CEH Notes
CEH Notes
Classification of attacks;
- Passive Attacks; doesnt tamper with the data and involve interceoting and
monitoring network traffic(e.g footprinting, sniffing/eavesdropping, network
traffic analysis, decryption of weaking encrypted traffic)
- Active attacks; tampers with the data and disrupts the communication
- Close-in-attacks; when the attacker is in close physical proximity with the
targets system/network; eg is social engineering
- Insider Attacks; involves using privileged access to violate rules(eg is
eavesdropping and wiretapping, social engineering, theft of device, data theft, pod
slurping, plating keyloggers, backdoors or malware)
- Distribution Attacks; when attacks tampers with hardware or software prior to
installation(modification of software or hardware during production or
distribution)
Categories;
- Command and control warfare(C2 Warfare); impact an attacker possess over a
compromised system or network they controll
- Intelligence-based warfare; sensorbased tech that directly corrupts tech systems.
- Electronic Warfare; uses radio-electronic and cryptographic techniques to degrade
comm.
- Psychological warfare; use of propaganda and terror to demoralize opponents
- Hacker warfare; to shutdown systems, data errors, data theft etc
- Economic warfare; affects the economy of a business or nation by blocking the
flow of ifo.
- cyberwarfare; the use of info systems against the virtual personas of individuals
or grouos
TTPs;
- Tactics; Guidelines that describe the way an attacker performs an attack from
beginning to end
- Techniques; Technical methods used by an attacker to achieve intermediate results
during attacks
- Procedures; are organisational approaches that theat actors follow to launch an
attack
Adversary Behaviours;
- Internal reconnaisance
- Use of powershell
- unspecified proxy activities
- use of command-line interface
- http user agent
- command and control server
- use of DNS tunneling
- use of web shell
- data staging
Indicators of compromise;
indicates a potential intrusion or malicios activity
Categories;
- Email Indicators
- network indicators
- host-based indicatiors
- behavioral indicators
Hacking concepts
Hacking - exploiting system vulnerabilities and compromising security controls
Hacking classes;
- Black hats; bad hackers. Resort to destructive activities. AKA; Crackers
- White hackers; hack for defensive purposes. AKA; SEcurity analysts.
- Gray Hats; work both defensively and offensively
- Suicide hackers; not worries about facing jail or punishment
- script kiddies; unskilled hacker who compromises a system by running scripts,
tools and software
- cyber terrorists; motivated by religios or political beliefs to create fear
- state-sponsored terrorist; employed by the government
- Hackivist; promotes political agenda by hacking, defacing/disabling websites
Hacking Phase;
- Reconnaissance;
* Passive Reconnaissance; involves acquiring info without interating with
target directly
* Active Reconnaissance; directly interacting with the targets
- Scanning
* Pre attact phase
* port scanner
* extract info
- Gaining access
- Maintaining access; backdoors, roottkits or trojans
- Clear tracks(using Pstools, netcat, trojans to erase their footprint from the
systems log files)
Ethical hacking - Involves the use of hacking tricks and techniques to identify
vulnerabilities and ensure system security
Info Security Controls; prevent the occurrence of unwanted events and reduce risk
to the organisation information assets.
Defence in Depth;
Security strategy in which several protection layers are placed throughout an info
system
Data - Application - Host - Perimeter - Physical - Policies, procedures and
awareness
Risk; the degree of uncertainty or expectation that an event may cause damage
Risks = Threats * Vulnerabilities
Risks = Threats * Vulnerabilities * Asset value
Cyber threat intelligence(CTI); The collection and analysis of info about threat
and adversaries and the drawing of patterns that provide the ability to ake
knowlegeable decisions
Helps to mitigate risks by converting unknown threats to known threats
Types of Threat Intelligence;
- Strategic; High level info on changing risk(consumed by high level executives) -
long term issues
- Tactical; Info on attackers TTPs(consumed by IT services and SOC managers)
- Operational; Info on a specific incoming attack(consumed by security managers and
network defenders)
- Technical; Infoon specific indicators of compromise(consumed by SOC staff and IR
Teams)
Incident Management;
- Vulnerability Handling
- Artifact Handling
- Announcements
- Alerts
- Incident Handling(Triage, Incident Response, Reporting & Detection, Incident
Response, Analysis)
Incident Handling & Response; Process of taking organized and careful steps when
reacting to a security incident
Process;
- Preparation; performing audit of resources and assets to deteermine the purpose
of security.
- Incident Recording and assignment; Initial reporting and recording of the
incident
- Incident Triage; Identified security incidents are analyzed, validated,
categorized and prioritized.
- Notification; Informs various stakeholders about the identified incident.
- Containment; Helps to prevent the spread of infection to other organisational
assets, preventing additional damage.
- Evidence Gathering and Forensic;
- Eradication; removal of root cause
- Recovery; restores affected systems, data through recovery
- Post-Incident Activities; additional review and analysis before closing the
matter
ISO/IEC 27001:2013;
Requirements for establishing, implementing, maintaaining and continually improving
the ISMS within the organisation
MODULE 02
Footprinting and Reconnaissance
Footprinting is the first step of any attack on info systems in which an attacker
collects info about target network to identify various ways to intrude into the
systems
Types;
- Passive footprinting; gathering info about the target without direct interaction
- Active footprinting; gathering info about the target woth direct interaction
Footprinting techniques;
- Footprinting through search engines;
- Footprinting through web services
- Footprinting through social networking sites
- website footprinting
- Email foorprinting
- Whois footprinting
- DNS footprinting
- Network footprinting
- Social engineering
- Gathering info from financial services(Google finance, MSN, Money and Yahoo!
Finance)
- Footprinting through job sites