Unformatted text preview:

II TYPE OF ETHICAL HACKERS Hackers can be divided into three groups White Hats Good Black Hats Bad guys Gray Hats Good or bad hacker depends on the situation hackers include malicious hackers include ethical guys Special Issue 2016 International Journal of Engineering Research Technology IJERT ISSN 2278 0181 NSDMCC 2015 Conference Proceedings Ethical Hacking Vinitha K P Computer Department Ansar women s college Perumpilavu Thrissur Abstract The explosive growth of the Internet has brought many good things such as E commerce banking E mail Cloud computing but there is also a Dark side such as Hacking Backdoors etc Hacking is the first big problem faced by Governments companies and private citizens around the world Hacking includes reading others e mail steal their credit card number from an on line shopping site secretly transmitting secrets to the open Internet An Ethical Hacker can help the people who are suffered by this Hackings This Paper Describes about Ethical Hackers Their Skills Their Attitudes and How They Go About Helping TheirCustomers Find and Plug up Security Holes I INTRODUCTION Ethical Hacking can be defined as a legal access of an Internet geek or group in any organization s online property after their official permission An Ethical Hacker can help the people who are suffered by this Hackings Ethical Hacking can be defined as a legal access of an Internet geek or group in any organization s online property after their official permission A good hacker or security professional acting as an ethical hacker just has to understand how a computer system works and know what tools to employ in order to find a security weakness By learning the same skills and employing the software tools used by hackers you will be able to defend your computer networks and systems against malicious attacks Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers This information is then used by the organization to improve the system security in an effort to minimize or eliminate any potential attacks The work that ethical hackers do for organizations has helped improve system security and can be said to be quite effective and successful Individuals interested in becoming an ethical hacker can work towards a certification to become aCertified Ethical Hacker or CEH This certification is provided by the International Council of E Commerce Consultants EC Council Ethical hackers they should be completely trustworthy and strong programming and computer network skills They posses same skill mindset andtools of a hacker but the attacks are done in a non destructive manner to and locate weaknesses Ethical hackers usually fall into the white hat category but sometimes they re former gray hats who have become security professionals and who now use their skills in an ethical manner White Hats White hats are the good guys the ethical hackers who use their hacking skills for defensive purposes White hat hackers are usually security professionals with knowledge of hacking and the hacker toolset and who use this knowledge implement countermeasures White hat hackers are prime candidates for the exam White hats are those who hack with permission from the data owner It is critical to get permission prior to beginning any hacking activity This is what makes a security professional a white hat versus a malicious trusted Black Hats Black hats are the bad guys the malicious hackers or crackers who use their skills for illegal or malicious purposes They break into or otherwise violate the system integrity of remote systems with malicious intent Having gained unauthorized access black hat hackers destroy vital data deny legitimate users service and just cause problems for their targets Black hat hackers and crackers can easily be differentiated from white hat hackers because their actions are malicious This is the traditional definition of a hacker and what most people consider a hacker to be hacker cannot who be Gray Hats Gray hats are hackers who may work offensively or defensively depending on the situation This is the dividing line between hacker and cracker Gray hat hackers may just be interested in hacking tools and technologies and are not malicious black hats Gray hats are self proclaimed ethical hackers who are interested in hacker tools mostly from a curiosity standpoint They may want to highlight security problems in a system or educate victims so they secure their systems properly Volume 4 Issue 06 Published by www ijert org Special Issue 2016 International Journal of Engineering Research Technology IJERT ISSN 2278 0181 NSDMCC 2015 Conference Proceedings III SOME OF THE FAMOUS ETHICAL HACKERS Some of the famous Ethical hackers are Benild joseph Pranav Mistry Andrianlemo Black Hat Jonathan James Linus torvats white Hat Stephan woniak etc Benild Joseph the 20 years old world renowned Ethical Hacker Information Security Consultant Speaker Author in Indian IT Industry was born in Calicut A City of Kerala Currently acting as the Chief Executive Officer of Th3 art of h ckin9 International IT Security Project He has his credit to many registered and pending patents in cyber forensic and information security domain He specializes in Web Application security Penetration testing and Forensic investigation His research interests include Forensic Computer Virtualization Web Application Vulnerability and Information Security Security Networking Data Pranav Mistry is a research assistant and a PhD candidate at MIT Media Lab Sixth Sense has recently attracted global attention Among some of his previous work Pranav has invented Mouse less an invisible computer mouse intelligent sticky notes that can be searched located and can send reminders and messages a pen that can draw in 3D and a public map that can act as Google of physical world Pranav has commercialized his invention the sixth sense and Sixth Sense is now being actively used at NASA It is rumored that Facebook tried to acquire the technology from Pranav for a reportedly 2 billion and 5 ownership of Facebook but Pranav decided to open source it instead He is currently working with Samsung company presently IV PHASES OF HACKING Phase1 Reconnaissance Phase 2 Scanning Phase 3 Gaining Access Phase 4 Maintaining Access Phase 5


View Full Document

Anna GE 8151 - Ethical Hacking

Download Ethical Hacking
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Ethical Hacking and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Ethical Hacking 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?