ethical hacking license to hack. overview ethical hacking ? why do ethical hackers hack? ethical...
TRANSCRIPT
![Page 1: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal](https://reader036.vdocuments.mx/reader036/viewer/2022082423/5697c0191a28abf838cce65a/html5/thumbnails/1.jpg)
Ethical Hacking
License to hack
![Page 2: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal](https://reader036.vdocuments.mx/reader036/viewer/2022082423/5697c0191a28abf838cce65a/html5/thumbnails/2.jpg)
OVERVIEW
• Ethical Hacking ?• Why do ethical hackers hack?• Ethical Hacking - Process• Reporting• Keeping It Legal
![Page 3: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal](https://reader036.vdocuments.mx/reader036/viewer/2022082423/5697c0191a28abf838cce65a/html5/thumbnails/3.jpg)
What is Ethical Hacking ?
• It is legal• Permission is obtained from the target• Identify vulnerabilities visible from Internet • Ethical hackers possesses same skills, mindset
and tools of a hacker but the attacks are done in a non-destructive manner
![Page 4: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal](https://reader036.vdocuments.mx/reader036/viewer/2022082423/5697c0191a28abf838cce65a/html5/thumbnails/4.jpg)
What is Ethical Hacking ?
What is Hacking? • Process of breaking into system• Personal or Commercial Gain
Types Of Hackers:• White Hats – Good guys, Ethical Hackers• Black Hats – Bad guys• Gray Hats – Good or bad hackers
![Page 5: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal](https://reader036.vdocuments.mx/reader036/viewer/2022082423/5697c0191a28abf838cce65a/html5/thumbnails/5.jpg)
Why do ethical hackers hack?
• To find weaknesses of application
• Ethical hackers develop defensive technology
• Every coder should know how to hack, so that they know how to write “secure code” (which is code that can defend itself from hackers)
![Page 6: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal](https://reader036.vdocuments.mx/reader036/viewer/2022082423/5697c0191a28abf838cce65a/html5/thumbnails/6.jpg)
Defining Ethical Hacking
Phases of Ethical Hacking:Phase 1 –ReconnaissancePhase 2 –ScanningPhase 3 –Gaining AccessPhase 4 –Maintaining AccessPhase 5 –Covering Tracks
![Page 7: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal](https://reader036.vdocuments.mx/reader036/viewer/2022082423/5697c0191a28abf838cce65a/html5/thumbnails/7.jpg)
Defining Ethical Hacking
Identifying Types of Hacking Technologies:
• Operating Systems• Applications• Misconfigurations
![Page 8: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal](https://reader036.vdocuments.mx/reader036/viewer/2022082423/5697c0191a28abf838cce65a/html5/thumbnails/8.jpg)
Defining Ethical Hacking
Identifying Types of Ethical Hacks:
• Remote Network• Local Network• Stolen Equipment
![Page 9: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal](https://reader036.vdocuments.mx/reader036/viewer/2022082423/5697c0191a28abf838cce65a/html5/thumbnails/9.jpg)
Reporting & Testing
Understanding Testing Types:
• Black Box Testing• White Box Testing• Gray Box Testing
![Page 10: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal](https://reader036.vdocuments.mx/reader036/viewer/2022082423/5697c0191a28abf838cce65a/html5/thumbnails/10.jpg)
Pen Test Deliverables
• A list of your findings, in order of high risk• An analysis of your findings• A conclusion or explanation of your findings• Log files from tools that provided supporting
evidence of your findings• Practical Security solutions
![Page 11: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal](https://reader036.vdocuments.mx/reader036/viewer/2022082423/5697c0191a28abf838cce65a/html5/thumbnails/11.jpg)
Ethical Hacking
Guidelines:
• Be responsible • Don’t use hacking for evil • It’s easy to be caught, and the
penalties are very steep
![Page 12: Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal](https://reader036.vdocuments.mx/reader036/viewer/2022082423/5697c0191a28abf838cce65a/html5/thumbnails/12.jpg)
THE END