SlideShare a Scribd company logo
1 of 14
SEMINAR ON
ETHICAL HACKING
PRESENTED BY:
DEVENDRA KUMAR YADAV
1
ELECTRICAL AND ELECTRONICS DEPARTMENT
G. L. BAJAJ INSTITUTE OF TECHNOLOGY AND MANAGEMENT
CONTENT
 What is Hacking?
 What is Ethical Hacking?
 Types of Hackers
 Phases of Hacking
 Countermeasures
 Recent cases of Hacking
 References
What is Hacking?
Hacking refers to exploiting system vulnerabilities and
compromising security controls to gain unauthorised or
inappropriate access to the system resources.
It involves modifying system or application features to achieve a
goal outside of the creator’s original purpose.
Hacking can be used to steal and redistribute intellectual property
leading to business loss.
What is Ethical Hacking?
Ethical Hacking
involves the use of
hacking tools, tricks and
techniques to identify
vulnerabilities so as to
ensure system security.
It focuses on stimulating
techniques used by
attackers to verify the
existence of exploitable
vulnerabilities in the
system.
Types of Hackers
White Hat
Black Hat
Grey Hat
Individuals professing
hackers skills and using
them for the defensive
purpose also known as
Security Analysts.
Individuals with
extraordinary computing
skills, resorting to
malicious or destructive
activities and are also
known as Crackers.
Individuals who work
both offensive and
defensive at various
works.
Phases of Hacking
Clearing
Tracks
Maintaining
Access
Gaining
Access
Scanning
Reconnaiss
ance
Hacking Phases: Reconnaissance
Reconnaissance
Scanning
Gaining
Access
Maintaining
Access
Clearing
Tracks
Reconnaissance refers to a preparatory phase
where an attackers seeks to gather
information about a target prior to launching
an attack.
Could be the future point of return, noted for
ease of entry for an attack when more about
the target is known on a board scale.
Reconnaissance target range may include
the target organization’s clients employee,
operations, network and systems.
Reconna
issance
Scanning
Gaining
Access
Hacking Phases: Scanning
Clearing
Tracks
Maintaining
Access
 Pre-Attack Phase: Scanning refers to the
pre-attack phase when the attackers scans the
networks for specific information gathered
during reconnaissance.
 Port Scanner: Scanning can include use of
diameter, port scanner’s, network mapper,
ping tools, vulnerabilities scanner etc.
 Extract Information: Attackers extract
information such as live machines, port, port
status, OS details, device type, system
uptime, etc to launch attack.
Hacking Phases: Gaining Access
Reconnai
ssance
Maintaining
Access
Clearing
Tracks
Scanning
Gaining
Access
Gaining access refers to the point where the
attacker obtains access to the operating system or
applications on the computer or network.
The Attackers can escalate privileges to obtain
complete control of the system. In the process,
intermediate systems that are connected to it are
also compromised.
The attacker can gain access at the operating
system level, application level, or network level.
Example include password cracking, buffer
overflows, denial of service, session hijacking
etc.
Hacking Phase: Maintaining Access
Reconnai
ssance
Maintaining
Access
Scanning
Gaining
Access
Clearing
Tracks
 Maintaining access refers to the phase when the
attackers tries to retain his or her ownership of the
system.
 Attackers may prevent the system from being
owned by other attackers by securing their
exclusive access with Blackdoor, Rootkits, or
Trojans.
 Attackers can upload, download or manipulate
data, applications and configurations on the owned
system.
 Attackers use the compromised system to launch
further attacks
Hacking Phase: Clearing Tracks
Reconnais
sance
Scanning
Gaining
Access
Maintaining
Access
Clearing
Tracks
 Covering tracks refers to the activities carried
out by an attacker to hide malicious acts.
 The attackers intentions includes: Continuing
access to the victim’s system, remaining
unnoticed and uncaught, deleting evidence
that might lead to his prosecution.
 The attackers overwrites the serve, system
and application logs to avoid suspicion.
Countermeasures
 Do not responds to the Phishing email and calls.
 Regularly change password of the accounts & try to use
special characters in the password.
 To avoid atm fraud try not to swipe atm card at any random
shop & change pin within months.
 Do not reveal any personal information on the social
networking sites such as on Facebook and Twitter.
Recent Cases of Hacking
 In August 2013, 1 billion
yahoo mail account passwords
has been leaked and the
information were compromised.
This is one of biggest data
breach in the history.
 3.2 million SBI bank account
was hacked by the hackers of
China and unauthorised transection
is done, this is the biggest breach in
the history of the Indian bank.
References
 Kimberly Graves. “CEH: Certified Ethical Hacker Study Guide”, John Wiley &
Sons, Inc.
 C. Palmer. “Ethical hacking”, IBM SYSTEMS JOURNAL, VOL 40, NO 3, 2001.
 Steven DeFino, Larry Greenblatt. “CEH: Certified Ethical Hacker Review Guide
version7.1”
 Ethical Hacking – GIAC, URL: www.giac.org/paper/gsec/2468/ethical-
hacking/104292

More Related Content

What's hot (20)

Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 

Similar to Ethical hacking

Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxyoufanlimboo
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGNathan Mathis
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxJanani S
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptxDomain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptxInfosectrain3
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptxjohnnymaaza
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfJawaidAbdulHameed
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 

Similar to Ethical hacking (20)

Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
 
EthicalHacking.pptx
EthicalHacking.pptxEthicalHacking.pptx
EthicalHacking.pptx
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptxDomain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
Ethical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive CheatsheetEthical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive Cheatsheet
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Ethical hacking

  • 1. SEMINAR ON ETHICAL HACKING PRESENTED BY: DEVENDRA KUMAR YADAV 1 ELECTRICAL AND ELECTRONICS DEPARTMENT G. L. BAJAJ INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 2. CONTENT  What is Hacking?  What is Ethical Hacking?  Types of Hackers  Phases of Hacking  Countermeasures  Recent cases of Hacking  References
  • 3. What is Hacking? Hacking refers to exploiting system vulnerabilities and compromising security controls to gain unauthorised or inappropriate access to the system resources. It involves modifying system or application features to achieve a goal outside of the creator’s original purpose. Hacking can be used to steal and redistribute intellectual property leading to business loss.
  • 4. What is Ethical Hacking? Ethical Hacking involves the use of hacking tools, tricks and techniques to identify vulnerabilities so as to ensure system security. It focuses on stimulating techniques used by attackers to verify the existence of exploitable vulnerabilities in the system.
  • 5. Types of Hackers White Hat Black Hat Grey Hat Individuals professing hackers skills and using them for the defensive purpose also known as Security Analysts. Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as Crackers. Individuals who work both offensive and defensive at various works.
  • 7. Hacking Phases: Reconnaissance Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks Reconnaissance refers to a preparatory phase where an attackers seeks to gather information about a target prior to launching an attack. Could be the future point of return, noted for ease of entry for an attack when more about the target is known on a board scale. Reconnaissance target range may include the target organization’s clients employee, operations, network and systems.
  • 8. Reconna issance Scanning Gaining Access Hacking Phases: Scanning Clearing Tracks Maintaining Access  Pre-Attack Phase: Scanning refers to the pre-attack phase when the attackers scans the networks for specific information gathered during reconnaissance.  Port Scanner: Scanning can include use of diameter, port scanner’s, network mapper, ping tools, vulnerabilities scanner etc.  Extract Information: Attackers extract information such as live machines, port, port status, OS details, device type, system uptime, etc to launch attack.
  • 9. Hacking Phases: Gaining Access Reconnai ssance Maintaining Access Clearing Tracks Scanning Gaining Access Gaining access refers to the point where the attacker obtains access to the operating system or applications on the computer or network. The Attackers can escalate privileges to obtain complete control of the system. In the process, intermediate systems that are connected to it are also compromised. The attacker can gain access at the operating system level, application level, or network level. Example include password cracking, buffer overflows, denial of service, session hijacking etc.
  • 10. Hacking Phase: Maintaining Access Reconnai ssance Maintaining Access Scanning Gaining Access Clearing Tracks  Maintaining access refers to the phase when the attackers tries to retain his or her ownership of the system.  Attackers may prevent the system from being owned by other attackers by securing their exclusive access with Blackdoor, Rootkits, or Trojans.  Attackers can upload, download or manipulate data, applications and configurations on the owned system.  Attackers use the compromised system to launch further attacks
  • 11. Hacking Phase: Clearing Tracks Reconnais sance Scanning Gaining Access Maintaining Access Clearing Tracks  Covering tracks refers to the activities carried out by an attacker to hide malicious acts.  The attackers intentions includes: Continuing access to the victim’s system, remaining unnoticed and uncaught, deleting evidence that might lead to his prosecution.  The attackers overwrites the serve, system and application logs to avoid suspicion.
  • 12. Countermeasures  Do not responds to the Phishing email and calls.  Regularly change password of the accounts & try to use special characters in the password.  To avoid atm fraud try not to swipe atm card at any random shop & change pin within months.  Do not reveal any personal information on the social networking sites such as on Facebook and Twitter.
  • 13. Recent Cases of Hacking  In August 2013, 1 billion yahoo mail account passwords has been leaked and the information were compromised. This is one of biggest data breach in the history.  3.2 million SBI bank account was hacked by the hackers of China and unauthorised transection is done, this is the biggest breach in the history of the Indian bank.
  • 14. References  Kimberly Graves. “CEH: Certified Ethical Hacker Study Guide”, John Wiley & Sons, Inc.  C. Palmer. “Ethical hacking”, IBM SYSTEMS JOURNAL, VOL 40, NO 3, 2001.  Steven DeFino, Larry Greenblatt. “CEH: Certified Ethical Hacker Review Guide version7.1”  Ethical Hacking – GIAC, URL: www.giac.org/paper/gsec/2468/ethical- hacking/104292