Introduction to Ethical Hacking

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
7 hours 6 minutes
Difficulty
Intermediate
CEU/CPE
7
Video Transcription
00:00
Hey, everyone, welcome back to the course in this video. We're just gonna take a brief introduction to ethical hacking, So we'll talk about what ethical hacking actually is. We'll talk about different types of hackers. There are out there. We'll talk about some different phases of hacking, but that will be kind of a 10,000 ft or very general level approach. But we'll talk about that once we get to that part, and we'll talk about
00:20
the different types of box testing. So black box, white boxing, great box.
00:24
So what is ethical? Hacking? Well,
00:27
really, The simplest way to define it is legal hacking. So you have permission. It's either your own systems where you have permission in most cases, from an organization
00:36
and in the industry is not really referred to as ethical hacking. It's more commonly called penetration, testing or pen testing for short. And what we do, basically, as ethical hackers or really pen testers is we go to organizations. We use different tools and techniques. We have permission,
00:55
and we try to identify vulnerabilities
00:57
that could be exploited at that organization. Now what we do like a pen test, we normally have a specific time frame. We usually will have a specific Scopus faras systems that weaken touch. We have a Scopus faras what we can actually do. So some pen test might just be you go in,
01:15
you find vulnerabilities, and then you
01:18
report that back to the organization and you don't actually exploit those. You just say, Well, an attacker could exploit those. By doing this,
01:25
there might be limitations, right? So maybe we find specific exploits on a system or specific vulnerabilities, but we can't exploit them because those that type of exploiting isn't in our scope. Right? So you'll notice when you get out there in the real world with pen testing, there's a lot of different things in place. You always wanna have everything written
01:42
on design before you actually go touch anything.
01:46
But just for the purpose of, uh, of any certification exam, just know that ethical hacking is basically pen testing, penetration, testing, and you have permission. That's one of the key things to keep in mind there to actually go ahead and attack the systems.
02:00
So the different types of hackers out there on the black hat is the one you're thinking of. That's the more common Hollywood hacker. Criminal adversary. That's a black hat hacker, right? They've got a malicious intent. They're doing something. It could be stealing data. They could be coming in to steal money.
02:16
Um, could be a nation state attacking to get intelligence or cause destruction in some capacity.
02:23
You've got gray hat hacker is a good example of this was several years back. There were was a vulnerability in a lot of home routers. And so a great hat hacker again for the common good, right? Pushed out a nup date to all of these compromised devices. Basically hacked all these devices, push it out. Didn't have permission to do so.
02:43
But it's that gray area, right? It's for the greater good. But again, you don't have permission. So that's what makes it kind of that gray hat and then the white hat, right. You have permission. This is where the ethical hacker or pen tester um, in most cases would fall under.
02:57
And there's a lot of people that are all three of these.
03:00
You've got your hacktivists. So think of groups like anonymous, for example, that when there is maybe a social injustice or some political thing they'll do some action a lot of times this website defacement But it could be something else, depending on the circumstances. And you've got script, kiddies, these air, basically people that don't really know what they're doing or what's happening at a technical level. So,
03:21
um and example, that would be these Branch Amores the services. A script kiddie would
03:23
pay money to get ransom where
03:27
and then
03:28
just push it out there. They don't know really how they were ransomware functions. They don't know what is capable of. They don't know at a code level how to write their own ransomware or what to look for. And so that's a script, Kiddie. They don't really have the technical prowess to effectively attack systems themselves. So they have to use what other people create
03:46
and then our nation state Attackers. So you're a PT groups usually fall under this
03:50
North Korea, your Russian Attackers, your Chinese Attackers. Andi, these ones are typically gonna only put resource is towards a valuable target. So it might be getting intelligence. Normally, it is could be a big financial gain.
04:05
Um, could be a disinformation campaign. As we've seen with, like, presidential elections here in the U. S. So a lot of different ways that they may attack
04:15
These are the faces of ethical hacking. But keep in mind that
04:17
if I've done social engineering without doing recon, for example,
04:24
I'm just gonna go ahead and gain access, right? I'm gonna figure out how to get that employees to give me access, so you may not necessarily always follow these in order, but a lot of times you will, right? You're gonna get reconnaissance on your target on, then you'll identify
04:36
how you could actually get in. So again, if social engineering is a way you could skip scanning right,
04:42
you can probably skip re con. If you've already connected with someone inadvertently via social media at the organization, you'll exploit that relationship and gain access.
04:53
So let's talk about the different types of testing now as far as the box testing. So we got black box testing this one. You typically will not get any type of internal information at all about the target. So as a pen tester, you won't get internal info. This one best simulates a real adversary again, keeping in mind that for pen test, your usually limited in a time frame,
05:12
and it really adversary might take months or years to actually attack your organization.
05:17
We've got white box testing. This is one where you get basically open access. You might get some passwords. You might know the I P addresses. You might get basically this kind of the same acts you might get, like, local admin access. So you kind of get access that an internal employees might get.
05:33
Um, sometimes you get access to the source code or at least knowledge
05:38
of the source code and how the network infrastructure is You might get a network topology map.
05:43
You might know about
05:45
the production versus a test environment. So you basically just get kind of that insider information of somebody working at the organization Now, you might be hired to do white white by white box test, both internally and externally. So depending on the information you get, you may, they may have you simulate someone attacking the source code internally
06:03
and having to figure out
06:05
how they can defend against that. And also externally, right, you're more traditional pen test,
06:12
great box testing. You might get some things right, but not everything. So you might get some log in credentials, like maybe, um, a user name and password for a website Log in, or you might get it for the local admin account or something. And then from there you have to do things like privileged escalation to keep moving through the network.
06:29
You might also get a map of the network topology. You might get a kind of visualization of part of it
06:33
to identify some I P addresses and some systems, so this one usually get a little bit of information. But it's still you don't get all the information that you might need to quickly be able to attack the organization.
06:46
So that's a quick quiz question here for you.
06:47
This type of testing you typically have access or information that would simulate the insider threat. So some of that works internally at the company, so it's gonna be a white box, black box or gray box.
06:59
All right, so if you guessed white box, you are correct right again. That one really will simulate that insider threat. They might have information about the source code or how the network topology is. They might have certain user names and passwords. They might know I p address ranges, etcetera, etcetera. So that would be that white box test.
07:16
So this video, we just briefly covered what ethical hacking actually is. So again, just make sure you have a permission for any systems that you are attacking. We talked briefly about some of the types of hackers you want to know that stuff for? Um, if you decide to go take things like the EEC council ch exam, we also talk through some of the hacking phases again.
07:34
Don't focus on being stuck in any one phase because
07:39
depending on what kind of information you're getting, you might be able to skip to later phases. But generally speaking, that is the the step by step of kind of what you would do in a in an engagement. And then we also talked about the gray, white and black box testing
Up Next