Upload
marjorie-briggs
View
223
Download
0
Embed Size (px)
Citation preview
Ethical Hacking
License to hack
OVERVIEW
• Ethical Hacking ?• Why do ethical hackers hack?• Ethical Hacking - Process• Reporting• Keeping It Legal
What is Ethical Hacking ?
• It is legal• Permission is obtained from the target• Identify vulnerabilities visible from Internet • Ethical hackers possesses same skills, mindset
and tools of a hacker but the attacks are done in a non-destructive manner
What is Ethical Hacking ?
What is Hacking? • Process of breaking into system• Personal or Commercial Gain
Types Of Hackers:• White Hats – Good guys, Ethical Hackers• Black Hats – Bad guys• Gray Hats – Good or bad hackers
Why do ethical hackers hack?
• To find weaknesses of application
• Ethical hackers develop defensive technology
• Every coder should know how to hack, so that they know how to write “secure code” (which is code that can defend itself from hackers)
Defining Ethical Hacking
Phases of Ethical Hacking:Phase 1 –ReconnaissancePhase 2 –ScanningPhase 3 –Gaining AccessPhase 4 –Maintaining AccessPhase 5 –Covering Tracks
Defining Ethical Hacking
Identifying Types of Hacking Technologies:
• Operating Systems• Applications• Misconfigurations
Defining Ethical Hacking
Identifying Types of Ethical Hacks:
• Remote Network• Local Network• Stolen Equipment
Reporting & Testing
Understanding Testing Types:
• Black Box Testing• White Box Testing• Gray Box Testing
Pen Test Deliverables
• A list of your findings, in order of high risk• An analysis of your findings• A conclusion or explanation of your findings• Log files from tools that provided supporting
evidence of your findings• Practical Security solutions
Ethical Hacking
Guidelines:
• Be responsible • Don’t use hacking for evil • It’s easy to be caught, and the
penalties are very steep
THE END