EHEv1 Module 02 Ethical Hacking Fundamentals
EHEv1 Module 02 Ethical Hacking Fundamentals
Understand Different 4 5
Phases of Hacking
2 Cycle
Discuss Ethical Hacking
Concepts, Scope, and Ethical
Discuss Hacking Hacking Tools
1 Concepts and Hacker
Limitations
Classes
Understand Cyber
Kill Chain
Methodology
Tactics
“Tactics” are the guidelines that describe the way an attacker performs the attack from beginning to the end
Techniques
“Techniques” are the technical methods used by an attacker to achieve intermediate results during the attack
Procedures
“Procedures” are organizational approaches that threat actors follow to launch an attack
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Adversary Behavioral Identification
Adversary behavioral identification involves the identification of the common methods or techniques
followed by an adversary to launch attacks on or to penetrate an organization’s network
It gives the security professionals insight into upcoming threats and exploits
Adversary Behaviors
Understand Different 4 5
Phases of Hacking
2 Cycle
Discuss Ethical Hacking
Concepts, Scope, and Ethical
Discuss Hacking Hacking Tools
1 Concepts and Hacker
Limitations
Classes
Understand Cyber
Kill Chain
Methodology
Some hackers’ intentions can Some hack with malicious intent such as to
either be to gain knowledge steal business data, credit card information,
03 or to probe and do illegal social security numbers, email passwords,
things and other sensitive data
Understand Different 4 5
Phases of Hacking
2 Cycle
Discuss Ethical Hacking
Concepts, Scope, and Ethical
Discuss Hacking Hacking Tools
1 Concepts and Hacker
Limitations
Classes
Understand Cyber
Kill Chain
Methodology
Reconnaissance Types
Scanning can include the use of dialers, port scanners, network mappers, ping tools, and vulnerability
scanners
Attackers extract information such as live machines, port, port status, OS details, device type, and
system uptime to launch attack
Sends
TCP/IP probes
Network
Scanning Gets network
Process information
Attacker Network
01
Gaining access refers to the 03
point where the attacker The attacker can escalate
obtains access to the operating privileges to obtain
system or applications on the complete control of the
target computer or network system
04
02 Examples include password
The attacker can gain access cracking, buffer overflows,
at the operating system, denial of service, and
application, or network session hijacking
levels
Understand Different 4 5
Phases of Hacking
2 Cycle
Discuss Ethical Hacking
Concepts, Scope, and Ethical
Discuss Hacking Hacking Tools
1 Concepts and Hacker
Limitations
Classes
Understand Cyber
Kill Chain
Methodology
1 2 3
What can an intruder What can an intruder Does anyone at the
see on the target do with that target organization
system? information? (Gaining notice the intruders’
(Reconnaissance and Access and attempts or successes?
Scanning phases) Maintaining Access (Reconnaissance and
phases) Covering Tracks
phases)
4 5 6
Are all components of How much time, Are the information
the information effort, and money are security measures in
system adequately required to obtain compliance with legal
protected, updated, adequate protection? and industry
and patched? standards?
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Scope and Limitations of Ethical
Hacking
Scope Limitations
Ethical hacking is a crucial Unless the businesses already know
component of risk assessment, what they are looking for and why
auditing, counter fraud, and they are hiring an outside vendor
information systems security best to hack systems in the first place,
practices chances are there would not be
much to gain from the experience
It is used to identify risks and
highlight remedial actions. It also An ethical hacker can only help the
reduces ICT costs by resolving organization to better understand its
vulnerabilities security system; it is up to the
organization to place the right
safeguards on the network
Understand Different 4 5
Phases of Hacking
2 Cycle
Discuss Ethical Hacking
Concepts, Scope, and Ethical
Discuss Hacking Hacking Tools
1 Concepts and Hacker
Limitations
Classes
Understand Cyber
Kill Chain
Methodology
http://www.webextractor.com https://whois.domaintools.com
UDP Traceroute
https://nmap.org http://www.magnetosoft.com
NetScanTools Pro
https://www.netscantools.com
Hyena
https://www.systemtools.com
Obtain information, such
as NetBIOS names,
usernames, domain
names, and MAC
addresses Nsauditor Network
Security Auditor
https://www.nsauditor.com
http://nbtenum.sourceforge.net