16
Ethical Hacking Introduction

Ethical Hacking Introduction. What is Ethical Hacking? Types of Ethical Hacking Responsibilities of a ethical hacker Customer Expectations Skills

Embed Size (px)

Citation preview

Page 1: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Ethical Hacking

Introduction

Page 2: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

What is Ethical Hacking?Types of Ethical HackingResponsibilities of a ethical hackerCustomer ExpectationsSkills of the hacker

Overview

Page 3: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Ethical

What is it?

Hacking

Page 4: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Art and Science ofUnderstanding and determining vulnerabilities inside the information infrastructure

Art and Science of understanding and determining vulnerabilities inside the information infrastructure

Page 5: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Ethical

Types of Ethical Hacking

Hacking

Page 6: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Types

Types BLACK BOX

GREYBOX

WHITEBOX

Knowledge ofinformation

infrastructure

Page 7: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Ethical

Responsibilities of Ethical Hacker

Hacking

Page 8: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Responsibilities

• Use your knowledge & tools only for legal purposes.

• Only hack to identify security issues with goal of defense.

• Get management approvals.

Page 9: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Ethical

Customer Expectations

Hacking

Page 10: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Customer Expectations

• Define Goals and expectations• Confidentiality• Who owns the resultant data- the company• Full disclosures

Page 11: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

EthicalHacker’s

skills Hacking

Page 12: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Hacker’s skills

Network/SystemsAdministrator

Security expertise

Extensive Knowledge

Page 13: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Ethical

Laws and Preparation

Hacking

Page 14: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Preparation

• Get signed approvals for all test• Sign confidentiality agreements (NDA) • Get approval from collateral parties• Put together teams and tools• Define Goals

Page 15: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Ethical

Types of Attacks

Hacking

Page 16: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills

Types of Attacks

• Full Penetration• Denial of Service• Specific Information ( theft or disclosure)• Social Engineering