To successfully protect a system against possible cyberattacks, an ethical hacker must learn to think like a cyberattacker. This ethical hacking course reveals the fundamental techniques cyber attackers use to exploit vulnerabilities in systems and the methods used to protect such systems against possible cyberattacks. You will master the processes of conducting penetration testing on devices and applications and maintain anonymity on the web.
2. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Content
Introduction
Ethical Hacking
Who are Hackers
Why do Hackers hack
Types of Hackers
What should do after hack
Hacking Process
Why do Weneed Ethical Hacking
Required Skills of an Ethical Hacker
What do hackers do after Hacking?
Advantages
Disadvantages
Future Enhancements
Conclusion
3. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Introduction
Ethical hacking also known as penetration testing or white-hat
hacking, involves the same tools, tricks, and techniques that
hackers use,but with one major difference that Ethical hacking is
legal.
4. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Ethical Hacking
Independent computer security Professionals breaking into the
computer systems.
Neither damage the target systems nor steal information.
Evaluate target systems security and report back to owners about
the bugs found.
5. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Who are Hackers?
A person who enjoys learning details
of a programming language or system.
A person who enjoys actuallydoing
the programming rather than just
theorizing about it.
A person capable ofappreciating
someone else's hacking.
A person who picks up programming quickly.
A person who is an expert at aparticular
programming language or system.
6. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Types of Hackers
Black Hat Hacker
White Hat Hacker
Grey Hat Hacker
7. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Black-Hat Hacker
A black hat hackers or crackers
are individuals with extraordinary
computing skills, resorting to
malicious or destructive activities.
That is black hat hackers use their
knowledge and skill for their own
personal gains probably by hurting others.
8. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
White-Hat Hacker
White hat hackers are those
individuals professing hacker
skills and using them for
defensive purposes.
This means that the white hat
hackers use their knowledge
and skill for the good of
others and for the common
good.
9. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Grey-Hat Hackers
These are individuals who work both
offensively and defensively at various
times.
We cannot predict their behavior.
Sometimes they use their skills
for the common good while in
some other times he uses them
for their personal gains.
10. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Ethical Hackers but not Criminal Hackers
Completely trustworthy.
Strong programming and computer networking
skills.
Learn about the system and trying to find its
weaknesses.
Techniques of Criminal hackers-Detection-
Prevention.
16. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Viruses, Trojan
Horses, and
Worms
Social
Engineering
Automated
Attacks
Accidental
Breaches in
Security Denial of
Service (DoS)
Organizational
Attacks
Restricted
Data
Why do you need Ethicalhacking
Protection from possible External Attacks
17. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Required Skills of an Ethical Hacker
Linux: knowledge of Linux/Unix; security setting,
configuration, and services.
Firewalls: configurations, and operation of intrusion detection systems.
Routers: knowledge of routers, routing protocols, and access
control lists
Mainframes : knowledge of mainframes
Network Protocols: TCP/IP; how they function and can be manipulated.
Project Management: leading, planning, organizing, and controlling a
penetration testing team.
Microsoft: skills in operation, configuration and management.
18. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
SR NO.
COMPUTER
LANGUAGES
DESCRIPTION PLATFORM PURPOSE
1 HTML Language used to write
web pages.
*Cross platform Web hacking
Login forms and other data entry methods on the web use HTML forms to get
data. Been able to write and interpret HTML, makes it easy for you to identify
and exploit weaknesses in the code.
2 JavaScript Client side scripting
language
*Cross platform Web Hacking
JavaScript code is executed on the client browse. You can use it to read saved
cookies and perform cross site scripting etc.
3 PHP Server side scripting
language
*Cross platform Web Hacking
PHP is one of the most used web programming languages. It is used to process
HTML forms and performs other custom tasks. You could write a custom
application in PHP that modifies settings on a web server and makes the server
vulnerable to attacks.
4 SQL Language used to
communicate with
database
*Cross platform Web Hacking
Using SQL injection, to by-pass web application login algorithms that are weak,
delete data from the database, etc.
5 Python
Ruby
Bash
Perl
High level programming
languages
*Cross platform Building tools & scripts
They come in handy when you need to develop automation tools and scripts.
The knowledge gained can also be used in understand and customization the
already available tools.
6 C & C++ High level programming *Cross platform Writing exploits, shell codes, etc.
They come in handy when you need to write your own shell codes, exploits, root
kits or understanding and expanding on existing ones.
7 Java
Csharp
Visual Basic
VBScript
Other languages Java & CSharp are
*cross platform.
Visual Basic is specific
to Windows
Other uses
The usefulness of these languages depends on your scenario.
Programming languages that are useful to hackers
19. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Why do hackers hack ?
Just for fun.
Earn Money
Notify many people their thought.
Steal important information.
Destroy enemy’s computer network
during the war.
Business Competition.
20. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
What should do after hacked?
Shutdown or turn off the system
Separate the system from network
Restore the system with the backup or
reinstall all programs
Connect the system to the network
It can be good to call the police
21. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
What do hackers do after hacking?...
Patch Security hole
The other hackers can’t intrude
Clear logs and hide themselves
Install rootkit ( backdoor )
The hacker who hacked the system can use the
system later
It contains trojan virus, and so on
Install irc related program
identd, irc, bitchx, eggdrop, bnc
22. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
What do hackers do after hacking?
Install scanner program
mscan, sscan, nmap
Install exploit program
Install denial of service program
Use all of installed programs silently
23. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Advantages
To catch a thief you have to think like a thief.
Helps in closing the open holes in the system network.
Provides security to banking and financial establishments.
Prevents website defacements.
An evolving technique.
24. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Disadvantages
All depends upon the trustworthiness of the ethical hacker
Hiring professionals is expensive.
25. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Future Enhancements
As it an evolving branch the scope of enhancement in
technology is immense.
No ethical hacker can ensure the system security by using the
same technique repeatedly.
More enhanced software’s should be used for optimum
protection.
26. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
Conclusion
In the preceding sections we saw the methodology of hacking,
why should we aware of hacking and some tools which a
hacker may use.
Now we can see what can we do against hacking or to protect
ourselves from hacking.
The first thing we should do is to keep ourselves updated
about those software’s we and using for official and reliable
sources.
Educate the employees and the users against black hat hacking.
27. +91 422 4950897
+91 73970 78885
www.gatewaysoftwaresolutions.com
THANK YOU
Gateway Software SolutionS
No 136,9th Street,Crosscut Road,
Gandhipuram,
Coimbatore- 641012