ETHICAL HACKING

Page 1

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCURE IN UKRAINE

Introduction to Ethical Hacking

03/31/2023 1
USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
Dr. Kemal Akkaya

COURSE OVERVIEW DESCRIPTION

• The main objective of this course is to provide the foundations of network security standards applications, and present some of the attacks and defense solutions.

• The goal is to expose students to the knowledge and capabilities to start applying security best practices and supporting network security using various tools.

• The topics will cover the protocols for cybersecurity, ethical hacking, ethics, security fundamentals, scanning networks, system hacking, attacks, and defense.

3/07/2023 2 USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY

OUTCOMES

• Introducing the foundations of network security standards, and their applications.

• Understanding scanning networks, and system hacking.

• Gaining knowledge on applying security best practices and supporting network security using various tools.

• Identifying the increasing threat of exploiting an existing bug or vulnerability in Ethical Hacking with some basic hands-on experience.

• Understanding the difference between Ethical Hacking and illegal Hacking in terms of breaching a security system and detecting potential security threats.

3
USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 3/07/2023

EVALUATION

• There will be 2 quizzes

• The first one (40 points)

• The second one (60 points)

4 USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 3/07/2023

WEEK1 INTRODUCTION TO NETWORKING & SECURITY FUNDAMENTALS

 Review networking topics,TCP/IP, Protocols, and system modeling.

 Review of security fundamentals

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 5 3/07/2023

WEEK 2 ETHICAL HACKING & ETHICS

 Definition of Ethical and Unethical Computer Hacking.

 Identify the groups and the classes of different hackers.

Importance of ethical hacking and its stages such as Reconnaissance and Footprinting, Scanning and Enumeration, Gaining Access, Maintaining Access, and Covering Tracks.

6
 USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 3/07/2023

WEEK 3 FOOTPRINTING & RECONNAISSANCE

• Examine information available to an ethical hacker and its targets.

• Learning the locations to acquire information about your target.

• Learning about Domain Name System (DNS) and ways to gather information from the DNS servers.

7
USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 3/07/2023

WEEK 4 SCANNING NETWORKS & ENUMERATION

• Performing a port scan on the target system after doing the reconnaissance and gathering  information.

• Learning about vulnerability scanners and their processes.

• Learning about SMB, SNMP, and MIB protocols.

8 USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 3/07/2023

WEEK 5 SYSTEM HACKING

• Learning about hacking a target system using a list of vulnerabilities, looking for exploits, and  penetration testing.

• Learning about different methods of gaining access and post-exploitation activities to the target machine.

9 USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 3/07/2023

WEEK 6 MALWARE

• Examine the different types of malware.

• Learning about how malware spreads and infects the target machine.

• Learning about analyzing malware dynamically or statically as well as antimalware.

10
USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 3/07/2023

WEEK 7 SNIFFING

• Examine network packet sniffing.

• Learning different software for capturing packets using Ethereal and Wireshark.

11 USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 3/07/2023

WEEK 8 ATTACKS & DEFENSE

• Learning about different attacks for web applications.

• Different types of defensive strategies.

• Types of Denial of Service (DoS) attacks.

12 USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 3/07/2023

WEEK 9 PASSWORDS

 Password-based authentication.

 Examining Password security risks and policies.

Unix-type Passwords and their maintenance.

13
 USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 3/07/2023

LABS BASIC HANDS-ON EXPERIENCE DESCRIPTION

1. Executing a TCP/IP model using Network Simulator 3

• The goal of this lab is to introduce the use of NS3 and implement an existing protocol such asTCP/IP.

2. Setting Up a Kali Linux Sandbox | AllVirtual Machines

• The goal of this lab is to provide the necessary steps to setup a Kali Linux, Windows XP, and Metasploitable 2 machines to use for the upcoming labs.

3. Open-Source Intelligence (OSINT) | Reconnaissance

• The objective of this lab is to expose the students to various ways of collecting data that is publicly available using Google Dorking and Email Harvester.

• WHOIS, HOST, NSLOOKUP, and DIG.

14 USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
3/07/2023

LABS BASIC HANDS-ON EXPERIENCE DESCRIPTION

• The objective of this lab is to determine which systems are accessible and the services/ports that are accessible with an active connection to target hosts.

• Host Discovery, Nmap, Enumerate SMB Protocol, Nbtscan, and Snmpwalk.

• The purpose of this lab is to identify known vulnerabilities and associated Metasploit exploits and payloads to compromise the target system.

• Metasploit, msfconsole, Exploits, Networking & Metasploit Core commands.

• The goal of this lab is to learn how to use the Metasploit framework and build your own malware and see how many anti-virus programs will detect it as malware.

• Reverse_tcp, Msfvenom,Trojanize file, and VirusTotal.

4. Scanning Networks | Enumeration 5. System Hacking 6. Malware
15 USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
3/07/2023

LABS BASIC HANDS-ON EXPERIENCE DESCRIPTION

7. Sniffing

• The purpose of this lab is to capture data transmitted over a network (wired or wireless) looking for a protocol and HTTP traffic.

• Wireshark,Testfire.net, Ettercap, and Driftnet.

8.Attacks and Defense

• The goal of this lab is to conduct a web vulnerability assessment and conduct simple scans.

• Zap scanner, simple scan, and Metasploitable 2.

9. Passwords

• The objective of this lab is to learn how to use John the Ripper to crack passwords.

• Hash Crack, Rainbow tables, Salt tables, and John the Ripper.

16
USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 3/07/2023
Hardware/Software 1. Hardware • PC/Laptop 2. Software • OracleVirtualBox | https://www.virtualbox.org/wiki/Downloads
Linux OS (Kali Linux) | https://www.kali.org/get-kali/#kali-installer-images
Metasploitable 2 | https://docs.rapid7.com/metasploit/metasploitable-2/
Windows OS (Windows XP) | will be provided 2/27/2023 17 USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
03/31/2023 18 USAID CYBERSECURITY IN UKRAINE ACTIVITY kakkaya@fiu.edu Thank You | Questions?

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
ETHICAL HACKING by USAID Cybersecurity Activity - Issuu