Sie sind auf Seite 1von 26

ETHICAL

HACKING

Who is a Hacker?
Hacker

is a person who enjoys learning


the details of computer systems and how
to stretch their capabilitiesas opposed
to most of the users of computers, who
prefer to learn only the minimum
necessary.

Types of hackers
o

White hat hackers

Brown hat hackers

Gray hat hackers

White Hat hacker


A

white hat hacker is also rendered as ethical


hacker
He is the person who is ethically opposed to
the abuse of computer systems.
A white hat generally focuses on securing IT
systems.
Professional white hat hackers are sneakers,
group of sneakers Tiger teams.

Black hat hacker

Black hat is a person who compromises the


security of a computer system without
permission from an authorized party , Typically
with malicious intent.
He is officially known as cracker.
The somewhat similar activity of defeating
copy prevention devices in software which
may or may not be legal in a country's laws is
actually software cracking .

Gray hat hacker

A grey hat, in the computer security


community, refers to a skilled hacker who
sometimes acts legally, sometimes in good
will, and sometimes not.
They are a hybrid between white and black
hat hackers.
They usually do not hack for personal gain or
have malicious intentions, but may or may not
occasionally commit crimes during the course
of their technological exploits.

Ethical hacking- a dynamic


process

Basic structure for Ethical


Hacking

Some of the tools used by


Ethical Hacker
SQL

Injections
Packet sniffing
IP hijack
DNS re-morphing
E-mail bombing
Password sniffers
Backtrack
matriux

Hacking @ real time: Examples


by our group!
SQL

Injection

Email

bombing

Packet

sniffing

Password

sniffing

SQL Injection

Email-Bombing

Mail which has been bombed

The

security concern Email hacking


and Bombing is a huge concern
and can we can stop this by
following certain preventive
measures..
Verifying the header of the email
Stop clicking unwanted links
Spam filters
Antivirus with firewall rules updated.

Password sniffing

Risk Management:

Hackers inject viruses, worms, IP protocol hacking


due to the low secured software or system designs.
Who employee Ethical hackers??
Defense, corporate sectors for securing the servers
will hire hackers.
Average pay salary for CEH(certified Ethical
Hacker) is around 16 lakhs/year
Hackers uses antiviruses databases for uploading
viruses into the target computer

Conclusion :

Never underestimate the attacker or overestimate


our existing posture.
A company may be target not just for its
information but potentially for its various
transactions.
To protect against an attack, understanding
where the systems are vulnerable is necessary.
Ethical hacking helps companies first comprehend
their risk and then, manage them.
Plan for the unplanned attacks.

Das könnte Ihnen auch gefallen