Ethical Hacking_ Vbm

Post on 07-Apr-2018

231 views 0 download

transcript

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 1/18

Basicinformation

of Hacking

By-Vishal Maniya

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 2/18

HACKER

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 3/18

AENDA

j What is Ethical Hacking?j Who are ethical hackers?

j Every Website-A Targetj Get out of jail free cardj Kinds of Testingj Final Report

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 4/18

What is Hacking?

Unauthorized use of computer andnetwork resources.³Hacker´ originally meant a verygifted programmer.Hacking is a felony in the US andmost other countries.

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 5/18

DefinitionsHacker :A person who enjoys exploring thedetails of programmable systems andhow to stretch their capabilities, asopposed to most users, who prefer tolearn only the minimum necessary.Cracker :One who breaks securityon a system. Coined ca.1985 by hackers indefense against

journalistic misuse of

hacker.

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 6/18

Who cracks?

There are 3 groups of crackers:Vandals: hack computer systems for destruction(deleting files).Jokers: the most harmless; hacking systems andcarrying in different sounds, noises, and visualeffects.Breakers: professional criminals commit hackingof computer systems with the purpose of moneytheft, industrial or commercial espionage, andthefts of expensive software.

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 7/18

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 8/18

Ethical Hacking

j Independent computer securityProfessionals breaking into the

computer systems.j Neither damage the target

systems nor steal information.j Evaluate target systems security

and report back to owners aboutthe vulnerabilities found.

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 9/18

J ohn Draper aka Cap¶n Crunch

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 10/18

Kevin Mitnick

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 11/18

Ethical Hackers but not Criminal

Hackersj C ompletely trustworthy.j Strong programming and computer

networking skills.j Learn about the system and trying to

find its weaknesses.j Techniques of C riminal hackers-

Detection-Prevention.j Published research papers or released

security software.j No Ex-hackers.

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 12/18

Hackers - For good

Who uses them?³ Incr easi ngly, compa nies of a ll t y pes a nd sizes

ar ehir ing secur it y expe r ts to a ct l ike the e nem y.´

Some companies have departments dedicated toethical hacking:

� IBM� Microsoft

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 13/18

Hacking - For GoodWher e d id it come f r om?

Ethical hacking emerged from earlyopen source software on the internet.Such software still exists such asMozilla Firefox, Wikipedia, andCitizendium.

³Open source is a development method for software that harnesses the power of distributed peer review and transparencyof process.´

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 14/18

Get out of J ail free card

j Security evaluation plan1. Identify system to be tested2. How to test?

3. Limitations on that testing

j Evaluation done under a ³no-holds- barred´ approach.

j Clients should be aware of risks.j Limit prior knowledge of test.

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 15/18

Kinds of Testingj Remote Network j Remote dial-up network j Local network j Stolen laptop computer j Social engineeringj Physical entry

1.Total outsider 2.Semi-outsider 3.Valid user

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 16/18

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 17/18

Suggestions?

8/6/2019 Ethical Hacking_ Vbm

http://slidepdf.com/reader/full/ethical-hacking-vbm 18/18

Thank you..