Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Grey Hat Hacker

No description

Nada Alsattari

on 17 May 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Grey Hat Hacker

Grey hat

Let's start!
Nada ziyad

Nowadays Hacking has been one of the common practices made by the computer expert in order to try and find vulnerabilities in a network infrastructure.

Hacking Refers Mainly To Ability Of
One To Understand The Computers Very Deeply And Change its Inner Mechanism Without Having Enough Permissions.
So that hacker is a clever programmer that doing the hacking. [1]


type of

Black Hat Hackers
black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols.
They are also responsible for writing malware, which is a method used to gain access to these systems.
Their primary motivation is usually for personal or financial gain, but they can also be involved in cyber espionage, protest or perhaps are just addicted to the thrill of cyber crime.
Not only do black hat hackers seek to steal data, they also seek to modify or destroy data as well.(3)
White hat hackers choose to use their powers for good rather than evil. Also known as “ethical hackers,”
White hat hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.
White hat hackers employ the same methods of hacking as black hats, with one exception- they do it with permission from the owner of the system first, which makes the process completely legal.
White hat hackers perform penetration testing, test in-place security systems and perform vulnerability assessments for companies. (3)

White hat hacker
Grey Hat Hacker
A gray-hat hacker falls somewhere between a black hat and a white hat. A gray hat doesn’t work for their own personal gain or to cause carnage, but they may technically commit crimes and do arguably unethical things.

A gray-hat hacker might attempt to compromise a computer system without permission, informing the organization after the fact and allowing them to fix the problem.
While the gray-hat hacker didn’t use their access for bad purposes, they compromised a security system without permission, which is illegal.
If a gray-hat hacker discovers a security flaw in a piece of software or on a website, they may disclose the flaw publically instead of privately disclosing the flaw to the organization and giving them time to fix it.
They wouldn’t take advantage of the flaw for their own personal gain — that would be black-hat behavior — but the public disclosure could cause carnage as black-hat hackers tried to take advantage of the flaw before it was fixed.(1)
The terms come from old spaghetti westerns, where the bad guy wears a black cowboy hat, and the good guy wears a white hat. (3)
There are two main factors that determine the type of hacker you’re dealing with: their motivations, and whether or not they are breaking the law. (3)
The threat may come from inside the organization, from disgruntled employees or consultants, or from the outside, from ex-employees, competitors, malicious hackers, or even terrorists.
Common examples of security exploits are SQL injection, cross-site scripting and cross-site request forgery which abuse security holes that may result from substandard programming practice.
Tools & Security exploits
Hackers aren't inherently bad — the word “hacker” doesn't mean “criminal” or “bad guy.” Geeks and tech writers often refer to “black hat,” “white hat,” and “gray hat” hackers. [2]
Technology, Software, Laws/acts/organization for gray hat
Digital forgery
Hacking technologies
Fraud technologies
Scanners High tech
Printers Espionage devices

Viruses & worms,
Hacking software,
Click fraud software
Online Auctions,
Online stock market.

Laws / Organizations
EFF (Electronic Frontier Foundation)

Technology, Software, Laws/acts/organization against gray hat :
Anti viruses,
Anti phishing
Anti pharming,
Spam filtering,
Firewall servers

Laws / Organizations
DMCA( Digital Millennium Copyright Act)
In 2011 the Sony entertainment network was hacked by a grey hat hacker
Sony disregarded with assumption that the hacker will not attempt anything malicious
So he posted over 50 million users email , and other security information online.
Sony PlayStation network was down for 24 days costing Sony 171.000.000 $
Also Sony lack of attention to the hacker at first solidifies
The fact that even though its prominent of companies would never pressed charges against the seemingly inconsequential grey hat hackers potentially just as dangerous as black hat hackers .
If that hacker had not posted the information online Sony would never have known that he stole so much user account information ..
Companies need to realize just how dangerous these grey hat hacker can be and start to prosecute them or malicious hackers will catch on and pretend to have good intentions .
Companies all over the world need to act against grey hat hacker in the same fashion they would against a malicious and press charges .
Thank You
Case EX
Table of content
Types of Hackers
Tools & Security exploits
Technology for/against
Software for/against
Laws/acts/organization for/against
Case Example
Full transcript