ETHICAL HACKING
Hack to Learn
Remember This!
This Program teaches you 100% Network
OffensiveTraining and not Defensive.
BeforeYou Start
■ Lab Environment
VMWARE should be installed with following machines
– Windows 10
– Windows 7
– Android
– Windows server 2012
– Kali Linux
– Ubuntu
Check Network Connectivity with ping command between all machines
Computer System
■ Charles Babbage was considered to be the father of computer.
■ Ada Lovelace was the mother of Computer.
Basic Programming Structure
Windows System
■ Software
■ Shell
■ Kernel
■ hardware
■ i/o devices
Windows File System
Hidden Securities ofWindows System
■ Registry
■ PowerShell
■ Safe mode
■ Services
■ Processes
■ Cmd
Linux System
Linux File System
Comparison between Linux &Windows file system
Linux vsWindows
System Booting Process
SecurityAttack vectors
Motivation
Objectiv
e
Method Vulnerabilit
y Attacks
 InformationTheft
 Manipulating Data
 Taking Revenge
 Damaging Reputation
 Disrupting Business continuity
 Creating Fear & Chaos
Exploiting system vulnerabilities and compromising security
controls to gain unauthorized access to the system resources.
Modifying system or application features to achieve a goal
outside of the creator’s original purpose.
Steal, pilfer & redistribute intellectual property leading to
corporate or individual loss.
Hacking
Refers to
Involves
Used to
Phases of Hacking
Intelligent individuals with excellent computer skills with the
ability to create and explore into the computer’s software &
hardware.
For some hackers hacking is a hobby to see how many
computers or network they can compromise.
Their intension is either be to gain knowledge or to poke around
to do illegal things.
Some do hacking with malicious intent behind their escapades
like stealing business data, card info, social security numbers,
email credentials etc.
Hacker
Types of Hackers
■ Whitehat Hacker
■ Greyhat Hacker
■ Blackhat Hacker
■ Sucidial Hacker
■ Hobbist
■ Hactivist
■ Script Kiddies
Types of Hacker
Types of Hacker
Ethical Hacking
Why Ethical Hacking is necessary?
To Beat a Hacker you have to think like one!
■ Ethical Hacking is necessary as it allows to counter attacks from malicious hackers by
anticipating methods used by them to break into a system.
■ To provide adequate protection, update & patch to a information system.
■ Restrict unauthorized person from gaining access & manipulating access phases.
■ Maintain the information security measures in compliance to industry and legal
standards.
Scope and Limitations of Ethical Hacking
Scopes
■ Ethical Hacking is a crucial
component of risk assessment,
auditing, counter fraud and
information systems security best
practices.
■ It is used to identify risks and
highlight the remedial actions and
also reduces information and
communication technology (ICT)
costs by resolving these
vulnerabilities.
Limitations
■ However unless the business first
know what is at that they are looking
for and why they are hiring an
outside vendor to hack systems in
the first place, chances are there
would not be much gain from the
experience.
■ An ethical hacker thus can only help
the organization to better
understand their security system but
it is up to the organization to place
the right guards on the network.
Why Organizations recruit Ethical Hackers?
 To prevent hackers from gaining access to organization’s information system.
 To uncover vulnerabilities in systems & explore their potential at risk.
 To analyze & strengthen an organization’s security posture including policies, network
protection infrastructure & end-user practices.
Skills of an Ethical Hacker
PenetrationTesting
Phases of PenetrationTesting
Pre- Attack
Phase
• Planning &
preparation
• Methodology
Design
• Network
information
gaining
Attack Phase
• Penetrating
parameter
• Acquiring target
• Escalating
privileges
• Execution,
implementation &
retracting
Post-Attack
Phase
• Reporting
• Clean-up tracks
• Artifacts
destruction
At the end of the Day
■ EssentialTerminologies
– HackValue
– Zero-Day Attack
– Vulnerability
– Daisy Chain
– Exploit
– Doxing
– Payload
– Bot
– Pen-Testing

Ethical hacking (Hackingmantra)

  • 1.
  • 2.
    Remember This! This Programteaches you 100% Network OffensiveTraining and not Defensive.
  • 3.
    BeforeYou Start ■ LabEnvironment VMWARE should be installed with following machines – Windows 10 – Windows 7 – Android – Windows server 2012 – Kali Linux – Ubuntu Check Network Connectivity with ping command between all machines
  • 4.
    Computer System ■ CharlesBabbage was considered to be the father of computer. ■ Ada Lovelace was the mother of Computer.
  • 5.
  • 6.
    Windows System ■ Software ■Shell ■ Kernel ■ hardware ■ i/o devices
  • 7.
  • 8.
    Hidden Securities ofWindowsSystem ■ Registry ■ PowerShell ■ Safe mode ■ Services ■ Processes ■ Cmd
  • 9.
  • 10.
  • 11.
    Comparison between Linux&Windows file system
  • 12.
  • 13.
  • 14.
  • 15.
    Motivation Objectiv e Method Vulnerabilit y Attacks InformationTheft  Manipulating Data  Taking Revenge  Damaging Reputation  Disrupting Business continuity  Creating Fear & Chaos
  • 16.
    Exploiting system vulnerabilitiesand compromising security controls to gain unauthorized access to the system resources. Modifying system or application features to achieve a goal outside of the creator’s original purpose. Steal, pilfer & redistribute intellectual property leading to corporate or individual loss. Hacking Refers to Involves Used to
  • 17.
  • 18.
    Intelligent individuals withexcellent computer skills with the ability to create and explore into the computer’s software & hardware. For some hackers hacking is a hobby to see how many computers or network they can compromise. Their intension is either be to gain knowledge or to poke around to do illegal things. Some do hacking with malicious intent behind their escapades like stealing business data, card info, social security numbers, email credentials etc. Hacker
  • 19.
    Types of Hackers ■Whitehat Hacker ■ Greyhat Hacker ■ Blackhat Hacker ■ Sucidial Hacker ■ Hobbist ■ Hactivist ■ Script Kiddies
  • 20.
  • 21.
  • 22.
  • 23.
    Why Ethical Hackingis necessary? To Beat a Hacker you have to think like one! ■ Ethical Hacking is necessary as it allows to counter attacks from malicious hackers by anticipating methods used by them to break into a system. ■ To provide adequate protection, update & patch to a information system. ■ Restrict unauthorized person from gaining access & manipulating access phases. ■ Maintain the information security measures in compliance to industry and legal standards.
  • 24.
    Scope and Limitationsof Ethical Hacking Scopes ■ Ethical Hacking is a crucial component of risk assessment, auditing, counter fraud and information systems security best practices. ■ It is used to identify risks and highlight the remedial actions and also reduces information and communication technology (ICT) costs by resolving these vulnerabilities. Limitations ■ However unless the business first know what is at that they are looking for and why they are hiring an outside vendor to hack systems in the first place, chances are there would not be much gain from the experience. ■ An ethical hacker thus can only help the organization to better understand their security system but it is up to the organization to place the right guards on the network.
  • 25.
    Why Organizations recruitEthical Hackers?  To prevent hackers from gaining access to organization’s information system.  To uncover vulnerabilities in systems & explore their potential at risk.  To analyze & strengthen an organization’s security posture including policies, network protection infrastructure & end-user practices.
  • 26.
    Skills of anEthical Hacker
  • 27.
  • 28.
    Phases of PenetrationTesting Pre-Attack Phase • Planning & preparation • Methodology Design • Network information gaining Attack Phase • Penetrating parameter • Acquiring target • Escalating privileges • Execution, implementation & retracting Post-Attack Phase • Reporting • Clean-up tracks • Artifacts destruction
  • 29.
    At the endof the Day ■ EssentialTerminologies – HackValue – Zero-Day Attack – Vulnerability – Daisy Chain – Exploit – Doxing – Payload – Bot – Pen-Testing