1. TERM PAPER
ON
ETHICAL HACKING
PRESENTED BY :
PRUDHVI RAJ
IT-1
13501A1249
2.
3. WHAT IS HACKING ?
• Hacking is the intentional unauthorized access to
computer systems
– Illegal activities from harmless pranks to huge
thefts and
– shutdowns of services
• Traditionally hacking refers to the hobby/profession of
working with computers.
• But now a days it refers to breaking into computer
systems.
4.
5. HISTORY OF HACKING
• The first hacker was appeared in 1960’s at the Massachusetts
Institute of Technology(MIT) .
• During the 1970’s , a different kind of hacker appeared : Phone
Phreaker or Phone Hacker.
• In the 1980’s, phreaks started to migrate to computers
and the first Bulletin Board System(BBS) appeared.
• During the 1990’s, when the use of internet wide spread around the
world, hackers multipiled.
7. What is ethical hacking
• BASIC MEANING :
In simple words Ethical Hacking is testing the resources for a good cause and for the
betterment of technology. It also means to secure the system.
• TECHNICAL MEANING :
Technically Ethical Hacking is done by a computer hacker who is hired by an
organization to undertake non malicious hacking work in order to discover computer-security
flaws.
WHO ARE ETHICAL HACKERS???
• Completely trustworthy.
• Strong programming and computer
networking skills.
• Technique of criminal hackers-
Detection-Prevention.
• Ethical hackers possess same skills ,
mind set and tools of a hacker but
the attacks are done in a non
destructive manner.
8. Hacking Process
Footprinting
Scanning
Enumeration
Escalating
Privilege, Covering
Tracks and
Creating
Backdoors
Attack and
Gaining
Access
9. TYPES OF HACKING
->Website hacking. ->Email hacking.
->Network hacking. ->Password hacking.
->online transactions hacking. ->Computer hacking.
->Mobile hacking. ->PDA hacking.
->Metropolitan system hacking.
WHY DO HACKERS HACK?
• Just for fun.
• Hack other systems secretly.
• Notify many people their thought.
• Steal important information.
• Destroy enemy’s computer network
during the war
10.
11. CONSEQUENCES OF
ILLEGAL HACKING
• Thousands of dollars in fines.
• Imprisonment.
• Seizure of your computer.
14. Black hats
•Very dangerous persons.
•Always have motive to earn huge profits.
•Highly paid persons.
•Evolves themselves mostly in criminal
activities.
•These could be CODERS & ADMINS.
•As well as SCRIPT KIDDIES.
15. White hats
•These are good hackers.
•Have genuine license to hack.
•Have registered police records.
•Evolves themselves in good works.
•Generally owned by companies for
security designing.
•Have high pay scales.
•Generally these are CODERS.
16. GREY HATS
•Also known as RED HATS.
•Perform both tasks fair and unfair.
•Generally these are ADMINS.
•Have little high pay than white hats.
•Generally not so dangerous but some
times it could be.
17. Advantages
These are good hackers
Have genuine license to hack
Have registered police records
20. WHAT TO DO AFTER
BEING HACKED?
• Shut down the system.
• Clear the memory using cleaners (like C Cleaner).
• Scan infected sections with good antivirus.
• Separate the system from network (do not use
internet)
• Restore the system with the back up. (if o/s
problem)
• Finally , connect the system to the network.
21. HOW CAN BE A REAL HACKER
• Study C/C++/Assembly language.
• Study computer architecture.
• Study operating system.
• Study computer network.
• Examine the hacking tools for a month.
• Think the problem of a computer.
SECURITY & COUNTER MEASURES:
• Use of Antivirus.
• Proper logout after proper
use of mail id.
• Manual opening browser.
• Don’t open spam.
• Password protected admin
account.
22. Did you know ?
• Social networking sites like
‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of
60% of direct or indirect hacking incidents.
• The average age group of hackers are aged
between 14-24 yrs. …
23. Job of each hacker:
• The White Hat Approach:
This is a more deterministic plan
of attack than the Black Box
one.
C
y
b
e
r
c
ri
m
e
IN THE WORLD..
24. WORLD FAMOUS HACKERS
Stephen wozniac Tsutomu shimomura
Kevin mitnick Kevin poulsen
25.
26.
27. HOW TO PREVENT HACKERS
Change your password everymonth
Install a firewall on your computer
Purchase or download antivirus
software
Install antispyware program onto your
computer
28. CONCLUSION
From a practical standpoint the security
problem will remain as long as manufacturers
remain committed to current system.
Regular auditing, vigilant intrusion detection,
good system administration practice and
computer security awareness are all essential
parts of an organization’s security efforts.