18
Basic information of Hacking By-Vishal Maniya

Ethical Hacking_ Vbm

Embed Size (px)

Citation preview

Page 1: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 1/18

Basicinformation

of Hacking

By-Vishal Maniya

Page 2: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 2/18

HACKER

Page 3: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 3/18

AENDA

j What is Ethical Hacking?j Who are ethical hackers?

j Every Website-A Targetj Get out of jail free cardj Kinds of Testingj Final Report

Page 4: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 4/18

What is Hacking?

Unauthorized use of computer andnetwork resources.³Hacker´ originally meant a verygifted programmer.Hacking is a felony in the US andmost other countries.

Page 5: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 5/18

DefinitionsHacker :A person who enjoys exploring thedetails of programmable systems andhow to stretch their capabilities, asopposed to most users, who prefer tolearn only the minimum necessary.Cracker :One who breaks securityon a system. Coined ca.1985 by hackers indefense against

journalistic misuse of

hacker.

Page 6: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 6/18

Who cracks?

There are 3 groups of crackers:Vandals: hack computer systems for destruction(deleting files).Jokers: the most harmless; hacking systems andcarrying in different sounds, noises, and visualeffects.Breakers: professional criminals commit hackingof computer systems with the purpose of moneytheft, industrial or commercial espionage, andthefts of expensive software.

Page 7: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 7/18

Page 8: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 8/18

Ethical Hacking

j Independent computer securityProfessionals breaking into the

computer systems.j Neither damage the target

systems nor steal information.j Evaluate target systems security

and report back to owners aboutthe vulnerabilities found.

Page 9: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 9/18

J ohn Draper aka Cap¶n Crunch

Page 10: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 10/18

Kevin Mitnick

Page 11: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 11/18

Ethical Hackers but not Criminal

Hackersj C ompletely trustworthy.j Strong programming and computer

networking skills.j Learn about the system and trying to

find its weaknesses.j Techniques of C riminal hackers-

Detection-Prevention.j Published research papers or released

security software.j No Ex-hackers.

Page 12: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 12/18

Hackers - For good

Who uses them?³ Incr easi ngly, compa nies of a ll t y pes a nd sizes

ar ehir ing secur it y expe r ts to a ct l ike the e nem y.´

Some companies have departments dedicated toethical hacking:

� IBM� Microsoft

Page 13: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 13/18

Hacking - For GoodWher e d id it come f r om?

Ethical hacking emerged from earlyopen source software on the internet.Such software still exists such asMozilla Firefox, Wikipedia, andCitizendium.

³Open source is a development method for software that harnesses the power of distributed peer review and transparencyof process.´

Page 14: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 14/18

Get out of J ail free card

j Security evaluation plan1. Identify system to be tested2. How to test?

3. Limitations on that testing

j Evaluation done under a ³no-holds- barred´ approach.

j Clients should be aware of risks.j Limit prior knowledge of test.

Page 15: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 15/18

Kinds of Testingj Remote Network j Remote dial-up network j Local network j Stolen laptop computer j Social engineeringj Physical entry

1.Total outsider 2.Semi-outsider 3.Valid user

Page 16: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 16/18

Page 17: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 17/18

Suggestions?

Page 18: Ethical Hacking_ Vbm

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 18/18

Thank you..