Webinar Wrap-up: The Five Phases of Ethical Hacking

Webinar Wrap-up: The Five Phases of Ethical Hacking
Author

Naren Madan

Last updated January 25, 2018


  • 129 Views

Security breaches are real. It is a challenge that every organization is staring at today. 

A recent survey by PriceWaterhouseCoopers,  “The Global State of Information Security Survey 2018”, shows that business leaders are concerned about the security risks associated with emerging technologies such as automated or robotic systems. For example, 39 percent of the 9,500 interviewed executives fear loss or compromise in sensitive data and over 32 percent believe that the quality of the product is susceptible to damage. 

Cyber security is no longer ‘just an IT issue’, it is a problem that is affecting the brand equity of an organization. In fact, entrepreneurs like Elon Musk, founder, and CEO of Tesla, are giving top priority to security. 

As more organizations move into the digital space, safeguarding data from hacking and cyber-attacks is more significant than ever before. Companies are now acknowledging the potential dangers of these attacks and thinking of preemptive solutions—one of them being ethical hacking.

Watch the recorded webinar on five phases of ethical hacking below.

What is Ethical Hacking and How Is It Different From Hacking?

In a webinar on five phases of ethical hacking hosted by Simplilearn, Kevin King, director of technical innovation at EC-Council, described how hackers exploit vulnerabilities and compromise security controls to gain unauthorized access to system resources in an organization. He showed attendees how hacking can modify system or application features contrary to the original purpose and can pilfer, corrupt and redistribute data leading to billions of dollars lost.

In contrast, ethical hacking involves using the same hacking tools and techniques to identify vulnerabilities in a system and address them before they can be exploited. According to King, to beat a hacker, you need to think like a hacker.

There are different types of hackers:

  • Black Hat Hackers: Individuals with extraordinary computing skills who use these advanced skills with malicious intent.
  • White Hat Hackers: Ethical hackers with advanced computing skills who use their skills for defensive purposes.
  • Gray Hat Hackers: Advanced computer users who work both offensively and defensively and often are security consultants, or white hat hackers who moonlight as black hat hackers. 

Why Organizations Recruit Ethical Hackers

According to King, on an average, organizations take 200 days to realize that hackers have created havoc in their system. Organizations are now hiring ethical hackers to curb security breaches. Ethical hackers must uncover vulnerabilities in the systems and review the compliance of existing security practices to industry standards. Afterwards, it is their responsibility to analyze and strengthen security policies, network infrastructure, and end-user practices to safeguard the organization from cyber threats.

Drawing parallels with self-defence classes, King says that ethical hacking is legal and helps defend and not attack the systems. 

The Five Phases of Ethical Hacking

While the phases discussed in the webinar are from the perspective of a hacker, King explains that these are the same phases used by a white hat hacker to test an organization’s network. To put it simply, an attacker uses this approach to breach the network, while the ethical hacker uses it to protect it.

  1. Reconnaissance: Reconnaissance, also known as the preparatory phase, is where the hacker gathers information about a target before launching an attack and is completed in phases prior to exploiting system vulnerabilities. One of the first phases of Reconnaissance is dumpster diving. It is during this phase that the hacker finds valuable information such as old passwords, names of important employees (such as the head of the network department) and performs an active reconnaissance to know how the organization functions. As a next step, the hacker completes a process called footprinting to collect data on the security posture, reduces the focus area such as finding out specific IP addresses, identifies vulnerabilities within the target system, and finally draws a network map to know exactly how the network infrastructure works to break into it easily. Footprinting provides important information such as the domain name, TCP and UDP services, system names and passwords. There are also other ways to do footprinting, including impersonating a website by mirroring it, using search engines to find information about the organization and even using information of current employees for impersonation. 
  2. Scanning: In this phase, the hacker identifies a quick way to gain access to the network and look for information. There are three methods of scanning: pre-attack, port scanning/sniffing and information extraction. Each of these phases demonstrates a specific set of vulnerabilities which the hacker can utilize to exploit the system weaknesses. The pre-attack phase is where the hacker scans the network for specific information based on the information gathered during reconnaissance. The port scanner or sniffing phase is where scanning includes the use of diallers, port scanners, vulnerability scanners and other data-gathering equipment. The information extraction phase is where the attackers collect information about ports, live machines and OS details to launch an attack. 
  3. Gain Access: The hacker gains access to the system, applications, and network, and escalates their user privileges to control the systems connected to it.
  4. Maintain Access: Here, the hacker secures access to the organization’s Rootkits and Trojans and uses it to launch additional attacks on the network.
  5. Cover Tracks: Once the hacker gains access, they cover their tracks to escape the security personnel. They do this by clearing the cache and cookies, tampering the log files and closing all the open ports. This step is important because it clears the system information making hacking a great deal harder to track.

What is The Future of Ethical Hacking?

According to King, the idea of ethical hacking is still foreign to many audiences. However, with the increase in cyber-attacks and security breaches, people are slowly realizing that ethical hackers are the real protectors of the system. Regarding the future challenges in hacking, King, observes that AI hack attacks (Artificial Intelligence specially built to hack a system) will be the next potential danger. Adding that, in such cases, systems will have to defend themselves from AI hacks in the same manner as they do advanced hacks.

How Can You Become a Certified Ethical Hacker?

If you have a deep understanding of OSI model and are well versed with the three legs of hacking: computing, networking, and programming, consider a certification in ethical hacking. Evaluate the list of potential cyber security certifications to decide on the right one that meets your career objectives.

If you have any questions about ethical hacking, share them in the comments section below.

About the Author

Naren Madan is a Content Marketer with close to three years of experience in B2B marketing. An avid football fan, Naren follows the key trends in digital marketing and how sports teams leverage new marketing technologies and analytics to connect with their global fan base. This section provides access to all the insightful resources that Naren has contributed to our audience.


{{detail.h1_tag}}

{{detail.display_name}}
{{author.author_name}} {{author.author_name}}

{{author.author_name}}

{{detail.full_name}}

Published on {{detail.created_at| date}} {{detail.duration}}

  • {{detail.date}}
  • Views {{detail.downloads}}
  • {{detail.time}} {{detail.time_zone_code}}

Registrants:{{detail.downloads}}

Downloaded:{{detail.downloads}}

About the {{detail.about_title && detail.about_title != null ? detail.about_title : 'On-Demand Webinar'}}

About the {{detail.about_title && detail.about_title != null ? detail.about_title : 'Webinar'}}

Hosted By

Profile

{{author.author_name}}

{{author.author_name}}

{{author.about_author}}

About the {{detail.about_title && detail.about_title != null ? detail.about_title : 'Ebook' }}

About the {{detail.about_title && detail.about_title != null ? detail.about_title : 'Ebook' }}

View {{detail.about_title && detail.about_title != null ? detail.about_title : 'On-Demand Webinar'}}

Webcast

Register Now!

Download the {{detail.about_title && detail.about_title != null ? detail.about_title : 'Ebook'}}!

First Name*
Last Name*
Email*
Company*
Phone Number*

View {{detail.about_title && detail.about_title != null ? detail.about_title : 'On-Demand Webinar'}}

Webcast

Register Now!

{{detail.about_title && detail.about_title != null ? detail.about_title : 'Webinar'}} Expired

Download the {{detail.about_title && detail.about_title != null ? detail.about_title : 'Ebook'}}

Email
{{ queryPhoneCode }}
Phone Number {{ detail.getCourseAgree?'*':'(optional)'}}

Show full article video

About the Author

{{detail.author_biography}}

About the Author

{{author.about_author}}