Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

20-minute Intro to Hacking
ETHICAL HACKING.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Introduction to Ethical Hacking, Ethics, and Legality.
Ethical Hacking Pratheeba Murugesan. HACKER AENDA  What is Ethical Hacking?  Who are ethical hackers?  Every Website-A Target  Get out of jail free.
Computer Security and Penetration Testing
The Uses of White Hat Hacking Tyler Schumacher
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
 The hackers is a persons that they have a many knowledge in the area of ​​ computer and are capable of deceive the security.
Chapter 1 Introduction. Art of War  If you know the enemy and know yourself, you need not fear the result of a hundred battles.  If you know yourself.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Vulnerability Assessment & Penetration Testing By: Michael Lassiter Jr.
Comp 8130 Presentation Security Testing Group Members: U Hui Chen U Ming Chen U Xiaobin Wang.
Computer Hacking Cybercrime (1).
Penetration Testing Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA 16802
The Business of Penetration Testing
Penetration Testing.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Honeypot and Intrusion Detection System
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Ethical Hacking
Penetration Testing Training Day Penetration Testing Tools and Techniques – pt 1 Mike Westmacott, IRM plc Supported by.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Unit 9.  Lets finish strong in Unit 9 discussions  Alternative seminars  Final submission of work – Tuesday, October 9 th at midnight.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
1 Tactics and Penetration Testing. Overview Tactics: A procedure or set of maneuvers engaged in to achieve an end, an aim, or a goal. Tactics Penetration.
Mantra – Security Framework Free and Open Source Browser based Security Framework.
Module 6 – Penetration  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification ○ Penetration.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Computer Security By Duncan Hall.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Computer and Network Security Brendan Duncombe Bahein Maung.
CYBERCRIME & ADVANCED PERSISTENT THREATS TEMITAYO OLOYEDE ( ) ATHABASCA UNIVERSITY ETHICAL, LEGAL, AND SOCIAL ISSUES IN INFORMATION TECHNOLOGY (COMP607)
Filip Chytrý Everyone of you in here can help us improve online security....
PRESENTED BY : Bhupendra Singh
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Topic 5 Penetration Testing 滲透測試
Google’s Gruyere1 : An XSS Example Presented by: Terry Gregory
Seminar On Ethical Hacking Submitted To: Submitted By:
Ethical Hacking By: Erin Noonan.
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
Calvin Wilson Craig Delzangle
An Introduction to the Basics
The Impact Of ICT “Hacking”
NEED OF JAILBREAKING IN IOS PENETRATION TESTING
CertStore Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner.
Teaching Computing to GCSE
Topic 5: Communication and the Internet
A Gift of Fire Third edition Sara Baase
Ethical Hacking.
Network Traffic and Cybersecurity
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Ethical Hacker Pro IT Fundamentals Pro
Presentation transcript:

Ethical Hacking License to hack

OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal

What is Ethical Hacking ? It is legal Permission is obtained from the target Identify vulnerabilities visible from Internet Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner

What is Ethical Hacking ? What is Hacking? Process of breaking into system Personal or Commercial Gain Types Of Hackers: White Hats – Good guys, Ethical Hackers Black Hats – Bad guys Gray Hats – Good or bad hackers

Why do ethical hackers hack? To find weaknesses of application Ethical hackers develop defensive technology Every coder should know how to hack, so that they know how to write “secure code” (which is code that can defend itself from hackers)

Defining Ethical Hacking Phases of Ethical Hacking: Phase 1 –Reconnaissance Phase 2 –Scanning Phase 3 –Gaining Access Phase 4 –Maintaining Access Phase 5 –Covering Tracks

Defining Ethical Hacking Identifying Types of Hacking Technologies: Operating Systems Applications Misconfigurations

Defining Ethical Hacking Identifying Types of Ethical Hacks: Remote Network Local Network Stolen Equipment

Reporting & Testing Understanding Testing Types: Black Box Testing White Box Testing Gray Box Testing

Pen Test Deliverables A list of your findings, in order of high risk An analysis of your findings A conclusion or explanation of your findings Log files from tools that provided supporting evidence of your findings Practical Security solutions

Ethical Hacking Guidelines: Be responsible Don’t use hacking for evil It’s easy to be caught, and the penalties are very steep

THE END