Tuesday, June 3, 2008

Certification for Ethical Hackers

Ever had thoughts of becoming a hacker, an ethical one that is? The EC-Council has released a certification called Certified Ethical Hacker (CEH). Its goal is to certify security practitioners in the methodology of ethical hacking. This vendor neutral certification covers the standards and language involved in common exploits, vulnerabilities, and countermeasures.

If you have been to a bookstore lately, you've most likely seen that there is an abundance of books on hacking and "how to hack." Until now, few organizations have worked toward quantifying ethical hacking, defining its legalities, or specifying its useful role in modern organizations. This is what the EC-Council is attempting to do with this certification. Keep reading if you want to learn more.



Why Must We Have Ethical Hackers?

Organizations must secure their IT infrastructure and networks. Just as corporations employ auditors to routinely examine financial records, so should corporations audit security policy. We have all seen the havoc that a lack of real financial audits can cause. Just as accountants perform bookkeeping audits, ethical hackers perform security audits. Without security audits and compliance controls, no real security exists. This is a big problem. There are plenty of individuals waiting to test and probe your organization's security stance. These individuals range from government and corporate spies, to hackers, crackers, script kiddies, or those who write and release malicious code into the wild. Their presence in your network in not a good thing!

Who Are Ethical Hackers?

An ethical hacker is most similar to a penetration tester. The ethical hacker is an individual who is employed or contracted to undertake an attempted penetration test. These individuals use the same methods employed by hackers. In case you were unsure; hacking is a felony in the United States. Ethical hackers have written authorization to probe a network. Only then is this attempted hack legal, as there is a contract between the ethical hacker and the organization. In 1995, long before today's more stringent guidelines, one individual received 3 felony counts, 5 years probation, 480 hours of community service, and a $68,000 legal bill for failing to insure proper authorization. Don't let this happen to you!

How is Ethical Hacking Performed?

Primarily, ethical hackers are employed in groups to perform penetration tests. These groups are commonly referred to as "Red Teams." These individuals are being paid by the organization to poke, prod, and determine the overall level of security. Again, what is important here is that they have been given written permission to perform this test and have detailed boundaries to work within. Don't be lulled into believing that the penalties for illegal penetration are low, it is a felony!

What is on the Test?

The Certified Ethical Hacker exam consists of 21 domains covered in 50 questions. It has a two-hour time limit. These questions are multiple choice. During the test, you are allowed to mark questions if you're not sure of an answer and return for later review. The format of the questions is choose one or choose all that apply. The domains were compiled to evaluate the full range of security testing. One must also demonstrate how hacker tools work and demonstrate knowledge of professional security tools, as well as how these tools are utilized. The 21 domains are as follows:

1. Ethics and Legal Issues
2. Footprinting
3. Scanning
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Sniffers
8. Denial of Service
9. Social Engineering
10. Session Hijacking
11. Hacking Web Servers
12. Web Application Vulnerabilities
13. Web Based Password Cracking Techniques
14. SQL Injection
15. Hacking Wireless Networks
16. Virus and Worms
17. Hacking Novell
18. Hacking Linux
19. IDS, Firewalls, and Honeypots
20. Buffer Overflows
21. Cryptography

These domains comprise a full body of ethical hacking knowledge. It's good that the exams first domain is centered on ethics and legal issues. This is an important domain. Always make sure you have written consent to perform any type of penetration test or security audit.

Want to Learn More?

There is not an all in one study guide or review for this test at the current time. There are, however, many ways to start obtaining the knowledge needed to pass the exam. One point of review is the National Institute of Standards and Technology (NIST). NIST-800-42 is a good foundational document on ethical hacking. It even includes recommendations for tools intended for self-evaluation. NIST breaks penetration testing down into 4 primary stages:

  • Planning - As the old saying goes, success is 90% preparation and 10 % perspiration. What's the point? Good planning is the key to success. Know where you are going, what your goals are, what the time frame is, and what the limits and boundaries are!
  • Discovery - This stage is broken down into two distinct phases:
    • Passive - During this stage, information is gathered in a very covert manner. Examples of passive information gathering include (1) surfing the organization's Web site to mine valuable information and (2) reviewing their job openings to gain a better understanding of the technologies and equipment used by the organization.
    • Active - This phase of the test is split between network scanning and host scanning. As individual networks are enumerated, they are further probed to discover all hosts, determine their open ports, and attempt to pinpoint their OS. Nmap is a popular scanning program.

  • Attack - At this point, the ethical hacker will attempt to (1) Gain Access, (2) Escalate Privilege, (3) Browse the system, and finally (4) Expand influence.
  • Reporting - This may be the final step listed, but it is not least in importance. Reporting and documentation should be carried out through each step of the process. This documentation will be used to compile the final report. This report will serve as the basis for corrective action. Corrective action can range from nothing more than enforcing existing policies to closing unneeded ports and adding patches and service packs.

Final Thoughts

I am glad to see the EC-Council release this certification. This is an area where much education is needed. I took the exam last week, passed, and believe the test is adequately challenging for a baseline of skills. The bottom line is that if you have some security experience, have taken the Security + or the TICSA exam, and have an interest in penetration testing, this would be a good next step.

Thursday, May 29, 2008

Using Test King for CCNA...

Why are we the online Certification Experts? Test King has been working in the field of IT since 1995 by providing providing top-notch net-based training and certification preparation services. A hand picked team of training and certification experts prepare our highly standardized, top quality, well documented certification guideline courses.

Our experts are qualified, experienced, and fully equipped with many resources in their field of study. Like the IT industry itself, we are in constant pursuit of knowledge, thus ensuring that our products are up-to-date and in accordance with the certification goals as specified by different vendors for their certificates.

We specialize in the preparation of exam material by guiding our customers during preparation for their certification exams using current questions. The process of updating is never ending and our study guides are constantly in revision. As a FREE service, our customers are notified when their courses are updated so they can take advantage of the new information.

Friday, May 16, 2008

CCNP Certification

CCNP certification validates a network professional's ability to install, configure and troubleshoot converged local and wide area networks with 100 to 500 or more nodes. Network Professionals who achieve the CCNP have demonstrated the knowledge and skills required to manage the routers and switches that form the network core, as well as edge applications that integrate voice, wireless, and security into the network.

Partners: Log in for Partner E-Learning Connection (PEC) learning map

CCNA Certification

The Cisco CCNA network associate certification validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including implementation and verification of connections to remote sites in a WAN. This new curriculum includes basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills. This new curriculum also includes (but is not limited to) the use of these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),VLANs, Ethernet, access control lists (ACLs)