ethical hacking
TRANSCRIPT
Ethical hacking
OverviewWhat is hacking?History of hacking?Types of hackers.Hacking methods.Process of Ethical hacking.The pros of ethical hacking.The cons of ethical hacking.
What is hacking? It is unconventional way of using a system beyond the original intentions of the manufacturer.
Hacking is not limited to computers.
What is ethical hacking? It is the use of programming skills to determine vulnerabilities in computer systems.
It is also known as the intrusion testing, penetration testing or red teaming.
Who are ethical hackersThe skills ethical hackers should posses
They must be completely trustworthy.
Should have very strong programming and computer networking skills and have been in networking field for several years.
Should have more patience.
Continuous updating of the knowledge on computer and network security is required.
They should know the techniques of the criminals, how their activities might be detected and how to stop them.
The Role of Security and Penetration Testers
Hackers
Access computer system or network without authorization
Breaks the law; can go to prison
Crackers
Break into systems to steal or destroy data
U.S. Department of Justice calls both hackers
Ethical hacker
Performs most of the same activities but with owner’s permission
History of hacking. the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT).
During the 1970's, a different kind of hacker appeared: the perhaps or phone hackers.
In the 1980's, phreaks started to migrate to computers, and the first Bulletin Board Systems(BBS) appeared.
During the 1990's, when the use of the internet widespread around the world, hackers multiplied.
Types of hackers White Hat hackers also referred as Ethical hacker.
Black Hat hackers also referred as cracker.
Grey Hat hackers also referred as Skilled Hacker.
Ethical Hackers but not Criminal Hackers
Completely trustworthy. Strong programming and computer networking
skills. Learn about the system and trying to find its
weaknesses. Techniques of Criminal hackers-Detection-
Prevention. Published research papers or released security
software. No Ex-hackers.
Hacking AttacksPhishing Method.Brute Force Hack.Fake Login Hack.Cookie Steal Hack.Web Mail Hack
Process of Ethical hacking.Preparation.Foot printing.Enumeration and fingerprinting. Identification of vulnerabilities.Attack-exploit the vulnerabilities.
AdvantagesProvides security to banking and financial
establishmentsPrevents website defacements An evolving technique To catch a thief you have to think like a thiefDisadvantages All depends upon the trustworthiness of the
ethical hacker Hiring professionals is expensive.
End.Testing is an essential part of any data security program.An ethical hack can reduce the potential
exposure of the company to criminal hackers. “It takes a Thief to Catch a Thief”.The periodic ethical hacking and review
exercise would enhance the security and mitigate possible loopholes being exploited.