SlideShare a Scribd company logo
1 of 12
Ethical Hacker Keri Michalski-Smith Bryant & Stratton College INFT 242  Network & PC Security Fundamentals August 1st, 2009
Ethical Hacker Defined	 ∙ Use their expertise and skills to protect a     company’s information security ∙ Purpose is to reveal system inadequacies and    penetrate defenses ∙ Results used to implement additional tools to     defend against intrusion ∙ Goal is to find system vulnerabilities before a    malicious hacker ∙ Always in need as security threats are continual    and ever-changing
Ethical Hacker Job Function ∙ Obtains explicit written permission from system    owner in regards to systems tested, methods to    be used, and any limitations ∙ Conducts tests based upon three type of    attackers: outsider, outsider with limited access,   and internal user ∙ Systematically documents processes used and    recommendations in detailed report
Tools Used By Ethical hacker  Intrusion detecting monitoring software and tools   used to: ∙ Scan log files ∙ Detect port scans ∙ Ethernet sniffing ∙ Network mapping ∙ Scan registry or configuration files
Ethical Hacker Testing conducted on: ∙ Internet access to connect to firewalls,    web servers, routers, and filters ∙  Internal attack on firewalls, web servers,     server, and e-mail systems ∙ Social engineering attack utilizing staff’s job   functions and helpfulness to obtain confidential    information ∙ Fraud through physical access impersonating as   employee ∙ Theft of key employee’s laptop revealing    confidential information
Importance of Ethical Hacker: ∙ Considered a necessity not a luxury given    today’s exposure to attacks ∙ Valuable method for counteracting intrusion    along with security policies already in place ∙ Expertise and familiarity with latest network    attack strategies ∙ Contracted Ethical Hacker from outside source    considered better due to lack of bias, as they    have no preconceived notions about system    strengths or weaknesses
Phases of Ethical hacking Planning Stage    ∙ Time and cost considerations determine what       will be tested    ∙ Determinations made upon which information       exposure poses the greatest risks
Phases of Ethical hacking Discovery Phase Information gathered about company through  ∙ Company website  ∙ Press releases  ∙ Job listings that often reveal employee names, e-mail addresses and even network diagrams   ∙ Blogs and discussion forums revealing specific technical issues and methodologies used by company’s IT department  ∙ Hardware and software tools All information gathered used to find vulnerabilities  in company’s architecture, policies, and processes to  reveal weak configurations and unsecure systems
Phases of Ethical hacking Attack Phase ∙ All vulnerabilities indentified in discovery phase   are exploited ∙ Information confidentiality, integrity, availability,   and accountability are all subjected to ethical attack ∙ Attempts to gain system access, escalate privileges,     system browsing, and gain access without detection
Recommendations Harden Network Servers
Recommendations Best Practices
Ethical hacker - THE END- Keri Michalski-Smith Bryant & Stratton College INFT 242 - Network & PC Security Fundamentals August 1st, 2009

More Related Content

What's hot

Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5sabtolinux
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey Smith
 
Security testing
Security testingSecurity testing
Security testingbaskar p
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewSam Bowne
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by primePrime Infoserv
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...Zara Nawaz
 
WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsWE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsSociety of Women Engineers
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Securityvishnukp34
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & ControlAdetula Bunmi
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
Ethical Hacking Services
Ethical Hacking ServicesEthical Hacking Services
Ethical Hacking ServicesVirtue Security
 

What's hot (20)

Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016
 
Security testing
Security testingSecurity testing
Security testing
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
 
Network Security Goals
Network Security GoalsNetwork Security Goals
Network Security Goals
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
 
WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsWE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security Controls
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
презентация1
презентация1презентация1
презентация1
 
Ethical Hacking Services
Ethical Hacking ServicesEthical Hacking Services
Ethical Hacking Services
 

Viewers also liked (7)

Ajay Bhattacharya
Ajay  BhattacharyaAjay  Bhattacharya
Ajay Bhattacharya
 
Portfolio ricerche e
Portfolio ricerche ePortfolio ricerche e
Portfolio ricerche e
 
Jagdish Mitra
Jagdish  MitraJagdish  Mitra
Jagdish Mitra
 
Abhishek Singh
Abhishek SinghAbhishek Singh
Abhishek Singh
 
Mohan Krishnan
Mohan KrishnanMohan Krishnan
Mohan Krishnan
 
Workshop Suecia Avina 2009
Workshop Suecia   Avina 2009Workshop Suecia   Avina 2009
Workshop Suecia Avina 2009
 
Portfolio Ricerche 2009
Portfolio Ricerche 2009Portfolio Ricerche 2009
Portfolio Ricerche 2009
 

Similar to Ethical Hacker

Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxGovandJamalSaeed
 
Ethical Hacking : Understanding the Basics
Ethical Hacking : Understanding the BasicsEthical Hacking : Understanding the Basics
Ethical Hacking : Understanding the BasicsoffensoSEOwork
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdfMing Man Chan
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxJanani S
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
 
Exploring Ethical Hacking for a Safer Digital World
Exploring Ethical Hacking for a Safer Digital WorldExploring Ethical Hacking for a Safer Digital World
Exploring Ethical Hacking for a Safer Digital Worldrashmicetpa20
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 
Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Saurabh Upadhyay
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Knoldus Inc.
 
What is penetration testing
What is penetration testingWhat is penetration testing
What is penetration testingsakshisoni076
 
Ethical Hacking Course-PPT.pptx
Ethical Hacking Course-PPT.pptxEthical Hacking Course-PPT.pptx
Ethical Hacking Course-PPT.pptxSamridhiJain47
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical HackerPiotrPatun
 
Attackers process
Attackers processAttackers process
Attackers processbegmohsin
 
Understanding Penetration Testing.pdf
Understanding Penetration Testing.pdfUnderstanding Penetration Testing.pdf
Understanding Penetration Testing.pdfBenard76
 

Similar to Ethical Hacker (20)

Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
 
Ethical Hacking : Understanding the Basics
Ethical Hacking : Understanding the BasicsEthical Hacking : Understanding the Basics
Ethical Hacking : Understanding the Basics
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Exploring Ethical Hacking for a Safer Digital World
Exploring Ethical Hacking for a Safer Digital WorldExploring Ethical Hacking for a Safer Digital World
Exploring Ethical Hacking for a Safer Digital World
 
Network Penetration Testing Service
Network Penetration Testing ServiceNetwork Penetration Testing Service
Network Penetration Testing Service
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Ethical hacking concept-Part 1
Ethical hacking concept-Part 1
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
What is penetration testing
What is penetration testingWhat is penetration testing
What is penetration testing
 
Ethical Hacking Course-PPT.pptx
Ethical Hacking Course-PPT.pptxEthical Hacking Course-PPT.pptx
Ethical Hacking Course-PPT.pptx
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical Hacker
 
Attackers process
Attackers processAttackers process
Attackers process
 
Understanding Penetration Testing.pdf
Understanding Penetration Testing.pdfUnderstanding Penetration Testing.pdf
Understanding Penetration Testing.pdf
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 

Ethical Hacker

  • 1. Ethical Hacker Keri Michalski-Smith Bryant & Stratton College INFT 242 Network & PC Security Fundamentals August 1st, 2009
  • 2. Ethical Hacker Defined ∙ Use their expertise and skills to protect a company’s information security ∙ Purpose is to reveal system inadequacies and penetrate defenses ∙ Results used to implement additional tools to defend against intrusion ∙ Goal is to find system vulnerabilities before a malicious hacker ∙ Always in need as security threats are continual and ever-changing
  • 3. Ethical Hacker Job Function ∙ Obtains explicit written permission from system owner in regards to systems tested, methods to be used, and any limitations ∙ Conducts tests based upon three type of attackers: outsider, outsider with limited access, and internal user ∙ Systematically documents processes used and recommendations in detailed report
  • 4. Tools Used By Ethical hacker Intrusion detecting monitoring software and tools used to: ∙ Scan log files ∙ Detect port scans ∙ Ethernet sniffing ∙ Network mapping ∙ Scan registry or configuration files
  • 5. Ethical Hacker Testing conducted on: ∙ Internet access to connect to firewalls, web servers, routers, and filters ∙ Internal attack on firewalls, web servers, server, and e-mail systems ∙ Social engineering attack utilizing staff’s job functions and helpfulness to obtain confidential information ∙ Fraud through physical access impersonating as employee ∙ Theft of key employee’s laptop revealing confidential information
  • 6. Importance of Ethical Hacker: ∙ Considered a necessity not a luxury given today’s exposure to attacks ∙ Valuable method for counteracting intrusion along with security policies already in place ∙ Expertise and familiarity with latest network attack strategies ∙ Contracted Ethical Hacker from outside source considered better due to lack of bias, as they have no preconceived notions about system strengths or weaknesses
  • 7. Phases of Ethical hacking Planning Stage ∙ Time and cost considerations determine what will be tested ∙ Determinations made upon which information exposure poses the greatest risks
  • 8. Phases of Ethical hacking Discovery Phase Information gathered about company through ∙ Company website ∙ Press releases ∙ Job listings that often reveal employee names, e-mail addresses and even network diagrams ∙ Blogs and discussion forums revealing specific technical issues and methodologies used by company’s IT department ∙ Hardware and software tools All information gathered used to find vulnerabilities in company’s architecture, policies, and processes to reveal weak configurations and unsecure systems
  • 9. Phases of Ethical hacking Attack Phase ∙ All vulnerabilities indentified in discovery phase are exploited ∙ Information confidentiality, integrity, availability, and accountability are all subjected to ethical attack ∙ Attempts to gain system access, escalate privileges, system browsing, and gain access without detection
  • 12. Ethical hacker - THE END- Keri Michalski-Smith Bryant & Stratton College INFT 242 - Network & PC Security Fundamentals August 1st, 2009