SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue:04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor Value: 6.171 | ISO 9001:2008 Certified Journal | Page 206
AN OVERVIEW OF ETHICAL HACKING
Arockia Panimalar.S1, Priyadharshini.P2, Vijayabharathi.R3, Abirami.P4
1Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu
2,3,4 III BCA Students, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract: Hacking is an unprivileged usageofcomputerand
network resources. Hacking is a process to the security
mechanisms of an information systemonthenetwork.Hacker
is a generic term for a computer criminal. The practice of
hacking without no malicious intent, the targetsystem witha
hacker’s perspective. Today, more and more software’s are
developed and people are getting more and more options in
their present software. The advent of new tools the hackers
may make new schemes at least the software will be
resistant to selected of the tools. The methods that can be
used by a black hat hacker apart from the methodology are
framed by the user. The operator should know at least some
of these because specific hackers make use of those who are
not aware of the various hacking systems to hack into a
method.
Keywords: Ethical Standards, Security, Hacking, Ethical
Footprinting and Sniffing.
1. INTRODUCTION
Hacking is the act of finding the possible access points that
exist in a computer system or a computer network. Hacking
is commonly done for gain illegal access to a computer
scheme or a computer system, either to harmthesystemsor
to steal sensitive information available on the computer.
Fig 1: Hacking
Hacking is generally done to improvement unauthorized
access to a computer scheme or a computer system, either
to damage the systems or to bargain sensitive information
existing on the computer. Hacking is generally legal as long
as it is being done to find weaknesses in a computer or
network system for the testing purpose. The explosive
evolutionof the internet has carried several moral effectsof
electronic commerce, easy access to vast stores of reference
material, collaborative computing, e-mail, and new avenues
advertising and information distribution, to name a few. As
with most technological advances, there is also a dark side
of hacking [1].
2. TYPES OF HACKING
A. Website Hacking
Hacking a website means taking illegal control over a web
server and its associated software such as database and
other interfaces.
B. Network Hacking
Hacking a network system gathering informationimmediate
a scheme by using implements like Telnet, NS lookup, Ping,
Tracer, Net stat, etc. with the determined to harm the
network system and hamper its process.
C. Email Hacking
It includes getting illegal access to an Email account and
using it without taking the consent of its owner.
D. Ethical Hacking
Ethical hacking includes finding weaknesses in a computer
system or network scheme for testing purpose and finally
getting them fixed.
E. Password Hacking
The procedure of improving secret passwords from data
that has been stored in or communicated by a computer
system.
F. Computer Hacking
The method of stealing computer identifications and
passwords by applying hacking methods will leads to illegal
access to a computer system [2].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue:04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor Value: 6.171 | ISO 9001:2008 Certified Journal | Page 207
3. ADVANTAGES OF HACKING
Hacking is quite useful in the following developments:
i. To improve loss of data, especially in case lost your
password.
ii. To perform penetration testing to support computer
system and network security.
iii. To put sufficient preventive measures in place to prevent
security breaches.
iv. To have a computer network that prevents malicious
hackers from gaining access [3].
4. DISADVANTAGES OF HACKING
Hacking is quite dangerous if it is done with harmful intent.
It can cause:
i. Enormous security breach.
ii. Unauthorized system access on private data.
iii. Privacy violation.
iv. Hampering system process.
v. Denial of provision attacks.
vi. A Malicious attack on the scheme [4].
5. ELEMENTS OF SECURITY
5.1 Security
Security is the condition of existence protected against risk
or loss. The security is a concept similar to security. In the
case of networks, the security is also called the information
security. Information security means protectinginformation
and also information schemes from illegal access, usage,
disclosure, disruption, modification, and also destruction.
The security is termed in relations of CIA triads. The CIA is
the basic principles of security, confidentiality, integrityand
availability.
5.2NeedforSecurity
There may be several methods of damage which is
clearly interrelated which is produced byte intruders.
These include:
i. Loss of private data
ii. Damage or destruction of data
iii. Damage or destruction of computer scheme
iv. Loss of reputation of a company
5.3Confidentiality
Confidentiality is the property of preventing disclosure of
information to unauthorized individuals or systems. This
implies that the individual data should be seen only by the
authorized personals. Those persons who are a passive
person should not see those data. For example in the case of
a credit card transaction, the authorized person should see
the credit card numbers and he should see that data.Nobody
others should see that number because they may use it for
some other activities. Thus the confidentiality is very
important. The required data for maintaining the privacy of
the persons whose personal information a system holds.
5.4 Integrity
The data cannot be modified without authorization.Thedata
seen by the legal persons should be correct or the data
should maintain the property of integrity without that
integrity the data is of no use. Integrity is violated by
computer network illness infects a computer:
i. When an employee is able to modify his own salary in a
payroll database.
ii. When an unauthorized user vandalizes a website.
iii. When someone is able to cast a very large number of
votes in an online poll.
5.5 Availability
For any information system to serve its purpose, the
information must be available when it is needed. Consider
the case in which the data should have integrity and
confidentiality. The data is not available to the user or it is
not available. The data is of no use even if it has all the
other characteristics. The computing systems used to store
the data and process the information, the security controls
used to protect, and the communication networks used to
access its requirement to be operative properly. The issues
are considered to be important since data lacking any of the
above characteristics is useless. The security is described as
the CIA. Lacking any one of the CIA means there is a security
breach [5].
6.TYPESOFHACKERS
Hackers can be generally classified as the source of the
hacking system. There are four types of hackers onthisbasis.
6.1 Black Hat Hacker
Black-hat hackers or crackers are individual with
extraordinary computing skills, resorting to malicious
actions. The black hat hackers use their knowledge and
skills. Their own individual gains probably by down others.
6.2 White Hat
White hat hackers are those individuals allowing hacker
skills and using them for protective purposes. The white hat
hackers use their information and skill for thegoodofothers
and for the common good.
6.3 Grey-Hat Hackers
These are individuals who work both offensively and
defensively at various times. It cannot predicttheirbehavior.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue:04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor Value: 6.171 | ISO 9001:2008 Certified Journal | Page 208
Sometimes they use their skills for the common good while
in some other times he uses them for their personal gains.
6.4CriminalHackers
Management enterprises and secluded citizens around the
world are anxious to be a part of this revolution, but theyare
troubled that some hacker will break into their web server
and implant software that will secretly transfer their
organization's secrets to the open internet. The intent of
ethical hacking is to determine exposures from a hacker’s
viewpoint systems can be better secured. It is a part of an
overall information risk management program that allows
for ongoing security improvements. Ethical hacking canalso
ensure that vendor’s rights to the security of their products
are authentic [6].
7. METHODS ETHICAL HACKING
The method of ethical hacking in different methods, but the
intact process can be considered into the following six
phases.
Fig 2: Ethical Hacking Methods
7.1Reconnaissance
Reconnaissance is the phase where the attacker collects
information about an object using active or passive. The
toolsthat are widely used in this process are NMAP,Hoping,
Malt ego, and Google Dorks.
Reconnaissance hacking methods as two parts Active-
Reconnaissance, Passive- Reconnaissance.
A)ActiveReconnaissance
The information can be related and accurate. But there is a
risk of getting detected and planning active reconnaissance
without permission. It detected the system admin can take
severe action against you and trail your subsequent
activities.
B)PassiveReconnaissance
It used to gather essential information without always
interacting with the target systems.
7.2Scanning
The hackers begin to actively review a target mechanism or
system for capabilities that can be exploited. The toolsused
in this process are Nessus, Nexpose, and NMAP.
7.3GainingAccess
The ability is located and your effort to the activity it in
order to enter into the scheme. The primary toolthatisused
in this method is Metasploit.
7.4MaintainingAccess
The hacker has a gained access to a scheme. After gaining
access, the hacker connects some backdoors in order to
enter into the system when hacker needs access to this
owned system in future.
7.5ClearingTracks
The processis actually an unethical activity.Ithastodowith
the deletion of logs of all the actions that take place through
the hacking process.
7.6Reporting
The Ethical Hacker collects a report with systems results
and the job that was done such as the implements are used,
the success rate, abilities found, and the action methods.
Reporting is the last stage of final the ethical hacking
method [7].
8. ETHICAL FOOTPRINTING
Foot printing could be both passive and active. Foot printing
is mostly the first step to hacker gathers as much
information as possible to find ways to interrupt into a
target system or at least decide what type of attacks will be
more suitable for the target.
During this part, a hacker can collect the ensuing
information as
 Domain name
 IP Addresses
 Namespaces
 Employee information
 Phone numbers
 E-mails
 Job Information [5].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue:04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor Value: 6.171 | ISO 9001:2008 Certified Journal | Page 209
9. SNIFFING
Sniffing is the process of monitoring and capturing all the
packets passing complete a known network bysniffingtools.
It is a method of “tapping phone wires” and get to know
about the conversation. It is also called wiretapping applied
to the computer networks.
The following sensitive information from a network is:
 Email traffic
 FTP passwords
 Web traffics
 Telnet passwords
 Router configuration
 Chat sessions
 DNS traffic [4].
Fig 3: Sniffing Process
10. CONCLUSION
One of the main goals of the discussion is to make others
understand that there are many tools through which a
hacker can become in to a scheme. It checked its several
needs from various perspectives. A student should
understand that no software is made withzeroVulnerability.
So though they are learning they must learn the various
possibilities and must learn how to check that astheyarethe
authorities of tomorrow. Professionalsmust appreciatethat
business is straight connected to Security. So they should
make new software with vulnerabilities as less as possible
[3].
11. FUTURE ENHANCEMENT
Hacking enhanced software’s should be used for optimum
security. Tools are used, need to be updated regularly and
more efficient ones need to be developed [3].
12. REFERENCES
[1]Patrick Engebretson, The Basics of Hacking and
Penetration Testing Ethical Hacking and PenetrationTesting
Made Easy, Elsevier Inc., 2013.
[2]Beggs Robert, Mastering Kali Linux for Advanced
Penetration Testing A practical guide to testing your
network's security with Kali Linux the preferred choice of
penetration testers and hackers, Packt Publishing Ltd,2014.
[3] Joseph Muniz, Amir Lachine, Penetration Testing With
Raspberry Pi Construct a hacking arsenal for penetration
testers or hacking enthusiasts using Kali Linux on a
Raspberry Pi, Packt Publishing Ltd, 2015.
[4] H. M. David, "Three Different Shades of Ethical Hacking:
Black White and Gray", GSEC Practical Assignment Version
1.4b Option 1, 2004.
[5] J. Danish, A.N. Muhammad, "Is Ethical Hacking Ethical?",
International journal of EngineeringScienceandTechnology,
vol. 3, no. 5, pp. 3758-3763, 2011.
[6] Ajinkya A. Far sole, Marta G. Kashia, Aura Zunzunwala,
"Ethical Hacking", International journal of Computer
Applications, vol. 1, no. 10, pp. 14-20, 2010.
[7] Gurpreet K. Juneja, "Ethical hanking: A technique to
enhance information security", International journal of
computer applications, vol. 2, no. 12, 2013.

More Related Content

What's hot

Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010
Vicky Shah
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
Joseph White MPA CPM
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
Hemant Nagwekar
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
Omid Aminzadeh Gohari
 

What's hot (20)

Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Effective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businessesEffective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businesses
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 
IRJET- Impact of Ethical Hacking on Business and Governments
IRJET-  	  Impact of Ethical Hacking on Business and GovernmentsIRJET-  	  Impact of Ethical Hacking on Business and Governments
IRJET- Impact of Ethical Hacking on Business and Governments
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe Security
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
Cryptography summary
Cryptography summaryCryptography summary
Cryptography summary
 
Symantec 2011 Social Media Protection Flash Poll Global Results
Symantec 2011 Social Media Protection Flash Poll Global ResultsSymantec 2011 Social Media Protection Flash Poll Global Results
Symantec 2011 Social Media Protection Flash Poll Global Results
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Information security
Information securityInformation security
Information security
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 

Similar to IRJET- An Overview of Ethical Hacking

Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
GauravWankar2
 

Similar to IRJET- An Overview of Ethical Hacking (20)

IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Vulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfVulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdf
 
Network security
Network securityNetwork security
Network security
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

Recently uploaded (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 

IRJET- An Overview of Ethical Hacking

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue:04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor Value: 6.171 | ISO 9001:2008 Certified Journal | Page 206 AN OVERVIEW OF ETHICAL HACKING Arockia Panimalar.S1, Priyadharshini.P2, Vijayabharathi.R3, Abirami.P4 1Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu 2,3,4 III BCA Students, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract: Hacking is an unprivileged usageofcomputerand network resources. Hacking is a process to the security mechanisms of an information systemonthenetwork.Hacker is a generic term for a computer criminal. The practice of hacking without no malicious intent, the targetsystem witha hacker’s perspective. Today, more and more software’s are developed and people are getting more and more options in their present software. The advent of new tools the hackers may make new schemes at least the software will be resistant to selected of the tools. The methods that can be used by a black hat hacker apart from the methodology are framed by the user. The operator should know at least some of these because specific hackers make use of those who are not aware of the various hacking systems to hack into a method. Keywords: Ethical Standards, Security, Hacking, Ethical Footprinting and Sniffing. 1. INTRODUCTION Hacking is the act of finding the possible access points that exist in a computer system or a computer network. Hacking is commonly done for gain illegal access to a computer scheme or a computer system, either to harmthesystemsor to steal sensitive information available on the computer. Fig 1: Hacking Hacking is generally done to improvement unauthorized access to a computer scheme or a computer system, either to damage the systems or to bargain sensitive information existing on the computer. Hacking is generally legal as long as it is being done to find weaknesses in a computer or network system for the testing purpose. The explosive evolutionof the internet has carried several moral effectsof electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues advertising and information distribution, to name a few. As with most technological advances, there is also a dark side of hacking [1]. 2. TYPES OF HACKING A. Website Hacking Hacking a website means taking illegal control over a web server and its associated software such as database and other interfaces. B. Network Hacking Hacking a network system gathering informationimmediate a scheme by using implements like Telnet, NS lookup, Ping, Tracer, Net stat, etc. with the determined to harm the network system and hamper its process. C. Email Hacking It includes getting illegal access to an Email account and using it without taking the consent of its owner. D. Ethical Hacking Ethical hacking includes finding weaknesses in a computer system or network scheme for testing purpose and finally getting them fixed. E. Password Hacking The procedure of improving secret passwords from data that has been stored in or communicated by a computer system. F. Computer Hacking The method of stealing computer identifications and passwords by applying hacking methods will leads to illegal access to a computer system [2].
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue:04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor Value: 6.171 | ISO 9001:2008 Certified Journal | Page 207 3. ADVANTAGES OF HACKING Hacking is quite useful in the following developments: i. To improve loss of data, especially in case lost your password. ii. To perform penetration testing to support computer system and network security. iii. To put sufficient preventive measures in place to prevent security breaches. iv. To have a computer network that prevents malicious hackers from gaining access [3]. 4. DISADVANTAGES OF HACKING Hacking is quite dangerous if it is done with harmful intent. It can cause: i. Enormous security breach. ii. Unauthorized system access on private data. iii. Privacy violation. iv. Hampering system process. v. Denial of provision attacks. vi. A Malicious attack on the scheme [4]. 5. ELEMENTS OF SECURITY 5.1 Security Security is the condition of existence protected against risk or loss. The security is a concept similar to security. In the case of networks, the security is also called the information security. Information security means protectinginformation and also information schemes from illegal access, usage, disclosure, disruption, modification, and also destruction. The security is termed in relations of CIA triads. The CIA is the basic principles of security, confidentiality, integrityand availability. 5.2NeedforSecurity There may be several methods of damage which is clearly interrelated which is produced byte intruders. These include: i. Loss of private data ii. Damage or destruction of data iii. Damage or destruction of computer scheme iv. Loss of reputation of a company 5.3Confidentiality Confidentiality is the property of preventing disclosure of information to unauthorized individuals or systems. This implies that the individual data should be seen only by the authorized personals. Those persons who are a passive person should not see those data. For example in the case of a credit card transaction, the authorized person should see the credit card numbers and he should see that data.Nobody others should see that number because they may use it for some other activities. Thus the confidentiality is very important. The required data for maintaining the privacy of the persons whose personal information a system holds. 5.4 Integrity The data cannot be modified without authorization.Thedata seen by the legal persons should be correct or the data should maintain the property of integrity without that integrity the data is of no use. Integrity is violated by computer network illness infects a computer: i. When an employee is able to modify his own salary in a payroll database. ii. When an unauthorized user vandalizes a website. iii. When someone is able to cast a very large number of votes in an online poll. 5.5 Availability For any information system to serve its purpose, the information must be available when it is needed. Consider the case in which the data should have integrity and confidentiality. The data is not available to the user or it is not available. The data is of no use even if it has all the other characteristics. The computing systems used to store the data and process the information, the security controls used to protect, and the communication networks used to access its requirement to be operative properly. The issues are considered to be important since data lacking any of the above characteristics is useless. The security is described as the CIA. Lacking any one of the CIA means there is a security breach [5]. 6.TYPESOFHACKERS Hackers can be generally classified as the source of the hacking system. There are four types of hackers onthisbasis. 6.1 Black Hat Hacker Black-hat hackers or crackers are individual with extraordinary computing skills, resorting to malicious actions. The black hat hackers use their knowledge and skills. Their own individual gains probably by down others. 6.2 White Hat White hat hackers are those individuals allowing hacker skills and using them for protective purposes. The white hat hackers use their information and skill for thegoodofothers and for the common good. 6.3 Grey-Hat Hackers These are individuals who work both offensively and defensively at various times. It cannot predicttheirbehavior.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue:04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor Value: 6.171 | ISO 9001:2008 Certified Journal | Page 208 Sometimes they use their skills for the common good while in some other times he uses them for their personal gains. 6.4CriminalHackers Management enterprises and secluded citizens around the world are anxious to be a part of this revolution, but theyare troubled that some hacker will break into their web server and implant software that will secretly transfer their organization's secrets to the open internet. The intent of ethical hacking is to determine exposures from a hacker’s viewpoint systems can be better secured. It is a part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking canalso ensure that vendor’s rights to the security of their products are authentic [6]. 7. METHODS ETHICAL HACKING The method of ethical hacking in different methods, but the intact process can be considered into the following six phases. Fig 2: Ethical Hacking Methods 7.1Reconnaissance Reconnaissance is the phase where the attacker collects information about an object using active or passive. The toolsthat are widely used in this process are NMAP,Hoping, Malt ego, and Google Dorks. Reconnaissance hacking methods as two parts Active- Reconnaissance, Passive- Reconnaissance. A)ActiveReconnaissance The information can be related and accurate. But there is a risk of getting detected and planning active reconnaissance without permission. It detected the system admin can take severe action against you and trail your subsequent activities. B)PassiveReconnaissance It used to gather essential information without always interacting with the target systems. 7.2Scanning The hackers begin to actively review a target mechanism or system for capabilities that can be exploited. The toolsused in this process are Nessus, Nexpose, and NMAP. 7.3GainingAccess The ability is located and your effort to the activity it in order to enter into the scheme. The primary toolthatisused in this method is Metasploit. 7.4MaintainingAccess The hacker has a gained access to a scheme. After gaining access, the hacker connects some backdoors in order to enter into the system when hacker needs access to this owned system in future. 7.5ClearingTracks The processis actually an unethical activity.Ithastodowith the deletion of logs of all the actions that take place through the hacking process. 7.6Reporting The Ethical Hacker collects a report with systems results and the job that was done such as the implements are used, the success rate, abilities found, and the action methods. Reporting is the last stage of final the ethical hacking method [7]. 8. ETHICAL FOOTPRINTING Foot printing could be both passive and active. Foot printing is mostly the first step to hacker gathers as much information as possible to find ways to interrupt into a target system or at least decide what type of attacks will be more suitable for the target. During this part, a hacker can collect the ensuing information as  Domain name  IP Addresses  Namespaces  Employee information  Phone numbers  E-mails  Job Information [5].
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue:04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor Value: 6.171 | ISO 9001:2008 Certified Journal | Page 209 9. SNIFFING Sniffing is the process of monitoring and capturing all the packets passing complete a known network bysniffingtools. It is a method of “tapping phone wires” and get to know about the conversation. It is also called wiretapping applied to the computer networks. The following sensitive information from a network is:  Email traffic  FTP passwords  Web traffics  Telnet passwords  Router configuration  Chat sessions  DNS traffic [4]. Fig 3: Sniffing Process 10. CONCLUSION One of the main goals of the discussion is to make others understand that there are many tools through which a hacker can become in to a scheme. It checked its several needs from various perspectives. A student should understand that no software is made withzeroVulnerability. So though they are learning they must learn the various possibilities and must learn how to check that astheyarethe authorities of tomorrow. Professionalsmust appreciatethat business is straight connected to Security. So they should make new software with vulnerabilities as less as possible [3]. 11. FUTURE ENHANCEMENT Hacking enhanced software’s should be used for optimum security. Tools are used, need to be updated regularly and more efficient ones need to be developed [3]. 12. REFERENCES [1]Patrick Engebretson, The Basics of Hacking and Penetration Testing Ethical Hacking and PenetrationTesting Made Easy, Elsevier Inc., 2013. [2]Beggs Robert, Mastering Kali Linux for Advanced Penetration Testing A practical guide to testing your network's security with Kali Linux the preferred choice of penetration testers and hackers, Packt Publishing Ltd,2014. [3] Joseph Muniz, Amir Lachine, Penetration Testing With Raspberry Pi Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi, Packt Publishing Ltd, 2015. [4] H. M. David, "Three Different Shades of Ethical Hacking: Black White and Gray", GSEC Practical Assignment Version 1.4b Option 1, 2004. [5] J. Danish, A.N. Muhammad, "Is Ethical Hacking Ethical?", International journal of EngineeringScienceandTechnology, vol. 3, no. 5, pp. 3758-3763, 2011. [6] Ajinkya A. Far sole, Marta G. Kashia, Aura Zunzunwala, "Ethical Hacking", International journal of Computer Applications, vol. 1, no. 10, pp. 14-20, 2010. [7] Gurpreet K. Juneja, "Ethical hanking: A technique to enhance information security", International journal of computer applications, vol. 2, no. 12, 2013.