Ethical Hacking: Scope and Challenges in 21st Century: December 2014
Ethical Hacking: Scope and Challenges in 21st Century: December 2014
Ethical Hacking: Scope and Challenges in 21st Century: December 2014
net/publication/275833497
CITATIONS READS
4 3,165
2 authors, including:
Asoke Nath
St. Xavier's College, Kolkata
265 PUBLICATIONS 1,552 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Understanding Natural Language Processing and its Primary Aspects View project
All content following this page was uploaded by Asoke Nath on 05 May 2015.
Abstract— Data Hacking and data manipulation from any remote server is now a very known phenomena all over the
globe. Because of this problem now a days people try to store data in a computer in encrypted manner so that the
hackers may not be able to decrypt the data. If the data in a server available in non-encrypted manner then a hacker
can very easily get into any unknown computer and can start to attack on it. End of 20th Century and the beginning of
21st century the people were only spreading virus through internet but now the hackers are smart enough to read all
data from any distant computer and can control the computer from a remote computer. Imagine a situation when a
hacker get access to some bank database and start to manipulate it. The result will be all bank transactions will be
closed immediately through out the globe. In the present paper the authors will primarily find the means how an user
can prevent his/her computer from any attack of any hacker. Ethical hacking and also known as penetration testing or
white-hat hacking involves the same tools, tricks, and techniques that hackers use. Ethical hacking is performed with
the target's permission. The intent of ethical hacking is to discover vulnerabilities from a hacker’s viewpoint so
systems can be better secured. It is part of an overall information risk management program that allows for ongoing
security improvements. Ethical hacking can also ensure that vendors’ claims about the security of their products are
legitimate.
Keywords— data hacking, bank database, ethical hacking, white hat hackers, black hat hackers.
I. INTRODUCTION
Ethical hacking encompasses formal and methodical penetration testing, white hat hacking, and vulnerability testing. It
involves the same tools, tricks, and techniques that hackers use, but with one major difference: Ethical hacking is
performed with the target’s permission. The intent of ethical hacking is to discover vulnerabilities from a malicious
attacker’s viewpoint to better secure systems. Ethical hacking is part of an overall information risk management program
that allows for ongoing security improvements. Ethical hacking can also ensure that vendors’ claims about the security of
their products are legitimate. Ethical hacking is the process of entering into a hacker's mindset in order to spot system
vulnerabilities by performing typical hacks in a controlled environment. It helps security professionals understand how
malicious users think and work, enabling administrators to defend their systems against attacks and to identify security
vulnerabilities. The term ‘ethical hacker’ refers to security professionals who apply their hacking skills for defensive
purposes. Ethical hacking describes the process of hacking a network in an ethical way, therefore with good intentions.
A. Types of hackers in the present world:
(i)White Hat Hackers: Hacks for finding out the loop holes in the security system.
(ii)Black Hat Hackers: Hacks for illegal or malicious purposes.
(iii)Grey Hat Hackers: Hacks sometimes legally and sometimes not but has no malicious intentions.
B. Ethical hacking Phases:
The Ethical hacking process needs to be planned in advance. All technical, management and strategic issues must be
considered. Planning is important for any amount of testing – from a simple password test to all out penetration test on a
web application. Backup of data must be ensured, otherwise the testing may be called off unexpectedly if someone
claims they never authorises for the tests. So, a well defined scope involves the following information:
1. Specific systems to be tested.
2. Risks that are involved.
3. Preparing schedule to carry test and overall timeline.
4. Gather and explore knowledge of the systems we have before testing.
5. What is done when a major vulnerability is discovered?
6. The specific deliverables- this includes security assessment reports and a higher level report outlining the general
vulnerabilities to be addressed, along with counter measures that should be implemented when selecting systems to test,
start with the most critical or vulnerable systems.
The overall hacking methodology consists of certain steps which are as follows:
Step-1: Reconnaissance
Step-2: Scanning
Step-3: Enumeration
Step-4: Gaining Access
Step-5: Maintaining Access
Step-6: Creating Tracks
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -30
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 11 (November 2014) www.ijirae.com
Step-1: Reconnaissance:-The literal meaning of the Word reconnaissance is a preliminary survey to gain the information.
This is also known as foot-printing. The hacker collects information about the company which the person is going to
hack. Information as DNS servers, administrator contacts and IP ranges can be collected. During the reconnaissance
phase different kind of tools can be used – network mapping, network and vulnerability scanning tools etc can be
commonly used. Cheops for example is a very good network mapping tool which is able to generate networking graphs.
They can be of great help later on during the attack phase or to get an overview about the network. A network mapping
tool is very helpful when doing an internal ethical hack.
Step-2: Scanning:-The hacker tries to make a blue print of the target network. The blue print includes the IP addresses of
the target network which are live, the services which are running on those systems and so on. Modern port scanning uses
TCP protocol to do scanning and they could even detect the operating systems running on the particular hosts.
Step-3: Enumeration:- Enumeration is the ability of a hacker to convince some servers to give them information that is
vital to them to make an attack. By doing this the hacker aims to find what resources and shares can be found in the
system, what valid user account and user groups are there in the network, what applications will be there etc.
Step-4: Gaining Access:- This is the actual hacking phase in which the hacker gains access to the system. The hacker
will make use of all the information he collected in the pre-attacking phase. Usually the main hindrance to gaining
access to a system is the passwords. In the System hacking, first the hacker will try to get in to the system.
Step-5: Maintaining Access:- Now the hacker is inside the system . This means that he is now in a position to upload
some files and download some of them. The next aim will be to make an easier path to get in when he comes the next
time. This is analogous to making a small hidden door in the building so that he can directly enter in to the building
through the door easily.
Step-6: Clearing Tracks:- Here the hacker eliminates the physical evidence of his/her hacking the system. Whenever a
hacker downloads some file or installs some software, its log will be stored in the server logs. So in order to erase the
hacker uses man tools. One such tool is windows resource kit’s auditpol.exe. Another tool which eliminates any physical
evidence is the evidence eliminator. The Evidence Eliminator deletes all such evidences.
Some Advantages of Ethical Hacking:
1. To help in detection of crimes done through internet.
2. Provides security to banking and financial establishments.
3. It can help to detect and also to prevent cyber terrorism.
4. Everything here depends upon the trustworthiness of the ethical hacker.
Hacktivism
Hacktivism refers to ‘hacking with / for a cause’. It comprises of hackers with a social or political agenda. It aims at
sending across a message through their hacking activity and gaining visibility for their cause and themselves.
Ethical hackers tries to answer:
• What can the intruder see on the target system?
Reconnaissance and Scanning phase of hacking
• What can an intruder do with that information?
Gaining Access and Maintaining Access phases
• Does anyone at the target notice the intruders attempt or success?
Reconnaissance and Covering Tracks phases.
If hired by any organization, an ethical hacker asks the organization what it is trying to protect, against whom and what
resources it is willing to expend in order to gain protection.
This document is a template. An electronic copy can be downloaded from the Journal website. For questions on
paper guidelines, please contact the journal publications committee as indicated on the journal website. Information
about final paper submission is available from the conference website.
IV. ATTACKS USING DIFFERENT H ACKING TOOLS : COUNTER MEASURES TAKEN BY AN ETHICAL H ACKER
A. Pre Attack Phases
1)Footprinting one of the pre-attack phases is the blueprinting of the security profile of an organization, undertaken in a
methodological manner.
Information Sources used in Footprinting
1) Who is: Who is can reveal public information of a domain that can be leveraged further.
2) ARIN (American Registry of Internet Numbers): ARIN allows search on the whois database to locate
information on networks autonomous system numbers (ASNs), network-related handles and other related point
of contact (POC).
3) Traceroute: Traceroute reveals the path IP packets travel between two systems by sending out consecutive UDP
packets with ever-increasing Time To Lives .
4) Nslookup: Nslookup is a program to query Internet domain name servers. Displays information that can be used
to diagnose Domain Name System (DNS) infrastructure.
Hacking Tool
1) Sam Spade:Sam Spade is a comprehensive network investigation tool which acts as a sleuth that finds as much
public information about an IP address or DNS address.
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -33
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 11 (November 2014) www.ijirae.com
2) NeoTrace: NeoTrace shows the traceroute output visually – map view, node view and IP view
3) VisualRoute:VisualRoute is a graphical tool that determines where and how traffic is flowing on the route
between the desired destination and the user trying to access it, by providing a geographical map of the route,
and the performance on each portion of that route.
4) VisualLookout:VisualLookout provides high level views as well as detailed and historical views that provide
traffic information in real-time or on a historical basis.
5) eMailTrackerPro:eMailTrackerPro is the e-mail analysis tool that enables analysis of an e-mail and its headers
automatically and provides graphical results.
6) Mail Tracking:Mail Tracking is a tracking service that allows the user to track when his mail was read, for how
long and how many times. It also records forwards and passing of sensitive information.
2)Scanning is a method adopted by administrators and crackers to discover more about a network.
There are various scan types - SYN, FIN, Connect, ACK, RPC, Inverse Mapping, FTP Bounce, Idle Host etc.
The use of a particular scan type depends on the objective at hand.
B. Enumeration
1) NAT: The NetBIOS Auditing Tool (NAT) is designed to explore the NetBIOS file-sharing services offered by
the target system.
2) Enum: Available for download from http://razor.bindview.com. Enum is a console-based Win32 information
enumeration utility. Enum is also capable of rudimentary brute force dictionary attack on individual accounts.
System Hacking
A system can be hacked by cracking the password, getting access to local administrator group etc.
Hacking tool
1) KerbCrack: KerbCrack consists of two programs, kerbsniff and kerbcrack. The sniffer listens on the network
and captures Windows 2000/XP Kerberos logins. The cracker can be used to find the passwords from the
capture file using a bruteforce attack or a dictionary attack.
2) GetAdmin: GetAdmin.exe is a small program that adds a user to the local administrators group.
3) John the Ripper: It is a command line tool designed to crack both Unix and NT passwords. John is extremely
fast and free.
4) Spector: Spector is a spy ware and it will record everything anyone does on the internet.
5) eBlaster: eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you
are thousands of miles away.
Password Cracking Countermeasures
1. Enforce 7-12 character alpha-numeric passwords.
2. Set the password change policy to 30 days.
Spector Countermeasures
Anti Spector (www.antispector.de): This tool will detect Spector and delete them from your system.
Covering tracks
Hacking Tools
1) elsave.exe:elsave.exe utility is a simple tool for clearing the event log. The following syntax will clear the
security log on the remote server 'rovil' ( correct privileges are required on the remote system)
2) WinZapper: Wizapper is a tool that an attacker can use to erase event records selectively from the security log in
Windows 2000.
3) Evidence Eliminator: Evidence Eliminator is an easy to use powerful and flexible data cleansing system for
Windows PC.
WEB SERVER Hacking
Nature of Security Threats in a Web Server Environment are as follows:
• Bugs or Web Server Misconfiguration.
• Browser-Side or Client Side Risks.
• Sniffing
• Denial of Service Attack.
Countermeasures to web server hacking
1) cacls.exe utility: Built-in Windows 2000 utility (cacls.exe) can set access control list (ACLs) permissions
globally.
2) Whisker: Whisker is an automated vulnerability scanning software which scans for the presence of exploitable
files on remote Web servers.
3) Stealth HTTP Scanner: N-Stealth 5 is an impressive Web vulnerability scanner that scans over 18000 HTTP
security issues.
4) WebInspect: WebInspect is an impressive Web server and application-level vulnerability scanner which scans
over 1500 known attacks.
5) Shadow Security Scanner: Security scanner is designed to identify known and unknown vulnerabilities, suggest
fixes to identified vulnerabilities, and report possible security holes within a network's internet, intranet and
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -34
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 11 (November 2014) www.ijirae.com
extranet environments. Shadow Security Scanner includes vulnerability auditing modules for many systems and
services.
6) IISLockdown: IISLockdown restricts anonymous access to system utilities as well as the ability to write to Web
content directories.
V. RESULTS AND DISCUSSIONS
A live Demo of Password Hacking
Software used: John The Ripper
Input: username and password hash generated by Username:Password Creator for HTPASSWD got from
sherylcanter.com/encrypt.php
Working:The website sherylcanter.com/encrypt.php produces the hashes of username and password in two of the
following forms
1.)DES-encrypted username:password entry
2.)md5-encrypted username:password entry
Using any one of this hashes produced we create a hash file. The hash file on being executed by John The Ripper gives
us the password.
Output: Matched Password for the given username and hashed password.
Set 1
Username: Ethical
Password: abcd
Time to Break: 1 second
Snapshot of Set 1
Set 2
Username: White
Password: dbca
Time to Break: 6 seconds
Snapshot of Set2
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -35
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 11 (November 2014) www.ijirae.com
Set 3
Username: Ethical
Password: 5432
Time to Break: 16 seconds
Snapshot of Set 3
Set 4
Username: Green
Password: abcd12
Time to Break: 5minutes 48 seconds
Snapshot of Set 4
It is very much essential to make sure that we are using the right tool for ethical hacking process. It is important to know
the personal as well as the technical limitations. Many tools focus on specific tests, but no one tool can test for everything.
The more tools mean it will be easy for ethical hacking. The user has to make sure that the user is using the right tool for
the task. For example, to crack passwords, one can use a cracking tool such as LC4 or John the Ripper.
There are various characteristics for the use of tools for ethical hacking which are as follows:
1. Adequate documentation
2. Detailed reports on the discovered vulnerabilities, including how they can be fixed
3. Updates and support when needed
4. High level reports that can be presented to managers
These features can save the time and effort when we are writing the report. Time and patience are important in ethical
hacking process. We should be careful when we are performing the ethical hacking tests. It is not practical to make sure
that no hackers are on our system. Just make sure to keep everything private if possible. People need to encrypt the
emails and files if possible.
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -36
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 11 (November 2014) www.ijirae.com
VI. CONCLUSION
This paper addressed ethical hacking from several perspectives. Ethical hacking seems to be a new buzz word although
the techniques and ideas of testing security by attacking an installation aren’t new at all. But, with the present poor
security on the internet, ethical hacking may be the most effective way to plug security holes and prevent intrusions. On
the other hand ethical hacking tools have also been notorious tools for crackers. So, at present the tactical objective is to
stay one step ahead of the crackers. Ethical Hacking is a tool, which if properly utilized, can prove useful for
understanding the weaknesses of a network and how they might be exploited. After all, ethical hacking will play a certain
role in the security assessment offerings and certainly has earned its place among other security assessments. In
conclusion, it must be said that the ethical hacker is an educator who seeks to enlighten not only the customer, but also
the security industry as a whole. In an effort to accomplish this, let us welcome the Ethical Hacker into our ranks as a
partner in this quest.
The law of averages works against security. With the increased numbers and expanding knowledge of hackers combined
with the growing number of system vulnerabilities and other unknowns, the time will come when all computer systems
are hacked or compromised in some way. Protecting your systems from the bad guys and not just the generic
vulnerabilities that everyone knows about is absolutely critical. When people know hacker tricks, he/she can see how
vulnerable their systems are.
Hacking preys on weak security practices and undisclosed vulnerabilities. Firewalls, encryption, and virtual private
networks (VPNs) can create a false feeling of safety. These security systems often focus on high-level vulnerabilities,
such as viruses and traffic through a firewall, without affecting how hackers work. Attacking one’s own systems to
discover vulnerabilities is a step to making them more secure. This is the only proven method of greatly hardening one’s
systems from attack. If people don't identify weaknesses, it's a matter of time before the vulnerabilities are exploited.
As hackers expand their knowledge, so should people. They must think like them to protect their systems from them.
Author, as the ethical hacker, must know activities hackers carry out and how to stop their efforts. We should know what
to look for and how to use that information to thwart hackers’ efforts.
But one should not take ethical hacking too far, though. It makes little sense to harden our systems from unlikely attacks.
For instance, if a user does not have a lot of foot traffic in the office and no internal Web server running, the user may not
have as much to worry about as an Internet hosting provider would have.
The Author’s overall goals as an ethical hacker should be as follows:
Hack the systems in a non-destructive fashion.
Enumerate vulnerabilities and, if necessary, prove to upper management that vulnerabilities exist.
Apply results to remove vulnerabilities and better secure our systems.
ACKNOWLEDGMENT
The authors are very much grateful to Prof. Shalabh Agarwal, Head, Department of Computer Science for giving us
inspiration to complete this work. One of the authors AN express his sincere gratitude to Fr. Dr. John Felix Raj, Principal,
St. Xavier’s College(Autonomous), Kolkata for giving constant support to do research work in filed of Computer Science
and Engineering.
REFERENCES
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -37