SlideShare a Scribd company logo
1 of 22
H4CK|||G 1$
9OOD
23/2/2016@sarath&surenthar
1
By
SARATHKUMAR.K (MCA-B)
SURENDHAR.R (MCA-B) 23/2/2016@sarath&surenthar
2
CONTENTS
 What is Ethical Hacking?
 Types of Hackers
 Sniffing
 Phishing
 Key loggers
 Social Engineering
 Conclusion
23/2/2016@sarath&surenthar
3
WHAT IS HACKING?
 Hacking is a gain unauthorized access to
data in a system or computer.
 act of illegally entering a computer system,
and making unauthorized changes to the
files and data contain within
Cracking : some one who destructs things.
23/2/2016@sarath&surenthar
4
WHAT IS ETHICAL HACKING?
Ethical Hacking is testing the resources for a
good cause and for the
 Betterment of technology.
 Learn about the system and trying to find
its weaknesses.
 Techniques of Criminal hackers-Detection-
Prevention
 Given Completely trustworthy
23/2/2016@sarath&surenthar
5
TYPES OF HACKERS
 BLACK HAT HACKER
 GREY HAT HACKER
 WHITE HAT HACKER
23/2/2016@sarath&surenthar
6
WHITE HAT HACKERS
 Good guys
 Don’t use their skills for illegal purpose
 Computer security experts and help to
protect from Black hat hackers…
23/2/2016@sarath&surenthar
7
BLACK HAT HACKERS
 Bad guys.
 Use their skills for their personnel gain
 Hack banks, credit cards and defense
websites.
23/2/2016@sarath&surenthar
8
GREY HAT HACKERS
 They are the combination of Black Hat
Hackers and White Hat Hackers.
 Use their skills for their personnel gain
 Goal of grey hat hackers is to provide
National Security.
23/2/2016@sarath&surenthar
9
FEW HACKING TECHNOLOGIES
 Password Cracking
 SNIFFING
 PHISHING
 KEYLOGGERS
 SOCIAL ENGINEERING
23/2/2016@sarath&surenthar
10
 There are many methods for cracking the
password and then get in to the system.
 The simplest method is to guess the password.
But this is a tedious work.
 In order to make this work easier there are many
automated tools for password guessing
like Cain and Abel
Password Cracking
23/2/2016@sarath&surenthar
11
SNIFFING
 Sniffer is a program that monitor or reading all
network traffic passing in and out over a network.
 (Telnet, FTP, SMTP, HTTP) that all protocol are
vulnerable for sniffing
 Because it send data and password in clear text.
Sniffing can be use both the ways legally or
illegally like for monitor network traffic, network
security and for stealing information like
password, files from the network.
23/2/2016@sarath&surenthar
12
23/2/2016@sarath&surenthar
13
PHISHING
Phishing is the method used to steal personal information 
through spamming or other deceptive means. There are a 
number of different phishing techniques used to obtain 
personal information from users. 
Email / Spam
 Phishers may send the same email to millions of users, requesting
them to fill in personal details
 Web Based Delivery
 Web based delivery is one of the most sophisticated phishing
techniques. Also known as “man-in-the-middle,” the hacker is located
in between the original website and the phishing system.
 Instant Messaging
 Instant messaging is the method in which the user receives a message
with a link directing them to a fake phishing website 23/2/2016@sarath&surenthar
14
23/2/2016@sarath&surenthar
15
KEYLOGGERS
 Key logger is a software which records each and every 
key strokes you enter, include mouse click.
 Loggers are two types…
 Hardware keylogger
 Software keylogger
  Hardware Keylogger
This is a thumb size device it records all keystrokes we enter from
keyboard, then save it in its memory. Later this data will be
analyzed.
 Software Keylogger
        Software keylogger can be installed in the victims
system, it records all keystrokes we enter from keyboard and
takes the screen shots and saved in the hidden path.
23/2/2016@sarath&surenthar
16
23/2/2016@sarath&surenthar
17
SOCIAL ENGINEERING
 Social engineering is the art of manipulating people so 
they give up confidential information. 
 When individuals are targeted the criminals are usually 
trying to trick you into giving them your passwords or bank 
information, or access your computer to secretly install 
malicious software–that will give them access to your 
passwords and bank information as well as giving them 
control over your computer.
 In the security chain human is the weakest link, because 
they trust everyone easily.
23/2/2016@sarath&surenthar
18
ADVANTAGES
 Prevents website defacements.
 Analyzing the weakness to find the loop holes.
 To improve high security
 Provides security to banking and financial
establishment.
 To catch a thief you have to think like a thief.
DISADVANTAGES
 All depends upon the trustworthiness of the
ethical hacker.
 Hiring professionals is expensive 23/2/2016@sarath&surenthar
19
 People trust security, for security purpose we
need Ethical Hacking.
 Ethical hacking provides results which can be
used to strengthen a information technology
environments security
CONCLUSION
23/2/2016@sarath&surenthar
20
@sarath&surenthar
THANK YOU
@sarath&surenther

More Related Content

What's hot

A survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniqueA survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniquebhas_ani
 
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraudGraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraudNeo4j
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET Journal
 
GraphTalks Italy - Using graphs to fight financial fraud
GraphTalks Italy - Using graphs to fight financial fraudGraphTalks Italy - Using graphs to fight financial fraud
GraphTalks Italy - Using graphs to fight financial fraudNeo4j
 
b.e final year project in Trichy
b.e final year project in Trichyb.e final year project in Trichy
b.e final year project in Trichyvsanthosh05
 
Threat actors identification
Threat actors identificationThreat actors identification
Threat actors identificationCobinweb
 
A Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the InternetA Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the Internetijtsrd
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gtemi
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websitesm srikanth
 
PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017Ryan Hardesty
 
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET Journal
 
Review of the machine learning methods in the classification of phishing attack
Review of the machine learning methods in the classification of phishing attackReview of the machine learning methods in the classification of phishing attack
Review of the machine learning methods in the classification of phishing attackjournalBEEI
 

What's hot (19)

Session Hijacking
Session HijackingSession Hijacking
Session Hijacking
 
A survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniqueA survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac technique
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraudGraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
GraphTalks Italy - Using graphs to fight financial fraud
GraphTalks Italy - Using graphs to fight financial fraudGraphTalks Italy - Using graphs to fight financial fraud
GraphTalks Italy - Using graphs to fight financial fraud
 
b.e final year project in Trichy
b.e final year project in Trichyb.e final year project in Trichy
b.e final year project in Trichy
 
Threat actors identification
Threat actors identificationThreat actors identification
Threat actors identification
 
A Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the InternetA Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the Internet
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
Data breach
Data breachData breach
Data breach
 
PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017
 
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS Location
 
Phishing
PhishingPhishing
Phishing
 
Review of the machine learning methods in the classification of phishing attack
Review of the machine learning methods in the classification of phishing attackReview of the machine learning methods in the classification of phishing attack
Review of the machine learning methods in the classification of phishing attack
 
Cookie surveillance
Cookie surveillanceCookie surveillance
Cookie surveillance
 

Viewers also liked

Viewers also liked (11)

Best Engineering Colleges of Computer science – GNIOT
Best Engineering Colleges of Computer science – GNIOTBest Engineering Colleges of Computer science – GNIOT
Best Engineering Colleges of Computer science – GNIOT
 
Chirag
ChiragChirag
Chirag
 
Cenovnik FLP proizvoda
Cenovnik FLP proizvodaCenovnik FLP proizvoda
Cenovnik FLP proizvoda
 
karimCV
karimCVkarimCV
karimCV
 
P3Infrastructure^0Development
P3Infrastructure^0DevelopmentP3Infrastructure^0Development
P3Infrastructure^0Development
 
Opovo 6
Opovo 6Opovo 6
Opovo 6
 
S2 Institute Private Training Services
S2 Institute Private Training ServicesS2 Institute Private Training Services
S2 Institute Private Training Services
 
CCWI2011_list of papers
CCWI2011_list of papersCCWI2011_list of papers
CCWI2011_list of papers
 
Prospectus 2016-17 F
Prospectus 2016-17 FProspectus 2016-17 F
Prospectus 2016-17 F
 
Progenitor Flyer
Progenitor FlyerProgenitor Flyer
Progenitor Flyer
 
Portfolio
PortfolioPortfolio
Portfolio
 

Similar to Ethical hacking for computer science

Similar to Ethical hacking for computer science (20)

A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
cyber_crime_investigation_ppt.pdf
cyber_crime_investigation_ppt.pdfcyber_crime_investigation_ppt.pdf
cyber_crime_investigation_ppt.pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit 2
Unit 2Unit 2
Unit 2
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
CYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptxCYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Ethical hacking for computer science

  • 2. By SARATHKUMAR.K (MCA-B) SURENDHAR.R (MCA-B) 23/2/2016@sarath&surenthar 2
  • 3. CONTENTS  What is Ethical Hacking?  Types of Hackers  Sniffing  Phishing  Key loggers  Social Engineering  Conclusion 23/2/2016@sarath&surenthar 3
  • 4. WHAT IS HACKING?  Hacking is a gain unauthorized access to data in a system or computer.  act of illegally entering a computer system, and making unauthorized changes to the files and data contain within Cracking : some one who destructs things. 23/2/2016@sarath&surenthar 4
  • 5. WHAT IS ETHICAL HACKING? Ethical Hacking is testing the resources for a good cause and for the  Betterment of technology.  Learn about the system and trying to find its weaknesses.  Techniques of Criminal hackers-Detection- Prevention  Given Completely trustworthy 23/2/2016@sarath&surenthar 5
  • 6. TYPES OF HACKERS  BLACK HAT HACKER  GREY HAT HACKER  WHITE HAT HACKER 23/2/2016@sarath&surenthar 6
  • 7. WHITE HAT HACKERS  Good guys  Don’t use their skills for illegal purpose  Computer security experts and help to protect from Black hat hackers… 23/2/2016@sarath&surenthar 7
  • 8. BLACK HAT HACKERS  Bad guys.  Use their skills for their personnel gain  Hack banks, credit cards and defense websites. 23/2/2016@sarath&surenthar 8
  • 9. GREY HAT HACKERS  They are the combination of Black Hat Hackers and White Hat Hackers.  Use their skills for their personnel gain  Goal of grey hat hackers is to provide National Security. 23/2/2016@sarath&surenthar 9
  • 10. FEW HACKING TECHNOLOGIES  Password Cracking  SNIFFING  PHISHING  KEYLOGGERS  SOCIAL ENGINEERING 23/2/2016@sarath&surenthar 10
  • 11.  There are many methods for cracking the password and then get in to the system.  The simplest method is to guess the password. But this is a tedious work.  In order to make this work easier there are many automated tools for password guessing like Cain and Abel Password Cracking 23/2/2016@sarath&surenthar 11
  • 12. SNIFFING  Sniffer is a program that monitor or reading all network traffic passing in and out over a network.  (Telnet, FTP, SMTP, HTTP) that all protocol are vulnerable for sniffing  Because it send data and password in clear text. Sniffing can be use both the ways legally or illegally like for monitor network traffic, network security and for stealing information like password, files from the network. 23/2/2016@sarath&surenthar 12
  • 14. PHISHING Phishing is the method used to steal personal information  through spamming or other deceptive means. There are a  number of different phishing techniques used to obtain  personal information from users.  Email / Spam  Phishers may send the same email to millions of users, requesting them to fill in personal details  Web Based Delivery  Web based delivery is one of the most sophisticated phishing techniques. Also known as “man-in-the-middle,” the hacker is located in between the original website and the phishing system.  Instant Messaging  Instant messaging is the method in which the user receives a message with a link directing them to a fake phishing website 23/2/2016@sarath&surenthar 14
  • 16. KEYLOGGERS  Key logger is a software which records each and every  key strokes you enter, include mouse click.  Loggers are two types…  Hardware keylogger  Software keylogger   Hardware Keylogger This is a thumb size device it records all keystrokes we enter from keyboard, then save it in its memory. Later this data will be analyzed.  Software Keylogger         Software keylogger can be installed in the victims system, it records all keystrokes we enter from keyboard and takes the screen shots and saved in the hidden path. 23/2/2016@sarath&surenthar 16
  • 18. SOCIAL ENGINEERING  Social engineering is the art of manipulating people so  they give up confidential information.   When individuals are targeted the criminals are usually  trying to trick you into giving them your passwords or bank  information, or access your computer to secretly install  malicious software–that will give them access to your  passwords and bank information as well as giving them  control over your computer.  In the security chain human is the weakest link, because  they trust everyone easily. 23/2/2016@sarath&surenthar 18
  • 19. ADVANTAGES  Prevents website defacements.  Analyzing the weakness to find the loop holes.  To improve high security  Provides security to banking and financial establishment.  To catch a thief you have to think like a thief. DISADVANTAGES  All depends upon the trustworthiness of the ethical hacker.  Hiring professionals is expensive 23/2/2016@sarath&surenthar 19
  • 20.  People trust security, for security purpose we need Ethical Hacking.  Ethical hacking provides results which can be used to strengthen a information technology environments security CONCLUSION 23/2/2016@sarath&surenthar 20