A
Seminar
ON
ETHICAL HACKING
By
SHAHID ANSARI
MCA
Department of Computer Science and Engineering
Madan Mohan Malaviya University of Technology Session(2015-16)
Contents
 Introduction
 What is Hacking?
 Ethical Hacking
 Types of Hackers
 Process of Ethical Hacking
 Ethical Hacking tools
 Required Skills of an Ethical Hacker
 What do hackers do after hacking?
 Advantages and disadvantages
 Conclusion
Introduction
Ethical hacking also known as penetration testing or
white-hat hacking, involves the same tools, tricks, and
techniques that hackers use, but with one major difference that
Ethical hacking is legal.
What is hacking ?
Hacking is unauthorized use of computer and network
resources. Computer hacking is the practice of modifying
computer hardware and software to accomplish a goal
outside of the creator’s original purpose.
Ethical Hacking
 Independent computer security Professionals breaking into the
computer systems.
 Neither damage the target systems nor steal information.
 Evaluate target systems security and report back to owners
about the vulnerabilities found.
Why Do We Need Ethical Hacking
Viruses, Trojan
Horses,
and Worms
Social
Engineering
Automated
Attacks
Accidental
Breaches in
Security Denial of
Service (DoS)
Organizational
Attacks
Restricted
Data
Protection from possible External Attacks
Hackers
 A person who enjoys learning details of a programming
language or system
 A person who enjoys actually doing the programming
rather than just theorizing about it
 A person capable of appreciating someone else's hacking
 A person who picks up programming quickly
 A person who is an expert at a particular programming
language or system
Types of Hackers
 Black Hat Hacker
 White Hat Hacker
 Grey Hat Hacker
Ethical Hacking Process
 Foot Printing
 Scanning/enumeration
 Gaining Access
 Maintaining Access
 Clearing tracks
Foot Printing
There are two types of foot-printing-
 Active foot-printing
 Passive foot-printing
Active Foot-printing:
 Mirroring websites
 Email tracing
 Server verification
Passive Foot-Printing :
 Google search
 Whois queries
 DNS lookup
 Social networking sites
Scanning
 Port Scanning
 Network Scanning
 Vulnerability Scanning
Enumeration
There are differen type of enumeration.
 NetBios
 SNMP
 DNS
Gaining Access
 This is the actual hacking phase in which the
hacker gains access to the system. The hacker
exploits the system.
Maintaining Access
 Maintaining Access refers to the phase when the
hacker tries to retain his 'ownership' of the system.
The hacker has exploited a vulnerability and can
tamper and compromise the system.
Ethical hacking tools:
 Email tracker and visual route
 Sam spade
Email tracker and visual route
Email tracker and visual route
Sam spade
What do hackers do after hacking?
 Install scanner program
 mscan, sscan, nmap
 Install exploit program
 Install denial of service program
 Use all of installed programs silently
 Patch Security hole
 The other hackers can’t intrude
 Install rootkit ( backdoor )
 It contains trojan virus, and so on
Advantages
 To catch a thief you have to think like a thief.
 Helps in closing the open holes in the system network.
 Provides security to banking and financial establishments.
 Prevents website defacements.
Disadvantages
 All depends upon the trustworthiness of the ethical hacker.
 Hiring professionals is expensive.
Conclusion
 In the preceding sections we saw the methodology of hacking,
why should we aware of hacking and some tools which a
hacker may use.
 Now we can see what can we do against hacking or to protect
ourselves from hacking.
 The first thing we should do is to keep ourselves updated
about those software’s we and using for official and reliable
sources.
 Educate the employees and the users against black hat hacking.
References
www.hackersonlineclub.com
www.hackthissite.org
www.wikihow.com
Thank You

Cse ethical hacking ppt

  • 1.
    A Seminar ON ETHICAL HACKING By SHAHID ANSARI MCA Departmentof Computer Science and Engineering Madan Mohan Malaviya University of Technology Session(2015-16)
  • 2.
    Contents  Introduction  Whatis Hacking?  Ethical Hacking  Types of Hackers  Process of Ethical Hacking  Ethical Hacking tools  Required Skills of an Ethical Hacker  What do hackers do after hacking?  Advantages and disadvantages  Conclusion
  • 3.
    Introduction Ethical hacking alsoknown as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal.
  • 4.
    What is hacking? Hacking is unauthorized use of computer and network resources. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.
  • 5.
    Ethical Hacking  Independentcomputer security Professionals breaking into the computer systems.  Neither damage the target systems nor steal information.  Evaluate target systems security and report back to owners about the vulnerabilities found.
  • 6.
    Why Do WeNeed Ethical Hacking Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data Protection from possible External Attacks
  • 7.
    Hackers  A personwho enjoys learning details of a programming language or system  A person who enjoys actually doing the programming rather than just theorizing about it  A person capable of appreciating someone else's hacking  A person who picks up programming quickly  A person who is an expert at a particular programming language or system
  • 9.
    Types of Hackers Black Hat Hacker  White Hat Hacker  Grey Hat Hacker
  • 10.
    Ethical Hacking Process Foot Printing  Scanning/enumeration  Gaining Access  Maintaining Access  Clearing tracks
  • 11.
    Foot Printing There aretwo types of foot-printing-  Active foot-printing  Passive foot-printing Active Foot-printing:  Mirroring websites  Email tracing  Server verification Passive Foot-Printing :  Google search  Whois queries  DNS lookup  Social networking sites
  • 12.
    Scanning  Port Scanning Network Scanning  Vulnerability Scanning
  • 13.
    Enumeration There are differentype of enumeration.  NetBios  SNMP  DNS
  • 14.
    Gaining Access  Thisis the actual hacking phase in which the hacker gains access to the system. The hacker exploits the system. Maintaining Access  Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system. The hacker has exploited a vulnerability and can tamper and compromise the system.
  • 15.
    Ethical hacking tools: Email tracker and visual route  Sam spade
  • 16.
    Email tracker andvisual route
  • 17.
    Email tracker andvisual route
  • 18.
  • 19.
    What do hackersdo after hacking?  Install scanner program  mscan, sscan, nmap  Install exploit program  Install denial of service program  Use all of installed programs silently  Patch Security hole  The other hackers can’t intrude  Install rootkit ( backdoor )  It contains trojan virus, and so on
  • 20.
    Advantages  To catcha thief you have to think like a thief.  Helps in closing the open holes in the system network.  Provides security to banking and financial establishments.  Prevents website defacements.
  • 21.
    Disadvantages  All dependsupon the trustworthiness of the ethical hacker.  Hiring professionals is expensive.
  • 22.
    Conclusion  In thepreceding sections we saw the methodology of hacking, why should we aware of hacking and some tools which a hacker may use.  Now we can see what can we do against hacking or to protect ourselves from hacking.  The first thing we should do is to keep ourselves updated about those software’s we and using for official and reliable sources.  Educate the employees and the users against black hat hacking.
  • 23.
  • 25.

Editor's Notes