SlideShare a Scribd company logo
1 of 35
ETHICAL HACKING
A BRIEF OVERVIEW
 Hacking –Introduction
 Hacker -Communities
 Types of Hackers
 Hacking Phases
 Types Of Attacks
 Ethical Hacking
 Conclusion- Need Of Security
What is Hacking?
•Hacking is an art. The Art of exploring various
security breaches is termed as Hacking.
•But people believe that it’s an anti-society
activity and all the hackers are bad people.
•The terms Hacker and Hacking are being
misinterpreted and misunderstood with
negative sidelines.
Communities of Hackers
•Hackers
•Crackers
•Phreaks
•Script Kiddies
Hackers
Hackers are the Intelligent Computer Professionals.
Motive/Intentions:-
•To gain in-depth knowledge of a system, what’s
happening at the backend, behind the screen.
•To find possible security vulnerabilities in a system.
•They create security awareness by sharing
knowledge. It’s a team work.
Types Of Hackers
•White Hat Hackers
•Black Hat Hacker
•Grey Hat Hackers
Crackers
Crackers are those who break into the applications with some
malicious intentions.
Motive/Intentions:-
•To seek unauthorized access into a system and cause damage.
•To compromise the system to deny services to legitimate users for
troubling, harassing them or for taking revenge.
•Effects : It can cause financial losses.
Phreaks
Phreaks are those people who use computer devices and software
to break into phone networks.
Motive/Intention:-
•To find loopholes in security in phone network and to make phone
calls at free of cost!!!
•Effects : You may get a spoofed call or a big amount of bill.
Script Kiddies
Script Kiddies are those people who lack technical knowledge to
perform the various types of attacks but somehow they manage
to get it done with the help of search engines.
Motive/Intention:-
•They use the available information about known vulnerabilities to
break into the remote systems.
•It’s an act performed for a fun or out of curiosity.
PHASES
Hacking Phases
1 • Reconnaissance
2 • Scanning
3 • Gaining Access
4 • Maintaining Access
5 • Clearing Tracks
Information Gathering --
dnsenum
Types Of Attacks
Identity
Spoofin
g
Data
Modification
DoS
Attac
k
Password
Cracking
Man-in-
the-
Middle
Attack
Backdoor
Attack
Applica
tion
Layer
Attack
Ethical Hacking
What Do Ethical Hackers
Do?
Ethical Hackers try to answer the following
questions:
What can the intruder
see on the target
system?
(Reconnaissance and
Scanning phases)
What can an intruder
do with that
information?
(Gaining Access and
Maintaining Access
phases)
Does anyone on the
target notice the
intruders’ attempts or
successes?
(Reconnaissance and
Covering Tracks
phases)
• Ethical Hackers are hired by Organizations to attack their
information system and networks in order to discover
vulnerabilities and verify that security measures functioning
correctly
• Their duties may include testing systems and networks for
Platform Knowledge
Has in depth of knowledge of
target platforms , such as
windows and Linux
Network Knowledge
Has exemplary knowledge of
networking and related
hardware and software
Security Knowledge
Has knowledge of security
areas and related issues
Technical Knowledge
Has high technical
knowledge to launch
sophisticated attack
Skills of an Ethical
Hacker
Need of Security
•Increasing awareness of technology but not
Security.
•Continuous Development & Competition in IT.
•Increasing use of Complex computer
infrastructure.
•Increasing use of Network elements &
applications.
Need of Security
Need of Security(Cont.)
•Any Security breach in the website of any
person increases the risk of the public image.
•Any Security breach in the website of any
company increases the risk of the company
reputation.
•Any Security breach in the any government
website may increase the risk on project
management and government operations.
Choice is Yours…
References
www.lucideus.com
www.eccouncil.org
www.techdefence.com
Presented By..
 Avishek Nandi
 Nirmalya Basu
 Saurav Saha
 Shahnawaz Sarkar
 Subhashree Pal
Ethical_Hacking

More Related Content

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
About hackers
About hackersAbout hackers
About hackers
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 

Viewers also liked

Ethical hacking
Ethical hackingEthical hacking
Ethical hackingdjkhatri
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKINGNAWAZ KHAN
 
Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IPAshish Chandurkar
 
Ethical Hacking JtR Presentation
Ethical Hacking JtR PresentationEthical Hacking JtR Presentation
Ethical Hacking JtR PresentationGerasimos Zapantis
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 

Viewers also liked (11)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IP
 
Ethical Hacking JtR Presentation
Ethical Hacking JtR PresentationEthical Hacking JtR Presentation
Ethical Hacking JtR Presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 

Similar to Ethical_Hacking

ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptxdaxgame
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Theko Moima
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paperBilal Hameed
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationJay Nagar
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.pptShivaniSingha1
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakaleAakash Takale
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking OverviewSubhoneel Datta
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 

Similar to Ethical_Hacking (20)

ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 

Ethical_Hacking

  • 2. A BRIEF OVERVIEW  Hacking –Introduction  Hacker -Communities  Types of Hackers  Hacking Phases  Types Of Attacks  Ethical Hacking  Conclusion- Need Of Security
  • 3. What is Hacking? •Hacking is an art. The Art of exploring various security breaches is termed as Hacking. •But people believe that it’s an anti-society activity and all the hackers are bad people. •The terms Hacker and Hacking are being misinterpreted and misunderstood with negative sidelines.
  • 5.
  • 6. Hackers Hackers are the Intelligent Computer Professionals. Motive/Intentions:- •To gain in-depth knowledge of a system, what’s happening at the backend, behind the screen. •To find possible security vulnerabilities in a system. •They create security awareness by sharing knowledge. It’s a team work.
  • 7. Types Of Hackers •White Hat Hackers •Black Hat Hacker •Grey Hat Hackers
  • 8. Crackers Crackers are those who break into the applications with some malicious intentions. Motive/Intentions:- •To seek unauthorized access into a system and cause damage. •To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge. •Effects : It can cause financial losses.
  • 9. Phreaks Phreaks are those people who use computer devices and software to break into phone networks. Motive/Intention:- •To find loopholes in security in phone network and to make phone calls at free of cost!!! •Effects : You may get a spoofed call or a big amount of bill.
  • 10. Script Kiddies Script Kiddies are those people who lack technical knowledge to perform the various types of attacks but somehow they manage to get it done with the help of search engines. Motive/Intention:- •They use the available information about known vulnerabilities to break into the remote systems. •It’s an act performed for a fun or out of curiosity.
  • 12. Hacking Phases 1 • Reconnaissance 2 • Scanning 3 • Gaining Access 4 • Maintaining Access 5 • Clearing Tracks
  • 13.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 21.
  • 22.
  • 23.
  • 25.
  • 26. What Do Ethical Hackers Do? Ethical Hackers try to answer the following questions: What can the intruder see on the target system? (Reconnaissance and Scanning phases) What can an intruder do with that information? (Gaining Access and Maintaining Access phases) Does anyone on the target notice the intruders’ attempts or successes? (Reconnaissance and Covering Tracks phases) • Ethical Hackers are hired by Organizations to attack their information system and networks in order to discover vulnerabilities and verify that security measures functioning correctly • Their duties may include testing systems and networks for
  • 27. Platform Knowledge Has in depth of knowledge of target platforms , such as windows and Linux Network Knowledge Has exemplary knowledge of networking and related hardware and software Security Knowledge Has knowledge of security areas and related issues Technical Knowledge Has high technical knowledge to launch sophisticated attack Skills of an Ethical Hacker
  • 28.
  • 29. Need of Security •Increasing awareness of technology but not Security. •Continuous Development & Competition in IT. •Increasing use of Complex computer infrastructure. •Increasing use of Network elements & applications.
  • 31. Need of Security(Cont.) •Any Security breach in the website of any person increases the risk of the public image. •Any Security breach in the website of any company increases the risk of the company reputation. •Any Security breach in the any government website may increase the risk on project management and government operations.
  • 34. Presented By..  Avishek Nandi  Nirmalya Basu  Saurav Saha  Shahnawaz Sarkar  Subhashree Pal