SlideShare a Scribd company logo
ETHICAL HACKING
        A LICENCE TO HACK
HACKING:

 Hacking is unauthorized use of computer and
  network resources.
 According to Computer Crime Research
  Center: “It is act of gaining access without
  legal authorization to computer or computer
  network.”
HACKER:

 Someone who tries to break into
  computer systems for any illegal
  purpose.
 Someone who maliciously breaks into systems
  for personal gain. These are criminals.
TYPES OF HACKERS

   Black hat hacker.
   White hat hacker.
   Gray hat hacker.
BLACK BOX MODEL

   Black box model
       Company staff does not know about the test.
       Tester is not given details about the network.
        ▪   Burden is on the tester to find these details

       It is tested, if security personnel are able to
        detect an attack.
WHITE BOX MODEL


   White box model
     Tester
           is told everything about the network
     topology and technology.
         Network diagram is given.

     Tester
          is authorized to interview IT personnel and
     company employees.
     Makes    the tester’s job a little easier.
GRAY BOX MODEL

   Gray box model
     Hybrid   of the white and black box models.
     Company     gives tester partial information.
WHAT IS ETHICAL HACKING ?
 Ethical hacking ,also known as penetration
  testing or white-hat hacking involves the
  same tools, tricks, and techniques that
  hackers use, i.e, by duplicating the intent
  and actions of malicious hackers.
 Ethical hacking is performed with the
  target’s permission.
WHO ARE ETHICAL HACKERS?
   An Ethical Hacker, also known as a whitehat
    hacker, or simply a whitehat, is a security
    professional who applies their hacking skills for
    defensive purposes on behalf of the owners of
    information systems.
   They are completely trustworthy.
   They have strong programming and computer
    networking skills.
   They should have more patience.
   Continuous updating of their knowledge on
    computer and network security is required.
   They should know the techniques of the criminals,
    what their activities would be, how to detected
    them and how to stop them.
REQUIRED SKILLS OF AN ETHICAL HACKER
 Routers: knowledge of routers,
  routing protocols, and access control
  lists.
 Microsoft: skills in operation,
  configuration and management.
 Linux: knowledge of Linux/Unix;
  security setting, configuration, and
  services.
 Firewalls: configurations, and
  operation of intrusion detection
  systems.
ETHICAL HACKING PROCESS

1.   Preparation
2.   Foot printing
3.   Enumeration and fingerprinting
4.   Identification of vulnerabilities
5.   Attack-exploit the vulnerabilities.
PREPARATION:

 Identification of target –company website, mail
  server, extranet.
 Signing of contract

 Agreement on protection against any legal
  issue.
 Contracts to clearly specify limits and dangers
  of the test.
 Total time for testing.

 Key people made aware of testing.
FOOTPRINTING

   Collecting required information about target:
    DNS server.
   IP ranges.
   Administrative contacts.
   Problem reveled by administrator.
ENUMERATION AND FINGERPRINTING

 Operating system enumeration.
 Identification of services/open port.
IDENTIFICATION OF VULNERABILITIES:

   Vulnerabilities
   Insecure configuration.
   Weak passwords.
   Insecure programming.
   Weak access control.
CERTIFICATION

The International Council of E-Commerce
 Consultants (EC-Council) provides a
 professional certification for Certified Ethical
 Hackers (CEH). A certified ethical hacker is
 an ethical hacker who has obtained the
 certification provided by the EC-Council.
ADVANTAGES

 These are good hackers
 Have genuine license to hack

 Generally owned by companies for security
  designing
 Provides security to banking and financial
  establishments
CONCLUSIONS

 Always security professionals are one step
  behind the hackers and crackers.
 Plan for the unplanned attacks.

 The role of ethical hacking in security is to
  provide customers with awareness of how
  they could be attacked and why they are
  targeted.
PRESENTED BY


          SAYANTAN SUR
            BCA(H) – 2

               THANK YOU

More Related Content

What's hot

Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
A Raheem Ansari
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
himanshujoshi238
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
Information Technology
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Monika Deswal
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
Ammar WK
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
Divyank Jindal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
Yash Shukla
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
AmanUllah115928
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
Coder Tech
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
Abhilash Ak
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 

What's hot (20)

Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Hacking
HackingHacking
Hacking
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Viewers also liked

Validus holdings, ltd. (vr) company profile and swot analysis
Validus holdings, ltd. (vr)   company profile and swot analysisValidus holdings, ltd. (vr)   company profile and swot analysis
Validus holdings, ltd. (vr) company profile and swot analysis
CompanyProfile123
 
Ontwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebbenOntwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebben
hrmatches
 
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabrasCatálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabrasJuan Albiñana
 
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Eduardo Nelson German
 
Curso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménezCurso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménez
Javier Arenas Jimenez
 
Catalogo Feria de Arte flecha 2013
Catalogo Feria de Arte flecha 2013Catalogo Feria de Arte flecha 2013
Marketing en redes sociales
Marketing en redes socialesMarketing en redes sociales
Marketing en redes sociales
Club de Marketing
 
La opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregidaLa opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregida
educacionsinescuela
 
Powerpoint visita al museo 2
Powerpoint visita al museo 2Powerpoint visita al museo 2
Powerpoint visita al museo 2
tangerina2010
 
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
helmuth Fajardo Peña
 
Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN Ana Cláudia Costa
 
Fiziologija reprodukcije
Fiziologija reprodukcijeFiziologija reprodukcije
Fiziologija reprodukcije
Ena Horvat
 
next generation smart sensor
next generation smart sensornext generation smart sensor
next generation smart sensor
Richa Ritambhara
 
Farmacología ocular
Farmacología ocularFarmacología ocular
Farmacología ocularKarina Soto
 
re:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im Designre:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im Design
Magdalena Reiter
 

Viewers also liked (17)

Validus holdings, ltd. (vr) company profile and swot analysis
Validus holdings, ltd. (vr)   company profile and swot analysisValidus holdings, ltd. (vr)   company profile and swot analysis
Validus holdings, ltd. (vr) company profile and swot analysis
 
Ontwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebbenOntwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebben
 
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabrasCatálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabras
 
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
 
Uned madrid tips
Uned madrid tipsUned madrid tips
Uned madrid tips
 
Curso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménezCurso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménez
 
Catalogo Feria de Arte flecha 2013
Catalogo Feria de Arte flecha 2013Catalogo Feria de Arte flecha 2013
Catalogo Feria de Arte flecha 2013
 
Marketing en redes sociales
Marketing en redes socialesMarketing en redes sociales
Marketing en redes sociales
 
La opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregidaLa opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregida
 
Powerpoint visita al museo 2
Powerpoint visita al museo 2Powerpoint visita al museo 2
Powerpoint visita al museo 2
 
Proyectos Lifer-2015
Proyectos Lifer-2015Proyectos Lifer-2015
Proyectos Lifer-2015
 
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
 
Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN
 
Fiziologija reprodukcije
Fiziologija reprodukcijeFiziologija reprodukcije
Fiziologija reprodukcije
 
next generation smart sensor
next generation smart sensornext generation smart sensor
next generation smart sensor
 
Farmacología ocular
Farmacología ocularFarmacología ocular
Farmacología ocular
 
re:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im Designre:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im Design
 

Similar to Ethical Hacking

Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
MaheshDhope1
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
AnshumaanTiwari2
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
shreya_omar
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
BishalRay8
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
Akhilesh Patel
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
Cookie Tuazon
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
AKSHAY KHATRI
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
Pankaj Dubey
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
ambemPrashanthi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Mohammad Affan
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 

Similar to Ethical Hacking (20)

Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Hacking
HackingHacking
Hacking
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 

More from Sayantan Sur

Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
Sayantan Sur
 
Stack using Linked List
Stack using Linked ListStack using Linked List
Stack using Linked List
Sayantan Sur
 
Stack using Array
Stack using ArrayStack using Array
Stack using Array
Sayantan Sur
 
Array menu
Array menuArray menu
Array menu
Sayantan Sur
 
Double linked list
Double linked listDouble linked list
Double linked list
Sayantan Sur
 
Single linked list
Single linked listSingle linked list
Single linked list
Sayantan Sur
 
Circular linked list
Circular linked listCircular linked list
Circular linked list
Sayantan Sur
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)Sayantan Sur
 
International Terrorism
International Terrorism International Terrorism
International Terrorism Sayantan Sur
 

More from Sayantan Sur (12)

Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Stack using Linked List
Stack using Linked ListStack using Linked List
Stack using Linked List
 
Stack using Array
Stack using ArrayStack using Array
Stack using Array
 
Array menu
Array menuArray menu
Array menu
 
Double linked list
Double linked listDouble linked list
Double linked list
 
Single linked list
Single linked listSingle linked list
Single linked list
 
Circular linked list
Circular linked listCircular linked list
Circular linked list
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
 
Network Security
Network SecurityNetwork Security
Network Security
 
Visual Studio IDE
Visual Studio IDEVisual Studio IDE
Visual Studio IDE
 
Phising
PhisingPhising
Phising
 
International Terrorism
International Terrorism International Terrorism
International Terrorism
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 

Recently uploaded (20)

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 

Ethical Hacking

  • 1. ETHICAL HACKING A LICENCE TO HACK
  • 2. HACKING:  Hacking is unauthorized use of computer and network resources.  According to Computer Crime Research Center: “It is act of gaining access without legal authorization to computer or computer network.”
  • 3. HACKER:  Someone who tries to break into computer systems for any illegal purpose.  Someone who maliciously breaks into systems for personal gain. These are criminals.
  • 4. TYPES OF HACKERS  Black hat hacker.  White hat hacker.  Gray hat hacker.
  • 5. BLACK BOX MODEL  Black box model  Company staff does not know about the test.  Tester is not given details about the network. ▪ Burden is on the tester to find these details  It is tested, if security personnel are able to detect an attack.
  • 6. WHITE BOX MODEL  White box model  Tester is told everything about the network topology and technology.  Network diagram is given.  Tester is authorized to interview IT personnel and company employees.  Makes the tester’s job a little easier.
  • 7. GRAY BOX MODEL  Gray box model  Hybrid of the white and black box models.  Company gives tester partial information.
  • 8. WHAT IS ETHICAL HACKING ?  Ethical hacking ,also known as penetration testing or white-hat hacking involves the same tools, tricks, and techniques that hackers use, i.e, by duplicating the intent and actions of malicious hackers.  Ethical hacking is performed with the target’s permission.
  • 9. WHO ARE ETHICAL HACKERS?  An Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems.  They are completely trustworthy.  They have strong programming and computer networking skills.  They should have more patience.  Continuous updating of their knowledge on computer and network security is required.  They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
  • 10. REQUIRED SKILLS OF AN ETHICAL HACKER  Routers: knowledge of routers, routing protocols, and access control lists.  Microsoft: skills in operation, configuration and management.  Linux: knowledge of Linux/Unix; security setting, configuration, and services.  Firewalls: configurations, and operation of intrusion detection systems.
  • 11. ETHICAL HACKING PROCESS 1. Preparation 2. Foot printing 3. Enumeration and fingerprinting 4. Identification of vulnerabilities 5. Attack-exploit the vulnerabilities.
  • 12. PREPARATION:  Identification of target –company website, mail server, extranet.  Signing of contract  Agreement on protection against any legal issue.  Contracts to clearly specify limits and dangers of the test.  Total time for testing.  Key people made aware of testing.
  • 13. FOOTPRINTING  Collecting required information about target:  DNS server.  IP ranges.  Administrative contacts.  Problem reveled by administrator.
  • 14. ENUMERATION AND FINGERPRINTING  Operating system enumeration.  Identification of services/open port.
  • 15. IDENTIFICATION OF VULNERABILITIES:  Vulnerabilities  Insecure configuration.  Weak passwords.  Insecure programming.  Weak access control.
  • 16. CERTIFICATION The International Council of E-Commerce Consultants (EC-Council) provides a professional certification for Certified Ethical Hackers (CEH). A certified ethical hacker is an ethical hacker who has obtained the certification provided by the EC-Council.
  • 17. ADVANTAGES  These are good hackers  Have genuine license to hack  Generally owned by companies for security designing  Provides security to banking and financial establishments
  • 18. CONCLUSIONS  Always security professionals are one step behind the hackers and crackers.  Plan for the unplanned attacks.  The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.
  • 19. PRESENTED BY SAYANTAN SUR BCA(H) – 2 THANK YOU