SlideShare a Scribd company logo
1 of 28
Hacking???
• The other day, the NASA network was
attacked by a kid from Russia who
managed to control a spaceship in space.
So imagine being able to do something like
that! More recently, there’s something
called the Stuxnet Worm. Everybody says
that the US government created the virus
and what the virus did was that it attacked
only the Iranian nuclear department
computer. So the next world war, if it ever
happens, may actually be through the
internet. You don’t necessarily need to go
with tanks and bombs and airplanes to take
over a country anymore.
Normal
data transfer
Interruption Interception
Modification Fabrication
• Internet Worm
– Robert T. Morris made an internet worm. It spread
through the internet and crashed about 6000 systems.
• Cuckoo’s Egg
– Clifford Stoll caught the hackers who are the German
hackers applied by KGB
– IP Spoof
• Kevin Mitnick was caught by Tsutomu Shimomura who was
security expert. Kevin Mitnick uses the IP Spoof attack in this
accident
• Hack
– Cut with repeated irregular blows
– Examine something very minutely
• Hacker
– The person who hacks
• Cracker
– System intruder/destroyer
• Just for fun
• Show off
• Hack other systems secretly
• Notify many people their thought
• Steal important information
• Destroy enemy’s computer network during
the war
Let me jus see, what
he saves on his
system
Goddamn this
computer is
hacked again
• How much fun can you derive from prying into
people’s private details?
Let me see
what’s on his
facebook
account
• Hacker: Intruder and criminal
• Hacker: Brilliant programmer
• Hacker: Security expert
• Hacker: Computer Modifier
WHITE HAT
BLACK HAT
GRAY HAT
White Hats, in contrast, are hackers who
use their talent to protect and defend
networks.
Black Hats who are highly skilled, but have
malevolent and detrimental intent
Gray Hats hack for different reasons
either ethically or unethically depending
on the situation and circumstances at
hand
• Install irc related program
– identd, irc, bitchx, eggdrop, bnc
• Install scanner program
– mscan, sscan, nmap
• Install exploit program
• Install denial of service program
• Use all of installed programs silently
An ethical hacker is usually somebody hired by
a company and given permission to hack into
their network and in the process get to know
what the security loopholes are. In the
process, they will create a report saying “Hey
these are your problems and this is how you
can fix them”. So this is what an ethical hacker
does. He takes the knowledge of the criminal
and uses it against him.
• Study C/C++/assembly language
• Study computer architecture
• Study operating system
• Study computer network
• Examine the hacking tools for a month
• Think the problem of the computer
• To become a hacker you need four things: You
need to know about programming, you need
to know networking,the basics of Linux and,
most importantly, you need to know how to
think like a criminal.
• The first three things can be learned but the
fourth thing you have to learn on your own.
It’s a talent you have to develop, and I classify
thinking like a criminal as a talent which you
definitely require if you want to be successful
as a hacker.
• the biggest risk in an organization is its
own employees…
• Does that mean that all the companies
are sitting there reading all the emails
that we are sending out from the
company account?
• Of course. In the U.S, employees have to
sign a document authorizing the company
to look into their email accounts
whenever they wish. I don’t know about
Mauritius but in India they don’t make
employees sign anything but go through
the employees’ emails nevertheless.
• Patch security hole often
• Encrypt important data
– Ex) pgp, ssh
• Do not run unused daemon
• Remove unused setuid/setgid program
• Setup loghost
• Backup the system often
• Shutdown the system
– Or turn off the system
• Separate the system from network
• Restore the system with the backup
– Or reinstall all programs
• Connect the system to the network
• It can be good to call the police
Ethical Hacking
Ethical Hacking

More Related Content

What's hot

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingANKIT KUMAR
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 

What's hot (20)

Hacking
HackingHacking
Hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Internet security
Internet securityInternet security
Internet security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
New internet security
New internet securityNew internet security
New internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Internet security
Internet securityInternet security
Internet security
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 

Similar to Ethical Hacking (20)

Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
hacking
hackinghacking
hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 

Recently uploaded

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 

Recently uploaded (20)

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 

Ethical Hacking

  • 1.
  • 2.
  • 4. • The other day, the NASA network was attacked by a kid from Russia who managed to control a spaceship in space. So imagine being able to do something like that! More recently, there’s something called the Stuxnet Worm. Everybody says that the US government created the virus and what the virus did was that it attacked only the Iranian nuclear department computer. So the next world war, if it ever happens, may actually be through the internet. You don’t necessarily need to go with tanks and bombs and airplanes to take over a country anymore.
  • 6. • Internet Worm – Robert T. Morris made an internet worm. It spread through the internet and crashed about 6000 systems. • Cuckoo’s Egg – Clifford Stoll caught the hackers who are the German hackers applied by KGB – IP Spoof • Kevin Mitnick was caught by Tsutomu Shimomura who was security expert. Kevin Mitnick uses the IP Spoof attack in this accident
  • 7. • Hack – Cut with repeated irregular blows – Examine something very minutely • Hacker – The person who hacks • Cracker – System intruder/destroyer
  • 8. • Just for fun • Show off • Hack other systems secretly • Notify many people their thought • Steal important information • Destroy enemy’s computer network during the war
  • 9. Let me jus see, what he saves on his system Goddamn this computer is hacked again
  • 10. • How much fun can you derive from prying into people’s private details? Let me see what’s on his facebook account
  • 11. • Hacker: Intruder and criminal • Hacker: Brilliant programmer • Hacker: Security expert • Hacker: Computer Modifier
  • 13. White Hats, in contrast, are hackers who use their talent to protect and defend networks. Black Hats who are highly skilled, but have malevolent and detrimental intent Gray Hats hack for different reasons either ethically or unethically depending on the situation and circumstances at hand
  • 14. • Install irc related program – identd, irc, bitchx, eggdrop, bnc • Install scanner program – mscan, sscan, nmap • Install exploit program • Install denial of service program • Use all of installed programs silently
  • 15.
  • 16.
  • 17. An ethical hacker is usually somebody hired by a company and given permission to hack into their network and in the process get to know what the security loopholes are. In the process, they will create a report saying “Hey these are your problems and this is how you can fix them”. So this is what an ethical hacker does. He takes the knowledge of the criminal and uses it against him.
  • 18.
  • 19. • Study C/C++/assembly language • Study computer architecture • Study operating system • Study computer network • Examine the hacking tools for a month • Think the problem of the computer
  • 20. • To become a hacker you need four things: You need to know about programming, you need to know networking,the basics of Linux and, most importantly, you need to know how to think like a criminal.
  • 21. • The first three things can be learned but the fourth thing you have to learn on your own. It’s a talent you have to develop, and I classify thinking like a criminal as a talent which you definitely require if you want to be successful as a hacker.
  • 22.
  • 23.
  • 24. • the biggest risk in an organization is its own employees… • Does that mean that all the companies are sitting there reading all the emails that we are sending out from the company account? • Of course. In the U.S, employees have to sign a document authorizing the company to look into their email accounts whenever they wish. I don’t know about Mauritius but in India they don’t make employees sign anything but go through the employees’ emails nevertheless.
  • 25. • Patch security hole often • Encrypt important data – Ex) pgp, ssh • Do not run unused daemon • Remove unused setuid/setgid program • Setup loghost • Backup the system often
  • 26. • Shutdown the system – Or turn off the system • Separate the system from network • Restore the system with the backup – Or reinstall all programs • Connect the system to the network • It can be good to call the police