ETHICAL HACKING

  • 1,214 views
Uploaded on

Here in this slide i describe the BASIC ... For the Beginners...some general idea & topics i have covered here...My next slide can give more information about hacking... this is the general & only for …

Here in this slide i describe the BASIC ... For the Beginners...some general idea & topics i have covered here...My next slide can give more information about hacking... this is the general & only for the beginners.Hope my slide help you to get the thing you want for.

More in: Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,214
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
61
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. ETHICAL HACKING PRESENTED BY SWETA LEENA PANDA
  • 2. HIGHLIGHTS• Who is hacker• Different kinds of system attacks• Required Skills of an Ethical Hacker• Methodology of Hacking:• Virus Types• Security & Counter Measures• Advantages & Disadvantages
  • 3. WHO IS HACKER• A person who enjoys learning details of a programming language or• system• A person who enjoys actually doing the programming rather than just theorizing about it
  • 4. • A person capable of appreciating someone elses hacking• A person who picks up programming quickly• A person who is an expert at a particular programming language or system.
  • 5. Different kinds of system attacks
  • 6. Required Skills of an Ethical Hacker• Microsoft: skills in operation, configuration and management.• Linux: knowledge of Linux/Unix; security setting, configuration, and services.• Firewalls: configurations, and operation of intrusion detection systems.
  • 7. • Routers: knowledge of routers, routing protocols, and access control lists Mainframes• Network Protocols: TCP/IP; how they function and can be manipulated.• Project Management: leading, planning, organizing, and controlling a penetration testing team
  • 8. Methodology of Hacking:• Reconnaissance• Scanning & Enumeration• Gaining access• Maintaining access• clearing tracks
  • 9. Reconnaissance:• The literal meaning of the word reconnaissance means a preliminary survey to gain information. This is also known as foot-printing. This is the first stage in the methodology of hacking.
  • 10. Scanning &Enumeration• Scanning is the second phase in the hacking methodology in which• the hacker tries to make a blue print of the target network.
  • 11. Enumeration• Enumeration is the ability of a hacker to convince some servers to give them information that is vital to them to make an attack.
  • 12. Gaining access• This is the actual hacking phase in which the hacker gains access to the system. The hacker will make use of all the information he collected in the pre- attacking phases.
  • 13. Maintaining Access• Now the hacker is inside the system by some means by password guessing or exploiting some of its vulnerabilities .In the network scenario the hacker will do it by uploading some software like Trojan horses, sniffers, key stroke loggers etc.
  • 14. Clearing Tracks• Now we come to the final step in the hacking. There is a saying that everybody knows a good hacker but nobody knows a great hacker .
  • 15. Virus Types
  • 16. VIRUSA program that when run, has the abilityto self-replicate by infecting otherprograms and files on your computer.The word virus has incorrectly becomea general term that encompassesTrojans, worms, and viruses.
  • 17. Boot Sector VirusBoot sector viruses infect either themaster boot record of the hard disk orthe floppy drive.Examples of boot- sector viruses areMichelangelo and Stoned.
  • 18. File or Program VirusesSome files/programs, when executed,load the virus in the memory andperform predefined functions to infectthe system. They infect program fileswith extensions like .EXE, .COM,.BIN, .DRV and .SYS .Some common file viruses are Sunday,Cascade.
  • 19. Multipartite Viruses• A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target.• Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989. Other examples are Invader, Flip, etc.
  • 20. Stealth VirusesThese viruses are stealthy in naturemeans it uses various methods forhiding themselves to avoid detection.They sometimes remove themselvesfrom the memory temporarily to avoiddetection by antivirus.
  • 21. Polymorphic VirusesPolymorphic viruses have the ability tomutate implying that they change theviral code known as the signature eachtime they spread or infect. Thus anantivirus program which is scanningfor specific virus codes unable todetect its presence.
  • 22. Macro VirusesA macro virus is a computer virus that"infects" a Microsoft Word or similarapplication and causes a sequence ofactions to be performed automatically.A macro virus is often spread as an e-mail virus. Well-known examples areConcept Virus and Melissa Worm.
  • 23. Security & Counter Measures Use of anti-viruses. Proper logout after use of mail id. Manual opening browser dont open spam. Password protected admin account.
  • 24.  Patch security hole often Encrypt important data  Ex) pgp, ssh Do not run unused daemon Remove unused setuid/setgid program Setup loghost Backup the system often Setup firewall Setup IDS  Ex) snort
  • 25. Hacking prone areas
  • 26. Advantages Provides security to banking and financial establishments Prevents website defacements An evolving technique To catch a thief you have to think like a thief
  • 27. Disadvantages All depends upon the trustworthiness of the ethical hacker Hiring professionals is expensive.
  • 28. Please send suggestions and feedbacks I am waiting for your replay. THANK YOU