CONTENT INTRODUCTION        METHODOLOGY HISTORY             REPORTING TYPES OF HACKERS    CONCLUSION ETHICAL HACKIN...
INTRODUCTION Ethical hacking also known as penetration testing  or White-hat hacking, involves the same tools,  tricks an...
SECURITY Security is the condition of being protect against  danger or loss. In the general sense, security is a  concept...
HISTORY HIGHLIGHTS In one early ethical hack, the United States Air Force  conducted a “security evaluation” of the Multi...
HACKING Eric Raymond, compiler of “The New Hacker’s Dictionary”,  defines a hacker as a clever programmer. A “Good hack”...
TYPE OF HACKERS Black-Hat Hackers White-Hat Hackers Grey-Hat Hackers
ETHICAL HACKING A methodology adopted by ethical hackers to discover  the vulnerabilities existing in information systems...
What does an Ethical Hacker do ? An ethical hacker is a person doing ethical  hacking that is he is a security personal w...
Required Skills of an Ethical Hacker : Microsoft : Linux : Firewalls : Routers : Network Protocols : Project Managem...
ETHICAL HACKING COMMANDMENTS Working ethically Respecting privacy Not crashing your systems:
METHODOLOGY OF HACKINGReconnaissanceScanning & EnumerationGaining access Maintaining accessClearing tracks
 Reconnaissance:  This literal meaning of the Word reconnaissance means a  preliminary survey to gain the information . T...
Enumeration:Enumeration is the ability of a hacker to convince some servers togive them information that is vital to them...
 Password Cracking: There are many methods for cracking the password and then get in to the system. The simplest method i...
 Maintaining Access:  Now the hacker is inside the system . This means that he is now  in a position to upload some files...
Ethical hacking tools:Ethical hackers utilize and have developed variety of toolsintrude into different kinds of systems a...
Samspade:Samspade is a simple tool which provides usinformation about a particular host. This tool isvery much helpful in...
Email Tracker and Visual Route: Email tracker is a software which help us to find fromwhich server the mail does actually...
Advantages and disadvantages:Ethical hacking nowadays is a backbone of networksecurity .Each day its relevance is increasi...
Disadvantages All depend upon the trustworthiness of the ethical hacker Hiring professionals is expensive
Future enhancements: As it an evolving branch the scope ofenhancement in technology is       immense. Noethical hacker ca...
ConclusionOne of the main aim of the seminar is to makeothers understand that there are so many toolsthrough which a hacke...
Professionals    Professionals should understand that business isdirectly related to security. So they should makenew sof...
Educate employees and the users against blackhacking.Use every possible security measures Every time make our password ...
REFERENCE www.scribd.com www.wikipedia/seminartopics/ethical haching.org www. Seminarsonly/ethical hacking.com
Ethical Hacking
Ethical Hacking
Ethical Hacking
Upcoming SlideShare
Loading in …5
×

Ethical Hacking

16,048
-1

Published on

Published in: Technology, News & Politics
2 Comments
14 Likes
Statistics
Notes
  • Techfest, IIT Bombay brings you an awesome Hacking Workshop.
    For details, please visit -
    http://www.techfest.org/home/event/hacktricksIITB
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • free free download this latest version 100% working.
    download link- http://gg.gg/hqcf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
16,048
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1,295
Comments
2
Likes
14
Embeds 0
No embeds

No notes for slide

Ethical Hacking

  1. 1. CONTENT INTRODUCTION  METHODOLOGY HISTORY  REPORTING TYPES OF HACKERS  CONCLUSION ETHICAL HACKING  ADVANTAGES AND DISADVANTAGES HACKING  CONCLUSION ETHICAL HACKING COMMANDMENTS  REFERENCE
  2. 2. INTRODUCTION Ethical hacking also known as penetration testing or White-hat hacking, involves the same tools, tricks and techniques that hackers use, but with one major difference that ethical hacking is legal. Ethical hacking can also ensure that vendors claims about the security of their products legitimate.
  3. 3. SECURITY Security is the condition of being protect against danger or loss. In the general sense, security is a concept similar to safety. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruc- tion. Need for security There may be several forms of damages which are obviously interrelated which are produced by the intruders.
  4. 4. HISTORY HIGHLIGHTS In one early ethical hack, the United States Air Force conducted a “security evaluation” of the Multiuse operating systems for “potential use as a two-level (secret/top secret) systems.” Most notable of these was the work by Farmer and Venom, which was originally posted to Usenet in December of 1993.
  5. 5. HACKING Eric Raymond, compiler of “The New Hacker’s Dictionary”, defines a hacker as a clever programmer. A “Good hack” is a clever solution to a programming problem and “hacking” is the act of doing it.
  6. 6. TYPE OF HACKERS Black-Hat Hackers White-Hat Hackers Grey-Hat Hackers
  7. 7. ETHICAL HACKING A methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems operating environments. With the growth of the internet, computer security has become a Major concern for businesses and govern- ments. Evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
  8. 8. What does an Ethical Hacker do ? An ethical hacker is a person doing ethical hacking that is he is a security personal who tries to penetrate in to a network to find if there is some vulnerability in the system. An ethical hacker will always have the permission to enter into the target network. If he succeed in penetrating into the system then he will report to the company with a detailed report about the particular vulnerab- ility exploiting which he got in to the system.
  9. 9. Required Skills of an Ethical Hacker : Microsoft : Linux : Firewalls : Routers : Network Protocols : Project Management :
  10. 10. ETHICAL HACKING COMMANDMENTS Working ethically Respecting privacy Not crashing your systems:
  11. 11. METHODOLOGY OF HACKINGReconnaissanceScanning & EnumerationGaining access Maintaining accessClearing tracks
  12. 12.  Reconnaissance: This literal meaning of the Word reconnaissance means a preliminary survey to gain the information . This is also known as foot-printing. As given in the analogy, this is the stage in which the hacker collects information about the company which the personal is going to hack. This is one of the pre-attacking phases. Scanning: The hacker tries to make a blue print of the target network. The blue print includes the IP addresses of the target network which are live, the services which are running on those systems and so on Modern port scanning uses TCP protocol to do scanning and they could even detect the operating systems running on the particular hosts.
  13. 13. Enumeration:Enumeration is the ability of a hacker to convince some servers togive them information that is vital to them to make an attack. Bydoing this the hacker aims to find what resources and shares canbe found in the system, what valid user account and user groupsare there in the network, what applications will be there etc.Gaining accessThis is the actual hacking phase in which the hacker gains accessto the system. The hacker will make use of all the information hecollected in the pre-attacking phases. Usually the main hindranceto gaining access to a system is the passwords. In the Systemhacking first the hacker will try to get in to the system.
  14. 14.  Password Cracking: There are many methods for cracking the password and then get in to the system. The simplest method is to guess the password. But this is a tedious work. But in order to make this work easier there are many automated tools for password guessing like legion. Privilege escalation Privilege escalation is the process of raising the privileges once the hacker gets in to the system The privilege escalation process usually uses the vulnerabilities present in the host operating system or the software. There are many tools like hk.exe, metasploit etc. One such community of hackers is the metasploit
  15. 15.  Maintaining Access: Now the hacker is inside the system . This means that he is now in a position to upload some files and download some of them. The next aim will be to make an easier path to get in when he comes the next time. This is analogous to making a small hidden door in the building so that he can directly enter in to the building through the door easily Clearing Tracks: Whenever a hacker downloads some file or installs some software, its log will be stored in the server logs. So in order to erase the hacker uses man tools. One such tool is windows resource kit’s auditpol.exe. Another tool which eliminates any physical evidence is the evidence eliminator.. The Evidence Eliminator deletes all such evidences.
  16. 16. Ethical hacking tools:Ethical hackers utilize and have developed variety of toolsintrude into different kinds of systems and to evaluate thesecurity levels. The nature of these tools differs widely.
  17. 17. Samspade:Samspade is a simple tool which provides usinformation about a particular host. This tool isvery much helpful in finding the addresses, phonenumber etc
  18. 18. Email Tracker and Visual Route: Email tracker is a software which help us to find fromwhich server the mail does actually came from. Everymessage we receive will have a header associated withIt . The email tracker uses this header information for findlocation.Visual route is a tool which displays the location aparticular server with the help of IP addresses. When weconnect this with the email tracker we can find theserver which actually sends the mail .
  19. 19. Advantages and disadvantages:Ethical hacking nowadays is a backbone of networksecurity .Each day its relevance is increasing ,themajor pros & cons of ethical hacking Advantages  “To catch a thief you have to think like a thief”  Help in closing the open holes in the network  Provides security to banking and financial establishments  Prevents website defacements  An evolving technique
  20. 20. Disadvantages All depend upon the trustworthiness of the ethical hacker Hiring professionals is expensive
  21. 21. Future enhancements: As it an evolving branch the scope ofenhancement in technology is immense. Noethical hacker can ensure the system security byusing the same technique repeatedly. He wouldHe would have to improve , develop and explorenew avenues repeatedly. More enhanced software’s should be used foroptimum protection . Tools used , need to beupdated regularly and more efficient ones need tobe developed
  22. 22. ConclusionOne of the main aim of the seminar is to makeothers understand that there are so many toolsthrough which a hacker can get into a system. Itsvarious perspectives.Student A student should understand that no software ismade with zero Vulnerability. So while they arestudying they should study the various possibilitiesand should study how to prevent that because theyare the professionals of tomorrow
  23. 23. Professionals Professionals should understand that business isdirectly related to security. So they should makenew software with vulnerabilities as less aspossible. if they are not aware of these then theywon’t be cautions enough in security matters In the preceding sections we saw themethodology of hacking, why should we aware ofhacking and tools and some tools which a hackermay use . Now we can see what we can do againsthacking or to protect ourselves from hacking . the first thing is we should keep ourselvesupdated about those softwares us and usingfor official and reliable sources .
  24. 24. Educate employees and the users against blackhacking.Use every possible security measures Every time make our password strong by making itharder and longer to be cracked.
  25. 25. REFERENCE www.scribd.com www.wikipedia/seminartopics/ethical haching.org www. Seminarsonly/ethical hacking.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×