SlideShare a Scribd company logo
1 of 16
Download to read offline
ETHICAL HACKING AND
SYSTEM ADMINISTRATION
By Rajan Maharjan
 Hacking
 Types of Hackers
 Ethical Hacking
 System Administrator
 Administration includes
 Skills and Prerequisites
 Career in ethical hacking and system
administration
 Hacking is unauthorized use of computer
and network resources.
 According to Computer Crime Research
Center:“It is act of gaining access
without legal authorization to computer
or computer network.”
 Dec 04 2013
Hackers Compromise 2 Million
Facebook, Twitter and Gmail Accounts
http://mashable.com/2013/12/04/hackers-facebook-twitter-gmail/
 Jan 29 2014
GoDaddy Admits Hacker’s Social
Engineering Led It To Divulge Info In
@N Twitter Account Hack
http://techcrunch.com/2014/01/29/godaddy-admits-hackers-social-engineering-
led-it-to-divulge-info-in-n-twitter-account-hack/
 Record-breaking DDoS attack in
Europe hits 400Gbps
http://news.cnet.com/8301-1009_3-57618762-83/record-breaking-ddos-attack-
in-europe-hits-400gbps/
The term hacker has dual usage in modern
days but was defined in early days as:
HACKER noun
1.A person who enjoys learning the details of
computer systems and how to stretch their
capabilities—as opposed to most users of
computers, who prefer to learn only the
minimum
amount necessary.
2. One who programs enthusiastically or who
enjoys programming rather than just theorizing
about programming.
TYPES OF HACKERS
 Black hats :– highly skilled, malicious,
destructive “crackers” ; offensive
 White hats – skills used for defensive
security analysts ; defensive
 Gray hats – offensively and defensively;
will hack for different reasons, depends
on situation.
ETHICAL HACKING
 Ethical hacking ,also known as penetration
testing or white-hat hacking with the
permission of the target.
 involves the same tools, tricks, and
techniques that hackers use, i.e, by
duplicating the intent and actions of
malicious hacker.
Ethical Hackers
 Trustworthy security professional
 Applies hacking skills for defensive purpose
 Has very strong programming skill and system
understanding
 Firewalls: configurations, and operation of
intrusion detection systems.
 License to hack
 The International Council of E-Commerce
Consultants (EC-Council) provides a professional
certification for Certified Ethical Hackers (CEH).
ETHICAL HACKING PROCESS
1. Preparation
 Identification of target – website, mail server
etc.
 Signing of contract
 Agreement on protection against any legal
issue.
 Contracts to clearly specify limits and
dangers of the test.
 Total time for testing.
 Key people made aware of testing.
ETHICAL HACKING PROCESS CONTD..
2. FOOTPRINTING
 Collecting required information about target:
DNS server. IP ranges. Administrative
contacts. Problem reveled by administrator.
3. ENUMERATION AND FINGERPRINTING
 Operating system enumeration. Identification of
services/open port.
3. IDENTIFICATION OF VULNERABILITIES:
 Vulnerabilities Insecure configuration. Weak
passwords. Insecure programming. Weak
access control.
SYSTEM ADMINISTRATOR
 A system administrator, or sysadmin, is a
person who is responsible for the upkeep,
configuration, and reliable operation of
computer systems; especially multi-user
computers, such as servers.
Network administrator
Database administrator
System Engineer
IT Engineer
ROLES OF SYSADMIN
 Installing, maintaining and troubleshooting
workstations, servers, OSs, software applications and
other computing systems
 Creating user accounts and assigning user
permissions
 Security and Firewall Setup
 Creating backup and retrieval policies and assigning
bulk storage
 Creating System and network monitoring systems
 Updating systems upon release of new OSs or software
ROLES OF SYSADMIN CONTD..
 Strategic planning for service and system outages
 Light programming or scripting System-related project
management
 User training and management High-level technical
knowledge and technical support experience
 Hardware and software system security, such as
protection against hardware theft and abuse,
malware/spyware and unauthorized use of systems
and components, including firewall and intrusion
detection system(IDS)
DESIRED TRAITS AND SKILLS
 Deep understanding of system and netwoking
 Cloud Technology
 Linux
 Virtualization
 Routing Protocols and Layers (IP,TCP, OSPF)
 Scripting ( bash, python, powershell etc)
 Database administration
 Certifications ( MCSE,RHCE, CCNA, CEH etc ) *
 Problem solving ability
 Multitasking
 Patience
CAREER OPPORTUNITIES
 Local and global opportunities
 Software Companies
 Banks
 ISPs
 Department of IT in all companies
 Freelancing
 Lot more
THANKYOU ALL!
ANY QUESTIONS?
razanwidz@gmail.com
http://np.linkedin.com/pub/rajan-maharjan/4a/552/68b/
facebook.com/rjnmhrjn

More Related Content

What's hot

Intro to Network Automation
Intro to Network AutomationIntro to Network Automation
Intro to Network AutomationAlbert Suwandhi
 
Basic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementBasic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementSorath Asnani
 
1.1 core programming [understand computer storage and data types]
1.1 core programming [understand computer storage and data types]1.1 core programming [understand computer storage and data types]
1.1 core programming [understand computer storage and data types]tototo147
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Rhce syllabus
Rhce syllabusRhce syllabus
Rhce syllabusshushanto
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks Nicola Cerami
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUSiddharaj Junnarkar
 
Web Services Security Tutorial
Web Services Security TutorialWeb Services Security Tutorial
Web Services Security TutorialJorgen Thelin
 
Tutorial on Parallel Computing and Message Passing Model - C1
Tutorial on Parallel Computing and Message Passing Model - C1Tutorial on Parallel Computing and Message Passing Model - C1
Tutorial on Parallel Computing and Message Passing Model - C1Marcirio Chaves
 
Client Server models in JAVA
Client Server models in JAVAClient Server models in JAVA
Client Server models in JAVATech_MX
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingSayed Chhattan Shah
 

What's hot (20)

Firewall
FirewallFirewall
Firewall
 
Intro to Network Automation
Intro to Network AutomationIntro to Network Automation
Intro to Network Automation
 
Basic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementBasic Concepts and Types of Network Management
Basic Concepts and Types of Network Management
 
1.1 core programming [understand computer storage and data types]
1.1 core programming [understand computer storage and data types]1.1 core programming [understand computer storage and data types]
1.1 core programming [understand computer storage and data types]
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Unit 3
Unit 3Unit 3
Unit 3
 
Rhce syllabus
Rhce syllabusRhce syllabus
Rhce syllabus
 
Web services
Web servicesWeb services
Web services
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
ONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEMONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEM
 
Grid computing ppt
Grid computing pptGrid computing ppt
Grid computing ppt
 
Web Services Security Tutorial
Web Services Security TutorialWeb Services Security Tutorial
Web Services Security Tutorial
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Firewall
FirewallFirewall
Firewall
 
Tutorial on Parallel Computing and Message Passing Model - C1
Tutorial on Parallel Computing and Message Passing Model - C1Tutorial on Parallel Computing and Message Passing Model - C1
Tutorial on Parallel Computing and Message Passing Model - C1
 
Cloud computing architectures
Cloud computing architecturesCloud computing architectures
Cloud computing architectures
 
Client Server models in JAVA
Client Server models in JAVAClient Server models in JAVA
Client Server models in JAVA
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
 

Similar to Ethical hacking and System administration

VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkataamiyadutta
 
V1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docV1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docpraveena06
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacksijdmtaiir
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityHome
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeterS.E. CTS CERT-GOV-MD
 
Challenges Faced By Computer Network Security
Challenges Faced By Computer Network SecurityChallenges Faced By Computer Network Security
Challenges Faced By Computer Network SecurityLori Gilbert
 
It security
It securityIt security
It securityavi2607
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsDam Frank
 
ThreatModeling.ppt
ThreatModeling.pptThreatModeling.ppt
ThreatModeling.ppttashon2
 
Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecurityMetrics
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxGauravWankar2
 

Similar to Ethical hacking and System administration (20)

VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
V1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docV1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.doc
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacks
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
Challenges Faced By Computer Network Security
Challenges Faced By Computer Network SecurityChallenges Faced By Computer Network Security
Challenges Faced By Computer Network Security
 
It security
It securityIt security
It security
 
Hacking
HackingHacking
Hacking
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT Systems
 
ThreatModeling.ppt
ThreatModeling.pptThreatModeling.ppt
ThreatModeling.ppt
 
Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop Connection
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 

Recently uploaded

3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud DataEric D. Schabell
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxKaustubhBhavsar6
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0DanBrown980551
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxNeo4j
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxSatishbabu Gunukula
 
Top 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTop 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTopCSSGallery
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsDianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2DianaGray10
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingFrancesco Corti
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024Brian Pichman
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3DianaGray10
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfInfopole1
 
Introduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationIntroduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationKnoldus Inc.
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechProduct School
 

Recently uploaded (20)

3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptx
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile Brochure
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
 
Top 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTop 10 Squarespace Development Companies
Top 10 Squarespace Development Companies
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projects
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is going
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdf
 
Introduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationIntroduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its application
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
 

Ethical hacking and System administration

  • 1. ETHICAL HACKING AND SYSTEM ADMINISTRATION By Rajan Maharjan
  • 2.  Hacking  Types of Hackers  Ethical Hacking  System Administrator  Administration includes  Skills and Prerequisites  Career in ethical hacking and system administration
  • 3.  Hacking is unauthorized use of computer and network resources.  According to Computer Crime Research Center:“It is act of gaining access without legal authorization to computer or computer network.”
  • 4.  Dec 04 2013 Hackers Compromise 2 Million Facebook, Twitter and Gmail Accounts http://mashable.com/2013/12/04/hackers-facebook-twitter-gmail/  Jan 29 2014 GoDaddy Admits Hacker’s Social Engineering Led It To Divulge Info In @N Twitter Account Hack http://techcrunch.com/2014/01/29/godaddy-admits-hackers-social-engineering- led-it-to-divulge-info-in-n-twitter-account-hack/  Record-breaking DDoS attack in Europe hits 400Gbps http://news.cnet.com/8301-1009_3-57618762-83/record-breaking-ddos-attack- in-europe-hits-400gbps/
  • 5. The term hacker has dual usage in modern days but was defined in early days as: HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities—as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming.
  • 6. TYPES OF HACKERS  Black hats :– highly skilled, malicious, destructive “crackers” ; offensive  White hats – skills used for defensive security analysts ; defensive  Gray hats – offensively and defensively; will hack for different reasons, depends on situation.
  • 7. ETHICAL HACKING  Ethical hacking ,also known as penetration testing or white-hat hacking with the permission of the target.  involves the same tools, tricks, and techniques that hackers use, i.e, by duplicating the intent and actions of malicious hacker.
  • 8. Ethical Hackers  Trustworthy security professional  Applies hacking skills for defensive purpose  Has very strong programming skill and system understanding  Firewalls: configurations, and operation of intrusion detection systems.  License to hack  The International Council of E-Commerce Consultants (EC-Council) provides a professional certification for Certified Ethical Hackers (CEH).
  • 9. ETHICAL HACKING PROCESS 1. Preparation  Identification of target – website, mail server etc.  Signing of contract  Agreement on protection against any legal issue.  Contracts to clearly specify limits and dangers of the test.  Total time for testing.  Key people made aware of testing.
  • 10. ETHICAL HACKING PROCESS CONTD.. 2. FOOTPRINTING  Collecting required information about target: DNS server. IP ranges. Administrative contacts. Problem reveled by administrator. 3. ENUMERATION AND FINGERPRINTING  Operating system enumeration. Identification of services/open port. 3. IDENTIFICATION OF VULNERABILITIES:  Vulnerabilities Insecure configuration. Weak passwords. Insecure programming. Weak access control.
  • 11. SYSTEM ADMINISTRATOR  A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers. Network administrator Database administrator System Engineer IT Engineer
  • 12. ROLES OF SYSADMIN  Installing, maintaining and troubleshooting workstations, servers, OSs, software applications and other computing systems  Creating user accounts and assigning user permissions  Security and Firewall Setup  Creating backup and retrieval policies and assigning bulk storage  Creating System and network monitoring systems  Updating systems upon release of new OSs or software
  • 13. ROLES OF SYSADMIN CONTD..  Strategic planning for service and system outages  Light programming or scripting System-related project management  User training and management High-level technical knowledge and technical support experience  Hardware and software system security, such as protection against hardware theft and abuse, malware/spyware and unauthorized use of systems and components, including firewall and intrusion detection system(IDS)
  • 14. DESIRED TRAITS AND SKILLS  Deep understanding of system and netwoking  Cloud Technology  Linux  Virtualization  Routing Protocols and Layers (IP,TCP, OSPF)  Scripting ( bash, python, powershell etc)  Database administration  Certifications ( MCSE,RHCE, CCNA, CEH etc ) *  Problem solving ability  Multitasking  Patience
  • 15. CAREER OPPORTUNITIES  Local and global opportunities  Software Companies  Banks  ISPs  Department of IT in all companies  Freelancing  Lot more