Ethical Hacking 3
Transcript of Ethical Hacking 3
-
7/28/2019 Ethical Hacking 3
1/16
Ethical Hacking
Presentation by:
GIRISH AMETA
MAMRAJ Sharma
GAURAV RAJAWAT
B.Tech CS-A 8th SEM
JAGANNATH GUPTA INSTITUTE OF ENGINEERING & TECHNOLOGY, jaipur
-
7/28/2019 Ethical Hacking 3
2/16
HACKER
-
7/28/2019 Ethical Hacking 3
3/16
Hacker is a word that has two
meanings:
Traditionally, a Hacker issomeone who likes to play
with Software or Electronic Systems.
Recently, Hacker has taken on a new meaning
someone who maliciously breaks into systems for
personal gain. Technically, these criminals & areknown as Crackers
-
7/28/2019 Ethical Hacking 3
4/16
The Role of Security and PenetrationTesters Hackers
Access computer system or network without authorization
Breaks the law; can go to prison
Crackers
Break into systems to steal or destroy data
U.S. Department of Justice calls both hackers
Ethical hacker
Performs most of the same activities but with ownerspermission
-
7/28/2019 Ethical Hacking 3
5/16
-
7/28/2019 Ethical Hacking 3
6/16
What do Hackers do?
Security test More than an attempt to break in; also includes
analyzing companys security policy and
procedures Tester offers solutions to secure or protect the
network
-
7/28/2019 Ethical Hacking 3
7/16
What do Hackers do?
A few examples of Web application hacks
File Query
Browser caching
Cookie and URL hacks
SQL Injection Cross-site Scripting (# 1 threat today!)
-
7/28/2019 Ethical Hacking 3
8/16
Ethical Hacking is good because:
Independent computer security Professionals
breaking into the computer systems.
Neither damage the target systems nor stealinformation.
Evaluate target systems security and report backto owners about the vulnerabilities found.
-
7/28/2019 Ethical Hacking 3
9/16
Ethical Hackers but not Criminal Hackers
Completely trustworthy.
Strong programming and computer networking skills.
Learn about the system and trying to find its
weaknesses.
Techniques of Criminal hackers-Detection-Prevention.
Published research papers or released security software.
-
7/28/2019 Ethical Hacking 3
10/16
Why Ethical Hacking?
It is Legal
Permission is obtained from the target
Part of an overall security program
Identify vulnerabilities visible from Internet at
particular point of time
Ethical hackers possesses same skills, mindset
and tools of a hacker but the attacks are done in
a non-destructive manner
-
7/28/2019 Ethical Hacking 3
11/16
WHITE HATS
These are good hackers .
Have genuine license to hack.
Have registered police records
Evolves themselves in good works
Generally owned by companies for security designing
Have high pay scales.
Generally these are coders
-
7/28/2019 Ethical Hacking 3
12/16
BLACK HATS
very dangerous persons.
Always have motive to earn huge profit.
Highly paid persons.
Evolves themselves mostly in criminal activities.
These could be coders, admins as well as scripts kiddies
-
7/28/2019 Ethical Hacking 3
13/16
GREY HATS
Also known as red hats.
Perform both tasks fair as well as unfair.
Generally these are admins.
Have little high pay than white hats.
Generally not so dangerous, but sometimes could
be.
-
7/28/2019 Ethical Hacking 3
14/16
Security & Counter Measures for us
Use of anti-viruses.
Proper logout after use of mail id.
Manual opening browser
don't open spam. Password protected admin account.
-
7/28/2019 Ethical Hacking 3
15/16
Suggestions or queries ?
-
7/28/2019 Ethical Hacking 3
16/16
THANKS !!
YOU