SlideShare a Scribd company logo
1 of 19
ETHICAL HACKING
        A LICENCE TO HACK
HACKING:

 Hacking is unauthorized use of computer and
  network resources.
 According to Computer Crime Research
  Center: “It is act of gaining access without
  legal authorization to computer or computer
  network.”
HACKER:

 Someone who tries to break into
  computer systems for any illegal
  purpose.
 Someone who maliciously breaks into systems
  for personal gain. These are criminals.
TYPES OF HACKERS

   Black hat hacker.
   White hat hacker.
   Gray hat hacker.
BLACK BOX MODEL

   Black box model
       Company staff does not know about the test.
       Tester is not given details about the network.
        ▪   Burden is on the tester to find these details

       It is tested, if security personnel are able to
        detect an attack.
WHITE BOX MODEL


   White box model
     Tester
           is told everything about the network
     topology and technology.
         Network diagram is given.

     Tester
          is authorized to interview IT personnel and
     company employees.
     Makes    the tester’s job a little easier.
GRAY BOX MODEL

   Gray box model
     Hybrid   of the white and black box models.
     Company     gives tester partial information.
WHAT IS ETHICAL HACKING ?
 Ethical hacking ,also known as penetration
  testing or white-hat hacking involves the
  same tools, tricks, and techniques that
  hackers use, i.e, by duplicating the intent
  and actions of malicious hackers.
 Ethical hacking is performed with the
  target’s permission.
WHO ARE ETHICAL HACKERS?
   An Ethical Hacker, also known as a whitehat
    hacker, or simply a whitehat, is a security
    professional who applies their hacking skills for
    defensive purposes on behalf of the owners of
    information systems.
   They are completely trustworthy.
   They have strong programming and computer
    networking skills.
   They should have more patience.
   Continuous updating of their knowledge on
    computer and network security is required.
   They should know the techniques of the criminals,
    what their activities would be, how to detected
    them and how to stop them.
REQUIRED SKILLS OF AN ETHICAL HACKER
 Routers: knowledge of routers,
  routing protocols, and access control
  lists.
 Microsoft: skills in operation,
  configuration and management.
 Linux: knowledge of Linux/Unix;
  security setting, configuration, and
  services.
 Firewalls: configurations, and
  operation of intrusion detection
  systems.
ETHICAL HACKING PROCESS

1.   Preparation
2.   Foot printing
3.   Enumeration and fingerprinting
4.   Identification of vulnerabilities
5.   Attack-exploit the vulnerabilities.
PREPARATION:

 Identification of target –company website, mail
  server, extranet.
 Signing of contract

 Agreement on protection against any legal
  issue.
 Contracts to clearly specify limits and dangers
  of the test.
 Total time for testing.

 Key people made aware of testing.
FOOTPRINTING

   Collecting required information about target:
    DNS server.
   IP ranges.
   Administrative contacts.
   Problem reveled by administrator.
ENUMERATION AND FINGERPRINTING

 Operating system enumeration.
 Identification of services/open port.
IDENTIFICATION OF VULNERABILITIES:

   Vulnerabilities
   Insecure configuration.
   Weak passwords.
   Insecure programming.
   Weak access control.
CERTIFICATION

The International Council of E-Commerce
 Consultants (EC-Council) provides a
 professional certification for Certified Ethical
 Hackers (CEH). A certified ethical hacker is
 an ethical hacker who has obtained the
 certification provided by the EC-Council.
ADVANTAGES

 These are good hackers
 Have genuine license to hack

 Generally owned by companies for security
  designing
 Provides security to banking and financial
  establishments
CONCLUSIONS

 Always security professionals are one step
  behind the hackers and crackers.
 Plan for the unplanned attacks.

 The role of ethical hacking in security is to
  provide customers with awareness of how
  they could be attacked and why they are
  targeted.
PRESENTED BY


          SAYANTAN SUR
            BCA(H) – 2

               THANK YOU

More Related Content

What's hot

ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Social engineering
Social engineering Social engineering
Social engineering
 
Network Security
Network SecurityNetwork Security
Network Security
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Network Security
Network SecurityNetwork Security
Network Security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 

Viewers also liked

Validus holdings, ltd. (vr) company profile and swot analysis
Validus holdings, ltd. (vr)   company profile and swot analysisValidus holdings, ltd. (vr)   company profile and swot analysis
Validus holdings, ltd. (vr) company profile and swot analysisCompanyProfile123
 
Ontwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebbenOntwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebbenhrmatches
 
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabrasCatálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabrasJuan Albiñana
 
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...Eduardo Nelson German
 
Curso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménezCurso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménezJavier Arenas Jimenez
 
La opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregidaLa opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregidaeducacionsinescuela
 
Powerpoint visita al museo 2
Powerpoint visita al museo 2Powerpoint visita al museo 2
Powerpoint visita al museo 2tangerina2010
 
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)helmuth Fajardo Peña
 
Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN Ana Cláudia Costa
 
Fiziologija reprodukcije
Fiziologija reprodukcijeFiziologija reprodukcije
Fiziologija reprodukcijeEna Horvat
 
next generation smart sensor
next generation smart sensornext generation smart sensor
next generation smart sensorRicha Ritambhara
 
Farmacología ocular
Farmacología ocularFarmacología ocular
Farmacología ocularKarina Soto
 
re:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im Designre:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im DesignMagdalena Reiter
 

Viewers also liked (17)

Validus holdings, ltd. (vr) company profile and swot analysis
Validus holdings, ltd. (vr)   company profile and swot analysisValidus holdings, ltd. (vr)   company profile and swot analysis
Validus holdings, ltd. (vr) company profile and swot analysis
 
Ontwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebbenOntwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebben
 
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabrasCatálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabras
 
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
 
Uned madrid tips
Uned madrid tipsUned madrid tips
Uned madrid tips
 
Curso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménezCurso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménez
 
Catalogo Feria de Arte flecha 2013
Catalogo Feria de Arte flecha 2013Catalogo Feria de Arte flecha 2013
Catalogo Feria de Arte flecha 2013
 
Marketing en redes sociales
Marketing en redes socialesMarketing en redes sociales
Marketing en redes sociales
 
La opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregidaLa opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregida
 
Powerpoint visita al museo 2
Powerpoint visita al museo 2Powerpoint visita al museo 2
Powerpoint visita al museo 2
 
Proyectos Lifer-2015
Proyectos Lifer-2015Proyectos Lifer-2015
Proyectos Lifer-2015
 
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
 
Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN
 
Fiziologija reprodukcije
Fiziologija reprodukcijeFiziologija reprodukcije
Fiziologija reprodukcije
 
next generation smart sensor
next generation smart sensornext generation smart sensor
next generation smart sensor
 
Farmacología ocular
Farmacología ocularFarmacología ocular
Farmacología ocular
 
re:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im Designre:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im Design
 

Similar to Ethical Hacking

Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxAnshumaanTiwari2
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptshreya_omar
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
An Introduction to Ethical Hacking
An Introduction to Ethical HackingAn Introduction to Ethical Hacking
An Introduction to Ethical HackingVinny Vessel
 

Similar to Ethical Hacking (20)

Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Hacking
HackingHacking
Hacking
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
An Introduction to Ethical Hacking
An Introduction to Ethical HackingAn Introduction to Ethical Hacking
An Introduction to Ethical Hacking
 

More from Sayantan Sur

Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 
Stack using Linked List
Stack using Linked ListStack using Linked List
Stack using Linked ListSayantan Sur
 
Double linked list
Double linked listDouble linked list
Double linked listSayantan Sur
 
Single linked list
Single linked listSingle linked list
Single linked listSayantan Sur
 
Circular linked list
Circular linked listCircular linked list
Circular linked listSayantan Sur
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)Sayantan Sur
 
International Terrorism
International Terrorism International Terrorism
International Terrorism Sayantan Sur
 

More from Sayantan Sur (12)

Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Stack using Linked List
Stack using Linked ListStack using Linked List
Stack using Linked List
 
Stack using Array
Stack using ArrayStack using Array
Stack using Array
 
Array menu
Array menuArray menu
Array menu
 
Double linked list
Double linked listDouble linked list
Double linked list
 
Single linked list
Single linked listSingle linked list
Single linked list
 
Circular linked list
Circular linked listCircular linked list
Circular linked list
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
 
Network Security
Network SecurityNetwork Security
Network Security
 
Visual Studio IDE
Visual Studio IDEVisual Studio IDE
Visual Studio IDE
 
Phising
PhisingPhising
Phising
 
International Terrorism
International Terrorism International Terrorism
International Terrorism
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 

Ethical Hacking

  • 1. ETHICAL HACKING A LICENCE TO HACK
  • 2. HACKING:  Hacking is unauthorized use of computer and network resources.  According to Computer Crime Research Center: “It is act of gaining access without legal authorization to computer or computer network.”
  • 3. HACKER:  Someone who tries to break into computer systems for any illegal purpose.  Someone who maliciously breaks into systems for personal gain. These are criminals.
  • 4. TYPES OF HACKERS  Black hat hacker.  White hat hacker.  Gray hat hacker.
  • 5. BLACK BOX MODEL  Black box model  Company staff does not know about the test.  Tester is not given details about the network. ▪ Burden is on the tester to find these details  It is tested, if security personnel are able to detect an attack.
  • 6. WHITE BOX MODEL  White box model  Tester is told everything about the network topology and technology.  Network diagram is given.  Tester is authorized to interview IT personnel and company employees.  Makes the tester’s job a little easier.
  • 7. GRAY BOX MODEL  Gray box model  Hybrid of the white and black box models.  Company gives tester partial information.
  • 8. WHAT IS ETHICAL HACKING ?  Ethical hacking ,also known as penetration testing or white-hat hacking involves the same tools, tricks, and techniques that hackers use, i.e, by duplicating the intent and actions of malicious hackers.  Ethical hacking is performed with the target’s permission.
  • 9. WHO ARE ETHICAL HACKERS?  An Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems.  They are completely trustworthy.  They have strong programming and computer networking skills.  They should have more patience.  Continuous updating of their knowledge on computer and network security is required.  They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
  • 10. REQUIRED SKILLS OF AN ETHICAL HACKER  Routers: knowledge of routers, routing protocols, and access control lists.  Microsoft: skills in operation, configuration and management.  Linux: knowledge of Linux/Unix; security setting, configuration, and services.  Firewalls: configurations, and operation of intrusion detection systems.
  • 11. ETHICAL HACKING PROCESS 1. Preparation 2. Foot printing 3. Enumeration and fingerprinting 4. Identification of vulnerabilities 5. Attack-exploit the vulnerabilities.
  • 12. PREPARATION:  Identification of target –company website, mail server, extranet.  Signing of contract  Agreement on protection against any legal issue.  Contracts to clearly specify limits and dangers of the test.  Total time for testing.  Key people made aware of testing.
  • 13. FOOTPRINTING  Collecting required information about target:  DNS server.  IP ranges.  Administrative contacts.  Problem reveled by administrator.
  • 14. ENUMERATION AND FINGERPRINTING  Operating system enumeration.  Identification of services/open port.
  • 15. IDENTIFICATION OF VULNERABILITIES:  Vulnerabilities  Insecure configuration.  Weak passwords.  Insecure programming.  Weak access control.
  • 16. CERTIFICATION The International Council of E-Commerce Consultants (EC-Council) provides a professional certification for Certified Ethical Hackers (CEH). A certified ethical hacker is an ethical hacker who has obtained the certification provided by the EC-Council.
  • 17. ADVANTAGES  These are good hackers  Have genuine license to hack  Generally owned by companies for security designing  Provides security to banking and financial establishments
  • 18. CONCLUSIONS  Always security professionals are one step behind the hackers and crackers.  Plan for the unplanned attacks.  The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.
  • 19. PRESENTED BY SAYANTAN SUR BCA(H) – 2 THANK YOU