SlideShare a Scribd company logo
1 of 21
DEPARTMENT OF FORENSIC
SCIENCE
Name: ANKITA JAIN
Register No: 16MS1FS012
M.Sc. Forensic Science
Jain University – School of
Science
Batch: 2016-2018
DEPARTMENT OF FORENSIC
SCIENCE
Bytecode is an Information Security
Training and development company,
based in New Delhi (India). We started
our operations on 1st, February 2008,
since its foundation we are committed
to offer best information security
training and services to our students,
clients and partners.
we have successfully trained and
certified more than 15000 (fifteen
thousands) students accross the world.
INTRODUCTION
•Ethical hacking refers to the act of locating weaknesses and vulnerabilities of
computer and information systems by duplicating the intent and actions of
malicious hackers.
•Ethical hacking is also known as penetration testing, intrusion testing, or red
teaming.
•Information security (IS) is designed to protect the confidentiality, integrity and
availability of computer system data from those with malicious intentions.
• An ethical hacker is a security professional who applies their hacking skills for
defensive purposes on behalf of the owners of information systems. By
conducting penetration tests, an ethical hacker looks to answer the following
four basic questions:
•What information/locations/systems can an attacker gain access?
•What can an attacker see on the target?
•What can an attacker do with available information?
•Does anyone at the target system notice the attempts
DEPARTMENT OF FORENSIC
SCIENCE
TYPES OF HACKERS
• White Hat
•Black Hat
•Gray Hat
•Green Hat
•Red Hat
•Blue Hat
DEPARTMENT OF FORENSIC
SCIENCE
THE ETHICAL HACKING PROCESS INVOLVE
•Planning
•Reconnaissance
•Enumeration
•Vulnerability Analysis
•Exploitation
•Final Analysis
•Deliverables
•Integration
DEPARTMENT OF FORENSIC
SCIENCE
DENIAL OF SERVICE ( DoS )
A denial of service attack ( DoS attack) is generally the attempt to degrade the
resources of another computer, or crash it, so the that the intended users of that
computer can not longer use it. The methods used to do such an attack usually
involve an attempt to exploit a weakness in one of the protocols that are used on the
internet to cause harm to the target machine or make it lose and use resources at an
unusual level.
Goals of the attacks:
•"flood" a network which will prevent legitimate network traffic
•disrupt connections between two machines, which will prevent
access to a service
•disrupt the service given to a particular system or person
DEPARTMENT OF FORENSIC
SCIENCE
DEPARTMENT OF FORENSIC
SCIENCE
CRYPTOGRAPHY
The word cryptography comes from two Greek words meaning "secret writing" and is
the art and science of concealing meaning. Cryptanalysis is the breaking of codes. The
basic component of cryptography is a cryptosystem.
Quintuple (E, D, M, K, C):
M set of plaintexts
K set of keys
C set of ciphertexts
E set of encryption functions
D set of decryption functions
The goal of cryptography is to keep enciphered information secret.
An adversary wishes to break a ciphertext. Standard cryptographic practice is to
assume that one knows the algorithm used to encipher the plaintext, but not the
specific cryptographic key.
DEPARTMENT OF FORENSIC
SCIENCE
SNIFFING
Ethernet sniffer or wireless sniffer is a computer program or piece of computer
hardware that can intercept and log traffic that passes over a digital network or
part of a network. As data streams flow across the network, the sniffer captures
each packet and, if needed, decodes the packet's raw data, showing the values of
various fields in the packet, and analyzes its content according to the
appropriate or other specifications.
Packet sniffers can:
•Analyze network problems
•Detect network intrusion attempts
•Detect network misuse by internal and external users
•Documenting regulatory compliance through logging all perimeter and endpoint
traffic
•Gain information for effecting a network intrusion
DEPARTMENT OF FORENSIC
SCIENCE
DEPARTMENT OF FORENSIC
SCIENCE
HACKING WEB SERVER
A web server is just the hardware computer, but a web server is
also the software computer application that is installed in the
hardware computer. The primary function of a web server is to
deliver web pages on the request to clients using the Hypertext
Transfer Protocol (HTTP).
The common vulnerabilities that attackers take advantage of.
•Default settings
•Misconfiguration
•Bugs in the operating system and web servers.
Using scripting languages are-
•VB script
•Java script
•PHP
DEPARTMENT OF FORENSIC
SCIENCE
SCANNING NETWORK
Network scanning refers to the use of a computer network to gather
information regarding computing systems. Network scanning is mainly used
for security assessment, system maintenance, and also for performing
attacks by hackers.
The purpose of network scanning is as follows:
•Recognize available UDP and TCP network services running on the targeted
hosts
•Recognize filtering systems between the user and the targeted hosts
•Determine the operating systems (OSs) in use by assessing IP responses
•Evaluate the target host's TCP sequence number predictability to
determine sequence prediction attack and TCP spoofing
DEPARTMENT OF FORENSIC
SCIENCE
Network scanning consists of network port scanning as well as vulnerability
scanning.
Network port scanning refers to the method of sending data packets via the
network to a computing system's specified service port numbers
Vulnerability scanning is a method used to discover known vulnerabilities of
computing systems available on a network. It helps to detect specific weak spots
in an application software or the operating system (OS), which could be used to
crash the system or compromise it for undesired purposes.
Network port scanning as well as vulnerability scanning is an information-
gathering technique, but when carried out by anonymous individuals, these are
viewed as a prelude to an attack.
DEPARTMENT OF FORENSIC
SCIENCE
SOCIAL ENGINEERING
Social Engineering is the manipulation of people to further a person's motives
using various methods. “The art and science of getting people to comply to your
wishes” This "compliance" is generally associated with the acquisition of
electronic information
DEPARTMENT OF FORENSIC
SCIENCE
TECHNIQUES
DEPARTMENT OF FORENSIC
SCIENCE
PHISHING
The fraudulent practice of sending emails purporting to be from reputable
companies in order to induce individuals to reveal personal information, such as
passwords and credit card numbers.
DEPARTMENT OF FORENSIC
SCIENCE
TYPES OF PHISHING
EXAMPLE
DEPARTMENT OF FORENSIC
SCIENCE
Ethical hacking is an emerging tools used by most of the organizations for testing
network security. The security risks and vulnerabilities in a network can be
recognized with the help of ethical hacking. According to surveys conducted by
cyber security firms in the country, Indian firms lost more than $4 billion in 2013
alone because of hackers. Government agencies and business organizations today
are in constant need of ethical hackers to combat the growing threat to IT
security.
CONCLUSION
DEPARTMENT OF FORENSIC
SCIENCE
During my internship, I learnt the underlying principles and techniques
associated with the cyber security practice known as penetration testing or
ethical hacking. I also became familiar with the entire penetration testing
process including planning, reconnaissance, scanning, exploitation, post-
exploitation and result reporting. Ethical hackers assist to preserve data from
the third party access. Their job is also to find any malfunctioned activities
that happened in the system and more importantly immediately send the
alert information and bring it to your knowledge. I developed a practical
understanding of the current cyber security issues and the ways how the
errors made by users, administrators, or programmers can lead to exploitable
insecurities.
LEARNING OUTCOME
DEPARTMENT OF FORENSIC
SCIENCE
Govil,J.,(2007) Ramifications of Cyber Crime and Suggestive Preventive Measures,
International Conference on Electro/Information Technology
Jamal,R.,(2014) A survey of Cyber Attack Detection Strategies, International Journal of
Security and it’s Application 8(1)
Kandpal,V.,(2013) Latest Face of Cybercrime and Its Prevention In India, International
Journal of Basic and applied sciences2(4)
Malhotra,S.,(2016)CyberCrime-It’s types, Analysis and Prevention Techniques
International Journal of Advanced Research in Computer Science and Software
Engineering6(5)
Moore,R.(2005) “Cyber crime:Investigating High Technology Computer Crime,”
Cleveland, Mississippi: Anderson publishing
Yadav,S.,(2013)CyberCrime And Security A Research Paper International Journal of
Scientific and Engineering Research4(8)
REFRENCES
DEPARTMENT OF FORENSIC
SCIENCE
DEPARTMENT OF FORENSIC
SCIENCE

More Related Content

What's hot

Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...IJCSIS Research Publications
 
Ceis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperCeis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperAlexander Decker
 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies IJECEIAES
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of ThingsDeris Stiawan
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensicSANTANU KUMAR DAS
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 
To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...Nishant Mehta
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)SHUBHA CHATURVEDI
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Skills Academy
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systemsijsrd.com
 
Intruders detection
Intruders detectionIntruders detection
Intruders detectionEhtisham Ali
 

What's hot (19)

Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Ceis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperCeis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paper
 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systems
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
 

Similar to Internship ankita jain

Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsCSCJournals
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introductionjagadeesh katla
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectioncsandit
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...Editor IJMTER
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docxSUBHI7
 
cybersecurity
cybersecuritycybersecurity
cybersecuritymaha797959
 
UNIT 1Computer forensics science. .pptx
UNIT 1Computer forensics science.  .pptxUNIT 1Computer forensics science.  .pptx
UNIT 1Computer forensics science. .pptxramkumarttf69
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.finalAlexisHarvey8
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdfBelayet Hossain
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275IJERA Editor
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 

Similar to Internship ankita jain (20)

E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
 
Computer security and
Computer security andComputer security and
Computer security and
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Is4560
Is4560Is4560
Is4560
 
UNIT 1Computer forensics science. .pptx
UNIT 1Computer forensics science.  .pptxUNIT 1Computer forensics science.  .pptx
UNIT 1Computer forensics science. .pptx
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 

Recently uploaded

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...sonatiwari757
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goasexy call girls service in goa
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 

Recently uploaded (20)

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 

Internship ankita jain

  • 1. DEPARTMENT OF FORENSIC SCIENCE Name: ANKITA JAIN Register No: 16MS1FS012 M.Sc. Forensic Science Jain University – School of Science Batch: 2016-2018
  • 2. DEPARTMENT OF FORENSIC SCIENCE Bytecode is an Information Security Training and development company, based in New Delhi (India). We started our operations on 1st, February 2008, since its foundation we are committed to offer best information security training and services to our students, clients and partners. we have successfully trained and certified more than 15000 (fifteen thousands) students accross the world.
  • 3. INTRODUCTION •Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. •Ethical hacking is also known as penetration testing, intrusion testing, or red teaming. •Information security (IS) is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. • An ethical hacker is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. By conducting penetration tests, an ethical hacker looks to answer the following four basic questions: •What information/locations/systems can an attacker gain access? •What can an attacker see on the target? •What can an attacker do with available information? •Does anyone at the target system notice the attempts DEPARTMENT OF FORENSIC SCIENCE
  • 4. TYPES OF HACKERS • White Hat •Black Hat •Gray Hat •Green Hat •Red Hat •Blue Hat DEPARTMENT OF FORENSIC SCIENCE
  • 5. THE ETHICAL HACKING PROCESS INVOLVE •Planning •Reconnaissance •Enumeration •Vulnerability Analysis •Exploitation •Final Analysis •Deliverables •Integration DEPARTMENT OF FORENSIC SCIENCE
  • 6. DENIAL OF SERVICE ( DoS ) A denial of service attack ( DoS attack) is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Goals of the attacks: •"flood" a network which will prevent legitimate network traffic •disrupt connections between two machines, which will prevent access to a service •disrupt the service given to a particular system or person DEPARTMENT OF FORENSIC SCIENCE
  • 8. CRYPTOGRAPHY The word cryptography comes from two Greek words meaning "secret writing" and is the art and science of concealing meaning. Cryptanalysis is the breaking of codes. The basic component of cryptography is a cryptosystem. Quintuple (E, D, M, K, C): M set of plaintexts K set of keys C set of ciphertexts E set of encryption functions D set of decryption functions The goal of cryptography is to keep enciphered information secret. An adversary wishes to break a ciphertext. Standard cryptographic practice is to assume that one knows the algorithm used to encipher the plaintext, but not the specific cryptographic key. DEPARTMENT OF FORENSIC SCIENCE
  • 9. SNIFFING Ethernet sniffer or wireless sniffer is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes the packet's raw data, showing the values of various fields in the packet, and analyzes its content according to the appropriate or other specifications. Packet sniffers can: •Analyze network problems •Detect network intrusion attempts •Detect network misuse by internal and external users •Documenting regulatory compliance through logging all perimeter and endpoint traffic •Gain information for effecting a network intrusion DEPARTMENT OF FORENSIC SCIENCE
  • 11. HACKING WEB SERVER A web server is just the hardware computer, but a web server is also the software computer application that is installed in the hardware computer. The primary function of a web server is to deliver web pages on the request to clients using the Hypertext Transfer Protocol (HTTP). The common vulnerabilities that attackers take advantage of. •Default settings •Misconfiguration •Bugs in the operating system and web servers. Using scripting languages are- •VB script •Java script •PHP DEPARTMENT OF FORENSIC SCIENCE
  • 12. SCANNING NETWORK Network scanning refers to the use of a computer network to gather information regarding computing systems. Network scanning is mainly used for security assessment, system maintenance, and also for performing attacks by hackers. The purpose of network scanning is as follows: •Recognize available UDP and TCP network services running on the targeted hosts •Recognize filtering systems between the user and the targeted hosts •Determine the operating systems (OSs) in use by assessing IP responses •Evaluate the target host's TCP sequence number predictability to determine sequence prediction attack and TCP spoofing DEPARTMENT OF FORENSIC SCIENCE
  • 13. Network scanning consists of network port scanning as well as vulnerability scanning. Network port scanning refers to the method of sending data packets via the network to a computing system's specified service port numbers Vulnerability scanning is a method used to discover known vulnerabilities of computing systems available on a network. It helps to detect specific weak spots in an application software or the operating system (OS), which could be used to crash the system or compromise it for undesired purposes. Network port scanning as well as vulnerability scanning is an information- gathering technique, but when carried out by anonymous individuals, these are viewed as a prelude to an attack. DEPARTMENT OF FORENSIC SCIENCE
  • 14. SOCIAL ENGINEERING Social Engineering is the manipulation of people to further a person's motives using various methods. “The art and science of getting people to comply to your wishes” This "compliance" is generally associated with the acquisition of electronic information DEPARTMENT OF FORENSIC SCIENCE
  • 16. PHISHING The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. DEPARTMENT OF FORENSIC SCIENCE
  • 18. Ethical hacking is an emerging tools used by most of the organizations for testing network security. The security risks and vulnerabilities in a network can be recognized with the help of ethical hacking. According to surveys conducted by cyber security firms in the country, Indian firms lost more than $4 billion in 2013 alone because of hackers. Government agencies and business organizations today are in constant need of ethical hackers to combat the growing threat to IT security. CONCLUSION DEPARTMENT OF FORENSIC SCIENCE
  • 19. During my internship, I learnt the underlying principles and techniques associated with the cyber security practice known as penetration testing or ethical hacking. I also became familiar with the entire penetration testing process including planning, reconnaissance, scanning, exploitation, post- exploitation and result reporting. Ethical hackers assist to preserve data from the third party access. Their job is also to find any malfunctioned activities that happened in the system and more importantly immediately send the alert information and bring it to your knowledge. I developed a practical understanding of the current cyber security issues and the ways how the errors made by users, administrators, or programmers can lead to exploitable insecurities. LEARNING OUTCOME DEPARTMENT OF FORENSIC SCIENCE
  • 20. Govil,J.,(2007) Ramifications of Cyber Crime and Suggestive Preventive Measures, International Conference on Electro/Information Technology Jamal,R.,(2014) A survey of Cyber Attack Detection Strategies, International Journal of Security and it’s Application 8(1) Kandpal,V.,(2013) Latest Face of Cybercrime and Its Prevention In India, International Journal of Basic and applied sciences2(4) Malhotra,S.,(2016)CyberCrime-It’s types, Analysis and Prevention Techniques International Journal of Advanced Research in Computer Science and Software Engineering6(5) Moore,R.(2005) “Cyber crime:Investigating High Technology Computer Crime,” Cleveland, Mississippi: Anderson publishing Yadav,S.,(2013)CyberCrime And Security A Research Paper International Journal of Scientific and Engineering Research4(8) REFRENCES DEPARTMENT OF FORENSIC SCIENCE