ethical hacking

13
Ethical hacking

Upload: pushkar-dutt

Post on 13-Aug-2015

74 views

Category:

Education


1 download

TRANSCRIPT

Page 1: Ethical hacking

Ethical hacking

Page 2: Ethical hacking

OverviewWhat is hacking?History of hacking?Types of hackers.Hacking methods.Process of Ethical hacking.The pros of ethical hacking.The cons of ethical hacking.

Page 3: Ethical hacking

What is hacking? It is unconventional way of using a system beyond the original intentions of the manufacturer.

Hacking is not limited to computers.

Page 4: Ethical hacking

What is ethical hacking? It is the use of programming skills to determine vulnerabilities in computer systems.

It is also known as the intrusion testing, penetration testing or red teaming.

Page 5: Ethical hacking

Who are ethical hackersThe skills ethical hackers should posses

They must be completely trustworthy.

Should have very strong programming and computer networking skills and have been in networking field for several years.

Should have more patience.

Continuous updating of the knowledge on computer and network security is required.

They should know the techniques of the criminals, how their activities might be detected and how to stop them.

Page 6: Ethical hacking

The Role of Security and Penetration Testers

Hackers

Access computer system or network without authorization

Breaks the law; can go to prison

Crackers

Break into systems to steal or destroy data

U.S. Department of Justice calls both hackers

Ethical hacker

Performs most of the same activities but with owner’s permission

Page 7: Ethical hacking

History of hacking. the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT).

During the 1970's, a different kind of hacker appeared: the perhaps or phone hackers.

In the 1980's, phreaks started to migrate to computers, and the first Bulletin Board Systems(BBS) appeared.

During the 1990's, when the use of the internet widespread around the world, hackers multiplied.

Page 8: Ethical hacking

Types of hackers White Hat hackers also referred as Ethical hacker.

Black Hat hackers also referred as cracker.

Grey Hat hackers also referred as Skilled Hacker.

Page 9: Ethical hacking

Ethical Hackers but not Criminal Hackers

Completely trustworthy. Strong programming and computer networking

skills. Learn about the system and trying to find its

weaknesses. Techniques of Criminal hackers-Detection-

Prevention. Published research papers or released security

software. No Ex-hackers.

Page 10: Ethical hacking

Hacking AttacksPhishing Method.Brute Force Hack.Fake Login Hack.Cookie Steal Hack.Web Mail Hack

Page 11: Ethical hacking

Process of Ethical hacking.Preparation.Foot printing.Enumeration and fingerprinting. Identification of vulnerabilities.Attack-exploit the vulnerabilities.

Page 12: Ethical hacking

AdvantagesProvides security to banking and financial

establishmentsPrevents website defacements An evolving technique To catch a thief you have to think like a thiefDisadvantages All depends upon the trustworthiness of the

ethical hacker Hiring professionals is expensive.

Page 13: Ethical hacking

End.Testing is an essential part of any data security program.An ethical hack can reduce the potential

exposure of the company to criminal hackers. “It takes a Thief to Catch a Thief”.The periodic ethical hacking and review

exercise would enhance the security and mitigate possible loopholes being exploited.