White Hat - Introduction to Ethical Hacking Tools
As a learning example of ethical hacking tools and techniques this 4 day introduction will go through the passive recon of a real world scenario.
This attack will emulate the 2015 Ukranian power grid attack 1 in terms of intended impact. The point of origin will borrow from the approach used to deliver the Stuxnet virus to Iran nuclear facilities in 2008 2.
Both incidents target critical infrastructure and the sabotage of programmable logic controllers.
You are a hacktivist group that plans on disrupting power to wealthly neighborhoods. Your goal is to coordinate a power outage with defacing of the Dominion Power website to include a manifesto concerning income inequality.
Concepts and Vocabulary:
- Cyber Kill Chain 3
- SCADA Networks and Critical Infrastructure 4
- OSINT: Open Source Intelligence Tools 5 6
- Target Selection (Pair wise comparison function) 7
- Social Engineering 8
- Phishing 9
- Scanning, Enumeration, and Footprinting 10
- Advanced Persistent Threat 11
- Week 1: [Recon] Information Gathering and Social Engineering
- Week 2: [Recon] Phishing and Fingerprinting
- Week 3: [Recon] Footprint and Enumeration
- Week 4: [Exploit] Web Server / Owasp
Fingerprinting and Footholds
Web App Security
Games and Practice
- http://www.cbsnews.com/news/russian-hacking-of-ukraines-power-grid-test-run-for-us-attack/ [return]
- https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ [return]
- http://www.lockheedmartin.com/us/what-we-do/aerospace-defense/cyber/cyber-kill-chain.html [return]
- https://inductiveautomation.com/what-is-scada [return]
- http://osintframework.com/ [return]
- https://github.com/jivoi/awesome-osint [return]
- http://www.ctl.ua.edu/math103/Voting/methodpc.htm [return]
- https://www.social-engineer.org/framework/general-discussion/social-engineering-defined/ [return]
- https://www.microsoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx [return]
- http://www.mustbegeek.com/ethical-hacking/ [return]
- http://searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT [return]