Ethical Hacking Introduction. What is Ethical Hacking? Types of Ethical Hacking Responsibilities...

16
Ethical Hacking Introduction

Transcript of Ethical Hacking Introduction. What is Ethical Hacking? Types of Ethical Hacking Responsibilities...

Page 1: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical Hacking

Introduction

Page 2: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

What is Ethical Hacking?Types of Ethical HackingResponsibilities of a ethical hackerCustomer ExpectationsSkills of the hacker

Overview

Page 3: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical

What is it?

Hacking

Page 4: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Art and Science ofUnderstanding and determining vulnerabilities inside the information infrastructure

Art and Science of understanding and determining vulnerabilities inside the information infrastructure

Page 5: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical

Types of Ethical Hacking

Hacking

Page 6: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Types

Types BLACK BOX

GREYBOX

WHITEBOX

Knowledge ofinformation

infrastructure

Page 7: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical

Responsibilities of Ethical Hacker

Hacking

Page 8: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Responsibilities

• Use your knowledge & tools only for legal purposes.

• Only hack to identify security issues with goal of defense.

• Get management approvals.

Page 9: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical

Customer Expectations

Hacking

Page 10: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Customer Expectations

• Define Goals and expectations• Confidentiality• Who owns the resultant data- the company• Full disclosures

Page 11: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

EthicalHacker’s

skills Hacking

Page 12: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Hacker’s skills

Network/SystemsAdministrator

Security expertise

Extensive Knowledge

Page 13: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical

Laws and Preparation

Hacking

Page 14: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Preparation

• Get signed approvals for all test• Sign confidentiality agreements (NDA) • Get approval from collateral parties• Put together teams and tools• Define Goals

Page 15: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical

Types of Attacks

Hacking

Page 16: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Types of Attacks

• Full Penetration• Denial of Service• Specific Information ( theft or disclosure)• Social Engineering