SlideShare a Scribd company logo
Ethical Hacking
 Pratheeba Murugesan
HACKER
AENDA
♦ What is Ethical Hacking?
♦ Who are ethical hackers?
♦ Every Website-A Target
♦ Get out of jail free card
♦ Kinds of Testing
♦ Final Report
Ethical Hacking
♦ Independent computer security
  Professionals breaking into the
  computer systems.
♦ Neither damage the target
  systems nor steal information.
♦ Evaluate target systems security
  and report back to owners about
  the vulnerabilities found.
Ethical Hackers but not Criminal
Hackers
♦ Completely trustworthy.
♦ Strong programming and computer
  networking skills.
♦ Learn about the system and trying to
  find its weaknesses.
♦ Techniques of Criminal hackers-
  Detection-Prevention.
♦ Published research papers or released
  security software.
♦ No Ex-hackers.
Being Prepared
♦ What can an intruder see on the target systems?
♦ What can an intruder do with that information?
♦ Does anyone at the target notice the intruder's
  attempts or successes?



1. What are you trying to protect?
2. Who are you trying to protect against?
3. How much time, effort, and money are you willing to
  expend to obtain adequate protection?
Get out of Jail free card
♦ Security evaluation plan
        1. Identify system to be tested
        2. How to test?
        3. Limitations on that testing

♦ Evaluation done under a “no-holds-
  barred” approach.
♦ Clients should be aware of risks.
♦ Limit prior knowledge of test.
Kinds of Testing
♦   Remote Network
♦   Remote dial-up network
♦   Local network
♦   Stolen laptop computer
♦   Social engineering
♦   Physical entry

1.Total outsider
2.Semi-outsider
3.Valid user
Final Report
♦ Collection of all discoveries made during
  evaluation.
♦ Specific advice on how to close the
  vulnerabilities.
♦ Testers techniques never revealed.
♦ Delivered directly to an officer of the client
  organization in hard-copy form.
♦ Steps to be followed by clients in future.
Suggestions?

More Related Content

What's hot

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Nitheesh Adithyan
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
 
Penetration testing
Penetration testing Penetration testing
Penetration testing
PTC
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Raghav Bisht
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
Jayanth Vinay
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
SHAHID ANSARI
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
Sahil Rai
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Altacit Global
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
eiti panchkula
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Viraj Kansara
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
Ravi Sankar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manas Das
 
Hackers
HackersHackers
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
MissStevenson1
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nandan Kushwaha
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Simplilearn
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
AmanUllah115928
 

What's hot (19)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Penetration testing
Penetration testing Penetration testing
Penetration testing
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hackers
HackersHackers
Hackers
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 

Similar to Ethical hacking ppt_presentation_way2project_in

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
shinigami-99
 
Ethical hacking
Ethical hackingEthical hacking
Ethical Hacking&Contermeasures
Ethical Hacking&ContermeasuresEthical Hacking&Contermeasures
Ethical Hacking&Contermeasures
arvind34
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Shubham Garg
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
amrutharam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Being Uniq Sonu
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
Pankaj Dubey
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
Jay Nagar
 
Ethical Hacking, Introduction
Ethical Hacking, IntroductionEthical Hacking, Introduction
Ethical Hacking, Introduction
Rahul Nath
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
daxgame
 
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]
SiddheshPowar
 
What is penetration testing and career path
What is penetration testing and career pathWhat is penetration testing and career path
What is penetration testing and career path
Vikram Khanna
 
Ethical hacking presentation.pptx
Ethical hacking presentation.pptxEthical hacking presentation.pptx
Ethical hacking presentation.pptx
vineetrajput7902
 
Lesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPSLesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPS
MLG College of Learning, Inc
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
Cookie Tuazon
 
External Penetration Testing What You Need to Know.pdf
External Penetration Testing What You Need to Know.pdfExternal Penetration Testing What You Need to Know.pdf
External Penetration Testing What You Need to Know.pdf
Teceze Ltd
 
Network Penetration Testing Service
Network Penetration Testing ServiceNetwork Penetration Testing Service
Network Penetration Testing Service
Sense Learner Technologies Pvt Ltd
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider Threats
Lancope, Inc.
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 

Similar to Ethical hacking ppt_presentation_way2project_in (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking&Contermeasures
Ethical Hacking&ContermeasuresEthical Hacking&Contermeasures
Ethical Hacking&Contermeasures
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
 
Ethical Hacking, Introduction
Ethical Hacking, IntroductionEthical Hacking, Introduction
Ethical Hacking, Introduction
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]
 
What is penetration testing and career path
What is penetration testing and career pathWhat is penetration testing and career path
What is penetration testing and career path
 
Ethical hacking presentation.pptx
Ethical hacking presentation.pptxEthical hacking presentation.pptx
Ethical hacking presentation.pptx
 
Lesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPSLesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPS
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
External Penetration Testing What You Need to Know.pdf
External Penetration Testing What You Need to Know.pdfExternal Penetration Testing What You Need to Know.pdf
External Penetration Testing What You Need to Know.pdf
 
Network Penetration Testing Service
Network Penetration Testing ServiceNetwork Penetration Testing Service
Network Penetration Testing Service
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider Threats
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 

Ethical hacking ppt_presentation_way2project_in

  • 3. AENDA ♦ What is Ethical Hacking? ♦ Who are ethical hackers? ♦ Every Website-A Target ♦ Get out of jail free card ♦ Kinds of Testing ♦ Final Report
  • 4. Ethical Hacking ♦ Independent computer security Professionals breaking into the computer systems. ♦ Neither damage the target systems nor steal information. ♦ Evaluate target systems security and report back to owners about the vulnerabilities found.
  • 5. Ethical Hackers but not Criminal Hackers ♦ Completely trustworthy. ♦ Strong programming and computer networking skills. ♦ Learn about the system and trying to find its weaknesses. ♦ Techniques of Criminal hackers- Detection-Prevention. ♦ Published research papers or released security software. ♦ No Ex-hackers.
  • 6. Being Prepared ♦ What can an intruder see on the target systems? ♦ What can an intruder do with that information? ♦ Does anyone at the target notice the intruder's attempts or successes? 1. What are you trying to protect? 2. Who are you trying to protect against? 3. How much time, effort, and money are you willing to expend to obtain adequate protection?
  • 7. Get out of Jail free card ♦ Security evaluation plan 1. Identify system to be tested 2. How to test? 3. Limitations on that testing ♦ Evaluation done under a “no-holds- barred” approach. ♦ Clients should be aware of risks. ♦ Limit prior knowledge of test.
  • 8. Kinds of Testing ♦ Remote Network ♦ Remote dial-up network ♦ Local network ♦ Stolen laptop computer ♦ Social engineering ♦ Physical entry 1.Total outsider 2.Semi-outsider 3.Valid user
  • 9. Final Report ♦ Collection of all discoveries made during evaluation. ♦ Specific advice on how to close the vulnerabilities. ♦ Testers techniques never revealed. ♦ Delivered directly to an officer of the client organization in hard-copy form. ♦ Steps to be followed by clients in future.