Isas project
  Ethical Hacking Megha shah Merlyn Pooja Singh
AGENDA What is Ethical Hacking? Who are ethical hackers? History of hacking Types of hackers Ways to hack a system Preventing hacking Skills of an ethical hacker
Ethical Hacking Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, adminstrator,or designer. The greatest risk I.T. faces is security. Hacking refers practice of breaking into systems.
Who is hacker? .  Hackers    intelligent computer professionals learned and acquired knowledge of advanced operating techniques. Try to gain knowledge in depth of systems /networks. Hackers do not always intend to damage data. They may share their knowledge with others.
History of hacking The term “hack” was first used by US university  staff in mid-1960s . When eBay was first attacked in February 2000 its server was bombarded with fake request for web pages & overloaded the site. A group of teenagers once hacked into AOL and stole credit cards to buy video games. In 1986, after many more break-ins congress passed “computer fraud and abuse act”.
History of hacking In 1989,german hackers arrested for breaking into US computer ; sold the information to Soviet KGB. In 1998, teenager hacks into bell Atlantic  phone system; disabled communication at  airports disables runway lights. In 2000, viruses named “I OVE YOU” & “LOVE BUG” damaged roughly up to 10 billions of computers.
Types of hackers Depending on the nature & activities hackers are categorized into different groups : White hat : use their skills & knowledge for good purpose .Help in finding new security vulnerabilities and applications. Black hat : engage in their activities with bad intention and perform illegal activities such as defacing websites and destroying data. Grey hat : do not categorize their work as good or bad.
Ways To Hack a System VIRUSES & WORMS - they are self-replicating programs or codes fragments. They attach themselves to other programs (viruses) or machines (worms). They shut networks by flooding them. ROUGE ACCESS POINT-  they are unsecured wireless access point that outsiders can easily breech. Are most often connected by well-meaning but ignorant employees.
Ways To Hack a System BACK DOORS-  they are loop holes in any system. With the aid of computerized searchers (bots) , hackers can probably find any weakness in network. TROJAN HORSES-  they enter  system by attaching themselves to other programs When Trojans are activated , this hacked software kicks off viruses in the system.
Ways To Hack a System Denial Of Services-  this attacks gives hackers a way to bring down the network without internal access. It floods the access router with bogus traffic (i.e. e-mail or TCP ,packets). Phreaks-  they use computer to break into telecommunications network. Script kiddies-  they have inadequate technical information & use available information to break into system.
Preventing Hacking Anti-virus:  the most popular method of protection among personal computers. Mc Afee.com Corp.-  provides antivirus software that scans hard drive’s for infected files. Norton Internet Security-  Norton anti virus 2008 secures system from Trojans. Firewalls:  used for computer networks & users using continuous online connections.
Preventing Hacking Other software options-  other options are used to protect larger networks systems. IDS-  Intrusion Detection System is considered one of best protection method Content Filtering Software-  advanced   antivirus software that reads compressed files .Allows IT mangers get filtering to block threatening e-mail. Sand Boxing- helps to read malicious codes.
Skills of an ethical hacker Routers-  knowledge of routers, routing protocols and access control lists. Microsoft-  skills in operation , configuration and management. Linux-  knowledge of Linux/Unix; security setting, configuration, and services. Firewalls-  configuration, & operation of  intrusion detection systems.
Skills of an ethical hacker Network protocols-  TCP/IP ; how they function and can be manipulated. Project management-  knowledge of leading, planning, organizing, and controlling a penetration tests systems.

Ethical hacking

  • 1.
  • 2.
    EthicalHacking Megha shah Merlyn Pooja Singh
  • 3.
    AGENDA What isEthical Hacking? Who are ethical hackers? History of hacking Types of hackers Ways to hack a system Preventing hacking Skills of an ethical hacker
  • 4.
    Ethical Hacking Hackingrefers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, adminstrator,or designer. The greatest risk I.T. faces is security. Hacking refers practice of breaking into systems.
  • 5.
    Who is hacker?. Hackers  intelligent computer professionals learned and acquired knowledge of advanced operating techniques. Try to gain knowledge in depth of systems /networks. Hackers do not always intend to damage data. They may share their knowledge with others.
  • 6.
    History of hackingThe term “hack” was first used by US university staff in mid-1960s . When eBay was first attacked in February 2000 its server was bombarded with fake request for web pages & overloaded the site. A group of teenagers once hacked into AOL and stole credit cards to buy video games. In 1986, after many more break-ins congress passed “computer fraud and abuse act”.
  • 7.
    History of hackingIn 1989,german hackers arrested for breaking into US computer ; sold the information to Soviet KGB. In 1998, teenager hacks into bell Atlantic phone system; disabled communication at airports disables runway lights. In 2000, viruses named “I OVE YOU” & “LOVE BUG” damaged roughly up to 10 billions of computers.
  • 8.
    Types of hackersDepending on the nature & activities hackers are categorized into different groups : White hat : use their skills & knowledge for good purpose .Help in finding new security vulnerabilities and applications. Black hat : engage in their activities with bad intention and perform illegal activities such as defacing websites and destroying data. Grey hat : do not categorize their work as good or bad.
  • 9.
    Ways To Hacka System VIRUSES & WORMS - they are self-replicating programs or codes fragments. They attach themselves to other programs (viruses) or machines (worms). They shut networks by flooding them. ROUGE ACCESS POINT- they are unsecured wireless access point that outsiders can easily breech. Are most often connected by well-meaning but ignorant employees.
  • 10.
    Ways To Hacka System BACK DOORS- they are loop holes in any system. With the aid of computerized searchers (bots) , hackers can probably find any weakness in network. TROJAN HORSES- they enter system by attaching themselves to other programs When Trojans are activated , this hacked software kicks off viruses in the system.
  • 11.
    Ways To Hacka System Denial Of Services- this attacks gives hackers a way to bring down the network without internal access. It floods the access router with bogus traffic (i.e. e-mail or TCP ,packets). Phreaks- they use computer to break into telecommunications network. Script kiddies- they have inadequate technical information & use available information to break into system.
  • 12.
    Preventing Hacking Anti-virus: the most popular method of protection among personal computers. Mc Afee.com Corp.- provides antivirus software that scans hard drive’s for infected files. Norton Internet Security- Norton anti virus 2008 secures system from Trojans. Firewalls: used for computer networks & users using continuous online connections.
  • 13.
    Preventing Hacking Othersoftware options- other options are used to protect larger networks systems. IDS- Intrusion Detection System is considered one of best protection method Content Filtering Software- advanced antivirus software that reads compressed files .Allows IT mangers get filtering to block threatening e-mail. Sand Boxing- helps to read malicious codes.
  • 14.
    Skills of anethical hacker Routers- knowledge of routers, routing protocols and access control lists. Microsoft- skills in operation , configuration and management. Linux- knowledge of Linux/Unix; security setting, configuration, and services. Firewalls- configuration, & operation of intrusion detection systems.
  • 15.
    Skills of anethical hacker Network protocols- TCP/IP ; how they function and can be manipulated. Project management- knowledge of leading, planning, organizing, and controlling a penetration tests systems.