Ethical Hacking
ex-iskon-pleme :: Lifestyle :: IT
Page 1 of 1
Ethical Hacking
Ethical hacking
Ethical hacking and ethical hacker are terms that describe hacking performed to help a company or individual identify potential threats on the computer or network. An ethical hacker attempts to hack their way past the system security, finding any weak points in the security that could be exploited by other hackers. The organization uses what the ethical hacker finds to improve the system security, in an effort to minimize, if not eliminate, any potential hacker attacks.
In order for hacking to be deemed ethical, the hacker must obey the below rules.
The term "ethical hacker" has received criticism at times from people who say that there is no such thing as an "ethical" hacker. Hacking is hacking, no matter how you look at it and those who do the hacking are commonly referred to as computer criminals. However, the work that ethical hackers do for organizations has helped improve system security and can be said to be quite successful. Individuals interested in becoming an ethical hacker can work towards a certification to become a Certified Ethical Hacker or CEH. This certification is provided by the International Council of E-Commerce Consultants (EC-Council). The exam itself costs about $500 to take and consists of 125 multiple-choice questions in version 8 of the test (version 7 consisted of 150 multiple-choice questions).
http://www.computerhope.com/jargon/e/ethihack.htm
Ethical hacking and ethical hacker are terms that describe hacking performed to help a company or individual identify potential threats on the computer or network. An ethical hacker attempts to hack their way past the system security, finding any weak points in the security that could be exploited by other hackers. The organization uses what the ethical hacker finds to improve the system security, in an effort to minimize, if not eliminate, any potential hacker attacks.
In order for hacking to be deemed ethical, the hacker must obey the below rules.
- You have permission to probe the network and attempt to identify potential security risks. It is recommended that if you are the person performing the tests that you get written consent.
- You respect the individual's or company's privacy and only go looking for security issues.
- You report all security vulnerabilities you detect to the company, not leaving anything open for you or someone else to come in at a later time.
- You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware if not already known by the company.
The term "ethical hacker" has received criticism at times from people who say that there is no such thing as an "ethical" hacker. Hacking is hacking, no matter how you look at it and those who do the hacking are commonly referred to as computer criminals. However, the work that ethical hackers do for organizations has helped improve system security and can be said to be quite successful. Individuals interested in becoming an ethical hacker can work towards a certification to become a Certified Ethical Hacker or CEH. This certification is provided by the International Council of E-Commerce Consultants (EC-Council). The exam itself costs about $500 to take and consists of 125 multiple-choice questions in version 8 of the test (version 7 consisted of 150 multiple-choice questions).
http://www.computerhope.com/jargon/e/ethihack.htm
Trinity-
Posts : 12923
2014-04-17
Re: Ethical Hacking
[ltr]Core Rules and Concepts of Ethical Hacking[/ltr]
[ltr]Watch these Ethical Hacking videos, and you’ll understand skills like buffer overflow, network sniffing, password cracking, and more. Know the techniques of ethical hacking and you’ll learn security tactics through the mind of an attacker.[/ltr]
[ltr]
[/ltr]
[ltr]Transcription[/ltr]
[ltr]First off, we must define the concept of ethical hacking. Ethical hacking, at its core, is using the techniques and tools, approaches and attacks that an attacker would use to identify vulnerabilities, document the vulnerabilities and plan remediation. Many times, folks that aren’t as familiar with security penetration tests or security analysis just assume that all security experts, especially IT security experts, are the same and that they use the same techniques and the same tools. They assume an auditor is the same as an analyst. They assume an ethical hacker uses the same tools as those folks as well and that’s simply not the case.[/ltr]
[ltr]The Difference Between Ethical and Unethical Hacking[/ltr]
[ltr]Ethical hacking is different in this core function in that it uses the exact same methodology and the exact same tools that a hacker would use: someone, frequently outside the company and out of control of the company, to actually understand the network, penetrate, compromise.[/ltr]
[ltr]They do it in a way that’s ethical, meaning that they document this, they record the steps, the breaches and the parameters that they’ve used. Later on, analysts and auditors can come and look at those results and determine what things may need to be done in the future to help prevent similar attacks, but from an unethical hacker down the road.[/ltr]
[ltr]This is a key difference. This key approach difference is really what separates this from anything else out there.[/ltr]
[ltr]Rules and Guidelines[/ltr]
[ltr]When we talk about ethical hacking, as well, one thing to remember is that ethical hackers follow specific rules and guidelines. These are really important.[/ltr]
[ltr]Do No Harm[/ltr]
[ltr]The core rule of ethical hacking, first and foremost, is do no harm. Do not destroy assets, wreck networks, deny service and actually affect real use of systems and do not lock people out in a way that’s not part of the plan.[/ltr]
[ltr]Doing no harm is really the big distinction between a cracker and an ethical hacker. A cracker or a true attacker, may want to do harm as part of their attack, whether it’s compromise sensitive data, deny service to legitimate users, destroy assets and so forth.Ethical hacking differs there in that, typically, there’s no destruction and no harm done.[/ltr]
[ltr]Understanding Boundaries[/ltr]
[ltr]Ethical hacking is also really rooted in boundaries, understanding what systems can and cannot be attacked. For example, an online database that’s critical to customer data, or critical to transactions. That kind of database should never be attacked by an ethical hacker unless it’s part of the ethical hacker’s boundaries and that database is specifically included.[/ltr]
[ltr]Most businesses that are being run 24 hours, seven days, will not want an ethical hacker to approach any critical business systems because it could simply impact business. Understanding what those boundaries are up front and then honoring those boundaries is absolutely critical.[/ltr]
[ltr]Counter measures are not part of the ethical hacking process. As you’re examining networks and foot printing and determining vulnerabilities and installing compromises, that process doesn’t include at every stage, well, I wonder how I would defend against this. That’s not part of ethical hacking.[/ltr]
[ltr]Documentation[/ltr]
[ltr]Ethical hacking is getting in, finding the vulnerabilities and certainly documenting as you go. Counter measures are usually considered only after an entire ethical hacking process is complete. After you’re successful, you’ve compromised vulnerabilities and actually owned the network, so to speak, you worry about, “I wonder how this company, my company, any company could protect against this.” That’s when that research happens.
Sometimes it’s a natural outcropping of the attack itself, and that’s great. Document that but do not focus on counter measures during ethical hacking.[/ltr]
[ltr]All of this should be in written agreement with whoever is the subject of this ethical hacking process. If you’re a consultant, and you’ve been brought in to determine vulnerabilities and risk exposure for our company, getting agreement on, what the critical systems, boundaries, targets and areas of concern are is really important.[/ltr]
[ltr]It has to be done in advance. It can’t be done during the process. You can’t stumble across customer database number 72 and raise your hand and ask, “Is it OK if I hack this database?” That’s not the proper approach to ethical hacking.[/ltr]
[ltr]Ethical hacking understands these systems are off limits. Those systems are inbounds, these systems are the systems that we’re most concerned about, or the data over here is the data we’re most concerned about.
Therefore, documentation is absolutely critical. I recommend that you thoroughly document every step, process and keystroke you make. Frequently use things like Camtasia to record video or get screenshots. Have a notebook where you jot down notes as you’re doing things: commands you run, data you get, and so forth.[/ltr]
[ltr]Saving all of that in a special place on your hard drive or on the network and having a nice backup of it is absolutely crucial as well, both to insure that you capture every part of the attack, all of the compromises, success and failure and so forth, and also, for personal liability reasons: to insure that you show exactly what you did do and exactly what you did not do.[/ltr]
[ltr]http://blog.pluralsight.com/videos/ethical-hacking-rules-and-guidelines
[/ltr]
[ltr]Watch these Ethical Hacking videos, and you’ll understand skills like buffer overflow, network sniffing, password cracking, and more. Know the techniques of ethical hacking and you’ll learn security tactics through the mind of an attacker.[/ltr]
[ltr]
[/ltr]
[ltr]Transcription[/ltr]
[ltr]First off, we must define the concept of ethical hacking. Ethical hacking, at its core, is using the techniques and tools, approaches and attacks that an attacker would use to identify vulnerabilities, document the vulnerabilities and plan remediation. Many times, folks that aren’t as familiar with security penetration tests or security analysis just assume that all security experts, especially IT security experts, are the same and that they use the same techniques and the same tools. They assume an auditor is the same as an analyst. They assume an ethical hacker uses the same tools as those folks as well and that’s simply not the case.[/ltr]
[ltr]The Difference Between Ethical and Unethical Hacking[/ltr]
[ltr]Ethical hacking is different in this core function in that it uses the exact same methodology and the exact same tools that a hacker would use: someone, frequently outside the company and out of control of the company, to actually understand the network, penetrate, compromise.[/ltr]
[ltr]They do it in a way that’s ethical, meaning that they document this, they record the steps, the breaches and the parameters that they’ve used. Later on, analysts and auditors can come and look at those results and determine what things may need to be done in the future to help prevent similar attacks, but from an unethical hacker down the road.[/ltr]
[ltr]This is a key difference. This key approach difference is really what separates this from anything else out there.[/ltr]
[ltr]Rules and Guidelines[/ltr]
[ltr]When we talk about ethical hacking, as well, one thing to remember is that ethical hackers follow specific rules and guidelines. These are really important.[/ltr]
[ltr]Do No Harm[/ltr]
[ltr]The core rule of ethical hacking, first and foremost, is do no harm. Do not destroy assets, wreck networks, deny service and actually affect real use of systems and do not lock people out in a way that’s not part of the plan.[/ltr]
[ltr]Doing no harm is really the big distinction between a cracker and an ethical hacker. A cracker or a true attacker, may want to do harm as part of their attack, whether it’s compromise sensitive data, deny service to legitimate users, destroy assets and so forth.Ethical hacking differs there in that, typically, there’s no destruction and no harm done.[/ltr]
[ltr]Understanding Boundaries[/ltr]
[ltr]Ethical hacking is also really rooted in boundaries, understanding what systems can and cannot be attacked. For example, an online database that’s critical to customer data, or critical to transactions. That kind of database should never be attacked by an ethical hacker unless it’s part of the ethical hacker’s boundaries and that database is specifically included.[/ltr]
[ltr]Most businesses that are being run 24 hours, seven days, will not want an ethical hacker to approach any critical business systems because it could simply impact business. Understanding what those boundaries are up front and then honoring those boundaries is absolutely critical.[/ltr]
[ltr]Counter measures are not part of the ethical hacking process. As you’re examining networks and foot printing and determining vulnerabilities and installing compromises, that process doesn’t include at every stage, well, I wonder how I would defend against this. That’s not part of ethical hacking.[/ltr]
[ltr]Documentation[/ltr]
[ltr]Ethical hacking is getting in, finding the vulnerabilities and certainly documenting as you go. Counter measures are usually considered only after an entire ethical hacking process is complete. After you’re successful, you’ve compromised vulnerabilities and actually owned the network, so to speak, you worry about, “I wonder how this company, my company, any company could protect against this.” That’s when that research happens.
Sometimes it’s a natural outcropping of the attack itself, and that’s great. Document that but do not focus on counter measures during ethical hacking.[/ltr]
[ltr]All of this should be in written agreement with whoever is the subject of this ethical hacking process. If you’re a consultant, and you’ve been brought in to determine vulnerabilities and risk exposure for our company, getting agreement on, what the critical systems, boundaries, targets and areas of concern are is really important.[/ltr]
[ltr]It has to be done in advance. It can’t be done during the process. You can’t stumble across customer database number 72 and raise your hand and ask, “Is it OK if I hack this database?” That’s not the proper approach to ethical hacking.[/ltr]
[ltr]Ethical hacking understands these systems are off limits. Those systems are inbounds, these systems are the systems that we’re most concerned about, or the data over here is the data we’re most concerned about.
Therefore, documentation is absolutely critical. I recommend that you thoroughly document every step, process and keystroke you make. Frequently use things like Camtasia to record video or get screenshots. Have a notebook where you jot down notes as you’re doing things: commands you run, data you get, and so forth.[/ltr]
[ltr]Saving all of that in a special place on your hard drive or on the network and having a nice backup of it is absolutely crucial as well, both to insure that you capture every part of the attack, all of the compromises, success and failure and so forth, and also, for personal liability reasons: to insure that you show exactly what you did do and exactly what you did not do.[/ltr]
[ltr]http://blog.pluralsight.com/videos/ethical-hacking-rules-and-guidelines
[/ltr]
Trinity-
Posts : 12923
2014-04-17
Re: Ethical Hacking
Pa čim se spomene hakiranje , odmah zvuči negativno...Etički hakeri moraju razmišljati kao bad guys i predvidjeti što bi sve ovima moglo pasti na pamet. Naravno, znanjem i vještinama biti barem na istom nivou kao bad hackers, poželjno na još višem. Kod školovanja moraju potpisati ugovor da stečena znanja i vještine neće upotrijebiti u protuzakonite svrhe. Evo, u ovom videu kažu da je to zanimanje budućnosti.
Trinity-
Posts : 12923
2014-04-17
Re: Ethical Hacking
mda..sjetih se tih Dobrica...poput onih koji rade Penetration testove...hajde,oke,podrzimo ih...
Guest- Guest
Re: Ethical Hacking
da, to su baš ti koji rade Web Application Penetration testove...
Trinity-
Posts : 12923
2014-04-17
Re: Ethical Hacking
Znaš da u Zagrebu postoji školovanje za Certificiranog Etičkog Hackera ( CEH) , traje 5 dana i košta 20 000, 00 kn?! Na sreću postoje i online kursevi, isto certificirani, od 50 $ na više...
Trinity-
Posts : 12923
2014-04-17
Re: Ethical Hacking
E sad,koliko je to priznato ..standardno se koristi Linux distra Blacktrack,no to su Kinezi preuzeli i razvili,ne znam kako se zove,uz Nmap standardni program..a ima i onaj Rus i onaj njegov program,ne mogu se sjetiti..
Guest- Guest
Re: Ethical Hacking
Algebra radi u suradnji i po programu EC- Councila (http://www.eccouncil.org/) koji je vodeći na tom području, valjda zato i košta toliko...
Trinity-
Posts : 12923
2014-04-17
Re: Ethical Hacking
Cujem Algebra,dupe mi se najezi...
Da idem na neki Certifikat,isao bih direktno u glavu,nikakvi lokalni grebatori love...Popljuvao love Algebri za husrani Excel,a poslije fino platio curi sa FER-a da me nauci...i to je to..
Da idem na neki Certifikat,isao bih direktno u glavu,nikakvi lokalni grebatori love...Popljuvao love Algebri za husrani Excel,a poslije fino platio curi sa FER-a da me nauci...i to je to..
Guest- Guest
Re: Ethical Hacking
Skupi su ko vrag, pa vidiš koliko ovo naplaćuju...zato ja preferiram sve što se može odraditi online...
Trinity-
Posts : 12923
2014-04-17
Re: Ethical Hacking
What is computer hacking?
In a cyber security world, the person who is able to discover weakness in a system and managed to exploit it to accomplish his goal referred as a Hacker , and the process is referred as Hacking.
Now a days, People started think that hacking is only hijacking Facebook accounts or defacing websites. Yes, it is also part of hacking field but it doesn't mean that it is the main part of hacking.
So what is exactly hacking, what should i do to become a hacker?! Don't worry, you will learn it from Break The Security. The main thing you need to become a hacker is self-interest. You should always ready to learn something and learn to create something new.
Now , let me explain about different kind of hackers exist in the cyber security world.
Script Kiddie
Script Kiddies are the persons who use tools , scripts, methods and programs created by real hackers. In a simple word, the one who doesn't know how a system works but still able to exploit it with previously available tools.
White Hat Hacker:
White Hat hackers are good guys who does the hacking for defensing. The main aim of a Whitehat hacker is to improve the security of a system by finding security flaws and fixing it. They work for an organization or individually to make the cyber space more secure.
Break The Security only concentrates on white-hat hacking and help you to learn the Ethical Hacking world.
Black Hat Hacker:
BlackHat hackers are really bad guys , cyber criminals , who have malicious intent. The hackers who steal money, infect systems with malware, etc are referred as BlackHat hackers. They use their hacking skills for illegal purposes.
GreyHat hackers:
The hackers who may work offensively or defensively, depending on the situation. Hackers who don't have malicious intentions but still like to break into third-party system for fun or just for showing the existence of vulnerability.
Hacktivists
The hackers who use their hacking skills for protesting against injustice and attack a target system and websites to bring the justice. One of the popular hacktivists is Anonymous and RedHack.
http://www.breakthesecurity.com/2010/11/introduction-to-hacking.html
In a cyber security world, the person who is able to discover weakness in a system and managed to exploit it to accomplish his goal referred as a Hacker , and the process is referred as Hacking.
Now a days, People started think that hacking is only hijacking Facebook accounts or defacing websites. Yes, it is also part of hacking field but it doesn't mean that it is the main part of hacking.
So what is exactly hacking, what should i do to become a hacker?! Don't worry, you will learn it from Break The Security. The main thing you need to become a hacker is self-interest. You should always ready to learn something and learn to create something new.
Now , let me explain about different kind of hackers exist in the cyber security world.
Script Kiddie
Script Kiddies are the persons who use tools , scripts, methods and programs created by real hackers. In a simple word, the one who doesn't know how a system works but still able to exploit it with previously available tools.
White Hat Hacker:
White Hat hackers are good guys who does the hacking for defensing. The main aim of a Whitehat hacker is to improve the security of a system by finding security flaws and fixing it. They work for an organization or individually to make the cyber space more secure.
Break The Security only concentrates on white-hat hacking and help you to learn the Ethical Hacking world.
Black Hat Hacker:
BlackHat hackers are really bad guys , cyber criminals , who have malicious intent. The hackers who steal money, infect systems with malware, etc are referred as BlackHat hackers. They use their hacking skills for illegal purposes.
GreyHat hackers:
The hackers who may work offensively or defensively, depending on the situation. Hackers who don't have malicious intentions but still like to break into third-party system for fun or just for showing the existence of vulnerability.
Hacktivists
The hackers who use their hacking skills for protesting against injustice and attack a target system and websites to bring the justice. One of the popular hacktivists is Anonymous and RedHack.
http://www.breakthesecurity.com/2010/11/introduction-to-hacking.html
Trinity-
Posts : 12923
2014-04-17
Re: Ethical Hacking
Dakle, Algebra radi po Ec-Councilovom programu i tečaj traje 5 dana i košta 20 000,00kn !Trinity wrote:Znaš da u Zagrebu postoji školovanje za Certificiranog Etičkog Hackera ( CEH) , traje 5 dana i košta 20 000, 00 kn?! Na sreću postoje i online kursevi, isto certificirani, od 50 $ na više...
Ako se ide direktno na http://www.eccouncil.org/Certification/certified-ethical-hacker i odebere opcija iLearn (jer je sjedište u USA), tečaj dođe $1899 . Etoc...
Trinity-
Posts : 12923
2014-04-17
Re: Ethical Hacking
Popular Hackforums Website Defaced by Egyptian Hacker
Hackforums - one of the popular hacking forum in the world - has been hacked and defaced by the famous Egyptian hacker with the online handle Eg-R1z.
HackForums is popular among both whitehats and blackhats. On one end of the spectrum, HackForums helps over 110,000 hacking community members to remove dangerous malware off of their computers, as well as promotes research and learning of various malwares.
But on the other end, it servers as a great platform for hackers and cyber thieves as well, who posts infected material in order to victimize others. The website is hosted in Europe on a server and expected to be earning an estimated $7,316 USD on a daily basis.
Last night, hackforums.net went dark with a defacement message that reads:
[size]"[403 Forbidden Error] - You might be blocked by your IP, Country, or ISP."
That's really nasty msg guys , don't u think so?!
Just sending greets from Egypt
i-Hmx , H3ll C0D3 , Egyptian.H4x0rZ
./Eg-R1z Cr3w
It is still unclear, how hacker managed to get into server and which type of vulnerability or weakness has been exploited. But, it seems that the hacker just exploited some flaw and defaced the website and then hosted the image on hacked server which was displayed on the defaced page.
Reason behind the defacement of the website is still unknown, but with the deface message, one can predict that the hacker is warning the HackForums admin about security.
The forum was unavailable for few hours last night, but at the time of writing, the site was back to its normal form, but site performance is still facing some issues. You can check the defacement mirror of the hack at Zone-h as a Proof of Hack.
It’s not first time HackForums website got hacked. In past, HackForums website was also hacked by various hackers with online handles imLulzPirate, b0x, SYRIAN-HACKER and KTN.
[/size]
[size]
The Hackers Conference 2014 — (August 30th, 2014 @ New Delhi, India)
We are organising 3rd Edition of "The Hackers Conference", where the best of minds in the Hacking world, leaders in Information Security Industry and Cyber community along with government representatives meet face-to-face to join their efforts to co-operate in addressing the most topical issues of the Cyber Security. [Join THC 2014][/size]
Trinity-
Posts : 12923
2014-04-17
ex-iskon-pleme :: Lifestyle :: IT
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum