Your SlideShare is downloading. ×
Ethical hacking and System administration
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Ethical hacking and System administration

271
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
271
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. ETHICAL HACKING AND SYSTEM ADMINISTRATION By Rajan Maharjan
  • 2.  Hacking  Types of Hackers  Ethical Hacking  System Administrator  Administration includes  Skills and Prerequisites  Career in ethical hacking and system administration
  • 3.  Hacking is unauthorized use of computer and network resources.  According to Computer Crime Research Center:“It is act of gaining access without legal authorization to computer or computer network.”
  • 4.  Dec 04 2013 Hackers Compromise 2 Million Facebook, Twitter and Gmail Accounts http://mashable.com/2013/12/04/hackers-facebook-twitter-gmail/  Jan 29 2014 GoDaddy Admits Hacker’s Social Engineering Led It To Divulge Info In @N Twitter Account Hack http://techcrunch.com/2014/01/29/godaddy-admits-hackers-social-engineering- led-it-to-divulge-info-in-n-twitter-account-hack/  Record-breaking DDoS attack in Europe hits 400Gbps http://news.cnet.com/8301-1009_3-57618762-83/record-breaking-ddos-attack- in-europe-hits-400gbps/
  • 5. The term hacker has dual usage in modern days but was defined in early days as: HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities—as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming.
  • 6. TYPES OF HACKERS  Black hats :– highly skilled, malicious, destructive “crackers” ; offensive  White hats – skills used for defensive security analysts ; defensive  Gray hats – offensively and defensively; will hack for different reasons, depends on situation.
  • 7. ETHICAL HACKING  Ethical hacking ,also known as penetration testing or white-hat hacking with the permission of the target.  involves the same tools, tricks, and techniques that hackers use, i.e, by duplicating the intent and actions of malicious hacker.
  • 8. Ethical Hackers  Trustworthy security professional  Applies hacking skills for defensive purpose  Has very strong programming skill and system understanding  Firewalls: configurations, and operation of intrusion detection systems.  License to hack  The International Council of E-Commerce Consultants (EC-Council) provides a professional certification for Certified Ethical Hackers (CEH).
  • 9. ETHICAL HACKING PROCESS 1. Preparation  Identification of target – website, mail server etc.  Signing of contract  Agreement on protection against any legal issue.  Contracts to clearly specify limits and dangers of the test.  Total time for testing.  Key people made aware of testing.
  • 10. ETHICAL HACKING PROCESS CONTD.. 2. FOOTPRINTING  Collecting required information about target: DNS server. IP ranges. Administrative contacts. Problem reveled by administrator. 3. ENUMERATION AND FINGERPRINTING  Operating system enumeration. Identification of services/open port. 3. IDENTIFICATION OF VULNERABILITIES:  Vulnerabilities Insecure configuration. Weak passwords. Insecure programming. Weak access control.
  • 11. SYSTEM ADMINISTRATOR  A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers. Network administrator Database administrator System Engineer IT Engineer
  • 12. ROLES OF SYSADMIN  Installing, maintaining and troubleshooting workstations, servers, OSs, software applications and other computing systems  Creating user accounts and assigning user permissions  Security and Firewall Setup  Creating backup and retrieval policies and assigning bulk storage  Creating System and network monitoring systems  Updating systems upon release of new OSs or software
  • 13. ROLES OF SYSADMIN CONTD..  Strategic planning for service and system outages  Light programming or scripting System-related project management  User training and management High-level technical knowledge and technical support experience  Hardware and software system security, such as protection against hardware theft and abuse, malware/spyware and unauthorized use of systems and components, including firewall and intrusion detection system(IDS)
  • 14. DESIRED TRAITS AND SKILLS  Deep understanding of system and netwoking  Cloud Technology  Linux  Virtualization  Routing Protocols and Layers (IP,TCP, OSPF)  Scripting ( bash, python, powershell etc)  Database administration  Certifications ( MCSE,RHCE, CCNA, CEH etc ) *  Problem solving ability  Multitasking  Patience
  • 15. CAREER OPPORTUNITIES  Local and global opportunities  Software Companies  Banks  ISPs  Department of IT in all companies  Freelancing  Lot more
  • 16. THANKYOU ALL! ANY QUESTIONS? razanwidz@gmail.com http://np.linkedin.com/pub/rajan-maharjan/4a/552/68b/ facebook.com/rjnmhrjn