SlideShare a Scribd company logo
1 of 28
CONTENT
 INTRODUCTION        METHODOLOGY

 HISTORY             REPORTING

 TYPES OF HACKERS    CONCLUSION

 ETHICAL HACKING     ADVANTAGES AND
                       DISADVANTAGES
 HACKING
                      CONCLUSION
 ETHICAL HACKING
  COMMANDMENTS        REFERENCE
INTRODUCTION

 Ethical hacking also known as penetration testing
  or White-hat hacking, involves the same tools,
  tricks and techniques that hackers use, but with
  one major difference that ethical hacking is legal.

 Ethical hacking can also ensure that vendors
  claims about the security of their products
  legitimate.
SECURITY
 Security is the condition of being protect against
  danger or loss. In the general sense, security is a
  concept similar to safety.
 Information security means protecting information
  and information systems from unauthorized access,
  use, disclosure, disruption, modification or destruc-
  tion.

                    Need for security
  There may be several forms of damages which are obviously
  interrelated which are produced by the intruders.
HISTORY HIGHLIGHTS

 In one early ethical hack, the United States Air Force
  conducted a “security evaluation” of the Multiuse
  operating systems for “potential use as a two-level
  (secret/top secret) systems.”


 Most notable of these was the work by Farmer and
  Venom, which was originally posted to Usenet in
  December of 1993.
HACKING

 Eric Raymond, compiler of “The New Hacker’s Dictionary”,
  defines a hacker as a clever programmer.


 A “Good hack” is a clever solution to a programming
  problem and “hacking” is the act of doing it.
TYPE OF HACKERS

 Black-Hat Hackers



 White-Hat Hackers



 Grey-Hat Hackers
ETHICAL HACKING

 A methodology adopted by ethical hackers to discover
  the vulnerabilities existing in information systems
  operating environments.

 With the growth of the internet, computer security has
  become a Major concern for businesses and govern-
  ments.

 Evaluate the intruder threat to their interests would be
  to have independent computer security professionals
  attempt to break into their computer systems.
What does an Ethical Hacker do ?

 An ethical hacker is a person doing ethical
  hacking that is he is a security personal who
  tries to penetrate in to a network to find if
  there is some vulnerability in the system. An
  ethical hacker will always have the permission
  to enter into the target network.

 If he succeed in penetrating into the system
  then he will report to the company with a
  detailed report about the particular vulnerab-
  ility exploiting which he got in to the system.
Required Skills of an Ethical Hacker :


 Microsoft :
 Linux :
 Firewalls :
 Routers :
 Network Protocols :
 Project Management :
ETHICAL HACKING COMMANDMENTS


 Working ethically


 Respecting privacy



 Not crashing your systems:
METHODOLOGY OF HACKING

Reconnaissance

Scanning & Enumeration

Gaining access

 Maintaining access

Clearing tracks
 Reconnaissance:
  This literal meaning of the Word reconnaissance means a
  preliminary survey to gain the information . This is also known as
  foot-printing. As given in the analogy, this is the stage in which the
  hacker collects information about the company which the personal
  is going to hack. This is one of the pre-attacking phases.


 Scanning:
   The hacker tries to make a blue print of the target network. The
  blue print includes the IP addresses of the target network which
  are live, the services which are running on those systems and so
  on Modern port scanning uses TCP protocol to do scanning and
  they could even detect the operating systems running on the
  particular hosts.
Enumeration:
Enumeration is the ability of a hacker to convince some servers to
give them information that is vital to them to make an attack. By
doing this the hacker aims to find what resources and shares can
be found in the system, what valid user account and user groups
are there in the network, what applications will be there etc.

Gaining access
This is the actual hacking phase in which the hacker gains access
to the system. The hacker will make use of all the information he
collected in the pre-attacking phases. Usually the main hindrance
to gaining access to a system is the passwords. In the System
hacking first the hacker will try to get in to the system.
 Password Cracking:
 There are many methods for cracking the password and then
 get in to the system. The simplest method is to guess the
 password. But this is a tedious work. But in order to make this
 work easier there are many automated tools for password
 guessing like legion.


 Privilege escalation
 Privilege escalation is the process of raising the privileges once
 the hacker gets in to the system The privilege escalation
 process usually uses the vulnerabilities present in the host
 operating system or the software. There are many tools like
 hk.exe, metasploit etc. One such community of hackers is the
 metasploit
 Maintaining Access:
  Now the hacker is inside the system . This means that he is now
  in a position to upload some files and download some of them.
  The next aim will be to make an easier path to get in when he
  comes the next time. This is analogous to making a small hidden
  door in the building so that he can directly enter in to the
  building through the door easily
 Clearing Tracks:
   Whenever a hacker downloads some file or installs some
   software, its log will be stored in the server logs. So in order to
   erase the hacker uses man tools. One such tool is windows
   resource kit’s auditpol.exe. Another tool which eliminates any
   physical evidence is the evidence eliminator.. The Evidence
   Eliminator deletes all such evidences.
Ethical hacking tools:


Ethical hackers utilize and have developed variety of tools
intrude into different kinds of systems and to evaluate the
security levels. The nature of these tools differs widely.
Samspade:

Samspade is a simple tool which provides us
information about a particular host. This tool is
very much helpful in finding the addresses, phone
number etc
Email Tracker and Visual Route:


 Email tracker is a software which help us to find from
which server the mail does actually came from. Every
message we receive will have a header associated with
It . The email tracker uses this header information for find
location.

Visual route is a tool which displays the location a
particular server with the help of IP addresses. When we
connect this with the email tracker we can find the
server which actually sends the mail .
Advantages and disadvantages:
Ethical hacking nowadays is a backbone of network
security .Each day its relevance is increasing ,the
major pros & cons of ethical hacking

 Advantages
  “To catch a thief you have to think like a thief”
  Help in closing the open holes in the network
  Provides security to banking and financial
   establishments
  Prevents website defacements
  An evolving technique
Disadvantages
 All depend upon the trustworthiness of the
 ethical hacker

 Hiring professionals is expensive
Future enhancements:

 As it an evolving branch the scope of
enhancement in technology is       immense. No
ethical hacker can ensure the system security by
using the same technique repeatedly. He would
He would have to improve , develop and explore
new avenues repeatedly.

 More enhanced software’s should be used for
optimum protection . Tools used , need to be
updated regularly and more efficient ones need to
be developed
Conclusion
One of the main aim of the seminar is to make
others understand that there are so many tools
through which a hacker can get into a system. Its
various perspectives.

Student
  A student should understand that no software is
made with zero Vulnerability. So while they are
studying they should study the various possibilities
and should study how to prevent that because they
are the professionals of tomorrow
Professionals
    Professionals should understand that business is
directly related to security. So they should make
new software with vulnerabilities as less as
possible. if they are not aware of these then they
won’t be cautions enough in security matters

 In the preceding sections we saw the
methodology of hacking, why should we aware of
hacking and tools and some tools which a hacker
may use . Now we can see what we can do against
hacking or to protect ourselves from hacking .

 the first thing is we should keep ourselves
updated about those          software's us and using
for official and reliable sources .
Educate employees and the users against black
hacking.

Use every possible security measures

 Every time make our password strong by making it
harder and longer to be cracked.
REFERENCE

 www.scribd.com

 www.wikipedia/seminartopics/ethical haching.org

 www. Seminarsonly/ethical hacking.com
Ethical Hacking

More Related Content

What's hot (20)

Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Hacking
HackingHacking
Hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Hacking
HackingHacking
Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 

Similar to Ethical Hacking

Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipurcyber cure
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGNathan Mathis
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptshreya_omar
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf722820106121SARANS
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullahpongada123
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 

Similar to Ethical Hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullah
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 

More from Nitheesh Adithyan (6)

HTML
HTMLHTML
HTML
 
CSS
CSSCSS
CSS
 
Google fiber
Google fiberGoogle fiber
Google fiber
 
Google fiber front page
Google fiber   front pageGoogle fiber   front page
Google fiber front page
 
Google fiber
Google fiberGoogle fiber
Google fiber
 
Ethical hacking front page
Ethical hacking   front pageEthical hacking   front page
Ethical hacking front page
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Ethical Hacking

  • 1.
  • 2.
  • 3. CONTENT  INTRODUCTION  METHODOLOGY  HISTORY  REPORTING  TYPES OF HACKERS  CONCLUSION  ETHICAL HACKING  ADVANTAGES AND DISADVANTAGES  HACKING  CONCLUSION  ETHICAL HACKING COMMANDMENTS  REFERENCE
  • 4. INTRODUCTION  Ethical hacking also known as penetration testing or White-hat hacking, involves the same tools, tricks and techniques that hackers use, but with one major difference that ethical hacking is legal.  Ethical hacking can also ensure that vendors claims about the security of their products legitimate.
  • 5. SECURITY  Security is the condition of being protect against danger or loss. In the general sense, security is a concept similar to safety.  Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruc- tion. Need for security There may be several forms of damages which are obviously interrelated which are produced by the intruders.
  • 6. HISTORY HIGHLIGHTS  In one early ethical hack, the United States Air Force conducted a “security evaluation” of the Multiuse operating systems for “potential use as a two-level (secret/top secret) systems.”  Most notable of these was the work by Farmer and Venom, which was originally posted to Usenet in December of 1993.
  • 7. HACKING  Eric Raymond, compiler of “The New Hacker’s Dictionary”, defines a hacker as a clever programmer.  A “Good hack” is a clever solution to a programming problem and “hacking” is the act of doing it.
  • 8. TYPE OF HACKERS  Black-Hat Hackers  White-Hat Hackers  Grey-Hat Hackers
  • 9. ETHICAL HACKING  A methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems operating environments.  With the growth of the internet, computer security has become a Major concern for businesses and govern- ments.  Evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
  • 10. What does an Ethical Hacker do ?  An ethical hacker is a person doing ethical hacking that is he is a security personal who tries to penetrate in to a network to find if there is some vulnerability in the system. An ethical hacker will always have the permission to enter into the target network.  If he succeed in penetrating into the system then he will report to the company with a detailed report about the particular vulnerab- ility exploiting which he got in to the system.
  • 11. Required Skills of an Ethical Hacker :  Microsoft :  Linux :  Firewalls :  Routers :  Network Protocols :  Project Management :
  • 12. ETHICAL HACKING COMMANDMENTS  Working ethically  Respecting privacy  Not crashing your systems:
  • 13. METHODOLOGY OF HACKING Reconnaissance Scanning & Enumeration Gaining access  Maintaining access Clearing tracks
  • 14.  Reconnaissance: This literal meaning of the Word reconnaissance means a preliminary survey to gain the information . This is also known as foot-printing. As given in the analogy, this is the stage in which the hacker collects information about the company which the personal is going to hack. This is one of the pre-attacking phases.  Scanning: The hacker tries to make a blue print of the target network. The blue print includes the IP addresses of the target network which are live, the services which are running on those systems and so on Modern port scanning uses TCP protocol to do scanning and they could even detect the operating systems running on the particular hosts.
  • 15. Enumeration: Enumeration is the ability of a hacker to convince some servers to give them information that is vital to them to make an attack. By doing this the hacker aims to find what resources and shares can be found in the system, what valid user account and user groups are there in the network, what applications will be there etc. Gaining access This is the actual hacking phase in which the hacker gains access to the system. The hacker will make use of all the information he collected in the pre-attacking phases. Usually the main hindrance to gaining access to a system is the passwords. In the System hacking first the hacker will try to get in to the system.
  • 16.  Password Cracking: There are many methods for cracking the password and then get in to the system. The simplest method is to guess the password. But this is a tedious work. But in order to make this work easier there are many automated tools for password guessing like legion.  Privilege escalation Privilege escalation is the process of raising the privileges once the hacker gets in to the system The privilege escalation process usually uses the vulnerabilities present in the host operating system or the software. There are many tools like hk.exe, metasploit etc. One such community of hackers is the metasploit
  • 17.  Maintaining Access: Now the hacker is inside the system . This means that he is now in a position to upload some files and download some of them. The next aim will be to make an easier path to get in when he comes the next time. This is analogous to making a small hidden door in the building so that he can directly enter in to the building through the door easily  Clearing Tracks: Whenever a hacker downloads some file or installs some software, its log will be stored in the server logs. So in order to erase the hacker uses man tools. One such tool is windows resource kit’s auditpol.exe. Another tool which eliminates any physical evidence is the evidence eliminator.. The Evidence Eliminator deletes all such evidences.
  • 18. Ethical hacking tools: Ethical hackers utilize and have developed variety of tools intrude into different kinds of systems and to evaluate the security levels. The nature of these tools differs widely.
  • 19. Samspade: Samspade is a simple tool which provides us information about a particular host. This tool is very much helpful in finding the addresses, phone number etc
  • 20. Email Tracker and Visual Route:  Email tracker is a software which help us to find from which server the mail does actually came from. Every message we receive will have a header associated with It . The email tracker uses this header information for find location. Visual route is a tool which displays the location a particular server with the help of IP addresses. When we connect this with the email tracker we can find the server which actually sends the mail .
  • 21. Advantages and disadvantages: Ethical hacking nowadays is a backbone of network security .Each day its relevance is increasing ,the major pros & cons of ethical hacking Advantages  “To catch a thief you have to think like a thief”  Help in closing the open holes in the network  Provides security to banking and financial establishments  Prevents website defacements  An evolving technique
  • 22. Disadvantages  All depend upon the trustworthiness of the ethical hacker  Hiring professionals is expensive
  • 23. Future enhancements:  As it an evolving branch the scope of enhancement in technology is immense. No ethical hacker can ensure the system security by using the same technique repeatedly. He would He would have to improve , develop and explore new avenues repeatedly.  More enhanced software’s should be used for optimum protection . Tools used , need to be updated regularly and more efficient ones need to be developed
  • 24. Conclusion One of the main aim of the seminar is to make others understand that there are so many tools through which a hacker can get into a system. Its various perspectives. Student A student should understand that no software is made with zero Vulnerability. So while they are studying they should study the various possibilities and should study how to prevent that because they are the professionals of tomorrow
  • 25. Professionals Professionals should understand that business is directly related to security. So they should make new software with vulnerabilities as less as possible. if they are not aware of these then they won’t be cautions enough in security matters  In the preceding sections we saw the methodology of hacking, why should we aware of hacking and tools and some tools which a hacker may use . Now we can see what we can do against hacking or to protect ourselves from hacking .  the first thing is we should keep ourselves updated about those software's us and using for official and reliable sources .
  • 26. Educate employees and the users against black hacking. Use every possible security measures  Every time make our password strong by making it harder and longer to be cracked.
  • 27. REFERENCE  www.scribd.com  www.wikipedia/seminartopics/ethical haching.org  www. Seminarsonly/ethical hacking.com