Introduction to Ethical Hacking

Hengky Sanjaya
Hengky Sanjaya Blog
3 min readFeb 21, 2020

Ethical Hacking and Penetration Testing-COMP6210|Binus International

Any tools, guidances, and tutorials in this Post is for Education Purpose Only.

There are several terms about Ethical Hacking:

  • Ethical Hackers

Someone who employed by companies to perform a penetration tests to their own system (with the owner’s permission).

  • Penetration Test

legal attempt to break into a company’s network to find its weekest link. (Tester only reports findings and offers solutions to secure or protect the network)

  • Hackers

Someone who access computer system or network without authorization. (breaks the law can go to prison)

  • Crackers

Someone who breaks into the systems to steal or destroy the data (U.S. Department of Justice calls both hackers)

The Role of Security and Penetration Testers

  • Script kiddies or packet monkeys

Young inexperienced hackers (copy codes and techniques from knowledgeable hackers)

  • Programming Language used by experienced penetration testers

Examples : Practical Extraction and Report Language (Perl), C, Python

  • Script

Set of instructions that runs in sequence

Programming Language vs Script

Basically, scripting languages are programming language. But in theoretical the difference is scripting languages do not require compilation step and they are interpreted.

  • Tiger box

Collection of Oss and hacking tools. To help penetration testers and security testers conduct vulnerabilities assessments and attacks.

Penetration Testing

Why do we need penetration testing ?

Because we need to make sure that our system is secure. We use the Penetration Testing to test the vulnerabilities of our system and find the solution and make our system more secure.

The Process

  1. Define the scope of the test (important, if not the project will never end)
  • Extend of the testing
  • What will be tested
  • From where it will be tested
  • By whom it will be tested

2. Performing the pen-test

3. Reporting and delivering results

Methodologies

  • White box model

Tester is told everything about the network topology and technology.

Tester is authorized to interview IT personnel and company employees

Makes tester job a little easier

  • Black box model

Company staff does not know about the test

Tester is not given details about the network

Tests if security personnel are able to detect an attack

  • Gray box model

Hybrid of the white and black box models

Company gives tester partial information

Common Techniques

  1. Passive Research

2. Open Source Monitoring

3. Network mapping and OS fingerprinting

To know what the version of Operation System.

4. Spoofing

For instance: A tries to attack B and C.

Normally B and C will know that A is attacking them.

By spoofing techniques A can attack B and C as other person. A can attack the B as C and the B will know that the one who attacked him is C not A.

In simple its about how you attack other people by using other people.

You attack other IPs in the world by using another IPs.

5. Network Sniffing

Is the real-time monitoring of data packets in network.

Blue Team and Red Team

  • Blue Team

People who defends the system, monitoring and checking the security of the systems.

  • Red Team

People who performs the pen-test and attacking the systems.

--

--