SlideShare a Scribd company logo
1 of 28
CONTENT
 INTRODUCTION        METHODOLOGY

 HISTORY             REPORTING

 TYPES OF HACKERS    CONCLUSION

 ETHICAL HACKING     ADVANTAGES AND
                       DISADVANTAGES
 HACKING
                      CONCLUSION
 ETHICAL HACKING
  COMMANDMENTS        REFERENCE
INTRODUCTION

 Ethical hacking also known as penetration testing
  or White-hat hacking, involves the same tools,
  tricks and techniques that hackers use, but with
  one major difference that ethical hacking is legal.

 Ethical hacking can also ensure that vendors
  claims about the security of their products
  legitimate.
SECURITY
 Security is the condition of being protect against
  danger or loss. In the general sense, security is a
  concept similar to safety.
 Information security means protecting information
  and information systems from unauthorized access,
  use, disclosure, disruption, modification or destruc-
  tion.

                    Need for security
  There may be several forms of damages which are obviously
  interrelated which are produced by the intruders.
HISTORY HIGHLIGHTS

 In one early ethical hack, the United States Air Force
  conducted a “security evaluation” of the Multiuse
  operating systems for “potential use as a two-level
  (secret/top secret) systems.”


 Most notable of these was the work by Farmer and
  Venom, which was originally posted to Usenet in
  December of 1993.
HACKING

 Eric Raymond, compiler of “The New Hacker’s Dictionary”,
  defines a hacker as a clever programmer.


 A “Good hack” is a clever solution to a programming
  problem and “hacking” is the act of doing it.
TYPE OF HACKERS

 Black-Hat Hackers



 White-Hat Hackers



 Grey-Hat Hackers
ETHICAL HACKING

 A methodology adopted by ethical hackers to discover
  the vulnerabilities existing in information systems
  operating environments.

 With the growth of the internet, computer security has
  become a Major concern for businesses and govern-
  ments.

 Evaluate the intruder threat to their interests would be
  to have independent computer security professionals
  attempt to break into their computer systems.
What does an Ethical Hacker do ?

 An ethical hacker is a person doing ethical
  hacking that is he is a security personal who
  tries to penetrate in to a network to find if
  there is some vulnerability in the system. An
  ethical hacker will always have the permission
  to enter into the target network.

 If he succeed in penetrating into the system
  then he will report to the company with a
  detailed report about the particular vulnerab-
  ility exploiting which he got in to the system.
Required Skills of an Ethical Hacker :


 Microsoft :
 Linux :
 Firewalls :
 Routers :
 Network Protocols :
 Project Management :
ETHICAL HACKING COMMANDMENTS


 Working ethically


 Respecting privacy



 Not crashing your systems:
METHODOLOGY OF HACKING

Reconnaissance

Scanning & Enumeration

Gaining access

 Maintaining access

Clearing tracks
 Reconnaissance:
  This literal meaning of the Word reconnaissance means a
  preliminary survey to gain the information . This is also known as
  foot-printing. As given in the analogy, this is the stage in which the
  hacker collects information about the company which the personal
  is going to hack. This is one of the pre-attacking phases.


 Scanning:
   The hacker tries to make a blue print of the target network. The
  blue print includes the IP addresses of the target network which
  are live, the services which are running on those systems and so
  on Modern port scanning uses TCP protocol to do scanning and
  they could even detect the operating systems running on the
  particular hosts.
Enumeration:
Enumeration is the ability of a hacker to convince some servers to
give them information that is vital to them to make an attack. By
doing this the hacker aims to find what resources and shares can
be found in the system, what valid user account and user groups
are there in the network, what applications will be there etc.

Gaining access
This is the actual hacking phase in which the hacker gains access
to the system. The hacker will make use of all the information he
collected in the pre-attacking phases. Usually the main hindrance
to gaining access to a system is the passwords. In the System
hacking first the hacker will try to get in to the system.
 Password Cracking:
 There are many methods for cracking the password and then
 get in to the system. The simplest method is to guess the
 password. But this is a tedious work. But in order to make this
 work easier there are many automated tools for password
 guessing like legion.


 Privilege escalation
 Privilege escalation is the process of raising the privileges once
 the hacker gets in to the system The privilege escalation
 process usually uses the vulnerabilities present in the host
 operating system or the software. There are many tools like
 hk.exe, metasploit etc. One such community of hackers is the
 metasploit
 Maintaining Access:
  Now the hacker is inside the system . This means that he is now
  in a position to upload some files and download some of them.
  The next aim will be to make an easier path to get in when he
  comes the next time. This is analogous to making a small hidden
  door in the building so that he can directly enter in to the
  building through the door easily
 Clearing Tracks:
   Whenever a hacker downloads some file or installs some
   software, its log will be stored in the server logs. So in order to
   erase the hacker uses man tools. One such tool is windows
   resource kit’s auditpol.exe. Another tool which eliminates any
   physical evidence is the evidence eliminator.. The Evidence
   Eliminator deletes all such evidences.
Ethical hacking tools:


Ethical hackers utilize and have developed variety of tools
intrude into different kinds of systems and to evaluate the
security levels. The nature of these tools differs widely.
Samspade:

Samspade is a simple tool which provides us
information about a particular host. This tool is
very much helpful in finding the addresses, phone
number etc
Email Tracker and Visual Route:


 Email tracker is a software which help us to find from
which server the mail does actually came from. Every
message we receive will have a header associated with
It . The email tracker uses this header information for find
location.

Visual route is a tool which displays the location a
particular server with the help of IP addresses. When we
connect this with the email tracker we can find the
server which actually sends the mail .
Advantages and disadvantages:
Ethical hacking nowadays is a backbone of network
security .Each day its relevance is increasing ,the
major pros & cons of ethical hacking

 Advantages
  “To catch a thief you have to think like a thief”
  Help in closing the open holes in the network
  Provides security to banking and financial
   establishments
  Prevents website defacements
  An evolving technique
Disadvantages
 All depend upon the trustworthiness of the
 ethical hacker

 Hiring professionals is expensive
Future enhancements:

 As it an evolving branch the scope of
enhancement in technology is       immense. No
ethical hacker can ensure the system security by
using the same technique repeatedly. He would
He would have to improve , develop and explore
new avenues repeatedly.

 More enhanced software’s should be used for
optimum protection . Tools used , need to be
updated regularly and more efficient ones need to
be developed
Conclusion
One of the main aim of the seminar is to make
others understand that there are so many tools
through which a hacker can get into a system. Its
various perspectives.

Student
  A student should understand that no software is
made with zero Vulnerability. So while they are
studying they should study the various possibilities
and should study how to prevent that because they
are the professionals of tomorrow
Professionals
    Professionals should understand that business is
directly related to security. So they should make
new software with vulnerabilities as less as
possible. if they are not aware of these then they
won’t be cautions enough in security matters

 In the preceding sections we saw the
methodology of hacking, why should we aware of
hacking and tools and some tools which a hacker
may use . Now we can see what we can do against
hacking or to protect ourselves from hacking .

 the first thing is we should keep ourselves
updated about those          software's us and using
for official and reliable sources .
Educate employees and the users against black
hacking.

Use every possible security measures

 Every time make our password strong by making it
harder and longer to be cracked.
REFERENCE

 www.scribd.com

 www.wikipedia/seminartopics/ethical haching.org

 www. Seminarsonly/ethical hacking.com
Ethical Hacking

More Related Content

What's hot

Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
System hacking
System hackingSystem hacking
System hackingCAS
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 

What's hot (20)

Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
System hacking
System hackingSystem hacking
System hacking
 
Malicious
MaliciousMalicious
Malicious
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ethical Hacking Tools
Ethical Hacking ToolsEthical Hacking Tools
Ethical Hacking Tools
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Introduction IDS
Introduction IDSIntroduction IDS
Introduction IDS
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Hacking
Hacking Hacking
Hacking
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Ransomware: Wannacry
Ransomware: WannacryRansomware: Wannacry
Ransomware: Wannacry
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 

Similar to Ethical Hacking

Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxAnshumaanTiwari2
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipurcyber cure
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGNathan Mathis
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptshreya_omar
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf722820106121SARANS
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullahpongada123
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 

Similar to Ethical Hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullah
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 

More from Nitheesh Adithyan (6)

HTML
HTMLHTML
HTML
 
CSS
CSSCSS
CSS
 
Google fiber
Google fiberGoogle fiber
Google fiber
 
Google fiber front page
Google fiber   front pageGoogle fiber   front page
Google fiber front page
 
Google fiber
Google fiberGoogle fiber
Google fiber
 
Ethical hacking front page
Ethical hacking   front pageEthical hacking   front page
Ethical hacking front page
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Ethical Hacking

  • 1.
  • 2.
  • 3. CONTENT  INTRODUCTION  METHODOLOGY  HISTORY  REPORTING  TYPES OF HACKERS  CONCLUSION  ETHICAL HACKING  ADVANTAGES AND DISADVANTAGES  HACKING  CONCLUSION  ETHICAL HACKING COMMANDMENTS  REFERENCE
  • 4. INTRODUCTION  Ethical hacking also known as penetration testing or White-hat hacking, involves the same tools, tricks and techniques that hackers use, but with one major difference that ethical hacking is legal.  Ethical hacking can also ensure that vendors claims about the security of their products legitimate.
  • 5. SECURITY  Security is the condition of being protect against danger or loss. In the general sense, security is a concept similar to safety.  Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruc- tion. Need for security There may be several forms of damages which are obviously interrelated which are produced by the intruders.
  • 6. HISTORY HIGHLIGHTS  In one early ethical hack, the United States Air Force conducted a “security evaluation” of the Multiuse operating systems for “potential use as a two-level (secret/top secret) systems.”  Most notable of these was the work by Farmer and Venom, which was originally posted to Usenet in December of 1993.
  • 7. HACKING  Eric Raymond, compiler of “The New Hacker’s Dictionary”, defines a hacker as a clever programmer.  A “Good hack” is a clever solution to a programming problem and “hacking” is the act of doing it.
  • 8. TYPE OF HACKERS  Black-Hat Hackers  White-Hat Hackers  Grey-Hat Hackers
  • 9. ETHICAL HACKING  A methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems operating environments.  With the growth of the internet, computer security has become a Major concern for businesses and govern- ments.  Evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
  • 10. What does an Ethical Hacker do ?  An ethical hacker is a person doing ethical hacking that is he is a security personal who tries to penetrate in to a network to find if there is some vulnerability in the system. An ethical hacker will always have the permission to enter into the target network.  If he succeed in penetrating into the system then he will report to the company with a detailed report about the particular vulnerab- ility exploiting which he got in to the system.
  • 11. Required Skills of an Ethical Hacker :  Microsoft :  Linux :  Firewalls :  Routers :  Network Protocols :  Project Management :
  • 12. ETHICAL HACKING COMMANDMENTS  Working ethically  Respecting privacy  Not crashing your systems:
  • 13. METHODOLOGY OF HACKING Reconnaissance Scanning & Enumeration Gaining access  Maintaining access Clearing tracks
  • 14.  Reconnaissance: This literal meaning of the Word reconnaissance means a preliminary survey to gain the information . This is also known as foot-printing. As given in the analogy, this is the stage in which the hacker collects information about the company which the personal is going to hack. This is one of the pre-attacking phases.  Scanning: The hacker tries to make a blue print of the target network. The blue print includes the IP addresses of the target network which are live, the services which are running on those systems and so on Modern port scanning uses TCP protocol to do scanning and they could even detect the operating systems running on the particular hosts.
  • 15. Enumeration: Enumeration is the ability of a hacker to convince some servers to give them information that is vital to them to make an attack. By doing this the hacker aims to find what resources and shares can be found in the system, what valid user account and user groups are there in the network, what applications will be there etc. Gaining access This is the actual hacking phase in which the hacker gains access to the system. The hacker will make use of all the information he collected in the pre-attacking phases. Usually the main hindrance to gaining access to a system is the passwords. In the System hacking first the hacker will try to get in to the system.
  • 16.  Password Cracking: There are many methods for cracking the password and then get in to the system. The simplest method is to guess the password. But this is a tedious work. But in order to make this work easier there are many automated tools for password guessing like legion.  Privilege escalation Privilege escalation is the process of raising the privileges once the hacker gets in to the system The privilege escalation process usually uses the vulnerabilities present in the host operating system or the software. There are many tools like hk.exe, metasploit etc. One such community of hackers is the metasploit
  • 17.  Maintaining Access: Now the hacker is inside the system . This means that he is now in a position to upload some files and download some of them. The next aim will be to make an easier path to get in when he comes the next time. This is analogous to making a small hidden door in the building so that he can directly enter in to the building through the door easily  Clearing Tracks: Whenever a hacker downloads some file or installs some software, its log will be stored in the server logs. So in order to erase the hacker uses man tools. One such tool is windows resource kit’s auditpol.exe. Another tool which eliminates any physical evidence is the evidence eliminator.. The Evidence Eliminator deletes all such evidences.
  • 18. Ethical hacking tools: Ethical hackers utilize and have developed variety of tools intrude into different kinds of systems and to evaluate the security levels. The nature of these tools differs widely.
  • 19. Samspade: Samspade is a simple tool which provides us information about a particular host. This tool is very much helpful in finding the addresses, phone number etc
  • 20. Email Tracker and Visual Route:  Email tracker is a software which help us to find from which server the mail does actually came from. Every message we receive will have a header associated with It . The email tracker uses this header information for find location. Visual route is a tool which displays the location a particular server with the help of IP addresses. When we connect this with the email tracker we can find the server which actually sends the mail .
  • 21. Advantages and disadvantages: Ethical hacking nowadays is a backbone of network security .Each day its relevance is increasing ,the major pros & cons of ethical hacking Advantages  “To catch a thief you have to think like a thief”  Help in closing the open holes in the network  Provides security to banking and financial establishments  Prevents website defacements  An evolving technique
  • 22. Disadvantages  All depend upon the trustworthiness of the ethical hacker  Hiring professionals is expensive
  • 23. Future enhancements:  As it an evolving branch the scope of enhancement in technology is immense. No ethical hacker can ensure the system security by using the same technique repeatedly. He would He would have to improve , develop and explore new avenues repeatedly.  More enhanced software’s should be used for optimum protection . Tools used , need to be updated regularly and more efficient ones need to be developed
  • 24. Conclusion One of the main aim of the seminar is to make others understand that there are so many tools through which a hacker can get into a system. Its various perspectives. Student A student should understand that no software is made with zero Vulnerability. So while they are studying they should study the various possibilities and should study how to prevent that because they are the professionals of tomorrow
  • 25. Professionals Professionals should understand that business is directly related to security. So they should make new software with vulnerabilities as less as possible. if they are not aware of these then they won’t be cautions enough in security matters  In the preceding sections we saw the methodology of hacking, why should we aware of hacking and tools and some tools which a hacker may use . Now we can see what we can do against hacking or to protect ourselves from hacking .  the first thing is we should keep ourselves updated about those software's us and using for official and reliable sources .
  • 26. Educate employees and the users against black hacking. Use every possible security measures  Every time make our password strong by making it harder and longer to be cracked.
  • 27. REFERENCE  www.scribd.com  www.wikipedia/seminartopics/ethical haching.org  www. Seminarsonly/ethical hacking.com