Module 06: System Hacking

 

Module 06: System Hacking

Scenario

Since security and compliance are high priorities for most organizations, attacks on an organization’s computer systems take many different forms such as spoofing, smurfing, and other types of Denial-of-Service (DoS) attacks. These attacks are designed to harm or interrupt the use of operational systems.

Earlier, you gathered all possible information about the target through techniques such as footprinting, scanning, enumeration, and vulnerability analysis. In the first step (footprinting) of the security assessment and penetration testing of your organization, you collected open-source information about your organization. In the second step (scanning), you collected information about open ports and services, OSes, and any configuration lapses. In the third step (enumeration), you collected information about NetBIOS names, shared network resources, policy and password details, users and user groups, routing tables, and audit and service settings. In the fourth step (vulnerability analysis), you collected information about network vulnerabilities, application and service configuration errors, applications installed on the target system, accounts with weak passwords, and files and folders with weak permissions.

Now, the next step for an ethical hacker or a penetration tester is to perform system hacking on the target system using all information collected in the earlier phases. System hacking is one of the most important steps that is performed after acquiring information through the above techniques. This information can be used to hack the target system using various hacking techniques and strategies.

System hacking helps to identify vulnerabilities and security flaws in the target system and predict the effectiveness of additional security measures in strengthening and protecting information resources and systems from attack.

The labs in this module will provide you with a real-time experience in exploiting underlying vulnerabilities in target systems using various online sources and system hacking techniques and tools. However, system hacking activities may be illegal depending on the organization’s policies and any laws that are in effect. As an ethical hacker or pen tester, you should always acquire proper authorization before performing system hacking.

Objective

The objective of this lab is to monitor a target system remotely and perform other tasks that include, but are not limited to:

  • Bypassing access controls to gain access to the system (such as password cracking and vulnerability exploitation)
  • Acquiring the rights of another user or an admin (privilege escalation)
  • Creating and maintaining remote access to the system (executing applications such as trojans, spyware, backdoors, and keyloggers)
  • Hiding malicious activities and data theft (executing applications such as Rootkits, steganography, etc.)
  • Hiding the evidence of compromise (clearing logs)

Overview of System Hacking

In preparation for hacking a system, you must follow a certain methodology. You need to first obtain information during the footprinting, scanning, enumeration, and vulnerability analysis phases, which can be used to exploit the target system.

There are four steps in the system hacking:

  • Gaining Access: Use techniques such as cracking passwords and exploiting vulnerabilities to gain access to the target system

  • Escalating Privileges: Exploit known vulnerabilities existing in OSes and software applications to escalate privileges

  • Maintaining Access: Maintain high levels of access to perform malicious activities such as executing malicious applications and stealing, hiding, or tampering with sensitive system files

  • Clearing Logs: Avoid recognition by legitimate system users and remain undetected by wiping out the entries corresponding to malicious activities in the system logs, thus avoiding detection.

Lab Tasks

Ethical hackers or pen testers use numerous tools and techniques to hack the target systems. Recommended labs that will assist you in learning various system hacking techniques include:

  1. Gain access to the system

    • Perform active online attack to crack the system’s password using Responder
    • Audit system passwords using L0phtCrack
    • Find vulnerabilities on exploit sites
    • Exploit client-side vulnerabilities and establish a VNC session
    • Gain access to a remote system using Armitage
    • Hack a Windows machines with a malicious Office document using TheFatRat
    • Perform buffer overflow attack to gain access to a remote system
  2. Perform privilege escalation to gain higher privileges

    • Escalate privileges using privilege escalation tools and exploit client-side vulnerabilities
    • Hack a Windows machine using Metasploit and perform post-exploitation using Meterpreter
  3. Maintain remote access and hide malicious activities

    • User system monitoring and surveillance using Power Spy
    • User system monitoring and surveillance using Spytech SpyAgent
    • Hide files using NTFS streams
    • Hide data using white space steganography
    • Image steganography using OpenStego
    • Covert channels using Covert_TCP
  4. Clear logs to hide the evidence of compromise

    • View, enable, and clear audit policies using Auditpol
    • Clear Windows machine logs using various utilities
    • Clear Linux machine logs using the BASH shell
    • Clear Windows machine logs using CCleaner

Comments

Popular posts from this blog

Lab 1: Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools

Lab 5: Perform Cryptanalysis using Various Cryptanalysis Tools

Task 2: Perform OS Discovery using Nmap Script Engine (NSE)