Hacking: Don't Learn To Hack - Hack To Learn
Hacking: Don't Learn To Hack - Hack To Learn
Hacking: Don't Learn To Hack - Hack To Learn
• Foot printing
• Scanning
• Enumeration
• Gaining access
• Escalating privilege
• Covering tracks
• Creating backdoors
• Denial of service
• Phishing
Foot printing
• Objective
– To learn as much as you can about target
system, it's remote access capabilities, its
ports and services, and the aspects of its
security.
• Techniques
– Open source search
– Whois
– Web interface to whois
– ARIN whois
Scanning
• Objective
– Bulk target assessment and identification
of listing services focuses the attention on
the most promising avenues of entry
• Techniques
– Ping sweep
– TCP/UDP port scan
– OS Detection
Enumeration
• Objective
– More intrusive probing now begins as
attackers begin identifying valid user
accounts or poorly protected resource
shares
• Techniques
– List user accounts
– List file shares
– Identify applications
Gaining Access
• Objective
– Enough data has been gathered at this
point to make an informed attempt to
access the target
• Techniques
– File share brute forcing
– Password file grab
– Buffer overflows
– Password eavesdropping
Escalating Privileges
• Objective
– If only user level access was obtained in
the last step, the attacker will now seek to
gain the complete control of the system
• Techniques
– Password cracking
– Known exploits
Covering Tracks
• Objective
– Once total ownership of the target is
secured, hiding this from system
administrators become paramount ,lest
they quickly end the romp.
• Techniques
– Clear logs
– Hide tools
Denial of Service
• Objective
– If an attacker is unsuccessful in gaining
access ,they may use readily available
exploit code to disable a target as a last
resort.
• Techniques
– SYN flood
– Identical SYN requests
– Overlapping fragment/offset bugs
– DDOS
Ethical Hacking And Security.