Ethical hacking Overview , This post is belongs to the module of How to learn Ethical hacking Freely
Here you learn what is the role of an ethical hacker and what you can and what you cannot do as an ethical hacker.One more thing i want to mention that It Takes Time to Become a Hacker. So have pateince and google is the best way you can learn.
Hacking is a hobby, a lifestyle, and an attitude , A drive to figure out how things work.Before Starting you must know about what is hacking and the type Of hackers.
Types of hacker !!
Several subgroups of the computer underground with different attitudes and aims use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie.
A Cracker or Cracking is to “gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system”. These subgroups may also be defined by the legal status of their activities.
As many of newbies asking this quetion so for all these people who are new at this whole Scenerio and do not really understand what hacking is all about and where to begin, I offer up these links to some great places to start learning.
http://www.lessig.org/freeculture/free.html <– A speech given talking all about the problems facing culture when dealing with copyright and other digital laws.
http://www.grc.com/SecurityNow.htm <– This is fantastic for people who are new to the field. If you have the time or motivation, go back and listen to them from day 1, they assume you know very little if anything and hit on all of the major topics in the security field. Fantastic show.
http://www.binrev.com/ <– Produce a good IPTV show and also have forums that are usually helpful.
http://www.hak5.org <— Duh….
http://www.remote-exploit.org <– Pretty good resources, some very nice video tutorials on various exploits. Defiantly check out the tutorial section.
http://www.irongeek.com/ <– Excellent tutorials/information/articles.
http://www.antionline.com/ <– Tutorials, tools and forums full of helpful people.
Teach Yourself C in 21 Days: http://neonatus.net/C/index.html
Teach Yourself C++ in 21 Days: http://cma.zdnet.com/book/c++/
The Art of Assembly Language Programming: http://maven.smith.edu/~thiebaut/ArtOfAssembly/artofasm.html
Microsoft Developers Network: http://msdn.microsoft.com
If you are interested in websec (web security) you should pretty much understand the different protocols on the web, i.e TCP/IP, FTP, HTTP, SSH, etc.
Knowledge of HTML, PHP, ASP, SQL, Perl, and Python is good.
Watching/reading papers or videos from past conventions such as Shmoocon, DefCon, or BlackHat, is a good idea.
And last but not he least is Crazylearner.
May be some of the best site is still left. so share your best site in comment section.Please contribute to this post.
Disclaimer : This information is just for educational purpose. If someone use in malicious activity then only he is responsible for it.
List of Top 5 Ethical Hacking Course
One of my reader ask me about Ethical courses so i try to put little info about top 5 ethical hacking course.And its also a first module on How To Learn Ethical Hacking
CEH (Certified Ethical Hacker)
The Certified Ethcial Hacker is a professional certification provided by EC-Concil. EC-council is world’s largest computer security certification provider organisation.A Certified Ethical Hacker has obtained a certification in how to look for the vulnerabilities in the target systems and uses the same knowledge and tools.
A Starting Salary of a Certified Ethical Hacker according to Payscale is around $75000 USD
CHFI (Computer Hacking Forensic Investigator)
The Certified Hacking Forensic Investigator is a professional certification provided again by EC-COUNCIL. This certification is designed to look at network security in its investigation phase, detecting attacks and properly extracting evidence to report the crime adn conduct to prevent future attacks.
A Starting Salary of a Certified CHFI according to Payscale is around $85000 USD
ECSA ( EC-Council Certified Security Analyst)
ECSA is a professional certification provided by EC-Council. The ECSA Certification is a complementary certification to EC-COuncil’s CEH certification by exploring the analytical phase of ethical hacking.
A Starting Salary of a ECSA according to Payscale is around $75000 USD
CISA (Certified Information System Auditor)
CISA is a professional certification for information technology audit professionals sponsored by the Information System and Control Association. Candidates for the certification must meet requirements set by ISACA.
A Starting Salary of a CISA according to Payscale is around $84000 USD
CISSP (Certified Information Systems Security Professional)
CISSP is an independent information security certification governed by not-for-profit. CISSP was the first information security credential accredited by ANSI ISO/IEC Standard 17024:2004 accreditation. It is formally approved by U.S. Department of Defense in both their Information Assurance Technical and Managerial Categories.
A Starting Salary of a CISSP according to Payscale is around $1,29,829 USD
How to bye pass Firewall
To bye pass the Firewall you must know the firewall identification means full information about Firewall like type , version , and rules of almost every firewall on a Network.
These are three technique for Firewall Identification
- Port scanning
- Banner grabbing
Port Scanning (How to bye pass Firewall)
- Check Point’s FireWall-1 listens on TCP ports 256, 257, 258, and 259
- Check Point NG listens on TCP ports 18210, 18211, 18186, 18190, 18191, and 18192 as well
- Microsoft’s Proxy Server usually listens on TCP ports 1080 and 1745
Here we are providing you , the ways by which you can conceal your Scanning
- Randomize target ports
- Randomize target addresses
- Randomize source ports
- Distributed source scans
- Using multiple computers on the Internet, each taking a small portion of the scanning targets
Block unneeded ICMP packets at your border router
Use an Intrusion Detection System, such as Snort
IPPL is a Linux daemon that detects port scans (link Ch 901)
Cisco routers have ACL rules to block scans
Firewalking (How to bye pass Firewall)
Firewalking is a method to collect information from remote network that are behind firewalls. Firewalk Looks Through a Firewall
- First Firewalk sends out a series of packets towards the destination with TTL=1, 2, 3, …
- When the target (Router3) is reached, that determines the TTL for the next phase
In this example, the Target is at TTL=3, so all future packets will use TTL=4
Phase 2: Firewalking
- TCP or UDP paclets are sent from the scanning host to the Destination
- They all have TTL=4
- You can block “ICMP TTL expired” packets at the gateway
- But this may negatively affect its performance
- Because legitimate clients connecting will never know what happened to their connection
Banner are messages sent out by network services while connecting to the service.They announce which service is running on System
Banner grabbing is simple method of OS detection, its also help to find services runs by Firewall. there are three measure services send out through it is TELNET , FTP and Web Server.
Banner Grabbing Countermeasures
- Eliminate the open port on your firewall
- If you must leave the ports open on the external interface of your firewall
How to bye pass Firewall
Byepassing a firewall using HTTP Tunnel
Placing Backdoors through Firewall
Hiding behind a Covert channel : Loki
The above topic and tools to bye pass firewall cover in next post as How to bye pass Firewall 2