Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical...

Preview:

Citation preview

Ethical Hacking

License to hack

OVERVIEW

• Ethical Hacking ?• Why do ethical hackers hack?• Ethical Hacking - Process• Reporting• Keeping It Legal

What is Ethical Hacking ?

• It is legal• Permission is obtained from the target• Identify vulnerabilities visible from Internet • Ethical hackers possesses same skills, mindset

and tools of a hacker but the attacks are done in a non-destructive manner

What is Ethical Hacking ?

What is Hacking? • Process of breaking into system• Personal or Commercial Gain

Types Of Hackers:• White Hats – Good guys, Ethical Hackers• Black Hats – Bad guys• Gray Hats – Good or bad hackers

Why do ethical hackers hack?

• To find weaknesses of application

• Ethical hackers develop defensive technology

• Every coder should know how to hack, so that they know how to write “secure code” (which is code that can defend itself from hackers)

Defining Ethical Hacking

Phases of Ethical Hacking:Phase 1 –ReconnaissancePhase 2 –ScanningPhase 3 –Gaining AccessPhase 4 –Maintaining AccessPhase 5 –Covering Tracks

Defining Ethical Hacking

Identifying Types of Hacking Technologies:

• Operating Systems• Applications• Misconfigurations

Defining Ethical Hacking

Identifying Types of Ethical Hacks:

• Remote Network• Local Network• Stolen Equipment

Reporting & Testing

Understanding Testing Types:

• Black Box Testing• White Box Testing• Gray Box Testing

Pen Test Deliverables

• A list of your findings, in order of high risk• An analysis of your findings• A conclusion or explanation of your findings• Log files from tools that provided supporting

evidence of your findings• Practical Security solutions

Ethical Hacking

Guidelines:

• Be responsible • Don’t use hacking for evil • It’s easy to be caught, and the

penalties are very steep

THE END

Recommended