Ethical Hacking 3

download Ethical Hacking 3

of 16

Transcript of Ethical Hacking 3

  • 7/28/2019 Ethical Hacking 3

    1/16

    Ethical Hacking

    Presentation by:

    GIRISH AMETA

    MAMRAJ Sharma

    GAURAV RAJAWAT

    B.Tech CS-A 8th SEM

    JAGANNATH GUPTA INSTITUTE OF ENGINEERING & TECHNOLOGY, jaipur

  • 7/28/2019 Ethical Hacking 3

    2/16

    HACKER

  • 7/28/2019 Ethical Hacking 3

    3/16

    Hacker is a word that has two

    meanings:

    Traditionally, a Hacker issomeone who likes to play

    with Software or Electronic Systems.

    Recently, Hacker has taken on a new meaning

    someone who maliciously breaks into systems for

    personal gain. Technically, these criminals & areknown as Crackers

  • 7/28/2019 Ethical Hacking 3

    4/16

    The Role of Security and PenetrationTesters Hackers

    Access computer system or network without authorization

    Breaks the law; can go to prison

    Crackers

    Break into systems to steal or destroy data

    U.S. Department of Justice calls both hackers

    Ethical hacker

    Performs most of the same activities but with ownerspermission

  • 7/28/2019 Ethical Hacking 3

    5/16

  • 7/28/2019 Ethical Hacking 3

    6/16

    What do Hackers do?

    Security test More than an attempt to break in; also includes

    analyzing companys security policy and

    procedures Tester offers solutions to secure or protect the

    network

  • 7/28/2019 Ethical Hacking 3

    7/16

    What do Hackers do?

    A few examples of Web application hacks

    File Query

    Browser caching

    Cookie and URL hacks

    SQL Injection Cross-site Scripting (# 1 threat today!)

  • 7/28/2019 Ethical Hacking 3

    8/16

    Ethical Hacking is good because:

    Independent computer security Professionals

    breaking into the computer systems.

    Neither damage the target systems nor stealinformation.

    Evaluate target systems security and report backto owners about the vulnerabilities found.

  • 7/28/2019 Ethical Hacking 3

    9/16

    Ethical Hackers but not Criminal Hackers

    Completely trustworthy.

    Strong programming and computer networking skills.

    Learn about the system and trying to find its

    weaknesses.

    Techniques of Criminal hackers-Detection-Prevention.

    Published research papers or released security software.

  • 7/28/2019 Ethical Hacking 3

    10/16

    Why Ethical Hacking?

    It is Legal

    Permission is obtained from the target

    Part of an overall security program

    Identify vulnerabilities visible from Internet at

    particular point of time

    Ethical hackers possesses same skills, mindset

    and tools of a hacker but the attacks are done in

    a non-destructive manner

  • 7/28/2019 Ethical Hacking 3

    11/16

    WHITE HATS

    These are good hackers .

    Have genuine license to hack.

    Have registered police records

    Evolves themselves in good works

    Generally owned by companies for security designing

    Have high pay scales.

    Generally these are coders

  • 7/28/2019 Ethical Hacking 3

    12/16

    BLACK HATS

    very dangerous persons.

    Always have motive to earn huge profit.

    Highly paid persons.

    Evolves themselves mostly in criminal activities.

    These could be coders, admins as well as scripts kiddies

  • 7/28/2019 Ethical Hacking 3

    13/16

    GREY HATS

    Also known as red hats.

    Perform both tasks fair as well as unfair.

    Generally these are admins.

    Have little high pay than white hats.

    Generally not so dangerous, but sometimes could

    be.

  • 7/28/2019 Ethical Hacking 3

    14/16

    Security & Counter Measures for us

    Use of anti-viruses.

    Proper logout after use of mail id.

    Manual opening browser

    don't open spam. Password protected admin account.

  • 7/28/2019 Ethical Hacking 3

    15/16

    Suggestions or queries ?

  • 7/28/2019 Ethical Hacking 3

    16/16

    THANKS !!

    YOU