All the latest news on the Cyber EPQ

Are you an (Ethical) Hacker?

Posted on

Cyber security is a growing industry as more and more businesses are waking up to the reality of their responsibility to ensure that their clients’ information is kept safe and secure. To be a successful ethical hacker requires you to be able to think like one. It is the role of the ethical hacker to attempt to break into the company network and access their personal data which is locked away carefully behind as many levels of security as necessary. Companies need to ensure that their defences can keep malicious cyber criminals out. This is not an easy task when ever more increasingly sophisticated technology is constantly being developed. Hackers will need to stay ahead of the game so as to retain their clients’ trust whilst maintaining their own credibility in protecting sensitive information in this fast paced race. Hackers most commonly simulate an attack against a network, to discover weaknesses in an organisation’s security posture, and ensure their security team is battle-tested.

Links with the CyberEPQ Modules

What do (Ethical) Hackers do?

Ethical Hackers simulate how a cyber criminal may attack the system, thus resulting in assisting how the entire organisation will become more secure against future such attacks whilst ensuring that everything that an attacker may think of is secure. Ethical hackers attempt to breach an organisation’s systems, in a controlled manner in what is known as the red team/blue team exercises in which each team is pitted against the other. The objectives may include testing the procedures, readiness and teamwork of security staff, cooperation between in-house and outsourced security providers, security vulnerabilities and gaps, security tools and defences and incident response processes. It is a realistic test that helps an organisation discover its security weaknesses and remediate them.

Instead of waiting for a real breach to help an organisation discover its weaknesses and test its security practices, an ethical hacker will do it in a controlled manner, allowing the organisation to prepare. Such security practices are not limited to networks — they can also be performed against single web applications, or subsets of the network or infrastructure.

The penetration testing process emulates the cyber security kill chain. Penetration testers begin by planning their attack, scanning the target system for vulnerabilities, penetrating the security perimeter, and maintaining access without being detected. Essentially there are five different stages involved. The first one concerns planning and reconnaissance where discussions with company stakeholders who ordered the test occurs so as to gain an understanding of the goals and scope of the test, the systems to be tested, and the testing methods to take place. These tests may be open-ended and some may test specific malicious tactics, techniques and procedures (TTPs). Intelligence at this stage to understand the architecture of the target system, its network structure and security tooling will also be collated.

The second phase involves scanning whereby automated tools are used to analyse the target systems whilst checking the system’s code for bugs or security gaps. Vulnerability scans, looking for old or unpatched components that may be vulnerable to known exploits are also conducted. Thirdly, the Ethical Hackers gain access based on the results of the second stage by selecting a weak point in the target system that they can use to penetrate. They may perform brute force or password cracking attacks to break through weak authentication, perform SQL injection or cross site scripting to run malicious code on the target system, or deliver malware into a system inside the security perimeter.

During the penultimate stage, the ethical hacker will maintain access and will typically act like an advanced persistent threat (APT), looking for ways to escalate privileges and perform lateral movement to gain access to sensitive assets. To this end, the ethical hackers will discover the vulnerabilities of internal systems, not just those deployed on the security perimeter or network edge, but also the security team will detect malicious activity inside the network.

The final stage is analysis. It is at this point that the ethical Hacker will compile a report detailing what vulnerabilities they discovered in their test (including those that were not actually exploited), how they breached the system, which internal systems or sensitive data they were able to compromise, whether they were detected, and how the organisation responded. The organisation can then use this data to remediate vulnerabilities, bolster security processes and adjust security tool configuration.

Tom Sinclair, Senior Technical Consultant at CYSIAM

What are companies looking for?

UK Earning Potential

Upwards of £35,000 depending on geography, experience and definition.*

* source: Indeed March 2020

References

Learn more about the Seven Personae of Cyber

Find us on social media, and start your own conversation with #cyberepq

Our partners, sponsors and supporters

CIISec
Immersive Labs
Heart of Worcestershire College
University Technical Colleges
City and Guilds
The National Museum of Computing

Sign up to our mailing list for news and updates

Your data will only be used by CIISec to send you relevant news. Your data will never be shared with third parties unless you provide your consent for us to do so. Your data will be held securely and monitored under EU data protection law. You may unsubscribe at any time using the options provided in-email or by proactively contacting our administration team at [email protected]

© Chartered Institute of Information Security. Privacy Policy Refund Policy Site by Dgtl