Sunteți pe pagina 1din 12

Ethical Hacking

License to hack

OVERVIEW

Ethical Hacking ?
Why do ethical hackers hack?
Ethical Hacking - Process
Reporting
Keeping It Legal

What is Ethical Hacking ?


It is legal
Permission is obtained from the
target
Identify vulnerabilities visible from
Internet
Ethical hackers possesses same
skills, mindset and tools of a hacker
but the attacks are done in a nondestructive manner

What is Ethical Hacking ?


What is Hacking?
Process of breaking into system
Personal or Commercial Gain
Types Of Hackers:
White Hats Good guys, Ethical Hackers
Black Hats Bad guys
Gray Hats Good or bad hackers

Why do ethical hackers


hack?
To find weaknesses of application
Ethical hackers develop defensive
technology
Every coder should know how to
hack, so that they know how to write
secure code (which is code that can
defend itself from hackers)

Defining Ethical Hacking


Phases of Ethical Hacking:
Phase 1 Reconnaissance
Phase 2 Scanning
Phase 3 Gaining Access
Phase 4 Maintaining Access
Phase 5 Covering Tracks

Defining Ethical Hacking


Identifying Types of Hacking
Technologies:
Operating Systems
Applications
Misconfigurations

Defining Ethical Hacking


Identifying Types of Ethical Hacks:
Remote Network
Local Network
Stolen Equipment

Reporting & Testing


Understanding Testing Types:
Black Box Testing
White Box Testing
Gray Box Testing

Pen Test Deliverables


A list of your findings, in order of high
risk
An analysis of your findings
A conclusion or explanation of your
findings
Log files from tools that provided
supporting evidence of your findings
Practical Security solutions

Ethical Hacking
Guidelines:
Be responsible
Dont use hacking for evil
Its easy to be caught, and the
penalties are very steep

THE END

S-ar putea să vă placă și