The phases of an attack
1. Reconnaissance Information gathering, physical and social engineering, locate network range 2. Scanning - Enumerating Live hosts, access points, accounts and policies, vulnerability assessment 3. Gaining Access Breech systems, plant malicious code, backdoors 4. Maintaining Access Rootkits, unpatched systems 5. Clearing Tracks IDS evasion, log manipulation, decoy traffic
Information Gathering
1. Unearth initial information What/ Who is the target? 2. Locate the network range What is the attack surface? 3. Ascertain active machines What hosts are alive? 4. Open ports / access points How can they be accessed? 5. Detect operating systems What platform are they? 6. Uncover services on ports What software can be attacked? 7. Map the network Tie it all together, document, and form a strategy.
Know the OSI model
Application | 7 | Service protocols | Presentation | 6 | Data formats | Session | 5 | Authentication, Cryptographic agreements | Transport | 4 | Ports, logical service to service connections | Network | 3 | Network to network delivery | Data Link | 2 | Host to host links, contention | Physical | 1 | Media |
LEGAL
United States
Computer fraud and abuse act Addresses hacking activities
18 U.S.C. 1029 Possession of Access Devices
18 U.S.C. 1030 Fraud and Related Activity in Conncetion with Computers
CAN-SPAM Defines legal eMail marketing SPY-Act Protects vendors monitoring for licence enforcement DMCA - Digital Milenium Copyright Act Protects intellectual property SOX - Sarbanes Oxley Controls for corporate financial processes GLBA - Gramm-Leech Bliley Act Controls use of personal financial data HIPPA - Health Imformation Portability and Protection Act Privacy for medical records FERPA - Family Educational Rights and Privacy Act Protection for education records FISMA - Federal Information Security Management Act Government networks must have security