2. HIGHLIGHTSHIGHLIGHTS
• Introduction.
• Is hacking a crime?
• Hacking Vs Cracking.
• Why Ethical H4cking?
• Types of hackers.
• Types of Attacks.
• Security & Counter Measure.
2
3. INTRODUCTIONINTRODUCTION
The explosive growth of the Internet has brought many good things :
electronic commerce, easy access to vast stores of reference material,
collaborative computing, e-mail, and new avenues for advertising and
information distribution , to name a few. As with most technological
advances , there is also a dark side : criminal hackers. Governments,
companies, and private citizens around the world are anxious to be a part of
this revolution, but they are afraid that some hacker will break into their
Web server and replace their logo with pornography, read their e-mail, steal
their credit card number from an on-line shopping site, or implant software
that will secretly transmit their organization’s secrets to the open Internet.
With these concerns and others, the ethical hacker can help.
3
4. Is hacking a crime??Is hacking a crime??
NO NOT AT ALL
HACKING IS NOT A
CRIME 4
5. Hacker is a word that has two meanings:
Traditionally, a hacker is someone who likes to
tinker with software or electronic systems. Hackers
enjoy exploring and learning how computer systems
operate. They love discovering new ways to work
electronically.
Recently, hacker has taken on a new meaning —
someone who maliciously breaks into systems for
personal gain. Technically, these criminals are
crackers (criminal hackers).They are out for
personal gain: fame, profit, and even revenge.
5
Is hacking a crimeIs hacking a crime????
6. Hacking Vs CrackingHacking Vs Cracking
• Hacking with malicious intention is cracking.
• The basic difference is hackers do not do
anything disastrous.
• Cracking yield more devastating results.
• Cracking is crime.
• Cyber crime are the results of cracking ,not
hacking.
6
7. Why Ethical Hacking?
• It is Legal.
• Permission is obtained from the target.
• It is a part of an overall security program.
• Identify vulnerabilities visible from Internet
at particular point of time.
• Ethical hackers possesses same skills, mindset
and tools of a hacker but the attacks are
done in a non-destructive manner.
7
8. Types of hackersTypes of hackers
Distinction on the basis of knowledge:
CODERS.
ADMINS.
SCRIPT KIDDES.
Distinction on the basis of legality:
WHITE HAT HACKERS.
GREY HAT HACKERS.
BLACK HAT HACKERS.
8
9. CODERS
• They have full
knowledge.
• They know what
exactly they are doing.
• Well aware about the
different codes.
• They have complete
idea what is going
beyond coding.
9
10. ADMINS
• They knows what they
are doing.
• They don’t have idea
that what exactly going
beyond codes.
• Result oriented persons
• They are not so
harmful.
10
11. SCRIPT KIDDESSCRIPT KIDDES
• Young in-experienced
hackers.
• Copy codes and techniques
from knowledgeable hackers
• Don’t know what’s going
beyond the coding.
• Use techniques for fun
purpose.
• Sometimes could be very
dangerous for the system.
11
12. WHITE HATWHITE HAT
HACKERSHACKERS
• White hat hackers are good hackers.
• They have genuine license to hack.
• They have registered police records.
• They involves themselves in good works.
• Generally owned by companies for security
designing.
• They have high pay scales.
• Generally these are coders
12
13. BLACK HATBLACK HAT
HACKERSHACKERS
• Black hat hackers are very dangerous persons.
• They always have motive to earn huge profit.
• These are highly paid persons.
• They evolves themselves mostly in criminal
activities.
• These could be coders, admins as well as script
kiddies.
13
14. GREY HATGREY HAT
HACKERSHACKERS
• Grey hat hackers are also known as red hats.
• They perform both tasks fair as well as unfair.
• Generally these are admins.
• They have little high pay than white hats.
• Generally these are not so dangerous, but
sometimes could be.
14
15. TYPES OF ATTACKSTYPES OF ATTACKS
Brute force attacks.
Buffer Overflow attacks.
Denial of Service (DoS) attacks.
Distributed Denial of Service (DDoS) attacks.
Misconfigurations.
Abuse of Trust.
Back doors and Trojans.
15
19. SECURITY & COUNTER MEASURESECURITY & COUNTER MEASURE
• Use of anti-viruses.
• Proper logout after use of mail id.
• Manual opening browser
• Don't open spam.
• Password protected admin account.
• Always use strong password.
19