Hacking
Hacking
and Network
Defense
Contact Information
Sam Bowne
Email: [email protected]
Website: samsclass.info
3
Ethical Hacking
Ethical hackers
Employed by companies
to perform penetration
tests
Penetration test
Legal attempt to break into
a company’s network to
find its weakest link
Tester only reports
findings, does not harm
the company
Penetration Testers
Hackers
Access computer system or network without
authorization
Breaks the law; can go to prison
Crackers
Break into systems to steal or destroy data
U.S. Department of Justice calls both hackers
Ethical hacker
Performs most of the same activities but with
owner’s permission 5
Penetration Testers
6
Security Credentials
CompTIA offers Security+ certification,
a basic familiarity with security
concepts and terms
7
OSSTMM Professional
Security Tester (OPST)
Designated by the
Institute for
Security and Open
Methodologies
(ISECOM)
Based on the Open
Source Security
Testing
Methodology
Manual (OSSTMM) 8
Certified Information
Systems Security
Professional (CISSP)
11
Get Out of Jail Free Card
When doing a penetration test, have a
written contract giving you permission
to attack the network
Using a contract is just good business
Contracts may be useful in court
Have an attorney read over your contract
before sending or signing it
12
Projects
To get credit for this session, do any one of
these:
Project 1: Using The Metasploit Framework
to take over a vulnerable computer remotely
Project 2: : Using Ophcrack to crack
Windows passwords with Rainbow tables
Project 3: Using a Keylogger to record
keystrokes (including passwords)
13
CNIT 123: Ethical Hacking and
Network Defense
3-unit course
Offered face-to-face next semester
Face-to-face and online sections in
Spring 2008
14