Hacking which is authorised by owner of the target system, part of an organisation's overall security program, used to discover vulnerabilities of an organisation's IT assets for use to develop mitigation procedure
Objectives of ET0741 Network Hacking
Ethics of Ethical Hacking
Different Types of Hackers
Methodology of Ethical Hacking
Triad of Cybersecurity
Cyber Risk
Policies, Standards, and Procedures
Know Computer Misuse Act (Chapter 50)
Ethics of Ethical Hacking
Keep information you obtain as part of your ethical hacking private to protect employers and/or clients
Disclose information to the people who have engaged your services
Disclose potential conflicts of interest
Types of Hackers
Black Hats
White Hats
Grey Hats
Black Hat Hackers
Kevin Mitnick
Robert Morris
White Hat Hackers
Individuals professing to have hacker skills, using them for defensive purpose, also known as 'Security Analysts'
Grey Hat Hackers
Individuals who work both offensively and defensively at various times, may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker
Phases of Ethical Hacking Methodology
Reconnaissance and Footprinting
Scanning and Enumeration
Gaining Access
Maintaining Access
Covering Tracks
Active Reconnaissance/Footprinting
Information is gathered by actively engaging the target system
Passive Reconnaissance/Footprinting
Conducted without even touching the target system computer, can gain sensitive information via social engineering, physical break-in, dumpster diving
Objectives of Reconnaissance/Footprinting
Profile the organization, its business model, senior management, operations, office/production/warehouse location, administrative staff, IT systems, network infrastructure
Commonly used Reconnaissance/Footprinting techniques
Recruitment postings
Web searches
Whois database analysis
Domain Name System (DNS) interrogation
Scanning and Enumeration
Probe the target for vulnerabilities that can be exploited, extract services and versions, identify vulnerable services or resources that could be entry points
Gaining Access
If vulnerabilities are discovered, the attacker can exploit them to gain access at the operating system, application, or network level, or through denial of service
Maintaining Access
Attacker maintains access to revisit the target later without needing to re-compromise it, in case vulnerabilities have been fixed, or to provision a backdoor
Covering Tracks
Attackers attempt to delete evidence of access, alter logs and timestamps, to avoid detection and penalization
Triad of Cybersecurity
Confidentiality
Integrity
Availability
Confidentiality
Keeping data secret, authorised access, applies to data at rest and in transit, achieved via encryption
Integrity
Data has not been modified or corrupted, achieved via hashing
Availability
Information or services are available when required, easiest attribute to compromise
Cyber Risk Concepts
Asset
Threat
Vulnerability
Exploit
Security Policies
Define an organisation's intention regarding resources, what needs protection, how resources can be accessed, set expectations of employees, maintain confidentiality, integrity, and availability
Security Standards
Direction about how policies should be implemented, e.g. servers deployed should be on MS Windows Server 2018 or later
Security Procedures
Provide guidance about how standards are to be achieved, step by step instructions to perform a certain task
Security Guidelines
Not a standard, may not be required, suggestion of implementation
Hacking is illegal under the Computer Misuse and Cybersecurity Act (CMCA) (Cap 50A)
Key Sections of Computer Misuse Act
Unauthorised access to computer material
Access with intent to commit or facilitate commission of offence
Unauthorised modification of computer material
Unauthorised use or interception of computer service
Any police officer may arrest without warrant any person reasonably suspected of committing an offence under the Computer Misuse Act