the uses of white hat hacking tyler schumacher [email protected]
TRANSCRIPT
![Page 2: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu](https://reader036.vdocuments.us/reader036/viewer/2022082709/56649d215503460f949f6393/html5/thumbnails/2.jpg)
WhiteHat Website Security Statistics ReportSpring 2009 – 7th Edition
Majority of Websites Are Vulnerable
![Page 3: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu](https://reader036.vdocuments.us/reader036/viewer/2022082709/56649d215503460f949f6393/html5/thumbnails/3.jpg)
Black Hat Hackers
• Malicious
• Self-Serving
• Anonymous
![Page 4: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu](https://reader036.vdocuments.us/reader036/viewer/2022082709/56649d215503460f949f6393/html5/thumbnails/4.jpg)
Grey Hat Hackers
• Self-Satisfying
• Public Disclosure
• “Taggers”
![Page 5: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu](https://reader036.vdocuments.us/reader036/viewer/2022082709/56649d215503460f949f6393/html5/thumbnails/5.jpg)
White Hat Hackers
• Ethical Hackers
• Employed
• Former Grey or Black Hats
![Page 6: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu](https://reader036.vdocuments.us/reader036/viewer/2022082709/56649d215503460f949f6393/html5/thumbnails/6.jpg)
Risks and Limitations of Use
• Qualifications
• Risk of Relapse
![Page 7: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu](https://reader036.vdocuments.us/reader036/viewer/2022082709/56649d215503460f949f6393/html5/thumbnails/7.jpg)
Reasons to Use
• Knowledge of Tools
• Can Teach Staff
• Real World Experience
• Hackers Are Innovative
![Page 8: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu](https://reader036.vdocuments.us/reader036/viewer/2022082709/56649d215503460f949f6393/html5/thumbnails/8.jpg)
IT Professional
• Reactive
• Client List
• Does Not Think Like a Criminal
White Hat Hacker• Proactive
• No Qualifications
• Thinks Like a Criminal
![Page 9: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu](https://reader036.vdocuments.us/reader036/viewer/2022082709/56649d215503460f949f6393/html5/thumbnails/9.jpg)
Mainstream Use
• Law Enforcement
• HP Active Countermeasures
• UK.Government
• Contests
![Page 10: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu](https://reader036.vdocuments.us/reader036/viewer/2022082709/56649d215503460f949f6393/html5/thumbnails/10.jpg)
What Needs to be Done
• Studies of IT Professionals
• Get Statistics of White Hat Use
• Teach White Hat Hacking Methods
![Page 11: The Uses of White Hat Hacking Tyler Schumacher schumacherty@uwplatt.edu](https://reader036.vdocuments.us/reader036/viewer/2022082709/56649d215503460f949f6393/html5/thumbnails/11.jpg)
After presentation conclusion about how the sort of thing we do on the website is the sort of thing I think the school should start offering. It gets people to think the way hackers think, see things the they they see them
so that we can better protect ourselves against them.
Look up defcon
http://en.wikipedia.org/wiki/Social_engineering_(security)http://rent-a-hacker.com/
http://www.hackthissite.org/http://www.writing.com/main/view_item/item_id/255013
http://www.ibm.com/developerworks/library/s-crack/index.htmlhttp://whitehatsec.com/home/resource/presentation.html
http://whitehatsec.com/home/resource/whitepapers/business_logic_flaws.html