Your SlideShare is downloading. ×
0
ETHICAL HACKING    PRESENTED         BY SWETA LEENA PANDA
HIGHLIGHTS•   Who is hacker•   Different kinds of system attacks•   Required Skills of an Ethical Hacker•   Methodology of...
WHO IS HACKER• A person who enjoys learning details  of a programming language or• system• A person who enjoys actually do...
• A person capable of appreciating  someone elses hacking• A person who picks up programming  quickly• A person who is an ...
Different kinds of system          attacks
Required Skills of an Ethical           Hacker• Microsoft: skills in operation,  configuration and management.• Linux: kno...
• Routers: knowledge of routers, routing  protocols, and access control lists  Mainframes• Network Protocols: TCP/IP; how ...
Methodology of Hacking:•   Reconnaissance•   Scanning & Enumeration•   Gaining access•   Maintaining access•   clearing tr...
Reconnaissance:• The literal meaning of the word  reconnaissance means a preliminary  survey to gain information. This is ...
Scanning &Enumeration• Scanning is the second phase in the  hacking methodology in which• the hacker tries to make a blue ...
Enumeration• Enumeration is the ability of a hacker  to convince some servers to give them  information that is vital to t...
Gaining access• This is the actual hacking phase in  which the hacker gains access to the  system. The hacker will make us...
Maintaining Access• Now the hacker is inside the system by  some means by password guessing or  exploiting some of its vul...
Clearing Tracks• Now we come to the final step in the  hacking. There is a saying that  everybody knows a good hacker but ...
Virus Types
VIRUSA program that when run, has the abilityto self-replicate by infecting otherprograms and files on your computer.The w...
Boot Sector VirusBoot sector viruses infect either themaster boot record of the hard disk orthe floppy drive.Examples of b...
File or Program VirusesSome files/programs, when executed,load the virus in the memory andperform predefined functions to ...
Multipartite Viruses• A multipartite virus is a computer virus that  infects multiple different target platforms,  and rem...
Stealth VirusesThese viruses are stealthy in naturemeans it uses various methods forhiding themselves to avoid detection.T...
Polymorphic VirusesPolymorphic viruses have the ability tomutate implying that they change theviral code known as the sign...
Macro VirusesA macro virus is a computer virus that"infects" a Microsoft Word or similarapplication and causes a sequence ...
Security & Counter Measures Use of anti-viruses. Proper logout after use of mail id. Manual opening browser dont open ...
 Patch security hole often Encrypt important data    Ex) pgp, ssh Do not run unused daemon Remove unused setuid/setgi...
Hacking prone areas
Advantages Provides security to banking and  financial establishments Prevents website defacements An evolving techniqu...
Disadvantages All depends upon the trustworthiness  of the ethical hacker Hiring professionals is expensive.
Please send suggestions and feedbacks     I am waiting for your replay.           THANK YOU
Upcoming SlideShare
Loading in...5
×

ETHICAL HACKING

1,259

Published on

Here in this slide i describe the BASIC ... For the Beginners...some general idea & topics i have covered here...My next slide can give more information about hacking... this is the general & only for the beginners.Hope my slide help you to get the thing you want for.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,259
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
63
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "ETHICAL HACKING"

  1. 1. ETHICAL HACKING PRESENTED BY SWETA LEENA PANDA
  2. 2. HIGHLIGHTS• Who is hacker• Different kinds of system attacks• Required Skills of an Ethical Hacker• Methodology of Hacking:• Virus Types• Security & Counter Measures• Advantages & Disadvantages
  3. 3. WHO IS HACKER• A person who enjoys learning details of a programming language or• system• A person who enjoys actually doing the programming rather than just theorizing about it
  4. 4. • A person capable of appreciating someone elses hacking• A person who picks up programming quickly• A person who is an expert at a particular programming language or system.
  5. 5. Different kinds of system attacks
  6. 6. Required Skills of an Ethical Hacker• Microsoft: skills in operation, configuration and management.• Linux: knowledge of Linux/Unix; security setting, configuration, and services.• Firewalls: configurations, and operation of intrusion detection systems.
  7. 7. • Routers: knowledge of routers, routing protocols, and access control lists Mainframes• Network Protocols: TCP/IP; how they function and can be manipulated.• Project Management: leading, planning, organizing, and controlling a penetration testing team
  8. 8. Methodology of Hacking:• Reconnaissance• Scanning & Enumeration• Gaining access• Maintaining access• clearing tracks
  9. 9. Reconnaissance:• The literal meaning of the word reconnaissance means a preliminary survey to gain information. This is also known as foot-printing. This is the first stage in the methodology of hacking.
  10. 10. Scanning &Enumeration• Scanning is the second phase in the hacking methodology in which• the hacker tries to make a blue print of the target network.
  11. 11. Enumeration• Enumeration is the ability of a hacker to convince some servers to give them information that is vital to them to make an attack.
  12. 12. Gaining access• This is the actual hacking phase in which the hacker gains access to the system. The hacker will make use of all the information he collected in the pre- attacking phases.
  13. 13. Maintaining Access• Now the hacker is inside the system by some means by password guessing or exploiting some of its vulnerabilities .In the network scenario the hacker will do it by uploading some software like Trojan horses, sniffers, key stroke loggers etc.
  14. 14. Clearing Tracks• Now we come to the final step in the hacking. There is a saying that everybody knows a good hacker but nobody knows a great hacker .
  15. 15. Virus Types
  16. 16. VIRUSA program that when run, has the abilityto self-replicate by infecting otherprograms and files on your computer.The word virus has incorrectly becomea general term that encompassesTrojans, worms, and viruses.
  17. 17. Boot Sector VirusBoot sector viruses infect either themaster boot record of the hard disk orthe floppy drive.Examples of boot- sector viruses areMichelangelo and Stoned.
  18. 18. File or Program VirusesSome files/programs, when executed,load the virus in the memory andperform predefined functions to infectthe system. They infect program fileswith extensions like .EXE, .COM,.BIN, .DRV and .SYS .Some common file viruses are Sunday,Cascade.
  19. 19. Multipartite Viruses• A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target.• Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989. Other examples are Invader, Flip, etc.
  20. 20. Stealth VirusesThese viruses are stealthy in naturemeans it uses various methods forhiding themselves to avoid detection.They sometimes remove themselvesfrom the memory temporarily to avoiddetection by antivirus.
  21. 21. Polymorphic VirusesPolymorphic viruses have the ability tomutate implying that they change theviral code known as the signature eachtime they spread or infect. Thus anantivirus program which is scanningfor specific virus codes unable todetect its presence.
  22. 22. Macro VirusesA macro virus is a computer virus that"infects" a Microsoft Word or similarapplication and causes a sequence ofactions to be performed automatically.A macro virus is often spread as an e-mail virus. Well-known examples areConcept Virus and Melissa Worm.
  23. 23. Security & Counter Measures Use of anti-viruses. Proper logout after use of mail id. Manual opening browser dont open spam. Password protected admin account.
  24. 24.  Patch security hole often Encrypt important data  Ex) pgp, ssh Do not run unused daemon Remove unused setuid/setgid program Setup loghost Backup the system often Setup firewall Setup IDS  Ex) snort
  25. 25. Hacking prone areas
  26. 26. Advantages Provides security to banking and financial establishments Prevents website defacements An evolving technique To catch a thief you have to think like a thief
  27. 27. Disadvantages All depends upon the trustworthiness of the ethical hacker Hiring professionals is expensive.
  28. 28. Please send suggestions and feedbacks I am waiting for your replay. THANK YOU
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×