1 / 12

Ethical Hacking

Ethical Hacking. License to hack. OVERVIEW. Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal . What is Ethical Hacking ?. It is legal Permission is obtained from the target Identify vulnerabilities visible from Internet

twila
Télécharger la présentation

Ethical Hacking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ethical Hacking License to hack

  2. OVERVIEW • Ethical Hacking ? • Why do ethical hackers hack? • Ethical Hacking - Process • Reporting • Keeping It Legal

  3. What is Ethical Hacking ? • It is legal • Permission is obtained from the target • Identify vulnerabilities visible from Internet • Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner

  4. What is Ethical Hacking ? What is Hacking? • Process of breaking into system • Personal or Commercial Gain Types Of Hackers: • White Hats – Good guys, Ethical Hackers • Black Hats – Bad guys • Gray Hats – Good or bad hackers

  5. Why do ethical hackers hack? • To find weaknesses of application • Ethical hackers develop defensive technology • Every coder should know how to hack, so that they know how to write “secure code” (which is code that can defend itself from hackers)

  6. Defining Ethical Hacking Phases of Ethical Hacking: Phase 1 –Reconnaissance Phase 2 –Scanning Phase 3 –Gaining Access Phase 4 –Maintaining Access Phase 5 –Covering Tracks

  7. Defining Ethical Hacking Identifying Types of Hacking Technologies: • Operating Systems • Applications • Misconfigurations

  8. Defining Ethical Hacking Identifying Types of Ethical Hacks: • Remote Network • Local Network • Stolen Equipment

  9. Reporting & Testing Understanding Testing Types: • Black Box Testing • White Box Testing • Gray Box Testing

  10. Pen Test Deliverables • A list of your findings, in order of high risk • An analysis of your findings • A conclusion or explanation of your findings • Log files from tools that provided supporting evidence of your findings • Practical Security solutions

  11. Ethical Hacking Guidelines: • Be responsible • Don’t use hacking for evil • It’s easy to be caught, and the penalties are very steep

  12. THE END

More Related