Chapter 1
Chapter 1
Ethical hackers
Employed by companies to perform penetration tests
Penetration test
Legal attempt to break into a companys network to find
Security test
More than an attempt to break in; also includes analyzing
Hackers
Access computer system or network without authorization Breaks the law; can go to prison
Crackers
Break into systems to steal or destroy data
Ethical hacker
Performs most of the same activities but with owners
permission
Hands-On Ethical Hacking and Network Defense 4
Script
Set of instructions that runs in sequence
Hands-On Ethical Hacking and Network Defense 5
It usually takes years of study and experience to earn respect in the hacker community Its a hobby, a lifestyle, and an attitude
A drive to figure out how things work
Tiger box
Collection of OSs and hacking tools
Usually on a laptop
Helps penetration testers and security testers
company employees
Makes testers job a little easier
Hands-On Ethical Hacking and Network Defense 8
10
attack
11
12
13
14
Is it good?
15
16
Issued by the International Information Systems Security Certifications Consortium (ISC2) Usually more concerned with policies and procedures than technical details Web site
www.isc2.org
17
Top 20 list
One of the most popular SANS Institute documents Details the most common network exploits Suggests ways of correcting vulnerabilities
Web site
www.sans.org
Hands-On Ethical Hacking and Network Defense 18
19
Tools on your computer might be illegal to possess Contact local law enforcement agencies before installing hacking tools
Written words are open to interpretation Governments are getting more serious about punishment for cybercrimes
Hands-On Ethical Hacking and Network Defense 20
21
Some states deem it legal Not always the case Federal Government does not see it as a violation
Allows each state to address it separately
24
25
Be careful your actions do not prevent customers from doing their jobs
Hands-On Ethical Hacking and Network Defense 26
Ch 1l1: Lycos starts anti-spam screensaver plan: Dec 2, 2004 Ch 1l2: Lycos Pulls Anti-Spam 'Vigilante' Campaign -- Dec 3, 2004 Ch 1l3: Lycos's Spam Attack Network Dismantled -- Spammers sent the DOS packets back to Lycos -- Dec 6, 2004
27
Ch 1m: Blue Frog begins its "vigilante approach" to fight spam -- July, 2005 Ch 1n: Russian spammer fights back, claims to have stolen Blue Frog's database, sends threating email -- DOS attack in progress -May 2, 2006 Ch 1o: Blue Frog compromised and destroyed by attacks, urgent instructions to uninstall it, the owners have lost control -May 17, 2006
Hands-On Ethical Hacking and Network Defense 28
Ch 1p: Call for help creating distributed, open-source Blue Frog replacement -- May 17, 2006
29
Internet can also be a useful resource Have an attorney read over your contract before sending or signing it
Hands-On Ethical Hacking and Network Defense 30
personnel
Understanding of the laws
31