Ethical hacking

6,314 views
5,918 views

Published on

0 Comments
9 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
6,314
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
520
Comments
0
Likes
9
Embeds 0
No embeds

No notes for slide

Ethical hacking

  1. 1. ETHICAL HACKING
  2. 2. Contents• Introduction to hacking• Types of hackers• Classification of hackers• Steps performed by a hacker• IP address ranges• Tracing of IP address• Email Protocol• Proxy Servers• Security• Conclusion
  3. 3. Introduction to HackingHacking: An art as well as a skill depending on a person’s knowledge and skill. Hacking Positive Negative Ethical Hacking: Penetration testing focusing on securing and protecting IT systems.
  4. 4. Types of Hackers • White Hat Hacker • Black Hat Hacker • Grey Hat Hacker
  5. 5. White Hat Hacker• Perform Ethical Hacking• Have knowledge of hacking and hacker toolset• Locate security weaknesses and implement countermeasures• Also known as Penetration Tester• Focus on securing and protecting IT systems
  6. 6. Black Hat Hacker• Perform unethical hacking• Are criminal hackers or crackers• Use their skills for illegal or malicious purposes• Focus on Security Cracking and Data Stealing
  7. 7. Grey Hat Hacker• Sometimes acts legally and sometimes not• Do not hack for personal gain• Do not have malicious intentions• May occasionally commit crimes• Are hybrid between White Hat and Black Hat Hackers
  8. 8. Classification of hackers • Have ability to find unique vulnerabilityCoders • Have deep understanding of OSI Layer Model and TCP/IP Stacks • Have experience with osAdmin • Exploit existing vulnerabilities Script • Use scripts and programs developed by othersKiddies • Can cause serious problems
  9. 9. Steps Performed by a Hacker Reconnais sance Clearing Scanning tracks Maintaining Gaining access access
  10. 10. Reconnaissance• Google• Samspade• Email tracker and visual route Scanning• War dialing and pingers• Port scanning• Enumeration
  11. 11. Password Cracking• Dictionary Cracking• Brute Force Cracking• Hybrid Cracking• Social Engineering• Metasploit• Man in the middle attack
  12. 12. Maintaining access•Key stroke loggers•Trojan horses•Backdoors•Wrappers
  13. 13. IP ADDRESS RANGESclasses rangesClass-a 0000.0.0.0 to 127.255.255.255Class-b 128.0.0.0 to 191.255.255.255Class-c 192.0.0.0 to 223.255.255.255Class-d 224.0.0.0 to 239.255.255.255Class-e 240.0.0.0 to 255.255.255
  14. 14. TRACING OF IP ADDRESS Click on email msg. Show original Copy the header from written path. Open www. What is my ip address.com Click on Trace email Paste it to the header section Click on getsoures. get IP address and location .
  15. 15. SECURITY THREATS• Denial of service• Interception• Manipulation• Masquerading• Repudiation
  16. 16. Proxy Server • Intermediary between a workstation user and the internet • Hackers use the proxy server on the internet to make their identity invisible to the target. LAN PC 2nd PCInternet Proxy Server Router/Switch Wireless connection
  17. 17. Types of proxies: ProxyTransparent Anonymous Elite Simple Distorting
  18. 18. SECURITY• Confidentiality• Integrity• Availability• Use antivirus.• Proper logout after use of email id.• Don’t open spam.• Password protected admin account.
  19. 19. CONCLUSION• “To catch a thief think like a thief similarly To catch a hacker think like a hacker”.

×