CEH

(Jeff_L) #1

6 Chapter 1 ■ Getting Started with Ethical Hacking


■ Malicious code refers to items such as viruses, worms, spyware, adware, rootkits, and
other types of malware. This crime covers any type of software deliberately written to
wreak havoc and destruction or disruption.
■ Unauthorized destruction or alteration of information includes modifying, destroying,
or tampering with information without permission.
■ Embezzlement is a form of financial fraud that involves theft or redirection of funds as
a result of violating a position of trust. The crime has been made much easier through
the use of modern digital means.
■ Data-diddling is the unauthorized modification of information to cover up activities.
■ Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks are ways to
overload a system’s resources so it cannot provide the required services to legitimate
users.

The Evolution and Growth of Hacking


As you will see in this book, attacks and strategies have improved and evolved over the
years in ways you may not be aware of. Attackers have constantly sought to “up” their
game with new tactics and strategies to include new types of malware such as worms,
spam, spyware, adware, and even rootkits. Although they already knew how to harass and
irritate the public, in recent years they have caused ever bolder disruptions of today’s world
by preying on our “connected” lifestyle.
Hackers have also started to realize that it is possible to use their skills to generate
money in many interesting ways. For example, attackers have used techniques to redirect
web browsers to specific pages that generate revenue for themselves. Another example is
where a spammer sends out thousands upon thousands of e-mail messages that advertise
a product or service. Because sending out bulk e-mail costs mere pennies, it takes only a
small number of purchasers to make a nice profit.
The field you are entering (or may already be working in as a security administrator or
engineer) is one that changes rapidly. In this field attacker and defender are in an ongoing
struggle to gain dominance over each other. As attackers have become highly flexible and
adaptable, so must you be as an ethical hacker. Your ability to think “outside the box” will
serve you well as you envision new strategies and potential attacks before they are used
against you.

Whenever encountering a new technology or new situation, always try
to think of different ways the situation or technology can be used. Think,
for example, how a device such as a tablet or cell phone can be used
in ways different from what the designer or architect envisioned. Also
keep an observant eye open for weaknesses or vulnerabilities that can be
exploited. Train your mind to think outside the norm and think like some-
one who is trying to cause harm or get away with something. As an ethical
hacker you will be expected to think along these lines but in a benevolent
manner.
Free download pdf