Cynics would say that there are two types motorcycle riders: those who have dropped their bikes and those who will. Similar to the above, there are two types networks: those that have been hack and those that will.
Cyber professionals can greatly benefit from ethical hacking programs to protect themselves against hackers. In order to understand the cyberattack process, courses such as Certified Ethical Hacker V10 train the learner to think and act like an intrusion.
Do not succumb to data breach fatigue
Patients in distress in medical practices, especially Intensive Care Units, may not receive the treatment they need due to caregivers being inundated by electronic notifications. Staff can be distracted by too many alarms. “Alarm fatigue” depresses caregivers who are unable to process the many diagnostic tools that are available to them.
As a community, we hear regularly about data breaches that have affected hundreds of millions of victims or more. We have become less sensitive to data breaches, whether it’s Equifax or Marriott, Twitter, Yahoo!, Uber, MyFitnessPal.com T-Mobile, Cathay Pacific, British Airlines, or Equifax. Security professionals and defenders can’t afford “data breach fatigue.” One “oh-ha” moment can wipe out all the “atta boys”.
We need to understand how adversaries think and act, whether we are defending against rivals, nation-states or rivals, cybercriminals or just joy-riders. There are many motives for attacking, ranging from profit-seeking to transnational espionage to political and philosophical motivation to simply being “nasty.” This is the late sixth century BC general.
“Hence, the saying: If the enemy is known and you know yourself, you don’t have to fear the outcome of a hundred wars. You will lose every victory if you don’t know your enemy and yourself. You will lose every battle if you don’t know your enemy or yourself.
It is a good thing to know your enemy. Enter the world that is ethical hacking.
From countermeasures to offensive protection
George Carlin, the comedian who died in 2011, made fun of oxymorons. (“I have always been amazed by the term Jumbo Shrimp. What is a Jumbo Shrimp exactly? It’s like Military Intelligence, but the words don’t belong together.
Some people view ethical hacking to be an oxymoron. You can use whatever you like. You can also use penetration testing, red tiger teaming, or tiger (or red), as an euphemism. It doesn’t matter what you call it, but it is important.
Bruce Schneier, a cybersecurity author, says that good engineering is about making things work. Good cybersecurity is not worrying about what they might break. This is something that most people don’t do naturally.
Hacking doesn’t have to be a bad thing. A hack is the art of writing elegant and efficient code. It is great to prevent data breaches by finding vulnerabilities before attackers exploit them. It doesn’t matter if the hacker is a taxi driver, or a writer; having a good one makes life easier. I am proud to be a hacker.
Hacking is done in three phases
Hacking can be viewed in three phases
Reconnaissance
Penetration
Exfiltration
Reconnaissance uses publicly available information and internet resources. These include search engines, web sites and domain information. There is also a healthy dose social engineering. The goal of footprinting, or open-source intelligence (OSINT), is to create a view of the target company and its staff.
Next, we scan networks for interesting systems, operating systems, platforms, and vulnerabilities. This allows us to build a portfolio of our environment. We document and catalog the systems and their vulnerabilities. Finally, we list the systems to catalog user names, service information, and as much as possible about their security.
The easier it is to understand the victim’s environment, the easier it will be to move on to the next step.
We can hack into systems and networks using system and network hacking.