SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Ethical Hacking
Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting
What is Ethical Hacking Ethical Hacking Conforming to accepted professional standards of conduct ,[object Object],[object Object],[object Object],Also Called – Attack & Penetration Testing,  White-hat hacking, Red teaming White-hat - Good Guys Black-hat – Bad guys
What is Ethical Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why – Ethical Hacking Source: CERT-India January - 2005 Defacement Statistics for Indian Websites 1131 Total 13 other 2 .edu  2 .nic.in  3 .info  13 .ac.in  48 .co.in  12 .biz  39 .net  53 .org  24 .gov.in  922 .com  No of Defacements  Domains June 01, 2004 to Dec.31, 2004
Why – Ethical Hacking Source: CERT/CC Total Number of Incidents Incidents
Why – Ethical Hacking Source: US - CERT
Why – Ethical Hacking Protection from possible External Attacks Viruses, Trojan Horses,  and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data
Ethical Hacking - Process ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preparation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Footprinting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enumeration & Fingerprinting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identification of Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identification of Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identification of Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attack – Exploit the vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Attack – Exploit the vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attack – Exploit the vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Attack – Exploit the vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Reporting ,[object Object],[object Object],[object Object],[object Object]
Ethical Hacking - Commandments ,[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Intruders
IntrudersIntruders
Intruders
techn
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
Ehtisham Ali
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
andynova
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
festival ICT 2016
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
RootedCON
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
mmubashirkhan
 

Was ist angesagt? (18)

Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Intruders
IntrudersIntruders
Intruders
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & Forensics
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
 

Andere mochten auch

Andere mochten auch (7)

Year 2070 01_07_06
Year 2070 01_07_06Year 2070 01_07_06
Year 2070 01_07_06
 
Hi2
Hi2Hi2
Hi2
 
Cartoons caricature him
Cartoons caricature himCartoons caricature him
Cartoons caricature him
 
Minneapolis bridge disaster__27_slides_
Minneapolis bridge disaster__27_slides_Minneapolis bridge disaster__27_slides_
Minneapolis bridge disaster__27_slides_
 
Makkahin2010
Makkahin2010Makkahin2010
Makkahin2010
 
Say n otodollar ( solution)
Say n otodollar ( solution)Say n otodollar ( solution)
Say n otodollar ( solution)
 
Magic cat
Magic catMagic cat
Magic cat
 

Ähnlich wie Ethical h

324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
ssuserde23af
 
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdfpdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
tehkotak4
 

Ähnlich wie Ethical h (20)

324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
CyberIgnite.pdf
CyberIgnite.pdfCyberIgnite.pdf
CyberIgnite.pdf
 
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdfpdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdf
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Hacking
HackingHacking
Hacking
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting Breaches
 

Mehr von Dr. Salman Iqbal (20)

Bmj pam.ppt blue final
Bmj pam.ppt blue finalBmj pam.ppt blue final
Bmj pam.ppt blue final
 
Ancient medicine
Ancient medicineAncient medicine
Ancient medicine
 
Recession
RecessionRecession
Recession
 
Punishing urboss
Punishing urbossPunishing urboss
Punishing urboss
 
Muhammd prophet of_islam_mercy_of_the_world
Muhammd prophet of_islam_mercy_of_the_worldMuhammd prophet of_islam_mercy_of_the_world
Muhammd prophet of_islam_mercy_of_the_world
 
Memorise those brands (problem)
Memorise those brands (problem)Memorise those brands (problem)
Memorise those brands (problem)
 
Israeli massacre
Israeli massacreIsraeli massacre
Israeli massacre
 
Death
DeathDeath
Death
 
Atk 08
Atk 08Atk 08
Atk 08
 
Allah rab ul-izzat kaheta hai
Allah rab ul-izzat kaheta haiAllah rab ul-izzat kaheta hai
Allah rab ul-izzat kaheta hai
 
Al aqsa facts
Al aqsa factsAl aqsa facts
Al aqsa facts
 
Tonsillitis
TonsillitisTonsillitis
Tonsillitis
 
Sticker
StickerSticker
Sticker
 
Role of probiotics
Role of probioticsRole of probiotics
Role of probiotics
 
Presentation diag dilemma
Presentation diag dilemmaPresentation diag dilemma
Presentation diag dilemma
 
Medications during pregnancy
Medications during pregnancyMedications during pregnancy
Medications during pregnancy
 
Me and my father
Me and my fatherMe and my father
Me and my father
 
Mdh marketing plan 2010
Mdh marketing plan 2010Mdh marketing plan 2010
Mdh marketing plan 2010
 
Introduction
IntroductionIntroduction
Introduction
 
Intercostal drain
Intercostal drainIntercostal drain
Intercostal drain
 

Kürzlich hochgeladen

Cash Payment Contact:- 8617370543 North Goa Call Girls Service
Cash Payment Contact:- 8617370543 North Goa Call Girls ServiceCash Payment Contact:- 8617370543 North Goa Call Girls Service
Cash Payment Contact:- 8617370543 North Goa Call Girls Service
Nitya salvi
 
Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...
Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...
Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...
Sheetaleventcompany
 
Escorts Service In North Goa Panjim⚕️9971646499⚕️ Team Suport Goa Call girls...
Escorts Service In North Goa Panjim⚕️9971646499⚕️ Team Suport  Goa Call girls...Escorts Service In North Goa Panjim⚕️9971646499⚕️ Team Suport  Goa Call girls...
Escorts Service In North Goa Panjim⚕️9971646499⚕️ Team Suport Goa Call girls...
ritikaroy0888
 

Kürzlich hochgeladen (20)

👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Top 10 Moisturising Cream Brands In India - Stelon Biotech
Top 10 Moisturising Cream Brands In India - Stelon BiotechTop 10 Moisturising Cream Brands In India - Stelon Biotech
Top 10 Moisturising Cream Brands In India - Stelon Biotech
 
Cash Payment Contact:- 8617370543 North Goa Call Girls Service
Cash Payment Contact:- 8617370543 North Goa Call Girls ServiceCash Payment Contact:- 8617370543 North Goa Call Girls Service
Cash Payment Contact:- 8617370543 North Goa Call Girls Service
 
VIP Model Call Girls Buldhana Call ON 8617697112 Starting From 5K to 25K High...
VIP Model Call Girls Buldhana Call ON 8617697112 Starting From 5K to 25K High...VIP Model Call Girls Buldhana Call ON 8617697112 Starting From 5K to 25K High...
VIP Model Call Girls Buldhana Call ON 8617697112 Starting From 5K to 25K High...
 
Call girls in Vashi Service 7738596112 Free Delivery 24x7 at Your Doorstep
Call girls in Vashi Service 7738596112 Free Delivery 24x7 at Your DoorstepCall girls in Vashi Service 7738596112 Free Delivery 24x7 at Your Doorstep
Call girls in Vashi Service 7738596112 Free Delivery 24x7 at Your Doorstep
 
Call Girl In Zirakpur👧 Book Now📱7837612180 📞👉Zirakpur Call Girls Service No A...
Call Girl In Zirakpur👧 Book Now📱7837612180 📞👉Zirakpur Call Girls Service No A...Call Girl In Zirakpur👧 Book Now📱7837612180 📞👉Zirakpur Call Girls Service No A...
Call Girl In Zirakpur👧 Book Now📱7837612180 📞👉Zirakpur Call Girls Service No A...
 
WhatsApp 📞 8448380779 ✅Call Girls In Bhangel Sector 102 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Bhangel Sector 102 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Bhangel Sector 102 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Bhangel Sector 102 ( Noida)
 
👉Chandigarh Call Girls 📞Book Now📞👉 9878799926 👉Zirakpur Call Girl Service No ...
👉Chandigarh Call Girls 📞Book Now📞👉 9878799926 👉Zirakpur Call Girl Service No ...👉Chandigarh Call Girls 📞Book Now📞👉 9878799926 👉Zirakpur Call Girl Service No ...
👉Chandigarh Call Girls 📞Book Now📞👉 9878799926 👉Zirakpur Call Girl Service No ...
 
Ladies kitty party invitation messages and greetings.pdf
Ladies kitty party invitation messages and greetings.pdfLadies kitty party invitation messages and greetings.pdf
Ladies kitty party invitation messages and greetings.pdf
 
Sakinaka Call Girls Agency 📞 9892124323 ✅ Call Girl in Sakinaka
Sakinaka Call Girls Agency  📞 9892124323 ✅  Call Girl in SakinakaSakinaka Call Girls Agency  📞 9892124323 ✅  Call Girl in Sakinaka
Sakinaka Call Girls Agency 📞 9892124323 ✅ Call Girl in Sakinaka
 
Call Girls Udaipur Just Call 9602870969 Top Class Call Girl Service Available
Call Girls Udaipur Just Call 9602870969 Top Class Call Girl Service AvailableCall Girls Udaipur Just Call 9602870969 Top Class Call Girl Service Available
Call Girls Udaipur Just Call 9602870969 Top Class Call Girl Service Available
 
Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...
Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...
Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...
 
Hire 💕 8617697112 Pulwama Call Girls Service Call Girls Agency
Hire 💕 8617697112 Pulwama Call Girls Service Call Girls AgencyHire 💕 8617697112 Pulwama Call Girls Service Call Girls Agency
Hire 💕 8617697112 Pulwama Call Girls Service Call Girls Agency
 
Pooja : 9892124323, Dharavi Call Girls. 7000 Cash Payment Free Home Delivery
Pooja : 9892124323, Dharavi Call Girls. 7000 Cash Payment Free Home DeliveryPooja : 9892124323, Dharavi Call Girls. 7000 Cash Payment Free Home Delivery
Pooja : 9892124323, Dharavi Call Girls. 7000 Cash Payment Free Home Delivery
 
Night 7k to 12k Chennai Call Girls 👉👉 8617697112⭐⭐ 100% Genuine Escort Servic...
Night 7k to 12k Chennai Call Girls 👉👉 8617697112⭐⭐ 100% Genuine Escort Servic...Night 7k to 12k Chennai Call Girls 👉👉 8617697112⭐⭐ 100% Genuine Escort Servic...
Night 7k to 12k Chennai Call Girls 👉👉 8617697112⭐⭐ 100% Genuine Escort Servic...
 
Escorts Service In North Goa Panjim⚕️9971646499⚕️ Team Suport Goa Call girls...
Escorts Service In North Goa Panjim⚕️9971646499⚕️ Team Suport  Goa Call girls...Escorts Service In North Goa Panjim⚕️9971646499⚕️ Team Suport  Goa Call girls...
Escorts Service In North Goa Panjim⚕️9971646499⚕️ Team Suport Goa Call girls...
 
Call Girls Dholpur Just Call 8617370543Top Class Call Girl Service Available
Call Girls Dholpur Just Call 8617370543Top Class Call Girl Service AvailableCall Girls Dholpur Just Call 8617370543Top Class Call Girl Service Available
Call Girls Dholpur Just Call 8617370543Top Class Call Girl Service Available
 
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...
 
Bishnupur 💋 Book Call Girls Night 7k to 12k ️8250077686 💋 High Profile Model...
Bishnupur 💋 Book Call Girls Night 7k to 12k  ️8250077686 💋 High Profile Model...Bishnupur 💋 Book Call Girls Night 7k to 12k  ️8250077686 💋 High Profile Model...
Bishnupur 💋 Book Call Girls Night 7k to 12k ️8250077686 💋 High Profile Model...
 
Mahim Call Girls in Bandra 7738631006, Sakinaka Call Girls agency, Kurla Call...
Mahim Call Girls in Bandra 7738631006, Sakinaka Call Girls agency, Kurla Call...Mahim Call Girls in Bandra 7738631006, Sakinaka Call Girls agency, Kurla Call...
Mahim Call Girls in Bandra 7738631006, Sakinaka Call Girls agency, Kurla Call...
 

Ethical h

  • 2. Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting
  • 3.
  • 4.
  • 5. Why – Ethical Hacking Source: CERT-India January - 2005 Defacement Statistics for Indian Websites 1131 Total 13 other 2 .edu 2 .nic.in 3 .info 13 .ac.in 48 .co.in 12 .biz 39 .net 53 .org 24 .gov.in 922 .com No of Defacements Domains June 01, 2004 to Dec.31, 2004
  • 6. Why – Ethical Hacking Source: CERT/CC Total Number of Incidents Incidents
  • 7. Why – Ethical Hacking Source: US - CERT
  • 8. Why – Ethical Hacking Protection from possible External Attacks Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.

Hinweis der Redaktion

  1. Red teaming – used for the first time by US government for testing its systems early 90’s Black & white hat terminology comes from the Hollywood movies where good guys wear white hats and bad guys wear black hats
  2. Other information not available