SlideShare a Scribd company logo
E t h ic a l
H a c k in g
HACKING
PREHISTORY                          ►   Draper builds a "blue box"
► 1960s: The Dawn of                    used with whistle allows
  Hacking                               phreaks to make free calls.
  Original meaning of the word      ►   Steve Wozniak and Steve
  "hack" started at MIT; meant          Jobs, future founders of
  elegant, witty or inspired way        Apple Computer, make and
  of doing almost anything;             sell blue boxes.
  hacks were programming                THE GOLDEN AGE
  shortcuts                             (1980-1991)
ELDER DAYS (1970-1979)              ►   1980: Hacker Message
► 1970s: Phone Phreaks and              Boards and Groups
  Cap'n Crunch: One phreak,             Hacking groups form; such as
  John Draper (aka "Cap'n               Legion of Doom (US), Chaos
  Crunch"), discovers a toy             Computer Club (Germany).
  whistle inside Cap'n Crunch       ►   1983: Kids' Games
  cereal gives 2600-hertz signal,       Movie "War Games"
  and can access AT&T's long-           introduces public to hacking.
  distance switching system.
THE GREAT HACKER WAR              ►   1989: The Germans ,
► Legion of Doom vs Masters           the KGB and Kevin
  of Deception; online warfare;       Mitnick.
  jamming phone lines.            ►   German Hackers
► 1984: Hacker 'Zines                 arrested for breaking into
  Hacker magazine 2600                U.S. computers; sold
  publication; online 'zine           information to Soviet KGB.
  Phrack.                         ►   Hacker "The Mentor“
CRACKDOWN (1986-1994)                 arrested; publishes
► 1986: Congress passes               Hacker's Manifesto.
  Computer Fraud and Abuse        ►   Kevin Mitnick convicted;
  Act; crime to break into            first person convicted
  computer systems.                   under law against gaining
► 1988: The Morris Worm               access to interstate
                                      network for criminal
  Robert T. Morris, Jr., launches     purposes.
  self-replicating worm on
  ARPAnet.
Ethical hacking
Ethical hacking
Ethical hacking
Ethical Hacking
► Independent   computer security
  Professionals breaking into the
  computer systems.
► Neither damage the target systems
  nor steal information.
► Evaluate target systems security and
  report back to owners about the
  vulnerabilities found.
Ethical Hackers but not Criminal
            Hackers
 ► Completely   trustworthy.
 ► Strong programming and computer
   networking skills.
 ► Learn about the system and trying to
   find its weaknesses.
 ► Techniques of Criminal hackers-
   Detection-Prevention.
 ► Published research papers or released
   security software.
 ► No Ex-hackers.
Being Prepared
►    What can an intruder see on the target systems?
►    What can an intruder do with that information?
►    Does anyone at the target notice the intruder's attempts or
     successes?


6.   What are you trying to protect?
7.   Who are you trying to protect against?
8.   How much time, effort, and money are you willing to
     expend to obtain adequate protection?
Ethical Hacker’s Prospective
►   Ethical Hacker’s demand a lot of time and
    persistence.
►   Security evaluation plan
        1.   Identify system to be tested
        2.   How to test?
        3.   Limitations on that testing
►   Evaluation done under a “no-holds-barred”
    approach.
►   Clients should be aware of risks.
►   Limit prior knowledge of test.
Required Skills of an Ethical
               Hacker
►   Routers: knowledge of routers, routing protocols, and
    access control lists
►   Microsoft: skills in operation, configuration and
    management.
►   Linux: knowledge of Linux/Unix; security setting,
    configuration, and services.
►   Firewalls: configurations, and operation of intrusion
    detection systems.
►   Mainframes
►   Network Protocols: TCP/IP; how they function and can
    be manipulated.
►   Project Management: knowledge of leading, planning,
    organizing, and controlling a penetration testing team.
Kinds of Testing
► Remote   Network
► Remote dial-up network
► Local network
► Stolen laptop computer
► Social engineering
► Physical entry


1.Total outsider
2.Semi-outsider
3.Valid user
REVIEW
Therefore Ethical Hackers and Network
Security experts are highly required as well
as demanded by many organization’s for the
security of their own data, if it fell in the
wrong hands a competitor might use it for
corporate espionage, a hacker might use it
to break into the client’s computers, or a
prankster might just post the report’s
contents on the Web as a joke.
Ethical hacking

More Related Content

What's hot (20)

Web Hacking
Web HackingWeb Hacking
Web Hacking
Information Technology
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Mohammad Affan
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Monika Deswal
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Mukul Agarwal
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
AmanUllah115928
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Adri Jovin
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Tharindu Kalubowila
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Md. Atiqur Rahman
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sayantan Sur
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
AmanUllah115928
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Adri Jovin
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 

Similar to Ethical hacking (20)

Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
Ashish Chandurkar
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
Sibghatullah Khattak
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
Elipeta Sotabento
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
sunnysmith
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
Sharique Masood
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ANKITA VISHWAKARMA
 
Hacking
HackingHacking
Hacking
Purohit Rock
 
Hacking
HackingHacking
Hacking
Virus
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lecture
Rob Jewitt
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
Dinesh O Bareja
 
Hacking
HackingHacking
Hacking
NarendraGadde2
 
Sit presentation
Sit presentationSit presentation
Sit presentation
cchoi02
 
Hacking
HackingHacking
Hacking
Karañ Lavharé
 
Hacking
HackingHacking
Hacking
mubeenm50
 
Powerpoint
PowerpointPowerpoint
Powerpoint
Marcelomazzocato
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
Deepu Näñí
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
Tony Lauro
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt
 

Recently uploaded (20)

Political History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptxPolitical History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptx
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...
Sandeep Swamy
 
SPRING FESTIVITIES - UK AND USA -
SPRING FESTIVITIES - UK AND USA            -SPRING FESTIVITIES - UK AND USA            -
SPRING FESTIVITIES - UK AND USA -
Colégio Santa Teresinha
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdfExploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Sandeep Swamy
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...
Sandeep Swamy
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdfExploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Sandeep Swamy
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 

Ethical hacking

  • 1. E t h ic a l H a c k in g
  • 3. PREHISTORY ► Draper builds a "blue box" ► 1960s: The Dawn of used with whistle allows Hacking phreaks to make free calls. Original meaning of the word ► Steve Wozniak and Steve "hack" started at MIT; meant Jobs, future founders of elegant, witty or inspired way Apple Computer, make and of doing almost anything; sell blue boxes. hacks were programming THE GOLDEN AGE shortcuts (1980-1991) ELDER DAYS (1970-1979) ► 1980: Hacker Message ► 1970s: Phone Phreaks and Boards and Groups Cap'n Crunch: One phreak, Hacking groups form; such as John Draper (aka "Cap'n Legion of Doom (US), Chaos Crunch"), discovers a toy Computer Club (Germany). whistle inside Cap'n Crunch ► 1983: Kids' Games cereal gives 2600-hertz signal, Movie "War Games" and can access AT&T's long- introduces public to hacking. distance switching system.
  • 4. THE GREAT HACKER WAR ► 1989: The Germans , ► Legion of Doom vs Masters the KGB and Kevin of Deception; online warfare; Mitnick. jamming phone lines. ► German Hackers ► 1984: Hacker 'Zines arrested for breaking into Hacker magazine 2600 U.S. computers; sold publication; online 'zine information to Soviet KGB. Phrack. ► Hacker "The Mentor“ CRACKDOWN (1986-1994) arrested; publishes ► 1986: Congress passes Hacker's Manifesto. Computer Fraud and Abuse ► Kevin Mitnick convicted; Act; crime to break into first person convicted computer systems. under law against gaining ► 1988: The Morris Worm access to interstate network for criminal Robert T. Morris, Jr., launches purposes. self-replicating worm on ARPAnet.
  • 8. Ethical Hacking ► Independent computer security Professionals breaking into the computer systems. ► Neither damage the target systems nor steal information. ► Evaluate target systems security and report back to owners about the vulnerabilities found.
  • 9. Ethical Hackers but not Criminal Hackers ► Completely trustworthy. ► Strong programming and computer networking skills. ► Learn about the system and trying to find its weaknesses. ► Techniques of Criminal hackers- Detection-Prevention. ► Published research papers or released security software. ► No Ex-hackers.
  • 10. Being Prepared ► What can an intruder see on the target systems? ► What can an intruder do with that information? ► Does anyone at the target notice the intruder's attempts or successes? 6. What are you trying to protect? 7. Who are you trying to protect against? 8. How much time, effort, and money are you willing to expend to obtain adequate protection?
  • 11. Ethical Hacker’s Prospective ► Ethical Hacker’s demand a lot of time and persistence. ► Security evaluation plan 1. Identify system to be tested 2. How to test? 3. Limitations on that testing ► Evaluation done under a “no-holds-barred” approach. ► Clients should be aware of risks. ► Limit prior knowledge of test.
  • 12. Required Skills of an Ethical Hacker ► Routers: knowledge of routers, routing protocols, and access control lists ► Microsoft: skills in operation, configuration and management. ► Linux: knowledge of Linux/Unix; security setting, configuration, and services. ► Firewalls: configurations, and operation of intrusion detection systems. ► Mainframes ► Network Protocols: TCP/IP; how they function and can be manipulated. ► Project Management: knowledge of leading, planning, organizing, and controlling a penetration testing team.
  • 13. Kinds of Testing ► Remote Network ► Remote dial-up network ► Local network ► Stolen laptop computer ► Social engineering ► Physical entry 1.Total outsider 2.Semi-outsider 3.Valid user
  • 14. REVIEW Therefore Ethical Hackers and Network Security experts are highly required as well as demanded by many organization’s for the security of their own data, if it fell in the wrong hands a competitor might use it for corporate espionage, a hacker might use it to break into the client’s computers, or a prankster might just post the report’s contents on the Web as a joke.