SlideShare a Scribd company logo
1 of 36
Download to read offline
Presented to ATMIYA University
ethical
/ˈɛθɪk(ə)l/
adjective
relating to moral principles or the
branch of knowledge
dealing with these.
Krutarth Vasavada
• B.E. (Electronics and Communication), AITS 2002-06
• M.S. (Computer Engineering), San Jose State University,
California, US
• Certified Cloud Security Professional, ISC2
• 13+ Years into Software Product Development,
Cybersecurity, Information Security Audits, Data
Privacy & Compliance
• Worked in India, USA, EU (currently) in Automobile,
Chemicals, Insurance, Investment Banking, and e-
Commerce domains.
Topics
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why hack(ing)?
03
Type of attacks
04
Cause of attacks
05
Prevention
06
Career
Opportunities
07
Let’s Refresh: Why Cybersecurity?
CONFIDENTIALITY
Unauthorized individuals or
entities can not get any
information that is not intended
for them.
INTEGRITY
The accuracy and
completeness of data must be
assured.
AVAILABILITY
It must be ensured that vital
information is available
whenever needed.
Let’s Refresh: How are we dealing with cyber
attacks?
To be honest, pretty badly! Here’s the list of data breaches occurred during the year 2020 so far.
Next Topic
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why hack(ing)?
03
Type of attacks
04
Cause of attacks
05
Prevention
06
Career
Opportunities
07
What is Hacking?
Hacking is an attempt to exploit
a computer system or a private
network.
In simple words, it is the
unauthorized access made
over computer network security
systems for some illicit / illegal
purpose.
What is Ethical Hacking?
Ethical Hacking is an attempt to
exploit a computer system or a
private network.
In simple words, it is the
unauthorized access made
over computer network security
systems for some illicit / illegal
known / valid / approved
purpose.
Characteristics of Ethical Hacking
• Target is almost always known
• Identity of technical professionals involved
is known to some extent
• Neither the target system is damaged, nor
information is stolen
• Vulnerabilities are always reported back to
the owner(s)
Who is an ethical hacker?
Person who is
• interested in cybersecurity
• keen to explore various computer networks
• aware of damage a security loophole can cause
• interested in improving overall security of the
target system
Remember, being motivated by monitory reasons is
NOT a bad thing for an ethical hacker.
Next Topic
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why
hack(ing)?
03
Type of attacks
04
Cause of attacks
05
Prevention
06
Career
Opportunities
07
Who is interested in hacking – ethically or
otherwise?
Individuals
Corporations
Governments
Why to hack – ethically or otherwise?
Many reasons
• Steal information
• Earn money (not always a bad thing!)
• Just for fun!
• Attack enemy system/company/country/ideology
• To understand the current security status of the
system
• To remain secure
Next Topic
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why hack(ing)?
03
Type of
attacks
04
Cause of attacks
05
Prevention
06
Career
Opportunities
07
Hacking Attack
Success, scale, and impact of any hacking attempt
depends on three things.
Exploitability – How easy the system is to exploit?
Prevalence – How widespread/prevalent the
system and vulnerability are?
Detectability – How easy it is to detect the intended
security defect?
Type of Vulnerabilities
Before understanding type of attacks, it is important
to understand type of vulnerabilities.
Let’s go the most trusted industry standard
resource:
Open Web Application Security Project (OWASP)
Commonly Known Cybersecurity Attacks
Denial-of-service (DoS)
and distributed denial-
of-service (DDoS)
Man-in-the-middle
(MitM)
Phishing Drive-by attack
Identity Theft SQL Injection
Cross-site scripting
(XSS)
Eavesdropping
Malware/Ransomware
Next Topic
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why hack(ing)?
03
Type of attacks
04
Cause of
attacks
05
Prevention
06
Career
Opportunities
07
How an attack is caused?
Footprinting
Sniffing
Fingerprinting
DNS Poisoning
Social Engineering
Password Hacking
Attack type: Footprinting
In this type of attack, a hacker attempts to gather
something information around
• Domain name
• IP Addresses
• Namespaces
• Employee information
• Phone numbers
• E-mails
• Job Information
Depending on type of the target system, this can be very
crucial or not-so-crucial information.
Attack type: Sniffing
Sniffing is the process of monitoring and capturing all the packets passing
through a given network using sniffing tools.
It is a form of “tapping phone wires” and get to know about the
conversation. It is also called wiretapping applied to the computer
networks.
One can sniff the following sensitive information from a network −
Email traffic
FTP passwords
Web traffics
Telnet passwords
Router configuration
Chat sessions
DNS traffic
Attack type: Fingerprinting
Active Fingerprinting
Active fingerprinting is accomplished by sending specially
crafted packets to a target machine and then noting down
its response and analyzing the gathered information to
determine the target OS.
Passive Fingerprinting
Passive fingerprinting is based on sniffer traces from the
remote system. Based on the sniffer traces (such as
Wireshark) of the packets, you can determine the operating
system of the remote host.
Attack type: DNS Poisoning
DNS Poisoning is a technique that tricks a DNS server into
believing that it has received authentic information when, in
reality, it has not. It results in the substitution of false IP
address at the DNS level where web addresses are
converted into numeric IP addresses.
DNS poisoning is used to redirect the users to fake pages
which are managed by the attackers.
Attack type: Social Engineering
A phishing attack is a computer-based social engineering,
where an attacker crafts an email that appears legitimate.
Such emails have the same look and feel as those received
from the original site, but they might contain links to fake
websites. If you are not careful enough, then you will type
your user ID and password and will try to login which will
result in failure and by that time, the attacker will have your
ID and password to attack your original account.
Attack type: Password/Dictionary Hacking
In a dictionary attack, the hacker uses a predefined list of
words from a dictionary to try and guess the password. If
the set password is weak, then a dictionary attack can
decode it quite fast.
Topics
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why hack(ing)?
03
Type of attacks
04
Cause of attacks
05
Prevention
06
Career
Opportunities
07
How to prevent attacks
Question: Is it possible to be 100% secure?
Answer: It depends.
Answer Explanation: Don’t put a $10 lock on a $5 bicycle!
How to prevent attacks
Each attack requires unique approach in averting them.
Multiple factors contribute in determining the course of
action.
• Tactical Fix or Strategic Solution?
• Impacted target audience?
• Geography?
• Functional area/Domain?
• Historical trends? etc.
How to prevent attacks
Good News – Ethical Hackers Can Help!
• Know their subject
• Understand impact of an attack
• Aware of known vulnerabilities
• Wide range of tools/technology to choose from
• Most importantly – no malicious intention
Remember…
The more you sweat in peace,
the less you bleed in war!
Ethical hacking is a proactive and preventive measure
Next Topic
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why hack(ing)?
03
Type of attacks
04
Cause of attacks
05
Prevention
06
Career
Opportunities
07
What are the skills needed?
computer systems expertise
strong programming skills
computer networking knowledge
patience
Which tools* can help me?
nmap
burp suite
etherpeak
qualysguard
webinspect
postman
etc.
* there can never be an exhaustive or a definitive tool list. Consider these as a
recommendation to start with.
How to avail career opportunities?
Step 1
•Obtain a Bachelor’s degree in Computer Science (or, similar) or A+ Certification
•Gain an understanding of the most common hardware and software technologies.
Step 2
•Get into a programmer’s role for a few years
Step 3
•Proceed to get network certifications or security certification
Step 4
•Keep going through various books, tutorials and papers to understand various computer security aspects
Step 5
•Master the art of penetration testing, footprinting and reconnaissance, and social engineering.
Step 6
•Certified Ethical Hacker (CEH) Certification
In conclusion
“Government agencies and business organizations
today are in constant need of ethical hackers to
combat the growing threat to IT security. A lot of
government agencies, professionals and
corporations now understand that if you want to
protect a system, you cannot do it by just locking
your doors”
EC-Council
Questions?
Thank you!

More Related Content

What's hot

Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSaqib Raza
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotShah Sheikh
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportRaghav Bisht
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingMissStevenson1
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 

What's hot (20)

Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking
HackingHacking
Hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 

Similar to Ethical Hacking by Krutarth Vasavada

Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hackingNigam Dave
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxNarangYadav
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSlick Cyber Systems
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfuzair
 
Think Like a Bad Guy "Hacker" - Change the game to proactively protect your ...
Think Like a Bad Guy "Hacker" -  Change the game to proactively protect your ...Think Like a Bad Guy "Hacker" -  Change the game to proactively protect your ...
Think Like a Bad Guy "Hacker" - Change the game to proactively protect your ...Saqib Chaudhry
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseStephen Cobb
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9UISGCON
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01rajkumar jonuboyena
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackamrutharam
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 

Similar to Ethical Hacking by Krutarth Vasavada (20)

Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptx
 
CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Think Like a Bad Guy "Hacker" - Change the game to proactively protect your ...
Think Like a Bad Guy "Hacker" -  Change the game to proactively protect your ...Think Like a Bad Guy "Hacker" -  Change the game to proactively protect your ...
Think Like a Bad Guy "Hacker" - Change the game to proactively protect your ...
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 

Recently uploaded

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Ethical Hacking by Krutarth Vasavada

  • 1. Presented to ATMIYA University ethical /ˈɛθɪk(ə)l/ adjective relating to moral principles or the branch of knowledge dealing with these.
  • 2. Krutarth Vasavada • B.E. (Electronics and Communication), AITS 2002-06 • M.S. (Computer Engineering), San Jose State University, California, US • Certified Cloud Security Professional, ISC2 • 13+ Years into Software Product Development, Cybersecurity, Information Security Audits, Data Privacy & Compliance • Worked in India, USA, EU (currently) in Automobile, Chemicals, Insurance, Investment Banking, and e- Commerce domains.
  • 3. Topics Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 4. Let’s Refresh: Why Cybersecurity? CONFIDENTIALITY Unauthorized individuals or entities can not get any information that is not intended for them. INTEGRITY The accuracy and completeness of data must be assured. AVAILABILITY It must be ensured that vital information is available whenever needed.
  • 5. Let’s Refresh: How are we dealing with cyber attacks? To be honest, pretty badly! Here’s the list of data breaches occurred during the year 2020 so far.
  • 6. Next Topic Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 7. What is Hacking? Hacking is an attempt to exploit a computer system or a private network. In simple words, it is the unauthorized access made over computer network security systems for some illicit / illegal purpose.
  • 8. What is Ethical Hacking? Ethical Hacking is an attempt to exploit a computer system or a private network. In simple words, it is the unauthorized access made over computer network security systems for some illicit / illegal known / valid / approved purpose.
  • 9. Characteristics of Ethical Hacking • Target is almost always known • Identity of technical professionals involved is known to some extent • Neither the target system is damaged, nor information is stolen • Vulnerabilities are always reported back to the owner(s)
  • 10. Who is an ethical hacker? Person who is • interested in cybersecurity • keen to explore various computer networks • aware of damage a security loophole can cause • interested in improving overall security of the target system Remember, being motivated by monitory reasons is NOT a bad thing for an ethical hacker.
  • 11. Next Topic Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 12. Who is interested in hacking – ethically or otherwise? Individuals Corporations Governments
  • 13. Why to hack – ethically or otherwise? Many reasons • Steal information • Earn money (not always a bad thing!) • Just for fun! • Attack enemy system/company/country/ideology • To understand the current security status of the system • To remain secure
  • 14. Next Topic Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 15. Hacking Attack Success, scale, and impact of any hacking attempt depends on three things. Exploitability – How easy the system is to exploit? Prevalence – How widespread/prevalent the system and vulnerability are? Detectability – How easy it is to detect the intended security defect?
  • 16. Type of Vulnerabilities Before understanding type of attacks, it is important to understand type of vulnerabilities. Let’s go the most trusted industry standard resource: Open Web Application Security Project (OWASP)
  • 17. Commonly Known Cybersecurity Attacks Denial-of-service (DoS) and distributed denial- of-service (DDoS) Man-in-the-middle (MitM) Phishing Drive-by attack Identity Theft SQL Injection Cross-site scripting (XSS) Eavesdropping Malware/Ransomware
  • 18. Next Topic Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 19. How an attack is caused? Footprinting Sniffing Fingerprinting DNS Poisoning Social Engineering Password Hacking
  • 20. Attack type: Footprinting In this type of attack, a hacker attempts to gather something information around • Domain name • IP Addresses • Namespaces • Employee information • Phone numbers • E-mails • Job Information Depending on type of the target system, this can be very crucial or not-so-crucial information.
  • 21. Attack type: Sniffing Sniffing is the process of monitoring and capturing all the packets passing through a given network using sniffing tools. It is a form of “tapping phone wires” and get to know about the conversation. It is also called wiretapping applied to the computer networks. One can sniff the following sensitive information from a network − Email traffic FTP passwords Web traffics Telnet passwords Router configuration Chat sessions DNS traffic
  • 22. Attack type: Fingerprinting Active Fingerprinting Active fingerprinting is accomplished by sending specially crafted packets to a target machine and then noting down its response and analyzing the gathered information to determine the target OS. Passive Fingerprinting Passive fingerprinting is based on sniffer traces from the remote system. Based on the sniffer traces (such as Wireshark) of the packets, you can determine the operating system of the remote host.
  • 23. Attack type: DNS Poisoning DNS Poisoning is a technique that tricks a DNS server into believing that it has received authentic information when, in reality, it has not. It results in the substitution of false IP address at the DNS level where web addresses are converted into numeric IP addresses. DNS poisoning is used to redirect the users to fake pages which are managed by the attackers.
  • 24. Attack type: Social Engineering A phishing attack is a computer-based social engineering, where an attacker crafts an email that appears legitimate. Such emails have the same look and feel as those received from the original site, but they might contain links to fake websites. If you are not careful enough, then you will type your user ID and password and will try to login which will result in failure and by that time, the attacker will have your ID and password to attack your original account.
  • 25. Attack type: Password/Dictionary Hacking In a dictionary attack, the hacker uses a predefined list of words from a dictionary to try and guess the password. If the set password is weak, then a dictionary attack can decode it quite fast.
  • 26. Topics Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 27. How to prevent attacks Question: Is it possible to be 100% secure? Answer: It depends. Answer Explanation: Don’t put a $10 lock on a $5 bicycle!
  • 28. How to prevent attacks Each attack requires unique approach in averting them. Multiple factors contribute in determining the course of action. • Tactical Fix or Strategic Solution? • Impacted target audience? • Geography? • Functional area/Domain? • Historical trends? etc.
  • 29. How to prevent attacks Good News – Ethical Hackers Can Help! • Know their subject • Understand impact of an attack • Aware of known vulnerabilities • Wide range of tools/technology to choose from • Most importantly – no malicious intention
  • 30. Remember… The more you sweat in peace, the less you bleed in war! Ethical hacking is a proactive and preventive measure
  • 31. Next Topic Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 32. What are the skills needed? computer systems expertise strong programming skills computer networking knowledge patience
  • 33. Which tools* can help me? nmap burp suite etherpeak qualysguard webinspect postman etc. * there can never be an exhaustive or a definitive tool list. Consider these as a recommendation to start with.
  • 34. How to avail career opportunities? Step 1 •Obtain a Bachelor’s degree in Computer Science (or, similar) or A+ Certification •Gain an understanding of the most common hardware and software technologies. Step 2 •Get into a programmer’s role for a few years Step 3 •Proceed to get network certifications or security certification Step 4 •Keep going through various books, tutorials and papers to understand various computer security aspects Step 5 •Master the art of penetration testing, footprinting and reconnaissance, and social engineering. Step 6 •Certified Ethical Hacker (CEH) Certification
  • 35. In conclusion “Government agencies and business organizations today are in constant need of ethical hackers to combat the growing threat to IT security. A lot of government agencies, professionals and corporations now understand that if you want to protect a system, you cannot do it by just locking your doors” EC-Council