3. CONTENTS
What is Ethical Hacking?
Types of Hackers
Sniffing
Phishing
Key loggers
Social Engineering
Conclusion
23/2/2016@sarath&surenthar
3
4. WHAT IS HACKING?
Hacking is a gain unauthorized access to
data in a system or computer.
act of illegally entering a computer system,
and making unauthorized changes to the
files and data contain within
Cracking : some one who destructs things.
23/2/2016@sarath&surenthar
4
5. WHAT IS ETHICAL HACKING?
Ethical Hacking is testing the resources for a
good cause and for the
Betterment of technology.
Learn about the system and trying to find
its weaknesses.
Techniques of Criminal hackers-Detection-
Prevention
Given Completely trustworthy
23/2/2016@sarath&surenthar
5
6. TYPES OF HACKERS
BLACK HAT HACKER
GREY HAT HACKER
WHITE HAT HACKER
23/2/2016@sarath&surenthar
6
7. WHITE HAT HACKERS
Good guys
Don’t use their skills for illegal purpose
Computer security experts and help to
protect from Black hat hackers…
23/2/2016@sarath&surenthar
7
8. BLACK HAT HACKERS
Bad guys.
Use their skills for their personnel gain
Hack banks, credit cards and defense
websites.
23/2/2016@sarath&surenthar
8
9. GREY HAT HACKERS
They are the combination of Black Hat
Hackers and White Hat Hackers.
Use their skills for their personnel gain
Goal of grey hat hackers is to provide
National Security.
23/2/2016@sarath&surenthar
9
10. FEW HACKING TECHNOLOGIES
Password Cracking
SNIFFING
PHISHING
KEYLOGGERS
SOCIAL ENGINEERING
23/2/2016@sarath&surenthar
10
11. There are many methods for cracking the
password and then get in to the system.
The simplest method is to guess the password.
But this is a tedious work.
In order to make this work easier there are many
automated tools for password guessing
like Cain and Abel
Password Cracking
23/2/2016@sarath&surenthar
11
12. SNIFFING
Sniffer is a program that monitor or reading all
network traffic passing in and out over a network.
(Telnet, FTP, SMTP, HTTP) that all protocol are
vulnerable for sniffing
Because it send data and password in clear text.
Sniffing can be use both the ways legally or
illegally like for monitor network traffic, network
security and for stealing information like
password, files from the network.
23/2/2016@sarath&surenthar
12
16. KEYLOGGERS
Key logger is a software which records each and every
key strokes you enter, include mouse click.
Loggers are two types…
Hardware keylogger
Software keylogger
Hardware Keylogger
This is a thumb size device it records all keystrokes we enter from
keyboard, then save it in its memory. Later this data will be
analyzed.
Software Keylogger
Software keylogger can be installed in the victims
system, it records all keystrokes we enter from keyboard and
takes the screen shots and saved in the hidden path.
23/2/2016@sarath&surenthar
16
18. SOCIAL ENGINEERING
Social engineering is the art of manipulating people so
they give up confidential information.
When individuals are targeted the criminals are usually
trying to trick you into giving them your passwords or bank
information, or access your computer to secretly install
malicious software–that will give them access to your
passwords and bank information as well as giving them
control over your computer.
In the security chain human is the weakest link, because
they trust everyone easily.
23/2/2016@sarath&surenthar
18
19. ADVANTAGES
Prevents website defacements.
Analyzing the weakness to find the loop holes.
To improve high security
Provides security to banking and financial
establishment.
To catch a thief you have to think like a thief.
DISADVANTAGES
All depends upon the trustworthiness of the
ethical hacker.
Hiring professionals is expensive 23/2/2016@sarath&surenthar
19
20. People trust security, for security purpose we
need Ethical Hacking.
Ethical hacking provides results which can be
used to strengthen a information technology
environments security
CONCLUSION
23/2/2016@sarath&surenthar
20