The explosive growth of the Internet has
brought many good things:e-mail,information
distribution.
As with most technological advances, there is
also a dark side: criminal hackers.
Governments, companies, and private citizens
around the world are anxious to be a part of
this revolution, but they are afraid that some
hacker will break into theirWeb server and
replace their logo ,read their e-mail, steal their
credit card number or implant software that
will secretly transmit their organization’s
secrets to the open Internet.With these
 The true meaning of the word hacking has never been
anything unethical
 A hacker is a person who loves to explore computer
technology and takes it to the next level. But hacking
today refers to breaking into computer systems without
Authorization and a hacker is a criminal, as per law
 In true sense, people who break into computer system
or networks are crackers and not hackers
A person who enjoys learning the details of
computer systems and how to stretch their
capabilities
 John T. Draper
 Kevin mitnick
 Jonathan James
 Kevin poulsen
 Bill gates
 Richard Stallman
 Linus Torvalds
 Steve jobs
 Mark zuckerbergs






Also Called – Attack & Penetration Testing, White-hat hacking,
Red teaming
• It is Legal
• Permission is obtained from the target
• Part of an overall security program
• Identify vulnerabilities visible from the Internet
• Ethical hackers possesses same skills, mindset and tools of
a hacker but the attacks are done in a non-destructive manner
The skills ethical hackers should posses
 They must be completely trustworthy.
 Should have very strong programming and computer
networking skills and have been in networking field for
several years.
 Should have more patience.
 Continuous updating of the knowledge on computer and
network security is required.
 They should know the techniques of the criminals, how
their activities might be detected and how to stop them.
Viruses, Trojan
Horses,
and Worms
Social
Engineering
Automated
Attacks
Accidental
Breaches in
Security Denial of
Service (DoS)
Organizational
Attacks
Restricted
Data
What do Ethical Hacker do..?
Information Gathering
This is the first step of Hacking and the aim is to
gather as much information as possible about the
system or Target.This is mostly done in a passive state
Includes:
• Passive Network Monitoring
• Whois
• Locating and identifying Host
• Google
Information Gathering
Scanning
 Scanning refers to the pre-attack phase when the hackers scan
the network using in a general manner or using specific
information gathered
 Software for scanning
 War dialers
 Port scanners
 Network Scanners
 Vulnerability scanner
Scanning
• Gaining Access refers to the attack stage. Hacker will launch an
attack on the system .on the basis of first 2 step
• Please note that Every attack Does not result in compromise of
security
• An Attack can target the following layers
Network layer
Example:Session Hijacking Attack
Application layer
Example: Buffer Overflow Attack
 Mainting Acces refers to a stage which is Post-Attack.This is
done once the hackers “owns ” the System
 A hacker install the following application
 RATs
 Trojans
 Backdoors
 Rootkits
Reporting vulnerability
Ethical hacking Vulnerability Report
 Detailed Report on the Hacking Attack
 Vulnerabilities are detailed and patches are
suggested
Ethical Hacking Tools
• MetaSploit
• WireShark
• Nmap /zenmap
• JTR(John The Ripper)
• Acunetix Web Security Scanner
• Oph crack-live cd
• netbus
• ProRat
• beast
• apocalypse
• Fud crypter
• sheikh crypter
• sikandar crypter
Demo
Method to hack window xp
• using cmd
• using OPH-crack live cd
 Windows XP is one of the most widely used Operating
system in the world so it is important to learn the
security and loopholes. Here we learned the different
tool and techniques used for hacking.This knowledge is
very much helpful for administrator who maintain the
system in an organization. Using registry we can hack
the Windows XP locally. Apart from this we learned
about hacking related to internet security. At last we
learn about prevention ,one should take to overcome
this flaws.
 http://www.ehackingnews.com/
 http://www.hacktechguru.com/hack-guru.html
 http://thehackernews.com/
 http://indianhacker.net/forum/forum.php
 http://www.forumjar.com/forums/Hacker
 http://www.hackforums.net/
Ethical hacking
Ethical hacking

Ethical hacking

  • 3.
    The explosive growthof the Internet has brought many good things:e-mail,information distribution. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into theirWeb server and replace their logo ,read their e-mail, steal their credit card number or implant software that will secretly transmit their organization’s secrets to the open Internet.With these
  • 5.
     The truemeaning of the word hacking has never been anything unethical  A hacker is a person who loves to explore computer technology and takes it to the next level. But hacking today refers to breaking into computer systems without Authorization and a hacker is a criminal, as per law  In true sense, people who break into computer system or networks are crackers and not hackers
  • 6.
    A person whoenjoys learning the details of computer systems and how to stretch their capabilities
  • 7.
     John T.Draper  Kevin mitnick  Jonathan James  Kevin poulsen  Bill gates  Richard Stallman  Linus Torvalds  Steve jobs  Mark zuckerbergs
  • 8.
  • 9.
    Also Called –Attack & Penetration Testing, White-hat hacking, Red teaming • It is Legal • Permission is obtained from the target • Part of an overall security program • Identify vulnerabilities visible from the Internet • Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner
  • 10.
    The skills ethicalhackers should posses  They must be completely trustworthy.  Should have very strong programming and computer networking skills and have been in networking field for several years.
  • 11.
     Should havemore patience.  Continuous updating of the knowledge on computer and network security is required.  They should know the techniques of the criminals, how their activities might be detected and how to stop them.
  • 12.
    Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breachesin Security Denial of Service (DoS) Organizational Attacks Restricted Data
  • 13.
    What do EthicalHacker do..?
  • 14.
    Information Gathering This isthe first step of Hacking and the aim is to gather as much information as possible about the system or Target.This is mostly done in a passive state Includes: • Passive Network Monitoring • Whois • Locating and identifying Host • Google
  • 15.
  • 16.
    Scanning  Scanning refersto the pre-attack phase when the hackers scan the network using in a general manner or using specific information gathered  Software for scanning  War dialers  Port scanners  Network Scanners  Vulnerability scanner
  • 17.
  • 18.
    • Gaining Accessrefers to the attack stage. Hacker will launch an attack on the system .on the basis of first 2 step • Please note that Every attack Does not result in compromise of security • An Attack can target the following layers Network layer Example:Session Hijacking Attack Application layer Example: Buffer Overflow Attack
  • 19.
     Mainting Accesrefers to a stage which is Post-Attack.This is done once the hackers “owns ” the System  A hacker install the following application  RATs  Trojans  Backdoors  Rootkits
  • 20.
    Reporting vulnerability Ethical hackingVulnerability Report  Detailed Report on the Hacking Attack  Vulnerabilities are detailed and patches are suggested
  • 21.
    Ethical Hacking Tools •MetaSploit • WireShark • Nmap /zenmap • JTR(John The Ripper) • Acunetix Web Security Scanner • Oph crack-live cd • netbus • ProRat • beast • apocalypse • Fud crypter • sheikh crypter • sikandar crypter
  • 24.
    Demo Method to hackwindow xp • using cmd • using OPH-crack live cd
  • 25.
     Windows XPis one of the most widely used Operating system in the world so it is important to learn the security and loopholes. Here we learned the different tool and techniques used for hacking.This knowledge is very much helpful for administrator who maintain the system in an organization. Using registry we can hack the Windows XP locally. Apart from this we learned about hacking related to internet security. At last we learn about prevention ,one should take to overcome this flaws.
  • 26.
     http://www.ehackingnews.com/  http://www.hacktechguru.com/hack-guru.html http://thehackernews.com/  http://indianhacker.net/forum/forum.php  http://www.forumjar.com/forums/Hacker  http://www.hackforums.net/