"One machine can do the work of fifty ordinary men. No machine can do the work of one extraordinary man."
by--Elbert Hubbard (1856-1915), American author, "A Message to Garcia"
Internet technologies have revolutionized economies, business models and influenced the fundamental way business is done. E-Commerce has resulted in the evolution of new communication and delivery channels, created differentiated value chains and integrated enterprise applications.EC-Council certifications are designed to provide the foundation needed by every Electronic Commerce and Security Professional. EC-Council curriculum provides broad range of skills and knowledge needed to build and manage an organization's networking and security operations and to effectively utilize various resources to achieve operation excellence.
There are different levels of certifications under EC-Council:
IT Security Professional Certifications:
EC-Council Security Matrix:
Wednesday, June 25, 2008
Sunday, June 22, 2008
Types Of Ethical hacking
Types of Ethical hacking:
Ethical hacking ppt
viruses - most common form of attack
denial of service attacks
trojans (or trojan horses)
brute-force and social engineering password attacks
port scanning and spoofing
phishing
ransomware
Hacking Tools
Top hacking tools
Coldlife 4.0 DeCSS 1.2b
FPort 1.33
NMap Win 1.2.12
John the Ripper 1.6
PCHelps Network Tracer
TCPIP Protector Pro 7.18
IntelliTamper
Hacker tools are programs written to access a computer system using known software vulnerability. Most of these programs have been written and are freely distributed from “Hacker” websites. Some of these programs were written for legitimate uses and are abused as a hacking tool.
Coldlife 4.0
DeCSS 1.2b
FPort 1.33
NMap Win 1.2.12
John the Ripper 1.6
PCHelps Network Tracer
TCPIP Protector Pro 7.18
IntelliTamper
Deleted File Analysis Utility
...Ethical Hacking...
What is hacking?
Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an ethical hacker and an organization, it's OK. The key difference is that the ethical hacker has authorization to probe the target.
We work with IBM Consulting and its customers to design and execute thorough evaluations of their computer and network security. Depending on the evaluation they request (ranging from Web server probes to all-out attacks), we gather as much information as we can about the target from publicly available sources. As we learn more about the target, its subsidiaries and network connectivity, we begin to probe for weaknesses.
Examples of weaknesses include poor configuration of Web servers, old or unpatched software, disabled security controls, and poorly chosen or default passwords. As we find and exploit vulnerabilities, we document if and how we gained access, as well as if anyone at the organization noticed. (In nearly all the cases, the Information Syhstems department is not informed of these planned attacks.) Then we work with the customer to address the issues we've discovered.
The number of really gifted hackers in the world is very small, but there are lots of wannabes.... When we do an ethical hack, we could be holding the keys to that company once we gain access. It's too great a risk for our customers to be put in a compromising position. With access to so many systems and so much information, the temptation for a former hacker could be too great -- like a kid in an unattended candy store.
From the interview with Dr. Charles C. Palmer, IBM.
Subscribe to:
Posts (Atom)