25

Ethical Hacking

Embed Size (px)

DESCRIPTION

This will share little bit knowledge about hacking to you...!

Citation preview

Page 1: Ethical Hacking
Page 2: Ethical Hacking

Hacking

Group Members

Adnan Mansha

Adeel Aftab Ali Raza Bhatti

Page 3: Ethical Hacking

Contents HackingTypes of Hackers

Ethical Hacking

Case StudyBackground

Own motivation Investigation

Palenties

Conclusion

Cracking

Page 4: Ethical Hacking

Hacking

Hacking is the gaining of access(wanted or unwanted) to a computer and viewing, copying, or creating data without the intention of destroying data or harming the computer.

Hacker

Hacker is programmer who breaks into computer systems in order to steal or change information

Page 5: Ethical Hacking

Cracking

Process in which a person who gains unauthorized access to a computer with the intention of causing damage.

Cracker

Cracker is a programmer who cracks (gains unauthorized access to) computers, typically to do malicious things ."crackers are often mistakenly called hackers"

Page 6: Ethical Hacking

Types of Hackers

White Hat Hackers

Black Hat Hackers

Grey Hat Hackers

Page 7: Ethical Hacking

ETHICAL HACKING A LICENCE TO HACK

Ethical hacking is the term that describes hacking performed to help a company or individual and identify potential threats on the computer or network.

Page 8: Ethical Hacking

Ethical Hacker

Ethical hacker Refers to a person who apply hacking skills for defensive purposes

“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” The Art of War

Page 9: Ethical Hacking

Ethical Hacking is Legal, so ethical hacker should have to follow rules

Rules for Ethical Hacker

Hacker should have permission to probe the network and attempt to identify potential security risks.

Hacker should respect the individual's or company's privacy and only go looking for security issues.

Hacker should let the company know of any security vulnerabilities you locate in their software or hardware if not already known by the company.

Page 10: Ethical Hacking

Need of Ethical Hacking

Ethical hacking is necessary to protect against an attack, understanding where the systems are vulnerable is necessary.

Ethical hacking helps companies first understand their risk and then, manage them. Ethical hacking can be one of the most effective ways to fix security Problems

Page 11: Ethical Hacking

Case Study

AAPT -- HACKING

AAPT- Australian Associated Press Telecommunications

Page 12: Ethical Hacking

Background

This case involved AAPT's company data (including customers' personal information) being accessed and stolen by Anonymous, an international network of "hackers“ between 17 and 19 July 2012.

Anonymous subsequently published the data on the internet.

The data was held on a server managed by WebCentral Pty Ltd, a web-hosting business unit of Melbourne IT.

Page 13: Ethical Hacking

Under the contract between AAPT and WebCentral, WebCentral was required to fully manage and maintain the server, except for the custom application content and data, which was the responsibility of AAPT.

Anonymous accessed the data though the application (Cold Fusion) installed on the server, which was a "customer-managed application" and was AAPT's responsibility under the contract.

AAPT was using an old version of Cold Fusion, which was known to have vulnerabilities.

Page 14: Ethical Hacking

When Melbourne IT (Australian domain name registration Service ) became aware of the attack , it notified AAPT, which immediately disconnected from the network and took steps to ensure the data could not be further compromised.

Page 15: Ethical Hacking

Own motion investigation

Agencies didn’t get any Complaint about this act, so they started Own Motion Investigation

Page 16: Ethical Hacking

Results of Inverstigation

The Commissioner found AAPT failed to take reasonable steps to secure the personal information.

the Commissioner examined the Cold Fusion application to determine whether it was suitable in the circumstances.

The Commissioner noted that AAPT used a seven year-old version of Cold Fusion, which was known to have vulnerabilities.

Page 17: Ethical Hacking

Cont...... Results of Inverstigation

While the security "patches" on the version used by AAPT were upto-date, the failure to use newer versions of the application that did not have the vulnerabilities of the older version, meant that AAPT had not taken reasonable steps to protect the information.

The Commissioner noted that it was unclear whether AAPT was aware of what personal information was on the server, what Cold Fusion applications were installed and the parts of the server they related to or who was responsible for the maintenance and management of the application.

Page 18: Ethical Hacking

Cont...... Results of Inverstigation

The Commissioner identified several deficiencies in the security of data provisions in the contract between AAPT and WebCentral including:data was not assessed to determine whether it included personal information and its sensitivityexisting or emerging security risks were not required to be identified and addressed.vulnerability scanning and the effectiveness of the Cold Fusion application was not required to be undertaken.

Page 19: Ethical Hacking

Cont...... Results of Inverstigation

The Commissioner identified several deficiencies in the security of data provisions in the contract between AAPT and WebCentral including:data was not assessed to determine whether it included personal information and its sensitivityexisting or emerging security risks were not required to be identified and addressed.vulnerability scanning and the effectiveness of the Cold Fusion application was not required to be undertaken.

Page 20: Ethical Hacking

Ethical Issues

The Computer Fraud and Abuse Act of 1986 made it illegal to access a computer without authorization and steal private information or financial information.

It is responsibility of an orgranization to protect the private information of it’s user.

AAPT failed to protect the users personal information.

Page 21: Ethical Hacking

Penalties

The Commissioner recommended AAPT:Take steps to ensure all IT applications held internally or externally, which hold or use personal information, are subject to vulnerability assessment and testing and regular vulnerability scanning.

conduct regular audits of AAPT's IT security framework to ensure security measures are working effectively, and that policies and procedures relating to data security are being complied with.

Page 22: Ethical Hacking

Cont... Penalties

Undertake steps to ensure appropriate classification of data it holds either internally or externally, including whether it includes personal information and the sensitivity of that information. Review the terms of the contracts it has with IT suppliers that hold or manage AAPT data to ensure clarity around which party has responsibility for identifying and addressing data security issues (such as vulnerabilities associated with old versions of IT applications).As the case involved breaches of NPPs, the Commissioner was unable to impose a penalty on AAPT.

Page 23: Ethical Hacking

NPP2.1

An organisation may only use or disclose personal information for the primary purpose of collection under NPP2.1. As the publication of the data was not for the primary purpose of the collection, the Commissioner examined whether the publication amounted to disclosure by AAPT.

As the data was made public through the malicious actions of Anonymous, the Commissioner found that the publication was not a disclosure by AAPT.

Page 24: Ethical Hacking

Conclusion

If a hacker wants to get inside your system, he/she will, and there is nothing you can do about it. The only thing you can do is make it harder for him to get in.

Always upgrade your system or softwares regularly.

Page 25: Ethical Hacking