Ethical hacking


Published on

it contains all the data a person needs for ethical hacking

Published in: Education
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Ethical hacking

  1. 1. Isas project
  2. 2. Ethical Hacking Megha shah Merlyn Pooja Singh
  3. 3. AGENDA <ul><li>What is Ethical Hacking? </li></ul><ul><li>Who are ethical hackers? </li></ul><ul><li>History of hacking </li></ul><ul><li>Types of hackers </li></ul><ul><li>Ways to hack a system </li></ul><ul><li>Preventing hacking </li></ul><ul><li>Skills of an ethical hacker </li></ul>
  4. 4. Ethical Hacking <ul><li>Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, adminstrator,or designer. </li></ul><ul><li>The greatest risk I.T. faces is security. </li></ul><ul><li>Hacking refers practice of breaking into systems. </li></ul>
  5. 5. Who is hacker? <ul><li>. Hackers  intelligent computer professionals learned and acquired knowledge of advanced operating techniques. </li></ul><ul><li>Try to gain knowledge in depth of systems /networks. </li></ul><ul><li>Hackers do not always intend to damage data. </li></ul><ul><li>They may share their knowledge with others. </li></ul>
  6. 6. History of hacking <ul><li>The term “hack” was first used by US university staff in mid-1960s . </li></ul><ul><li>When eBay was first attacked in February 2000 its server was bombarded with fake request for web pages & overloaded the site. </li></ul><ul><li>A group of teenagers once hacked into AOL and stole credit cards to buy video games. </li></ul><ul><li>In 1986, after many more break-ins congress passed “computer fraud and abuse act”. </li></ul>
  7. 7. History of hacking <ul><li>In 1989,german hackers arrested for breaking into US computer ; sold the information to Soviet KGB. </li></ul><ul><li>In 1998, teenager hacks into bell Atlantic phone system; disabled communication at airports disables runway lights. </li></ul><ul><li>In 2000, viruses named “I OVE YOU” & “LOVE BUG” damaged roughly up to 10 billions of computers. </li></ul>
  8. 8. Types of hackers <ul><li>Depending on the nature & activities hackers are categorized into different groups : </li></ul><ul><li>White hat : use their skills & knowledge for good purpose .Help in finding new security vulnerabilities and applications. </li></ul><ul><li>Black hat : engage in their activities with bad intention and perform illegal activities such as defacing websites and destroying data. </li></ul><ul><li>Grey hat : do not categorize their work as good or bad. </li></ul>
  9. 9. Ways To Hack a System <ul><li>VIRUSES & WORMS - they are self-replicating programs or codes fragments. </li></ul><ul><li>They attach themselves to other programs (viruses) or machines (worms). </li></ul><ul><li>They shut networks by flooding them. </li></ul><ul><li>ROUGE ACCESS POINT- they are unsecured wireless access point that outsiders can easily breech. </li></ul><ul><li>Are most often connected by well-meaning but ignorant employees. </li></ul>
  10. 10. Ways To Hack a System <ul><li>BACK DOORS- they are loop holes in any system. </li></ul><ul><li>With the aid of computerized searchers (bots) , hackers can probably find any weakness in network. </li></ul><ul><li>TROJAN HORSES- they enter system by attaching themselves to other programs </li></ul><ul><li>When Trojans are activated , this hacked software kicks off viruses in the system. </li></ul>
  11. 11. Ways To Hack a System <ul><li>Denial Of Services- this attacks gives hackers a way to bring down the network without internal access. </li></ul><ul><li>It floods the access router with bogus traffic </li></ul><ul><li>(i.e. e-mail or TCP ,packets). </li></ul><ul><li>Phreaks- they use computer to break into telecommunications network. </li></ul><ul><li>Script kiddies- they have inadequate technical information & use available information to break into system. </li></ul>
  12. 12. Preventing Hacking <ul><li>Anti-virus: the most popular method of protection among personal computers. </li></ul><ul><li>Mc Corp.- provides antivirus software that scans hard drive’s for infected files. </li></ul><ul><li>Norton Internet Security- Norton anti virus 2008 secures system from Trojans. </li></ul><ul><li>Firewalls: used for computer networks & users using continuous online connections. </li></ul>
  13. 13. Preventing Hacking <ul><li>Other software options- other options are used to protect larger networks systems. </li></ul><ul><li>IDS- Intrusion Detection System is considered one of best protection method </li></ul><ul><li>Content Filtering Software- advanced antivirus software that reads compressed files .Allows IT mangers get filtering to block threatening e-mail. </li></ul><ul><li>Sand Boxing- helps to read malicious codes. </li></ul>
  14. 14. Skills of an ethical hacker <ul><li>Routers- knowledge of routers, routing protocols and access control lists. </li></ul><ul><li>Microsoft- skills in operation , configuration and management. </li></ul><ul><li>Linux- knowledge of Linux/Unix; security setting, configuration, and services. </li></ul><ul><li>Firewalls- configuration, & operation of intrusion detection systems. </li></ul>
  15. 15. Skills of an ethical hacker <ul><li>Network protocols- TCP/IP ; how they function and can be manipulated. </li></ul><ul><li>Project management- knowledge of leading, planning, organizing, and controlling a penetration tests systems. </li></ul>