Tuesday, November 4, 2008

"Ethical Hacking"- An Introduction

The term "Hacker" is now an evil one, someone looked upon as scum by the public eye.

In reality, however, being a "Hacker" does not necessarily mean you are a bad person. People who open up old toys and computers to learn how they work are, technically speaking, hackers.

It was these hackers that made it so that the Internet is as dynamic as it is today. They were explorers and experimenters who were excited to discover the unknown. And it was these hackers who became among the wealthiest in the United States.

So why are hackers today now "bad guys"? Well, as always, we can always blame Hollywood. War Games was THE movie that changed America's perception of Hackers.




Now, hackers are seen as young, rebellious teens who have far too much time on their hands. Many people are now breaking into computer networks, I do admit that. However, these people are not necessarily "Hackers" in the traditional sense. They are more or less "Cyber- Terrorists", and should be arrested.

As far as computer-hacking goes, there is an alternative to the illegal route seen in War Games. Ethical Hacking is still pretty exciting, and worth-wile. However, it is done to help people defend against cyber-terrorists, and people who want to break into their systems with the intent to make money, get revenge, etc.

This Ethical Hacking or "White Hat Hacking" method involves many options. One could do what's called penetration testing, where a computer or network is attempted to be broken into with the consent of the user.

Another option is to attempt to increase the security of one's network by using additional firewalls and counter measures.

When ever I am explaining the concept of White-Hat Hacking I refer to the famous Harry Potter books when someone doesn't understand What I'm trying to say. The "Dark Arts" in these books are used by evil people, however the "Defense Against The Dark Arts" class at Hogwarts attempts to counter the "Dark Arts". This is exactly what an Ethical Hacker does.

Yes, I know, its a crude metaphor, but an effective one.

Today, White Hat Hackers work for the government, corporate businesses, or themselves, and they usually end up helping themselves or other people.

15 comments:

Anonymous said...

Very interesting observation. How could you learn to "ethically hack"?, and how dangerous would it be to "ethically hack"?

Anonymous said...

Can a hacker hack into your computer when it is offline? or when you have the computer shut down and off?

Brennon said...

No. The disks cannot be read. Your computer is safe when its off. :)

I've got 3 books or ethical hacking. Reading is a great place to start.

Anonymous said...

I am Brian Greene and I find this website to be "awesome." Great work you are doing BW. Call me sometime at 650-594-3217. Great website continue your hard work.

Brennon said...

How Dare you. Brian Greene is a brilliant physicist.

Oh, and he doesn't live in the "650" area code.

I hope you get a million sales calls. You phone # will not be deleted.

Please, find another way to annoy me Jeremy.

Brennon said...

Do this again, and I'll put up your email so hundreds of spam bots will find it and flood your inbox with spam.

I will not tolerate this on BW Science Labs. If you want to annoy me, use email.

Anonymous said...

Thank you for the information. What are the title of the books you have (If you do not mind sharing) so I can start reading up on this subject.

Brennon said...

Hacking for Dummies is a good book, in spite of its somewhat annoying title. It makes a perfect place to start.

A Guide to Gray Hat Hacking is not as good as I thought it would be, and I can't say I recommend it.

The Art of Exploitation is a wonderful book, however it was written to help Linux users, so anyone running Windows or OSX would be frustrated.

I recommend Hacking for Dummies to start.

Anonymous said...

Thank you for the information. I will go out and get that book.

Anonymous said...

This is a respectable website!!!!!!!!!!!!!!!!!!!!!!!!!!! ROCK ON BWILMAN KEEP IT!!!!!!!!!!!!!! Just email me if you want to talk youre awesome

Anonymous said...

Thank you for practical information as well as the science behind it.

Anonymous said...

War Games! I love that movie! I got into a conversation recently about antivirus software developers, and how quickly they all seem to coordinate, and it got me thinking about hackers hired to help companies prevent hacks. It's not a new conspiracy theory by any means, but could antivirus developers hire people to write viruses, then sell defenses against them, then collect fees from the other antivirus guys to give them the defense too? It's kind of win-win for them, then, and the company with the best/most virus writers wins.

Brennon said...

Flagfoot, that's a great idea. Usually after a hired hacker breaks into a network it is usually a matter of plugging gaps in security. However, if a hacker was hired to build a new virus then, yes you could sell the defense to it. However, it would only be bought if the virus was a threat. So, in theory, the only way the company could really make money is if the virus was released, which is illegal of course.

Anonymous said...

Who knows where to download XRumer 5.0 Palladium?
Help, please. All recommend this program to effectively advertise on the Internet, this is the best program!

Brennon said...

I think you missed the "ethical" in Ethical Hacking.

blogger templates 3 columns | Make Money Online