Ethical Hacking & Countermeasures: EC-Council
Ethical Hacking & Countermeasures: EC-Council
Countermeasures
1 EC-Council
Ethical Hacking and Countermeasures
1 EC-Council
Ethical Hacking and Countermeasures
picked up on the story. Instead of using the more accurate term of “computer criminal,”
the media began using the term “hacker” to describe individuals who break into
computers for fun, revenge, or profit. Since calling someone a “hacker” was originally
meant as a compliment, computer security professionals prefer to use the term “cracker”
or “intruder” for those hackers who turn to the dark side of hacking. There are two types
of hackers “ethical hacker” and “criminal hacker”.
In their search for a way to approach the problem, organizations came to realize that one
of the best ways to evaluate the intruder threat to their interests would be to have
independent computer security professionals attempt to break into their computer
systems. This scheme is similar to having independent auditors come into an
organization to verify its bookkeeping records. In the case of computer security, these
“tiger teams” or “ethical hackers” would employ the same tools and techniques as the
intruders, but they would neither damage the target systems nor steal information.
Instead, they would evaluate the target systems’ security and report back to the owners
with the vulnerabilities they found and instructions for how to remedy them.
2 EC-Council
Ethical Hacking and Countermeasures
Ethical hackers typically have very strong programming and computer networking skills
and have been in the computer and networking business for several years. They are also
adept at installing and maintaining systems that use the more popular operating systems
(e.g., Linux or Windows 2000) used on target systems. These base skills are augmented
with detailed knowledge of the hardware and software provided by the more popular
computer and networking hardware vendors. It should be noted that an additional
specialization in security is not always necessary, as strong skills in the other areas imply
a very good understanding of how the security on various systems is maintained. These
systems management skills are necessary for the actual vulnerability testing, but are
equally important when preparing the report for the client after the test.
3 EC-Council
Ethical Hacking and Countermeasures
Given these qualifications, how does one go about finding such individuals? The best
ethical hacker candidates will have successfully mastered hacking tools and their exploits.
Once answers to these questions have been determined, a security evaluation plan is
drawn up that identifies the systems to be tested, how they should be tested, and any
limitations on that testing.
4 EC-Council
Ethical Hacking and Countermeasures
5 EC-Council
Ethical Hacking and Countermeasures
$45,000 for a standalone ethical hack. Taxes and applicable travel and living expenses
are extra.
Note: Excerpts taken from Ethical Hacking by C.C Palmer.
6 EC-Council
Ethical Hacking and Countermeasures
Not anyone can be a student — the Accredited Training Centers (ATC) will make sure the
applicants work for legitimate companies.
Course Objectives
This class will immerse the student into an interactive environment where they will be
shown how to scan, test, hack and secure their own systems. The lab intensive
environment gives each student in-depth knowledge and practical experience with the
current essential security systems. Students will begin by understanding how perimeter
defenses work and then be lead into scanning and attacking their own networks, no real
network is harmed. Students then learn how intruders escalate privileges and what steps
can be taken to secure a system. Students will also learn about Intrusion Detection, Policy
Creation, Social Engineering, Open Source Intelligence, Incident Handling and Log
Interpretation. When a student leaves this intensive 5 day class they will have hands on
understanding and experience in internet security.
Prerequisites
Working knowledge of TCP/IP, Linux and Windows 2000.
Duration
5 Days
7 EC-Council
Ethical Hacking and Countermeasures
Module 2: Footprinting
• Defining Footprinting.
• Information Gathering Methodology.
• Locate the Network Range.
• Hacking Tools:
o Whois
o Nslookup
o ARIN
o Traceroute
o NeoTrace
o VisualRoute Trace
8 EC-Council
Ethical Hacking and Countermeasures
o SmartWhois
o Visual Lookout
o VisualRoute Mail Tracker
o eMailTrackerPro
o e-mail Spider
o Wayback machine
Module 3: Scanning
• Definition of Scanning.
• Types of scanning
• Objectives of Scanning
• Scanning Methodology
• Classification of Scanning
• Hacking Tools
o Nmap
o Nessus
o Retina
o Saint
o HPing2
o Firewalk
o NIKTO
o GFI Languard
o ISS Security Scanner
o Netcraft
o IPsec Scan
o NetScan Tools pro 2003
o Super Scan
o Floppyscan
• War Dialer
• Hacking Tools
9 EC-Council
Ethical Hacking and Countermeasures
o THC Scan
o Friendly Pinger
o Cheops
o Security Administrator’s Tool for Analyzing Network
(SATAN)
o SAFEsuite Internet Scanner
o IdentTCPScan
o PortScan Plus
o Strobe
o Blaster Scan
• OS Fingerprinting
• Active Stack fingerprinting
• Tool for Active Stack fingerprinting
o XPROBE2
• Passive Fingerprinting
• Proxy Servers
• Hacking Tools
o Socks Chain
o Anonymizers
o HTTP Tunnel
o HTTPort
• Countermeasures
Module 4: Enumeration
• What is Enumeration?
• NetBios Null Sessions
• Hacking Tools
o DumpSec
o Winfo
10 EC-Council
Ethical Hacking and Countermeasures
11 EC-Council
Ethical Hacking and Countermeasures
12 EC-Council
Ethical Hacking and Countermeasures
13 EC-Council
Ethical Hacking and Countermeasures
14 EC-Council
Ethical Hacking and Countermeasures
• diskprobe.exe
• Covering Tracks
• Disabling Auditing and clearing Event Logs
• Hacking Tool
o Dump Event Log
o elsave.exe
o WinZapper
o Evidence Eliminator
• RootKit
• Planting the NT/2000 RootKit
• Hacking Tools
o Fu
o Vanquish
• Rootkit Countermeasures
• Hacking Tool
o Patchfinder 2.0
15 EC-Council
Ethical Hacking and Countermeasures
o Beast 2.06
o Phatbot
o Senna Spy
o CyberSpy
o Remote Encrypted Callback UNIX Backdoor (RECUB)
o Amitis
o QAZ
o Back Orifice
o Back Orifice 2000
o Tini
o NetBus
o SubSeven
o Netcat
o Subroot
o Let me Rule 2.0 Beta 9
o Donald Dick
o Graffiti.exe
o EliteWrap
o IconPlus
o Restorator
o Whack-a-mole
o Firekiller 2000
• BoSniffer
• Wrappers
• Packaging Tool : Wordpad
• Hard Disk Killer (HDKP 4.0)
• ICMP Tunneling
• Hacking Tool: Loki
• Loki Countermeasures
• Reverse WWW Shell – Covert Channels using HTTP
16 EC-Council
Ethical Hacking and Countermeasures
• Hacking Tools
o fPort
o TCP View
• Tripwire
• Process Viewer
• Inzider-Tracks Processes and Ports
• System File Verification
• Trojan horse Construction Kit
• Anti-Trojan
• Evading Anti-Trojan/Anti-Virus using Stealth Tools v 2.0
• Reverse Engineering Trojans
• Backdoor Countermeasures
Module 7: Sniffers
• Definition of sniffing
• How a Sniffer works?
• Passive Sniffing
• Active Sniffing
• Hacking Tool: EtherFlood
• Man-in-the-Midle Attacks
• Spoofing and Sniffing Attacks
• ARP Poisoning and countermeasures
• Hacking Tools
o Ethereal
o Dsniff
o Sniffit
o Aldebaran
o Hunt
o NGSSniff
17 EC-Council
Ethical Hacking and Countermeasures
o Ntop
o pf
o IPTraf
o Etherape
o Netfilter
o Network Probe
o Maa Tec Network Analyzer
o Snort
o Macof, MailSnarf, URLSnarf, WebSpy
o Windump
o Etherpeek
o Ettercap
o SMAC
o Mac Changer
o Iris
o NetIntercept
o WinDNSSpoof
o NetIntercept
o Win DNSpoof
o TCPDump
o Network Monitor
o Gobbler
o ETHLOAD
o Esniff
o Sunsniff
o Linux_sniffer
o Sniffer Pro
• Countermeasures
18 EC-Council
Ethical Hacking and Countermeasures
19 EC-Council
Ethical Hacking and Countermeasures
20 EC-Council
Ethical Hacking and Countermeasures
21 EC-Council
Ethical Hacking and Countermeasures
22 EC-Council
Ethical Hacking and Countermeasures
23 EC-Council
Ethical Hacking and Countermeasures
• Countermeasures
• Directory Traversal/Forceful Browsing
• Countermeasures
• Cryptographic Interception
• Authentication Hijacking
• Countermeasures
• Log Tampering
• Error Message Interception
• Attack Obfuscation
• Platform Exploits
• Internet Explorer Exploits
• DMZ Protocol Attacks
• DMZ
• Countermeasures
• Security Management Exploits
• Web Services Attacks
• Zero Day Attacks
• Network Access Attacks
• TCP Fragmentation
• Hacking Tools:
o Instant Source
o Wget
o WebSleuth
o Black Widow
o Window Bomb
• Burp: Positioning Payloads
• Burp: Configuring Payloads and Content Enumeration
• Burp
• Burp Proxy: Intercepting HTTP/S Traffic
24 EC-Council
Ethical Hacking and Countermeasures
25 EC-Council
Ethical Hacking and Countermeasures
o Brutus
o Obiwan
o Authforce
o Hydra
o Cain and Abel
o RAR
o Gammaprog
• Hacking Tools:
o WebCracker
o Munga Bunga
o PassList
o Read Cookies
o SnadBoy
o WinSSLMiM
• “Mary had a Little Lamb” Formula
• Countermeasures
26 EC-Council
Ethical Hacking and Countermeasures
o SQL2.exe
o AppDetective
o Database Scanner
o SQLPoke
o NGSSQLCrack
o NGSSQuirreL
o SQLPing v2.2
• OLE DB Errors
• Input Validation Attack
• Login Guessing & Insertion
• Shutting Down SQL Server
• Extended Stored Procedures
• SQL Server Talks
• Preventive Measures
27 EC-Council
Ethical Hacking and Countermeasures
28 EC-Council
Ethical Hacking and Countermeasures
• Sniffing Tools:
o AiroPeek
o NAI Sniffer Wireless
o Ethereal
o Aerosol v0.65
o vxSniffer
o EtherPEG
o Drifnet
o AirMagnet
o WinDump 3.8 Alpha
o ssidsniff
• Multi Use Tool: THC-RUT
• Tool: WinPcap
• Auditing Tool: bsd-airtools
• WIDZ- Wireless Detection Intrusion System
• Securing Wireless Networks
• Out of the box Security
• Radius: Used as Additional layer in security
• Maximum Security: Add VPN to Wireless LAN
Module 16 : Virus
• Virus Characteristics
• Symptoms of ‘virus-like’ attack
• What is a Virus Hoax?
• Terminologies
• How is a worm different from virus?
• Indications of a Virus Attack
• Virus History
• Virus damage
29 EC-Council
Ethical Hacking and Countermeasures
30 EC-Council
Ethical Hacking and Countermeasures
31 EC-Council
Ethical Hacking and Countermeasures
32 EC-Council
Ethical Hacking and Countermeasures
o Hunt
o TCP Wrappers
• Linux Loadable Kernel Modules
• Linux Rootkits:
o Knark
o Torn
o Tuxit
o Adore
o Ramen
o Beast
• Rootkit countermeasures:
o Chkrootki
o Tripwire
o Bastille Linux
o LIDS(Linux Intrusion Detection system)
o Dtk
o Rkdet
o Rootkit Hunter
o Carbonite
o Rscan
o Saint Jude
• Linux Security Tools:
o Whisker
o Flawfinder
• Advanced Intrusion Detection System (AIDE)
• Linux Security testing tools
o NMap
o LSOF
o Netcat
o Nemesis
33 EC-Council
Ethical Hacking and Countermeasures
34 EC-Council
Ethical Hacking and Countermeasures
35 EC-Council
Ethical Hacking and Countermeasures
Module 21 : Cryptography
36 EC-Council
Ethical Hacking and Countermeasures
• Public-key Cryptography
• Working of Encryption
• Digital Signature
• Digital Certificate
• RSA (Rivest Shamir Adleman)
• RSA Attacks
o Brute forcing RSA factoring
o Esoteric attack
o Chosen cipher text attack
o Low encryption exponent attack
o Error analysis
o Other attacks
• MD5
• SHA (Secure Hash Algorithm)
• SSL (Secure Socket Layer)
• RC5
• What is SSH?
• Government Access to Keys (GAK)
• RSA Challenge
• distributed.net
• PGP (Pretty Good Privacy)
• Code Breaking Methodologies
o Using Brute Force
o Frequency Analysis
o Trickery and Deceit
o One-Time Pad
• Cryptography Attacks
• Disk Encryption
• PGPCrack
• Magic Lantern
• WEPCrack
37 EC-Council
Ethical Hacking and Countermeasures
38 EC-Council
Ethical Hacking and Countermeasures
39 EC-Council
Ethical Hacking and Countermeasures
40 EC-Council
Ethical Hacking and Countermeasures
41 EC-Council
Ethical Hacking and Countermeasures
42 EC-Council
Ethical Hacking and Countermeasures
43 EC-Council
International Council of E-Commerce Consultants
67 Wall Street, 22nd Floor
New York, NY 10005-3198
USA
Phone: 212.709.8253
Fax: 212.943.2300
EC-Council