create account

Ethical Hacking an Introduction - Whitehat @disofdis by timsaid

View this thread on: hive.blogpeakd.comecency.com
· @timsaid ·
$491.79
Ethical Hacking an Introduction - Whitehat @disofdis
<center>https://coderbyte.com/images/ProfilePictures/nhatnippro.jpg</center>
These days there is more focus on security then ever before. One of the jobs that is getting more in demand is being a pentester (ethical hacker).

<b>How did I become one</b>
At  a very young age I was interested in computers. My first computer was a Amstrad Schneider. For the older ones it maybe rings a bell. It is a XT personal computer from the late 80's. Creating my first personal menu under MS-DOS was a huge achievement. Even more fun of course was how to do things that where not allowed. Changing config files or finding the answers for in game questions by looking into the files. I always wanted to do something with that. 

My first years in IT had nothing to do with hacking. I was a system administrator. But I took a new job a few years ago and I got the change to learn the skills of hacking and forensics. The forensics part helped me a lot when I was figuring out @timsaid crazy last puzzle in cryptochallenge #1. 

<b>Is it something for you?</b>
Very different people are working as a ethical hacker, with different types of backgrounds and skills. The thing that we have in common is a love for technology and the challenge it provides us.

Some people become specialists in areas, like web applications (sql), network systems, social engineering, etc.

There is no special education you have to follow to become a hacker. This is partly true for ethical hacking. But employers and clients do look at certificates also. For example the Licensed Penetration Tester path from EC-Council is a nice to have. 

I do not pretend to be a real hacker. For me personally that is someone who can find the big issues without the help of special tools. What I do is using my knowledge of systems and hacking methodologies.

<b>How does it work</b>
Before you hack anything you have to deal with one of the more boring parts of the job. You need to get permission. And that is more work then you think. You need to talk with the suits(yeh indeed) and make documents what you want to do. This can take away the freedom a little, but it is necessary. Specially for your own protection. 

After the formalities we can start hacking. Basically we follow 5 steps. Counterclockwise.

<a href="http://imgur.com/FBgVRdL"><img src="http://i.imgur.com/FBgVRdL.jpg" title="source: imgur.com" /></a>

There are special linux distro's like Kali and Backbox who follow these 5 steps. They have the tools needed for every phase sorted out for us. Of course using tools do not make us successful. We need to read and understand the results and make them to good use later in the process. There is no one click hack, and there is always some manual scripting and tuning involved. 

<b>So how does it look like </b>

First a small disclaimer: Don't hack anyone without permission!

As a example I will use a web application issue we still see in the wild.

<ul>
<b>Phase 1—Reconnaissance</b>

First we figure out as much as we can without ringing any alarm bells. Just use google, whois, shodan (internet of things search engine) etc.

</ul>
<ul>
<b>Phase 2—Scanning</b>

Here we start using tools like nmap, nessus (vulnerability scanner), ZAP (OWASP)

For a web application we will use ZAP.  And after our scan we have found this interesting alert.
<a href="http://imgur.com/9DzZpsp"><img src="http://i.imgur.com/9DzZpsp.png" title="source: imgur.com" /></a>
</ul>
<ul>
<b>Phase 3—Gaining Access</b>

Well this phase is a lot of fun. We did our home work and we found some issues. But now we need to get in. One of the tools to help us with that is Metasploit. It will provide us with a listener and creates a backdoor for us. We can choose between various types of backdoors. Like using TCP or DNS protocol for the communication. And it can create the backdoor in different languages like php. Because it is a webserver a php backdoor is a logical choice.  So we will create one.

Now we have created a php backdoor we want to upload it. Normally we can not upload php files. We will get a nice message telling us the file type is not allowed. But often it is still possible. Sometimes by just changing the extensions. Even something as changing the extension from php to .php%00.jpg or .Php3 can work. But that is a little old school and most of the times it will not work.

So for this case we will use burp. Burp is a java application that has many features. One is being a Intercepting proxy. It let us read everything that is send and received between us and the web application.

So this is how a upload of a php file looks like.
<a href="http://imgur.com/JEZAHga"><img src="http://i.imgur.com/JEZAHga.jpg" title="source: imgur.com" /></a>

As we can see in the Content-Type there is the MIME value "application/x-httpd-php". If we ever want to get the file uploaded this value has to change. And the burp suite will also let us edit the post request before sending it back. So the value will be changed to image/jpeg (which is allowed).

<a href="http://imgur.com/F48UvZ4"><img src="http://i.imgur.com/F48UvZ4.jpg" title="source: imgur.com" /></a>

Now the php file is uploaded we need to start it. We can do this by just typing the url http://steemit.com/uploads/php-backdoor.php ;-) in our browser. Now we will have a connection to our metasploit listener and have access to the server. From there we can try to escalate your rights if needed.
</ul>
<ul>
<b>Phase 4—Maintaining Access</b>

After we have gained access we want to keep it. So the idea is to make your backdoor persistent. There are many ways to do it. It all depends on the rights we have gained. Metasploit can also help us with that. Sometimes it as simple as typing: <b>run persistence -X</b> (so the backdoor starts after the reboot)
</ul>
<ul>
<b>Phase 5—Clearing Tracks</b>

And when we are done hacking we want to clear our tracks. Deleting log files or changing file attributes (date/time) etc.
</ul>

This is of course a simplified version of doing a ethical hack. But it gives you a idea about how it works. It is a lot of fun.

After the hack we need to make a report. We need to state the facts and help the client by providing solutions they can implement. 

<b>What your client thinks</b>
Sometimes they expect the ethical hacker to have superpowers. And that we can find everything. But we can not. There is no 100% change that we know about all issues. You can not prevent every attack from succeeding. But what you can do is take the easy attack factors out, mitigate risks and limit a possible hack.

As a ethical hacker you can scan and test all day long. But a big part of the problem and also the solution is the internal IT department. This is often overlooked by management. They do not want to spend more then is needed at security. 


<b>Want to know more?</b>
If you want to know more just react to this post. I am also often in the chat room of the cryptochallenge. My account name is the same as on steemit  @disofdis
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 85 others
properties (23)
authortimsaid
permlinkethical-hacking-an-introduction-whitehat-disofdis
categorysecurity
json_metadata{"tags":["security","science","encryption","hacking","crypto"],"users":["timsaid","disofdis"],"image":["https://coderbyte.com/images/ProfilePictures/nhatnippro.jpg","http://i.imgur.com/FBgVRdL.jpg","http://i.imgur.com/9DzZpsp.png","http://i.imgur.com/JEZAHga.jpg","http://i.imgur.com/F48UvZ4.jpg"],"links":["http://imgur.com/FBgVRdL","http://imgur.com/9DzZpsp","http://imgur.com/JEZAHga","http://imgur.com/F48UvZ4","http://steemit.com/uploads/php-backdoor.php"]}
created2016-08-29 21:02:57
last_update2016-08-29 21:02:57
depth0
children14
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value432.769 HBD
curator_payout_value59.021 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length6,992
author_reputation338,948,364,553,435
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,046,808
net_rshares66,053,629,324,389
author_curate_reward""
vote details (149)
@dave-hughes ·
I would like to stop the black hats from destroying what is good. maybe I have watched to much mr robot lol
👍  ,
properties (23)
authordave-hughes
permlinkre-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160829t225750602z
categorysecurity
json_metadata{"tags":["security"]}
created2016-08-29 22:57:48
last_update2016-08-29 22:57:48
depth1
children1
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length107
author_reputation2,561,835,597,700
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,048,244
net_rshares31,733,828,244
author_curate_reward""
vote details (2)
@disofdis ·
Mr robot is very cool indeed. Also realistic hacking methods
properties (22)
authordisofdis
permlinkre-dave-hughes-re-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160830t051056669z
categorysecurity
json_metadata{"tags":["security"]}
created2016-08-30 05:10:57
last_update2016-08-30 05:10:57
depth2
children0
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length60
author_reputation4,628,907,822,710
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,051,958
net_rshares0
@disofdis ·
Thx for the reaction and votes guys :-) If anyone wants to know more on becoming one let me know :-)
👍  ,
properties (23)
authordisofdis
permlinkre-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160829t222222917z
categorysecurity
json_metadata{"tags":["security"]}
created2016-08-29 22:22:24
last_update2016-08-29 22:22:24
depth1
children3
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length100
author_reputation4,628,907,822,710
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,047,808
net_rshares31,361,835,462
author_curate_reward""
vote details (2)
@christoryan ·
How do I hack those Benghazi files? l:oL
properties (22)
authorchristoryan
permlinkre-disofdis-re-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160830t072613213z
categorysecurity
json_metadata{"tags":["security"]}
created2016-08-30 07:26:15
last_update2016-08-30 07:26:15
depth2
children0
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length40
author_reputation4,253,059,677,623
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,052,881
net_rshares0
@contentjunkie ·
Hi Disofdis, in my experience whitehat hackers usually evolve from black and grey hat hacking practices due to age and the responsibilities that come with it. I've known quite a few spammers and scammers that turned into whitehats after the arrival of a wife and kids. They usually just can't risk being caught doing illegal things anymore.

Did you have a similar journey to becoming a whitehat? Do find that people choosing to dawn the white hat first to be scarce?
👍  
properties (23)
authorcontentjunkie
permlinkre-disofdis-re-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160830t064645439z
categorysecurity
json_metadata{"tags":["security"]}
created2016-08-30 06:46:45
last_update2016-08-30 06:46:45
depth2
children1
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length467
author_reputation253,577,661,205,632
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,052,600
net_rshares307,632,242
author_curate_reward""
vote details (1)
@disofdis ·
Indeed some of them have this darker past. And it is not that i never did something on the edge. I do like the hacktivist side. But never harmed people with my hacking. But i started real hacking only later. I am not sure what jokes i would have pulled with this knowledge when i could back in time and be 16 again ;-)
properties (22)
authordisofdis
permlinkre-contentjunkie-re-disofdis-re-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160830t102849997z
categorysecurity
json_metadata{"tags":["security"]}
created2016-08-30 10:28:51
last_update2016-08-30 10:28:51
depth3
children0
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length318
author_reputation4,628,907,822,710
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,054,253
net_rshares0
@how2steemit ·
great knowledge about Ethical hacking
properties (22)
authorhow2steemit
permlinkre-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160829t211730645z
categorysecurity
json_metadata{"tags":["security"]}
created2016-08-29 21:17:33
last_update2016-08-29 21:17:33
depth1
children0
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length37
author_reputation1,485,428,161,400
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,047,034
net_rshares0
@mrosenquist ·
There are some great ethical hacking courses out there.  I think SANS has one of the oldest and most respected.
properties (22)
authormrosenquist
permlinkre-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160829t234802049z
categorysecurity
json_metadata{"tags":["security"]}
created2016-08-29 23:48:06
last_update2016-08-29 23:48:06
depth1
children1
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length111
author_reputation177,636,687,336,025
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,048,896
net_rshares0
@disofdis ·
That is also a good one indeed. Never did it tough.
properties (22)
authordisofdis
permlinkre-mrosenquist-re-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160830t103109232z
categorysecurity
json_metadata{"tags":["security"]}
created2016-08-30 10:31:12
last_update2016-08-30 10:31:12
depth2
children0
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length51
author_reputation4,628,907,822,710
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,054,270
net_rshares0
@romanskv ·
Robin hoods a myth, a thief is always a thief.... I don't believe in prostitutes who can love, or the generous people who are very rich , usually the opposite... but not without exceptions of course
http://i.imgsafe.org/4bc1fa4319.jpg
👍  ,
properties (23)
authorromanskv
permlinkre-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160829t225021085z
categorysecurity
json_metadata{"tags":["security"],"image":["http://i.imgsafe.org/4bc1fa4319.jpg"]}
created2016-08-29 22:50:18
last_update2016-08-29 22:50:18
depth1
children0
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length234
author_reputation131,872,925,559,091
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,048,172
net_rshares3,283,589,346
author_curate_reward""
vote details (2)
@team101 ·
Interesting.  I never knew there was such a thing as Ethical hacking.
properties (22)
authorteam101
permlinkre-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160829t215224167z
categorysecurity
json_metadata{"tags":["security"]}
created2016-08-29 21:52:27
last_update2016-08-29 21:52:27
depth1
children0
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length69
author_reputation12,700,047,182,916
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,047,468
net_rshares0
@thecryptofiend ·
Thanks for the explanation.  I've never heard the term "pentester" before.
👍  
properties (23)
authorthecryptofiend
permlinkre-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160829t223138904z
categorysecurity
json_metadata{"tags":["security"]}
created2016-08-29 22:31:39
last_update2016-08-29 22:31:39
depth1
children0
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length74
author_reputation323,603,913,866,384
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,047,938
net_rshares52,862,606
author_curate_reward""
vote details (1)
@zein ·
i vote are you willing to back my vote bloggers ?
I feel happy if you vote me my work
https://steemit.com/photography/@zein/my-work-together-nikon-d3300-original-photos
properties (22)
authorzein
permlinkre-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160830t065024976z
categorysecurity
json_metadata{"tags":["security"],"links":["https://steemit.com/photography/@zein/my-work-together-nikon-d3300-original-photos"]}
created2016-08-30 06:50:24
last_update2016-08-30 06:50:24
depth1
children1
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length168
author_reputation-162,207,849,375
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,052,627
net_rshares0
@disofdis ·
Nice pictures :-)
properties (22)
authordisofdis
permlinkre-zein-re-timsaid-ethical-hacking-an-introduction-whitehat-disofdis-20160830t103000590z
categorysecurity
json_metadata{"tags":["security"]}
created2016-08-30 10:30:03
last_update2016-08-30 10:30:03
depth2
children0
last_payout2016-09-29 22:15:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length17
author_reputation4,628,907,822,710
root_title"Ethical Hacking an Introduction - Whitehat @disofdis"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,054,264
net_rshares0