Ethical Hacking
19th ofAugust, 2006 Hyderabad, India
TWINCLING Society
We appreciate
Outline
●
Know your enemy History and Trends Anatomy of a hack System Hacking Sniffers Denial of Service Buffer Overflows Social Engineering
●
TWINCLING Society
●
●
●
●
●
●
Know your enemy
Sun Tzu says in the 'Art of War',
TWINCLING Society
“If you know yourself but not the enemy, for every victory gained, you will suffer defeat.” “If you know the enemy and know yourself, you need not fear the result of a hundred battles.”
Know your enemy
●
Hacker (n) – refers to a person who enjoys learning the details of computer systems and stretch their capabilities. Hacking (v) – describes the rapid development of new programs or reverse engineering of already existing software to make the code better and efficient. Cracker – refers to a person who uses his hacking skills for offensive purposes. Phreak – a hacker variant with an interest in telephones and telephone systems. Hactivism – refers to an act of hacking in order to communicate a politically or socially motivated message. An Internet enabled way to practice civil disobedience and protest.
●
TWINCLING Society
●
●
●
Know you enemy
●
Ethical Hacker – refers to security professional who apply their hacking skills for defensive purposes on behalf of its owners. Ethical Hacking – is also known as penetration testing, intrusion testing, red teaming Ethical hacker looks for the following four basic questions: ● What information/locations/systems can an intruder gain access? ● What can an intruder see on the target? ● What can an intruder do with available information? ● Does anyone at the target system notice the attempts?
TWINCLING Society
●
●
Know your enemy
●
Hacker Classes
– –
●
Ethical hacker classes
– – –
Script Kiddie Black hats White hats Grey hats
Former Black hats White hats Consulting firms