Time
3 hours 55 minutes
Difficulty
Advanced
CEU/CPE
5

Video Description

In this lesson, Subject Matter Expert Dean Pompilio discusses how the exploitation life-cycle is used to carry out the goals of hacking. The SME presents the five phases of the exploitation lifecycle:

  • reconnaissance
  • scanning
  • gaining access
  • maintaining access
  • clearing tracks

You will learn the tools and methods used by hackers and Social Engineers to successfully carry out each of the five phases with the aim of gaining unauthorized access to sensitive and confidential data and information about a person, company, organization, or government entity.

Video Transcription

00:04
So I mentioned earlier the goals of hacking or the expectation life cycle.
00:09
What we see here is these five steps. You start by doing some reconnaissance, trying to understand it enough detail about the target or the target organization to see what's possible. What can I find? What can I learn?
00:23
You might do some scanning, and this scanning typically means in this case, looking for computer systems that are within the address range of that organization. You might do with some who has look ups to get an address range, do some scanning, find some targets.
00:38
And when we When I do some of these labs, you'll see some of the tools
00:41
that can help you narrow that information down. To find something that's truly useful, try to get into a system
00:47
to get data. Once you gain access to a system. Typically, the next goal is to try to elevate your privileges so you can maintain that access. You install backdoors.
00:58
You install any kind of method or our technology like a root kit, for instance,
01:04
that allows you to return to that system in a later time
01:07
in order to do more work.
01:10
Generally. If someone hacks into a system. They don't do all their work in one sitting and then and then never go back again. They do a little bit.
01:17
They don't want to be detected, Remember, so they don't want to do too much at one time.
01:22
If they could mean 10 access, that can come back later, when it suits them and gather a little bit more of data.
01:29
And then the last step is clearing your tracks.
01:33
This is the idea that the the pen tester of the hacker, whoever is
01:38
in order to remain undetected, they will try to put things back the way they were. If that's relevant, try to erase log files or trying to disable, auditing or do some other things
01:49
in order to erase the fact that they were on that computer doing some activity which they shouldn't have been doing. All right. So starting off with reconnaissance and in the case of most social engineering efforts, you're going to gather information digitally, and I'll show a bunch of these tools as we as we go through those labs later.
02:07
But you're trying to do look up some of ah domain name trying to get address ranges,
02:12
trying to do things like a trace around to see what
02:15
what kind of systems are on a particular network. What can I see between my system and that target system? What are those hops, right? That's what a trace route can help you with that lets you enumerate that network.
02:27
And, of course, you could do some of this reconnaissance to social engineering techniques. You're not necessarily using
02:31
technology tools.
02:34
You might be friends, someone at the organization. You might try to build a trust relationship by becoming there buddy on LinkedIn or Facebook.
02:42
Or maybe you just see someone that's wearing a certain badge that indicates where they work. And now they are your target because that's the organization you want to get into. You wait for people to come out of the building.
02:52
These are all time honored techniques. This is basically classic spycraft if you think about it. So these air some techniques of many many that we could discuss to do some initial reconnaissance gathering that information that helps you identify suitable targets.
03:07
Then, if you're doing some scanning, we normally think about port scanning, trying to identify the operating system of ah computer trying to see what service is our running doing. Banner grabs.
03:19
All these have their value
03:22
to the social engineer because they are trying to gain access to a system they've got to do some hacking as well as the soft skills, like talking on the phone or talking in person scanning could produce
03:32
results through social engineering attempts as well. You might be able to call somebody or send them an email asking him a question about a service or an application or some technology that's being used in that organization. And you get the answer without using your tools
03:49
to directly get to do a scan. For instance.
03:52
Maybe they tell you over the phone or they tell you in an E mail. Oh, yes, we use a lyrical. We use Microsoft.
03:58
We use IBM products. We use McAfee products.
04:01
You might find this information in a job posting, for that matter.
04:04
This could give a lot of details to the social engineer
04:09
that show what technologies the organization is using, and then they would then
04:13
tryto identify those technologies so that they can look for weaknesses. Look for vulnerabilities, so gaining access to a system might also be done with social engineering techniques could be done with technological techniques, hacking tools,
04:26
fishing and spear fishing and wailing. These are all great ways to get
04:30
potentially get access to, ah, an individual or get access to their environment.
04:35
Fishing is casting a wide net, right.
04:39
We're trying to capture many people to try to get some of them to click a link, to go to a website, maybe to get credentials. That kind of thing
04:46
spearfishing is throwing a spirit one fish.
04:50
Hopefully, you can get that one individual to do something, which allows you to get access to a network or to an application or to their bank account. Whatever the goal of the pen tester or the hacker is
05:03
than wailing
05:05
is a variation on spearfishing. We're going after the really big fish, the president of a company
05:11
or a high level politicians, whatever your whatever your goals might be.
05:15
This is the spectrum, if you will, trying to gain access to a system as it relates to people,
05:24
you might also try something like the watering hole technique.
05:27
Maybe of many people from a certain organization go to certain websites and you know this because you've done your research, you've done your homework,
05:34
and what you can try to do, in that case, is to infect that well known website to that group with some malware, which gives you a chance to access those individuals credentials.
05:46
Maybe they all use a particular website for their banking.
05:51
So you created off a copy of that website
05:55
to try to trick people to go to that Web sites. You can get their credentials. It's very common technique
06:00
could also do something like a USB drop.
06:02
This is what a lot of security researchers do. Pen testers and hackers also do this.
06:08
What you create malware that goes on a thumb, drive these air very inexpensive nowadays to $3 for a for a kick. Dr. I think I saw the other day very cheap.
06:17
You create malware, put it on these thumb drives, put a label on there that says something like tax files or secret data whenever some kind of enticing label definitely helps.
06:30
And then you leave these. Leave these drives at places like Starbucks or
06:34
you leave him at a bar or around you, go to a university campus and leave them in the library. Most likely some people will pick. These devices are plugging in your computer, see what's on it, and now you're malware may have a chance thio get further information about those targets. The next goal is to maintain access,
06:53
so typically you need to infect a system with
06:56
some kind of tool that lets you elevate your privileges. There are ways to do this that are far too numerous to go into in this course.
07:04
But look, it's Trojans
07:06
that that get infected through e mail. Any of these possibilities might be there or the USB trick I just talked about.
07:15
Maybe that allows the engineer to gain access
07:18
installing a root kit or some other kind of backdoors, typically the next step, because now you have the privileges to do that
07:25
many times. Maintaining access to a system requires
07:29
privileged access to begin with to make changes to the configuration so that the access can be granted to the hacker. To the social engineer,
07:38
I might be able to do something like adding a firewall exception.
07:41
If you can hack your way into that part of the organization, that might be a possibility,
07:46
or you social engineering techniques to trick somebody into doing these things for you.
07:51
The possibilities are really only up to the imagination and the timeframe that's available to the social engineer,
07:59
and we think about covering tracks. As I mentioned earlier. The social engineer needs to make sure that they're evidence of their activity is not
08:07
available on that system. There's lots of ways to do this. You could try delete log files that usually requires administrator type privileges.
08:16
Sometimes people will selectively edit log files, just removing certain entries or maybe replacing
08:22
one I p address with another to send the investigator down the wrong path.
08:26
Other techniques involve disabling auditing so that there's no logs being recorded at all.
08:31
Of course, tampering with log files and turning off the logging function
08:35
is suspicious activity in itself, and the administrator of that system may notice at some point, of course,
08:41
that could, uh,
08:43
cause them to do an investigation and find the back door and shut all that down. So there are risks
08:48
in certain techniques. If you're too aggressive than the target, may notice that something is going on

Up Next

Social Engineering and Manipulation

In this online, self-paced Social Engineering and Manipulation training class, you will learn how some of the most elegant social engineering attacks take place. Learn to perform these scenarios and what is done during each step of the attack.

Instructed By

Instructor Profile Image
Dean Pompilio
CEO of SteppingStone Solutions
Instructor