SlideShare a Scribd company logo
SEMINAR ON
ETHICAL HACKING
PRESENTED BY:
DEVENDRA KUMAR YADAV
1
ELECTRICAL AND ELECTRONICS DEPARTMENT
G. L. BAJAJ INSTITUTE OF TECHNOLOGY AND MANAGEMENT
CONTENT
 What is Hacking?
 What is Ethical Hacking?
 Types of Hackers
 Phases of Hacking
 Countermeasures
 Recent cases of Hacking
 References
What is Hacking?
Hacking refers to exploiting system vulnerabilities and
compromising security controls to gain unauthorised or
inappropriate access to the system resources.
It involves modifying system or application features to achieve a
goal outside of the creator’s original purpose.
Hacking can be used to steal and redistribute intellectual property
leading to business loss.
What is Ethical Hacking?
Ethical Hacking
involves the use of
hacking tools, tricks and
techniques to identify
vulnerabilities so as to
ensure system security.
It focuses on stimulating
techniques used by
attackers to verify the
existence of exploitable
vulnerabilities in the
system.
Types of Hackers
White Hat
Black Hat
Grey Hat
Individuals professing
hackers skills and using
them for the defensive
purpose also known as
Security Analysts.
Individuals with
extraordinary computing
skills, resorting to
malicious or destructive
activities and are also
known as Crackers.
Individuals who work
both offensive and
defensive at various
works.
Phases of Hacking
Clearing
Tracks
Maintaining
Access
Gaining
Access
Scanning
Reconnaiss
ance
Hacking Phases: Reconnaissance
Reconnaissance
Scanning
Gaining
Access
Maintaining
Access
Clearing
Tracks
Reconnaissance refers to a preparatory phase
where an attackers seeks to gather
information about a target prior to launching
an attack.
Could be the future point of return, noted for
ease of entry for an attack when more about
the target is known on a board scale.
Reconnaissance target range may include
the target organization’s clients employee,
operations, network and systems.
Reconna
issance
Scanning
Gaining
Access
Hacking Phases: Scanning
Clearing
Tracks
Maintaining
Access
 Pre-Attack Phase: Scanning refers to the
pre-attack phase when the attackers scans the
networks for specific information gathered
during reconnaissance.
 Port Scanner: Scanning can include use of
diameter, port scanner’s, network mapper,
ping tools, vulnerabilities scanner etc.
 Extract Information: Attackers extract
information such as live machines, port, port
status, OS details, device type, system
uptime, etc to launch attack.
Hacking Phases: Gaining Access
Reconnai
ssance
Maintaining
Access
Clearing
Tracks
Scanning
Gaining
Access
Gaining access refers to the point where the
attacker obtains access to the operating system or
applications on the computer or network.
The Attackers can escalate privileges to obtain
complete control of the system. In the process,
intermediate systems that are connected to it are
also compromised.
The attacker can gain access at the operating
system level, application level, or network level.
Example include password cracking, buffer
overflows, denial of service, session hijacking
etc.
Hacking Phase: Maintaining Access
Reconnai
ssance
Maintaining
Access
Scanning
Gaining
Access
Clearing
Tracks
 Maintaining access refers to the phase when the
attackers tries to retain his or her ownership of the
system.
 Attackers may prevent the system from being
owned by other attackers by securing their
exclusive access with Blackdoor, Rootkits, or
Trojans.
 Attackers can upload, download or manipulate
data, applications and configurations on the owned
system.
 Attackers use the compromised system to launch
further attacks
Hacking Phase: Clearing Tracks
Reconnais
sance
Scanning
Gaining
Access
Maintaining
Access
Clearing
Tracks
 Covering tracks refers to the activities carried
out by an attacker to hide malicious acts.
 The attackers intentions includes: Continuing
access to the victim’s system, remaining
unnoticed and uncaught, deleting evidence
that might lead to his prosecution.
 The attackers overwrites the serve, system
and application logs to avoid suspicion.
Countermeasures
 Do not responds to the Phishing email and calls.
 Regularly change password of the accounts & try to use
special characters in the password.
 To avoid atm fraud try not to swipe atm card at any random
shop & change pin within months.
 Do not reveal any personal information on the social
networking sites such as on Facebook and Twitter.
Recent Cases of Hacking
 In August 2013, 1 billion
yahoo mail account passwords
has been leaked and the
information were compromised.
This is one of biggest data
breach in the history.
 3.2 million SBI bank account
was hacked by the hackers of
China and unauthorised transection
is done, this is the biggest breach in
the history of the Indian bank.
References
 Kimberly Graves. “CEH: Certified Ethical Hacker Study Guide”, John Wiley &
Sons, Inc.
 C. Palmer. “Ethical hacking”, IBM SYSTEMS JOURNAL, VOL 40, NO 3, 2001.
 Steven DeFino, Larry Greenblatt. “CEH: Certified Ethical Hacker Review Guide
version7.1”
 Ethical Hacking – GIAC, URL: www.giac.org/paper/gsec/2468/ethical-
hacking/104292

More Related Content

What's hot

Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid
 
Denial of service
Denial of serviceDenial of service
Denial of service
garishma bhatia
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
Anushakp9
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
Adri Jovin
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
SHAHID ANSARI
 
Cyber security
Cyber securityCyber security
Cyber security
Nimesh Gajjar
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
AniketPandit18
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
Maxime ALAY-EDDINE
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
Sunny Sundeep
 

What's hot (20)

Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 

Similar to Ethical hacking

Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
youfanlimboo
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aditya Vikram Singhania
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
Yogesh Chauhan
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Nathan Mathis
 
EthicalHacking.pptx
EthicalHacking.pptxEthicalHacking.pptx
EthicalHacking.pptx
DrPrabakaranPerumal
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
Janani S
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
BishalRay8
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
 
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptxDomain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Infosectrain3
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
johnnymaaza
 
Ethical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive CheatsheetEthical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive Cheatsheet
Megawatt Content Marketing
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
ShivamSharma909
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
ankit gandharkar
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
JawaidAbdulHameed
 

Similar to Ethical hacking (20)

Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
 
EthicalHacking.pptx
EthicalHacking.pptxEthicalHacking.pptx
EthicalHacking.pptx
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptxDomain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
Ethical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive CheatsheetEthical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive Cheatsheet
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Denish Jangid
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
Nguyen Thanh Tu Collection
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
Special education needs
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 

Ethical hacking

  • 1. SEMINAR ON ETHICAL HACKING PRESENTED BY: DEVENDRA KUMAR YADAV 1 ELECTRICAL AND ELECTRONICS DEPARTMENT G. L. BAJAJ INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 2. CONTENT  What is Hacking?  What is Ethical Hacking?  Types of Hackers  Phases of Hacking  Countermeasures  Recent cases of Hacking  References
  • 3. What is Hacking? Hacking refers to exploiting system vulnerabilities and compromising security controls to gain unauthorised or inappropriate access to the system resources. It involves modifying system or application features to achieve a goal outside of the creator’s original purpose. Hacking can be used to steal and redistribute intellectual property leading to business loss.
  • 4. What is Ethical Hacking? Ethical Hacking involves the use of hacking tools, tricks and techniques to identify vulnerabilities so as to ensure system security. It focuses on stimulating techniques used by attackers to verify the existence of exploitable vulnerabilities in the system.
  • 5. Types of Hackers White Hat Black Hat Grey Hat Individuals professing hackers skills and using them for the defensive purpose also known as Security Analysts. Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as Crackers. Individuals who work both offensive and defensive at various works.
  • 7. Hacking Phases: Reconnaissance Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks Reconnaissance refers to a preparatory phase where an attackers seeks to gather information about a target prior to launching an attack. Could be the future point of return, noted for ease of entry for an attack when more about the target is known on a board scale. Reconnaissance target range may include the target organization’s clients employee, operations, network and systems.
  • 8. Reconna issance Scanning Gaining Access Hacking Phases: Scanning Clearing Tracks Maintaining Access  Pre-Attack Phase: Scanning refers to the pre-attack phase when the attackers scans the networks for specific information gathered during reconnaissance.  Port Scanner: Scanning can include use of diameter, port scanner’s, network mapper, ping tools, vulnerabilities scanner etc.  Extract Information: Attackers extract information such as live machines, port, port status, OS details, device type, system uptime, etc to launch attack.
  • 9. Hacking Phases: Gaining Access Reconnai ssance Maintaining Access Clearing Tracks Scanning Gaining Access Gaining access refers to the point where the attacker obtains access to the operating system or applications on the computer or network. The Attackers can escalate privileges to obtain complete control of the system. In the process, intermediate systems that are connected to it are also compromised. The attacker can gain access at the operating system level, application level, or network level. Example include password cracking, buffer overflows, denial of service, session hijacking etc.
  • 10. Hacking Phase: Maintaining Access Reconnai ssance Maintaining Access Scanning Gaining Access Clearing Tracks  Maintaining access refers to the phase when the attackers tries to retain his or her ownership of the system.  Attackers may prevent the system from being owned by other attackers by securing their exclusive access with Blackdoor, Rootkits, or Trojans.  Attackers can upload, download or manipulate data, applications and configurations on the owned system.  Attackers use the compromised system to launch further attacks
  • 11. Hacking Phase: Clearing Tracks Reconnais sance Scanning Gaining Access Maintaining Access Clearing Tracks  Covering tracks refers to the activities carried out by an attacker to hide malicious acts.  The attackers intentions includes: Continuing access to the victim’s system, remaining unnoticed and uncaught, deleting evidence that might lead to his prosecution.  The attackers overwrites the serve, system and application logs to avoid suspicion.
  • 12. Countermeasures  Do not responds to the Phishing email and calls.  Regularly change password of the accounts & try to use special characters in the password.  To avoid atm fraud try not to swipe atm card at any random shop & change pin within months.  Do not reveal any personal information on the social networking sites such as on Facebook and Twitter.
  • 13. Recent Cases of Hacking  In August 2013, 1 billion yahoo mail account passwords has been leaked and the information were compromised. This is one of biggest data breach in the history.  3.2 million SBI bank account was hacked by the hackers of China and unauthorised transection is done, this is the biggest breach in the history of the Indian bank.
  • 14. References  Kimberly Graves. “CEH: Certified Ethical Hacker Study Guide”, John Wiley & Sons, Inc.  C. Palmer. “Ethical hacking”, IBM SYSTEMS JOURNAL, VOL 40, NO 3, 2001.  Steven DeFino, Larry Greenblatt. “CEH: Certified Ethical Hacker Review Guide version7.1”  Ethical Hacking – GIAC, URL: www.giac.org/paper/gsec/2468/ethical- hacking/104292