Upload
rahul-kikani
View
233
Download
0
Embed Size (px)
Citation preview
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 1/18
Basicinformation
of Hacking
By-Vishal Maniya
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 2/18
HACKER
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 3/18
AENDA
j What is Ethical Hacking?j Who are ethical hackers?
j Every Website-A Targetj Get out of jail free cardj Kinds of Testingj Final Report
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 4/18
What is Hacking?
Unauthorized use of computer andnetwork resources.³Hacker´ originally meant a verygifted programmer.Hacking is a felony in the US andmost other countries.
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 5/18
DefinitionsHacker :A person who enjoys exploring thedetails of programmable systems andhow to stretch their capabilities, asopposed to most users, who prefer tolearn only the minimum necessary.Cracker :One who breaks securityon a system. Coined ca.1985 by hackers indefense against
journalistic misuse of
hacker.
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 6/18
Who cracks?
There are 3 groups of crackers:Vandals: hack computer systems for destruction(deleting files).Jokers: the most harmless; hacking systems andcarrying in different sounds, noises, and visualeffects.Breakers: professional criminals commit hackingof computer systems with the purpose of moneytheft, industrial or commercial espionage, andthefts of expensive software.
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 7/18
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 8/18
Ethical Hacking
j Independent computer securityProfessionals breaking into the
computer systems.j Neither damage the target
systems nor steal information.j Evaluate target systems security
and report back to owners aboutthe vulnerabilities found.
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 9/18
J ohn Draper aka Cap¶n Crunch
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 10/18
Kevin Mitnick
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 11/18
Ethical Hackers but not Criminal
Hackersj C ompletely trustworthy.j Strong programming and computer
networking skills.j Learn about the system and trying to
find its weaknesses.j Techniques of C riminal hackers-
Detection-Prevention.j Published research papers or released
security software.j No Ex-hackers.
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 12/18
Hackers - For good
Who uses them?³ Incr easi ngly, compa nies of a ll t y pes a nd sizes
ar ehir ing secur it y expe r ts to a ct l ike the e nem y.´
Some companies have departments dedicated toethical hacking:
� IBM� Microsoft
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 13/18
Hacking - For GoodWher e d id it come f r om?
Ethical hacking emerged from earlyopen source software on the internet.Such software still exists such asMozilla Firefox, Wikipedia, andCitizendium.
³Open source is a development method for software that harnesses the power of distributed peer review and transparencyof process.´
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 14/18
Get out of J ail free card
j Security evaluation plan1. Identify system to be tested2. How to test?
3. Limitations on that testing
j Evaluation done under a ³no-holds- barred´ approach.
j Clients should be aware of risks.j Limit prior knowledge of test.
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 15/18
Kinds of Testingj Remote Network j Remote dial-up network j Local network j Stolen laptop computer j Social engineeringj Physical entry
1.Total outsider 2.Semi-outsider 3.Valid user
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 16/18
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 17/18
Suggestions?
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 18/18
Thank you..