Ethical Hacking
-A license to hack
What is Hacking?
Act of illegally entering a computer system , making unauthorised
changes to the files and data contain within.
What is Ethical hacking?
• “Ethical hacking describes the process of attacking and penetrating
computer systems and networks to discover and point out potential
security weaknesses for a client”.
• Its legal and permission is obtained from the target for hacking.
• Part of an overall security program.
Events that gave meaning to hacking:
• The first hacker appeared in 1960’s at the Massachusetts Institute of
technology(MIT).
• During the 1970’s a different kind of hacker appeared :phone
phreaker or Phone hacker.
• In the 1980’s,phreaks started to migrate to computers and the first
Bulletin Board System(BBS)appeared.
• During the 1990’s,when the use of internet widespread around the
world, hackers multiplied!!
Why do people hack?
• Just for fun
• To show off
• To steal other information secretly
• To notify many people their thoughts
• To destroy enemy’s computer network during the war
• To get others attention
Basic-Hacking-skills:
• An ethical hacker must be a computer systems expert and needs to have very
strong programming and computer networking skills.
• An ethical hacker needs to have a lot of patience, persistence, and perseverance
to try again and again and wait for the required result.
• Password guessing and cracking
• Session hijacking
• Session spoofing
• Network traffic sniffing
• Denial of Service attacks
• Exploiting buffer overflow vulnerabilities
• SQL injection
Types of hackers:
Black hat hacker Grey hat hacker White hat hacker
• White hat hacker:
Individuals professing hackers skills and using them for the defensive
purpose also known as Security Analysis.
Eg: Bill Gates, Steve jobs,..
• Black hat hacker:
Individuals with extraordinary computing skills, resorting to malicious or
destructive activities and are also known as Crackers.
Eg: Kevin Poulsen, Jonathan james,..
• Grey hat hacker:
Individuals who work both offensive and defensive at various works.
Phases of hacking:
Hacking growth rate:
Hackers language:
Importance of Ethical Hacking:
• The Ethical hacking system important for some of the service like application
testing, War Dialling, Network Testing, Wireless Security, System Hardening etc,..
• Ethical hacking used to judge the security programs of the organizations.
• It makes software and codes better and more efficient of organizations security
risks.
Advantages:
• This prevents identity theft and the leaking of vital information.
• It allows them to implement stronger security measures.
• It is also beneficial to help government entities to protect major computer
systems from being compromised in a way that national security would be a issue
• It also helps families of deceased people access accounts to see what their final
viral transmissions may have been or gain access to some accounts to some
accounts to close them down.
• Fighting against terrorism and national security breaches.
• Having a computer system that prevents malicious hackers from gaining access.
• Having adequate preventative measures in place to prevent security breaches.
Disadvantages:
As with all types of activities which have a darker side, there will be dishonest
people presenting drawbacks. The possible drawbacks of ethical hacking include:
• The ethical hacker using the knowledge they gain to do malicious hacking
activities.
• Allowing the company’s financial and banking details to be seen.
• The possibility that the ethical hacker will send and/or place malicious code,
viruses, malware and other destructive and harmful things on a computer
system.
• Massive security breach.
Recent cases of Hacking:
• 3.2 million SBI bank account
was hacked by the hackers of
china and unauthorised
transaction is done, this is the
biggest breach in the history of
Indian bank.
• In August 2013, 1 billion
yahoo account passwords
has been leaked and the
information were
compromised.This is one of
the biggest data breach in
the history.
Conclusion:
• The idea of testing the security of a system by trying to break into it is
not new.
• While ethical hackers can help clients better understand their security
needs, it is up to the clients to keep their guards in place.
• Keep your password protected. Write your password it should be with
combinations of symbols,digits,special symbols.Do not respond to
feck on fishing email.when you are doing any online transaction
always keep watch on site whether t5he protocol of site is https &
whether there is a lock symbol
Presented by:
• Goutham
• Baba Malik

Ethical hacking

  • 2.
  • 3.
    What is Hacking? Actof illegally entering a computer system , making unauthorised changes to the files and data contain within.
  • 4.
    What is Ethicalhacking? • “Ethical hacking describes the process of attacking and penetrating computer systems and networks to discover and point out potential security weaknesses for a client”. • Its legal and permission is obtained from the target for hacking. • Part of an overall security program.
  • 5.
    Events that gavemeaning to hacking: • The first hacker appeared in 1960’s at the Massachusetts Institute of technology(MIT). • During the 1970’s a different kind of hacker appeared :phone phreaker or Phone hacker. • In the 1980’s,phreaks started to migrate to computers and the first Bulletin Board System(BBS)appeared. • During the 1990’s,when the use of internet widespread around the world, hackers multiplied!!
  • 6.
    Why do peoplehack? • Just for fun • To show off • To steal other information secretly • To notify many people their thoughts • To destroy enemy’s computer network during the war • To get others attention
  • 7.
    Basic-Hacking-skills: • An ethicalhacker must be a computer systems expert and needs to have very strong programming and computer networking skills. • An ethical hacker needs to have a lot of patience, persistence, and perseverance to try again and again and wait for the required result. • Password guessing and cracking • Session hijacking • Session spoofing • Network traffic sniffing • Denial of Service attacks • Exploiting buffer overflow vulnerabilities • SQL injection
  • 8.
    Types of hackers: Blackhat hacker Grey hat hacker White hat hacker
  • 9.
    • White hathacker: Individuals professing hackers skills and using them for the defensive purpose also known as Security Analysis. Eg: Bill Gates, Steve jobs,.. • Black hat hacker: Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as Crackers. Eg: Kevin Poulsen, Jonathan james,.. • Grey hat hacker: Individuals who work both offensive and defensive at various works.
  • 10.
  • 11.
  • 12.
  • 13.
    Importance of EthicalHacking: • The Ethical hacking system important for some of the service like application testing, War Dialling, Network Testing, Wireless Security, System Hardening etc,.. • Ethical hacking used to judge the security programs of the organizations. • It makes software and codes better and more efficient of organizations security risks.
  • 14.
    Advantages: • This preventsidentity theft and the leaking of vital information. • It allows them to implement stronger security measures. • It is also beneficial to help government entities to protect major computer systems from being compromised in a way that national security would be a issue • It also helps families of deceased people access accounts to see what their final viral transmissions may have been or gain access to some accounts to some accounts to close them down. • Fighting against terrorism and national security breaches. • Having a computer system that prevents malicious hackers from gaining access. • Having adequate preventative measures in place to prevent security breaches.
  • 15.
    Disadvantages: As with alltypes of activities which have a darker side, there will be dishonest people presenting drawbacks. The possible drawbacks of ethical hacking include: • The ethical hacker using the knowledge they gain to do malicious hacking activities. • Allowing the company’s financial and banking details to be seen. • The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on a computer system. • Massive security breach.
  • 16.
    Recent cases ofHacking: • 3.2 million SBI bank account was hacked by the hackers of china and unauthorised transaction is done, this is the biggest breach in the history of Indian bank. • In August 2013, 1 billion yahoo account passwords has been leaked and the information were compromised.This is one of the biggest data breach in the history.
  • 17.
    Conclusion: • The ideaof testing the security of a system by trying to break into it is not new. • While ethical hackers can help clients better understand their security needs, it is up to the clients to keep their guards in place. • Keep your password protected. Write your password it should be with combinations of symbols,digits,special symbols.Do not respond to feck on fishing email.when you are doing any online transaction always keep watch on site whether t5he protocol of site is https & whether there is a lock symbol
  • 18.