Ethical Hacking www.rockfortnetworks.com ethicalhacking.bng@rockfortnetworks.com.

Slides:



Advertisements
Similar presentations
Best Practices in Placement The Wisconsin EAB Annual Conference November 9, 2006 Jay Hollowell, Facilitator ©pending 2006.
Advertisements

© Copyright Executive Blueprints Inc. All Rights Reserved A Suite of Services Organizational Alignment Organizational Development Executive Coaching.
ETHICAL HACKING.
Lesson 1: Introduction to IT Business and Careers
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Introduction to Ethical Hacking, Ethics, and Legality.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Computer Security and Penetration Testing
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Hands-On Ethical Hacking and Network Defense
Chapter 11 Artificial Intelligence and Expert Systems.
1 Software Testing and Quality Assurance Lecture 37– SWE 205 Course Objective: Learn about ethical issues of software engineering.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Corporate Ethics Compliance *
Computer Hacking Cybercrime (1).
Part 3 Managing for Quality and Competitiveness © 2015 McGraw-Hill Education.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Key Issues What is retail strategy statement
Tech-Connected Teacher (TC*Teacher)
Making Choices: An Introduction to Career Planning Career Development Centre University of Ulster.
Information Systems Security Computer System Life Cycle Security.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Chapter 10 Marketing communication and personal selling
Introduction to Computer Ethics
11 C H A P T E R Artificial Intelligence and Expert Systems.
Network protocols
ORACLE

Shell script

SOFTWARE TESTING Scope of Testing  The dynamic Indian IT industry has always lured the brightest minds with challenging career.
CREOCAD
QTP

12 MARKETING STRATEGY O.C. FERRELL • MICHAEL D. HARTLINE
MARKETING. Standards… BCS-BE-36: The student demonstrates understanding of the concept of marketing and its importance to business ownership. BCS-BE-36:
Creo Parametric
SELENIUM
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.

CONTROL SYSTEMS
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
UniGraphics
CLOUD COMPUTING
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
MVHS Career Night 2015 Information Security. Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Introduction to Portfolios Copyright © 2015 Texas Education Agency, All rights reserved.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Expectations for Class! Success is communicating….
MESHANSA
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
Channels Management of Logistics
Created By: T. Alaa Al Amoudi
The Impact Of ICT “Hacking”
Ethical hacking
Beyond Academia.
Computer Security Fundamentals
CEng progression through the IOM3
Presentation transcript:

Ethical Hacking www.rockfortnetworks.com ethicalhacking.bng@rockfortnetworks.com

About ethical hacking Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network.  Hacking is not limited to computers. The real meaning of hacking is to expand the capabilities of any electronic device; to use them beyond the original intentions of the manufacturer. As a matter of fact, the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains.

Since the 1980's, the Internet has vastly grown in popularity and computer security has become a major concern for businesses and governments. Organizations would like to use the Internet to their advantage by utilizing the Internet as a medium for e-commerce, advertising, information distribution and access, as well as other endeavors. From the early days of computers, ethical hacking has been used as an evaluation of system security. Many early ethical hacks were conducted by the United States Military to cary out security evaluations on their operating systems to determine whether they should employ a two-level (secret/top secret) classification system. However, with the growth of computing and networking in the early 1990's, 

The Ethical Hacking Process :- Planning :- Planning is essential for having a successful project. It provides an opportunity to give critical thought to what needs to be done, allows for goals to be set, and allows for a risk assessment to evaluate how a project should be carried out. Reconnaissance :- Is the search for freely available information to assist in an attack. This can be as simple as a ping or browsing newsgroups on the Internet in search of disgruntled employees divulging secret information or as messy as digging through the trash to find receipts or letters

Enumeration :- Enumeration is also known as network or vulnerability discovery. It is the act of obtaining information that is readily available from the target's system, applications and networks. Vulnerability Analysis :- In order to effectively analyze data, an ethical hacker must employ a logical and pragmatic approach. In the vulnerability analysis phase, the collected information is compared with known vulnerabilities in a practical process. Exploitation :- The exploitation of a system can be as easy as running a small tool or as intricate as a series of complex steps that must be executed in a particular way in order to gain access.

Different types of ethical hacking 1.Coders :- Coders are real hackers. They are programmers having immense knowledge about many programming languages, networking and working of programs.  2. Admins :- These guys have Hacking certifications and can hack any system or network with the help of tools and exploit created by codes. 3. Script kiddies :- They just use the tools and partial knowledge they gain from internet to attack systems. They do it just for fun purpose and to be famous. They use the tools and exploits coded by other hackers and use them. They have minimum skills.

4. White Hat Hackers :- They break into systems just for legal purposes. Their main motive is to find loopholes in the networks and rectifying them. 5.Black Hat Hacker :-  They use their skills for destructive purposes. They break into systems and networks either for fun or to gain some money from illegal means.  6.Gray Hat Hacker :-  A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked.

Life cycle of ethical hacking

Characteristics of ethical handling 1.Leadership:-  For a business to be ethical, its leaders must demonstrate ethical practices in any situation. 2. Values:- An ethical business has a core value statement that describes its mission. Any business can create a value statement, but an ethical business lives by it.  3.Integrity:- Integrity is an all-encompassing characteristic of an ethical business. The ethical business adheres to laws and regulations at the local, state and federal levels.

4. Respect:- Ethics and respect go hand in hand. An ethical business demonstrates respect for its employees by valuing opinions and treating each employee as an equal. 5. Loyalty:- Employees who work for a loyal employer want to maintain the relationship and will work harder toward that end. 6. Concern:- An ethical business has concern for anyone and anything impacted by the business. This includes customers, employees, vendors and the public.

Contents 1 Introduction by everyone 2 The Word "Hacker" by Carmelo Kintana 2.1 Survey of Common Definitions 2.2 Etymology 2.3 Evolution 2.4 Perceptions 2.4.1 Public Perceptions 2.4.2 Insider Perceptions 2.5 Timeline of the word “Hack” 3 Expert Programmer by Vikas Rajvanshy

4.3 Modern Examples & Motivations 3.1 Hacker as an expert programmer 3.2 Impact on society 3.3 Famous hackers 3.4 Where did all the hardware hackers go? 3.5 Why are the top hackers today affiliated with Open Source? 3.6 What is the role of hackers in corporations? 4 Black Hat by Sandra Lemon & Hansen Liou 4.1 History 4.2 Early Examples 4.3 Modern Examples & Motivations 4.4 Impact of Hacking on Businesses and Governments 5 White Hat by Michael Frederick

5.1 Motivations 5.1.1 Kevin Mitnick 5.1.2 H.D. Moore 5.2 History 5.2.1 Rising out of the black hat community 5.2.2 Reformation of former black hats 5.2.3 Hacker literature 5.3 Popular culture 5.4 Impact 5.4.1 Society 5.4.2 Security 6 Conclusion by everyone 7 References

Salient features of Ethical Hacking : 80% hands on/ practical classes. Real time scenarios/project exposure. Limited number of students per batch. Corporate training atmosphere. Weekend batches to suit professional. Placement assistance. Career support activities includes. 1.resume preparation & individual counseling. 2.assistance for get through in interviews by experts. Backup classes. Provision to come for more batch.

Platinum features of shell script Will get complete product development cycle, which includes Demand from customer. Design-decision. Conceptualization. Analysis. Design finalize. DFMEA. Finalization. Drawing release. Tool design. Product to the market.