Ethical hacker

From Citizendium
Revision as of 20:00, 10 March 2012 by imported>David Drever (→‎Notable White Hats)
Jump to navigation Jump to search
This article is developed but not approved.
Main Article
Discussion
Definition [?]
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable, developed Main Article is subject to a disclaimer.

An ethical or “white hathacker is the term given to an expert in information technology security. Ethical, meaning they do not use their skills to access systems for personal gain (this is the term given to a “black hat” or non-ethical hacker), but instead use their knowledge and experience to test systems for exploits and vulnerabilities to protect these systems.[1]

History of the Ethical Hacker

Ethical hacking began as early as the 1970’s when the US government attempted to hack it’s own system.[2] Later, in the 1980’s ethical hacking moved into the telecommunications business where they had been targets of “cybervandals” trying to damage local telephone companies. In the 1990’s as banks became more available online, they too began to make use of ethical hacking to protect themselves. Following shortly behind the banks came e-commerce websites (think Amazaon) who also made use of ethical hacking to protect themselves.[3]

What an ethical hacker looks for

A White Hat will use ethical hacking methods to answer three basic questions:

  1. What can an intruder see on the target systems?[4]
    • What data is available to a hacker should he\she gain access to the systems? This could be anything from pictures to business documents to information databases.
  2. What can an intruder do with that information?[4]
    • Can the intruder read the data, copy the data or even delete the data? Can they modify the data they gain access to in any way?
  3. Does anyone at the target notice the intruder’s attempts or successes?[4]
    • Are there any alerts should a hacker gain access to the target system? This is probably the most important question that a White Hat will answer because it indicates how long an attacker may attempt to gain access to a system before they succeed fully (and they will eventually given enough time).

Methods an ethical hacker will use to obtain their data

A ethical hacker will make use of both technological and non-technological methods to reach their goals.

Penetration Testing

Penetration testing is the simulation of an attack by a true “Black Hat” hacker. Penetration is the use of different methods, techniques and tools to test and evaluate the strength of an organization’s security and to detect if any vulnerabilities exist. Penetration testing unlike other forms which theorize a systems vulnerability will actively test an organization’s security system by using real “system hacking” techniques to try and break through. A penetration test will attempt to use the same methods that a hostile attacker will attempt to use to gain access through an organizations security.[5] A penetration test will take one of two possible approaches.

  • “Black Box” – like most things, black box relates to having no knowledge of the inner workings of what you are assessing\testing\viewing. In the case of penetration testing; black box means the testers have no working knowledge of the target other than the target’s name prior to the commencement of the penetration test.[6] The testers must use different methods to obtain the information themselves that will allow them to access the target’s systems.
  • “White-Box” – as with black box, the definition of white box in penetration testing follows the same lines as other areas of IT. White box means the testers know the inner workings of the target right down to the hardware being used.[6] They know the infrastructure of the network and the security configurations allowing them to find vulnerabilities before they even attempt a penetration test.

Social Engineering

Where penetration testing uses technology to gain access to a system social engineering is noticeably lacking in technology. Social engineering is the act of manipulating a person to accomplish goals that may or may not be in the best interest of the target. Like penetration testing the goal is to gain information, gain access to a system(s), unlike penetration testing; social engineering has an added goal of attempting to have the target themselves perform a certain action.[6]Social engineering can make use of the following approaches:

  • Pretexting - Lying to the target in order to obtain privileged information. The pretext is the hacker’s motive.[7]
  • Diversion Theft - Used mostly with theft, but still considered a Social Engineering method. The purpose is to convince a legitimate delivery person who is bringing a delivery to an address, that the package is requested some where else.[8]
  • Phishing - The use of email or websites to gather personal information by pretending to be a trustworthy organization.[9] For example, an ethical hacker may send an email, pretending to be a member of the organizations IT support team in order to have the user provide them with login credentials. They could go further by creating a custom website to pose as a password reset application for the company in order to get passwords and login information.
  • IVR or phone phishing (aka. Vishing) - The use of a Interactive Voice Response (IVR) system to create an official sounding Bank IVR system to trick people into providing their personal information. An example is where a hacker will pose as a bank employee or they will even use another IVR message to advise the target they have to call into the bank to correct an issue. They provide a number (not the bank’s) for the target to call in on and when he\she does, they record their account information as it is entered into the phone.[10] A hacker could even perform something similar in that they perform the same method, but instead attack a company employee in order to have them attempt to enter their password via the telephone.
  • Baiting - A hacker will leave a CD-Rom or USB flash drive where it is sure to be found. When a person places the unit into their system it installs Malware (possibly viruses).[11] This malware could simply cause issues on a target’s system or could even be used to pass personal information back to the hacker. Baiting is one of the only social engineering methods that will use technology to attain its goals.
  • Quid pro quo - The term Quid pro quo basically means something for something. In this case, a hacker will attempt to gain information by giving something in return.[12] An example would be a hacker calling a company employees one at a time, posing as a member of IT and stating they are calling to help them with their computer problem. Eventually, they are going to get to someone who actually made a call to get support and now they have an easy way to gain that employee’s passwords.
  • Tailgating - An attacker can gain access to a restricted, locked down area by following someone into the restricted area who does have access and acting like they belong.

Tools of the Ethical Hacker

Although ethical hacking based on social engineering uses very little technology, penetration testing uses it extensively. Here are some of the tools that are used by ethical hackers to protect systems:

  • Nmap - Creates a map of a network by discovering hosts and services in the computer network. It further aids by detecting the OS that is running on a system. This will allow for OS specific penetration tests (are the systems patched to protect from known vulnerabilities)[13]
  • Nessus- Scans for vulnerabilities in a computer system and network. It can scan for known remote vulnerabilities (unpatched), poor configuration of systems (bad email relays), checks to see if common default passwords are still in use and it can also attempt to perform denial of service attacks[14]
  • THC Hydra - Is a brute force password cracking tool. It has ability to access data from a website and attempt logins that way. It is not limited to website logins, but can access a number of protocols including ftp.[15]
  • Cain & Abel - A password recovery tool that uses a multitude of methods to determine user passwords. It can scan networks, use brute-force and dictionary methods of checking passwords and it can even scan VoIP conversations to find passwords.[16]

Notable White Hats

  • Robert Hansen - CEO and Founder of Sectheory LTD. Designed an application “Fierce” that determines IP addresses that will allow for easier attacking of a target (used to protect, not attack companies).[17]
  • Greg Hoglund - Specializes in rootkits and buffer overflows. Found many vulnerabilities to World of Warcraft.[17]
  • Dan Kaminsky - Discovered and developed a resolution for a severe DNS protocol issue that could have caused mass Internet disruption.[17]
  • Marc Maiffret - Once a Black Hat hacker himself, he instead became a protector of Windows based computers. Discoving many vulnerabilities. He even played a role in discovering and researching the “Code Red” virus.[17]

References