the uses of white hat hacking tyler schumacher schumacherty@uwplatt.edu
Post on 18-Dec-2015
217 Views
Preview:
TRANSCRIPT
The Uses of White Hat Hacking
Tyler Schumacher
schumacherty@uwplatt.edu
WhiteHat Website Security Statistics ReportSpring 2009 – 7th Edition
Majority of Websites Are Vulnerable
Black Hat Hackers
• Malicious
• Self-Serving
• Anonymous
Grey Hat Hackers
• Self-Satisfying
• Public Disclosure
• “Taggers”
White Hat Hackers
• Ethical Hackers
• Employed
• Former Grey or Black Hats
Risks and Limitations of Use
• Qualifications
• Risk of Relapse
Reasons to Use
• Knowledge of Tools
• Can Teach Staff
• Real World Experience
• Hackers Are Innovative
IT Professional
• Reactive
• Client List
• Does Not Think Like a Criminal
White Hat Hacker• Proactive
• No Qualifications
• Thinks Like a Criminal
Mainstream Use
• Law Enforcement
• HP Active Countermeasures
• UK.Government
• Contests
What Needs to be Done
• Studies of IT Professionals
• Get Statistics of White Hat Use
• Teach White Hat Hacking Methods
After presentation conclusion about how the sort of thing we do on the website is the sort of thing I think the school should start offering. It gets people to think the way hackers think, see things the they they see them
so that we can better protect ourselves against them.
Look up defcon
http://en.wikipedia.org/wiki/Social_engineering_(security)http://rent-a-hacker.com/
http://www.hackthissite.org/http://www.writing.com/main/view_item/item_id/255013
http://www.ibm.com/developerworks/library/s-crack/index.htmlhttp://whitehatsec.com/home/resource/presentation.html
http://whitehatsec.com/home/resource/whitepapers/business_logic_flaws.html
top related