Ethical Hacking_ Vbm
-
Upload
rahul-kikani -
Category
Documents
-
view
231 -
download
0
Transcript of Ethical Hacking_ Vbm
![Page 1: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/1.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 1/18
Basicinformation
of Hacking
By-Vishal Maniya
![Page 2: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/2.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 2/18
HACKER
![Page 3: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/3.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 3/18
AENDA
j What is Ethical Hacking?j Who are ethical hackers?
j Every Website-A Targetj Get out of jail free cardj Kinds of Testingj Final Report
![Page 4: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/4.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 4/18
What is Hacking?
Unauthorized use of computer andnetwork resources.³Hacker´ originally meant a verygifted programmer.Hacking is a felony in the US andmost other countries.
![Page 5: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/5.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 5/18
DefinitionsHacker :A person who enjoys exploring thedetails of programmable systems andhow to stretch their capabilities, asopposed to most users, who prefer tolearn only the minimum necessary.Cracker :One who breaks securityon a system. Coined ca.1985 by hackers indefense against
journalistic misuse of
hacker.
![Page 6: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/6.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 6/18
Who cracks?
There are 3 groups of crackers:Vandals: hack computer systems for destruction(deleting files).Jokers: the most harmless; hacking systems andcarrying in different sounds, noises, and visualeffects.Breakers: professional criminals commit hackingof computer systems with the purpose of moneytheft, industrial or commercial espionage, andthefts of expensive software.
![Page 7: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/7.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 7/18
![Page 8: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/8.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 8/18
Ethical Hacking
j Independent computer securityProfessionals breaking into the
computer systems.j Neither damage the target
systems nor steal information.j Evaluate target systems security
and report back to owners aboutthe vulnerabilities found.
![Page 9: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/9.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 9/18
J ohn Draper aka Cap¶n Crunch
![Page 10: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/10.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 10/18
Kevin Mitnick
![Page 11: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/11.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 11/18
Ethical Hackers but not Criminal
Hackersj C ompletely trustworthy.j Strong programming and computer
networking skills.j Learn about the system and trying to
find its weaknesses.j Techniques of C riminal hackers-
Detection-Prevention.j Published research papers or released
security software.j No Ex-hackers.
![Page 12: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/12.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 12/18
Hackers - For good
Who uses them?³ Incr easi ngly, compa nies of a ll t y pes a nd sizes
ar ehir ing secur it y expe r ts to a ct l ike the e nem y.´
Some companies have departments dedicated toethical hacking:
� IBM� Microsoft
![Page 13: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/13.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 13/18
Hacking - For GoodWher e d id it come f r om?
Ethical hacking emerged from earlyopen source software on the internet.Such software still exists such asMozilla Firefox, Wikipedia, andCitizendium.
³Open source is a development method for software that harnesses the power of distributed peer review and transparencyof process.´
![Page 14: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/14.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 14/18
Get out of J ail free card
j Security evaluation plan1. Identify system to be tested2. How to test?
3. Limitations on that testing
j Evaluation done under a ³no-holds- barred´ approach.
j Clients should be aware of risks.j Limit prior knowledge of test.
![Page 15: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/15.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 15/18
Kinds of Testingj Remote Network j Remote dial-up network j Local network j Stolen laptop computer j Social engineeringj Physical entry
1.Total outsider 2.Semi-outsider 3.Valid user
![Page 16: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/16.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 16/18
![Page 17: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/17.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 17/18
Suggestions?
![Page 18: Ethical Hacking_ Vbm](https://reader030.fdocuments.in/reader030/viewer/2022021114/577d27ca1a28ab4e1ea4d7dd/html5/thumbnails/18.jpg)
8/6/2019 Ethical Hacking_ Vbm
http://slidepdf.com/reader/full/ethical-hacking-vbm 18/18
Thank you..