Your SlideShare is downloading. ×
Ethical Hacking<br />
Introduction<br />
History Of Hacking<br />
What do ethical hackers do?<br />
What damage is caused?<br />
Original web page<br />Hacked web page<br />
Original  web page<br />Hacked web page<br />
System Hacking: Administrator password guessing<br />
Performing automated password guessing<br />
Tool: Legion<br />Legion automates the password guessing in NetBIOS sessions. Legion will scan multiple Class C IP address...
Password Guessing Counter Measures<br />
Manual Password Cracking Algorithm<br />
Automatic Password Cracking Algorithm<br />
Password Cracking Counter Measures<br />
Trojans and Backdoors<br />
Tool: Donald Dick<br />Donald Dick is a tool that enables a user to control another computer over a network.<br />It uses ...
It’s Real<br />
Social Engineering<br />
<ul><li>People are usually the</li></ul>weakest link in the<br />security chain.<br /><ul><li>A successful defense</li></u...
Types of Social Engineering<br />
Example<br />A man calls to a company help desk and says he’s forgotten his password<br />In a panic, he adds that if he m...
Security Policies - Checklist<br /><ul><li>Account Setup
Password change policy
Help desk procedures
Upcoming SlideShare
Loading in...5
×

Ethical hacking

1,475

Published on

For Documentation and Downloads Visit
www.presentationslive.blogspot.com

Published in: Education
2 Comments
2 Likes
Statistics
Notes
  • You Can Free Download Latest & Working -> http://gg.gg/g4vv
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Can u please forward this to my mail id vpratyusha_1@yahoo.co.in
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
1,475
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
2
Likes
2
Embeds 0
No embeds

No notes for slide

Transcript of "Ethical hacking"

  1. 1. Ethical Hacking<br />
  2. 2. Introduction<br />
  3. 3. History Of Hacking<br />
  4. 4. What do ethical hackers do?<br />
  5. 5. What damage is caused?<br />
  6. 6. Original web page<br />Hacked web page<br />
  7. 7.
  8. 8. Original web page<br />Hacked web page<br />
  9. 9. System Hacking: Administrator password guessing<br />
  10. 10. Performing automated password guessing<br />
  11. 11. Tool: Legion<br />Legion automates the password guessing in NetBIOS sessions. Legion will scan multiple Class C IP address ranges for Windows shares and also offers a manual dictionary attack tool.<br />
  12. 12. Password Guessing Counter Measures<br />
  13. 13. Manual Password Cracking Algorithm<br />
  14. 14. Automatic Password Cracking Algorithm<br />
  15. 15. Password Cracking Counter Measures<br />
  16. 16. Trojans and Backdoors<br />
  17. 17.
  18. 18. Tool: Donald Dick<br />Donald Dick is a tool that enables a user to control another computer over a network.<br />It uses a client server architecture with the server residing on the victim's computer.<br />
  19. 19. It’s Real<br />
  20. 20. Social Engineering<br />
  21. 21. <ul><li>People are usually the</li></ul>weakest link in the<br />security chain.<br /><ul><li>A successful defense</li></ul>depends on having good<br />policies in place and<br />educating employees to<br />follow the policies.<br /><ul><li> Social Engineering is the</li></ul>hardest form of attack to<br />defend against because it<br />cannot be defended with<br />hardware or software<br />Human Weakness<br />
  22. 22. Types of Social Engineering<br />
  23. 23. Example<br />A man calls to a company help desk and says he’s forgotten his password<br />In a panic, he adds that if he misses a deadline on an big advertising project his boss might even fire him off<br />The help desk worker feels sorry for it and resets the password-- unwittingly giving the clean entrance in the<br />Corporate network<br />
  24. 24. Security Policies - Checklist<br /><ul><li>Account Setup
  25. 25. Password change policy
  26. 26. Help desk procedures
  27. 27. Access Privileges
  28. 28. Violations
  29. 29. Employee identification
  30. 30. Privacy Policy
  31. 31. Paper documents
  32. 32. Modems
  33. 33. Physical Access Restrictions
  34. 34. Virus control</li></li></ul><li>Conclusion<br /><ul><li>Testing is an essential part of any data security program
  35. 35. It is important to understand factors such as what data is exposed, what techniques will be employed
  36. 36. With a sufficient amount of analysis and preparation, risks can be addressed without compromising the efficacy of the testing, while preserving the mission of the information security program </li></li></ul><li>THANK YOU<br />For Documentation and Downloads Visit<br />

×