INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

ETHICAL HACKING.
Introduction to Ethical Hacking, Ethics, and Legality.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
1. AGENDA History. WHAT’S AN IDS? Security and Roles Types of Violations. Types of Detection Types of IDS. IDS issues. Application.
System Security Scanning and Discovery Chapter 14.
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Penetration Testing Anand Sudula, CISA,CISSP SSA Global Technologies, India Anand Sudula, CISA,CISSP SSA Global Technologies, India.
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Hands-On Ethical Hacking and Network Defense
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
Network Security Testing Techniques Presented By:- Sachin Vador.
Network and Server Attacks and Penetration Chapter 12.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Handling Security Incidents
1 Colorado University Guest Lecture: Vulnerability Assessment Chris Triolo Spring 2007.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Vulnerability Assessment & Penetration Testing By: Michael Lassiter Jr.
Comp 8130 Presentation Security Testing Group Members: U Hui Chen U Ming Chen U Xiaobin Wang.
Penetration Testing Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA 16802
Penetration Testing.
Performing a Penetration Test.  Penetration Tester  Attempts to reveal potential consequences of a real attack  Security Audit / Vulnerability Assessment.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Information Systems Security Computer System Life Cycle Security.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Honeypot and Intrusion Detection System
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Information Systems Security Operations Security Domain #9.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
CSCE 522 Secure Software Development Best Practices.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
CSCE 201 Secure Software Development Best Practices.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Understand Malware LESSON Security Fundamentals.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Exploitation Development and Implementation PRESENTER: BRADLEY GREEN.
Filip Chytrý Everyone of you in here can help us improve online security....
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Network security Vlasov Illia
Topic 5 Penetration Testing 滲透測試
Seminar On Ethical Hacking Submitted To: Submitted By:
Secure Software Confidentiality Integrity Data Security Authentication
Penetration Testing Computer Science and Software Engineering
How hackers do it Ron Woerner Security Administrator CSG Systems, Inc.
Test 3 review FTP & Cybersecurity
Presentation transcript:

INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)  Black Hats (Malicious hackers)  Gray Hats (Good or bad hackers)  How to Be Ethical ?  The Phases of Ethical Hacking.  Reconnaissance  Scanning  Gaining access  Maintaining access  Clearing tracks  Types of attacks.  Performing a Penetration Test.  Preparation  Conduct Security Evaluation  Conclusion

Ethical Hacking Terminology  Threat: An environment or situation that could lead to a potential breach of security.  Exploit: A piece of software or technology that takes advantage of a bug, glitch, or vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a computer system.  Vulnerability: The existence of a software flaw, logic design, or implementation error.  Target of Evaluation (TOE): A system, program, or network that is the subject of a security analysis or attack.  Attack: An attack occurs when a system is compromised based on a vulnerability.  Remote: The exploit is sent over a network without any prior access to the vulnerable system.

What is Ethical hacking?  Ethical hacking is the process of testing network and systems security for vulnerabilities using the some tools that a hacker might use to compromise the network.

Who are Ethical hacker?  Ethical hackers are usually security professionals or network penetration testers.  Ethical hackers use their hacking skills and toolsets for defensive and protective purposes only.

How many types of hackers? Hackers can be divided into three groups:  White Hats (Ethical hackers): i. White hats are the good guys, the ethical hackers who use their hacking skills for defensive purposes. ii. White hats are those who hack with permission from the data owner. It is critical to get permission prior to beginning any hacking activity.

 Black Hats (Malicious hackers): i. Black hats are the malicious hackers or crackers who use their skills for illegal or malicious purposes. ii. Black-hat hackers having gained unauthorized access such as “destroy vital data”, “deny legitimate users service”, and just cause problems for their targets.  Gray Hats (Good or bad hackers): i. Gray hats are hackers who may work offensively or defensively, depending on the situation.

How to Be Ethical  The ethical hacker must follow certain rules: i. Gain authorization from the client and have a signed contract giving the tester permission to perform the test. ii. Maintain and follow a nondisclosure agreement (NDA) with the client in the case of confidential information disclosed during the test. iii. Maintain confidentiality when performing the test. iv. Information gathered may contain sensitive information. No information about the test or company confidential data should ever be disclosed to a third party.

The Phases of Ethical Hacking…  The process of ethical hacking includes five phases that hackers generally follow in hacking a computer system:  Reconnaissance  Scanning  Gaining access  Maintaining access  Clearing tracks

Reconnaissance  Passive reconnaissance involves gathering information as possible about the TOE (Target of Evaluation).  Active reconnaissance involves probing the network to discover individual hosts, IP addresses, and services on the network.

Scanning  The goal of scanning is to learn as much technical data about the systems as possible.  Tools that a hacker may employ during the scanning phase include:  Dialers  Port scanners  Internet Control Message Protocol (ICMP) scanners  Ping sweeps  Network mappers  Simple Network Management Protocol (SNMP) sweepers  Vulnerability scanners etc.

Gaining access  Gaining access is the actual hacking phase in which the hacker gains access to the system.  In this step, the hacker will make use of all the information he collected in the pre-attacking phases.

Maintaining access  Once a hacker has gained access to a target system, they want to keep that access for future exploitation and attacks.  Once the hacker owns the system, they can use it as a base to launch additional attacks.

Clearing tracks  Once hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action.  Hackers try to remove all traces of the attack, such as log files or intrusion detection system (IDS) alarms.

Types of attacks.  The techniques and methods used are likely to vary depending on the target and they should be chosen appropriately having assessed the situation fully. The types of attack and vulnerabilities are:  Buffer Overflow attacks.  Denial of Service (DoS) attacks.  Distributed Denial of Service (DDoS) attacks.  Misconfigurations.  Abuse of Trust.  Brute force attacks.  CGI and WWW services.  Back doors and Trojans.

Performing a Penetration Test  Many ethical hackers acting in the role of security professionals use their skills to perform security evaluations or penetration tests. These tests and evaluations have three phases: Preparation Conduct Security Evaluation Conclusion

 Preparation  This phase involves a formal agreement between the ethical hacker and the organization. This agreement should include the full scope of the test, the types of attacks (inside or outside) to be used, and the testing types.  Conduct Security Evaluation  During this phase, the tests are conducted, after which the tester prepares a formal report of vulnerabilities and other findings.  Conclusion  The findings are presented to the organization in this phase, along with any recommendations to improve security.

Thank you! For your time and consideration. by: Mohammad Affan