This document provides an overview of ethical hacking. It defines hacking and different types of hackers such as white hat, black hat, and grey hat hackers. It also discusses the phases of hacking attacks and types of attacks like DoS attacks, password cracking, and man-in-the-middle attacks. Ethical hackers are hired by organizations to test their security systems and find vulnerabilities. They need to have in-depth knowledge of platforms, networking, security issues, and technical skills to perform sophisticated attacks. With increasing technology use, there is a greater need for security to protect companies, governments, and individuals from security breaches.
2. A BRIEF OVERVIEW
Hacking –Introduction
Hacker -Communities
Types of Hackers
Hacking Phases
Types Of Attacks
Ethical Hacking
Conclusion- Need Of Security
3. What is Hacking?
•Hacking is an art. The Art of exploring various
security breaches is termed as Hacking.
•But people believe that it’s an anti-society
activity and all the hackers are bad people.
•The terms Hacker and Hacking are being
misinterpreted and misunderstood with
negative sidelines.
6. Hackers
Hackers are the Intelligent Computer Professionals.
Motive/Intentions:-
•To gain in-depth knowledge of a system, what’s
happening at the backend, behind the screen.
•To find possible security vulnerabilities in a system.
•They create security awareness by sharing
knowledge. It’s a team work.
8. Crackers
Crackers are those who break into the applications with some
malicious intentions.
Motive/Intentions:-
•To seek unauthorized access into a system and cause damage.
•To compromise the system to deny services to legitimate users for
troubling, harassing them or for taking revenge.
•Effects : It can cause financial losses.
9. Phreaks
Phreaks are those people who use computer devices and software
to break into phone networks.
Motive/Intention:-
•To find loopholes in security in phone network and to make phone
calls at free of cost!!!
•Effects : You may get a spoofed call or a big amount of bill.
10. Script Kiddies
Script Kiddies are those people who lack technical knowledge to
perform the various types of attacks but somehow they manage
to get it done with the help of search engines.
Motive/Intention:-
•They use the available information about known vulnerabilities to
break into the remote systems.
•It’s an act performed for a fun or out of curiosity.
26. What Do Ethical Hackers
Do?
Ethical Hackers try to answer the following
questions:
What can the intruder
see on the target
system?
(Reconnaissance and
Scanning phases)
What can an intruder
do with that
information?
(Gaining Access and
Maintaining Access
phases)
Does anyone on the
target notice the
intruders’ attempts or
successes?
(Reconnaissance and
Covering Tracks
phases)
• Ethical Hackers are hired by Organizations to attack their
information system and networks in order to discover
vulnerabilities and verify that security measures functioning
correctly
• Their duties may include testing systems and networks for
27. Platform Knowledge
Has in depth of knowledge of
target platforms , such as
windows and Linux
Network Knowledge
Has exemplary knowledge of
networking and related
hardware and software
Security Knowledge
Has knowledge of security
areas and related issues
Technical Knowledge
Has high technical
knowledge to launch
sophisticated attack
Skills of an Ethical
Hacker
28.
29. Need of Security
•Increasing awareness of technology but not
Security.
•Continuous Development & Competition in IT.
•Increasing use of Complex computer
infrastructure.
•Increasing use of Network elements &
applications.
31. Need of Security(Cont.)
•Any Security breach in the website of any
person increases the risk of the public image.
•Any Security breach in the website of any
company increases the risk of the company
reputation.
•Any Security breach in the any government
website may increase the risk on project
management and government operations.