https://de.wikipedia.org/w/api.php?action=feedcontributions&feedformat=atom&user=176.126.231.210 Wikipedia - Benutzerbeiträge [de] 2025-05-08T21:33:03Z Benutzerbeiträge MediaWiki 1.44.0-wmf.28 https://de.wikipedia.org/w/index.php?title=White_hat&diff=233318300 White hat 2015-03-13T12:42:37Z <p>176.126.231.210: </p> <hr /> <div>{{Computer hacking}}<br /> <br /> The term &quot;'''white hat'''&quot; in [[Internet slang]] refers to an ethical [[computer hacker]], or a [[computer security]] expert, who specializes in [[penetration testing]] and in other testing methodologies to ensure the security of an organization's [[information systems]].&lt;ref&gt;{{cite web|url=http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550882,00.html |title=What is white hat? - a definition from Whatis.com |publisher=Searchsecurity.techtarget.com |date= |accessdate=2012-06-06}}&lt;/ref&gt; [[Hacker ethic|Ethical hacking]] is a term coined by [[IBM]] meant to imply a broader category than just penetration testing.&lt;ref name=Knight&gt;{{cite journal|last=Knight|first=William|title=License to Hack|journal=InfoSecurity|date=16 October 2009|volume=6|issue=6|pages=38–41|url=http://www.infosecurity-magazine.com/view/4611/license-to-hack-ethical-hacking/|doi=10.1016/s1742-6847(09)70019-9}}&lt;/ref&gt;<br /> White-hat hackers may also work in teams called &quot;[[hacker (computer security)|sneakers]]&quot;,&lt;ref name= Secpoint&gt;{{cite web|url=http://www.secpoint.com/What-is-a-White-Hat.html |title=What is a White Hat? |publisher=Secpoint.com |date=2012-03-20 |accessdate=2012-06-06}}&lt;/ref&gt; [[red team]]s, or [[tiger team]]s,&lt;ref name=Palmer&gt;{{cite journal|last=Palmer|first=C.C.|title=Ethical Hacking|journal=IBM Systems Journal|year=2001|volume=40|issue=3|page=769|url=http://pdf.textfiles.com/security/palmer.pdf|doi=10.1147/sj.403.0769}}&lt;/ref&gt;[[WhiteHat Adda]].&lt;ref&gt;WhieHat Adda - The Programmer's Point&lt;/ref&gt;<br /> <br /> ==History==<br /> One of the first instances of an ethical hack being used was a &quot;security evaluation&quot; conducted by the United States Air Force of the Multics operating systems for &quot;potential use as a two-level (secret/top secret) system.&quot; Their evaluation found that while Multics was &quot;significantly better than other conventional systems,&quot;{{citation needed|date=May 2013}} it also had &quot;... vulnerabilities in hardware security, software security and procedural security&quot;{{citation needed|date=May 2013}} that could be uncovered with &quot;a relatively low level of effort.&quot;{{citation needed|date=May 2013}} The authors performed their tests under a guideline of realism, so that their results would accurately represent the kinds of access that an intruder could potentially achieve. They performed tests that were simple information-gathering exercises, as well as other tests that were outright attacks upon the system that might damage its integrity. Clearly, their audience wanted to know both results. There are several other now unclassified reports that describe ethical hacking activities within the U.S. military.&lt;ref name=Palmer /&gt; The idea to bring this tactic of ethical hacking to assess security of systems was formulated by [[Dan Farmer]] and [[Wietse Venema]]. With the goal of raising the overall level of security on the [[Internet]] and [[intranets]], they proceeded to describe how they were able to gather enough information about their targets to have been able to compromise security if they had chosen to do so. They provided several specific examples of how this information could be gathered and exploited to gain control of the target, and how such an attack could be prevented. They gathered up all the tools that they had used during their work, packaged them in a single, easy-to-use application, and gave it away to anyone who chose to download it. Their program, called [[Security Administrator Tool for Analyzing Networks]], or SATAN, was met with a great amount of media attention around the world in 1992.&lt;ref name= Palmer /&gt;<br /> <br /> ==Tactics==<br /> While penetration testing concentrates on attacking software and computer systems from the start&amp;nbsp;– scanning ports, examining known defects and patch installations, for example&amp;nbsp;– ethical hacking, which will likely include such things, is under no limitations when asked for by stake holders in the company. A full blown ethical hack might include emailing staff to ask for password details, rummaging through executive’s dustbins and usually breaking and entering&amp;nbsp;– all, of course, with NO knowledge and consent of the targets. ONLY the owners, CEO's and Board Members (stake holders) whom asked for such a security review of this magnitude are aware. A complete understanding, and sometimes if allowed by those stake holders, a complete non-understanding of the hack attempt is allowed to test penetration points. To try to replicate some of the destructive techniques a real attack might employ, ethical hackers may arrange for cloned test systems, or organize a hack late at night while systems are less critical.&lt;ref name= Knight /&gt; In most recent cases these hacks perpetuate for the long term con, (days, if not weeks, of long term human infiltration into an organization). Some examples include leaving USB/flash key drives with hidden auto-start software in a public area, as if someone lost the small drive and an unsuspecting employee found it and took it.<br /> <br /> Some other methods of carrying out these include:<br /> <br /> * [[Denial-of-service attack|DoS attack]]s<br /> * [[Social engineering (security)|Social engineering]] tactics<br /> * Security scanners such as:<br /> ** [[W3af]]<br /> ** [[Nessus (software)|Nessus]]<br /> ** Nexpose<br /> * Frameworks such as:<br /> ** [[Metasploit]]<br /> <br /> Such methods identify and [[Exploit (computer security)|exploit]] known [[Vulnerability (computing)|vulnerabilities]], and attempt to evade security to gain entry into secured areas. They are able to do this by hiding software and system 'back-doors' that could be used as a link to the information or access the non-ethical hacker, also known as 'black-hat' or 'grey-hat', may want to reach.<br /> <br /> ==Legality in the UK==<br /> how do I get my period dad? Struan Robertson, legal director at Pinsent Masons LLP, and editor of [[OUT-LAW|OUT-LAW.com]], says &quot;Broadly speaking, if the access to a system is authorized, the hacking is ethical and legal. If it isn't, there's an offence under the [[Computer Misuse Act]]. The unauthorized access offence covers everything from guessing the password, to accessing someone's webmail account, to cracking the security of a bank. The maximum penalty for unauthorized access to a computer is two years in prison and a fine. There are higher penalties&amp;nbsp;– up to 10 years in prison&amp;nbsp;– when the hacker also modifies data&quot;. Unauthorized access even to expose vulnerabilities for the benefit of many is not legal, says Robertson. &quot;There's no defense in our hacking laws that your behavior is for the greater good. Even if it's what you believe.&quot;&lt;ref name=Knight /&gt;<br /> <br /> ==Employment==<br /> The United States [[National Security Agency]] offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team-management. Aggressor teams are called &quot;red&quot; teams. Defender teams are called &quot;blue&quot; teams.&lt;ref name=Secpoint /&gt;<br /> {{globalize/Eng|date=June 2011}}<br /> <br /> &lt;!-- PLEASE RESPECT ALPHABETICAL ORDER --&gt;<br /> <br /> ===List of prominent white hat hackers===<br /> * [[Eric Corley]]<br /> * [[Przemysław Frasunek]]<br /> * [[Raphael Gray]]<br /> * [[Barnaby Jack]]<br /> * [[Kevin Mitnick]]<br /> * [[Robert Tappan Morris]]<br /> * [[Kevin Poulsen]]<br /> <br /> ==See also==<br /> * [[Certified Ethical Hacker]]<br /> * [[:Category:Computer hacking|Computer hacking]] (category)<br /> * [[IT risk]]<br /> * [[Wireless identity theft]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> {{DEFAULTSORT:White Hat (Computer Security)}}<br /> [[Category:Hacking (computer security)]]<br /> <br /> [[ja:ハッカー#類語]]</div> 176.126.231.210 https://de.wikipedia.org/w/index.php?title=White_hat&diff=233318298 White hat 2015-03-13T12:41:32Z <p>176.126.231.210: </p> <hr /> <div>{{Computer hacking}}<br /> <br /> The term &quot;'''white hat'''&quot; in [[Internet slang]] refers to an ethical [[computer hacker]], or a [[computer security]] expert, who specializes in [[penetration testing]] and in other testing methodologies to ensure the security of an organization's [[information systems]].&lt;ref&gt;{{cite web|url=http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550882,00.html |title=What is white hat? - a definition from Whatis.com |publisher=Searchsecurity.techtarget.com |date= |accessdate=2012-06-06}}&lt;/ref&gt; [[Hacker ethic|Ethical hacking]] is a term coined by [[IBM]] meant to imply a broader category than just penetration testing.&lt;ref name=Knight&gt;{{cite journal|last=Knight|first=William|title=License to Hack|journal=InfoSecurity|date=16 October 2009|volume=6|issue=6|pages=38–41|url=http://www.infosecurity-magazine.com/view/4611/license-to-hack-ethical-hacking/|doi=10.1016/s1742-6847(09)70019-9}}&lt;/ref&gt;<br /> White-hat hackers may also work in teams called &quot;[[hacker (computer security)|sneakers]]&quot;,&lt;ref name= Secpoint&gt;{{cite web|url=http://www.secpoint.com/What-is-a-White-Hat.html |title=What is a White Hat? |publisher=Secpoint.com |date=2012-03-20 |accessdate=2012-06-06}}&lt;/ref&gt; [[red team]]s, or [[tiger team]]s,&lt;ref name=Palmer&gt;{{cite journal|last=Palmer|first=C.C.|title=Ethical Hacking|journal=IBM Systems Journal|year=2001|volume=40|issue=3|page=769|url=http://pdf.textfiles.com/security/palmer.pdf|doi=10.1147/sj.403.0769}}&lt;/ref&gt;[[WhiteHat Adda]].&lt;ref&gt;WhieHat Adda - The Programmer's Point&lt;/ref&gt;<br /> <br /> ==History==<br /> One of the first instances of an ethical hack being used was a &quot;security evaluation&quot; conducted by the United States Air Force of the Multics operating systems for &quot;potential use as a two-level (secret/top secret) system.&quot; Their evaluation found that while Multics was &quot;significantly better than other conventional systems,&quot;{{citation needed|date=May 2013}} it also had &quot;... vulnerabilities in hardware security, software security and procedural security&quot;{{citation needed|date=May 2013}} that could be uncovered with &quot;a relatively low level of effort.&quot;{{citation needed|date=May 2013}} The authors performed their tests under a guideline of realism, so that their results would accurately represent the kinds of access that an intruder could potentially achieve. They performed tests that were simple information-gathering exercises, as well as other tests that were outright attacks upon the system that might damage its integrity. Clearly, their audience wanted to know both results. There are several other now unclassified reports that describe ethical hacking activities within the U.S. military.&lt;ref name=Palmer /&gt; The idea to bring this tactic of ethical hacking to assess security of systems was formulated by [[Dan Farmer]] and [[Wietse Venema]]. With the goal of raising the overall level of security on the [[Internet]] and [[intranets]], they proceeded to describe how they were able to gather enough information about their targets to have been able to compromise security if they had chosen to do so. They provided several specific examples of how this information could be gathered and exploited to gain control of the target, and how such an attack could be prevented. They gathered up all the tools that they had used during their work, packaged them in a single, easy-to-use application, and gave it away to anyone who chose to download it. Their program, called [[Security Administrator Tool for Analyzing Networks]], or SATAN, was met with a great amount of media attention around the world in 1992.&lt;ref name= Palmer /&gt;<br /> <br /> ==Tactics==<br /> While penetration testing concentrates on attacking software and computer systems from the start&amp;nbsp;– scanning ports, examining known defects and patch installations, for example&amp;nbsp;– ethical hacking, which will likely include such things, is under no limitations when asked for by stake holders in the company. A full blown ethical hack might include emailing staff to ask for password details, rummaging through executive’s dustbins and usually breaking and entering&amp;nbsp;– all, of course, with NO knowledge and consent of the targets. ONLY the owners, CEO's and Board Members (stake holders) whom asked for such a security review of this magnitude are aware. A complete understanding, and sometimes if allowed by those stake holders, a complete non-understanding of the hack attempt is allowed to test penetration points. To try to replicate some of the destructive techniques a real attack might employ, ethical hackers may arrange for cloned test systems, or organize a hack late at night while systems are less critical.&lt;ref name= Knight /&gt; In most recent cases these hacks perpetuate for the long term con, (days, if not weeks, of long term human infiltration into an organization). Some examples include leaving USB/flash key drives with hidden auto-start software in a public area, as if someone lost the small drive and an unsuspecting employee found it and took it.<br /> <br /> Some other methods of carrying out these include:<br /> <br /> * [[Denial-of-service attack|DoS attack]]s<br /> * [[Social engineering (security)|Social engineering]] tactics<br /> * Security scanners such as:<br /> ** [[W3af]]<br /> ** [[Nessus (software)|Nessus]]<br /> ** Nexpose<br /> * Frameworks such as:<br /> ** [[Metasploit]]<br /> <br /> Such methods identify and [[Exploit (computer security)|exploit]] known [[Vulnerability (computing)|vulnerabilities]], and attempt to evade security to gain entry into secured areas. They are able to do this by hiding software and system 'back-doors' that could be used as a link to the information or access the non-ethical hacker, also known as 'black-hat' or 'grey-hat', may want to reach.<br /> <br /> ==Legality in the UK==<br /> Louis is a gay idiotStruan Robertson, legal director at Pinsent Masons LLP, and editor of [[OUT-LAW|OUT-LAW.com]], says &quot;Broadly speaking, if the access to a system is authorized, the hacking is ethical and legal. If it isn't, there's an offence under the [[Computer Misuse Act]]. The unauthorized access offence covers everything from guessing the password, to accessing someone's webmail account, to cracking the security of a bank. The maximum penalty for unauthorized access to a computer is two years in prison and a fine. There are higher penalties&amp;nbsp;– up to 10 years in prison&amp;nbsp;– when the hacker also modifies data&quot;. Unauthorized access even to expose vulnerabilities for the benefit of many is not legal, says Robertson. &quot;There's no defense in our hacking laws that your behavior is for the greater good. Even if it's what you believe.&quot;&lt;ref name=Knight /&gt;<br /> <br /> <br /> ==Employment==<br /> The United States [[National Security Agency]] offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team-management. Aggressor teams are called &quot;red&quot; teams. Defender teams are called &quot;blue&quot; teams.&lt;ref name=Secpoint /&gt;<br /> {{globalize/Eng|date=June 2011}}<br /> <br /> &lt;!-- PLEASE RESPECT ALPHABETICAL ORDER --&gt;<br /> <br /> ===List of prominent white hat hackers===<br /> * [[Eric Corley]]<br /> * [[Przemysław Frasunek]]<br /> * [[Raphael Gray]]<br /> * [[Barnaby Jack]]<br /> * [[Kevin Mitnick]]<br /> * [[Robert Tappan Morris]]<br /> * [[Kevin Poulsen]]<br /> <br /> ==See also==<br /> * [[Certified Ethical Hacker]]<br /> * [[:Category:Computer hacking|Computer hacking]] (category)<br /> * [[IT risk]]<br /> * [[Wireless identity theft]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> {{DEFAULTSORT:White Hat (Computer Security)}}<br /> [[Category:Hacking (computer security)]]<br /> <br /> [[ja:ハッカー#類語]]</div> 176.126.231.210 https://de.wikipedia.org/w/index.php?title=White_hat&diff=233318292 White hat 2015-03-04T10:41:48Z <p>176.126.231.210: </p> <hr /> <div>{{Computer hacking}}<br /> <br /> The term &quot;'''white hat'''&quot; in [[Internet slang]] refers to an ethical [[computer hacker]], or a [[computer security]] expert, who specializes in [[penetration testing]] and in other testing methodologies to ensure the security of an organization's [[information systems]].&lt;ref&gt;{{cite web|url=http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550882,00.html |title=What is white hat? - a definition from Whatis.com |publisher=Searchsecurity.techtarget.com |date= |accessdate=2012-06-06}}&lt;/ref&gt; [[Hacker ethic|Ethical hacking]] is a term coined by [[IBM]] meant to imply a broader category than just penetration testing.&lt;ref name=Knight&gt;{{cite journal|last=Knight|first=William|title=License to Hack|journal=InfoSecurity|date=16 October 2009|volume=6|issue=6|pages=38–41|url=http://www.infosecurity-magazine.com/view/4611/license-to-hack-ethical-hacking/|doi=10.1016/s1742-6847(09)70019-9}}&lt;/ref&gt;<br /> White-hat hackers may also work in teams called &quot;[[hacker (computer security)|sneakers]]&quot;,&lt;ref name= Secpoint&gt;{{cite web|url=http://www.secpoint.com/What-is-a-White-Hat.html |title=What is a White Hat? |publisher=Secpoint.com |date=2012-03-20 |accessdate=2012-06-06}}&lt;/ref&gt; [[red team]]s, or [[tiger team]]s,&lt;ref name=Palmer&gt;{{cite journal|last=Palmer|first=C.C.|title=Ethical Hacking|journal=IBM Systems Journal|year=2001|volume=40|issue=3|page=769|url=http://pdf.textfiles.com/security/palmer.pdf|doi=10.1147/sj.403.0769}}&lt;/ref&gt;[[WhiteHat Adda]].&lt;ref&gt;WhieHat Adda - The Programmer's Point&lt;/ref&gt;<br /> <br /> ==History==<br /> One of the first instances of an ethical hack being used was a &quot;security evaluation&quot; conducted by the United States Air Force of the Multics operating systems for &quot;potential use as a two-level (secret/top secret) system.&quot; Their evaluation found that while Multics was &quot;significantly better than other conventional systems,&quot;{{citation needed|date=May 2013}} it also had &quot;... vulnerabilities in hardware security, software security and procedural security&quot;{{citation needed|date=May 2013}} that could be uncovered with &quot;a relatively low level of effort.&quot;{{citation needed|date=May 2013}} The authors performed their tests under a guideline of realism, so that their results would accurately represent the kinds of access that an intruder could potentially achieve. They performed tests that were simple information-gathering exercises, as well as other tests that were outright attacks upon the system that might damage its integrity. Clearly, their audience wanted to know both results. There are several other now unclassified reports that describe ethical hacking activities within the U.S. military.&lt;ref name=Palmer /&gt; The idea to bring this tactic of ethical hacking to assess security of systems was formulated by [[Dan Farmer]] and [[Wietse Venema]]. With the goal of raising the overall level of security on the [[Internet]] and [[intranets]], they proceeded to describe how they were able to gather enough information about their targets to have been able to compromise security if they had chosen to do so. They provided several specific examples of how this information could be gathered and exploited to gain control of the target, and how such an attack could be prevented. They gathered up all the tools that they had used during their work, packaged them in a single, easy-to-use application, and gave it away to anyone who chose to download it. Their program, called [[Security Administrator Tool for Analyzing Networks]], or SATAN, was met with a great amount of media attention around the world in 1992.&lt;ref name= Palmer /&gt;<br /> <br /> ==Tactics==<br /> While penetration testing concentrates on attacking software and computer systems from the start&amp;nbsp;– scanning ports, examining known defects and patch installations, for example&amp;nbsp;– ethical hacking, which will likely include such things, is under no limitations when asked for by stake holders in the company. A full blown ethical hack might include emailing staff to ask for password details, rummaging through executive’s dustbins and usually breaking and entering&amp;nbsp;– all, of course, with NO knowledge and consent of the targets. ONLY the owners, CEO's and Board Members (stake holders) whom asked for such a security review of this magnitude are aware. A complete understanding, and sometimes if allowed by those stake holders, a complete non-understanding of the hack attempt is allowed to test penetration points. To try to replicate some of the destructive techniques a real attack might employ, ethical hackers may arrange for cloned test systems, or organize a hack late at night while systems are less critical.&lt;ref name= Knight /&gt; In most recent cases these hacks perpetuate for the long term con, (days, if not weeks, of long term human infiltration into an organization). Some examples include leaving USB/flash key drives with hidden auto-start software in a public area, as if someone lost the small drive and an unsuspecting employee found it and took it.<br /> <br /> Some other methods of carrying out these include:<br /> <br /> * [[Denial-of-service attack|DoS attack]]s<br /> * [[Social engineering (security)|Social engineering]] tactics<br /> * Security scanners such as:<br /> ** [[W3af]]<br /> ** [[Nessus (software)|Nessus]]<br /> ** Nexpose<br /> * Frameworks such as:<br /> ** [[Metasploit]]<br /> <br /> Such methods identify and [[Exploit (computer security)|exploit]] known [[Vulnerability (computing)|vulnerabilities]], and attempt to evade security to gain entry into secured areas. They are able to do this by hiding software and system 'back-doors' that could be used as a link to the information or access the non-ethical hacker, also known as 'black-hat' or 'grey-hat', may want to reach.<br /> <br /> ==Legality in the UK==<br /> Louis is a gay <br /> Struan Robertson, legal director at Pinsent Masons LLP, and editor of [[OUT-LAW|OUT-LAW.com]], says &quot;Broadly speaking, if the access to a system is authorized, the hacking is ethical and legal. If it isn't, there's an offence under the [[Computer Misuse Act]]. The unauthorized access offence covers everything from guessing the password, to accessing someone's webmail account, to cracking the security of a bank. The maximum penalty for unauthorized access to a computer is two years in prison and a fine. There are higher penalties&amp;nbsp;– up to 10 years in prison&amp;nbsp;– when the hacker also modifies data&quot;. Unauthorized access even to expose vulnerabilities for the benefit of many is not legal, says Robertson. &quot;There's no defense in our hacking laws that your behavior is for the greater good. Even if it's what you believe.&quot;&lt;ref name=Knight /&gt;<br /> <br /> ==Employment==<br /> The United States [[National Security Agency]] offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team-management. Aggressor teams are called &quot;red&quot; teams. Defender teams are called &quot;blue&quot; teams.&lt;ref name=Secpoint /&gt;<br /> {{globalize/Eng|date=June 2011}}<br /> <br /> &lt;!-- PLEASE RESPECT ALPHABETICAL ORDER --&gt;<br /> <br /> ===List of prominent white hat hackers===<br /> * [[Eric Corley]]<br /> * [[Przemysław Frasunek]]<br /> * [[Raphael Gray]]<br /> * [[Barnaby Jack]]<br /> * [[Kevin Mitnick]]<br /> * [[Robert Tappan Morris]]<br /> * [[Kevin Poulsen]]<br /> <br /> ==See also==<br /> * [[Certified Ethical Hacker]]<br /> * [[:Category:Computer hacking|Computer hacking]] (category)<br /> * [[IT risk]]<br /> * [[Wireless identity theft]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> {{DEFAULTSORT:White Hat (Computer Security)}}<br /> [[Category:Hacking (computer security)]]<br /> <br /> [[ja:ハッカー#類語]]</div> 176.126.231.210 https://de.wikipedia.org/w/index.php?title=White_hat&diff=233318290 White hat 2015-03-04T10:37:08Z <p>176.126.231.210: </p> <hr /> <div>{{Computer hacking}}<br /> <br /> The term &quot;'''white hat'''&quot; in [[Internet slang]] refers to an ethical [[computer hacker]], or a [[computer security]] expert, who specializes in [[penetration testing]] and in other testing methodologies to ensure the security of an organization's [[information systems]].&lt;ref&gt;{{cite web|url=http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550882,00.html |title=What is white hat? - a definition from Whatis.com |publisher=Searchsecurity.techtarget.com |date= |accessdate=2012-06-06}}&lt;/ref&gt; [[Hacker ethic|Ethical hacking]] is a term coined by [[IBM]] meant to imply a broader category than just penetration testing.&lt;ref name=Knight&gt;{{cite journal|last=Knight|first=William|title=License to Hack|journal=InfoSecurity|date=16 October 2009|volume=6|issue=6|pages=38–41|url=http://www.infosecurity-magazine.com/view/4611/license-to-hack-ethical-hacking/|doi=10.1016/s1742-6847(09)70019-9}}&lt;/ref&gt;<br /> White-hat hackers may also work in teams called &quot;[[hacker (computer security)|sneakers]]&quot;,&lt;ref name= Secpoint&gt;{{cite web|url=http://www.secpoint.com/What-is-a-White-Hat.html |title=What is a White Hat? |publisher=Secpoint.com |date=2012-03-20 |accessdate=2012-06-06}}&lt;/ref&gt; [[red team]]s, or [[tiger team]]s,&lt;ref name=Palmer&gt;{{cite journal|last=Palmer|first=C.C.|title=Ethical Hacking|journal=IBM Systems Journal|year=2001|volume=40|issue=3|page=769|url=http://pdf.textfiles.com/security/palmer.pdf|doi=10.1147/sj.403.0769}}&lt;/ref&gt;[[WhiteHat Adda]].&lt;ref&gt;WhieHat Adda - The Programmer's Point&lt;/ref&gt;<br /> <br /> ==History==<br /> One of the first instances of an ethical hack being used was a &quot;security evaluation&quot; conducted by the United States Air Force of the Multics operating systems for &quot;potential use as a two-level (secret/top secret) system.&quot; Their evaluation found that while Multics was &quot;significantly better than other conventional systems,&quot;{{citation needed|date=May 2013}} it also had &quot;... vulnerabilities in hardware security, software security and procedural security&quot;{{citation needed|date=May 2013}} that could be uncovered with &quot;a relatively low level of effort.&quot;{{citation needed|date=May 2013}} The authors performed their tests under a guideline of realism, so that their results would accurately represent the kinds of access that an intruder could potentially achieve. They performed tests that were simple information-gathering exercises, as well as other tests that were outright attacks upon the system that might damage its integrity. Clearly, their audience wanted to know both results. There are several other now unclassified reports that describe ethical hacking activities within the U.S. military.&lt;ref name=Palmer /&gt; The idea to bring this tactic of ethical hacking to assess security of systems was formulated by [[Dan Farmer]] and [[Wietse Venema]]. With the goal of raising the overall level of security on the [[Internet]] and [[intranets]], they proceeded to describe how they were able to gather enough information about their targets to have been able to compromise security if they had chosen to do so. They provided several specific examples of how this information could be gathered and exploited to gain control of the target, and how such an attack could be prevented. They gathered up all the tools that they had used during their work, packaged them in a single, easy-to-use application, and gave it away to anyone who chose to download it. Their program, called [[Security Administrator Tool for Analyzing Networks]], or SATAN, was met with a great amount of media attention around the world in 1992.&lt;ref name= Palmer /&gt;<br /> <br /> ==Tactics==<br /> While penetration testing concentrates on attacking software and computer systems from the start&amp;nbsp;– scanning ports, examining known defects and patch installations, for example&amp;nbsp;– ethical hacking, which will likely include such things, is under no limitations when asked for by stake holders in the company. A full blown ethical hack might include emailing staff to ask for password details, rummaging through executive’s dustbins and usually breaking and entering&amp;nbsp;– all, of course, with NO knowledge and consent of the targets. ONLY the owners, CEO's and Board Members (stake holders) whom asked for such a security review of this magnitude are aware. A complete understanding, and sometimes if allowed by those stake holders, a complete non-understanding of the hack attempt is allowed to test penetration points. To try to replicate some of the destructive techniques a real attack might employ, ethical hackers may arrange for cloned test systems, or organize a hack late at night while systems are less critical.&lt;ref name= Knight /&gt; In most recent cases these hacks perpetuate for the long term con, (days, if not weeks, of long term human infiltration into an organization). Some examples include leaving USB/flash key drives with hidden auto-start software in a public area, as if someone lost the small drive and an unsuspecting employee found it and took it.<br /> <br /> Some other methods of carrying out these include:<br /> <br /> * [[Denial-of-service attack|DoS attack]]s<br /> * [[Social engineering (security)|Social engineering]] tactics<br /> * Security scanners such as:<br /> ** [[W3af]]<br /> ** [[Nessus (software)|Nessus]]<br /> ** Nexpose<br /> * Frameworks such as:<br /> ** [[Metasploit]]<br /> <br /> Such methods identify and [[Exploit (computer security)|exploit]] known [[Vulnerability (computing)|vulnerabilities]], and attempt to evade security to gain entry into secured areas. They are able to do this by hiding software and system 'back-doors' that could be used as a link to the information or access the non-ethical hacker, also known as 'black-hat' or 'grey-hat', may want to reach.<br /> <br /> ==Legality in the UK==<br /> I believe Louis is gay, he told me and he also said joe touched him. <br /> The United States [[National Security Agency]] offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques /&gt;<br /> <br /> ==Employment==<br /> The United States [[National Security Agency]] offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team-management. Aggressor teams are called &quot;red&quot; teams. Defender teams are called &quot;blue&quot; teams.&lt;ref name=Secpoint /&gt;<br /> {{globalize/Eng|date=June 2011}}<br /> <br /> &lt;!-- PLEASE RESPECT ALPHABETICAL ORDER --&gt;<br /> <br /> ===List of prominent white hat hackers===<br /> * [[Eric Corley]]<br /> * [[Przemysław Frasunek]]<br /> * [[Raphael Gray]]<br /> * [[Barnaby Jack]]<br /> * [[Kevin Mitnick]]<br /> * [[Robert Tappan Morris]]<br /> * [[Kevin Poulsen]]<br /> <br /> ==See also==<br /> * [[Certified Ethical Hacker]]<br /> * [[:Category:Computer hacking|Computer hacking]] (category)<br /> * [[IT risk]]<br /> * [[Wireless identity theft]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> {{DEFAULTSORT:White Hat (Computer Security)}}<br /> [[Category:Hacking (computer security)]]<br /> <br /> [[ja:ハッカー#類語]]</div> 176.126.231.210 https://de.wikipedia.org/w/index.php?title=White_hat&diff=233318289 White hat 2015-03-04T10:35:33Z <p>176.126.231.210: </p> <hr /> <div>{{Computer hacking}}<br /> <br /> The term &quot;'''white hat'''&quot; in [[Internet slang]] refers to an ethical [[computer hacker]], or a [[computer security]] expert, who specializes in [[penetration testing]] and in other testing methodologies to ensure the security of an organization's [[information systems]].&lt;ref&gt;{{cite web|url=http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550882,00.html |title=What is white hat? - a definition from Whatis.com |publisher=Searchsecurity.techtarget.com |date= |accessdate=2012-06-06}}&lt;/ref&gt; [[Hacker ethic|Ethical hacking]] is a term coined by [[IBM]] meant to imply a broader category than just penetration testing.&lt;ref name=Knight&gt;{{cite journal|last=Knight|first=William|title=License to Hack|journal=InfoSecurity|date=16 October 2009|volume=6|issue=6|pages=38–41|url=http://www.infosecurity-magazine.com/view/4611/license-to-hack-ethical-hacking/|doi=10.1016/s1742-6847(09)70019-9}}&lt;/ref&gt;<br /> White-hat hackers may also work in teams called &quot;[[hacker (computer security)|sneakers]]&quot;,&lt;ref name= Secpoint&gt;{{cite web|url=http://www.secpoint.com/What-is-a-White-Hat.html |title=What is a White Hat? |publisher=Secpoint.com |date=2012-03-20 |accessdate=2012-06-06}}&lt;/ref&gt; [[red team]]s, or [[tiger team]]s,&lt;ref name=Palmer&gt;{{cite journal|last=Palmer|first=C.C.|title=Ethical Hacking|journal=IBM Systems Journal|year=2001|volume=40|issue=3|page=769|url=http://pdf.textfiles.com/security/palmer.pdf|doi=10.1147/sj.403.0769}}&lt;/ref&gt;[[WhiteHat Adda]].&lt;ref&gt;WhieHat Adda - The Programmer's Point&lt;/ref&gt;<br /> <br /> ==History==<br /> One of the first instances of an ethical hack being used was a &quot;security evaluation&quot; conducted by the United States Air Force of the Multics operating systems for &quot;potential use as a two-level (secret/top secret) system.&quot; Their evaluation found that while Multics was &quot;significantly better than other conventional systems,&quot;{{citation needed|date=May 2013}} it also had &quot;... vulnerabilities in hardware security, software security and procedural security&quot;{{citation needed|date=May 2013}} that could be uncovered with &quot;a relatively low level of effort.&quot;{{citation needed|date=May 2013}} The authors performed their tests under a guideline of realism, so that their results would accurately represent the kinds of access that an intruder could potentially achieve. They performed tests that were simple information-gathering exercises, as well as other tests that were outright attacks upon the system that might damage its integrity. Clearly, their audience wanted to know both results. There are several other now unclassified reports that describe ethical hacking activities within the U.S. military.&lt;ref name=Palmer /&gt; The idea to bring this tactic of ethical hacking to assess security of systems was formulated by [[Dan Farmer]] and [[Wietse Venema]]. With the goal of raising the overall level of security on the [[Internet]] and [[intranets]], they proceeded to describe how they were able to gather enough information about their targets to have been able to compromise security if they had chosen to do so. They provided several specific examples of how this information could be gathered and exploited to gain control of the target, and how such an attack could be prevented. They gathered up all the tools that they had used during their work, packaged them in a single, easy-to-use application, and gave it away to anyone who chose to download it. Their program, called [[Security Administrator Tool for Analyzing Networks]], or SATAN, was met with a great amount of media attention around the world in 1992.&lt;ref name= Palmer /&gt;<br /> <br /> ==Tactics==<br /> While penetration testing concentrates on attacking software and computer systems from the start&amp;nbsp;– scanning ports, examining known defects and patch installations, for example&amp;nbsp;– ethical hacking, which will likely include such things, is under no limitations when asked for by stake holders in the company. A full blown ethical hack might include emailing staff to ask for password details, rummaging through executive’s dustbins and usually breaking and entering&amp;nbsp;– all, of course, with NO knowledge and consent of the targets. ONLY the owners, CEO's and Board Members (stake holders) whom asked for such a security review of this magnitude are aware. A complete understanding, and sometimes if allowed by those stake holders, a complete non-understanding of the hack attempt is allowed to test penetration points. To try to replicate some of the destructive techniques a real attack might employ, ethical hackers may arrange for cloned test systems, or organize a hack late at night while systems are less critical.&lt;ref name= Knight /&gt; In most recent cases these hacks perpetuate for the long term con, (days, if not weeks, of long term human infiltration into an organization). Some examples include leaving USB/flash key drives with hidden auto-start software in a public area, as if someone lost the small drive and an unsuspecting employee found it and took it.<br /> <br /> Some other methods of carrying out these include:<br /> <br /> * [[Denial-of-service attack|DoS attack]]s<br /> * [[Social engineering (security)|Social engineering]] tactics<br /> * Security scanners such as:<br /> ** [[W3af]]<br /> ** [[Nessus (software)|Nessus]]<br /> ** Nexpose<br /> * Frameworks such as:<br /> ** [[Metasploit]]<br /> <br /> Such methods identify and [[Exploit (computer security)|exploit]] known [[Vulnerability (computing)|vulnerabilities]], and attempt to evade security to gain entry into secured areas. They are able to do this by hiding software and system 'back-doors' that could be used as a link to the information or access the non-ethical hacker, also known as 'black-hat' or 'grey-hat', may want to reach.<br /> <br /> ==Legality in the UK==<br /> The leagity in this is none and Louis is gay btw <br /> The United States [[National Security Agency]] offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques /&gt;<br /> <br /> ==Employment==<br /> The United States [[National Security Agency]] offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team-management. Aggressor teams are called &quot;red&quot; teams. Defender teams are called &quot;blue&quot; teams.&lt;ref name=Secpoint /&gt;<br /> {{globalize/Eng|date=June 2011}}<br /> <br /> &lt;!-- PLEASE RESPECT ALPHABETICAL ORDER --&gt;<br /> <br /> ===List of prominent white hat hackers===<br /> * [[Eric Corley]]<br /> * [[Przemysław Frasunek]]<br /> * [[Raphael Gray]]<br /> * [[Barnaby Jack]]<br /> * [[Kevin Mitnick]]<br /> * [[Robert Tappan Morris]]<br /> * [[Kevin Poulsen]]<br /> <br /> ==See also==<br /> * [[Certified Ethical Hacker]]<br /> * [[:Category:Computer hacking|Computer hacking]] (category)<br /> * [[IT risk]]<br /> * [[Wireless identity theft]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> {{DEFAULTSORT:White Hat (Computer Security)}}<br /> [[Category:Hacking (computer security)]]<br /> <br /> [[ja:ハッカー#類語]]</div> 176.126.231.210