This document discusses ethical hacking. It defines hacking as unauthorized use of computer and network resources, and describes different types of hackers such as black hat, white hat, and grey hat. It then defines ethical hacking as a methodology used by trusted professionals to discover vulnerabilities in information systems. The document outlines skills required of an ethical hacker such as knowledge of operating systems, networking protocols, and security tools. It describes the steps an ethical hacker takes including reconnaissance, scanning, gaining access, and clearing tracks. Finally, it discusses advantages like improving security, and disadvantages like potential misuse of access.
What is Hacking???What is Hacking ???
Hacking is unauthorized use of computer andHacking is unauthorized use of computer and
network resources. (The term "hacker"network resources. (The term "hacker"
originally meant a very gifted programmer. Inoriginally meant a very gifted programmer. In
recent years though, with easier access torecent years though, with easier access to
multiple systems, it now has negativemultiple systems, it now has negative
implications.)implications.)
4.
TypeType ofof HackersHackers
Black-Hat Hacker-Black-Hat Hacker- A black hat hacker orA black hat hacker or
crackers are individuals with extraordinarycrackers are individuals with extraordinary
computer skillscomputer skills
White-Hat Hacker-White-Hat Hacker- White hat hackers areWhite hat hackers are
those individuals professing hacker skillsthose individuals professing hacker skills
and using them for defensive purposeand using them for defensive purpose
Grey-Hat Hacker-Grey-Hat Hacker- These are individuals whoThese are individuals who
work both offensively and defensively atwork both offensively and defensively at
various timesvarious times
What is EthicalHacking ??What is Ethical Hacking ??
Ethical hackingEthical hacking –– defined “methodologydefined “methodology
adopted by ethical hackers to discover theadopted by ethical hackers to discover the
harmed existing in information systems’harmed existing in information systems’
of operating environments.”of operating environments.”
With the growth of the Internet, computerWith the growth of the Internet, computer
security has become a major concern forsecurity has become a major concern for
businesses and governments.businesses and governments.
In their search for a way to approach theIn their search for a way to approach the
problem, organizations came to realize thatproblem, organizations came to realize that
one of the best ways to evaluate theone of the best ways to evaluate the
unwanted threat to their interests would be tounwanted threat to their interests would be to
have independent computer securityhave independent computer security
professionals attempt to break into theirprofessionals attempt to break into their
computer systems.computer systems.
7.
Who are EthicalHackers?Who are Ethical Hackers?
““One of the best ways to evaluate the intruder threat is toOne of the best ways to evaluate the intruder threat is to
have an independent computer security professionalshave an independent computer security professionals
attempt to break their computer systems”attempt to break their computer systems”
Successful ethical hackers possess a variety of skills.Successful ethical hackers possess a variety of skills.
First and foremost, they must be completely trustworthy.First and foremost, they must be completely trustworthy.
Ethical hackers typically have very strong programmingEthical hackers typically have very strong programming
and computer networking skills.and computer networking skills.
They are also adept at installing and maintainingThey are also adept at installing and maintaining
systems that use the more popular operating systemssystems that use the more popular operating systems
(e.g., Linux or Windows 2000) used on target systems.(e.g., Linux or Windows 2000) used on target systems.
These base skills are detailed knowledge of theThese base skills are detailed knowledge of the
hardware and software provided by the more popularhardware and software provided by the more popular
computer and networking hardware vendors.computer and networking hardware vendors.
8.
What do EthicalHackers do?What do Ethical Hackers do?
An ethical hacker’s evaluation of a system’s securityAn ethical hacker’s evaluation of a system’s security
seeks answers to these basic questions:seeks answers to these basic questions:
What can an intruder see on the target systems?What can an intruder see on the target systems?
What can an intruder do with that information?What can an intruder do with that information?
Does anyone at the target notice the intruder’s atDoes anyone at the target notice the intruder’s at
tempts or successes?tempts or successes?
What are you trying to protect?What are you trying to protect?
What are you trying to protect against?What are you trying to protect against?
How much time, effort, and money are you willing toHow much time, effort, and money are you willing to
expend to obtain adequate protection?expend to obtain adequate protection?
9.
Required Skills ofan EthicalRequired Skills of an Ethical
HackerHacker
Routers:Routers: knowledge of routers, routing protocols, andknowledge of routers, routing protocols, and
access control listsaccess control lists
Microsoft:Microsoft: skills in operation, configuration andskills in operation, configuration and
management.management.
Linux:Linux: knowledge of Linux/Unix; security setting,knowledge of Linux/Unix; security setting,
configuration, and services.configuration, and services.
Firewalls:Firewalls: configurations, and operation of intrusionconfigurations, and operation of intrusion
detection systems.detection systems.
Mainframes : knowledge of mainframes .Mainframes : knowledge of mainframes .
Network Protocols:Network Protocols: TCP/IP; how they function and canTCP/IP; how they function and can
be manipulated.be manipulated.
Project Management:Project Management: knowledge of leading, planning,knowledge of leading, planning,
organizing, and controlling a penetration testing team.organizing, and controlling a penetration testing team.
10.
WORKINGWORKING
In hacking thereare five steps. The actual hackingIn hacking there are five steps. The actual hacking
will be a circular one. When the five stepswill be a circular one. When the five steps
completed he start reconnaissance in that stagecompleted he start reconnaissance in that stage
and the preceding stages to get in to the nextand the preceding stages to get in to the next
level. The five steps arelevel. The five steps are
ReconnaissanceReconnaissance
Scanning & EnumerationScanning & Enumeration
Gaining accessGaining access
Maintaining accessMaintaining access
Clearing tracksClearing tracks
11.
Future Scope ofEthical HackingFuture Scope of Ethical Hacking
As it an evolving branch the scope of enhancement inAs it an evolving branch the scope of enhancement in
technology is immense. No ethical hacker can ensuretechnology is immense. No ethical hacker can ensure
the system security by using the same techniquethe system security by using the same technique
repeatedly. He would have to improve, develop andrepeatedly. He would have to improve, develop and
explore new avenues repeatedly.explore new avenues repeatedly.
More enhanced software's should be used for optimumMore enhanced software's should be used for optimum
protection. Tools used, need to be updated regularly andprotection. Tools used, need to be updated regularly and
more efficient ones need to be developedmore efficient ones need to be developed
12.
Advantage of EthicalHackingAdvantage of Ethical Hacking
Helping in closing the open holes in the system networkHelping in closing the open holes in the system network
Provides security to banking and financialProvides security to banking and financial
establishmentsestablishments
Prevent website defacementsPrevent website defacements
Fight against terrorism and national security breachesFight against terrorism and national security breaches
Having a computer system that prevents maliciousHaving a computer system that prevents malicious
hackers from gaining accesshackers from gaining access
13.
Disadvantage of EthicalDisadvantageof Ethical
HackingHacking
All depends upon the trustworthiness of the ethicalAll depends upon the trustworthiness of the ethical
hackerhacker
Hiring professionals is expensiveHiring professionals is expensive
The ethical hacker using the knowledge they gain to doThe ethical hacker using the knowledge they gain to do
malicious hacking activitiesmalicious hacking activities
Allowing the company’s financial and banking details toAllowing the company’s financial and banking details to
be seenbe seen
Massive securitMassive security breachy breach