Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Ethical Hacking

Ethical Hacking

Ratings: (0)|Views: 281|Likes:
Published by priya_sekar53

More info:

Published by: priya_sekar53 on Sep 10, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

09/10/2011

pdf

text

original

 
ETHICAL HACKING
“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” 
ABSTRACT:
The explosive growth of theInternet has brought many good things:electronic commerce, easy access to vaststores of reference material, collaborativecomputing, e-mail, and new avenues foradvertising and information distribution.As with most technological advances,there is also a dark side- criminalhackers. Governments, companies, andprivate citizens around the world areanxious to be a part of this revolution, butthey are afraid that some hacker willbreak into their Web server and replacetheir logo with pornography, read theire-mail, steal their credit card numberfrom an on-line shopping site, or implantsoftware that will secretly transmit theirorganization's secrets to the openinternet. With these concerns and others,the ethical hacker can help. This paperdescribes ethical hackers: their skills,their attitudes, and how they go abouthelping their customers find and plug upsecurity holes.
CONTENT:
INTRODUCTION
ETHICAL HACKING
 
WHY-ETHICAL HACKING
PENETRATION TESTING
BENEFITS
STEPS INVOLVED INPENETRATION TESTING
ADVANTAGES
CONCLUSION
INTRODUCTION:
Unauthorized computerintrusions are considered illegal in all butthe most desperate of circumstances.Once hacking ability is used to commit acrime the hacker becomes a criminal.Criminal hackers or “crackers” gainunauthorized access primarily to seefinancial gain but recently othermotivations of crackers have beencategorized such as seeking to subvertsystems, doing damage to systems(vandalism), promoting political causes(hactivism), and acting as an agent of aforeign state (cyber terrorism andinformation warfare). The misapplicationof the term cracker to a law-abidinghacker is due to celebrated incidents of unauthorized intrusions into computersystems that have incorrectly beenattributed to backers due to the extensiveprogrammingskill needed to achievesuccess.When “ethical” is placed in front of theterm hacking it denotes moral activity,Unethical hacking has no permission tointrude on systems.Ethical hacking includespermission to intrude such as contractedconsulting services, hacking contests, andbeta testing. If there is no permission tointrude, ethical hackers still find ad hocways to become aware of the systemsecurity of other systems. The end goal of ethical hackers is to learn systemvulnerabilities
 so
that they can berepaired for community self-interest - andas a side-product also the common good.Networked systems are dependent uponeach other for system security soawareness of the security of machineswithin one’s community-of-interest is notentirely altruistic but rather concernedwith system security.
HACKERS
:Hacker refers to a personwho enjoys learning the details ocomputer systems and stretch theircapabilities.
HACKING:
Hacking describes the rapiddevelopment of new programs or reverseengineering of already existing softwareto make the code better and efficient.
ETHICAL HACKING:
 
An ethical hacker is acomputer and network expert whoattacks a security system on behalf of itsowners, seeking vulnerabilities that amalicious hackercould exploit. Ethical hacking is also known as
 penetration testing 
,
intrusion testing 
 and
red teaming 
. An ethical hacker issometimes called awhite hat,a term that comes from old Western movies, wherethe "good guy" were a white hat and the"bad guy" were a black hat.
WHY- ETHICAL HACKING:
Protection from possible externalAttacksFig :1.Types of attacks.
DENIAL OF SERVICE:
An attack with which an attackerrenders a system unusable orsignificantly slow down the system.Methods include:
Flood a network.
Bandwidth/Throughput attacks
Protocol attacks.
Software Vulnerability attacks.
Disrupt connections between twomachines.
Prevent a particular individualfrom accessing a service.
SOCIAL ENGINEERING:
It is an art of using influence andpersuasion to deceive people for thepurpose of obtaining information or toperform some action. Even with allfirewalls, authentication processes, VPN,companies are still wide open to attacks.Humans are the weakest link in thesecurity chain. It is the hardest form of attack to defend against.
What does an ethical hacker do?
An ethical hacker's evaluation of asystem's security seeks answers to threebasic questions:1.What can an intruder see on thetarget systems?2. What can an intruder do withthat information?3. Does anyone at the target noticethe intruder's attempts orsuccesses?
Viruses,Trojan Horses,and WormsSocialEngineeringAutomatedAttacksAccidentalBreaches inSecurityDenial of Service(DoS)OrganizationalAttacks
 
RestrictedData

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->