SlideShare a Scribd company logo
1 of 19
Download to read offline
ETHICAL HACKING
Contents
• Introduction to hacking
• Types of hackers
• Classification of hackers
• Steps performed by a hacker
• IP address ranges
• Tracing of IP address
• Email Protocol
• Proxy Servers
• Security
• Conclusion
Introduction to Hacking
Hacking: An art as well as a skill depending on a person’s
knowledge and skill.
Hacking
Positive
Negative
Ethical Hacking: Penetration testing focusing on
securing and protecting IT systems.
• White Hat Hacker
• Black Hat Hacker
• Grey Hat Hacker
Types of Hackers
White Hat Hacker
• Perform Ethical Hacking
• Have knowledge of hacking and hacker
toolset
• Locate security weaknesses and implement
countermeasures
• Also known as Penetration Tester
• Focus on securing and protecting IT systems
Black Hat Hacker
• Perform unethical hacking
• Are criminal hackers or crackers
• Use their skills for illegal or malicious purposes
• Focus on Security Cracking and Data Stealing
Grey Hat Hacker
• Sometimes acts legally and sometimes not
• Do not hack for personal gain
• Do not have malicious intentions
• May occasionally commit crimes
• Are hybrid between White Hat and Black Hat
Hackers
Classification of hackers
• Have ability to find unique vulnerability
• Have deep understanding of OSI Layer
Model and TCP/IP Stacks
Coders
• Have experience with os
• Exploit existing vulnerabilities
Admin
• Use scripts and programs developed by
others
• Can cause serious problems
Script
Kiddies
Steps Performed by a Hacker
Reconnais
sance
Scanning
Gaining
access
Maintaining
access
Clearing
tracks
Reconnaissance
• Google
• Samspade
• Email tracker and visual route
Scanning
• War dialing and pingers
• Port scanning
• Enumeration
Password Cracking
• Dictionary Cracking
• Brute Force Cracking
• Hybrid Cracking
• Social Engineering
• Metasploit
• Man in the middle attack
Maintaining access
•Key stroke loggers
•Trojan horses
•Backdoors
•Wrappers
classes ranges
Class-a 0000.0.0.0 to 127.255.255.255
Class-b 128.0.0.0 to 191.255.255.255
Class-c 192.0.0.0 to 223.255.255.255
Class-d 224.0.0.0 to 239.255.255.255
Class-e 240.0.0.0 to 255.255.255
IP ADDRESS RANGES
get IP address and location .
Click on getsoures.
Paste it to the header section
Click on Trace email
Open www. What is my ip address.com
Copy the header from written path.
Show original
Click on email msg.
TRACING OF IP ADDRESS
• Denial of service
• Interception
• Manipulation
• Masquerading
• Repudiation
SECURITY THREATS
Proxy Server
• Intermediary between a workstation user and the internet
• Hackers use the proxy server on the internet to make their identity
invisible to the target.
Internet Proxy Server Router/Switch
LAN
PC
2nd PC
Wireless
connection
Types of proxies:
Proxy
Anonymous
Simple Distorting
Transparent Elite
• Confidentiality
• Integrity
• Availability
• Use antivirus.
• Proper logout after use of email id.
• Don’t open spam.
• Password protected admin account.
SECURITY
• “To catch a thief think like a thief
similarly To catch a hacker think
like a hacker”.
CONCLUSION

More Related Content

Similar to ethicalhacking-1

Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.pptShivaniSingha1
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigationMehedi Hasan
 
Etical hacking
Etical hackingEtical hacking
Etical hackingtalhaabid
 
Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Theko Moima
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security Mehedi Hasan
 
ethicalhacking1 final.pdf
ethicalhacking1 final.pdfethicalhacking1 final.pdf
ethicalhacking1 final.pdfKALASHSHAR
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]SiddheshPowar
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application SecurityBruce Abernethy
 

Similar to ethicalhacking-1 (20)

Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Hacking
HackingHacking
Hacking
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
ethicalhacking1 final.pdf
ethicalhacking1 final.pdfethicalhacking1 final.pdf
ethicalhacking1 final.pdf
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]
 
Hacking
HackingHacking
Hacking
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application Security
 

Recently uploaded

CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfKira Dess
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Toolssoginsider
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsVIEW
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Studentskannan348865
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptamrabdallah9
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024EMMANUELLEFRANCEHELI
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/FootingEr. Suman Jyoti
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 

Recently uploaded (20)

CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/Footing
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 

ethicalhacking-1

  • 2. Contents • Introduction to hacking • Types of hackers • Classification of hackers • Steps performed by a hacker • IP address ranges • Tracing of IP address • Email Protocol • Proxy Servers • Security • Conclusion
  • 3. Introduction to Hacking Hacking: An art as well as a skill depending on a person’s knowledge and skill. Hacking Positive Negative Ethical Hacking: Penetration testing focusing on securing and protecting IT systems.
  • 4. • White Hat Hacker • Black Hat Hacker • Grey Hat Hacker Types of Hackers
  • 5. White Hat Hacker • Perform Ethical Hacking • Have knowledge of hacking and hacker toolset • Locate security weaknesses and implement countermeasures • Also known as Penetration Tester • Focus on securing and protecting IT systems
  • 6. Black Hat Hacker • Perform unethical hacking • Are criminal hackers or crackers • Use their skills for illegal or malicious purposes • Focus on Security Cracking and Data Stealing
  • 7. Grey Hat Hacker • Sometimes acts legally and sometimes not • Do not hack for personal gain • Do not have malicious intentions • May occasionally commit crimes • Are hybrid between White Hat and Black Hat Hackers
  • 8. Classification of hackers • Have ability to find unique vulnerability • Have deep understanding of OSI Layer Model and TCP/IP Stacks Coders • Have experience with os • Exploit existing vulnerabilities Admin • Use scripts and programs developed by others • Can cause serious problems Script Kiddies
  • 9. Steps Performed by a Hacker Reconnais sance Scanning Gaining access Maintaining access Clearing tracks
  • 10. Reconnaissance • Google • Samspade • Email tracker and visual route Scanning • War dialing and pingers • Port scanning • Enumeration
  • 11. Password Cracking • Dictionary Cracking • Brute Force Cracking • Hybrid Cracking • Social Engineering • Metasploit • Man in the middle attack
  • 12. Maintaining access •Key stroke loggers •Trojan horses •Backdoors •Wrappers
  • 13. classes ranges Class-a 0000.0.0.0 to 127.255.255.255 Class-b 128.0.0.0 to 191.255.255.255 Class-c 192.0.0.0 to 223.255.255.255 Class-d 224.0.0.0 to 239.255.255.255 Class-e 240.0.0.0 to 255.255.255 IP ADDRESS RANGES
  • 14. get IP address and location . Click on getsoures. Paste it to the header section Click on Trace email Open www. What is my ip address.com Copy the header from written path. Show original Click on email msg. TRACING OF IP ADDRESS
  • 15. • Denial of service • Interception • Manipulation • Masquerading • Repudiation SECURITY THREATS
  • 16. Proxy Server • Intermediary between a workstation user and the internet • Hackers use the proxy server on the internet to make their identity invisible to the target. Internet Proxy Server Router/Switch LAN PC 2nd PC Wireless connection
  • 17. Types of proxies: Proxy Anonymous Simple Distorting Transparent Elite
  • 18. • Confidentiality • Integrity • Availability • Use antivirus. • Proper logout after use of email id. • Don’t open spam. • Password protected admin account. SECURITY
  • 19. • “To catch a thief think like a thief similarly To catch a hacker think like a hacker”. CONCLUSION