Sei sulla pagina 1di 82

Ethical Hacking

Version 5

Module I
Introduction to Ethical
Hacking

Scenario
Jeffery came across some books that were related to hacking. He was
curious to know about hacking public and private networks. He
bought a book related to it from the nearby bookstore.
Amazed to learn new techniques about hacking, Jeffrey wanted to get
hands on. He visited a local library and plugged his laptop to its
network in the pretext of searching the database of books. Jeffrey
wanted to find the vulnerability present in the librarys network and
then show the report to the concerned authorities.
Jeffrey launched the tools from a CD that was offered with the book
and discovered lot of loopholes in the network!
What is wrong with Jeffreys act?
Is his action justified?

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Security News
Source Courtesy : http://www.securitypark.co.uk/article.asp?articleid=25511&CategoryID=49

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Module Objective
This module will familiarize you with the following:
~

Importance of Information security in todays world

Elements of security

Various phases of the Hacking Cycle

Types of hacker attacks

Hacktivism

Ethical Hacking

Vulnerability research and tools that assist in the same

Steps for conducting ethical hacking

Computer crimes and implications

Cyber Laws prevailing in various parts around the World

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Module Flow

EC-Council

Importance of security

Ethical Hacking

Elements of security

vulnerability research
and tools

Phases to perform
malicious hacking

Conducting ethical hacking

Types of hacker attacks

Computer crimes
and implications

Hacktivism

Legal perspective

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Problem Definition Why Security?


~

Evolution of technology
focused on ease of use

~Decreasing

skill level needed for exploits

~Increased

network
environment and network
based applications

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Problem Definition Why Security?


(contd)
~Direct

impact of security breach on


corporate asset base and goodwill

~Increasing

complexity of computer infrastructure administration and


management

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Essential Terminologies
~

Threat An action or event that


might compromise security. A
threat is a potential violation of
security
~

Vulnerability Existence of a weakness,


design, or implementation error that can
lead to an unexpected, undesirable event
compromising the security of the system

Exploit A
defined way to
breach the
security of an IT
system through
vulnerability

Target of Evaluation An IT system,


product, or component that is
identified/subjected as requiring security
evaluation
~

EC-Council

Attack An assault on system security


that derives from an intelligent threat. An
attack is any action that violates security
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Elements of Security
~

Security A state of well-being of


information and infrastructures in
which the possibility of successful
yet undetected theft, tampering,
and disruption of information and
services is kept low or tolerable

Any hacking event will affect any one or


more of the essential security elements
EC-Council

Security rests on confidentiality,


authenticity, integrity, and availability
Confidentiality The
concealment of information or
resources
Authenticity The identification
and assurance of the origin of
information
Integrity The trustworthiness
of data or resources in terms of
preventing improper and
unauthorized changes
Availability The ability to use
the information or resource
desired

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

The Security, Functionality, and Ease


of Use Triangle
~

The number of exploits gets minimized when the number of


weaknesses is reduced => greater security

Takes more effort to conduct same task => reduced functionality


Functionality

Security
EC-Council

~Moving

the ball towards


security means moving
away from functionality
and ease of use

Ease of Use

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Case Study
~Alan

was stranded at Newark airport. He was to attend


his friend's wedding and Continental airlines just
announced the cancellation of his hop-over flight

~He

decided to purchase a seat on another airline, but the


Bank of America Corp ATM just wouldnt work

~All

seemed wrong with the world as the airline staff were


using pen and paper to take down new reservations. They
couldnt even confirm the availability

EC-Council

http://www.cnn.com/2003/TECH/internet/01/25/internet.attack/

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

What Does a Malicious Hacker Do?


~Reconnaissance

Active/passive
~Scanning
~Gaining

Reconnaissance

access

Operating system
level/application level
Network level
Denial of service
~Maintaining

access

Uploading/altering/
downloading programs
or data
~Clearing
EC-Council

tracks

Clearing
Tracks

Maintaining
Access

Scanning

Gaining
Access

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Phase 1 - Reconnaissance
~

Reconnaissance refers to the preparatory phase where an attacker


seeks to gather as much information as possible about a target of
evaluation prior to launching an attack

Business Risk: Notable - Generally noted as "rattling the door


knobs" to see if someone is watching and responding

Could be future point of return when noted for ease of entry for an
attack when more about the target is known on a broad scale

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Reconnaissance Types
Passive reconnaissance involves
acquiring information without
directly interacting with the
target
For example, searching public
records or news releases

Active reconnaissance involves


interacting with the target directly
by any means
For example, telephone calls to the
help desk or technical department

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Phase 2 - Scanning
~

Scanning refers to the pre-attack phase when the hacker scans the
network for specific information on the basis of information
gathered during reconnaissance

Business Risk: High Hackers have to get a single point of entry


to launch an attack

Scanning can include use of dialers, port scanners, network


mapping, sweeping, vulnerability scanners, and so on

NMAP Scanner
Front End

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Phase 3 - Gaining Access


~

Gaining Access refers to the penetration phase. The hacker exploits the
vulnerability in the system

The exploit can occur over a LAN, the Internet, or as a deception or theft.
Examples include buffer overflows, denial of service, session hijacking, and
password cracking

Influencing factors include architecture and configuration of the target


system, the skill level of the perpetrator, and the initial level of access
obtained

Business Risk: Highest The hacker can gain access at the operating system
level, application level, or network level

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Phase 4 - Maintaining Access


~

Maintaining Access refers to the phase when the hacker tries to


retain his ownership of the system

The hacker has compromised the system

Hackers may harden the system from other hackers as well (to own
the system) by securing their exclusive access with Backdoors,
RootKits, or Trojans

Hackers can upload, download, or manipulate data, applications,


and configurations on the owned system

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Phase 5 - Covering Tracks


~

Covering Tracks refers to the activities that the hacker undertakes


to hide his misdeed

Reasons include the need for prolonged stay, continued use of


resources, removing evidence of hacking, or avoiding legal action

Examples include Steganography, tunneling, and altering log files

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Types of Hacker Attacks


~

There are several ways an attacker can gain access to a


system

The attacker must be able to exploit a weakness or


vulnerability in a system
Attack Types:

1.

Operating System attacks

2. Application-level attacks
3. Shrink Wrap code attacks
4. Misconfiguration attacks

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

1. Operating System Attacks


~

Todays Operating systems are


complex in nature

Operating Systems run many


services, ports and modes of access
and requires extensive tweaking to
lock them down

The default install of most


operating systems has large
numbers of services running and
ports open

Applying patches and hotfixes are


not so easy in todays complex
network

Attackers look for OS


vulnerabilities and exploit them to
gain access to a network system

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Security News: Default Installation

Source: http://www.vnunet.com/vnunet/news/2164855/atm-passwords-found-online

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

2. Application Level Attacks


~

Software developers are under tight


schedules to deliver products on time

Extreme Programming is on the rise in


software engineering methodology

Software applications come with tons of


functionalities and features

There is not enough time to perform


complete testing before releasing
products

Security is often an afterthought and


usually delivered as "add-on
component

Poor or non-existent error checking in


applications which leads to Buffer
Overflow Attacks

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

3. Shrink Wrap Code Attacks


~

Why reinvent the wheel when you


can buy off-the-shelf libraries
and code?

When you install an


OS/Application, it comes with
tons of sample scripts to make the
life of an administrator easy

The problem is not fine


tuning or customizing these
scripts

This will lead to default code or


shrink wrap code attack

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

4. Misconfiguration Attacks
~ Systems

that should be fairly secure are hacked into because they


were not configured correctly

~ Systems

are complex and the administrator does not have the


necessary skills or resources to fix the problem

~ Most

often the administrator will create a simple configuration that


works

~ In

order to maximize your chances of configuring a machine


correctly, remove any unneeded services or software

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Remember This Rule!

If a hacker wants to get


inside your system, he will
and there is nothing you can
do about it
The only thing you can do is
make it harder for him to
get in
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Hacktivism
~

Refers to the idea of hacking with or for a


cause

Comprises hackers with a social or political


agenda

Aims at sending a message through their


hacking activity and gaining visibility for their
cause and themselves

Common targets include government


agencies, MNCs, or any other entity perceived
as bad or wrong by these groups or individuals

It remains a fact, however, that gaining


unauthorized access is a crime, no matter what
the intent

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Hacker Classes

Black Hats
Individuals with extraordinary
computing skills, resorting to
malicious or destructive
activities. Also known as
crackers

Gray Hats
Individuals who work both
offensively and defensively at
various times
EC-Council

White Hats
Individuals professing hacker
skills and using them for
defensive purposes. Also known
as security analysts

Suicide Hackers
Individuals who will aim to bring
down critical infrastructure for a
"cause" and not worry about facing
30 years in jail for their actions
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Security News: Suicide Hacker


http://www.zdnet.com.au/news/security/soa/Army_expects_suicide_hacker_attacks/0,130061744,339271362,00.htm

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Ethical Hacker Classes


~Former

Black Hats

Reformed crackers
First-hand experience
Lesser credibility perceived
~White

Hats

Independent security
consultants (may be groups as
well)
Claim to be knowledgeable
about black hat activities
~Consulting

Firms

Part of ICT firms


Good credentials

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

What Do Ethical Hackers Do?


~

If you know the enemy and know yourself, you need


not fear the result of a hundred battles
Sun Tzu, Art of War

Ethical hackers try to answer the


following questions:
What can the intruder see on the
target system? (Reconnaissance
and Scanning phases)
What can an intruder do with
that information? (Gaining
Access and Maintaining Access
phases)
Does anyone at the target notice
the intruders attempts or
successes? (Reconnaissance and
Covering Tracks phases)
EC-Council

~If hired by any organization,

an
ethical hacker asks the organization
what it is trying to protect, against
whom, and what resources it is willing
to expend in order to gain protection
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Can Hacking be Ethical?


Hacker refers to a person who
enjoys learning the details of
computer systems and how to
stretch their capabilities

Hacking describes the rapid


development of new programs or the
reverse engineering of already existing
software to make the code better and
more efficient
EC-Council

Cracker refers to a person who uses


his hacking skills for offensive
purposes

Ethical hacker refers to


security professionals who
apply their hacking skills for
defensive purposes
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

How to Become an Ethical Hacker?


To become an ethical hacker you must
meet the following requirements:

~ Should

be proficient with programming


and computer networking skills

~ Should

be familiar with vulnerability


research

~ Should

have mastery in different hacking


techniques

~ Should

be prepared to follow a strict


code of conduct

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Skill Profile of an Ethical Hacker


~
~

~
~

EC-Council

A computer expert adept at


technical domains
Has in-depth knowledge of target
platforms, such as Windows,
Unix, and Linux
Has exemplary knowledge of
networking and related hardware
and software
Knowledgeable about security
areas and related issues
In other words you must be
highly technical to launch
sophisticated attacks

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

What is Vulnerability Research?


~

Discovering vulnerabilities and design weaknesses that


will open an operating system and its applications to
attack or misuse

Includes both dynamic study of products and


technologies and ongoing assessment of the hacking
underground

Relevant innovations are released in the form of alerts


and are delivered within product improvements for
security systems

~ Can be classified based on:


Severity level (low, medium, or high)
Exploit range (local or remote)

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Why Hackers Need Vulnerability


Research?
~

To identify and correct network vulnerabilities

To protect the network from being attacked by intruders

To get information that helps prevent security problems

To gather information about viruses

To find weaknesses in the network and to alert the network


administrator before a network attack

To know how to recover from a network attack

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Vulnerability Research Tools


US-CERT publishes information regarding a variety of
vulnerabilities in US-CERT Vulnerabilities Notes
~
~
~
~
~
~

EC-Council

Similar to alerts but contain less information


Does not contain the solutions to all the vulnerabilities
Contains vulnerabilities that meet certain criteria
Contains information that is useful to the administrator
Vulnerability notes can be searched by several key fields:
name, vulnerability ID number, and CVE-name
Can be cross checked with the Common Vulnerabilities and
Exposures (CVE) catalog

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Vulnerability Research Websites


~ www.securitytracker.com
~ www.microsoft.com/security
~ www.securiteam.com
~ www.packetstormsecurity.com
~ www.hackerstorm.com
~ www.hackerwatch.org

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Secunia (secunia.com/product/)
Secunia monitors vulnerabilities in more than 9,500 products

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Hackerstorm Vulnerability Database


Tool (www.hackerstorm.com)
~

You can search CVS Vulnerability database using this tool


Updates provided daily and are free
You can view Vulnerability database offline (without Internet
access)
Easy to use Web-based GUI, requires a browser with flash
Data includes description, solution, attack type, external
references, and credit
Source is available for those who wish to contribute and enhance
the tool
Data is provided by www.osvdb.org and its contributors

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Hackerstorm

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

HackerWatch

www.hackerwatch.org

HackerWatch lets you report and share


information that helps identify, combat,
and prevent the spread of Internet threats
and unwanted network traffic

HackerWatch provides reports and


graphical up-to-date snapshots of unwanted
Internet traffic and threats

Snapshots include critical port incidents


graphs, worldwide port activity statistics,
and target and source maps showing
unwanted traffic and potential threats to
Internet security

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

HackerWatch

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

HackerWatch Live Animation of Virus


Outbreak

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Zone-h.org Reports Web Page


Defacement Mirror Images
~
~
~

EC-Council

Zone-h.org reports web attacks and cybercrimes as an


independent observatory and lists them on their website
You will be able to see tons of defaced webpages
The list is updated every day

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Zone-h.org Screenshot 1

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Zone-h.org Screenshot 2

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

MILWORM

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

How to Conduct Ethical Hacking?


~Step

1: Talk to your client on the needs of testing

~Step

2: Prepare NDA documents and ask the client to sign them

~Step

3: Prepare an ethical hacking team and draw up schedule for

testing
~Step

4: Conduct the test

~Step

5: Analyze the results and prepare a report

~Step

6: Deliver the report to the client

Note: In-depth Penetration Testing methodology is covered in ECCouncils LPT program

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

How Do They Go About It?


~

Any security evaluation involves three components:


Preparation In this phase, a formal
contract is signed that contains a nondisclosure clause as well as a legal clause
to protect the ethical hacker against any
prosecution that might otherwise attract
during the conduct phase. The contract
also outlines infrastructure perimeter,
evaluation activities, time schedules, and
resources available to him

Conduct In this
phase, the evaluation
technical report is
prepared based on
testing potential
vulnerabilities

Conclusion In this
phase, the results of
the evaluation are
communicated to
the organization or
sponsors and
corrective action is
taken if needed
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Approaches to Ethical Hacking


~

Remote network This


approach attempts to
simulate an intruder
launching an attack over the
Internet

Remote dial-up network


This approach attempts to
simulate an intruder
launching an attack against
the clients modem pools

Local network This


approach simulates an
employee with legal access
gaining unauthorized access
over the local network

EC-Council

~Stolen

equipment This approach


simulates theft of a critical
information resource, such as a laptop
owned by a strategist that was taken
from its owner and given to the ethical
hacker
~Social

engineering This approach


attempts to check the integrity of the
organizations employees
~Physical

entry This approach


attempts to physically compromise
the organizations ICT infrastructure
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Ethical Hacking Testing


~

There are different forms of security testing. Examples include


vulnerability scanning, ethical hacking, and penetration testing

Approaches to testing are shown below


Black box With no prior knowledge of the infrastructure to be
tested
White box With a complete knowledge of the network
infrastructure
Gray box Also known as Internal Testing. Examines the extent of
access by insiders within the network

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Ethical Hacking Deliverables


An Ethical Hacking Report :
~

Details the results of the hacking activity,


matching it against the work schedule
decided prior to the conduct phase

Vulnerabilities are detailed and prevention


measures suggested. Usually delivered in
hard copy format for security reasons

~Issues to consider Nondisclosure

clause in the legal contract (availing the


right information to the right person),
integrity of the evaluation team,
sensitivity of information

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Computer Crimes and Implications

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Computer Crimes and Implications


(contd)
~

The Cyber Security Enhancement Act of


2002 mandates life sentences for hackers
who recklessly endanger the lives of others

The CSI/FBI 2002 Computer Crime and


Security Survey noted that 90 percent of
respondents acknowledged security
breaches, but only 34 percent reported the
crimes to law enforcement agencies

The FBI computer crimes squad estimates


that between 85 and 97 percent of computer
intrusions are not even detected

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Legal Perspective
(U.S. Federal Law)
Federal Criminal Code Related to Computer Crime:
~

18 U.S.C. 1029. Fraud and Related Activity in Connection


with Access Devices

18 U.S.C. 1030. Fraud and Related Activity in Connection


with Computers

18 U.S.C. 1362. Communication Lines, Stations, or


Systems

18 U.S.C. 2510 et seq. Wire and Electronic


Communications Interception and Interception of Oral
Communications

18 U.S.C. 2701 et seq. Stored Wire and Electronic


Communications and Transactional Records Access

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Section 1029
Subsection (a) Whoever (1) knowingly and with intent to defraud produces, uses, or traffics in
one or more counterfeit access devices;
(2) knowingly and with intent to defraud traffics in or uses one or
more unauthorized access devices during any one-year period, and
by such conduct obtains anything of value aggregating $1,000 or
more during that period;
(3) knowingly and with intent to defraud possesses fifteen or more
devices which are counterfeit or unauthorized access devices;
(4) knowingly, and with intent to defraud, produces, traffics in, has
control or custody of, or possesses device-making equipment;

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Section 1029 (contd)


(5) knowingly and with intent to defraud effects transactions, with 1 or
more access devices issued to another person or persons, to receive
payment or any other thing of value during any 1-year period the
aggregate value of which is equal to or greater than $1,000;
(6) without the authorization of the issuer of the access device,
knowingly and with intent to defraud solicits a person for the
purpose of
(A) offering an access device; or
(B) selling information regarding or an application to obtain an access
device;

(7) knowingly and with intent to defraud uses, produces, traffics in,
has control or custody of, or possesses a telecommunications
instrument that has been modified or altered to obtain
unauthorized use of telecommunications services;
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Section 1029 (contd)


(8) knowingly and with intent to defraud uses, produces, traffics in,
has control or custody of, or possesses a scanning receiver;
(9) knowingly uses, produces, traffics in, has control or custody of, or
possesses hardware or software, knowing it has been configured to
insert or modify telecommunication identifying information
associated with or contained in a telecommunications instrument
so that such instrument may be used to obtain telecommunications
service without authorization; or
(10) without the authorization of the credit card system member or its
agent, knowingly and with intent to defraud causes or arranges for
another person to present to the member or its agent, for payment,
1 or more evidences or records of transactions made by an access
device
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Penalties
(A) in the case of an offense that does not occur after a conviction for
another offense under this section- (i) if the offense is under paragraph (1), (2), (3), (6), (7), or (10) of
subsection (a), a fine under this title or imprisonment for not more than
10 years, or both; and
(ii) if the offense is under paragraph (4), (5), (8), or (9) of subsection (a),
a fine under this title or imprisonment for not more than 15 years, or
both;

(B) in the case of an offense that occurs after a conviction for another
offense under this section, a fine under this title or imprisonment for
not more than 20 years, or both; and
(C) in either case, forfeiture to the United States of any personal
property used or intended to be used to commit the offense

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Section 1030 (a) (1)


Subsection (a) Whoever-(1) having knowingly accessed a computer without authorization or exceeding
authorized access, and by means of such conduct having obtained
information that has been determined by the United States Government
pursuant to an Executive order or statute to require protection against
unauthorized disclosure for reasons of national defense or foreign relations,
or any restricted data, as defined in paragraph y of section 11 of the Atomic
Energy Act of 1954, with reason to believe that such information so obtained
could be used to the injury of the United States, or to the advantage of any
foreign nation willfully communicates, delivers, transmits, or causes to be
communicated, delivered, or transmitted, or attempts to communicate,
deliver, transmit or cause to be communicated, delivered, or transmitted the
same to any person not entitled to receive it, or willfully retains the same and
fails to deliver it to the officer or employee of the United States entitled to
receive it;

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Section 1030 (2) (A) (B) (C)


(2) intentionally accesses a computer without
authorization or exceeds authorized access, and thereby
obtains-(A) information contained in a financial record of a financial
institution, or of a card issuer as defined in section 1602(n) of
title 15, or contained in a file of a consumer reporting agency on
a consumer, as such terms are defined in the Fair Credit
Reporting Act (15 U.S.C. 1681 et seq.);
(B) information from any department or agency of the United
States; or
(C) information from any protected computer if the conduct
involved an interstate or foreign communication;
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Section 1030 (3) (4)


(3) intentionally, without authorization to access any nonpublic
computer of a department or agency of the United States, accesses
such a computer of that department or agency that is exclusively
for the use of the Government of the United States or, in the case of
a computer not exclusively for such use, is used by or for the
Government of the United States and such conduct affects that use
by or for the Government of the United States;
(4) knowingly and with intent to defraud, accesses a protected
computer without authorization, or exceeds authorized access, and
by means of such conduct furthers the intended fraud and obtains
anything of value, unless the object of the fraud and the thing
obtained consists only of the use of the computer and the value of
such use is not more than $5,000 in any 1-year period;

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Section 1030 (5) (A) (B)


(5)(A)(i) knowingly causes the transmission of a program,
information, code, or command, and as a result of such conduct,
intentionally causes damage without authorization, to a protected
computer;
(ii) intentionally accesses a protected computer without authorization,
and as a result of such conduct, recklessly causes damage; or
(iii) intentionally accesses a protected computer without authorization,
and as a result of such conduct, causes damage; and

(5)(B) by conduct described in clause (i), (ii), or (iii) of subparagraph


(A), caused (or, in the case of an attempted offense, would, if
completed, have caused)--

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Section 1030 (5) (B) (contd)


(i) loss to 1 or more persons during any 1-year period (and, for
purposes of an investigation, prosecution, or other proceeding
brought by the United States only, loss resulting from a related
course of conduct affecting 1 or more other protected computers)
aggregating at least $5,000 in value;
(ii) the modification or impairment, or potential modification or
impairment, of the medical examination, diagnosis, treatment, or
care of 1 or more individuals;
(iii) physical injury to any person;
(iv) a threat to public health or safety; or
(v) damage affecting a computer system used by or for a government
entity in furtherance of the administration of justice, national
defense, or national security;

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Section 1030 (6) (7)


(6) knowingly and with intent to defraud traffics (as defined in section
1029) in any password or similar information through which a
computer may be accessed without authorization, if-(A) such trafficking affects interstate or foreign commerce; or
(B) such computer is used by or for the Government of the United States;

(7) with intent to extort from any person any money or other thing of
value, transmits in interstate or foreign commerce any
communication containing any threat to cause damage to a
protected computer;

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Penalties
(1)(A) a fine under this title or imprisonment for not more than ten years, or
both, in the case of an offense under subsection (a)(1) of this section which
does not occur after a conviction for another offense under this section, or
an attempt to commit an offense punishable under this subparagraph; and
(B) a fine under this title or imprisonment for not more than twenty years, or
both, in the case of an offense under subsection (a)(1) of this section which
occurs after a conviction for another offense under this section, or an
attempt to commit an offense punishable under this subparagraph;
(2)(A) except as provided in subparagraph (B), a fine under this title or
imprisonment for not more than one year, or both, in the case of an
offense under subsection (a)(2), (a)(3), (a)(5)(A)(iii), or (a)(6) of this
section which does not occur after a conviction for another offense under
this section, or an attempt to commit an offense punishable under this
subparagraph;

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Penalties (contd)
~

(B) a fine under this title or imprisonment for not more than 5 years,
or both, in the case of an offense under subsection (a)(2), or an
attempt to commit an offense punishable under this subparagraph, if (i) the offense was committed for purposes of commercial advantage or
private financial gain;
(ii) the offense was committed in furtherance of any criminal or tortuous
act in violation of the Constitution or laws of the United States or of any
State; or
(iii) the value of the information obtained exceeds $5,000;

(C) a fine under this title or imprisonment for not more than ten
years, or both, in the case of an offense under subsection (a)(2), (a)(3)
or (a)(6) of this section which occurs after a conviction for another
offense under this section, or an attempt to commit an offense
punishable under this subparagraph;

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Penalties (contd)
(3)(A) a fine under this title or imprisonment for not more than five
years, or both, in the case of an offense under subsection (a)(4) or
(a)(7) of this section which does not occur after a conviction for
another offense under this section, or an attempt to commit an
offense punishable under this subparagraph; and
(3)(B) a fine under this title or imprisonment for not more than ten
years, or both, in the case of an offense under subsection (a)(4),
(a)(5)(A)(iii), or (a)(7) of this section which occurs after a
conviction for another offense under this section, or an attempt to
commit an offense punishable under this subparagraph; and

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Penalties (contd)
(4)(A) a fine under this title, imprisonment for not more than 10
years, or both, in the case of an offense under subsection
(a)(5)(A)(i), or an attempt to commit an offense punishable under
that subsection;
(4)(B) a fine under this title, imprisonment for not more than 5 years,
or both, in the case of an offense under subsection (a)(5)(A)(ii), or
an attempt to commit an offense punishable under that subsection;
(4)(C) a fine under this title, imprisonment for not more than 20
years, or both, in the case of an offense under subsection
(a)(5)(A)(i) or (a)(5)(A)(ii), or an attempt to commit an offense
punishable under either subsection, that occurs after a conviction
for another offense under this section

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Japans Cyber Laws


Law No. 128 of 1999 (in effect from February 3, 2000)
Husei access kinski hou
Article 3. No person shall conduct an act of unauthorized computer
access.
(1) An act of making available a specific use which is restricted by an access

control function by making in operation a specific computer having that access


control function through inputting into that specific computer, via
telecommunication line, another persons identification code for that access
control function
(2) An act of making available a restricted specific use by making in operation a
specific computer having that access control function through inputting into it,
via telecommunication line, any information (excluding an identification code)
or command that can evade the restrictions placed by that access control
function on that specific use

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Japans Cyber Laws (contd)


(3) An act of making available a restricted specific use by making in operation
a specific computer, whose specific use is restricted by an access control
function installed into another specific computer which is connected, via a
telecommunication line, to that specific computer, through inputting into it,
via a telecommunication, any information or command that can evade the
restriction concerned
Article 4. No person shall provide another person's identification code relating to
an access control function to a person other than the access administrator for
that access control function or the authorized user for that identification code,
in indicating that it is the identification code for which specific computer's
specific use, or at the request of a person who has such knowledge, excepting
the case where such acts are conducted by that access administrator, or with
the approval of that access administrator or of that authorized user
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Japans Cyber Laws (contd)


Article 8. A person who falls under one of the
following items shall be punished with penal
servitude for not more than one year or a fine of
not more than 500,000 yen:
(1) A person who has infringed the provision of
Article 3, paragraph 1;
Article 9. A person who has infringed the
provision of Article 4 shall be punished with a
fine of not more than 300,000 yen

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

United Kingdoms Cyber Laws


Computer Misuse Act 1990
(1) A person is guilty of an offense if(a) he causes a computer to perform any function with the intent to secure
access to any program or data held in any computer,
(b) the access he intends to secure is unauthorized, and
(c) he knows at the time when he causes the computer to perform the function
that that is the case

(2) The intent a person has to have to commit an offense under this
section need not to be directed at:
(a) any particular program or data,
(b) a program or data of any particular kind, or
(c) a program or data held in any particular computer

(3) A person guilty of an offense under this section shall be liable on


summary conviction to imprisonment for a term not exceeding six
months or to a fine not exceeding level 5 on the standard scale or to
both
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

United Kingdoms Cyber Laws (contd)


(4) A person is guilty of an offense under this section if he commits an
offense under section 1 above (" the unauthorized access offense") with
intent
(a) to commit an offense to which this section applies; or
(b) to facilitate the commission of such an offense and the offense he
intends to commit or facilitate is referred to below in this section as
the further offense
(5) This section applies to offences
(a) for which the sentence is fixed by law; or
(b) for which a person of twenty-one years of age or over (not
previously convicted) may be sentenced to imprisonment for a term of
five years
(6) It is immaterial for the purposes of this section whether the further
offense is to be committed on the same occasion as the unauthorized
access offense or on any future occasion
(7) A person may be guilty of an offense under this section even though
the facts are such that the commission of the further offense is
impossible
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

United Kingdoms Cyber Laws (contd)


(8) A person guilty of an offense under this section shall be liable
(a) on summary conviction, to imprisonment for a term not exceeding the
statutory maximum or to both; and
(b) on conviction on indictment, to imprisonment for a term not exceeding
five years or to a fine or to both

(9) A person is guilty of an offense if (a) he does any act which causes an unauthorized modification of the
contents of any computer; and (b) at the time when he does the act he has the requisite intent and the
requisite knowledge.
(10) For the purposes of subsection (1)(b) above the requisite intent is an
intent to cause a modification of the contents of any and by so doing (a) to impair the operation of any computer;
(b) to prevent or hinder access to any program or data held in any
computer; or
(c) to impair the operation of any such program or the reliability of
any such data
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Australias Cyber Laws


According to CYBERCRIME ACT 2001
The Cyber crime Act 2001 amended the Criminal Code Act
1995 to replace existing outdated computer offences.
A person is guilty of an offence if:
(a) the person causes any unauthorized access to, or
modification of, restricted data
(b) the person intends to cause the access or modification
(c) the person knows that the access or modification is
unauthorized
(d) one or more of the following applies:

(i) the restricted data is held in a Commonwealth computer


(ii) the restricted data is held on behalf of the Commonwealth
(iii) the access to, or modification of, the restricted data is caused by
means of a telecommunications service
Penalty: 2 years imprisonment
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Germanys Cyber Laws


Penal Code Section 202a. Data Espionage:
(1) Any person who obtains without authorization,
for himself or for another, data which are not
meant for him and which are specially protected
against unauthorized access, shall be liable to
imprisonment for a term not exceeding three years
or to a fine .
(2) Data within the meaning of subsection 1 are
only such as are stored or transmitted
electronically or magnetically or in any form not
directly visible.
Penal Code Section 303a: Alteration of Data
(1) Any person who unlawfully erases, suppresses,
renders useless, or alters data (section 202a(2))
shall be liable to imprisonment for a term not
exceeding two years or to a fine.
(2) The attempt shall be punishable
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Singapores Cyber Laws


Chapter 50A: Computer misuse Act
Section 3 (1) Any person who knowingly causes a computer to perform any
function for the purpose of securing access without authority, shall be liable on
conviction to a fine not exceeding $ 5.000 or to imprisonment for a term not
exceeding 2 years or to both.
(2) If any damage is caused as a restut of an offence under this
section, a person convicted of the offence shall be liable to a fine not exceeding
$ 50.000 or to imprisonment for a term not exceeding 7 years or to both
Section 4: Access with intent to commit or facilitate commission of offence
(1) This section shall apply to an offence involving property,
fraud, dishonesty or which causes bodily harm and which is punishable on
conviction with imprisonment for a term of not less than 2 years.
(2) Any person guilty of an offence under this section shall be
liable on conviction to a not exceeding $ 50.000 or to imprisonment for a term
not exceeding 10 years or to both
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

What happened next?


Even though Jeffreys intention was honest, his
action is considered illegitimate.
Hacking into networks, without prior
permission of concerned authorities and a legal
clearance from the court of law, is considered a
criminal offence

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Summary
~

Security is critical across sectors and industries

Ethical Hacking is a methodology to simulate a


malicious attack without causing damage

Hacking involves five distinct phases

Security evaluation includes preparation, conduct, and


evaluation phases

Cyber crime can be differentiated into two categories

U.S. Statutes 1029 and 1030 primarily address cyber


crime

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Potrebbero piacerti anche