Ethical Hacking: BY Name: B Kameswara Rao PHNO:9640319768
Ethical Hacking: BY Name: B Kameswara Rao PHNO:9640319768
BY
This paper describes brief introduction about ethical hacking : their skills, their expertise , their attitudes, and
how to protect our self.
the less talented, or less careful, intruders would
accidentally bring down a system or damage its files,
and the system administrators would have to restart it
Introduction: or make repairs. Instead of using the more accurate
term of “computer criminal,” the media began using
The term “hacker” has a dual usage in the computer
the term “hacker”. Since calling someone a “hacker”
industry today. Originally, the term was defined as:
was originally meant as a compliment, computer
security professionals prefer to use the term “cracker”
HACKER:
or “intruder” for those hackers who turn to the dark
1. A person who enjoys learning the details of side of hacking. For clarity, we will use the explicit
computer systems and how to stretch their capabilities terms “ethical hacker” and “criminal hacker” for the
—as opposed to most users of computers, who prefer rest of this paper.
to learn only the minimum amount necessary. 2. One
who programs enthusiastically or who enjoys Levy's Principles: First and foremost to “Levy's
programming rather than just theorizing about principles is the concept of the hacker ethic and the
programming. popularization of them to popular culture”. In the words
of Levy himself, the principles dictate;
There are those, however, who challenge
the idea that information should be secure (in most 1. Access to computers—and anything which
instances), or who argue that networks that are might teach you something about the
insecure ought to be attacked, in some sense, in the way the world works—should be unlimited and total.
interest of some greater good. Although the term 2. Always yield to the Hands-on Imperative!
'ethical hackers' means different things to different 3. All information should be free.
people, one might apply it to this group. We have 4. Mistrust authority—promote decentralization.
many different hackers like True hackers, Hardware 5. Hackers should be judged by their hacking,
hackers , game hackers and so on. not bogus criteria such as degrees, age,
race or position.
Initially these computer intrusions were 6. You can create art and beauty on a computer.
fairly benign, with the most damage being the theft of 7. Computers can change your life for the better
computer time. Other times, these recreations would
take the form of practical jokes. However, these In summary, the hacker ethic deals with
intrusions did not stay benign for long. Occasionally the idea that individuals are performing a duty for the
common good, an analogy to a modern day 'Robin that varies from credit card numbers to social security
Hood'. The hacker community as a result are prided numbers and home addresses.
on the fact that they are the rebellion against authority
In their search for a way to approach the
figures that restrict this level of computer freedom.
problem, organizations came to realize that one of the
Hackers are only judged by their ability as opposed to
best ways to evaluate the intruder threat to their
the various systems in places that currently dictate
interests would be to have independent computer
authority, such as schools and universities. Mostly the
security professionals attempt to break into their
hacker ethic idealizes the notion of hacking being an
computer systems. In the case of computer security,
art-form, something revered as opposed to disputed
these “tiger teams” or “ethical hackers” would employ
and frowned upon. Popularized by 'phreakers' in the
the same tools and techniques as the intruders, but they
1970s and 80s, this is something that is not only
would neither damage the target systems nor steal
evident, but also widespread among the growing
information. Instead, they would evaluate the target
community. As Manuel Castells, another lecturer
systems' security and report back to the owners with the
involved in the field of computing, it is something
vulnerabilities they found and instructions for how to
that reflects not only on this community, but also of
remedy them.
the wider social, political and financial world. In a
sense, “hacking is something that should affect
This method of evaluating the security of a
everyone”, but it is whether or not the interpretation
system has been in use from the early days of
that is given to hackers by Steven Levy compared
computers. In one early ethical hack, the United States
with negative stereotypes of the media that dictate
Air Force conducted a “security evaluation” of the
this perception
Multics operating systems for “potential use as a two-
About ethical hacking: level (secret/top secret) system.” Their evaluation found
With the growth of the Internet, that while Multics was “significantly better than other
computer security has become a major concern for conventional systems,” it also had “… vulnerabilities in
businesses and governments. They want to be able to hardware security, software security, and procedural
take advantage of the Internet for electronic security” that could be uncovered with “a relatively low
commerce, advertising, information distribution and level of effort.” They performed tests that were simple
access, and other pursuits, but they are worried about information-gathering exercises, as well as other tests
the possibility of being “hacked.” At the same time, that were outright attacks upon the system that might
the potential customers of these services are worried damage its integrity. Clearly, their audience wanted to
about maintaining control of personal information know both results. The tool did not tell the user how the
vulnerability might be exploited, because there would hardware vendors. These systems management skills
be no useful point in doing so. are necessary for the actual vulnerability testing, but are
equally important when preparing the report for the
Who are ethical hackers? client after the test.
Figure 3
The Certified Ethical Hacker (CEH) : blocking any unauthorised packets. Any other packets
are passed on to the computer they are intended for.
Certification is a professional This kind of firewall is called a corporate firewall.
The kind of firewall you may be more familiar with is
a personal firewall- this is a program that runs on your
computer, and blocks any unauthorised incoming
certification provided by the
packets. Personally, I use ZoneAlarm. The great thing
International Council of E-Commerce Consultants.
about ZoneAlarm is that it is easy to configure. Also,
The definition of an Ethical Hacker is very similar to
it only allows chosen programs to access the Internet-
a Penetration Tester. The Ethical Hacker is an
allowing you to block hackers that use standard
individual who is usually employed with the
protocols such as FTP. In case of emergency, it also
organization and who can be trusted to undertake an
has an emergency stop button, which allows you to
attempt to penetrate networks and/or computer
block allfree by private individuals and charities.
systems using the same methods as a Hacker. Illegal
Businesses, governments, and educational institutions
hacking (i.e.; cracking computer systems) is a felony
can download ZoneAlarm on the basis of a 60-day
in the United States and most other countries. But
free trial. See ZoneLab's website for more
when this type of hacking is done by request and
information. access to the Internet immediately.
under a contract between an Ethical Hacker and an
ZoneAlarm can be downloaded and used for
organization, it is legal. The most important point is
Remember that although a firewall stops hackers from automatically, protect your corporations vital assets,
getting in, it will not remove any existing 'backdoor' by making Web application security a top priority.
software from your machine. For this, you need a
good anti-virus product like Norton or Sophos. Also Bibliography:
make sure that you use your anti-virus software
1. Beaver, Kevin, CISSP (2003). Ethical hacking: Ten
regularly, and that you keep it up-to-date.
crucial lessons. Retrieved on June
21, 2006 . http://searchsecurity.techtarget.com.
Conclusion:
2. Bernard, Allen (January, 2004). The Pros & Cons
Even for those who do not count of ethical hacking. Retrieved on June 25, 2006.
themselves among the ranks of the ethical hackers, it http://www.cioupdate.com.
is important to be aware that security often does come
3. Brandt, Andrew (2003). Class on virus creation
at the expense of openness, convenience and
Draws Industry Ire. Retrieved on July 15, 2006.
efficiency. University systems are acutely aware of
http://www.pcworld.com/resource/printable/article.
this (as are hackers), and in keeping with general
commitments to openness and the free exchange of
4. Clarkson, Logan (2006). Teaching Students to
ideas, have much less secure systems. Information
hack: Curriculum issues in Information Security,
technology security is often the challenge of
ACM Library. Informit Network (2006). Ethics,
balancing the demands of users with the need for data
hacking and religion. Retrieved on July 1, 2006 .
confidentiality and integrity.
5. Palmer, Charles (April, 2001). Ethical Hacking.
Fortunately, automated tools are
Retrieved on June,20,2006 from
available to transcend human error and perform
http://www.research.ibm.com
automatic vulnerability assessment on web
applications by attempting every possible hacker 6. Mitnick,Kevinhttp://www.theregister.co.uk..
attack and reporting the success of the attack and
severity of the vulnerability. With Carnegie Mellon’s 7.
9.
HackersandPainters,PaulGrahamhttp://www.paulgraham.
com/hp.htm