Ethical Hacking www.rockfortnetworks.com ethicalhacking.bng@rockfortnetworks.com



Similar documents
1 Hack-x-crypt UJJWAL SAHAY

Institute of Southern Punjab, Multan

Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D.

Application Security Testing

Information Security Services

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Information Security Organizations trends are becoming increasingly reliant upon information technology in

Web Security School Final Exam

Hacking: Information Gathering and Countermeasures

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

About Effective Penetration Testing Methodology

MOBILE APPLICATION TESTING ENGINEER

10 Smart Ideas for. Keeping Data Safe. From Hackers

Application Intrusion Detection

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Protecting your business interests through intelligent IT security services, consultancy and training

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES

NAS103: Essentials of Network

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:

VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

SPICE EduGuide EG0015 Security of Administrative Accounts

InfoSec Academy Pen Testing & Hacking Track

CISO's Guide to. Penetration Testing. James. S. Tiller. A Framework to Plan, Manage, and Maximize Benefits. CRC Press. Taylor & Francis Group

Penetration Test JSPLC. Contact: James, APS (CCNA, CEH) mail.biz

LINUX / INFORMATION SECURITY

Penetration Testing. Presented by

CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910

Computer Security and Penetration Testing. Chapter 2 Reconnaissance

Evaluating the Perceptions of People towards Online Security

Preparing for the HIPAA Security Rule

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

Unit 3 Cyber security

PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES

601/8498/X IAO Level 3 Certificate in Web Design and Development (RQF)

Information Security. Training

Marketing ABSTRACT

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation

Penetration Testing Service. By Comsec Information Security Consulting

Running head: INFORMATION TECHNOLOGY, SECURITY AND ETHICS 1. Kevin Mitnick: How His Story Affected Information Technology, Security and Ethics

Cybersecurity Awareness for Executives

Professional Ethics for Computer Science. Lecture 2: Ethics for IT Professionals and IT Users

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Data Security Incident Response Plan. [Insert Organization Name]

Security in the smart grid

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY

Protecting Your Network Against Risky SSL Traffic ABSTRACT

CYBER SECURITY: A REPORT FROM THE TRENCHES 2015 AGC NATIONAL & CHAPTER LEADERSHIP CONFERENCE MIKE.ZUSMAN@CARVESYSTEMS.COM

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

ReadySpace Limited Unit J, 16/F Reason Group Tower, Castle PeakRoad, Kwai Chung, N.T.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

How To Test For Security On A Network Or System

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

Threat Modeling. 1. Some Common Definition (RFC 2828)

Incorporating Cyber Threat Intelligence into Security Assessment Programs

Certification Programs

SECURITY FIRST: AN ESSENTIAL GUIDE TO PENETRATION TESTING

Newspaper Activities for Students

TECHNOLOGY ACCEPTABLE USE POLICY

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Managing IT Security with Penetration Testing

IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM

InfoSec Academy Application & Secure Code Track

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Data Loss Prevention Program

Social Engineering and Reverse Social Engineering Ira S. Winkler Payoff

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

History & Impact of Hacking: Final Paper

Job Description. Organisational Relationships: Description of Role: Context of the Post: Duties and Responsibilities Specific to the Post:

[DIGITAL MARKETING TRAINING PROPOSAL] Enriching Empowering Enlightening

Internet Marketing Workshop Web 2.0

Topic 1 Lesson 1: Importance of network security

Main Reference : Hall, James A Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications

Transcription:

Ethical Hacking www.rockfortnetworks.com ethicalhacking.bng@rockfortnetworks.com

About ethical hacking Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. Hacking is not limited to computers. The real meaning of hacking is to expand the capabilities of any electronic device; to use them beyond the original intentions of the manufacturer. As a matter of fact, the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains.

Since the 1980's, the Internet has vastly grown in popularity and computer security has become a major concern for businesses and governments. Organizations would like to use the Internet to their advantage by utilizing the Internet as a medium for e-commerce, advertising, information distribution and access, as well as other endeavors. From the early days of computers, ethical hacking has been used as an evaluation of system security. Many early ethical hacks were conducted by the United States Military to cary out security evaluations on their operating systems to determine whether they should employ a two-level (secret/top secret) classification system. However, with the growth of computing and networking in the early 1990's,

The Ethical Hacking Process :- Planning :- Planning is essential for having a successful project. It provides an opportunity to give critical thought to what needs to be done, allows for goals to be set, and allows for a risk assessment to evaluate how a project should be carried out. Reconnaissance :- Is the search for freely available information to assist in an attack. This can be as simple as a ping or browsing newsgroups on the Internet in search of disgruntled employees divulging secret information or as messy as digging through the trash to find receipts or letters

Enumeration :- Enumeration is also known as network or vulnerability discovery. It is the act of obtaining information that is readily available from the target's system, applications and networks. Vulnerability Analysis :- In order to effectively analyze data, an ethical hacker must employ a logical and pragmatic approach. In the vulnerability analysis phase, the collected information is compared with known vulnerabilities in a practical process. Exploitation :- The exploitation of a system can be as easy as running a small tool or as intricate as a series of complex steps that must be executed in a particular way in order to gain access.

Different types of ethical hacking 1.Coders :- Coders are real hackers. They are programmers having immense knowledge about many programming languages, networking and working of programs. 2. Admins :- These guys have Hacking certifications and can hack any system or network with the help of tools and exploit created by codes. 3. Script kiddies :- They just use the tools and partial knowledge they gain from internet to attack systems. They do it just for fun purpose and to be famous. They use the tools and exploits coded by other hackers and use them. They have minimum skills.

4. White Hat Hackers :- They break into systems just for legal purposes. Their main motive is to find loopholes in the networks and rectifying them. 5.Black Hat Hacker :- They use their skills for destructive purposes. They break into systems and networks either for fun or to gain some money from illegal means. 6.Gray Hat Hacker :- A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked.

Life cycle of ethical hacking

Characteristics of ethical handling 1.Leadership:- For a business to be ethical, its leaders must demonstrate ethical practices in any situation. 2. Values:- An ethical business has a core value statement that describes its mission. Any business can create a value statement, but an ethical business lives by it. 3.Integrity:- Integrity is an all-encompassing characteristic of an ethical business. The ethical business adheres to laws and regulations at the local, state and federal levels.

4. Respect:- Ethics and respect go hand in hand. An ethical business demonstrates respect for its employees by valuing opinions and treating each employee as an equal. 5. Loyalty:- Employees who work for a loyal employer want to maintain the relationship and will work harder toward that end. 6. Concern:- An ethical business has concern for anyone and anything impacted by the business. This includes customers, employees, vendors and the public.

Contents 1 Introduction by everyone 2 The Word "Hacker" by Carmelo Kintana 2.1 Survey of Common Definitions 2.2 Etymology 2.3 Evolution 2.4 Perceptions 2.4.1 Public Perceptions 2.4.2 Insider Perceptions 2.5 Timeline of the word Hack 3 Expert Programmer by Vikas Rajvanshy

3.1 Hacker as an expert programmer 3.2 Impact on society 3.3 Famous hackers 3.4 Where did all the hardware hackers go? 3.5 Why are the top hackers today affiliated with Open Source? 3.6 What is the role of hackers in corporations? 4 Black Hat by Sandra Lemon & Hansen Liou 4.1 History 4.2 Early Examples 4.3 Modern Examples & Motivations 4.4 Impact of Hacking on Businesses and Governments 5 White Hat by Michael Frederick

5.1 Motivations 5.1.1 Kevin Mitnick 5.1.2 H.D. Moore 5.2 History 5.2.1 Rising out of the black hat community 5.2.2 Reformation of former black hats 5.2.3 Hacker literature 5.3 Popular culture 5.4 Impact 5.4.1 Society 5.4.2 Security 6 Conclusion by everyone 7 References

Salient features of Ethical Hacking : 80% hands on/ practical classes. Real time scenarios/project exposure. Limited number of students per batch. Corporate training atmosphere. Weekend batches to suit professional. Placement assistance. Career support activities includes. 1.resume preparation & individual counseling. 2.assistance for get through in interviews by experts. Backup classes. Provision to come for more batch.

Platinum features of shell script Will get complete product development cycle, which includes Demand from customer. Design-decision. Conceptualization. Analysis. Design finalize. DFMEA. Finalization. Drawing release. Tool design. Product to the market.