SlideShare a Scribd company logo
Introduction 
to 
Ethical Hacking 
BY: TEAM CEH
O verview 
1.Introduction 
2.Types of Hackers 
3.Purpose Of Hacking 
4.Hacking Methodology 
5.Hacking Techniques 
6.How to get rid of? 
7.References
What is Hacking ? 
 Hacking is the art of finding solutions to real 
life problems. 
 The word “ Hack “ is not directly related to 
computers.
Hacking and Computers 
 The concept of hacking entered the computer 
culture at the MIT University in the 1960s. 
 There are two kinds of students 
1. Tools 
2. Hackers
1. Tools 
 A ``tool'' is someone who attends class in the 
college regularly 
 is always to be found in the library when no 
class is meeting, 
 Always Try to get Excellent grades in the 
examination. 
 Sole Aim: get placed in high paying Company
2. Hacker 
 A ``hacker'' is the opposite: someone who 
never goes to class, 
 who in fact sleeps all day, 
 and who spends the night pursuing 
recreational activities rather than studying 
text books. 
What does this have to do with computers? 
Originally, nothing.
Hackers vs Tools 
 There are standards for success as a hacker, 
just as grades form a standard for success as a 
tool. 
 Overall Hackers are more successful in life 
and they emerge as a leader in their field.
Types Of Hackers
1.White Hat Hacker 
2.Grey Hat Hacker 
3.Black Hat Hacker
White Hat Hackers - 
They use their knowledge and skill set for good, 
constructive intents. They find out new security loopholes 
and their solutions. 
A white hat that does VAPT is also known as Pentester.
Black Hat Hacker- 
They use their knowledge and skill set for illegal activities, 
destructive intents, without authorization. 
Black hat hackers are also referred to as the "crackers" within 
the security industry and by modern programmers. Crackers 
keep the awareness of the vulnerabilities to themselves and 
do not notify the general public or the manufacturer for 
patches to be applied.
Grey Hat Hacker- 
They exhibits traits from both white hats & black hats. 
Like a white hat, he'll inform the administrator of the 
website of the vulnerabilities, he found after hacking 
through the site. 
Like a black hat, he’ll hack any site freely and without any 
authorization from owners whatsoever. 
He'll even offer to repair the vulnerable site, that he exposed .
Purpose Of Hacking 
#To make security stronger ( Ethical Hacking ) 
#Just for fun 
#Show off 
#Hack other systems secretly & Steal important 
information
Hacking Methodology
Reconnaissance 
Also called as Information Gathering. 
To gain vital information about target. 
Where an attacker seeks to gather as much information as 
possible about a target. 
Whatever methods (Art of Googling, Social Engineering) are 
used to perform reconnaissance, hackers will usually collect 
a large amount of information which may be useful during 
their attacks.
S Scanning 
Attackers use a method called scanning before they attack a network. 
Scanning can be considered a logical extension (and overlap) of active 
reconnaissance since the attacker uses details gathered during 
reconnaissance to identify specific vulnerabilities. Often attackers use 
automated tools such as network/host scanners and war dialers to 
locate systems and attempt to discover vulnerabilities. 
Every machine using TCP/IP has 65,535 ports 
Each port like a doorway to a system 
Different programs use different ports (80, 25, 21,22 etc)
Gaining Access 
Vulnerabilities exposed during the reconnaissance and 
scanning phase are now exploited to gain access. 
The hacker can gain access at operating system level, 
application level or network level. 
The hacker has control and can use that system as they 
wish.
Maintaining Access 
In this procedure the Hacker Gains more access. 
He break into more sensitive administrator root accounts. 
Install Trojan horse program or backdoors to maintain his 
access and to gather additional information.
Covering Tracks 
This is the last & final stage where a hacker deletes all 
logs showing his malicious behavior. 
So, They don’t get caught. 
1.Clearing the event log 
2.Evidence Elimination 
3.Hiding
Hacking Techniques 
Low Tech Methods 
High Tech Methods
Low Tech Methods 
Social Engineering 
•Hacker takes advantage of trusting human being to get 
information from them 
•eg a ploy to install new security update on your system 
Shoulder Surfing 
Guessing 
•weak password like death of birth, pet name, nick name etc..
High Tech Methods 
Phishing 
Brute Force Attacks 
Sniffing 
LFI(Local File Inclusion) 
Metasploit 
Dos Attack 
SQL Injection
Hacking Tools 
Password Cracking : AirCrack, Cain and Able , THC 
Hydra 
Network Scanning : Nmap, AngryIPScanner , 
Wireshark 
System Hacking : Lost Door, Olllydgb , Keylogger 
Exploitation : Metasploit , Sqlmap , Social Engineering 
Toolkit
Hacking Operating Systems 
BackTrack 
Kali Linux 
BugTraq 
BackBox
How to get rid of? 
• Keep system softwares up to date 
• Avoid Downloading/Installing unknown programs 
• Use Internet Security 
• Keep firewall ON 
• Use strong passwords(uppercase , lowercase letters with 
numbers & special symbols) 
•Avoid storing important data in system like bank account 
information, any important documents etc..
Reference 
www.google.com/ 
http://sectools.org/ 
Wikipedia 
http://thehackernews.com/
ANY QUESTIONS?
THANK YOU !

More Related Content

What's hot

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
Yash Shukla
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
SHAHID ANSARI
 
hacking
hackinghacking
hacking
mayank1293
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Hacking
HackingHacking

What's hot (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
hacking
hackinghacking
hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Hacking
HackingHacking
Hacking
 

Similar to Introduction To Ethical Hacking

Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
Akashy Kale
 
Hacking
HackingHacking
Hacking
HackingHacking
Hacking
Yhannah
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Sourabh Goyal
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
 
hacking basics
hacking basicshacking basics
hacking basics
dharmesh ram
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
dharmesh ram
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
vinsys2
 
Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
ShahrabanAbdullah2
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
Bilal Hameed
 
Hacking
HackingHacking
Hacking
Paidi Dinesh
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
Subhoneel Datta
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
Divyank Jindal
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 

Similar to Introduction To Ethical Hacking (20)

Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
 
Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 

Recently uploaded

Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 

Recently uploaded (20)

Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 

Introduction To Ethical Hacking

  • 1. Introduction to Ethical Hacking BY: TEAM CEH
  • 2. O verview 1.Introduction 2.Types of Hackers 3.Purpose Of Hacking 4.Hacking Methodology 5.Hacking Techniques 6.How to get rid of? 7.References
  • 3. What is Hacking ?  Hacking is the art of finding solutions to real life problems.  The word “ Hack “ is not directly related to computers.
  • 4. Hacking and Computers  The concept of hacking entered the computer culture at the MIT University in the 1960s.  There are two kinds of students 1. Tools 2. Hackers
  • 5. 1. Tools  A ``tool'' is someone who attends class in the college regularly  is always to be found in the library when no class is meeting,  Always Try to get Excellent grades in the examination.  Sole Aim: get placed in high paying Company
  • 6. 2. Hacker  A ``hacker'' is the opposite: someone who never goes to class,  who in fact sleeps all day,  and who spends the night pursuing recreational activities rather than studying text books. What does this have to do with computers? Originally, nothing.
  • 7. Hackers vs Tools  There are standards for success as a hacker, just as grades form a standard for success as a tool.  Overall Hackers are more successful in life and they emerge as a leader in their field.
  • 9. 1.White Hat Hacker 2.Grey Hat Hacker 3.Black Hat Hacker
  • 10. White Hat Hackers - They use their knowledge and skill set for good, constructive intents. They find out new security loopholes and their solutions. A white hat that does VAPT is also known as Pentester.
  • 11. Black Hat Hacker- They use their knowledge and skill set for illegal activities, destructive intents, without authorization. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers. Crackers keep the awareness of the vulnerabilities to themselves and do not notify the general public or the manufacturer for patches to be applied.
  • 12. Grey Hat Hacker- They exhibits traits from both white hats & black hats. Like a white hat, he'll inform the administrator of the website of the vulnerabilities, he found after hacking through the site. Like a black hat, he’ll hack any site freely and without any authorization from owners whatsoever. He'll even offer to repair the vulnerable site, that he exposed .
  • 13. Purpose Of Hacking #To make security stronger ( Ethical Hacking ) #Just for fun #Show off #Hack other systems secretly & Steal important information
  • 15. Reconnaissance Also called as Information Gathering. To gain vital information about target. Where an attacker seeks to gather as much information as possible about a target. Whatever methods (Art of Googling, Social Engineering) are used to perform reconnaissance, hackers will usually collect a large amount of information which may be useful during their attacks.
  • 16. S Scanning Attackers use a method called scanning before they attack a network. Scanning can be considered a logical extension (and overlap) of active reconnaissance since the attacker uses details gathered during reconnaissance to identify specific vulnerabilities. Often attackers use automated tools such as network/host scanners and war dialers to locate systems and attempt to discover vulnerabilities. Every machine using TCP/IP has 65,535 ports Each port like a doorway to a system Different programs use different ports (80, 25, 21,22 etc)
  • 17. Gaining Access Vulnerabilities exposed during the reconnaissance and scanning phase are now exploited to gain access. The hacker can gain access at operating system level, application level or network level. The hacker has control and can use that system as they wish.
  • 18. Maintaining Access In this procedure the Hacker Gains more access. He break into more sensitive administrator root accounts. Install Trojan horse program or backdoors to maintain his access and to gather additional information.
  • 19. Covering Tracks This is the last & final stage where a hacker deletes all logs showing his malicious behavior. So, They don’t get caught. 1.Clearing the event log 2.Evidence Elimination 3.Hiding
  • 20. Hacking Techniques Low Tech Methods High Tech Methods
  • 21. Low Tech Methods Social Engineering •Hacker takes advantage of trusting human being to get information from them •eg a ploy to install new security update on your system Shoulder Surfing Guessing •weak password like death of birth, pet name, nick name etc..
  • 22. High Tech Methods Phishing Brute Force Attacks Sniffing LFI(Local File Inclusion) Metasploit Dos Attack SQL Injection
  • 23. Hacking Tools Password Cracking : AirCrack, Cain and Able , THC Hydra Network Scanning : Nmap, AngryIPScanner , Wireshark System Hacking : Lost Door, Olllydgb , Keylogger Exploitation : Metasploit , Sqlmap , Social Engineering Toolkit
  • 24. Hacking Operating Systems BackTrack Kali Linux BugTraq BackBox
  • 25. How to get rid of? • Keep system softwares up to date • Avoid Downloading/Installing unknown programs • Use Internet Security • Keep firewall ON • Use strong passwords(uppercase , lowercase letters with numbers & special symbols) •Avoid storing important data in system like bank account information, any important documents etc..
  • 26. Reference www.google.com/ http://sectools.org/ Wikipedia http://thehackernews.com/