SlideShare a Scribd company logo
Ethical Hacking
PRESENTED BY :-
SWETA LEENA PANDA
HACKER
CONTENT
♦ Overview of Hacking
♦ Types of hacking
♦ Hacker
♦ Types of Hacker
♦ Why do hackers hack?
♦ How can kid hack?
♦ What does a script kid know?
♦ Hackers language
♦ How to translate the hackers’ language
♦ Ethical Hacking
♦ Ethical Hacking – Process
♦ What hackers do after hacking?
♦ Why can’t defend against hackers?
♦ How can protect the system?
♦ What should do after hacked?
♦ Final words
overview of hacking
♦ Hack
   – Examine something very minutely
   – the rapid crafting of a new program or the making of
     changes to existing, usually complicated software
♦ Hacker
   – The person who hacks
♦ Cracker
   – System intruder/destroyer
HACKER
♦ Someone who bypasses the system’s access controls by
  taking advantage of security weaknesses left in the system
  by developers
♦ Person who is totally immersed in computer technology
  and programming, and who likes to examine the code of
  programs to see how they work … then uses his or her
  computer expertise for illicit purposes such as gaining
  access to computer systems without permission and
  tampering with programs and data. At that point, this
  individual would steal information and install backdoors,
  virus and Trojans
♦ Hacker means cracker nowadays.
Types of hacker
♦ White Hat Hackers:
   – who specializes in penetration testing and in other testing
     methodologies to ensure the security of an organization's
     information systems.
♦ Black Hat Hackers:
   – A black hat is the villain or bad guy, especially in a western
     movie in which such a character would stereotypically wear a
     black hat in contrast to the hero's white hat.
♦ Gray Hat Hackers:
   – A grey hat, in the hacking community, refers to a skilled hacker
     whose activities fall somewhere between white and black hat
     hackers on a variety of spectra
Types of hacker
♦ Script Kiddies:
   – who use scripts or programs developed by others to attack
     computer systems and networks and deface websites. [
♦ Phreak
   – Person who breaks into telecommunications systems to [commit]
     theft
♦ Cyber Punk
   – Recent mutation of … the hacker, cracker, and phreak
Why do people hack??
♦ To make security stronger ( Ethical Hacking
  )
♦ Just for fun
♦ Show off
♦ Hack other systems secretly
♦ Notify many people their thought
♦ Steal important information
♦ Destroy enemy’s computer network during
  the war
How can kid hack?
♦ Kid has much of time
   – Kid can search for longer time than other people
♦ All hacking program is easy to use
♦ Kid doesn’t have to know how the hacking program works
♦ These kids are called script kiddies
Hackers language :
1 -> i or l     || -> n
3 -> e          |/| -> m
4 -> a          s -> z
7 -> t          z -> s
9 -> g          f -> ph
0 -> o          ph -> f
$ -> s          x -> ck
| -> i or       ck -> x
What is Ethical Hacking
♦ It is Legal
♦ Permission is obtained from the target
♦ Part of an overall security program
♦ Identify vulnerabilities visible from Internet
  at particular point of time
♦ Ethical hackers possesses same skills,
  mindset and tools of a hacker but the attacks
  are done in a non-destructive manner
♦ Also Called – Attack & Penetration Testing,
Hackers language translation
EXAMPLE:-
    Hacking is good




       H4ck|||g 1$ 900d
Hacking - Process
1. Preparation
2. Foot printing
3. Enumeration & Fingerprinting
4. Identification of Vulnerabilities
5. Attack – Exploit the Vulnerabilities
6. Gaining Access
7. Escalating privilege
8. Covering tracks
9. Creating back doors
Preparation
♦ Identification of Targets – company websites, mail servers,
  extranets, etc.
♦ Signing of Contract
   –   Agreement on protection against any legal issues
   –   Contracts to clearly specifies the limits and dangers of the test
   –   Specifics on Denial of Service Tests, Social Engineering, etc.
   –   Time window for Attacks
   –   Total time for the testing
   –   Prior Knowledge of the systems
   –   Key people who are made aware of the testing
Foot printing
Collecting as much information about the
  target
 DNS Servers
 IP Ranges
 Administrative Contacts
 Problems revealed by administrators
Information Sources
♦ Search engines
♦ Forums
♦ Databases – whois,
♦ Tools – PING, whois, Traceroute, nslookup
Enumeration & Fingerprinting
♦ Specific targets determined
♦ Identification of Services / open ports
♦ Operating System Enumeration


Methods
 Banner grabbing
 Responses to various protocol (ICMP
  &TCP) commands
 Port / Service Scans – TCP Connect, TCP
  SYN, TCP FIN, etc.
Identification of Vulnerabilities
Vulnerabilities:
 It is a weakness which allows an attacker to
  reduce a system's information assurance.
♦ Insecure Configuration
♦ Weak passwords
♦ Unpatched vulnerabilities in services,
  Operating systems, applications
♦ Possible Vulnerabilities in Services,
  Operating Systems
♦ Insecure programming,Weak Access
Tools
Vulnerability Scanners - Nessus, ISS, SARA,
  SAINT
Listening to Traffic – Ethercap, tcpdump
Password Crackers – John the ripper, LC4,
  Pwdump
Intercepting Web Traffic – Achilles, Whisker,
  Legion
Gaining access:
♦ Enough data has been gathered at this point to make an informed
  attempt to access the target
♦ Techniques
   – Password eavesdropping
   – File share brute forcing
   – Password file grab
   – Buffer overflows
Escalating Privileges
♦ If only user-level access was obtained in the last step, the attacker will
  now seek to gain complete control of the system
♦ Techniques
   – Password cracking
   – Known exploits
Covering Tracks
♦ Once total ownership of the target is
  secured, hiding this fact from system
  administrators becomes paramount, lest
  they quickly end the romp.
♦ Techniques
  – Clear logs
  – Hide tools
Creating Back Doors
♦ Trap doors will be laid in various parts of the system to ensure that
  privileged access is easily regained at the whim of the intruder
♦ Techniques
   – Create rogue user accounts
   – Schedule batch jobs
   – Infect startup files
   – Plant remote control services
   – Install monitoring mechanisms
   – Replace apps with trojans
Denial of Service
♦  If an attacker is unsuccessful in gaining access, they may use readily
  available exploit code to disable a target as a last resort
♦ Techniques
    – SYN flood
    – ICMP techniques
    – Identical SYN requests
    – Overlapping fragment/offset bugs
    – Out of bounds TCP options (OOB)
    – DDoS
What do hackers do after hacking?
♦ Patch security hole
   – The other hackers can’t intrude
♦ Clear logs and hide themselves
♦ Install rootkit ( backdoor )
   – The hacker who hacked the system can use the system later
   – It contains trojan virus, and so on
♦ Install irc related program
   – identd, irc, bitchx, eggdrop, bnc
♦ Install scanner program
   – mscan, sscan, nmap
♦ Install exploit program
♦ Install denial of service program
♦ Use all of installed programs silently
How can protect the system?
 Patch security hole often
 Encrypt important data
    Ex) pgp, ssh
 Do not run unused daemon
 Remove unused setuid/setgid program
 Setup loghost


   • Backup the system often
 Setup firewall
 Setup IDS
    Ex) snort
What should do after hacked?
♦ Shutdown the system
   – Or turn off the system
♦ Separate the system from network
♦ Restore the system with the backup
   – Or reinstall all programs
♦ Connect the system to the network
H4CKING VS CR4CKING

♦ HACKING WITH MALICIOUS
 INTENTION IS CRACKING
The basic difference is hackers do not do
 anything disastrous.
Cracking yield more devastating results.
Cracking is crime.
Cyber crime are the results of cracking ,not
 hacking
H4cking prone areas
Please send suggestions and feedbacks
I am waiting for your replay.
           THANK YOU

More Related Content

What's hot

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
VipinYadav257
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Namrata Raiyani
 
Bug Bounty 101
Bug Bounty 101Bug Bounty 101
Bug Bounty 101
Shahee Mirza
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
Sina Manavi
 
Hacking
HackingHacking
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Offensive Security basics part 1
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1
wharpreet
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
Vi Tính Hoàng Nam
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
SecPod Technologies
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
himanshujoshi238
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
 

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Bug Bounty 101
Bug Bounty 101Bug Bounty 101
Bug Bounty 101
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
Hacking
HackingHacking
Hacking
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Offensive Security basics part 1
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 

Viewers also liked

TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
 
DrData Project
DrData ProjectDrData Project
DrData Project
Sweta Leena Panda
 
DrData
DrDataDrData
How to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyHow to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easily
Tan
 
Puppy Pendrive
Puppy PendrivePuppy Pendrive
Puppy Pendrive
Mohan R
 
MARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATIONMARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATION
Sweta Leena Panda
 
Personality
PersonalityPersonality
Personality
Sweta Leena Panda
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
satish kumar
 
Crownpoint church of Christ
Crownpoint church of ChristCrownpoint church of Christ
Crownpoint church of Christ
House to House Heart to Heart
 
Towards open and reproducible neuroscience in the age of big data
Towards open and  reproducible neuroscience in the age of big dataTowards open and  reproducible neuroscience in the age of big data
Towards open and reproducible neuroscience in the age of big data
Krzysztof Gorgolewski
 
Installation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvdInstallation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvd
gourav kottawar
 
blue_eye_technology_jeevagan
blue_eye_technology_jeevaganblue_eye_technology_jeevagan
blue_eye_technology_jeevagan
jeevagan nagarajan
 
Real people and real politics
Real people and real politicsReal people and real politics
Real people and real politics
Newsworks
 

Viewers also liked (20)

TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking
HackingHacking
Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
BRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAMEBRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAME
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
DrData Project
DrData ProjectDrData Project
DrData Project
 
DrData
DrDataDrData
DrData
 
How to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyHow to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easily
 
Puppy Pendrive
Puppy PendrivePuppy Pendrive
Puppy Pendrive
 
MARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATIONMARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATION
 
Personality
PersonalityPersonality
Personality
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Marketing intelliegence How to know more
Marketing intelliegence How to know moreMarketing intelliegence How to know more
Marketing intelliegence How to know more
 
Crownpoint church of Christ
Crownpoint church of ChristCrownpoint church of Christ
Crownpoint church of Christ
 
Towards open and reproducible neuroscience in the age of big data
Towards open and  reproducible neuroscience in the age of big dataTowards open and  reproducible neuroscience in the age of big data
Towards open and reproducible neuroscience in the age of big data
 
Installation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvdInstallation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvd
 
blue_eye_technology_jeevagan
blue_eye_technology_jeevaganblue_eye_technology_jeevagan
blue_eye_technology_jeevagan
 
Real people and real politics
Real people and real politicsReal people and real politics
Real people and real politics
 

Similar to ETHICAL HACKING

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rishabha Garg
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
Pawan Patil
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Gopal Rathod
 
Ethical hacking by shivam
Ethical hacking by shivamEthical hacking by shivam
Ethical hacking by shivam
Shivam Ðreamchazer
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ravi Rajput
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
champubhaiya8
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
ssuserde23af
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
Prasad Pawar
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
Pankaj Dubey
 

Similar to ETHICAL HACKING (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575
 
Ethical hacking by shivam
Ethical hacking by shivamEthical hacking by shivam
Ethical hacking by shivam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
ethical Hack
ethical Hackethical Hack
ethical Hack
 
Wm4
Wm4Wm4
Wm4
 
Wm4
Wm4Wm4
Wm4
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 

More from Sweta Leena Panda

ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management
Sweta Leena Panda
 
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
Sweta Leena Panda
 
BRAND CRISIS
BRAND CRISIS BRAND CRISIS
BRAND CRISIS
Sweta Leena Panda
 
SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR
Sweta Leena Panda
 
TALENT MANAGEMENT
TALENT MANAGEMENT TALENT MANAGEMENT
TALENT MANAGEMENT
Sweta Leena Panda
 
BUSINESS ETHICS
BUSINESS ETHICSBUSINESS ETHICS
BUSINESS ETHICS
Sweta Leena Panda
 
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYGOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
Sweta Leena Panda
 
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIESMARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
Sweta Leena Panda
 
SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING
Sweta Leena Panda
 
CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR
Sweta Leena Panda
 
CRAFT BUSINESS
CRAFT BUSINESS CRAFT BUSINESS
CRAFT BUSINESS
Sweta Leena Panda
 
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
Sweta Leena Panda
 
INDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTORINDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTOR
Sweta Leena Panda
 
Job Analysis of Operation
Job Analysis of Operation Job Analysis of Operation
Job Analysis of Operation
Sweta Leena Panda
 
RETAIL DESIGN
RETAIL DESIGN RETAIL DESIGN
RETAIL DESIGN
Sweta Leena Panda
 
RETAIL MANAGEMENT IN INDIA
RETAIL MANAGEMENT IN INDIARETAIL MANAGEMENT IN INDIA
RETAIL MANAGEMENT IN INDIA
Sweta Leena Panda
 

More from Sweta Leena Panda (20)

ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management
 
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
BRAND CRISIS
BRAND CRISIS BRAND CRISIS
BRAND CRISIS
 
SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR
 
TALENT MANAGEMENT
TALENT MANAGEMENT TALENT MANAGEMENT
TALENT MANAGEMENT
 
BUSINESS ETHICS
BUSINESS ETHICSBUSINESS ETHICS
BUSINESS ETHICS
 
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYGOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
 
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIESMARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
 
SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING
 
CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR
 
CRAFT BUSINESS
CRAFT BUSINESS CRAFT BUSINESS
CRAFT BUSINESS
 
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
 
INDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTORINDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTOR
 
Job Analysis of Operation
Job Analysis of Operation Job Analysis of Operation
Job Analysis of Operation
 
Orion'16 presentation
Orion'16  presentationOrion'16  presentation
Orion'16 presentation
 
RETAIL DESIGN
RETAIL DESIGN RETAIL DESIGN
RETAIL DESIGN
 
RETAIL MANAGEMENT IN INDIA
RETAIL MANAGEMENT IN INDIARETAIL MANAGEMENT IN INDIA
RETAIL MANAGEMENT IN INDIA
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 

ETHICAL HACKING

  • 1. Ethical Hacking PRESENTED BY :- SWETA LEENA PANDA
  • 3. CONTENT ♦ Overview of Hacking ♦ Types of hacking ♦ Hacker ♦ Types of Hacker ♦ Why do hackers hack? ♦ How can kid hack? ♦ What does a script kid know? ♦ Hackers language ♦ How to translate the hackers’ language
  • 4. ♦ Ethical Hacking ♦ Ethical Hacking – Process ♦ What hackers do after hacking? ♦ Why can’t defend against hackers? ♦ How can protect the system? ♦ What should do after hacked? ♦ Final words
  • 5. overview of hacking ♦ Hack – Examine something very minutely – the rapid crafting of a new program or the making of changes to existing, usually complicated software ♦ Hacker – The person who hacks ♦ Cracker – System intruder/destroyer
  • 6. HACKER ♦ Someone who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers ♦ Person who is totally immersed in computer technology and programming, and who likes to examine the code of programs to see how they work … then uses his or her computer expertise for illicit purposes such as gaining access to computer systems without permission and tampering with programs and data. At that point, this individual would steal information and install backdoors, virus and Trojans ♦ Hacker means cracker nowadays.
  • 7. Types of hacker ♦ White Hat Hackers: – who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. ♦ Black Hat Hackers: – A black hat is the villain or bad guy, especially in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat. ♦ Gray Hat Hackers: – A grey hat, in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra
  • 8. Types of hacker ♦ Script Kiddies: – who use scripts or programs developed by others to attack computer systems and networks and deface websites. [ ♦ Phreak – Person who breaks into telecommunications systems to [commit] theft ♦ Cyber Punk – Recent mutation of … the hacker, cracker, and phreak
  • 9. Why do people hack?? ♦ To make security stronger ( Ethical Hacking ) ♦ Just for fun ♦ Show off ♦ Hack other systems secretly ♦ Notify many people their thought ♦ Steal important information ♦ Destroy enemy’s computer network during the war
  • 10. How can kid hack? ♦ Kid has much of time – Kid can search for longer time than other people ♦ All hacking program is easy to use ♦ Kid doesn’t have to know how the hacking program works ♦ These kids are called script kiddies
  • 11. Hackers language : 1 -> i or l || -> n 3 -> e |/| -> m 4 -> a s -> z 7 -> t z -> s 9 -> g f -> ph 0 -> o ph -> f $ -> s x -> ck | -> i or ck -> x
  • 12. What is Ethical Hacking ♦ It is Legal ♦ Permission is obtained from the target ♦ Part of an overall security program ♦ Identify vulnerabilities visible from Internet at particular point of time ♦ Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner ♦ Also Called – Attack & Penetration Testing,
  • 13. Hackers language translation EXAMPLE:- Hacking is good H4ck|||g 1$ 900d
  • 14. Hacking - Process 1. Preparation 2. Foot printing 3. Enumeration & Fingerprinting 4. Identification of Vulnerabilities 5. Attack – Exploit the Vulnerabilities 6. Gaining Access 7. Escalating privilege 8. Covering tracks 9. Creating back doors
  • 15. Preparation ♦ Identification of Targets – company websites, mail servers, extranets, etc. ♦ Signing of Contract – Agreement on protection against any legal issues – Contracts to clearly specifies the limits and dangers of the test – Specifics on Denial of Service Tests, Social Engineering, etc. – Time window for Attacks – Total time for the testing – Prior Knowledge of the systems – Key people who are made aware of the testing
  • 16. Foot printing Collecting as much information about the target  DNS Servers  IP Ranges  Administrative Contacts  Problems revealed by administrators
  • 17. Information Sources ♦ Search engines ♦ Forums ♦ Databases – whois, ♦ Tools – PING, whois, Traceroute, nslookup
  • 18. Enumeration & Fingerprinting ♦ Specific targets determined ♦ Identification of Services / open ports ♦ Operating System Enumeration Methods  Banner grabbing  Responses to various protocol (ICMP &TCP) commands  Port / Service Scans – TCP Connect, TCP SYN, TCP FIN, etc.
  • 19. Identification of Vulnerabilities Vulnerabilities:  It is a weakness which allows an attacker to reduce a system's information assurance. ♦ Insecure Configuration ♦ Weak passwords ♦ Unpatched vulnerabilities in services, Operating systems, applications ♦ Possible Vulnerabilities in Services, Operating Systems ♦ Insecure programming,Weak Access
  • 20. Tools Vulnerability Scanners - Nessus, ISS, SARA, SAINT Listening to Traffic – Ethercap, tcpdump Password Crackers – John the ripper, LC4, Pwdump Intercepting Web Traffic – Achilles, Whisker, Legion
  • 21. Gaining access: ♦ Enough data has been gathered at this point to make an informed attempt to access the target ♦ Techniques – Password eavesdropping – File share brute forcing – Password file grab – Buffer overflows
  • 22. Escalating Privileges ♦ If only user-level access was obtained in the last step, the attacker will now seek to gain complete control of the system ♦ Techniques – Password cracking – Known exploits
  • 23. Covering Tracks ♦ Once total ownership of the target is secured, hiding this fact from system administrators becomes paramount, lest they quickly end the romp. ♦ Techniques – Clear logs – Hide tools
  • 24. Creating Back Doors ♦ Trap doors will be laid in various parts of the system to ensure that privileged access is easily regained at the whim of the intruder ♦ Techniques – Create rogue user accounts – Schedule batch jobs – Infect startup files – Plant remote control services – Install monitoring mechanisms – Replace apps with trojans
  • 25. Denial of Service ♦ If an attacker is unsuccessful in gaining access, they may use readily available exploit code to disable a target as a last resort ♦ Techniques – SYN flood – ICMP techniques – Identical SYN requests – Overlapping fragment/offset bugs – Out of bounds TCP options (OOB) – DDoS
  • 26. What do hackers do after hacking? ♦ Patch security hole – The other hackers can’t intrude ♦ Clear logs and hide themselves ♦ Install rootkit ( backdoor ) – The hacker who hacked the system can use the system later – It contains trojan virus, and so on ♦ Install irc related program – identd, irc, bitchx, eggdrop, bnc
  • 27. ♦ Install scanner program – mscan, sscan, nmap ♦ Install exploit program ♦ Install denial of service program ♦ Use all of installed programs silently
  • 28. How can protect the system?  Patch security hole often  Encrypt important data  Ex) pgp, ssh  Do not run unused daemon  Remove unused setuid/setgid program  Setup loghost • Backup the system often  Setup firewall  Setup IDS  Ex) snort
  • 29. What should do after hacked? ♦ Shutdown the system – Or turn off the system ♦ Separate the system from network ♦ Restore the system with the backup – Or reinstall all programs ♦ Connect the system to the network
  • 30. H4CKING VS CR4CKING ♦ HACKING WITH MALICIOUS INTENTION IS CRACKING The basic difference is hackers do not do anything disastrous. Cracking yield more devastating results. Cracking is crime. Cyber crime are the results of cracking ,not hacking
  • 32. Please send suggestions and feedbacks I am waiting for your replay. THANK YOU