Ethical Hacking - Roderick L. Oliver

1y ago
9 Views
1 Downloads
1.56 MB
14 Pages
Last View : 1d ago
Last Download : 3m ago
Upload by : Dani Mulvey
Transcription

Ethical Hacking FIGHTING FIRE WITH FIRE

What is ethical hacking? - WHAT IS HACKING AND IT’S INTENT? - IN WHAT WAYS CAN HACKERS GAIN UNAUTHORIZED ACCESS INTO SYSTEM? - SOME KEY VULNERABILITIES DO ETHICAL HACKERS LOOK FOR - WHAT DETERMINES IF A PERSON IS A HACKER? - COMMON TOOLS USED BY MALICIOUS HACKERS - COMMON TOOLS THAT MOST ETHICAL HACKERS USE AND THE STEPS TAKE TO SECURE A SYSTEM - WHAT IS ETHICAL HACKING? - ETHICAL HACKING AND HOW IT PLAYS A ROLE IN COMBATING UNAUTHORIZED ACCESS BY MALICIOUS HACKERS?

Some of the most common Tools used by Malicious Hackers Malware Viruses Phishing Spoofing Logic bombs Ransomware Etc. This Photo by Unknown Author is licensed under CC BY-SA

The Hacker’s Mind What is Hacking and its intent? The purpose Who can be a hacker? Types of Hackers (Zampanti, 2019) Image by: Unknow author 11/29/2021

The purpose Government Systems Energy Infrastructure Monetary Gain Vulnerability Exploitation Financial institutions or Individuals Exposing Celebrity Accounts Corporations Thrill Seeking

Who can be a hacker? Can we be sure? This Photo by Unknown Author is licensed under CC BY-NC Potential hackers often do not look like we think This Photo by Unknown Author is licensed under CC BY-SA

Types of Hackers Black Hat Gray Hat White Hat State-sponsored Red Teams Blue Teams (Zampanti, 2019) Image by: Unknow author 11/29/2021

IN WHAT WAYS CAN HACKERS GAIN UNAUTHORIZED ACCESS INTO SYSTEM? Image by: Unknow author 11/29/2021 (Mark Ciampa, 2014)

Ethical hacking and how it plays a role in combating unauthorized access by malicious hackers? This Photo by Unknown Author is licensed under CC BY-SA-NC (Simplilearn, 2021)

Ethical Hacking Cont’d White Hat Hackers Red Hat Hackers Blue Hat Hackers (Sarangam, 2020) This Photo by Unknown Author is licensed under CC BY-NCND

Key vulnerabilities ethical hackers look for Injection attacks Changes in security settings Exposure of sensitive data Breach in authentication protocols Components used in the system or network that may be used as access points (Simplilearn, 2021) This Photo by Unknown Author is licensed under CC BY

Common tools most ethical hackers use and the steps taken to secure a system? John the Ripper Metasploit Nmap Wireshark OpenVAS IronWASP Nikto SQLMap SQLNinja Maltego Burp Suite NetStumbler AirCrack-ng Ettercap Canvas This Photo by Unknown Author is licensed under CC BY (Team, 2021)

Conclusion This Photo by Unknown Author is licensed under CC BY-SA

References Hollister, S. (2021, April 13). The FBI is remotely hacking hundreds of computers to protect them from Hafnium. Retrieved from www.theverge.com: j-hafnium-remote-accessremoval-hack Mark Ciampa, P. (2014). Malware & Social Engineering Attacks; Application & networking-Based Attacks. In P. Mark Ciampa, & Fifth (Ed.), CompTIA: Security Guide To Network Security Fundementals (pp. 49-121). Boston, Massachusetts: Cengage Learning. Sarangam, A. (2020, December 28). Different Types of Hackers: Black, White, and Gray Hat. Retrieved from www.jigsawacademy.om: /different-types-of-hackers-2/ Simplilearn. (2021, November 17). What is Ethical Hacking and Type of Ethical Hackers: Lesson 4. Retrieved from www.simplilearn.com: y-tutorial/what-is-ethical-hacking Team, S. (2021, August 2009). Top Ethical Hacking Tools Used By InfoSec Professionals. Retrieved from https://securitytrails.com: g-tools Zampanti, R. (2019, July 31). Hacking Into a Hacker’s Mind . Retrieved from www.esilo.com: mind/

what is ethical hacking?-what is hacking and it's intent?-what determines if a person is a hacker? - what is ethical hacking?-in what ways can hackers gain unauthorized access into system?-common tools used by malicious hackers-ethical hacking and how it plays a role in combating unauthorized access by malicious hackers?

Related Documents:

Hacking Concepts 1.10 What is Hacking? 1.11Who is a Hacker? 1.12 Hacker Classes 1.13 Hacking Phases o Reconnaissance o Scanning o Gaining Access o Maintaining Access o Clearing Tracks Ethical Hacking Concepts 1.14 What is Ethical Hacking? 1.15 Why Ethical Hacking is Necessary 1.16 Scope and Limitations of Ethical Hacking

private sectors is ethical hacking. Hacking and Ethical Hacking Ethical hacking can be conceptualized through three disciplinary perspectives: ethical, technical, and management. First, from a broad sociocultural perspective, ethical hacking can be understood on ethical terms, by the intentions of hackers. In a broad brush, ethical

Benefits of Ethical Hacking Topic 1: Ethical Hacking Discuss the main benefits and risks of ethical hacking. Provide examples and/or details to support your ideas. If you have seen examples of ethical hacking, please share thes

to as “ethical hacking”—hacking for an ethical reason—whereby it will be argued that law and policy ought not to be the same here as for those hacking activities that are purely for economic gain or to cause harm or mischief. As will be seen, I have grouped ethical hacking int

Why Ethical Hacking is Necessary Ethical Hacker needs to think like malicious Hacker. Ethical hacking is necessary to defend against malicious hackers attempts, by anticipating methods they can use to break into a system. To fight against cyber crimes. To protect information from getting into wrong hands.

Definition: Ethical Hacking Hacking - Manipulating things to do stuff beyond or contrary to what was intended by the designer or implementer. Ethical Hacking - Using hacking and attack techniques to find and exploit vulnerabilities for the purpose of improving security with the following: Permission of the owners

Ethical Hacking Foundation Exam Syllabus 8 Literature A Georgia Weidman - Penetration testing, A Hands-On Introduction to Hacking San Francisco, ISBN:978-1-59327-564-8 B Article EXIN Ethical Hacking Foundation. Free download at www.exin.com Optional C D E Stuart McClure, Joel Scambray, George Kurtz - Hacking Exposed 7: Network

273 pages Literary Criticism: An Introduction to Theory and Practice 0138974225, 9780138974220 F and S Index International 2005 Subscription , Gale Group, 2005, Business & Economics, . F& S Indexes offer you a handy compilation of company, product and industry information from financial publications, business-oriented newspapers, trade magazines and special The analysis of time series data has .