index ethical hacking terminology. what is ethical hacking? who are ethical hacker? how many...
TRANSCRIPT
![Page 1: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/1.jpg)
ETHICAL HACKING...
![Page 2: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/2.jpg)
INDEX
Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers?
White Hats (Ethical hackers) Black Hats (Malicious hackers) Gray Hats (Good or bad hackers)
How to Be Ethical ? The Phases of Ethical Hacking.
Reconnaissance Scanning Gaining access Maintaining access Clearing tracks
Types of attacks. Performing a Penetration Test.
Preparation Conduct Security Evaluation Conclusion
![Page 3: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/3.jpg)
Ethical Hacking Terminology Threat: An environment or situation that could lead to a
potential breach of security. Exploit: A piece of software or technology that takes
advantage of a bug, glitch, or vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a computer system.
Vulnerability: The existence of a software flaw, logic design, or implementation error.
Target of Evaluation (TOE): A system, program, or network that is the subject of a security analysis or attack.
Attack: An attack occurs when a system is compromised based on a vulnerability.
Remote: The exploit is sent over a network without any prior access to the vulnerable system.
![Page 4: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/4.jpg)
What is Ethical hacking? Ethical hacking is the process
of testing network and systems security for vulnerabilities using the some tools that a hacker might use to compromise the network.
![Page 5: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/5.jpg)
Who are Ethical hacker?
Ethical hackers are usually security professionals or network penetration testers.
Ethical hackers use their hacking skills and toolsets for defensive and protective purposes only.
![Page 6: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/6.jpg)
How many types of hackers?Hackers can be divided into three
groups: White Hats (Ethical hackers):
i. White hats are the good guys, the ethical hackers who use their hacking skills for defensive purposes.
ii. White hats are those who hack with permission from the data owner. It is critical to get permission prior to beginning any hacking activity.
![Page 7: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/7.jpg)
Black Hats (Malicious hackers):i. Black hats are the malicious hackers or
crackers who use their skills for illegal or malicious purposes.
ii. Black-hat hackers having gained unauthorized access such as “destroy vital data”, “deny legitimate users service”, and just cause problems for their targets.
Gray Hats (Good or bad hackers): i. Gray hats are hackers who may work
offensively or defensively, depending on the situation.
![Page 8: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/8.jpg)
How to Be Ethical
The ethical hacker must follow certain rules:i. Gain authorization from the client and have a
signed contract giving the tester permission to perform the test.
ii. Maintain and follow a nondisclosure agreement (NDA) with the client in the case of confidential information disclosed during the test.
iii. Maintain confidentiality when performing the test. iv. Information gathered may contain sensitive
information. No information about the test or company confidential data should ever be disclosed to a third party.
![Page 9: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/9.jpg)
The Phases of Ethical Hacking… The process of ethical hacking
includes five phases that hackers generally follow in hacking a computer system: Reconnaissance Scanning Gaining access Maintaining access Clearing tracks
![Page 10: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/10.jpg)
Reconnaissance
Passive reconnaissance involves gathering information as possible about the TOE (Target of Evaluation).
Active reconnaissance involves probing the network to discover individual hosts, IP addresses, and services on the network.
![Page 11: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/11.jpg)
Scanning
The goal of scanning is to learn as much technical data about the systems as possible.
Tools that a hacker may employ during the scanning phase include: Dialers Port scanners Internet Control Message Protocol (ICMP) scanners Ping sweeps Network mappers Simple Network Management Protocol (SNMP) sweepers Vulnerability scanners etc.
![Page 12: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/12.jpg)
Gaining access
Gaining access is the actual hacking phase in which the hacker gains access to the system.
In this step, the hacker will make use of all the information he collected in the pre-attacking phases.
![Page 13: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/13.jpg)
Maintaining access
Once a hacker has gained access to a target system, they want to keep that access for future exploitation and attacks.
Once the hacker owns the system, they can use it as a base to launch additional attacks.
![Page 14: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/14.jpg)
Clearing tracks
Once hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action.
Hackers try to remove all traces of the attack, such as log files or intrusion detection system (IDS) alarms.
![Page 15: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/15.jpg)
Types of attacks.
The techniques and methods used are likely to vary depending on the target and they should be chosen appropriately having assessed the situation fully. The types of attack and vulnerabilities are: Buffer Overflow attacks. Denial of Service (DoS) attacks. Distributed Denial of Service (DDoS) attacks. Misconfigurations. Abuse of Trust. Brute force attacks. CGI and WWW services. Back doors and Trojans.
![Page 16: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/16.jpg)
Performing a Penetration Test Many ethical hackers acting in the
role of security professionals use their skills to perform security evaluations or penetration tests. These tests and evaluations have three phases:
Preparation
Conduct Security Evaluation
Conclusion
![Page 17: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/17.jpg)
Preparation This phase involves a formal agreement between
the ethical hacker and the organization. This agreement should include the full scope of the test, the types of attacks (inside or outside) to be used, and the testing types.
Conduct Security Evaluation During this phase, the tests are conducted, after which
the tester prepares a formal report of vulnerabilities and other findings.
Conclusion The findings are presented to the organization in this
phase, along with any recommendations to improve security.
![Page 18: INDEX Ethical Hacking Terminology. What is Ethical hacking? Who are Ethical hacker? How many types of hackers? White Hats (Ethical hackers)](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649d215503460f949f6462/html5/thumbnails/18.jpg)
Thank you! For your time and consideration.
www.ithubpage.blogspot.comPresented by: Mohammad Affan