SlideShare a Scribd company logo
1 of 30
BASICS
OF
ETHICAL HACKING
By Vamshi TG
1. Refers to the of
working with computers
into computer systems
.
2
3
In the year 1990 in the US a hacker named KEVIN
POULSEN had hacked all the phone lines in the LA City.
It was announced on the radio station that the
102nd caller who would call in the contest hosted by the
channel would receive a PORSCHE as a gift and Kevin
hacked all the phone lines in the city to secure his
victory.
A bad idea, but what an idea!
4
VLADIMIR LEVIN, a big time hacker of his time,
managed to penetrate banking network of
Citigroup and transferred around $10 million
into his bank accounts in the UK, Germany,
Finland, Holland, Israel and other places in the
year 1995.
It was a daring feat, indeed. He was later
arrested by the Interpol but only after he had
successfully committed the big time forgery.
5
On November 24, 2014, a hacker group which identified itself by the
name "Guardians of Peace" (GOP) leaked a release of confidential
data from the film studio Sony pictures.
The data included personal information about Sony Pictures
employees and their families, e-mails between employees,
information about executive salaries at the company, copies of
then-unreleased Sony films, and other information.
6
7
 Hacking is a casual hobby for some hackers
 Some are obsessive about gaining notoriety or defeating
computer systems, and some have criminal intentions.
 To steal important Information of an organization and to
transmit it to the open internet
 To brag about their skills.
8
Quote about hackers
9
10
It is the process of locating weaknesses and vulnerabilities of
computer and information systems by duplicating the intent and
actions of malicious hackers.
It is also known as
•PENETRATION TESTING
•INTRUSION TESTING
•RED TEAMING
11
12
13
•Individual professing hacker skills and
using them for defensive purposes
• Also known as security analysts
14
•Individuals with extraordinary computing
skills, resorting to malicious or destructive
activities
• Also know as crackers.
15
Individuals who work both offensively and defensively at
various times.
BLACK GRAY WHITE
SUICIDE HACKERS
Individuals who aim to
bring down critical
infrastructure for a
“cause” and are not
worried about facing
jail terms or any other
punishment
SCRIPT KIDDIES
An unskilled who
compromises system
by running scripts,
tools and software
developed by real
hackers.
CYBER TERRORISTS
Individuals with wide
range of skills
motivated by religious
or political beliefs to
create fear by large
scale disruption of
computer networks
16
17
•To prevent hackers from gaining access to information
breaches
•To fight against terrorism and national security breaches
•To build a system that avoids hackers from penetrating
•To test if organization’s security settings are in fact secure
18
• Has in-depth knowledge of major
operating environments , such as
Windows, Unix & Linux
Platform
Knowledge
• Has in-depth knowledge of
Networking Concepts, technologies
and related hardware and software
Network
Knowledge
• Should be a computer expert adept
at technical domains
Computer
Expert
• Has knowledge of security areas and
related issues
Security
Knowledge
1. Is a method of examining the weakness and
vulnerabilities of Computer and Network
Security.
2. It helps to measure the effectiveness of
System Security or ineffectiveness of the
Sytem Security
.
20
What information/locations/systems can an attacker gain access?
What can an attacker see on the target?
What can an attacker do with available information?
Does anyone at the target system notice the attempts?
.
22
By conducting penetration tests, an ethical hacker looks to answer the
following four basic questions :
23
24
Phase-1
• RECONNAISSANCE
Phase-2
• SCANNING
Phase-3
• GAINING ACCESS
Phase-4
• MAINTAINING ACCESS
Phase-5
• COVERING TRACKS
•This is the stage in which the hacker collects information about
the company which the personal is going to hack.
• This is one of the pre-attacking phases.
•Reconnaissance refers to the preparatory phase where an
attacker learns about all of the possible attack vectors that can
be used in their plan.
•It refers to scan for all the open as well as closed ports
•Tries to make a blue print of the target network.
•The blue print includes the ip addresses of the target network
which are live, the services which are running on those system
and so on.
•It can be gained at OS level ,system level or even network
level
•From normal access hacker can even proceed with
privilege escalation
•It often includes password cracking ,DoS attack etc.
It is where the hacker strives to retain its control over
target with backdoors or Trojans
•To avoid being exposed or caught ,a good hacker will
leave no impressions of his presence.
•So he attempts to overwrite the system and application
logs
30
Thank
You

More Related Content

What's hot (20)

Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Workshop Presentation
Ethical Hacking Workshop PresentationEthical Hacking Workshop Presentation
Ethical Hacking Workshop Presentation
 

Similar to The Basics of Ethical Hacking

Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-RAKESH SHARMA
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxBernad Bear
 

Similar to The Basics of Ethical Hacking (20)

Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
hacking
hackinghacking
hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Unit-2 ICS.ppt
Unit-2 ICS.pptUnit-2 ICS.ppt
Unit-2 ICS.ppt
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Hacking
Hacking Hacking
Hacking
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Hacking
HackingHacking
Hacking
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

The Basics of Ethical Hacking

  • 2. 1. Refers to the of working with computers into computer systems . 2
  • 3. 3
  • 4. In the year 1990 in the US a hacker named KEVIN POULSEN had hacked all the phone lines in the LA City. It was announced on the radio station that the 102nd caller who would call in the contest hosted by the channel would receive a PORSCHE as a gift and Kevin hacked all the phone lines in the city to secure his victory. A bad idea, but what an idea! 4
  • 5. VLADIMIR LEVIN, a big time hacker of his time, managed to penetrate banking network of Citigroup and transferred around $10 million into his bank accounts in the UK, Germany, Finland, Holland, Israel and other places in the year 1995. It was a daring feat, indeed. He was later arrested by the Interpol but only after he had successfully committed the big time forgery. 5
  • 6. On November 24, 2014, a hacker group which identified itself by the name "Guardians of Peace" (GOP) leaked a release of confidential data from the film studio Sony pictures. The data included personal information about Sony Pictures employees and their families, e-mails between employees, information about executive salaries at the company, copies of then-unreleased Sony films, and other information. 6
  • 7. 7
  • 8.  Hacking is a casual hobby for some hackers  Some are obsessive about gaining notoriety or defeating computer systems, and some have criminal intentions.  To steal important Information of an organization and to transmit it to the open internet  To brag about their skills. 8
  • 10. 10 It is the process of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. It is also known as •PENETRATION TESTING •INTRUSION TESTING •RED TEAMING
  • 11. 11
  • 12. 12
  • 13. 13 •Individual professing hacker skills and using them for defensive purposes • Also known as security analysts
  • 14. 14 •Individuals with extraordinary computing skills, resorting to malicious or destructive activities • Also know as crackers.
  • 15. 15 Individuals who work both offensively and defensively at various times. BLACK GRAY WHITE
  • 16. SUICIDE HACKERS Individuals who aim to bring down critical infrastructure for a “cause” and are not worried about facing jail terms or any other punishment SCRIPT KIDDIES An unskilled who compromises system by running scripts, tools and software developed by real hackers. CYBER TERRORISTS Individuals with wide range of skills motivated by religious or political beliefs to create fear by large scale disruption of computer networks 16
  • 17. 17 •To prevent hackers from gaining access to information breaches •To fight against terrorism and national security breaches •To build a system that avoids hackers from penetrating •To test if organization’s security settings are in fact secure
  • 18. 18
  • 19. • Has in-depth knowledge of major operating environments , such as Windows, Unix & Linux Platform Knowledge • Has in-depth knowledge of Networking Concepts, technologies and related hardware and software Network Knowledge • Should be a computer expert adept at technical domains Computer Expert • Has knowledge of security areas and related issues Security Knowledge
  • 20. 1. Is a method of examining the weakness and vulnerabilities of Computer and Network Security. 2. It helps to measure the effectiveness of System Security or ineffectiveness of the Sytem Security . 20
  • 21.
  • 22. What information/locations/systems can an attacker gain access? What can an attacker see on the target? What can an attacker do with available information? Does anyone at the target system notice the attempts? . 22 By conducting penetration tests, an ethical hacker looks to answer the following four basic questions :
  • 23. 23
  • 24. 24 Phase-1 • RECONNAISSANCE Phase-2 • SCANNING Phase-3 • GAINING ACCESS Phase-4 • MAINTAINING ACCESS Phase-5 • COVERING TRACKS
  • 25. •This is the stage in which the hacker collects information about the company which the personal is going to hack. • This is one of the pre-attacking phases. •Reconnaissance refers to the preparatory phase where an attacker learns about all of the possible attack vectors that can be used in their plan.
  • 26. •It refers to scan for all the open as well as closed ports •Tries to make a blue print of the target network. •The blue print includes the ip addresses of the target network which are live, the services which are running on those system and so on.
  • 27. •It can be gained at OS level ,system level or even network level •From normal access hacker can even proceed with privilege escalation •It often includes password cracking ,DoS attack etc.
  • 28. It is where the hacker strives to retain its control over target with backdoors or Trojans
  • 29. •To avoid being exposed or caught ,a good hacker will leave no impressions of his presence. •So he attempts to overwrite the system and application logs