Ethical Hacking Unit-3
Ethical Hacking Unit-3
Ethical Hacking Unit-3
UNIT - III
Technical Preparation
Hackers have broken into billions of accounts throughout the years. It is not altogether unlikely that you
have been personally affected by one of these attacks.
You don’t have to be a cybersecurity expert to prepare yourself from hackers. It’s much easier to protect
your data, your identity, or your company than you may think.
Thankfully, there are a few resources that will help you create unbreakable passwords, find out whether
or not any of your personal accounts have been hacked, and update existing software. Cybersecurity
strategies can also help you prepare for hacks and protect yourself.
Here are 6 surefire ways to defend yourself from hacking attacks:
TechCrunch
CNET
Wired
Reuters
Most national and international newspapers will also highlight issues in technology and cybersecurity.
Be sure to keep an eye out for these sections in your daily periodical. Simply reading one or two security
stories every few weeks will help keep you in the know.
One trick for remembering strong passwords is to create a sentence or meaningful phrase out of the
password. So, for example, g00D7Hinkn5!, could be referred to by the phrase “good thinking!”
Following are important requirements that are present in almost every rules of engagement
A proper “permission to hack” and a “nondisclosure” agreement should be signed by both the
parties.
The scope of the engagement and what part of the organization must be tested.
The project duration including both the start and the end date.
The methodology to be used for conducting a ethical hack.
The goals of a ethical hack.
The allowed and disallowed techniques, whether denial-of-service testing should be
performed or not.
The liabilities and responsibilities, which are decided ahead of time. As a ethical hacker you
might break into something that should not be accessible, causing a denial of service; also,
you might access sensitive information such as credit cards. Therefore, the liabilities should
be defined prior to the engagement.
Never exceed the limits of your authorization. Every assignment will have rules of
engagement. These not only include what you are authorized to target, but also the extent
that you are authorized to control such system. If you are only authorized to obtain a prompt
on the target system, downloading passwords and starting a crack on these passwords would
be in excess of what you have been authorized to do.
The tester should protect himself by setting up limitation as far as damage is concerned.
There has to be an NDA between the client and the tester to protect them both.
Be ethical That’s right; the big difference between a hacker and an ethical hacker is the word
ethics. Ethics is a set of moral principles about what is correct or the right thing to do. Ethical
standards are sometimes different from legal standards in that laws define what we must do,
whereas ethics define what we should do.
Maintain confidentiality During security evaluations, you will likely be exposed to many types
of confidential information. You have both a legal and moral standard to treat this information
with the utmost privacy.
Penetration Testing
Penetration Testing is currently widely used when referring to a security vulnerability assessment and
is primarily focused on penetrating an organisation’s defensive systems. A penetration test can also
be used to find any vulnerabilities and weaknesses on a particular focus product/application before
"sign-off". This will normally last between 2-14 days with a singular report at the end and should
always be considered a point in time assessment of security.
Those conducting a penetration test can be running tests on both internal & external network
infrastructures and systems as well as wireless network infrastructure and against mobile and mobile
applications, to identify any:
If security flaws are identified, the tester will often provide remediation advice to resolve or implement
appropriate controls/processes to ensure that security systems are effective and comply with a range
of data and privacy regulations. Such as EU GDPR (General Data Protection Regulation), DPA (Data
Protection Act) 2018, and PCI DSS (Payment Card Industry Data Security Standard).
Red Team Engagement
Unlike a penetration test, a red team engagement assessment is a larger-scale security assessment
across the entire organisation to reduce the risk from cyber threats. Red team engagements are
typically not bound by a traditional or focused scope, meaning that there are no restrictions as to what
can be looked at within security systems and the business. This can include analysing systems,
applications, software, employee engagement, physical security, and learning how they interact with
each other.
Red team engagements blend various skills used by attackers to perform a security assessment,
including but not limited to full exploitation, vulnerability chaining and social engineering.
To ensure that the security assessment is under the right conditions, those conducting the test will act
how a cybercriminal would, and people within the organisation will know as little as possible
beforehand. Except for those in the organisation that will need to approve it of course.
This is to make sure there is no interference with the security assessment and that the reports are
accurate as possible.
Depending on the length of the assessment, a detailed report will be provided both regularly
throughout and at the end of the assessment. Below is a handful of topics in which the report will
cover:
Types of attacks undertaken and their successfulness - did existing systems and controls detect and
respond to attacks (e.g. Did users report Phishing attacks)
Details of compromised systems, data, at the initial kick-off High-Value Targets (HTV) are often set, if
any of these HVTs are compromised these will be reported
Indicators of compromise, sometimes red team testing will uncover previous compromises.
Due to the scope and what is involved with a 'Red Team Engagement' assessment, the process can
typically last several months or longer!
CREST certification
CREST STAR – 'Simulated Target Attack & Response' (Red Teaming)
PCI DSS penetration testing – for the Payment Card Industry (PCI)
Certified Ethical Hacker (CEH) program - provided by the EC-Council (International Council of E-
Commerce Consultants
While these qualifications are useful when looking for a security assessment provider, they shouldn't
be a deciding factor. A service provider that has the relevant knowledge base and has earned your
trust will be able to deliver the security assessment that’s required.
Reconnaissance:
Reconnaissance is the information-gathering stage of ethical hacking, where you collect data about
the target system. This data can include anything from network infrastructure to employee contact
details. The goal of reconnaissance is to identify as many potential attack vectors as possible.
Social Engineering
Social engineering is a manipulation technique that exploits human error to gain private information,
access, or valuables. In cybercrime, these “human hacking” scams tend to lure unsuspecting users
into exposing data, spreading malware infections, or giving access to restricted systems. Attacks can
happen online, in-person, and via other interactions.
Scams based on social engineering are built around how people think and act. As such, social
engineering attacks are especially useful for manipulating a user’s behavior. Once an attacker
understands what motivates a user’s actions, they can deceive and manipulate the user effectively.
In addition, hackers try to exploit a user's lack of knowledge. Thanks to the speed of technology,
many consumers and employees aren’t aware of certain threats like drive-by downloads. Users also
may not realize the full value of personal data, like their phone number. As a result, many users are
unsure how to best protect themselves and their information.
This social engineering definition can be further expanded by knowing exactly how it works.
The attack cycle gives these criminals a reliable process for deceiving you. Steps for the social
engineering attack cycle are usually as follows:
1. Prepare by gathering background information on you or a larger group you are a part of.
2. Infiltrate by establishing a relationship or initiating an interaction, started by building trust.
3. Exploit the victim once trust and a weakness are established to advance the attack.
4. Disengage once the user has taken the desired action.
This process can take place in a single email or over months in a series of social media chats. It could
even be a face-to-face interaction. But it ultimately concludes with an action you take, like sharing
your information or exposing yourself to malware.
It's important to beware of social engineering as a means of confusion. Many employees and
consumers don't realize that just a few pieces of information can give hackers access to multiple
networks and accounts.
By masquerading as legitimate users to IT support personnel, they grab your private details — like
name, date of birth or address. From there, it's a simple matter to reset passwords and gain almost
unlimited access. They can steal money, disperse social engineering malware, and more.
Traits of Social Engineering Attacks
Social engineering attacks center around the attacker’s use of persuasion and confidence. When
exposed to these tactics, you are more likely to take actions you otherwise wouldn’t.
Among most attacks, you’ll find yourself being misled into the following behaviors:
Heightened emotions :
Emotional manipulation gives attackers the upper hand in an any interaction. You are far more likely
to take irrational or risky actions when in an enhanced emotional state. The following emotions are all
used in equal measure to convince you.
Fear
Excitement
Curiosity
Anger
Guilt
Sadness
Urgency:
Time-sensitive opportunities or requests are another reliable tool in an attacker’s arsenal. You may be
motivated to compromise yourself under the guise of a serious problem that needs immediate
attention. Alternatively, you may be exposed to a prize or reward that may disappear if you do not act
quickly. Either approach overrides your critical thinking ability.
Trust: Believability is invaluable and essential to a social engineering attack. Since the attacker is
ultimately lying to you, confidence plays an important role here. They’ve done enough research on
you to craft a narrative that’s easy to believe and unlikely to rouse suspicion.
There are some exceptions to these traits. In some cases, attackers use more simplistic methods of
social engineering to gain network or computer access. For example, a hacker might frequent the
public food court of a large office building and "shoulder surf" users working on their tablets or laptops.
Doing so can result in a large number of passwords and usernames, all without sending an email or
writing a line of virus code.
Now that you understand the underlying concept, you’re probably wondering “what is social
engineering attack and how can I spot it?”
Social engineering can impact you digitally through mobile attacks in addition to desktop devices.
However, you can just as easily be faced with a threat in-person. These attacks can overlap and layer
onto each other to create a scam.
1. Spam phishing, or mass phishing, is a widespread attack aimed at many users. These attacks are
non-personalized and try to catch any unsuspecting person.
2. Spear phishing and by extension, whaling , use personalized info to target particular users. Whaling
attacks specifically aim at high-value targets like celebrities, upper management, and high
government officials.
Whether it’s a direct communication or via a fake website form, anything you share goes directly into
a scammer’s pocket. You may even be fooled into a malware download containing the next stage of
the phishing attack. Methods used in phishing each have unique modes of delivery, including but not
limited to:
Voice phishing (vishing) phone calls may be automated message systems recording all your inputs.
Sometimes, a live person might speak with you to increase trust and urgency.
SMS phishing (smishing) texts or mobile app messages might include a web link or a prompt to
follow-up via a fraudulent email or phone number.
Email phishing is the most traditional means of phishing, using an email urging you to reply or follow-
up by other means. Web links, phone numbers, or malware attachments can be used.
Angler phishing takes place on social media, where an attacker imitates a trusted company’s
customer service team. They intercept your communications with a brand to hijack and divert your
conversation into private messages, where they then advance the attack.
Search engine phishing attempt to place links to fake websites at the top of search results. These
may be paid ads or use legitimate optimization methods to manipulate search rankings.
URL phishing links tempt you to travel to phishing websites. These links are commonly delivered in
emails, texts, social media messages, and online ads. Attacks hide links in hyperlinked text or
buttons, using link-shortening tools, or deceptively spelled URLs.
In-session phishing appears as an interruption to your normal web browsing. For example, you may
see such as fake login pop-ups for pages you’re currently visiting.
Baiting Attacks
Baiting abuses your natural curiosity to coax you into exposing yourself to an attacker. Typically,
potential for something free or exclusive is the manipulation used to exploit you. The attack usually
involves infecting you with malware.
Popular methods of baiting can include:
USB drives left in public spaces, like libraries and parking lots.
Email attachments including details on a free offer, or fraudulent free software.
Physical breaches involve attackers appearing in-person, posing as someone legitimate to gain
access to otherwise unauthorized areas or information.
Attacks of this nature are most common in enterprise environments, such as governments,
businesses, or other organizations. Attackers may pretend to be a representative of a known, trusted
vendor for the company. Some attackers may even be recently fired employees with a vendetta
against their former employer.
They make their identity obscure but believable enough to avoid questions. This requires a bit of
research on the attacker’s part and involves high-risk. So, if someone is attempting this method,
they’ve identified clear potential for a highly valuable reward if successful.
Pretexting Attacks
Pretexting uses a deceptive identity as the “pretext” for establishing trust, such as directly
impersonating a vendor or a facility employee. This approach requires the attacker to interact with you
more proactively. The exploit follows once they’ve convinced you they are legitimate.
Tailgating , or piggybacking, is the act of trailing an authorized staff member into a restricted-access
area. Attackers may play on social courtesy to get you to hold the door for them or convince you that
they are also authorized to be in the area. Pretexting can play a role here too.
Quid pro quo is a term roughly meaning “a favor for a favor,” which in the context of phishing means
an exchange of your personal info for some reward or other compensation. Giveaways or offers to
take part in research studies might expose you to this type of attack.
The exploit comes from getting you excited for something valuable that comes with a low investment
on your end. However, the attacker simply takes your data with no reward for you.
DNS Spoofing and Cache Poisoning Attacks
DNS spoofing manipulates your browser and web servers to travel to malicious websites when you
enter a legitimate URL. Once infected with this exploit, the redirect will continue unless the inaccurate
routing data is cleared from the systems involved.
DNS cache poisoning attacks specifically infect your device with routing instructions for the
legitimate URL or multiple URLs to connect to fraudulent websites.
Scareware Attacks
Scareware is a form of malware used to frighten you into taking an action. This deceptive malware
uses alarming warnings that report fake malware infections or claim one of your accounts has been
compromised.
As a result, scareware pushes you to buy fraudulent cybersecurity software, or divulge private details
like your account credentials.
Watering hole attacks infect popular webpages with malware to impact many users at a time. It
requires careful planning on the attacker’s part to find weaknesses in specific sites. They look for
existing vulnerabilities that are not known and patched — such weaknesses are deemed zero-day
exploits .
Other times, they may find that a site has not updated their infrastructure to patch out known issues.
Website owners may choose delay software updates to keep software versions they know are stable.
They’ll switch once the newer version has a proven track record of system stability. Hackers abuse
this behavior to target recently patched vulnerabilities.
Fax-based phishing: When one bank’s customers received a fake email that claimed to be from the
bank — asking the customer to confirm their access codes – the method of confirmation was not via
the usual email / Internet routes. Instead, the customer was asked to print out the form in the email,
then fill in their details and fax the form to the cybercriminal’s telephone number.
Traditional mail malware distribution: In Japan, cybercriminals used a home-delivery service to
distribute CDs that were infected with Trojan spyware. The disks were delivered to the clients of a
Japanese bank. The clients’ addresses had previously been stolen from the bank’s database.
The LoveLetter worm that overloaded many companies’ email servers in 2000. Victims received an
email that invited them to open the attached love letter. When they opened the attached file, the worm
copied itself to all of the contacts in the victim’s address book. This worm is still regarded as one of
the most devastating, in terms of the financial damage that it inflicted.
The Mydoom email worm — which appeared on the Internet in January 2004 — used texts that
imitated technical messages issued by the mail server.
The Swen worm passed itself off as a message that had been sent from Microsoft. It claimed that the
attachment was a patch that would remove Windows vulnerabilities. It’s hardly surprising that many
people took the claim seriously and tried to install the bogus security patch — even though it was
really a worm.
Whichever delivery method is used, the message will usually contain eye-catching or intriguing words
that encourage the unsuspecting user to click on the link. This method of penetrating a system can
allow the malware to bypass the mail server’s antivirus filters.
For example:
AIM & AOL Password Hacker.exe
Microsoft CD Key Generator.exe
PornStar3D.exe
Play Station emulator crack.exe
Shaming Infected Users out of Reporting an Attack
In some cases, the malware creators and distributors take steps that reduce the likelihood of victims
reporting an infection:
Victims may respond to a fake offer of a free utility or a guide that promises illegal benefits like:
As an example of this technique, a Trojan virus was once sent to email addresses that were taken
from a recruitment website. People that had registered on the site received fake job offers, but the
offers included a Trojan virus. The attack mainly targeted corporate email addresses. The
cybercriminals knew that the staff that received the Trojan would not want to tell their employers that
they had been infected while they were looking for alternative employment.
Attackers expect you to take action before considering the risks, which means you should do the
opposite. To help you, here are some questions to ask yourself if you suspect an attack:
Are my emotions heightened? When you’re especially curious, fearful, or excited, you’re less likely
to evaluate the consequences of your actions. In fact, you probably will not consider the legitimacy of
the situation presented to you. Consider this a red flag if your emotional state is elevated.
Did this message come from a legitimate sender? Inspect email addresses and social media
profiles carefully when getting a suspect message. There may be characters that mimic others, such
as “torn@example.com” instead of “tom@example.com.” Fake social media profiles that duplicate
your friend’s picture and other details are also common.
Did my friend actually send this message to me? It’s always good to ask the sender if they were
the true sender of the message in question. Whether it was a coworker or another person in your life,
ask them in-person or via a phone call if possible. They may be hacked and not know, or someone
may be impersonating their accounts.
Does the website I’m on have odd details? Irregularities in the URL, poor image quality, old or
incorrect company logos, and webpage typos can all be red flags of a fraudulent website. If you enter
a spoofed website, be sure to leave immediately.
Does this offer sound too good to be true? In the case of giveaways or other targeting methods,
offers are a strong motivation to drive a social engineering attack forward. You should consider why
someone is offering you something of value for little gain on their end. Be wary at all times because
even basic data like your email address can be harvested and sold to unsavory advertisers.
Attachments or links suspicious? If a link or file name appears vague or odd in a message,
reconsider the authenticity of the whole communication. Also, consider if the message itself was sent
in an odd context, time, or raises any other red flags.
Can this person prove their identity? If you cannot get this person to verify their identity with the
organization, they claim to be a part of, do not allow them the access they are asking for. This applies
both in-person and online, as physical breaches require that you overlook the attacker’s identity.
Here are some important ways to protect against all types of cyberattacks:
Safe Communication and Account Management Habits
Online communication is where you’re especially vulnerable. Social media, email, text messages are
common targets, but you’ll also want to account for in-person interactions as well.
Never click on links in any emails or messages . You’ll want to always manually type a URL into
your address bar, regardless of the sender. However, take the extra step of investigating to find an
official version of the URL in question. Never engage with any URL you have not verified as official or
legitimate.
Use multi-factor authentication. Online accounts are much safer when using more than just a
password to protect them. Multi-factor authentication adds extra layers to verify your identity upon
account login. These “factors” can include biometrics like fingerprint or facial recognition, or temporary
passcodes sent via text message.
Use strong passwords (and a password manager). Each of your passwords should be unique and
complex. Aim to use diverse character types, including uppercase, numbers, and symbols. Also, you
will probably want to opt for longer passwords when possible. To help you manage all your custom
passwords, you might want to use a password manager to safely store and remember them.
Avoid sharing names of your schools, pets, place of birth, or other personal details. You could
be unknowingly exposing answers to your security questions or parts of your password. If you set up
your security questions to be memorable but inaccurate, you’ll make it harder for a criminal to crack
your account. If your first car was a “Toyota,” writing a lie like “clown car” instead could completely
throw off any prying hackers.
Be very cautious of building online-only friendships. While the internet can be a great way to
connect with people worldwide, this is a common method for social engineering attacks. Watch for
tells and red flags that indicate manipulation or a clear abuse of trust.
Never let strangers connect to your primary Wi-Fi network. At home or in the workplace, access
to a guest Wi-Fi connection should be made available. This allows your main encrypted, password-
secured connection to remain secure and interception-free. Should someone decide to “eavesdrop”
for information, they won’t be able to access the activity you and others would like to keep private.
Use a VPN . In case someone on your main network — wired, wireless, or even cellular — finds a
way to intercept traffic, a virtual private network (VPN) can keep them out. VPNs are services that
give you a private, encrypted “tunnel” on any internet connection you use. Your connection is not only
guarded from unwanted eyes, but your data is anonymized so it cannot be traced back to you
via cookies or other means.
Keep all network-connected devices and services secure. Many people are aware of internet
security practices for mobile and traditional computer devices. However, securing your network itself,
in addition to all your smart devices and cloud services is just as important. Be sure to protect
commonly overlooked devices like car infotainment systems and home network routers. Data
breaches on these devices could fuel personalization for a social engineering scam.
Use comprehensive internet security software. In the event that social tactics are successful,
malware infections are a common outcome. To combat rootkits, Trojans and other bots, it's critical to
employ a high-quality internet security solution that can both eliminate infections and help track their
source.
Don’t ever leave your devices unsecured in public. Always lock your computer and mobile
devices, especially at work. When using your devices in public spaces like airports and coffee shops,
always keep them in your possession.
Keep all your software updated as soon as available. Immediate updates give your software
essential security fixes. When you skip or delay updates to your operating system or apps, you are
leaving known security holes exposed for hackers to target. Since they know this is a behavior of
many computer and mobile users, you become a prime target for socially engineered malware
attacks.
Check for known data breaches of your online accounts. Services like Kaspersky Security
Cloud actively monitor new and existing data breaches for your email addresses. If your accounts are
included in compromised data, you’ll receive a notification along with advice on how to take action.
Protection against social engineering starts with education. If all users are aware of the threats, our
safety as a collective society will improve. Be sure to increase awareness of these risks by sharing
what you’ve learned with your coworkers, family, and friends.
Related articles:
Top 10 Most Notorious Hackers of All Time
Mobile Malware Threats to Watch out for!
Malware Implementation Techniques
Malware and Exploit Detection
Choosing an Antivirus Solution
Malware Classifications
Physical Security
Physical security can be defined as the protection and concern regarding information-related assets
storage devices, hard drives, computers, organizations' machines, and laptops and servers. The
protection is mainly taken care of real-world threats and crimes such as unauthorized access, natural
disasters like fire and flood, a human-made disaster like theft, etc. This type of security requires
physical controls such as locks, protective barriers, in-penetrable walls and doors, uninterrupted
power supply, and or security personnel for protecting private and sensitive data stored in servers.
Any hack may result in success, despite the security if the attacker gets access to the organization's
building or data center looking for a physical security vulnerability. In small companies and
organizations, this problem may be less. But other factors on which physical security vulnerabilities
depend may be as follows:
Are the doors propped open? If so, that can be an attack vector.
Check whether the gap at the bottom of critical doors allows someone to uses any device to
trip a sensor inside the security room.
Check whether it would be easy or not to open the door by breaking the lock forcefully.
Are any doors or windows made of glass, especially the server room's doors or other
confidential areas?
Are the door ceilings with tiles that can be pushed up?
Are power supply and protection equipment is faulty?
Obtain network access by a hacker, and then hackers can send malicious emails as logged in
users.
Layers of Physical Security
Physical security depends on the layer defense model like that of information security. Layers are
implemented at the perimeter and moving toward an asset. These layers are:
1. Deterring.
2. Delaying.
3. Detection.
4. Assessment.
5. Response.
Risk Assessment
Both physical intruders and cybercriminals have the same motive as money, social agenda, etc. Also,
intruders try to seek opportunities to exploit by any means. So these three terms - motive, opportunity,
and means are listed together to make a formula whose calculation is resulted in the total risk i.e.
In passive reconnaissance, the hacker never interacts directly with the target’s network. The tools
used for passive reconnaissance take advantage of unintentional data leaks from an organization to
provide the hacker with insight into the internals of the organization’s network.
1. Wireshark
Wireshark is best known as a network traffic analysis tool, but it can also be invaluable for passive
network reconnaissance. If an attacker can gain access to an organization’s Wi-Fi network or
otherwise eavesdrop on the network traffic of an employee (e.g., by eavesdropping on traffic in a
coffee shop), analyzing it in Wireshark can provide a great deal of useful intelligence about the target
network.
By passively eavesdropping on traffic, a hacker may be able to map IP addresses of computers within
the organization’s network and determine their purposes based on the traffic flowing to and from
them. Captured traffic may also include version information of servers, allowing a hacker to identify
potentially vulnerable software that can be exploited.
2. Google
Google can provide a vast amount of information on a variety of different topics. One potential
application of Google is for performing passive reconnaissance about a target.
The information that an organization posts online can provide a massive amount of information about
their network. The organization’s website, especially its career page, can provide details of the types
of systems used in the network. By using specialized Google queries (Google Dorking), it’s also
possible to search for files that were not intentionally exposed to the internet but still publicly available
as well.
3. FindSubDomains.com
VirusTotal is a website designed to help with analysis of potentially malicious files. Anyone with an
account on the service can upload files or URLs for analysis and receive results that describe whether
or not the file or website is likely to be malicious, behavioral analysis and other potential indicators of
compromise.
The problem with VirusTotal is that it, and other similar sites, make the same information available to
any free subscriber (and provide more data to paid users). As attacks become more sophisticated and
targeted, malware or malicious websites targeting an organization may include sensitive internal data.
As a result, terabytes of sensitive data are being uploaded to the service by companies trying to
determine if they are the victim of an attack. A hacker searching through the data provided on
VirusTotal by keywords associated with a company can potentially find a great deal of valuable
intelligence.
5. Shodan
Shodan is a search engine for internet-connected devices. As the Internet of Things grows,
individuals and organizations increasingly are connecting insecure devices to the internet.
Using Shodan, a hacker may be able to find devices within the IP address range belonging to a
company, indicating that they have the device deployed on their network. Since many IoT devices are
vulnerable by default, identifying one or more on the network may give a hacker a good starting point
for a future attack.
Tools for active reconnaissance are designed to interact directly with machines on the target network
in order to collect data that may not be available by other means. Active reconnaissance can provide
a hacker with much more detailed information about the target but also runs the risk of detection.
1. Nmap
Nmap is probably the most well-known tool for active network reconnaissance. Nmap is a network
scanner designed to determine details about a system and the programs running on it. This is
accomplished through the use of a suite of different scan types that take advantage of the details of
how a system or service operates. By launching scans against a system or a range of IP addresses
under a target’s control, a hacker can learn a significant amount of information about the target
network.
2. Nessus
Nessus is a commercial vulnerability scanner. Its purpose is to identify vulnerable applications running
on a system and provides a variety of details about potentially exploitable vulnerabilities. Nessus is a
paid product, but the comprehensive information that it provides can make it a worthwhile investment
for a hacker.
3. OpenVAS
4. Nikto
Nikto is a web server vulnerability scanner that can be used for reconnaissance in a manner similar to
Nessus and OpenVAS. It can detect a variety of different vulnerabilities but is also not a stealthy
scanner. Scanning with Nikto can be effective but is easily detectable by an intrusion detection or
prevention system (like most active reconnaissance tools).
5. Metasploit
Metasploit is primarily designed as an exploitation toolkit. It contains a variety of different modules that
have prepackaged exploits for a number of vulnerabilities. With Metasploit, even a novice hacker has
the potential to break into a wide range of vulnerable machines.
Although it was designed as an exploit toolkit, Metasploit can also be effectively used for
reconnaissance. At the minimum, using the autopwn option on Metasploit allows a hacker to try to
exploit a target using any means necessary. More targeted analysis can allow a hacker to perform
reconnaissance using Metasploit with more subtlety.
Network reconnaissance is a crucial part of any hacking operation. Any information that a hacker can
learn about the target environment can help in identification of potential attack vectors and targeting
exploits to potential vulnerabilities. By using a combination of passive and active reconnaissance tools
and techniques, a hacker can maximize the information collected while minimizing their probability of
detection.