Hacker Techniques, Tools, and
Incident Handling
Chapter 1
Hacking: The Next Generation
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Learning Objective and Key
Concepts
Learning Objective
Explore the history and current state of hacking and
penetration testing, including their ethical and legal
implications.
Key Concepts
Birth and evolution of hacking
Ethical hacking and penetration testing in relation to
black and white-hat activities
Laws and ethical standards for penetration testers
and ethical hackers
Hacker Techniques, Tools, and Incident Handling
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 2
DISCOVER: CONCEPTS
Hacker Techniques, Tools, and Incident Handling
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 3
History of Hacking
1990s
1980s
1970s
Pre 1970
First Hacking
Conference,
First Hacker
Polymorphic Codes
Groups, Bulletin
in Viruses
Boards
Early Viruses,
Phone Phreaking
Hacking as skillful
modification of systems
Hacker Techniques, Tools, and Incident Handling
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 4
Modern Hacking and
Cybercriminals
Transformation of hobbyist hacking to
cybercrime
Cybercriminals seeking profits by aiming at
financial data, industry information, and
other valuable targets
Emergence of national laws to counter
cyber attacks
Hacker Techniques, Tools, and Incident Handling
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 5
Types of Hackers
Black hats break into computer systems or
use them without authorization.
Gray hats walk the line between legal and
illegal actions.
White...