Page 6 - EngineerIt July 2021
P. 6

ICT


        Ethical Hacking - what you need to know





        By Dominic White


             thical hacking has been my      to the roof unmonitored and making entry through the roof possible. Alarm panels can
             profession and life for the last   often be disabled with common passwords like 1234 or by observing the smudge marks
       Eseventeen years, and it is hard      on the panel. By simulating a variety of possible break-in avenues, gaps in security can be
        to step out of the bubble and remember   covered, and defences can be oriented towards how criminals actually break into a home.
        that to most people, the term sounds   Anyone who has made improvements after a break-in can attest to how valuable such a
        like an oxymoron - how can a criminal   service would have been.
        act be ethical?                        Ethical hacking is much like this example, except applied to our computer-based
           Ethical hacking, also called      systems. It could be a company wanting to know if their move to remote working has made
        “penetration testing” by those in the   them more vulnerable on the Internet, or a bank wanting to know if their latest mobile
        industry who no longer giggle at the   banking application introduces any new avenues for attack.
        term, is the act of proactively trying
        to find vulnerabilities in computer and   Types of ethical hacking
        information systems, applications,   There are a range of different approaches that ethical hacking exercises can take. These
        networks or ways of using them. This is   range from the Hollywood - a team of hackers attempting to move large amounts of money
        done to fix them before real criminals find   starting with little more than the name of the company - to the scientific - having full access
        and exploit them. What makes it “ethical”   to the source code for an application and its development team, to systematically identify
        is the intention to aid the defence and   any and all possible improvement areas, or more commonly a blend.
        security of such systems. Importantly,   Of course, the scope can vary dramatically too. Drawing an exact line around where
        the work is strictly done with the explicit   computer systems stop and the real world starts is hard with hacking, as real criminals
        permission of the system owners.     will move between both worlds. Hacking exercises are paired sometimes with physical
           Real world analogies sometimes    intrusion exercises as well as confidence tricks against employees of the company,
        help, especially before we get into the   although the central focus will always be on the manipulation of computer systems.
        harder to imagine and more complex
        world of cybersecurity. Imagine if your   At a high level, there are a few different types of ethical hacking:
        armed response company also offered   1.  Penetration testing is the most common form, where networks or applications are
        a service where they try to break into   assessed for security vulnerabilities by an expert penetration tester. These are usually
        your house while you watch and tell you   shorter exercises focused on a well-defined scope such as the external network
        all the things you could do to improve   perimeter (i.e. what’s on the Internet), a single system, application or network. Stealthy
        your security. Of course, they will already   operation is rarely a requirement, rather the focus is on finding as many vulnerabilities
        tell you what you can do to improve    in as short a time as possible, while also demonstrating their risks.
        your security at a high-level, but the   2.  Red teaming is a type of adversary emulation exercise. The hacking team takes on the
        details matter. How they matter is best   role of a variety of likely criminal groups, emulating their modus operandi (or TTPs for
        demonstrated with an example.          tools, tactics and procedures). Akin to the Hollywood example given above, although
                                               unlike Hollywood’s depiction, it requires careful preparation and extended periods of
        A physical analogy                     staring at text on a screen.
        Best practise for physical home security   3.  Vulnerability scanning is an automated scan of an application, network or infrastructure.
        is to have a wall, electric fence, exterior   Being automated, it benefits from an ability to scale far more than penetration testing.
        and interior alarm sensors, locked doors   While penetration testing will include vulnerability scanning, usually at the start, it is
        and windows and burglar bars/gates on   merely one tool a human expert will use. Vulnerability scanners are also unlikely to
        your windows and doors. You can have   demonstrate the risk of a vulnerability by exploiting it.
        all these things, check the items off on
        a list, and be done with it. However, it is   These terms are often argued about within and outside the ethical hacking industry, but
        entirely possible for one home to have   these are close to what the consensus is.
        all these things, and another not to, but   There are some obvious benefits to ethical hacking, most notably and obviously,
        the latter to still be safer. This could be   finding and fixing the problems before they are used in a real attack. Beyond that, there
        for a variety of reasons, the way the   are some other, more subtle benefits. As ethical hacking is my job, I must acknowledge my
        items are installed, their coverage or   potential bias.
        even the neighbourhood you live in.
        For example, a ladder and plank are   Four important benefits of ethical hacking are listed below
        enough to create an easy to step over   The first is that the risk of the vulnerabilities found can be demonstrated. Many security
        platform for the wall and fence. Exterior   teams will talk of the difficulty in getting an organisation to fix the vulnerabilities found.
        beams usually only cover approaches to   However, if an ethical hacking team can demonstrate how the vulnerability could be used
        windows and doors, leaving climb holds   to cause real business harm, it tends to drive a faster response. Of course, the hackers



                                                    EngineerIT | July 2021 | 4
   1   2   3   4   5   6   7   8   9   10   11