2. Need of ethical hacker
• Computer bodyguard
• To save us from black hats
• Increase the security network(eg: prevents
website defacements )
• Have high pay scales
5. Types of hackers
White hats
• keeping data safe
• certified
• not illegal
Black hat
• gains illegal unauthorized access
• steal money
• malicious intentions
6. Script kiddie
• non-skilled
• little understanding
• never hack for themselves
Hacktivist
• announce social, religious,ideological and
political etc. messages
• hijacking or defacing websites
7. Phreaker
• exploits weaknesses in telephones
Green Hat
• curiosity of a child in hacking
Red Hats
• uploading viruses
• vigilants of hacker world
Blue Hat
• Revengeful Script Kiddie
• bug-test
8. ETHICAL HACKING TECHNIQUES
1.Vulnerability scanner
to quickly check computers for weakness
2. Finding vulnerabilities
reverse engineering the software
3. Brute-force attack
Password guessing method
4. Password cracking
recovering passwords from data that has been
stored in or transmitted
9. 5. Packet analyzer
to capture passwords and other data in transit
over the network
6. Spoofing attack
falsifying data
7. Rootkit
low-level, hard-to-detect methods to subvert
control of an operating system
8.Trojan horses
back door in a computer system, enabling the
intruder to gain access later.
9.Computer virus
-replicating program that spreads by inserting
copies
10. 8. Social engineering
to trick the system administrator into giving
them information
Intimidation
hacker convinces the person
Helpfulness.
the hacker acts distressed and concerned
Name-dropping
uses names of authorized users to convince the
person
Technical
a fax or email to a legitimate user, seeking a
response that contains vital information
11. 11. Computer worm
Like virus,but it propagates through
computer networks without user intervention
12. Keystroke logging
to gain access to confidential information
typed on the affected machine
12. Example of ethical hacking
One of the earliest examples of using ethical
hackers occurred in the 1970's.
Any organization that has a network connected
to the Internet or provides an online service
should consider subjecting it to a penetration test.
13. Goals and plans of ethical hacking
Allowing the company’s financial and banking
details to be seen
The possibility that the ethical hacker will send
and/or place malicious code, viruses, malware and
other destructive and harmful things on a computer
system
Massive security breach
14.
15. Conclusion
• doesn’t fix or improve the security
• provide information about what should be fixed
• play a role in the security assessment
• earned its place among other security
assessments.