SlideShare a Scribd company logo
Ethical Hacking 
a soft approach 
1
Ethical hacking is also known as 
penetration testing, intrusion testing, 
or red teaming, is the controversial 
act of locating weaknesses and 
vulnerabilities of computer and 
information systems by duplicating 
the intent and actions of malicious 
hackers. 
2
An Ethical Hacker : 
An ethical hacker is a security 
professional who applies their hacking 
skills for defensive purposes on behalf 
of the owners of information systems. 
By conducting penetration tests, an 
ethical hacker looks after the 
previously stored data. 
3
To make security 
stronger ( Ethical 
Hacking ) 
Just for fun 
Show off 
Hack other systems 
secretly 
Notify many people 
about their thought 
4 
Steal important 
Why Do 
People 
Hack:
How is it 
different from 
Hacking?? 
• It is Legal 
• Permission is obtained from 
the target 
• Part of an overall 
security program 
• Identify vulnerabilities 
visible from the Internet 
• Ethical hackers possesses 
5 
same skills, mindset and
What’s Hacking? 
 Process of breaking into 
systems for: 
 Personal or 
Commercial Gains 
 Done with Malicious 
Intent – Causing 
severe damage to 
6 
Information & Assets
Types of Hackers: 
I White Hat Hackers: A White Hat 
who specializes in penetration 
testing and in other testing 
methodologies to ensure the 
security of an organization's 
information systems. 
II Black Hat Hackers: A Black Hat 
is the villain or bad guy, 
especially in a western 7 
movie in 
which such a character would
Why We can’t defend against 
Hackers? 
•There are many unknown 
security hole 
•Hackers need to know only one 
security hole to hack the 
system 
•Admin need to know all security 
holes to defend the system 
8
Ethical Hacking - Commandments 
Working Ethically 
Trustworthiness 
Misuse for personal gain 
Respecting privacy 
Not crashing the systems 
9
What Hackers do after 
10 
Hacking? 
• Patch a security hole. 
• Make sure that other 
hackers can’t intrude. 
• Clear logs and hide 
themselves. 
• Install rootkit (Backdoor). 
• The hacker who hacked the 
system can use the system 
later. 
• Contains a number of trojan 
files and so on.
11 
Basic Knowledge 
Required: 
• Should have basic knowledge 
of permissible issues 
• Should know about hacking 
wireless networks. 
• Should know how to handle 
viruses and worms. 
• Should have basic knowledge 
of cryptography. 
• Should know how to perform 
system hacking. 
• Should have the knowledge
What to do after being 
12 
Hacked? 
• Shutdown the system 
or Turn off the 
system 
• Separate the system 
from the network 
• Restore the system 
with the backup or 
reinstall all 
programs and setup a
Processes involved in Ethical Hacking- 
I. Preparation 
II. Foot printing 
III.Enumeration & Fingerprinting 
IV.Identification of Vulnerabilities 
V. Attack – Exploit the Vulnerabilities 
VI.Gaining Access 
VII.Escalating Privilege 
VIII.Covering Tracks 
IX.Creating Backdoors 
13
14 
1. 
Preparatio 
• Identificnation of 
Targets – company 
websites, mail 
servers 
• Agreement on 
protection against 
any legal issues 
• Total time for the 
testing
15 
2. Foot 
printing Collection of as much 
information about the 
target as such: 
# DNS Servers 
# IP Ranges 
# Administrative 
Contacts 
# Problems revealed 
by the administrator 
Information Sources: 
# Search engines 
# Databases
3.Enumeration & 
Fingerprinting  Specific targets 
determined 
 Identification of Services 
/ open ports 
 Operating System 
Enumeration 
Methods 
• Port / Service Scans – 
TCP Connect, TCP SYN, TCP 
FIN, etc. 
16 
Tools
4. Identification 
of Vulnerabilities 
• Weak passwords 
• Insecure programming 
• Insecure 
configuration 
• Weak access control 
17 
Vulnerabilities 
Methods 
• Using default 
passwords 
• SQL injection 
and so on… Too 
Nessus, ISlSs, SARA, Legion, SAINT, Ethercap, Whisker
5. Attack – Exploit the 
18 
Vulnerabilities 
• Obtain as much 
information from the 
target 
• Gain normal access 
• Obtain access to 
other connected 
systems 
• Gaining access to 
application Databases 
• Spamming
7. Escalating 
Privileges 
Techniques include 
password cracking and 
other known exploits. 
8. Covering 
Tracks 
On total ownership 
of the target is secured, 
hiding this fact form 19 
the 
system administrators
9. Creating 
Backdoors Trap doors will be 
laid in various parts 
of the system to 
ensure that 
privileged access is 
easily regained at 
the whim of the 
intruder. 
20
21 
Thank you!!! 
A presentation prepared Rohan 
Raj 
C.S.E. Vth 
sem.

More Related Content

What's hot

Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit v
ArthyR3
 
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Edureka!
 
Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hackerkeriann70
 
WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsWE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security Controls
Society of Women Engineers
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
Khawar Nehal khawar.nehal@atrc.net.pk
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Falgun Rathod
 
MITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB IndictmentMITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB Indictment
Digital Shadows
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Pradeep Sharma
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
Digital Shadows
 
Lesson 3
Lesson 3Lesson 3
Computer security
Computer securityComputer security
Computer security
YUSRA FERNANDO
 
Hacking
HackingHacking
HACKERS ATTACK PROCESS
HACKERS ATTACK PROCESSHACKERS ATTACK PROCESS
HACKERS ATTACK PROCESS
UK Defence Cyber School
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
STS
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Securitydrkelleher
 

What's hot (19)

Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit v
 
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
 
Security
Security Security
Security
 
Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hacker
 
WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsWE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security Controls
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
MITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB IndictmentMITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB Indictment
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Computer security
Computer securityComputer security
Computer security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical h
Ethical hEthical h
Ethical h
 
Hacking
HackingHacking
Hacking
 
HACKERS ATTACK PROCESS
HACKERS ATTACK PROCESSHACKERS ATTACK PROCESS
HACKERS ATTACK PROCESS
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 

Similar to Ethical Hacking

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rishabha Garg
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
AKSHAY KHATRI
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
ShivaniSingha1
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan
 
ch08.ppt
ch08.pptch08.ppt
ch08.ppt
HaipengCai1
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
GovandJamalSaeed
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
Pawan Patil
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
Prasad Pawar
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2
Ishaq Shinwari
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
APNIC
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
vamshimatangi
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
SourabhRuhil4
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
newbie2019
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
daxgame
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
Jay Nagar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
 

Similar to Ethical Hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
ch08.ppt
ch08.pptch08.ppt
ch08.ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Hacking
HackingHacking
Hacking
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 

Recently uploaded (20)

WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 

Ethical Hacking

  • 1. Ethical Hacking a soft approach 1
  • 2. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming, is the controversial act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. 2
  • 3. An Ethical Hacker : An ethical hacker is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. By conducting penetration tests, an ethical hacker looks after the previously stored data. 3
  • 4. To make security stronger ( Ethical Hacking ) Just for fun Show off Hack other systems secretly Notify many people about their thought 4 Steal important Why Do People Hack:
  • 5. How is it different from Hacking?? • It is Legal • Permission is obtained from the target • Part of an overall security program • Identify vulnerabilities visible from the Internet • Ethical hackers possesses 5 same skills, mindset and
  • 6. What’s Hacking?  Process of breaking into systems for:  Personal or Commercial Gains  Done with Malicious Intent – Causing severe damage to 6 Information & Assets
  • 7. Types of Hackers: I White Hat Hackers: A White Hat who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. II Black Hat Hackers: A Black Hat is the villain or bad guy, especially in a western 7 movie in which such a character would
  • 8. Why We can’t defend against Hackers? •There are many unknown security hole •Hackers need to know only one security hole to hack the system •Admin need to know all security holes to defend the system 8
  • 9. Ethical Hacking - Commandments Working Ethically Trustworthiness Misuse for personal gain Respecting privacy Not crashing the systems 9
  • 10. What Hackers do after 10 Hacking? • Patch a security hole. • Make sure that other hackers can’t intrude. • Clear logs and hide themselves. • Install rootkit (Backdoor). • The hacker who hacked the system can use the system later. • Contains a number of trojan files and so on.
  • 11. 11 Basic Knowledge Required: • Should have basic knowledge of permissible issues • Should know about hacking wireless networks. • Should know how to handle viruses and worms. • Should have basic knowledge of cryptography. • Should know how to perform system hacking. • Should have the knowledge
  • 12. What to do after being 12 Hacked? • Shutdown the system or Turn off the system • Separate the system from the network • Restore the system with the backup or reinstall all programs and setup a
  • 13. Processes involved in Ethical Hacking- I. Preparation II. Foot printing III.Enumeration & Fingerprinting IV.Identification of Vulnerabilities V. Attack – Exploit the Vulnerabilities VI.Gaining Access VII.Escalating Privilege VIII.Covering Tracks IX.Creating Backdoors 13
  • 14. 14 1. Preparatio • Identificnation of Targets – company websites, mail servers • Agreement on protection against any legal issues • Total time for the testing
  • 15. 15 2. Foot printing Collection of as much information about the target as such: # DNS Servers # IP Ranges # Administrative Contacts # Problems revealed by the administrator Information Sources: # Search engines # Databases
  • 16. 3.Enumeration & Fingerprinting  Specific targets determined  Identification of Services / open ports  Operating System Enumeration Methods • Port / Service Scans – TCP Connect, TCP SYN, TCP FIN, etc. 16 Tools
  • 17. 4. Identification of Vulnerabilities • Weak passwords • Insecure programming • Insecure configuration • Weak access control 17 Vulnerabilities Methods • Using default passwords • SQL injection and so on… Too Nessus, ISlSs, SARA, Legion, SAINT, Ethercap, Whisker
  • 18. 5. Attack – Exploit the 18 Vulnerabilities • Obtain as much information from the target • Gain normal access • Obtain access to other connected systems • Gaining access to application Databases • Spamming
  • 19. 7. Escalating Privileges Techniques include password cracking and other known exploits. 8. Covering Tracks On total ownership of the target is secured, hiding this fact form 19 the system administrators
  • 20. 9. Creating Backdoors Trap doors will be laid in various parts of the system to ensure that privileged access is easily regained at the whim of the intruder. 20
  • 21. 21 Thank you!!! A presentation prepared Rohan Raj C.S.E. Vth sem.