12
Ethical Hacking License to hack

Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

Embed Size (px)

Citation preview

Page 1: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

Ethical Hacking

License to hack

Page 2: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

OVERVIEW

• Ethical Hacking ?• Why do ethical hackers hack?• Ethical Hacking - Process• Reporting• Keeping It Legal

Page 3: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

What is Ethical Hacking ?

• It is legal• Permission is obtained from the target• Identify vulnerabilities visible from Internet • Ethical hackers possesses same skills, mindset

and tools of a hacker but the attacks are done in a non-destructive manner

Page 4: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

What is Ethical Hacking ?

What is Hacking? • Process of breaking into system• Personal or Commercial Gain

Types Of Hackers:• White Hats – Good guys, Ethical Hackers• Black Hats – Bad guys• Gray Hats – Good or bad hackers

Page 5: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

Why do ethical hackers hack?

• To find weaknesses of application

• Ethical hackers develop defensive technology

• Every coder should know how to hack, so that they know how to write “secure code” (which is code that can defend itself from hackers)

Page 6: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

Defining Ethical Hacking

Phases of Ethical Hacking:Phase 1 –ReconnaissancePhase 2 –ScanningPhase 3 –Gaining AccessPhase 4 –Maintaining AccessPhase 5 –Covering Tracks

Page 7: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

Defining Ethical Hacking

Identifying Types of Hacking Technologies:

• Operating Systems• Applications• Misconfigurations

Page 8: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

Defining Ethical Hacking

Identifying Types of Ethical Hacks:

• Remote Network• Local Network• Stolen Equipment

Page 9: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

Reporting & Testing

Understanding Testing Types:

• Black Box Testing• White Box Testing• Gray Box Testing

Page 10: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

Pen Test Deliverables

• A list of your findings, in order of high risk• An analysis of your findings• A conclusion or explanation of your findings• Log files from tools that provided supporting

evidence of your findings• Practical Security solutions

Page 11: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

Ethical Hacking

Guidelines:

• Be responsible • Don’t use hacking for evil • It’s easy to be caught, and the

penalties are very steep

Page 12: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

THE END