ethical hacking 101
DESCRIPTION
Presentation given by Janette Toral at the ICT Seminar Series 2012 organized by Creative Alliance Services last January 25, 2012 at Lingayen Pangasinan.TRANSCRIPT
![Page 1: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/1.jpg)
Ethical Hacking 101
Jane1e Toral h1p://digitalfilipinoclub.com
![Page 2: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/2.jpg)
We are all hackers
• Hacking means making something work regardless of the situaBon.
• Play and experiment with technology.
![Page 3: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/3.jpg)
Malicious vs. Ethical hacking
• Malicious hacking is a violaBon under RA 8792 • Ethical hacker has tools, mindset, and skills but also relied upon to solve and invesBgate issues.
• Performs hacks as security tests for systems they got contracted under a binding agreement.
![Page 4: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/4.jpg)
Ethical hacking commandments
• Work responsibly and support company goals. • Respect privacy. • Not crash systems.
![Page 5: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/5.jpg)
Where to search…
• Whois lookups • Google searches • Archive.org • Google Alerts (set up hacking alerts)
![Page 6: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/6.jpg)
Keywords
Can be used as guide on popular topics to rank, crackers can also use it
to vicBmize.
![Page 7: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/7.jpg)
![Page 8: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/8.jpg)
![Page 9: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/9.jpg)
h1p://home.mcafee.com:80/AdviceCenter/Default.aspx?id=ad_sfs_mmdc
![Page 10: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/10.jpg)
h1p://home.mcafee.com:80/AdviceCenter/Default.aspx?id=ad_sfs_mmdc
![Page 11: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/11.jpg)
h1p://home.mcafee.com:80/AdviceCenter/Default.aspx?id=ad_sfs_mmdc
![Page 12: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/12.jpg)
h1p://www.informaBca64.com/DownloadFOCA/
![Page 13: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/13.jpg)
Protect Yourself
![Page 14: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/14.jpg)
Integrated with Firefox.
![Page 15: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/15.jpg)
h1p://adblockplus.org/en/screenshots
![Page 16: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/16.jpg)
h1ps://hackalert.armorize.com/
![Page 17: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/17.jpg)
h"p://sandboxie.com/
![Page 18: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/18.jpg)
Ethical hacking commandments
• Formulate a plan • SelecBng tools • ExecuBng the plan • EvaluaBng the results
![Page 19: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/19.jpg)
h1p://privacybydesign.ca/
![Page 20: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/20.jpg)
Learn from exisBng codes and share your experience
• h1p://developer.yahoo.com/ • h1ps://developers.facebook.com/
• h1p://code.google.com/
• h1p://www.programmableweb.com/
• h1ps://github.com/
• h1p://www.heroku.com/
![Page 21: Ethical Hacking 101](https://reader033.vdocuments.mx/reader033/viewer/2022051109/54931b12b479595b4d8b477d/html5/thumbnails/21.jpg)
Photo credits
• h1p://movies.about.com/od/knightandday/ig/Knight-‐and-‐Day-‐Photos/knight-‐day-‐photo2.htm
• h1p://www.julia-‐roberts.org/julia-‐roberts-‐pics/julia-‐roberts-‐10/
• h1p://movies.about.com/od/pi1brad/Pi1_Brad.htm
• h1p://www.nicolekidmanofficial.com/about-‐nicole/
• h1p://www.jenniferlovehewi1online.com/%E2%80%9Cthe-‐client-‐list%E2%80%9D-‐huge-‐hit-‐for-‐lifeBme/