SlideShare a Scribd company logo
1 of 25
CYBER
බදාදා පිටුව DigitalX දැවැන්ත Cyber
පෙරළිපේ ප්‍රථම දිගහැරුම
PLANFORTHEDAY
PURPOSE
Why we need a
Security Testing
and Ethical Hacking
initiative?
CYBER
ATTACKS
‘Hacking’, is it
wrong?
ETHICAL
HACKING
Why a s/w company
need ethical hackers
and how it happens
TODAY’S
SPECIAL
PURPOSE
Let’s forget our day to day
boring shit and will try
something new. Hacking is
fun as long as it is ethical.
01
If you want to learn something which grow your interest day by
day then it will be none other than Ethical Hacking.
Possible Outcomes
● Career benefits as an engineer who knows information security.
● Prevention is better than cure.
● High demand for an ethical hacker.
● Easy way to increase your salary.
● Become an Asset for a company.
● It is fun !!!
● Security testing skills.
● Help you to be a really good programmer who aware of security
threats.
OVERVIEW
WHOA!Hacking is what made your
computer the way as it is
today.
CYBER ATTACKS
Will start from the history
because its changed the history
02
● Began in the 1961 at MIT, origin of the term “hacker”, when students
hacked their high-tech train sets in order to modify their functions
● In the 1970s hacked telephone systems to make free long distance
calls.
● In 1980s hackers started to spoil networks for personal benefits.
Used it to criminal activities, including pirating software, creating
viruses and breaking into systems to steal sensitive information.
● In 1990s hackers become headache to the world.No of cyber
crimes were increased.first computer worm is introduced and
leading the first digital bank heist.
● In 2000s Microsoft, eBay, Yahoo! and Amazon were taken down in
massive DOS attacks.Department of Defense and International
Space Station had its systems breached.
● Today hacking change the world. Simply we use free windows
licenses thanks to the hackers.
HISTORY
cyber attack is an attack launched from one or
more computers against another computer,
multiple computers or networks.
There can be 2 goals of this.
1. Disable the target computer or knock it offline
or
2. Get access to the target computer's data
WHATISCYBERATTACK?
WannaCry
To prevent such attacks
Cyber Security is
implemented.
Cyber Security helps to
protect Network,
Programs, Computer
systems and their
components from
unauthorized digital
attacks.
CYBERSECURITY
Hacking can be used as an
illegal weapon to steal
anything on the
cyberspace. This can
destroy a business within
few seconds by accessing
unauthorized information
ITHURTS….
HACKERISAPERSONWHO
TRIESTOHACKINTOA
COMPUTERSYSTEM
Black Hat
Individual who illegally hacks
into a system for personal
benefits.
White Hat
an Ethical Hacker is an
individual who discovers
vulnerabilities in a computer
network
Grey Hat
A blend of both black and
white hat hackers
—ANONYMOUS HACKER
“It’s impossible.” said Pride.
“It’s Risky.” said
Experience.
“It’s Pointless.” said
Reason.
If you really are Hacker !
Then Give it a Try!
ETHICAL HACKING Protect data by discovering
vulnerabilities in a system
03
Multiple entry points
are there to let in and
out. But you want to
allow the people who
you know to enter your
house.
SUPPOSEYOUBUILTYOUR
OWNHOUSE!!!
Hacking is not
always bad
● Ethical hackers prevent malicious hackers from
breaching an organization's network
● Ethical hackers look for system vulnerabilities
that others may exploit
● Ethical hackers analyze and enhance an
organization’s security policies
● They help protect customer data
WHATISETHICAL
HACKING?
MAYBEYOUNEEDTODIVIDE
YOURTEXT
PENETRATION
TESTING
Identifies security vulnerabilities,
flaws risks, and unreliable
environments
VULNERABILITY
ASSESSMENT
Vulnerability scanning will locate
individual
vulnerabilities
ETHICALHACKINGVS
PENETRATIONTESTING
ETHICAL
HACKING
The goal of ethical hacking is
still to identify vulnerabilities
and fix them before they can
be exploited by criminals,
but the approach is much
wider in scope than pen
testing
PENETRATION
TESTING
Represents one subset of
all ethical hacking.
Ex:- Software companies
perform penetration testing
by forming a Security
specialized testers.
SKILLS LINUX (KAALI)
There are lot of
supporting tools for
Ethical hacking
PROGRAMMING
Python/JS/BASH/Sc
ripting (Basics)
TOOLS
Metasploit, Burp
Suite, Nessus, NMap
NETWORKING
OSI Model,
Protocols
HACKING
METHODOLOGIES
Footprinting,
Scanning, System
hacking
OPERATING
SYSTEMS
Windows, Linux,
Unix
TODAY’S SPECIAL Let's do a penetration testing
example !
04
ප්‍රශ්න තියනවනම් දැන්
අහන්න
ස්තූතියි !

More Related Content

What's hot

BSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security MonitoringBSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security Monitoringchrissanders88
 
Honeypots for Active Defense
Honeypots for Active DefenseHoneypots for Active Defense
Honeypots for Active DefenseGreg Foss
 
Cross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital SovereigntyCross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital SovereigntySaumil Shah
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Badgujar
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network SecurityKirubaburi R
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar reportInder NeGi
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and securityAhmad El Tawil
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNorth Texas Chapter of the ISSA
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNorth Texas Chapter of the ISSA
 
2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoring2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoringchrissanders88
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awarenessRishab garg
 

What's hot (20)

BSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security MonitoringBSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security Monitoring
 
Honeypots for Active Defense
Honeypots for Active DefenseHoneypots for Active Defense
Honeypots for Active Defense
 
Cross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital SovereigntyCross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital Sovereignty
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Honeypot
HoneypotHoneypot
Honeypot
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and security
 
Honeypot
HoneypotHoneypot
Honeypot
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
 
Hacking
HackingHacking
Hacking
 
Honey Pot
Honey PotHoney Pot
Honey Pot
 
NTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic FailuresNTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic Failures
 
2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoring2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoring
 
NTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-VirusNTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-Virus
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Hacking final
Hacking finalHacking final
Hacking final
 

Similar to Security and ethical hacking initiative first session

Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speechtalhaabid
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: HackingQhaiyum Shah
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basicsMeenesh Jain
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfTakshila Learning
 
How To Become an Ethical Hacker?
How To Become an Ethical Hacker?How To Become an Ethical Hacker?
How To Become an Ethical Hacker?Srashti Jain
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingANKIT KUMAR
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingANKIT KUMAR
 

Similar to Security and ethical hacking initiative first session (20)

Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
ethics final project
ethics final projectethics final project
ethics final project
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Persentation
PersentationPersentation
Persentation
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How To Become an Ethical Hacker?
How To Become an Ethical Hacker?How To Become an Ethical Hacker?
How To Become an Ethical Hacker?
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 

Recently uploaded

Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 

Recently uploaded (20)

Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 

Security and ethical hacking initiative first session

  • 1. CYBER බදාදා පිටුව DigitalX දැවැන්ත Cyber පෙරළිපේ ප්‍රථම දිගහැරුම
  • 2. PLANFORTHEDAY PURPOSE Why we need a Security Testing and Ethical Hacking initiative? CYBER ATTACKS ‘Hacking’, is it wrong? ETHICAL HACKING Why a s/w company need ethical hackers and how it happens TODAY’S SPECIAL
  • 3. PURPOSE Let’s forget our day to day boring shit and will try something new. Hacking is fun as long as it is ethical. 01
  • 4. If you want to learn something which grow your interest day by day then it will be none other than Ethical Hacking. Possible Outcomes ● Career benefits as an engineer who knows information security. ● Prevention is better than cure. ● High demand for an ethical hacker. ● Easy way to increase your salary. ● Become an Asset for a company. ● It is fun !!! ● Security testing skills. ● Help you to be a really good programmer who aware of security threats. OVERVIEW
  • 5. WHOA!Hacking is what made your computer the way as it is today.
  • 6. CYBER ATTACKS Will start from the history because its changed the history 02
  • 7. ● Began in the 1961 at MIT, origin of the term “hacker”, when students hacked their high-tech train sets in order to modify their functions ● In the 1970s hacked telephone systems to make free long distance calls. ● In 1980s hackers started to spoil networks for personal benefits. Used it to criminal activities, including pirating software, creating viruses and breaking into systems to steal sensitive information. ● In 1990s hackers become headache to the world.No of cyber crimes were increased.first computer worm is introduced and leading the first digital bank heist. ● In 2000s Microsoft, eBay, Yahoo! and Amazon were taken down in massive DOS attacks.Department of Defense and International Space Station had its systems breached. ● Today hacking change the world. Simply we use free windows licenses thanks to the hackers. HISTORY
  • 8. cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. There can be 2 goals of this. 1. Disable the target computer or knock it offline or 2. Get access to the target computer's data WHATISCYBERATTACK?
  • 10. To prevent such attacks Cyber Security is implemented. Cyber Security helps to protect Network, Programs, Computer systems and their components from unauthorized digital attacks. CYBERSECURITY
  • 11. Hacking can be used as an illegal weapon to steal anything on the cyberspace. This can destroy a business within few seconds by accessing unauthorized information ITHURTS….
  • 12. HACKERISAPERSONWHO TRIESTOHACKINTOA COMPUTERSYSTEM Black Hat Individual who illegally hacks into a system for personal benefits. White Hat an Ethical Hacker is an individual who discovers vulnerabilities in a computer network Grey Hat A blend of both black and white hat hackers
  • 13. —ANONYMOUS HACKER “It’s impossible.” said Pride. “It’s Risky.” said Experience. “It’s Pointless.” said Reason. If you really are Hacker ! Then Give it a Try!
  • 14. ETHICAL HACKING Protect data by discovering vulnerabilities in a system 03
  • 15. Multiple entry points are there to let in and out. But you want to allow the people who you know to enter your house. SUPPOSEYOUBUILTYOUR OWNHOUSE!!!
  • 16.
  • 17.
  • 19. ● Ethical hackers prevent malicious hackers from breaching an organization's network ● Ethical hackers look for system vulnerabilities that others may exploit ● Ethical hackers analyze and enhance an organization’s security policies ● They help protect customer data WHATISETHICAL HACKING?
  • 20. MAYBEYOUNEEDTODIVIDE YOURTEXT PENETRATION TESTING Identifies security vulnerabilities, flaws risks, and unreliable environments VULNERABILITY ASSESSMENT Vulnerability scanning will locate individual vulnerabilities
  • 21.
  • 22. ETHICALHACKINGVS PENETRATIONTESTING ETHICAL HACKING The goal of ethical hacking is still to identify vulnerabilities and fix them before they can be exploited by criminals, but the approach is much wider in scope than pen testing PENETRATION TESTING Represents one subset of all ethical hacking. Ex:- Software companies perform penetration testing by forming a Security specialized testers.
  • 23. SKILLS LINUX (KAALI) There are lot of supporting tools for Ethical hacking PROGRAMMING Python/JS/BASH/Sc ripting (Basics) TOOLS Metasploit, Burp Suite, Nessus, NMap NETWORKING OSI Model, Protocols HACKING METHODOLOGIES Footprinting, Scanning, System hacking OPERATING SYSTEMS Windows, Linux, Unix
  • 24. TODAY’S SPECIAL Let's do a penetration testing example ! 04

Editor's Notes

  1. Its like “Dam Rajina”
  2. MIT Student and early hackers only interested in exploring, improving and testing the limits of existing programs.
  3. Ransomware — Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment WannaCry attacked on May of 2017 started in Asia and spread across the world. 230,000 computers were infected. Target audience was a Microsoft windows users who didn't update the latest security update in March 2017. Encrypted files in Windows networked machines and demanded $300-600 bitcoins payment to decrypt them.(Unlock files) Affected companies:- Bank of China, Nissan, Hitachi, Fedex. Put there business on hold for days. There systems were affected.
  4. Hackers are not always wrong. Different modes are there. Black hat - they are the hackers we see in movies and the ones we are frightened about. They steal money, information through networks White hat - they defend organizations and governments. Grey hat - They may have hidden agendas. Discovers vulnerabilities in a system and report to the system owner. Its a good act But do this without owners approval and ask money for their findings.
  5. Normally i hate theories but will use few examples to make everyone in to the same page.
  6. You want to check the what are the possibilities to breaking in to the house/ security weaknesses in entry and exits. Call expert of house security He come and check all the security measures Also he will try to breaking to the house with all possible ways At the end he will create a report with all the security weaknesses in house and will give security recommendations (Ex:- security alarms, Security guard, CCTV Camera, Close the open areas)
  7. “Shahan” runs an online trading company with money and his customers Everything is going well and now he is rich One day hacker called “Heshi” decided to hack the company servers “Heshi” steal the credentials of trading accounts She asked for $ (ransom) to exchange for the stolen credentials. Black hacker “Shahan” took the “Heshi’s” words lightly and didn't pay a single penny.so “Heshi” got angry (Girls noh). So “Heshi” using credentials withdrew money from various customer accounts Then “Shahan” liable to pay back to customers. “Shahan” lost lot of money and trust from Customers Also “periya nangi” baba left him :( since he is lost.
  8. After this incident “Shahan” thought a lot about what went wrong (Talked with vajira before his own retro) He understood something is wrong about the security infrastructure of his company. He wishes if someone is there who could have run test attacks to see how vulnerable his systems were before a hacker enters to the network. So he wanted employee who thinks like a hacker and identify vulnerabilities before an outsider does. To do this job “Shahan” hired a ethical hacker “Sajith”. “Sajith” spotted lot of vulnerabilities in Shahan organization. And closed all the loopholes. Hiring ethical hacker helped “Shahan” prevent from security attacks in future. Then slowly “Shahan’s” company productivity increased. “Shahan’s” company damaged reputation came back. “Periya nangi baba” came back. Thanks to Ethical hacker “Sajith”, “Shahan” is a happy man again.
  9. Vulnerability scanning will locate individual vulnerabilities. penetration testing will actually attempt to verify that these vulnerabilities are exploitable within the target environment. (Identify system is vulnerable for SQL injections, Cross site scripting etc..)
  10. Reconnaissance - Gathers all the information about organization and systems he wanted to attack.Use tools (NMap, Hping) Scanning phase - Now try to stop vulnerabilities using NMap, nexpose tools Gaining access - Now she located the vulnerabilities. Now try to exploit them (Hack it and access the system private data). install an application needs or modify data or hide data. Maintaining access - After find a way to go through organizations network now. If Gayara asked to retain access to the system again without whole process she create a backdoor access.For that she install backdoors(using protocol, proxy or end-to-end connection strategies) in the target system.(Tool:- Metaspolit tool) Clearing tracks - Clear the all evidence of ethical attacks as no attacker likes to get caught.This involves modifying/corrupting/deleting the values of Logs, modifying registry values and uninstalling all applications he used and deleting all folders he created. Reporting - creates a summary report that consists of the vulnerabilities spotted, the tools used to attack, and the success rate of the operation.
  11. Ethical hacking vs Penetration testing “Ethical hacking” scope matters. This has a scope of an infrastructure which might be a combination of systems and networks. Lot of hackings use to asses the entire infrastructure. Meanwhile “Penetration testing” asses security issues in specific systems/scopes. “Ethical hacker” need a broad knowledge about the field as well as need a valid security test certification. knowledge and skills in the specific area enough for a “Penetration tester. “Ethical hacker” required the access of entire system infrastructure to hack it but “Penetration tester” Access is required only to systems on which the pen testing will be conducted.
  12. First will find how hackers can access our system. Then let's see how they access important information in our system. Example:- My friend use Lucky 1 system u