web security chapter#2
DESCRIPTION
Web security Chapter#2TRANSCRIPT
![Page 1: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/1.jpg)
Web SecurityIntroduction to Ethical Hacking, Ethics, and Legality
![Page 2: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/2.jpg)
Hacker
The term hacker conjures up images of a young computer whiz who types a few commands at a computer screen—and poof! The computer spits out passwords, account numbers, or other confidential data.HackingThe Process by which hacker spits out passwords, account numbers, or other confidential data is called hacking.
![Page 3: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/3.jpg)
Types of HackerHacker can be divided into three
groups1. Black Hats 2. White Hats3. Gray Hats
![Page 4: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/4.jpg)
White HatsWhite hats are the good guys.The ethical hackers who use their
hacking skills for defensive purposes.
White-hat hackers are usually security professionals with knowledge of hacking and the hacker toolset and who use this knowledge to locate weaknesses and implement countermeasures.
![Page 5: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/5.jpg)
White hats are those who hack with permission from the data owner.White hats hacker do hacking on
a contract only.
![Page 6: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/6.jpg)
Black hatsBlack hats are the bad guysThe hackers or crackers who use
their skills for illegal purposes. Having gained unauthorized
access,black-hat hackers destroy vital
data, deny legitimate users service, and just cause problems for their targets
![Page 7: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/7.jpg)
Gray Hacker Gray hats are hackers who may
work offensively or defensively.They may want to highlight
security problems in a systemThe difference between white
hats and gray hats is that permission word.
![Page 8: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/8.jpg)
Goals Attackers Try to Achieve
Confidentiality◦Information (Keep information safe)
Authenticity◦being authentic, trustworthy, or genuine.
Integrity◦Accuracy Its opposite is data corruption
Availability
![Page 9: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/9.jpg)
Some Useful TerminologyThreat
◦An environment or situation that could lead to a potential breach of security.
Exploit◦A piece of software or technology
that takes advantage of a bug, leading to unauthorized access
![Page 10: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/10.jpg)
Vulnerability◦software flaw, or logic design that
can lead to damaging instructions to the system
Target of Evaluation (TOE) ◦A system, program, or network that
is the subject of a security analysis or attack.
Attack
![Page 11: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/11.jpg)
The Phases of Ethical Hacking
The process of ethical hacking can be broken down into five distinct phases.
![Page 12: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/12.jpg)
Phase-I: Reconnaissance Passive reconnaissance
◦Passive reconnaissance involves gathering information about a potential target without the targeted individual’s or company’s knowledge.
◦Such as using “whois.com” or google.com etc
Active reconnaissance◦involves probing the network to discover
individual hosts, IP addresses, and services on the network. This process involves more risk of detection than passive reconnaissance
![Page 13: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/13.jpg)
Phase 2: ScanningScanning involves taking the information
discovered during reconnaissance and using it to examine the network.
Hackers are seeking any information that can help them perpetrate an attack on a target, such as the following:◦Computer names ◦Operating system (OS)◦ Installed software ◦ IP addresses ◦User accounts
![Page 14: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/14.jpg)
Phase 3: Gaining AccessPhase 3 is when the real hacking
takes place.Gaining access is known in the
hacker world as owning the system because once a system has been hacked, the hacker has control and can use that system as they wish.
![Page 15: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/15.jpg)
Phase 4: Maintaining Access
Once a hacker has gained access to a target system, they want to keep that access for future exploitation and attacks.
Once the hacker owns the system, they can use it as a base to launch additional attacks. In this case, the owned system is sometimes referred to as a “zombie system”.
![Page 16: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/16.jpg)
Phase 5: Covering TracksOnce hackers have been able to
gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action.
![Page 17: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/17.jpg)
Common Entry Points for an attack:
Here are the most common entry points for an attack:
1. Remote Network◦Attack through Internet, ◦Hacker Tried to break, or find
vulnerabilities in a network such as firewall, proxy etc.
2. Remote Dial-Up Network◦ A remote dial-up network hack tries to
simulate an intruder launching an attack against the client’s modem pools.
![Page 18: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/18.jpg)
3. Local NetworkThrough Local Area Network (LAN) or Wireless Local Area Network(WLAN)More secure then Dail-up
4. Stolen Equipment◦Some time hacker find useful
information from stolen equipment, such as usernames, password , security setting, and encryption types etc. from stolen Equipment
![Page 19: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/19.jpg)
5. Social Engineering◦Take information from organization
employees, or from help desk or using to common sense.
![Page 20: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/20.jpg)
Testing Types
Testing types can categorize on basis of knowledge of hacker about target.
1. Black-Box Testing◦Black-box testing involves
performing a security evaluation and testing with no prior knowledge of the network infrastructure or system to be tested.
◦Information gathering will take a long time.
![Page 21: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/21.jpg)
2. White-box testing◦White-box testing involves
performing a security evaluation and testing with complete knowledge of the network infrastructure
◦Hack will not spend time on information gathering
![Page 22: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/22.jpg)
3. Gray Box Testing◦Gray Box Gray-box testing involves
performing a security evaluation and testing internally.
◦Test the system against the employee of the organization.
![Page 23: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/23.jpg)
Security, Functionality, and Ease of Use Triangle
Functionality
Security
Ease of Use
![Page 24: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/24.jpg)
Ethical Hacking ReportThe result of a network penetration
test or security audit is an ethical hacking, or pen test report.
This report details the results of the hacking activity, the types of tests performed, and the hacking methods used
This document is usually delivered to the organization in hard-copy format, for security reasons.
![Page 25: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/25.jpg)
Keeping It Legal
The following steps (shown in Figure) are a framework for performing a security audit of an organization and will help to ensure that the test is conducted in an organized, efficient, and ethical manner
![Page 26: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/26.jpg)
Initial Client Meeting
Sign the Agreement
Security Evaluation Plan
Conduct the Test
Report and Documentation
Present the report
![Page 27: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/27.jpg)
Cyber LawsCyber Security Enhancement Act
and SPY ACTFreedom of Information Act
(FOIA)Federal Information Security
Management Act (FISMA)Privacy Act of 1974PATRIOT Act
![Page 28: Web security chapter#2](https://reader035.vdocuments.us/reader035/viewer/2022081519/5559953ed8b42ac7648b513e/html5/thumbnails/28.jpg)
Assignment
Write down Constitutional Acts of Islamic Republic of Afghanistan