SlideShare uma empresa Scribd logo
1 de 35
Baixar para ler offline
Certified Ethical Hacking
Ron Woerner, CISSP, CEH
Agenda
 Is computer hacking necessary?
 What is a Certified Ethical Hacker?
 Is that an oxymoron?
 What I learned
 Cool stuff from the class
 The Exam
 Importance of certifications
Two Questions
   Why are you here?

   Why am I here?
Why you need to know

                  Attacker needs to understand
                  only one security issue
                  Defender needs to secure all
                  entry points
                  Attacker has unlimited time
  Defenders vs.   Defender works with time and
   Attackers      cost constraints
Why you need to know
“If you know the enemy
   and know yourself, you
   need not fear the result
   of a hundred battles.”
              ––Sun Tzu,
   Art of War
From Marcus Ranum




http://www.ranum.com/security/computer_security/index.html
Understand this (1):
   Hacking skills are good for the here and now;
   Knowledge of Security Principles are needed
    for the hereafter;
   Both are required to be an information security
    professional.
Understand this (2):
   “In a nutshell, security is now about risk
    management.”
   Penetration / vulnerability testing is an element
    of the risk assessment.
   It is critical to balance the risks based on
    business decisions
   Degrees of separation
   The building of multiple layers
Understand this (3):
   CEH Helps you
     Identify risks, vulnerabilities, threats and
      weaknesses;
     Determine monitoring needs and incident response;
     Sell Security
Certified Ethical Hacker
Certified Ethical Hacker
“If you want to stop hackers from invading
   your network, first you’ve got to invade their
   minds.”
 Ethical Hacking & Countermeasures course
 “Official” certification from EC-Council       (
  http://www.eccouncil.org)
Certified Ethical Hacker
Can Hacking be Ethical (and can
you really be certified in it)?

            IT DEPENDS
Can Hacking be Ethical (and can
you really be certified in it)?
   The noun ‘hacker’ refers to a person who enjoys
    learning the details of computer systems and stretch
    their capabilities.
   The verb ‘hacking’ describes the rapid development of
    new programs or the reverse engineering of already
    existing software to make the code better, and efficient
    (and more secure).
   The term ‘cracker’ refers to a person who uses his
    hacking skills for offensive (malicious) purposes.
   The term ‘ethical hacker’ refers to security
    professionals who apply their hacking skills for
    defensive purposes.
EC-Council Code of Ethics

EC-Council Code of Ethics

In other words, don’t be stupid.
Ethical Hacking
   Ethical hackers try to answer:
       What can the intruder see on the target system?
        (Reconnaissance and Scanning phase of hacking)
       What can an intruder do with that information? (Gaining
        Access and Maintaining Access phases)
       Does anyone at the target notice the intruders attempts
        or success? (Reconnaissance and Covering Tracks
        phases)
   If hired by any organization, an ethical hacker asks the
    organization what it is trying to protect, against whom
    and what resources it is willing to expend in order to
    gain protection.
Hacking 101
1.   Reconnaissance
    (legal)
   1. Active / passive
2. Scanning (legal?)
3.   Gaining access
      (illegal)
     1. Network level
     2. O.S. level
     3. Application level
4.   Maintaining /
     Escalating access
     (illegal)
5.   Covering Tracks
     (illegal)
Class Modules
1.    Legality              1.    Web App Vulnerabilities
2.    Footprinting          2.    Web-based password
3.    Scanning                    cracking
4.    Enumeration           3.    SQL injection
5.    System Hacking        4.    Hacking Wireless Nets
6.    Trojans & Backdoors   5.    Virus
7.    Sniffers              6.    Physical Security
8.    Denial of Service     7.    Linux Hacking
9.    Social Engineering    8.    Evading IDS, etc.
10.   Session Hacking       9.    Buffer Overflows
11.   Hacking Web Servers   10.   Cryptography
                            11.   Pen Test Methodologies
Footprinting
    Web tools
         www.samspade.org
         www.dnsstuff.com
         www.netcraft.com
         Web site archives: www.archive.org (wayback machine)
         People Search: www.intellius.com
    Tools
         Whois (www.networksolutions.com) (Free)
         Nslookup (Free)
         ARIN (http://www.arin.net/whois) (Free)
         Traceroute (Free)
         Visual Route (http://www.visualroute.com/) ($$)
         SmartWhois (www.tamos.com) ($$)
Scanning – Port & Ping
   NMap / NMapWin (Free)
   HPing2 (UNIX) (http://www.hping.org/) (Free)
   Superscan (Free)
   Firewalk (UNIX) (http://www.packetfactory.net/firewalk/)
    (Free)
   WPSweep (http://ntsecurity.nu/toolbox/ipsecscan/) (Free)
   IPSec Scan      (http://ntsecurity.nu/toolbox/ipsecscan/)   (Free)
   Cheops (UNIX) (http://cheops-ng.sourceforge.net/) (Free)
   NetScan Tools Pro (www.netscantools.com) ($$)
Scanning – Vulnerability
   NESSUS (UNIX) (www.nessus.org) (Free)
   GFI LANGuard (www.gfi.com/downloads) ($$)
   Retina (http://www.eeye.com/retina) ($$)
   SAINT (UNIX) (www.saintcorporation.com/saint/) ($$)
   ISS Security Scanner (www.iss.net) ($$)
   SATAN (UNIX) (Free)
   Nikto web scanner (http://
    www.cirt.net/code/nikto.shtml) (Free)
Enumeration
   DumpSec (www.systemtools.com/somarsoft) (Free)
   Winfo (http://ntsecurity.nu/toolbox/winfo/) (Free)
   Enum (http://www.bindview.com
    /services/razor/utilities/) (Free)
   GetAcct (www.securityfriday.com)
   SolarWinds (www.solarwinds.net/) ($$)
   Winfingerprint (winfingerprint.sourceforge.net/) (Free)

   NetBIOS Auditing Tool – NAT () (Free)
System Hacking
   Cracking Passwords
       Smbbf – SMB Bruteforcer (Free)
       L0phtcrack ($$)
       RainbowCrack (http://www.rainbowcrack.com/) (Free)
       KerbCrack (http://www.ntsecurity.nu/toolbox/kerbcrack/)
        (Free)
       Legion (Free)
       John the Ripper (http://www.openwall.com/john/) (Free)
       Cain & Abel (www.oxid.it) (Free)
   Executing Applications
       Psexec (http://www.sysinternals.com/Utilities/PsTools.html) (Free)
       Netcat (http://netcat.sourceforge.net/) (Free) (video)
Web Hacking – Cracking Passwords
   Cracking Passwords
       Authforce (kapheine.hypa.net/authforce/) (Free)
       Brutus (www.hoobie.net/brutus/) (Free)
       WebCracker (Free)
       PassList (Free)

   SQL Injection
       SQLScan (www.foundstone.com/resources/overview.htm)
        (Free) (video)
       Manual techniques
Web Application Hacking
   Instant Source (www.blazingtool.com/) ($$)
   Gnu Wget (www.gnu.org/software/wget/wget.html)
     (Free)
   Websleuth (www.geocities.com/dzzie/sleuth/)
    ($$)
   Black Widow (softbytelabs.com) ($$)
   Burp Suite (portswigger.net/) (Free)
   WebGoat (www.owasp.org) (Free)
   WebScarab (www.owasp.org) (Free)
Class Modules
1.    Legality                1.    Web App Vulnerabilities
2.    Footprinting            2.    Web-based password
3.    Scanning                      cracking
4.    Enumeration             3.    SQL injection
5.    System Hacking          4.    Hacking Wireless Nets
6.    Trojans & Backdoors     5.    Virus
7.    Sniffers                6.    Physical Security
8.    Denial of Service       7.    Linux Hacking
9.    Social Engineering      8.    Evading IDS, etc.
10.   Session Hacking         9.    Buffer Overflows
11.   Hacking Web Servers     10.   Cryptography
                              11.   Pen Test Methodologies
       Link to CEH Brochure
The CEH Exam
The examination tests you on security related
concepts, hacking techniques and technology. You
will be asked to decipher exploit codes, study log
files, infer output and apply the knowledge acquired
through the course.
Exam  length: 125 questions
Time length: 3 hours
Passing score: 70%
Web-based
Can be taken anytime

No   recertification necessary
The CEH Exam – Sample Questions
What is the essential difference between an
“Ethical Hacker” and a “Cracker”?
A.   The ethical hacker does not use the same techniques
     or skills as a cracker.
B.   The ethical hacker does it strictly for financial motives
     unlike a cracker.
C.   The ethical hacker has authorization from the owner of
     the target.
D.   The ethical hacker is just a cracker who is getting paid.

 Answer: C
The CEH Exam – Sample Questions
This tool is a a file and directory integrity checker. It
aids system administrators in monitoring a
designated set of files for any changes.

A.   NMap
B.   Integricheck
C.   DSniff
D.   Cybercop Scanner
E.   Tripwire


 Answer: E
The CEH Exam – Sample Questions
Netcat is a simple network utility which reads and
writes data across network connections, using TCP
or UDP protocol. Which of the following command
scans for open ports between [1 - 140]?
(Select the Best Answer)

A.   nc -xx -q -w2 my-attacker-IP-address [1-140]
B.   nc -vv -z -w2 my-attacker-IP-address 1-140
C.   nc my-attacker-IP-address (1,140)
D.   nc 140 my-attacker-IP-address -vv


 Answer: B
The CEH Exam – Sample Questions
Which type of Nmap scan is the most reliable, but
also the most visible, and likely to be picked up by an
IDS? (Select the Best Answer)


A.   SYN scan
B.   ACK scan
C.   RST scan
D.   Connect scan
E.   FIN scan

 Answer: D
What I got from it
 A great way to get out of work for a week
  and play with hacking tools
 A cool set of tools & toys
 Another free t-shirt
 A way to prove knowledge (& ability)
 Another TLA after my name
Final thoughts
 Overall, CEH is a good experience.
 It provides for a well-rounded information
  security background.
 There is no silver bullet for security.
 Penetration testing / Hacking is only part of
  the risk management cycle.
 “Security is about risk management”
What you really get
Ron Woerner, CISSP, CEH
ron.woerner@conagrafoods.com

Mais conteúdo relacionado

Mais procurados

Ceh v8 labs module 00
Ceh v8 labs module 00Ceh v8 labs module 00
Ceh v8 labs module 00Asep Sopyan
 
Automating Analysis and Exploitation of Embedded Device Firmware
Automating Analysis and Exploitation of Embedded Device FirmwareAutomating Analysis and Exploitation of Embedded Device Firmware
Automating Analysis and Exploitation of Embedded Device FirmwareMalachi Jones
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiStonesoft
 
Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)
Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)
Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)Vale Security Conference
 
SmartphoneHacking_Android_Exploitation
SmartphoneHacking_Android_ExploitationSmartphoneHacking_Android_Exploitation
SmartphoneHacking_Android_ExploitationMalachi Jones
 
Embedded device hacking Session i
Embedded device hacking Session iEmbedded device hacking Session i
Embedded device hacking Session iMalachi Jones
 
Triển khai Modsecurity vào hệ thống NMS - Quan Minh Tâm
Triển khai Modsecurity vào hệ thống NMS - Quan Minh TâmTriển khai Modsecurity vào hệ thống NMS - Quan Minh Tâm
Triển khai Modsecurity vào hệ thống NMS - Quan Minh TâmSecurity Bootcamp
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismGlobal Micro Solutions
 
Offensive cyber security: Smashing the stack with Python
Offensive cyber security: Smashing the stack with PythonOffensive cyber security: Smashing the stack with Python
Offensive cyber security: Smashing the stack with PythonMalachi Jones
 
Evading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploitEvading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploitn|u - The Open Security Community
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaEdureka!
 
Web Security Workshop : A Jumpstart
Web Security Workshop : A JumpstartWeb Security Workshop : A Jumpstart
Web Security Workshop : A JumpstartSatria Ady Pradana
 
CoinMiners are Evasive - BsidesTLV
CoinMiners are Evasive - BsidesTLVCoinMiners are Evasive - BsidesTLV
CoinMiners are Evasive - BsidesTLVThomas Roccia
 
Ceh v8 labs module 09 social engineering
Ceh v8 labs module 09 social engineeringCeh v8 labs module 09 social engineering
Ceh v8 labs module 09 social engineeringAsep Sopyan
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceAsep Sopyan
 
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT AttacksHunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT AttacksF _
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by defaultSecuRing
 
Ethical Hacking & Penetration Testing
Ethical  Hacking &  Penetration  TestingEthical  Hacking &  Penetration  Testing
Ethical Hacking & Penetration TestingWon Ju Jub
 

Mais procurados (20)

Ceh v8 labs module 00
Ceh v8 labs module 00Ceh v8 labs module 00
Ceh v8 labs module 00
 
Automating Analysis and Exploitation of Embedded Device Firmware
Automating Analysis and Exploitation of Embedded Device FirmwareAutomating Analysis and Exploitation of Embedded Device Firmware
Automating Analysis and Exploitation of Embedded Device Firmware
 
Slide jul apcert agm 2016
Slide jul apcert agm 2016Slide jul apcert agm 2016
Slide jul apcert agm 2016
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
 
Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)
Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)
Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)
 
SmartphoneHacking_Android_Exploitation
SmartphoneHacking_Android_ExploitationSmartphoneHacking_Android_Exploitation
SmartphoneHacking_Android_Exploitation
 
Embedded device hacking Session i
Embedded device hacking Session iEmbedded device hacking Session i
Embedded device hacking Session i
 
Triển khai Modsecurity vào hệ thống NMS - Quan Minh Tâm
Triển khai Modsecurity vào hệ thống NMS - Quan Minh TâmTriển khai Modsecurity vào hệ thống NMS - Quan Minh Tâm
Triển khai Modsecurity vào hệ thống NMS - Quan Minh Tâm
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivism
 
Offensive cyber security: Smashing the stack with Python
Offensive cyber security: Smashing the stack with PythonOffensive cyber security: Smashing the stack with Python
Offensive cyber security: Smashing the stack with Python
 
Evading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploitEvading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploit
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
 
Web Security Workshop : A Jumpstart
Web Security Workshop : A JumpstartWeb Security Workshop : A Jumpstart
Web Security Workshop : A Jumpstart
 
CoinMiners are Evasive - BsidesTLV
CoinMiners are Evasive - BsidesTLVCoinMiners are Evasive - BsidesTLV
CoinMiners are Evasive - BsidesTLV
 
Ceh v8 labs module 09 social engineering
Ceh v8 labs module 09 social engineeringCeh v8 labs module 09 social engineering
Ceh v8 labs module 09 social engineering
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissance
 
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT AttacksHunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
 
NetworkSecurity
NetworkSecurityNetworkSecurity
NetworkSecurity
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
 
Ethical Hacking & Penetration Testing
Ethical  Hacking &  Penetration  TestingEthical  Hacking &  Penetration  Testing
Ethical Hacking & Penetration Testing
 

Destaque

CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyE Hacking
 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book ReviewTirtha Mal
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summaryudemy course
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical HackerDavid Sweigert
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 

Destaque (15)

CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH Academy
 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book Review
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
 
CEHV9
CEHV9CEHV9
CEHV9
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Network Security
Network SecurityNetwork Security
Network Security
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Semelhante a Super1

Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingANURAG CHAKRABORTY
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.pptshreyng
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingRaghav Bisht
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipurcyber cure
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity InnovationPete Burnap
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptshreya_omar
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksDamaineFranklinMScBE
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxAnshumaanTiwari2
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETTravarsaPrivateLimit
 

Semelhante a Super1 (20)

Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Ethichack 2012
Ethichack 2012Ethichack 2012
Ethichack 2012
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEET
 

Último

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Último (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 

Super1

  • 1. Certified Ethical Hacking Ron Woerner, CISSP, CEH
  • 2. Agenda  Is computer hacking necessary?  What is a Certified Ethical Hacker?  Is that an oxymoron?  What I learned  Cool stuff from the class  The Exam  Importance of certifications
  • 3. Two Questions  Why are you here?  Why am I here?
  • 4. Why you need to know Attacker needs to understand only one security issue Defender needs to secure all entry points Attacker has unlimited time Defenders vs. Defender works with time and Attackers cost constraints
  • 5. Why you need to know “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” ––Sun Tzu, Art of War
  • 7. Understand this (1):  Hacking skills are good for the here and now;  Knowledge of Security Principles are needed for the hereafter;  Both are required to be an information security professional.
  • 8. Understand this (2):  “In a nutshell, security is now about risk management.”  Penetration / vulnerability testing is an element of the risk assessment.  It is critical to balance the risks based on business decisions  Degrees of separation  The building of multiple layers
  • 9. Understand this (3):  CEH Helps you  Identify risks, vulnerabilities, threats and weaknesses;  Determine monitoring needs and incident response;  Sell Security
  • 11. Certified Ethical Hacker “If you want to stop hackers from invading your network, first you’ve got to invade their minds.”  Ethical Hacking & Countermeasures course  “Official” certification from EC-Council ( http://www.eccouncil.org)
  • 13. Can Hacking be Ethical (and can you really be certified in it)? IT DEPENDS
  • 14. Can Hacking be Ethical (and can you really be certified in it)?  The noun ‘hacker’ refers to a person who enjoys learning the details of computer systems and stretch their capabilities.  The verb ‘hacking’ describes the rapid development of new programs or the reverse engineering of already existing software to make the code better, and efficient (and more secure).  The term ‘cracker’ refers to a person who uses his hacking skills for offensive (malicious) purposes.  The term ‘ethical hacker’ refers to security professionals who apply their hacking skills for defensive purposes.
  • 15. EC-Council Code of Ethics EC-Council Code of Ethics In other words, don’t be stupid.
  • 16. Ethical Hacking  Ethical hackers try to answer:  What can the intruder see on the target system? (Reconnaissance and Scanning phase of hacking)  What can an intruder do with that information? (Gaining Access and Maintaining Access phases)  Does anyone at the target notice the intruders attempts or success? (Reconnaissance and Covering Tracks phases)  If hired by any organization, an ethical hacker asks the organization what it is trying to protect, against whom and what resources it is willing to expend in order to gain protection.
  • 17. Hacking 101 1. Reconnaissance (legal) 1. Active / passive 2. Scanning (legal?) 3. Gaining access (illegal) 1. Network level 2. O.S. level 3. Application level 4. Maintaining / Escalating access (illegal) 5. Covering Tracks (illegal)
  • 18. Class Modules 1. Legality 1. Web App Vulnerabilities 2. Footprinting 2. Web-based password 3. Scanning cracking 4. Enumeration 3. SQL injection 5. System Hacking 4. Hacking Wireless Nets 6. Trojans & Backdoors 5. Virus 7. Sniffers 6. Physical Security 8. Denial of Service 7. Linux Hacking 9. Social Engineering 8. Evading IDS, etc. 10. Session Hacking 9. Buffer Overflows 11. Hacking Web Servers 10. Cryptography 11. Pen Test Methodologies
  • 19. Footprinting  Web tools  www.samspade.org  www.dnsstuff.com  www.netcraft.com  Web site archives: www.archive.org (wayback machine)  People Search: www.intellius.com  Tools  Whois (www.networksolutions.com) (Free)  Nslookup (Free)  ARIN (http://www.arin.net/whois) (Free)  Traceroute (Free)  Visual Route (http://www.visualroute.com/) ($$)  SmartWhois (www.tamos.com) ($$)
  • 20. Scanning – Port & Ping  NMap / NMapWin (Free)  HPing2 (UNIX) (http://www.hping.org/) (Free)  Superscan (Free)  Firewalk (UNIX) (http://www.packetfactory.net/firewalk/) (Free)  WPSweep (http://ntsecurity.nu/toolbox/ipsecscan/) (Free)  IPSec Scan (http://ntsecurity.nu/toolbox/ipsecscan/) (Free)  Cheops (UNIX) (http://cheops-ng.sourceforge.net/) (Free)  NetScan Tools Pro (www.netscantools.com) ($$)
  • 21. Scanning – Vulnerability  NESSUS (UNIX) (www.nessus.org) (Free)  GFI LANGuard (www.gfi.com/downloads) ($$)  Retina (http://www.eeye.com/retina) ($$)  SAINT (UNIX) (www.saintcorporation.com/saint/) ($$)  ISS Security Scanner (www.iss.net) ($$)  SATAN (UNIX) (Free)  Nikto web scanner (http:// www.cirt.net/code/nikto.shtml) (Free)
  • 22. Enumeration  DumpSec (www.systemtools.com/somarsoft) (Free)  Winfo (http://ntsecurity.nu/toolbox/winfo/) (Free)  Enum (http://www.bindview.com /services/razor/utilities/) (Free)  GetAcct (www.securityfriday.com)  SolarWinds (www.solarwinds.net/) ($$)  Winfingerprint (winfingerprint.sourceforge.net/) (Free)  NetBIOS Auditing Tool – NAT () (Free)
  • 23. System Hacking  Cracking Passwords  Smbbf – SMB Bruteforcer (Free)  L0phtcrack ($$)  RainbowCrack (http://www.rainbowcrack.com/) (Free)  KerbCrack (http://www.ntsecurity.nu/toolbox/kerbcrack/) (Free)  Legion (Free)  John the Ripper (http://www.openwall.com/john/) (Free)  Cain & Abel (www.oxid.it) (Free)  Executing Applications  Psexec (http://www.sysinternals.com/Utilities/PsTools.html) (Free)  Netcat (http://netcat.sourceforge.net/) (Free) (video)
  • 24. Web Hacking – Cracking Passwords  Cracking Passwords  Authforce (kapheine.hypa.net/authforce/) (Free)  Brutus (www.hoobie.net/brutus/) (Free)  WebCracker (Free)  PassList (Free)  SQL Injection  SQLScan (www.foundstone.com/resources/overview.htm) (Free) (video)  Manual techniques
  • 25. Web Application Hacking  Instant Source (www.blazingtool.com/) ($$)  Gnu Wget (www.gnu.org/software/wget/wget.html) (Free)  Websleuth (www.geocities.com/dzzie/sleuth/) ($$)  Black Widow (softbytelabs.com) ($$)  Burp Suite (portswigger.net/) (Free)  WebGoat (www.owasp.org) (Free)  WebScarab (www.owasp.org) (Free)
  • 26. Class Modules 1. Legality 1. Web App Vulnerabilities 2. Footprinting 2. Web-based password 3. Scanning cracking 4. Enumeration 3. SQL injection 5. System Hacking 4. Hacking Wireless Nets 6. Trojans & Backdoors 5. Virus 7. Sniffers 6. Physical Security 8. Denial of Service 7. Linux Hacking 9. Social Engineering 8. Evading IDS, etc. 10. Session Hacking 9. Buffer Overflows 11. Hacking Web Servers 10. Cryptography 11. Pen Test Methodologies Link to CEH Brochure
  • 27. The CEH Exam The examination tests you on security related concepts, hacking techniques and technology. You will be asked to decipher exploit codes, study log files, infer output and apply the knowledge acquired through the course. Exam length: 125 questions Time length: 3 hours Passing score: 70% Web-based Can be taken anytime No recertification necessary
  • 28. The CEH Exam – Sample Questions What is the essential difference between an “Ethical Hacker” and a “Cracker”? A. The ethical hacker does not use the same techniques or skills as a cracker. B. The ethical hacker does it strictly for financial motives unlike a cracker. C. The ethical hacker has authorization from the owner of the target. D. The ethical hacker is just a cracker who is getting paid. Answer: C
  • 29. The CEH Exam – Sample Questions This tool is a a file and directory integrity checker. It aids system administrators in monitoring a designated set of files for any changes. A. NMap B. Integricheck C. DSniff D. Cybercop Scanner E. Tripwire Answer: E
  • 30. The CEH Exam – Sample Questions Netcat is a simple network utility which reads and writes data across network connections, using TCP or UDP protocol. Which of the following command scans for open ports between [1 - 140]? (Select the Best Answer) A. nc -xx -q -w2 my-attacker-IP-address [1-140] B. nc -vv -z -w2 my-attacker-IP-address 1-140 C. nc my-attacker-IP-address (1,140) D. nc 140 my-attacker-IP-address -vv Answer: B
  • 31. The CEH Exam – Sample Questions Which type of Nmap scan is the most reliable, but also the most visible, and likely to be picked up by an IDS? (Select the Best Answer) A. SYN scan B. ACK scan C. RST scan D. Connect scan E. FIN scan Answer: D
  • 32. What I got from it  A great way to get out of work for a week and play with hacking tools  A cool set of tools & toys  Another free t-shirt  A way to prove knowledge (& ability)  Another TLA after my name
  • 33. Final thoughts  Overall, CEH is a good experience.  It provides for a well-rounded information security background.  There is no silver bullet for security.  Penetration testing / Hacking is only part of the risk management cycle.  “Security is about risk management”
  • 35. Ron Woerner, CISSP, CEH ron.woerner@conagrafoods.com