Ethical Hacking :
Ethical hacking techniques - DEV Community
Types :
What Are The Five Steps Of Ethical Hacking? - DEV Community
-
Social engineering : exploit human psychology, rather than technical security gaps to gain access to data and applications. They trick legitimate users into submitting their passwords or installing malicious software that grants them access to network machines and services.
-
Web application hacking : Vulnerabilities that manipulate the application :
-
Hacking wireless networks
-
System hacking (hacking personal computer and servers)
Crashtest Security offers a comprehensive suite of testing tools that help you identify threats within your application.
Methods :
Ethical hacking techniques - DEV Community
- predictive analytics models is one of the main uses of AI and ML in cybersecurity. These models look for trends and abnormalities that can point to a potential security problem by analyzing data from a range of sources, including network traffic, user behaviour, and system logs.
- Internet of Things testing’s objective is to identify any security flaws in IoT hardware, communication protocols, and the networks they use by network mapping, device identification, firmware analysis, penetration testing, and vulnerability scanning.
- Social engineering attacks, such as phishing and pretexting
- Red teaming involves simulating a real-world attack scenario to identify potential vulnerabilities and test an organization’s incident response capabilities.
- Bug bounty programs allow organizations to incentivize ethical hackers to identify potential vulnerabilities in their systems and report them in exchange for a reward.
Steps :
-
Reconnaissance : hacker documents the organization’s request, finds valuable configuration and login information of the system, and probes the networks. Informations such as :
- Naming conventions
- Services on the network
- Servers handling workloads in the network
- IP Addresses
- Names and Login credentials of users connected to the network
- Physical location of target machine
-
Penetration testing :
- Network Mapping : This involves discovering the network topology, including host information, servers, routers, and firewalls within the host network. Once mapped, white hat hackers can visualize and strategize the next steps of the ethical hacking process.
- Port Scanning : Ethical hackers use automated tools to identify any open ports on the network. This makes it an efficient mechanism to enumerate the services and live systems in a network, and how to establish a connection with these components.
- Vulnerability Scanning : The use of automated tools to detect weaknesses that can be exploited to orchestrate attacks.
Tools for scanning :
- SNMP Sweepers
- Ping sweeps
- Network mappers
- Vulnerability scanners
-
Gaining Access : Attempting to send a malicious payload to the application through the network, an adjacent subnetwork, or physically using a connected computer. Tools to simulate attempted unauthorized access,
- Buffer overflows
- Phishing
- Injection attacks
- XML External Entity processing
- Using components with known vulnerabilities.
If the attacks are successful, the hacker has control of the whole or part of the system and may simulate further attacks such as data breaches and Distributed Denial of Service (DDoS).
-
Maintaining Access : involves processes used to ensure the hacker can access the application for future use. A white-hat hacker continuously exploits the system for further vulnerabilities and escalates privileges to understand how much control attackers can gain once they get past security clearance. Some attackers may also try to hide their identity by removing any evidence of an attack and installing a backdoor for future access.
-
Clearing Tracks : To avoid any evidence that leads back to their malicious activity, hackers perform tasks that erase all traces of their actions. This includes :
- Uninstalling scripts/applications used to carry out attacks
- Modifying registry values
- Clearing logs
- Deleting folders created during the attack For those hackers looking to maintain undetected access, they tend to hide their identity using techniques such as :
- Tunneling
- Stenography