the uses of white hat hacking tyler schumacher [email protected]

11
The Uses of White Hat Hacking Tyler Schumacher [email protected]

Upload: diana-rogers

Post on 18-Dec-2015

217 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu

The Uses of White Hat Hacking

Tyler Schumacher

[email protected]

Page 2: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu

WhiteHat Website Security Statistics ReportSpring 2009 – 7th Edition

Majority of Websites Are Vulnerable

Page 3: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu

Black Hat Hackers

• Malicious

• Self-Serving

• Anonymous

Page 4: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu

Grey Hat Hackers

• Self-Satisfying

• Public Disclosure

• “Taggers”

Page 5: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu

White Hat Hackers

• Ethical Hackers

• Employed

• Former Grey or Black Hats

Page 6: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu

Risks and Limitations of Use

• Qualifications

• Risk of Relapse

Page 7: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu

Reasons to Use

• Knowledge of Tools

• Can Teach Staff

• Real World Experience

• Hackers Are Innovative

Page 8: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu

IT Professional

• Reactive

• Client List

• Does Not Think Like a Criminal

White Hat Hacker• Proactive

• No Qualifications

• Thinks Like a Criminal

Page 9: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu

Mainstream Use

• Law Enforcement

• HP Active Countermeasures

• UK.Government

• Contests

Page 10: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu

What Needs to be Done

• Studies of IT Professionals

• Get Statistics of White Hat Use

• Teach White Hat Hacking Methods

Page 11: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu

After presentation conclusion about how the sort of thing we do on the website is the sort of thing I think the school should start offering. It gets people to think the way hackers think, see things the they they see them

so that we can better protect ourselves against them.

Look up defcon

http://en.wikipedia.org/wiki/Social_engineering_(security)http://rent-a-hacker.com/

http://www.hackthissite.org/http://www.writing.com/main/view_item/item_id/255013

http://www.ibm.com/developerworks/library/s-crack/index.htmlhttp://whitehatsec.com/home/resource/presentation.html

http://whitehatsec.com/home/resource/whitepapers/business_logic_flaws.html