

Abstract—Despite all security measure taken, the systems company or organization‟s reputation and credibility and
of banking firms fall prey to malicious attacks. This paper heavy monetary losses. These attacks also compromise
talks about the practice of ethical hacking, its working, the highly classified information of the companies as well as
algorithms used, its advantages, disadvantages, needs and their employees.
current risks in the banking sector.
Despite all the security measures taken up by the banks,
Keywords—ethical hacking, network security, cyber security, individuals and often the bank themselves fall prey to cyber-
threats, risks, dangers, vulnerabilities, security, algorithms, attacks. These cyber-attacks are ubiquitous in technology
SHA, DES, AES, MD5 companies and people. They are unavoidable and inevitable.
Nevertheless, if preventive measures are taken, the banks
can be saved from the risks present in technology. The most
I. INTRODUCTION prevalent risk in technology is the issue of security.
In recent years, with the rapid development in network The banking sector is affected either by clients becoming
technology, the financial sector has started using computer victims of social engineering or by professional „hackers‟.
networks extensively. But they are constantly being Social engineering is a form of cyber-attack which is done
confronted with cyber-attacks. These financial sectors, to harvest data and information from victims. It usually
especially the banking sectors mainly take the assistance of comprises of playing with the minds of the people or
two types of security: computer security and network victims. Social engineers can be found everywhere. There is
security. no certification for social engineering, so there is no way to
detect a social engineer. There are many mediums to
Computer Security is deemed to be an autonomous implement social engineering. Some of the mediums are
system offered with the help of Operating Systems (OS) and email, web, phone, USB drives, etc. Few of the social
in-built hardware and software. Network Security is a engineering techniques are: Phishing, Spear Phishing,
broad term covering a multitude of technologies, devices Vishing, Pretexting, Baiting, etc.
and processes. In simple words, it is a set of rules and
configurations that are designed in order to protect the
integrity, confidentiality and accessibility of computer
networks and data. This is achieved using both software and
hardware technologies. Every company or organization,
regardless of its size, industry or infrastructure, requires
some amount of network security solutions in their systems
to protect it from the ever-increasing cyber threats prevalent
across the world today.

In the attacks done by professionals, hacking tops the


list. Hacking is a term used to describe professionals with a
definite skill set that gain unauthorized access into computer
systems. They achieve this by exploiting weaknesses or
using bugs. This act is motivated either by malice or by
mischief. It is very easy for a hacker skilled in programming
to create algorithms which help him/her in cracking
passwords, disrupting network services, or even penetrating
networks. Malicious hacking is becoming prevalent in the
banking sector with the increasing popularity of the internet,
These banking firms need to have these protective
E-Baking and E-Commerce. Here, the primary motive of
measures in place because, just a few minutes of downtime
can cause massive damage, widespread disruption to the
malicious or unethical hacking involves financial gain or as card transactions, net-banking, UPI, cloud computing,
stealing valuable information. etc. The risks of imminent security breaches are clearly on
the high rise and are in utmost need of efficient information
Other ways of attacking the cyber-sphere are setting up security systems. The increasing threats from cyber-attacks
malicious software in the banking systems. These types of expose the severe shortage of talent in this sector.
software can cause harm to the customers or the firm by
stealing or corrupting their business information, causing Ethical hacking is a developing method which has been
system failures, recording computer activity, causing huge adopted by most of the banking firms to test their network
monetary losses, etc. They are called malware. A computer security systems and tackle any cyber-attacks that come on
usually gets infected by a malware when an employee the way. The security risks, weak points, vulnerabilities, etc.
downloads infected files accidentally or it is following by a in a network can be identified efficiently with the help of
phishing attack. A Ransomware is used to block access to ethical hacking. These ethical hacking help in securing the
computers or files until a ransom is paid. A massive systems of the banking firms and making sure that their
ransomware attack in May 2017, affected more than 100,000 important documents, finance details, classified and
organizations in around 150 countries. This cost the sensitive information are safe.
companies billions of dollars. A computer virus is a type of
a program which is designed to replicate the Internet. It These ethical hackers are hired by banking firms and
causes damage to programs, deletes files, ties up system perform security measures on their behalf. They help in
resources, etc. suggesting proper security tools and techniques that the
banks can implement and practise in order to avoid attacks
To counteract and thwart these attacks, the help on their networks.
professional hackers are taken. These hackers are called
ethical hackers. They are skilled in hacking and look into
vulnerabilities and weak points present in the computer
network systems of the banks. In addition, they help in
developing solutions to prevent and counter data security
breaches. Ethical Hacking is a method of bypassing system
security in order to identify potential data threats and
breaches in a network but in an authorized manner.

III. TYPES OF HACKERS


There are many types of hackers. The bank needs to be
extremely careful while hiring them. There exist 3 main
hackers. They are are—

1. “White Hat” Hackers— the hackers practising


ethical hacking are called “White Hat” Hackers.
They work with the banking firms in order to
strengthen the security of a system. They have
permission to engage the targets and compromise
them within the prescribed rules of engagement.
They specialize in ethical hacking tools,
techniques, and methodologies to help in securing
Cyber Security experts, called by the banking firms the bank‟s information systems. They exploit
allow these professionals to perform authorized activities in security networks and look for backdoors only
order to test the defences of the system. Therefore, this is a when they are legally permitted to do so. These
planned, approved and most importantly, a legal process, hackers inform the banking firms of every
unlike malicious hacking. vulnerability they find in their security system and
These main aim of these ethical hackers is to examine fix it before they can be exploited by malicious
and inspect the system or network for any weak points or attackers.
vulnerabilities that can get in hand of malicious hackers who
can then exploit it or destroy it. These experts gather and 2. “Black Hat” Hackers— these hackers gain access
analyse the information in order to evaluate and figure out to classified information and finance details of the
ways for strengthening the safety and security of the system, bank using illegal techniques. The reason behind
network or applications. The security footprint is improved doing so is to compromise the systems or destroy
by this method. The system, network or applications can important information. They commit security
withstand attacks or even divert them. violations and attempt to gain unauthorized entry
into the banking system or network to exploit it for
malicious reasons. These hackers are neither
II. IMPORTANCE OF ETHICAL HACKING IN BANKING permitted nor do they have the authority to
compromise their targets. They inflict damage to
In today's digital era, one of the most prominent threat
looms around the cyber world. Until a few years back, security systems by compromising it, altering
hackers were not taken seriously. But since recently more functions of websites and networks, shutting down
and more companies have entered the e-commerce and e- systems, etc. This is usually done in order to steal
banking ecosystem and have adopted new technologies such information or gain access to passwords, financial
information, personal data, etc. These types of
hackers have pure negative motives such as The hackers can also intercept proxy when the victim
monetary gain or reputation when they break into a is using public Wi-Fi.
computer.
This method detects and identifies vulnerabilities in
3. “Grey Hat” Hacker— “Grey Hat” hackers don‟t the system eventually catches the attention of a malicious
ask for permission before getting into your system attacker who can then exploit it.
the way “White Hat” hackers do. But they are
different from “Black Hat” hackers as well since
they don‟t hack for any personal gain or third-
party benefit. They do not possess any wicked
intention but hack these systems for fun. They
usually inform the owner about any threats they
find without being hired to do so. Despite the
intention of a Grey Hat hacker, this kind of
hacking is still considered to be illegal as it
constitutes an unauthorized system breach.

V. TOOLS AND TECHNIQUES INVOLVED IN HACKING


Some of the tools and techniques of hacking are—

1. Keyloggers—this tool is specially designed to log


and record each key pressed on a system. They
record every keystroke with the help of API
IV. WORKING OF CYBER CRIME IN BANKS (Application Programming Interface) when it is
typed through a keyboard connected to the
There are countless ways in which a hacker or a social computer. The recorded files which include data
engineer can hack the banks or an individual. The most
like usernames, website visit details, screenshots,
common ways to hack an individual is using social opened applications, etc. are then saved onto the
engineering techniques such as phishing. The hackers trick
system which can then be used by malicious
you into clicking a link that they have made to look attackers.
authentic. The link might take you to a fake banking
website which looks exactly like the original one.

They have keyloggers installed and this software


keeps on recording the details entered by the user in a
database. Clicking the link can also lead to unwanted files
containing viruses be downloaded into the system and
causing disruption. Since in most banking firms all the
computer network systems are connected by the same hub,
downloading a malicious file on one computer system can
cause problems in other systems as well.

Another possible way the hackers take up is by setting 2. Vulnerability Scanner—this tool helps
up a skimmer in an ATM booth. This device is similar to a in classifying and detecting numerous system
mini camera that records the hand movement and the weaknesses in networks, computers,
hacker can easily decipher the PIN despite you covering it communication systems, etc. This is used by
with hand since it logs in the input. ethical hackers in order to find potential
loopholes and to fix them on an immediate basis.

3. NMAP—this stands for Network Mapper. It is


widely for network discovery and security
auditing. It uses raw IP packets to determine what
hosts are available on the network, what operating
systems they are running on, what type of firewalls
are in use, etc. this software can run on all major
computer operating systems like Windows, Mac
OS X, Linux, etc. They are mainly used by ethical
hackers to detect any unwanted activity on the
system.
.
4. Metasploit—it is one of the most powerful exploit attackers who might try to enter the system along
tools. Metasploit helps in conducting basic with the ethical hacker.
penetration tests on small networks, browsing
exploit modules and run individual exploits on 5. Clearing Tracks— the last and final phase of
hosts running spot checks on the exploitability of penetration testing is to clear tracks. The ethical
vulnerabilities, etc. banking firms use this tool to hacker modifies/corrupts/deletes the log values;
detect discrepancies on their system. they also modify the values of the registry and
uninstall all the software and applications they
5. Angry IP Scanner—this is a cross-platform that used during the hacking process and delete every
scans IP addresses. Sometimes attackers might use folder they created.
a replica of the original bank website and ask you
you fill in your details. In the background all the
details are being recorded and stored with the help
of keyloggers.

VI. PHASES OF ETHICAL HACKING


The process of ethical hacking also known as pen testing or
penetration testing involves 6 main phases. They are—

1. Reconnaissance—the initial phase of ethical


hacking is called reconnaissance. It is also known
as “foot-printing”. The ethical hackers gather
information in this phase. They collect as much
information as they can gather about the target.
VII. ALGORITHMS USED IN ETHICAL HACKING
Information is collected mainly about three
groups: network, host and the people involved. There are few algorithms in practice to carry out ethical
Foot-printing is of 2 types: Active Foot-printing hacking efficiently, especially in the banking sector. They
where the ethical hackers directly interact with the are—
target in order to gather information about the
target. The most common tool used for scanning 1. SHA—Secure Hash Algorithms (SHA) is a
the target is Nmap and Passive Foot- group of cryptographic functions that have been
printing where the information about the target is designed for keeping the data secured. By using a
collected without directly interacting with the hash function, it transforms the data into an
target. Information is collected from social media, algorithm consisting of bitwise operations,
public websites, etc. modular additions, compression functions, etc. The
function then yields a string of fixed size which is
2. Scanning—this phase involves three types: Port completely different from the original. These
Scanning in which the target is scanned for the algorithms have been designed to be one-way
information from sources such as open ports, live functions, i.e. once the data has been transformed
systems, various services running on the host, into its respective hash value, it is practically
etc., Vulnerability Scanning in which the target is impossible to convert it back to its original form.
checked for weak points or vulnerabilities which SHA is of 3 types: SHA-1, SHA-2 and SHA-3.
can be exploited. This type of scanning is often Each of them has progressively stronger
achieved with the help of automated tools encryption to counteract any attack from the
and Network Mapping where the topology of the hacker. SHA-0 is obsolete because of its
network, routers, firewalls, etc. are found and then extensively exposed vulnerabilities. SHA is
a network diagram is drawn with the available commonly used for encrypting passwords since the
information. This network diagram map is touted server-side keeps track of only a user‟s hash value
to be very valuable throughout the process of rather than the actual password.
hacking.

3. Gaining Access—in this phase, the ethical hacker


breaks into the system/network using various
hacking tools and techniques. After entering the
system, he/she increases his privilege to the
administrator level in order to install the
applications he/she is going to require during the
process or modify/hide.

4. Maintaining Access—the main aim of this phase This helps when an attacker hacks the database
is to maintain access to the target system until the only to find the hashed functions and not the actual
ethical hacker can finish the tasks he/she has passwords. Additionally, if they try inputting those
planned to accomplish. Along with this the hacker hashed values as a password, the hash function
also has to build a shield against malicious will convert it into another string and
consequently, access will be denied. Also, the
modification of just a few letters that are being 4. MD5—MD5 or message-digest hashing
encrypted can cause an immense change in the algorithm is a one-way cryptographic function.
output. This is known as the Avalanche Effect. They help in comparing and storing smaller hashes
Contrariwise, different strings can produce similar than storing a large text of variable length. This
hash values. This causes the hash values to not algorithm is used by the Unix Systems for storing
divulge any information regarding the input string user passwords in a 128-bit encrypted format.
like the original length. SHAs also find their use in MD5 also helps in checking the integrity of the
the detection of data tampering by attackers. files. It is very easy to generate message-digests of
the original messages by using MD5. Despite all
2. DES—Data Encryption Standard (DES) is this, the MD5 algorithm is relatively slower than
a block cipher algorithm. It was published by the the SHA algorithm. Moreover, MD5 is more prone
National Institute of Standards and Technology to collision attacks.
(NIST). It is an implementation of a Feistel
Cipher, i. e., it uses plain text in the form
of blocks, each of 64 bits and converts them into
ciphertext using keys of 48 bits. It uses the same
key for encryption and decryption of data. Thus it
practices the symmetric key algorithm.

VIII. ADVANTAGES OF APPLYING ETHICAL HACKING IN BANKS


There is a sudden growth in the demand for an ethical
hacker, especially in the finance sector due to increasing
advancement in technologies. This has led to numerous
threats to the banking sectors
The advantages of hiring an ethical hacker in banks are—

1. Ethical hacking helps in protecting and


3. AES—Advanced Encryption Standard (AES) is safeguarding the system and information of the
a symmetric block cipher used by the US banks from getting into the hands of malicious
Government for protecting classified information. actors and being misused.
It is implemented in the form of software as well 2. Immense value is added to the banking firm if they
as hardware all over the world for encrypting practice and exercise ethical hacking efficiently
sensitive data. It has proven to highly beneficial and correctly.
for government‟s computer security, e-data 3. It helps in counter-acting the cyber-attacks and
protection, etc. The development of AES began in data security breaches on the banks.
1997 by the National Institute of Standards and 4. It helps in building a secure system for the banks
Technology (NIST) after Data Encryption to prevent penetration by malicious hackers.
Standard (DES) started becoming vulnerable to 5. It helps in detecting and identifying loopholes in a
brute-force attacks. AES is free for use in public, network or computer system of the banking firms
private, commercial, non-commercial programs
that provide encryption services. AES is made up
of 3 block ciphers: AES-128, AES-192 and AES-
256. The ciphers use the same key for encryption
and decryption, therefore the sender and the
receiver both must know and use the same secret
key. The government has classified information
into 3 categories: Confidential, Secret or Top
Secret. AES is one of the most sought after
encryption method. It is fast and secure and helps
in keeping prying eyes away from the data.
IX. DISAVANTAGES OF APPLYING ETHICAL HACKING IN [8] https://www.ukessays.com/essays/information-
BANKS systems/importance-of-ethical-hacking.php
[9] https://www.helpnetsecurity.com/2012/04/20/the-
There are disadvantages along with the advantages of importance-of-ethical-hacking/
ethical hacking in the banking sector. They are— [10] https://wowdigital.com/blog/importance-of-
network-security/
1. The important files of the banks might get [11] https://info.nutmegtech.com/it-insider-blog/the-
corrupted if the hacker is not skilled enough. importance-of-network-security
2. The gained information can be used for malicious [12] https://www.ecpi.edu/blog/importance-of-network-
use by ethical hacker. security-safety-in-the-digital-world
3. It is quite expensive and cost a lot to the banks [13] https://blog.eccouncil.org/types-of-hackers-and-
when hiring professionals. what-they-do-white-black-and-grey/
4. The baking firm‟s financial details are open for the [14] https://www.techfunnel.com/information-
ethical hacker to pry on. technology/different-types-of-hackers/
5. There is no guarantee that ethical hacker may/may [15] https://www.solarwindsmsp.com/blog/types-of-
not place/send malicious code, malware, viruses, network-security
etc. on bank‟s computer system or network [16] https://blog.eccouncil.org/what-is-network-
6. This method leads to a massive security breach security-types-of-network-security/
[17] https://enterprise.comodo.com/blog/what-is-
network-security/
[18] https://www.synopsys.com/glossary/what-is-
ethical-hacking.html
X. CONCLUSION [19] https://enterprise.comodo.com/blog/network-
Cyber-attacks on banks continue finding a way despite security/
improved cybersecurity infrastructures. Thus ethical [20] https://www.ecpi.edu/blog/how-does-network-
hacking experts are gradually becoming useful for banking security-work-is-this-something-i-could-learn
firms for determining weak areas within their systems that [21] https://study.com/academy/lesson/how-does-
can be penetrated by cyber-criminals. Due to the increasing network-security-
number of computer hacking cases, renowned companies, work.html#:~:text=Network%20security%20can%
financial institutions, government agencies, etc. have been 20be%20made,if%20they%20make%20it%20insi
compelled to recruit ethical hackers to look into the de.
vulnerabilities and possible security leaks of their computer [22] https://www.bankinfosecurity.com/interviews/we-
systems and also to protect and safeguard them from any need-ethical-hacking-i-1145
potential threat. Therefore, ethical hacking promises huge [23] https://www.cybrary.it/blog/2018/03/ethical-
prospects in the near future as a career. A fresher Ethical hacking-necessary/
hacker can draw a salary of up to 5 lakh per annum while [24] https://www.simplilearn.com/ethical-hackers-for-
an advanced hacker is looking at a salary of nearly 30 lakh businesses-
per annum. article#:~:text=To%20stop%20a%20hacker%2C%
20one,and%20networks%20of%20an%20organiza
tion.&text=Ethical%20hackers%20help%20in%20
improving%20the%20security%20of%20systems
ACKNOWLEDGMENT %20in%20organizations.
I am immensely grateful to my teacher Mrs M. S. Minu for [25] https://www.ecpi.edu/blog/why-do-we-need-
her guidance and constant support. Her indispensable help network-
and motivation encouraged me to work on this project. security#:~:text=What%20is%20Network%20Sec
Thank you. urity%3F,safe%20for%20all%20legitimate%20use
rs.
[26] https://www.tutorialspoint.com/ethical_hacking/et
hical_hacking_tools.htm
[27] https://blog.gigamon.com/2019/06/13/what-is-
REFERENCES
network-security-14-tools-and-techniques-to-
[1] https://www.greycampus.com/opencampus/ethical know/https://blog.eccouncil.org/certified-ethical-
-hacking/introduction-b0156166-4fa6-43ad-9b9f- hacker-ceh-certification-requirements/
54c2cb83fbb6 [28] https://www.guru99.com/skills-required-become-
[2] https://www.simplilearn.com/tutorials/cyber- ethical-hacker.html
security-tutorial/what-is-ethical-hacking [29] https://www.edureka.co/blog/advantages-and-
[3] https://www.forcepoint.com/cyber-edu/network- disadvantages-of-ethical-hacking/
security [30] https://www.edureka.co/blog/benefits-of-ethical-
[4] https://securitygladiators.com/ethical-hacking- hacking/
current-trends-growth-opportunities/ [31] https://www.rfwireless-
[5] https://blog.eccouncil.org/cybersecurity-trends-in- world.com/Terminology/Advantages-and-
2020-the-threats-facing-the-industry/ Disadvantages-of-Ethical-Hacking.html
[6] https://www.edureka.co/blog/importance-of- [32] https://www.lucidchart.com/blog/network-
ethical-hacking/ security-basics-and-benefits
[7] https://www.indiatoday.in/education-today/jobs- [33] https://www.solarwindsmsp.com/content/advantag
and-careers/story/ethical-hacking-1047211-2017- es-of-network-security
09-18
[34] https://www.avalan.com/blog/bid/334529/Advanta [44] https://www.indiatoday.in/education-today/jobs-
ges-Of-Network-Security and-careers/story/ethical-hacking-1047211-2017-
[35] https://qualitycrush.wordpress.com/2014/06/24/eth 09-
ical-hacking-advantages-and- 18#:~:text=The%20job%20of%20an%20ethical,to
disadvantages/#:~:text=Disadvantages%20of%20E %20fix%20these%20weak%20points.&text=Ethic
thical%20Hacking&text=Allowing%20the%20co al%20or%20white%20hat%20hackers,firms%20to
mpany's%20financial%20and,Massive%20security %20prevent%20cyber%20crime.
%20breach [45] https://brilliant.org/wiki/secure-hashing-
[36] https://www.studymode.com/subjects/advantages- algorithms/
and-disadvantages-of-network-security- [46] https://www.thesslstore.com/blog/difference-sha-
approaches-page1.html 1-sha-2-sha-256-hash-algorithms/
[37] https://www.fromdev.com/2019/04/is-there-a- [47] https://www.educative.io/edpresso/what-is-the-
future-for-ethical-hacking.html des-algorithm
[38] https://admissionguide.in/ethical-hacking-scope- [48] https://www.tutorialspoint.com/cryptography/data
and-future-ahead/ _encryption_standard.htm
[39] https://thinkitsolutions.com/future-of-network- [49] https://searchsecurity.techtarget.com/definition/Ad
security/ vanced-Encryption-Standard
[40] https://www.quora.com/What-is-the-current-trend- [50] https://www.comparitech.com/blog/information-
in-network-security security/what-is-aes-encryption/
[41] https://www.quora.com/How-do-hackers-hack- [51] https://www.educba.com/md5-
banks alogrithm/#:~:text=The%20MD5%20algorithm%2
[42] https://www.investopedia.com/articles/personal- 0is%20a,the%20integrity%20of%20the%20files.
finance/012117/cyber-attacks-and-bank-failures- [52] https://searchsecurity.techtarget.com/definition/M
risks-you-should-know.asp D5
[43] https://www.ptsecurity.com/ww-
en/analytics/banks-attacks-2018/

View publication stats

You might also like