2. Todayâs Agenda
ïBrief intro to security & hacking
ïResources to get started
ïTools & software
ïDemo
ïLive âETHICALâ hacking (if time permits)
6. BLACK HATS
ï The bad guys (and girls) in the computer world
ï Responsible for writing malware to gain access to the systems
ï Motive â personal or financial gain, cyber espionage, protest or
perhaps just addicted to the thrill of cyber crime
ï They range from amateurs (getting their feet wet by spreading
malware) to experienced hackers (stealing data specifically financial
or PII)
7. WHITE HATS
ï Choose to use their powers for good than evil a.k.a âethical hackersâ
ï Could be paid employees or contractors in companies to find security
holes/vulnerabilities
ï Use the same methods as black hats, but with permission
ï They perform what is known as penetration testing (pen tests)
8. GREY HATS
ï As in life, there are grey areas - blend of both black hat and white
hat activities
ï Grey hats look for vulnerabilities w/o ownerâs permission
ï If issue is found, report it but with a small fee to fix the issue
ï If owner does not comply, post the exploit for the world to see
ï Theyâre not inherently malicious with their intentions, but just
looking to get something out of their discoveries
9.
10.
11.
12.
13. How/Where do I begin?
ï Talk to your two friends and about âEthical Hackingâ
ï Tons and tons of videos on
ï Follow topics about security & hacking on
ï Make it a habit & keep visiting
ï Join a mailing list â
ï Train and certify for either (or both) â
ï Familiarize and practice for Top 10
15. Questions on everyoneâs mind now:
ï Why did I not know that hacking was a religious affair?
ï How many times should I perform pooja?
ï Whatâs the average appeasement time before being blessed?
18. Hacking Myths!
Myth 1: You become a hacker after wearing a hoodie
Ans: Wearing a hoodie will not enhance your skills.
Wear it when feeling cold or to cover your ugliness
Myth 2: Hackers are maladjusted young people who live
in their mothersâ basements
Ans: Many of them are not teens, have a day job and
have steady relationships with peers and families
Ans: Predominantly male dominated, but that doesnât
mean there are female hackers
Myth 3: Hacking is a boys only club
Myth 4: All hacking is bad
Ans: Hacking is not always about compromising data, but about
understanding the underlying nature of the technology
19.
20. WHATâS THE DEMO?
Brute force a website login using Hydra & Burpsuite (from Kali Linux)
THINGS YOU NEED
ï Kali Linux (actually any *nix will do)
ï DVWA (Damn Vulnerable Web Application)
ï Hydra
ï Burpsuite
ï Web Browser
ï Username/password Lists