network hack L1

Subdecks (2)

Cards (69)

  • Ethical Hacking
    Hacking which is authorised by owner of the target system, part of an organisation's overall security program, used to discover vulnerabilities of an organisation's IT assets for use to develop mitigation procedure
  • Objectives of ET0741 Network Hacking
    • Ethics of Ethical Hacking
    • Different Types of Hackers
    • Methodology of Ethical Hacking
    • Triad of Cybersecurity
    • Cyber Risk
    • Policies, Standards, and Procedures
    • Know Computer Misuse Act (Chapter 50)
  • Ethics of Ethical Hacking
    • Keep information you obtain as part of your ethical hacking private to protect employers and/or clients
    • Disclose information to the people who have engaged your services
    • Disclose potential conflicts of interest
  • Types of Hackers
    • Black Hats
    • White Hats
    • Grey Hats
  • Black Hat Hackers
    • Kevin Mitnick
    • Robert Morris
  • White Hat Hackers
    Individuals professing to have hacker skills, using them for defensive purpose, also known as 'Security Analysts'
  • Grey Hat Hackers
    Individuals who work both offensively and defensively at various times, may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker
  • Phases of Ethical Hacking Methodology
    • Reconnaissance and Footprinting
    • Scanning and Enumeration
    • Gaining Access
    • Maintaining Access
    • Covering Tracks
  • Active Reconnaissance/Footprinting
    Information is gathered by actively engaging the target system
  • Passive Reconnaissance/Footprinting
    Conducted without even touching the target system computer, can gain sensitive information via social engineering, physical break-in, dumpster diving
  • Objectives of Reconnaissance/Footprinting
    • Profile the organization, its business model, senior management, operations, office/production/warehouse location, administrative staff, IT systems, network infrastructure
  • Commonly used Reconnaissance/Footprinting techniques
    • Recruitment postings
    • Web searches
    • Whois database analysis
    • Domain Name System (DNS) interrogation
  • Scanning and Enumeration
    Probe the target for vulnerabilities that can be exploited, extract services and versions, identify vulnerable services or resources that could be entry points
  • Gaining Access
    If vulnerabilities are discovered, the attacker can exploit them to gain access at the operating system, application, or network level, or through denial of service
  • Maintaining Access
    Attacker maintains access to revisit the target later without needing to re-compromise it, in case vulnerabilities have been fixed, or to provision a backdoor
  • Covering Tracks
    Attackers attempt to delete evidence of access, alter logs and timestamps, to avoid detection and penalization
  • Triad of Cybersecurity
    • Confidentiality
    • Integrity
    • Availability
  • Confidentiality
    Keeping data secret, authorised access, applies to data at rest and in transit, achieved via encryption
  • Integrity
    Data has not been modified or corrupted, achieved via hashing
  • Availability
    Information or services are available when required, easiest attribute to compromise
  • Cyber Risk Concepts

    • Asset
    • Threat
    • Vulnerability
    • Exploit
  • Security Policies
    Define an organisation's intention regarding resources, what needs protection, how resources can be accessed, set expectations of employees, maintain confidentiality, integrity, and availability
  • Security Standards
    Direction about how policies should be implemented, e.g. servers deployed should be on MS Windows Server 2018 or later
  • Security Procedures
    Provide guidance about how standards are to be achieved, step by step instructions to perform a certain task
  • Security Guidelines
    Not a standard, may not be required, suggestion of implementation
  • Hacking is illegal under the Computer Misuse and Cybersecurity Act (CMCA) (Cap 50A)
  • Key Sections of Computer Misuse Act
    • Unauthorised access to computer material
    • Access with intent to commit or facilitate commission of offence
    • Unauthorised modification of computer material
    • Unauthorised use or interception of computer service
  • Any police officer may arrest without warrant any person reasonably suspected of committing an offence under the Computer Misuse Act