Your SlideShare is downloading. ×
Ethical hacking
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Ethical hacking


Published on

it contains all the data a person needs for ethical hacking

it contains all the data a person needs for ethical hacking

Published in: Education
No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Isas project
  • 2. Ethical Hacking Megha shah Merlyn Pooja Singh
  • 3. AGENDA
    • What is Ethical Hacking?
    • Who are ethical hackers?
    • History of hacking
    • Types of hackers
    • Ways to hack a system
    • Preventing hacking
    • Skills of an ethical hacker
  • 4. Ethical Hacking
    • Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, adminstrator,or designer.
    • The greatest risk I.T. faces is security.
    • Hacking refers practice of breaking into systems.
  • 5. Who is hacker?
    • . Hackers  intelligent computer professionals learned and acquired knowledge of advanced operating techniques.
    • Try to gain knowledge in depth of systems /networks.
    • Hackers do not always intend to damage data.
    • They may share their knowledge with others.
  • 6. History of hacking
    • The term “hack” was first used by US university staff in mid-1960s .
    • When eBay was first attacked in February 2000 its server was bombarded with fake request for web pages & overloaded the site.
    • A group of teenagers once hacked into AOL and stole credit cards to buy video games.
    • In 1986, after many more break-ins congress passed “computer fraud and abuse act”.
  • 7. History of hacking
    • In 1989,german hackers arrested for breaking into US computer ; sold the information to Soviet KGB.
    • In 1998, teenager hacks into bell Atlantic phone system; disabled communication at airports disables runway lights.
    • In 2000, viruses named “I OVE YOU” & “LOVE BUG” damaged roughly up to 10 billions of computers.
  • 8. Types of hackers
    • Depending on the nature & activities hackers are categorized into different groups :
    • White hat : use their skills & knowledge for good purpose .Help in finding new security vulnerabilities and applications.
    • Black hat : engage in their activities with bad intention and perform illegal activities such as defacing websites and destroying data.
    • Grey hat : do not categorize their work as good or bad.
  • 9. Ways To Hack a System
    • VIRUSES & WORMS - they are self-replicating programs or codes fragments.
    • They attach themselves to other programs (viruses) or machines (worms).
    • They shut networks by flooding them.
    • ROUGE ACCESS POINT- they are unsecured wireless access point that outsiders can easily breech.
    • Are most often connected by well-meaning but ignorant employees.
  • 10. Ways To Hack a System
    • BACK DOORS- they are loop holes in any system.
    • With the aid of computerized searchers (bots) , hackers can probably find any weakness in network.
    • TROJAN HORSES- they enter system by attaching themselves to other programs
    • When Trojans are activated , this hacked software kicks off viruses in the system.
  • 11. Ways To Hack a System
    • Denial Of Services- this attacks gives hackers a way to bring down the network without internal access.
    • It floods the access router with bogus traffic
    • (i.e. e-mail or TCP ,packets).
    • Phreaks- they use computer to break into telecommunications network.
    • Script kiddies- they have inadequate technical information & use available information to break into system.
  • 12. Preventing Hacking
    • Anti-virus: the most popular method of protection among personal computers.
    • Mc Corp.- provides antivirus software that scans hard drive’s for infected files.
    • Norton Internet Security- Norton anti virus 2008 secures system from Trojans.
    • Firewalls: used for computer networks & users using continuous online connections.
  • 13. Preventing Hacking
    • Other software options- other options are used to protect larger networks systems.
    • IDS- Intrusion Detection System is considered one of best protection method
    • Content Filtering Software- advanced antivirus software that reads compressed files .Allows IT mangers get filtering to block threatening e-mail.
    • Sand Boxing- helps to read malicious codes.
  • 14. Skills of an ethical hacker
    • Routers- knowledge of routers, routing protocols and access control lists.
    • Microsoft- skills in operation , configuration and management.
    • Linux- knowledge of Linux/Unix; security setting, configuration, and services.
    • Firewalls- configuration, & operation of intrusion detection systems.
  • 15. Skills of an ethical hacker
    • Network protocols- TCP/IP ; how they function and can be manipulated.
    • Project management- knowledge of leading, planning, organizing, and controlling a penetration tests systems.