2. Hacking
Types of Hackers
Ethical Hacking
System Administrator
Administration includes
Skills and Prerequisites
Career in ethical hacking and system
administration
3. Hacking is unauthorized use of computer
and network resources.
According to Computer Crime Research
Center:“It is act of gaining access
without legal authorization to computer
or computer network.”
4. Dec 04 2013
Hackers Compromise 2 Million
Facebook, Twitter and Gmail Accounts
http://mashable.com/2013/12/04/hackers-facebook-twitter-gmail/
Jan 29 2014
GoDaddy Admits Hacker’s Social
Engineering Led It To Divulge Info In
@N Twitter Account Hack
http://techcrunch.com/2014/01/29/godaddy-admits-hackers-social-engineering-
led-it-to-divulge-info-in-n-twitter-account-hack/
Record-breaking DDoS attack in
Europe hits 400Gbps
http://news.cnet.com/8301-1009_3-57618762-83/record-breaking-ddos-attack-
in-europe-hits-400gbps/
5. The term hacker has dual usage in modern
days but was defined in early days as:
HACKER noun
1.A person who enjoys learning the details of
computer systems and how to stretch their
capabilities—as opposed to most users of
computers, who prefer to learn only the
minimum
amount necessary.
2. One who programs enthusiastically or who
enjoys programming rather than just theorizing
about programming.
6. TYPES OF HACKERS
Black hats :– highly skilled, malicious,
destructive “crackers” ; offensive
White hats – skills used for defensive
security analysts ; defensive
Gray hats – offensively and defensively;
will hack for different reasons, depends
on situation.
7. ETHICAL HACKING
Ethical hacking ,also known as penetration
testing or white-hat hacking with the
permission of the target.
involves the same tools, tricks, and
techniques that hackers use, i.e, by
duplicating the intent and actions of
malicious hacker.
8. Ethical Hackers
Trustworthy security professional
Applies hacking skills for defensive purpose
Has very strong programming skill and system
understanding
Firewalls: configurations, and operation of
intrusion detection systems.
License to hack
The International Council of E-Commerce
Consultants (EC-Council) provides a professional
certification for Certified Ethical Hackers (CEH).
9. ETHICAL HACKING PROCESS
1. Preparation
Identification of target – website, mail server
etc.
Signing of contract
Agreement on protection against any legal
issue.
Contracts to clearly specify limits and
dangers of the test.
Total time for testing.
Key people made aware of testing.
10. ETHICAL HACKING PROCESS CONTD..
2. FOOTPRINTING
Collecting required information about target:
DNS server. IP ranges. Administrative
contacts. Problem reveled by administrator.
3. ENUMERATION AND FINGERPRINTING
Operating system enumeration. Identification of
services/open port.
3. IDENTIFICATION OF VULNERABILITIES:
Vulnerabilities Insecure configuration. Weak
passwords. Insecure programming. Weak
access control.
11. SYSTEM ADMINISTRATOR
A system administrator, or sysadmin, is a
person who is responsible for the upkeep,
configuration, and reliable operation of
computer systems; especially multi-user
computers, such as servers.
Network administrator
Database administrator
System Engineer
IT Engineer
12. ROLES OF SYSADMIN
Installing, maintaining and troubleshooting
workstations, servers, OSs, software applications and
other computing systems
Creating user accounts and assigning user
permissions
Security and Firewall Setup
Creating backup and retrieval policies and assigning
bulk storage
Creating System and network monitoring systems
Updating systems upon release of new OSs or software
13. ROLES OF SYSADMIN CONTD..
Strategic planning for service and system outages
Light programming or scripting System-related project
management
User training and management High-level technical
knowledge and technical support experience
Hardware and software system security, such as
protection against hardware theft and abuse,
malware/spyware and unauthorized use of systems
and components, including firewall and intrusion
detection system(IDS)
14. DESIRED TRAITS AND SKILLS
Deep understanding of system and netwoking
Cloud Technology
Linux
Virtualization
Routing Protocols and Layers (IP,TCP, OSPF)
Scripting ( bash, python, powershell etc)
Database administration
Certifications ( MCSE,RHCE, CCNA, CEH etc ) *
Problem solving ability
Multitasking
Patience
15. CAREER OPPORTUNITIES
Local and global opportunities
Software Companies
Banks
ISPs
Department of IT in all companies
Freelancing
Lot more