Ethical hacking
Upcoming SlideShare
Loading in...5
×
 

Ethical hacking

on

  • 1,725 views

Basic Ethical Hacking ppt for the beginners & a well seminar ppt for the students on ethical hacking

Basic Ethical Hacking ppt for the beginners & a well seminar ppt for the students on ethical hacking

Statistics

Views

Total Views
1,725
Views on SlideShare
1,725
Embed Views
0

Actions

Likes
1
Downloads
287
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Ethical hacking Ethical hacking Presentation Transcript

  • BySourabh S. Badve(CEH/ECSA)
  • INTRODUCTIONWhat is hacking?
  • TYPES OF HACKERS  White hat hacker  Black hat hacker  Gray hat hacker  Ghost hacker  Script kiddies
  • What is “Ethical Hacking” ?  Penetration Testing  Security Testing
  • Steps involved in Ethical Hacking : Signing of Contract Footprinting OR Reconnaisance Enumeration & Fingerprinting (Scanning) Identification of vulnerabilities Attack – Exploit the vulnerabilities Reporting
  • Signing of contract • A contract between the tester i.e. ethical hacker and organization i.e. client • specifies certain conditions and terms of test being conducted • signed by both the parties.
  • Footprinting OR Reconnaissance Collecting as much information about the target. Tools used – nslookup, traceroute, whois etc.
  • Enumeration & Fingerprinting (scanning)• Determining the target.• Identification of services and open ports.• Enumerating operating system. Tools used- Nmap, SNMP scanner, netcat, telnet etc.
  • Identification of vulnerabilities• Insecure configuration• Weak passwords• Unpatched vulnerabilities in services, operating system and application• Possible vulnerabilities in services, operating system and applications• Insecure programming• Weak Access control• Tools and Techniques used- Vulnerability scanners like Nessus, Listening totraffic, Password crackers, Default passwords, Bruteforce, Social engineering, SQL injection,vulnerability information website e.g.http://cve.mitre.org,http://www.securityfocus.com
  • Attack – Exploit the vulnerabilities• Obtain information(trophies) from the target system• Gaining normal access• Escalating privileges• Obtain access to other connected systems• Operating system attacks• Tools used- Nessus, Metasploit, Framework,
  •  Tools
  • Thank you!