SlideShare a Scribd company logo
1 of 31
ETHICAL HACKING
BY CHRISTIN CHACKO JOHN
WHO IS A HACKER ?
• A security hacker is someone who seeks to
breach defenses and exploit weaknesses in a
computer system or network
• A person who enjoys learning details of a
programming language or system
• A person who enjoys actually doing
the programming rather than just
theorizing about it
• A person capable of appreciating someone
else's hacking
• A person who picks up programming
quickly
• A person who is an expert at a particular
programming language or system
TYPES OF HACKERS
Black Hat Hacker Grey Hat Hacker White Hat Hacker
Black-Hat Hacker
• A black hat hackers or crackers are individuals with
extraordinary computing skills, resorting to malicious or
destructive activities.
• That is black hat hackers use their knowledge and skill for
their own personal gains probably by hurting others.
White-Hat Hacker
• White hat hackers are those individuals professing hacker
skills and using them for defensive purposes.
• This means that the white hat hackers use their knowledge and
skill for the good of others and for the common good.
Grey-Hat Hacker
• These are individuals who work both offensively and
defensively at various times.
• We cannot predict their behavior.
• Sometimes they use their skills for the common good while in
some other times he uses them for their personal gains.
WHAT IS ethical hacking
Ethical hacking also known as penetration testing,
involves the same tools, tricks, and techniques that
hackers, but with one major difference that Ethical
hacking is legal.
• Independent computer security Professionals
breaking into the computer systems.
• Neither damage the target systems nor steal
information.
• Evaluate target systems security and report
back to owners about the vulnerabilities found.
• Reconnaissance
• Scanning & Enumeration
• Gaining access
• Maintaining access
• Clearing tracks
Methodologies of hacking
RECONNAISSANCE
The literal meaning of the word reconnaissance means a
preliminary survey to gain information. This is also known
as foot-printing. This is the first stage in the methodology
of hacking
SCANNING & ENUMERATION
Scanning is the second phase in the hacking methodology in
which the hacker tries to make a blue print of the target network.
The blue print includes the IP addresses of the target network
which are live, the services which are running on those system
and so on.
GAINING ACCESS
This is the actual hacking phase in which the hacker gains
access to the system. The hacker will make use of all the
information he collected in the pre-attacking phases. Usually the
main hindrance to gaining access to a system is the passwords.
MAINTAINING ACCESS
Now the hacker is inside the system by some means by
password guessing or exploiting some of it’s vulnerabilities. This
means that he is now in a position to upload some files and
download some of them.
The next aim will be to make an easier path to get in when he
comes the next time.
CLEARING TRACKS
Now we come to the final step in the hacking. There is a saying
that “everybody knows a good hacker but nobody knows a great
hacker”. This means that a good hacker can always clear tracks
or any record that they may be present in the network to prove
that he was here.
TYPES OF ATTACKING MODES
• Brute force attack
• Social engineering/cyber fraud
• Denial-of-Service(DoS)
• Malware attacks
• SQL Injection
• Phishing attack
• MITM attack
• Cross Site Scripting (XSS)
BRUTE FORCE ATTACK
The brute force attack will use a
specially designed software to go
through hundreds of thousands of
different words, combinations of
words and numbers to try to crack
your password
SOCIAL ENGINEERING
Social engineering is the term
used for a broad range of
malicious activities
accomplished through human
interactions. It uses
psychological manipulation to
trick users into making security
mistakes or giving away
sensitive information.
DENIAL-OF-SERVICE(DOS)
A Denial-of-Service (DoS) attack
is an attack meant to shut down a
machine or network, making it
inaccessible to its intended users.
DoS attacks accomplish this by
flooding the target with traffic, or
sending it information that triggers
a crash.
Malware attack is a type of
cyberattack in which malware
or malicious software performs
activities on the victim's
computer system, usually
without his/her knowledge
MALWARE ATTACKS
SQL INJECTION
SQL injection, also known as
SQLI, is a common attack vector
that uses malicious SQL code for
backend database manipulation
to access information that was
not intended to be displayed.
PHISHING ATTACK
Phishing is a type of social
engineering attack often used to
steal user data, including login
credentials and credit card
numbers. It occurs when an
attacker, masquerading as a
trusted entity, dupes a victim into
opening an email, instant
message, or text message.
MITM ATTACK
A man in the middle (MITM)
attack is a general term for when
a perpetrator positions himself in
a conversation between a user
and an application—either to
eavesdrop or to impersonate one
of the parties, making it appear as
if a normal exchange of
information is underway.
CROSS SITE SCRIPTING (XSS)
Cross site scripting (XSS) is a
common attack vector that
injects malicious code into a
vulnerable web application. XSS
differs from other web attack
vectors (e.g., SQL injections), in
that it does not directly target the
application itself. Instead, the
users of the web application are
the ones at risk.
WHAT IS THE NEED FOR ETHICAL HACKING?
Viruses, Trojan Horses,
and Worms
Social
Engineering
Automated
Attacks
Accidental Breaches in
Security
Denial of
Service (DoS)
Organizational
Attacks
Restricted
Data
Protection from possible External Attacks
NEED FOR ETHICAL HACKING
• ’To catch a thief you have to
think like a thief”
• Helps in closing the open
holes in the system network
• Provides security to banking
and financial establishments
• Prevents website
defacements
• An evolving technique
Required Skills of an Ethical Hacker
• Microsoft: skills in operation, configuration
and management.
• Linux: knowledge of Linux/Unix; security
setting, configuration, and services.
• Firewalls: configurations, and operation of
intrusion detection systems.
• Routers: knowledge of routers, routing
protocols, and access control lists
• Mainframes
• Network Protocols: TCP/IP; how they
function and can be manipulated.
• Project Management: leading, planning,
organizing, and controlling a penetration
testing team.
Hashcat is the world's fastest and most advanced password
recovery utility, supporting five unique modes of attack for over
200 highly-optimized hashing algorithms.
Features of Hashcat.
• World's fastest password cracker
• World's first and only in-kernel rule engine
• Free
• Open-Source (MIT License)
• Multi-OS (Linux, Windows and macOS)
What is Hashing Algorithm?
A hashing algorithm is a cryptographic
hash function. It is a mathematical
algorithm that maps data of arbitrary
size to a hash of a fixed size. It’s
designed to be a one-way function,
infeasible to invert.
1. It should be fast to compute the hash value for any kind of
data
2. It should be impossible to regenerate a message from its
hash value (brute force attack as the only option)
3. It should avoid hash collisions; each message has its own
hash.
4. Every change to a message, even the smallest one, should
change the hash value. It should be completely different. It’s
called the avalanche effect
SOME OF THE
HASHING
ALGORITHM THAT
HASHCAT CAN
BREAK
• MD4
• MD5
• Half MD5
• SHA1
• SHA2-224
• SHA2-256
GOT ANY DOUBTS AND QUESTIONS ?
THANK YOU

More Related Content

What's hot

Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomwareJawhar Ali
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute forcevishalgohel12195
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printingleminhvuong
 

What's hot (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
Hacking
Hacking Hacking
Hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber security
Cyber security Cyber security
Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
 

Similar to Ethical hacking : Its methodologies and tools

Similar to Ethical hacking : Its methodologies and tools (20)

Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical Hacking - Copy.pptx
Ethical Hacking - Copy.pptxEthical Hacking - Copy.pptx
Ethical Hacking - Copy.pptx
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Hacking
HackingHacking
Hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Hacking
HackingHacking
Hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoUXDXConf
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 

Recently uploaded (20)

Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 

Ethical hacking : Its methodologies and tools

  • 2. WHO IS A HACKER ? • A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network • A person who enjoys learning details of a programming language or system • A person who enjoys actually doing the programming rather than just theorizing about it • A person capable of appreciating someone else's hacking • A person who picks up programming quickly • A person who is an expert at a particular programming language or system
  • 3. TYPES OF HACKERS Black Hat Hacker Grey Hat Hacker White Hat Hacker
  • 4. Black-Hat Hacker • A black hat hackers or crackers are individuals with extraordinary computing skills, resorting to malicious or destructive activities. • That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others.
  • 5. White-Hat Hacker • White hat hackers are those individuals professing hacker skills and using them for defensive purposes. • This means that the white hat hackers use their knowledge and skill for the good of others and for the common good.
  • 6. Grey-Hat Hacker • These are individuals who work both offensively and defensively at various times. • We cannot predict their behavior. • Sometimes they use their skills for the common good while in some other times he uses them for their personal gains.
  • 7. WHAT IS ethical hacking Ethical hacking also known as penetration testing, involves the same tools, tricks, and techniques that hackers, but with one major difference that Ethical hacking is legal. • Independent computer security Professionals breaking into the computer systems. • Neither damage the target systems nor steal information. • Evaluate target systems security and report back to owners about the vulnerabilities found.
  • 8. • Reconnaissance • Scanning & Enumeration • Gaining access • Maintaining access • Clearing tracks Methodologies of hacking
  • 9. RECONNAISSANCE The literal meaning of the word reconnaissance means a preliminary survey to gain information. This is also known as foot-printing. This is the first stage in the methodology of hacking
  • 10. SCANNING & ENUMERATION Scanning is the second phase in the hacking methodology in which the hacker tries to make a blue print of the target network. The blue print includes the IP addresses of the target network which are live, the services which are running on those system and so on.
  • 11. GAINING ACCESS This is the actual hacking phase in which the hacker gains access to the system. The hacker will make use of all the information he collected in the pre-attacking phases. Usually the main hindrance to gaining access to a system is the passwords.
  • 12. MAINTAINING ACCESS Now the hacker is inside the system by some means by password guessing or exploiting some of it’s vulnerabilities. This means that he is now in a position to upload some files and download some of them. The next aim will be to make an easier path to get in when he comes the next time.
  • 13. CLEARING TRACKS Now we come to the final step in the hacking. There is a saying that “everybody knows a good hacker but nobody knows a great hacker”. This means that a good hacker can always clear tracks or any record that they may be present in the network to prove that he was here.
  • 14. TYPES OF ATTACKING MODES • Brute force attack • Social engineering/cyber fraud • Denial-of-Service(DoS) • Malware attacks • SQL Injection • Phishing attack • MITM attack • Cross Site Scripting (XSS)
  • 15. BRUTE FORCE ATTACK The brute force attack will use a specially designed software to go through hundreds of thousands of different words, combinations of words and numbers to try to crack your password
  • 16. SOCIAL ENGINEERING Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
  • 17. DENIAL-OF-SERVICE(DOS) A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.
  • 18. Malware attack is a type of cyberattack in which malware or malicious software performs activities on the victim's computer system, usually without his/her knowledge MALWARE ATTACKS
  • 19. SQL INJECTION SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.
  • 20. PHISHING ATTACK Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
  • 21. MITM ATTACK A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.
  • 22. CROSS SITE SCRIPTING (XSS) Cross site scripting (XSS) is a common attack vector that injects malicious code into a vulnerable web application. XSS differs from other web attack vectors (e.g., SQL injections), in that it does not directly target the application itself. Instead, the users of the web application are the ones at risk.
  • 23. WHAT IS THE NEED FOR ETHICAL HACKING? Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data Protection from possible External Attacks
  • 24. NEED FOR ETHICAL HACKING • ’To catch a thief you have to think like a thief” • Helps in closing the open holes in the system network • Provides security to banking and financial establishments • Prevents website defacements • An evolving technique
  • 25. Required Skills of an Ethical Hacker • Microsoft: skills in operation, configuration and management. • Linux: knowledge of Linux/Unix; security setting, configuration, and services. • Firewalls: configurations, and operation of intrusion detection systems. • Routers: knowledge of routers, routing protocols, and access control lists • Mainframes • Network Protocols: TCP/IP; how they function and can be manipulated. • Project Management: leading, planning, organizing, and controlling a penetration testing team.
  • 26. Hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. Features of Hashcat. • World's fastest password cracker • World's first and only in-kernel rule engine • Free • Open-Source (MIT License) • Multi-OS (Linux, Windows and macOS)
  • 27. What is Hashing Algorithm? A hashing algorithm is a cryptographic hash function. It is a mathematical algorithm that maps data of arbitrary size to a hash of a fixed size. It’s designed to be a one-way function, infeasible to invert.
  • 28. 1. It should be fast to compute the hash value for any kind of data 2. It should be impossible to regenerate a message from its hash value (brute force attack as the only option) 3. It should avoid hash collisions; each message has its own hash. 4. Every change to a message, even the smallest one, should change the hash value. It should be completely different. It’s called the avalanche effect
  • 29. SOME OF THE HASHING ALGORITHM THAT HASHCAT CAN BREAK • MD4 • MD5 • Half MD5 • SHA1 • SHA2-224 • SHA2-256
  • 30. GOT ANY DOUBTS AND QUESTIONS ?

Editor's Notes

  1. Reconnaissance Scanning & Enumeration Gaining access Maintaining access Clearing tracks
  2. Reconnaissance Scanning & Enumeration Gaining access Maintaining access Clearing tracks
  3. Reconnaissance Scanning & Enumeration Gaining access Maintaining access Clearing tracks
  4. Reconnaissance Scanning & Enumeration Gaining access Maintaining access Clearing tracks
  5. Reconnaissance Scanning & Enumeration Gaining access Maintaining access Clearing tracks
  6. Brute force attack Social engineering/cyber fraud Denial-of-Service(DoS) Malware attacks SQL Injection Phishing attack MITM attack Cross Site Scripting (XSS)
  7. Type of social engineering Login and creditials Trust enity
  8. Eavesdrop and impersonate
  9. Users are targeted Not application
  10. Reconnaissance Scanning & Enumeration Gaining access Maintaining access Clearing tracks