SlideShare ist ein Scribd-Unternehmen logo
1 von 15
E t h ic a l
H a c k in g
HACKING
PREHISTORY                          ►   Draper builds a "blue box"
► 1960s: The Dawn of                    used with whistle allows
  Hacking                               phreaks to make free calls.
  Original meaning of the word      ►   Steve Wozniak and Steve
  "hack" started at MIT; meant          Jobs, future founders of
  elegant, witty or inspired way        Apple Computer, make and
  of doing almost anything;             sell blue boxes.
  hacks were programming                THE GOLDEN AGE
  shortcuts                             (1980-1991)
ELDER DAYS (1970-1979)              ►   1980: Hacker Message
► 1970s: Phone Phreaks and              Boards and Groups
  Cap'n Crunch: One phreak,             Hacking groups form; such as
  John Draper (aka "Cap'n               Legion of Doom (US), Chaos
  Crunch"), discovers a toy             Computer Club (Germany).
  whistle inside Cap'n Crunch       ►   1983: Kids' Games
  cereal gives 2600-hertz signal,       Movie "War Games"
  and can access AT&T's long-           introduces public to hacking.
  distance switching system.
THE GREAT HACKER WAR              ►   1989: The Germans ,
► Legion of Doom vs Masters           the KGB and Kevin
  of Deception; online warfare;       Mitnick.
  jamming phone lines.            ►   German Hackers
► 1984: Hacker 'Zines                 arrested for breaking into
  Hacker magazine 2600                U.S. computers; sold
  publication; online 'zine           information to Soviet KGB.
  Phrack.                         ►   Hacker "The Mentor“
CRACKDOWN (1986-1994)                 arrested; publishes
► 1986: Congress passes               Hacker's Manifesto.
  Computer Fraud and Abuse        ►   Kevin Mitnick convicted;
  Act; crime to break into            first person convicted
  computer systems.                   under law against gaining
► 1988: The Morris Worm               access to interstate
                                      network for criminal
  Robert T. Morris, Jr., launches     purposes.
  self-replicating worm on
  ARPAnet.
Ethical Hacking
► Independent   computer security
  Professionals breaking into the
  computer systems.
► Neither damage the target systems
  nor steal information.
► Evaluate target systems security and
  report back to owners about the
  vulnerabilities found.
Ethical Hackers but not Criminal
            Hackers
 ► Completely   trustworthy.
 ► Strong programming and computer
   networking skills.
 ► Learn about the system and trying to
   find its weaknesses.
 ► Techniques of Criminal hackers-
   Detection-Prevention.
 ► Published research papers or released
   security software.
 ► No Ex-hackers.
Being Prepared
►    What can an intruder see on the target systems?
►    What can an intruder do with that information?
►    Does anyone at the target notice the intruder's attempts or
     successes?


6.   What are you trying to protect?
7.   Who are you trying to protect against?
8.   How much time, effort, and money are you willing to
     expend to obtain adequate protection?
Ethical Hacker’s Prospective
►   Ethical Hacker’s demand a lot of time and
    persistence.
►   Security evaluation plan
        1.   Identify system to be tested
        2.   How to test?
        3.   Limitations on that testing
►   Evaluation done under a “no-holds-barred”
    approach.
►   Clients should be aware of risks.
►   Limit prior knowledge of test.
Required Skills of an Ethical
               Hacker
►   Routers: knowledge of routers, routing protocols, and
    access control lists
►   Microsoft: skills in operation, configuration and
    management.
►   Linux: knowledge of Linux/Unix; security setting,
    configuration, and services.
►   Firewalls: configurations, and operation of intrusion
    detection systems.
►   Mainframes
►   Network Protocols: TCP/IP; how they function and can
    be manipulated.
►   Project Management: knowledge of leading, planning,
    organizing, and controlling a penetration testing team.
Kinds of Testing
► Remote   Network
► Remote dial-up network
► Local network
► Stolen laptop computer
► Social engineering
► Physical entry


1.Total outsider
2.Semi-outsider
3.Valid user
REVIEW
Therefore Ethical Hackers and Network
Security experts are highly required as well
as demanded by many organization’s for the
security of their own data, if it fell in the
wrong hands a competitor might use it for
corporate espionage, a hacker might use it
to break into the client’s computers, or a
prankster might just post the report’s
contents on the Web as a joke.
Ethical hacking

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 

Ähnlich wie Ethical hacking

Ähnlich wie Ethical hacking (20)

Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lecture
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Hacking
HackingHacking
Hacking
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 

Kürzlich hochgeladen

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...liera silvan
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 

Kürzlich hochgeladen (20)

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 

Ethical hacking

  • 1. E t h ic a l H a c k in g
  • 3. PREHISTORY ► Draper builds a "blue box" ► 1960s: The Dawn of used with whistle allows Hacking phreaks to make free calls. Original meaning of the word ► Steve Wozniak and Steve "hack" started at MIT; meant Jobs, future founders of elegant, witty or inspired way Apple Computer, make and of doing almost anything; sell blue boxes. hacks were programming THE GOLDEN AGE shortcuts (1980-1991) ELDER DAYS (1970-1979) ► 1980: Hacker Message ► 1970s: Phone Phreaks and Boards and Groups Cap'n Crunch: One phreak, Hacking groups form; such as John Draper (aka "Cap'n Legion of Doom (US), Chaos Crunch"), discovers a toy Computer Club (Germany). whistle inside Cap'n Crunch ► 1983: Kids' Games cereal gives 2600-hertz signal, Movie "War Games" and can access AT&T's long- introduces public to hacking. distance switching system.
  • 4. THE GREAT HACKER WAR ► 1989: The Germans , ► Legion of Doom vs Masters the KGB and Kevin of Deception; online warfare; Mitnick. jamming phone lines. ► German Hackers ► 1984: Hacker 'Zines arrested for breaking into Hacker magazine 2600 U.S. computers; sold publication; online 'zine information to Soviet KGB. Phrack. ► Hacker "The Mentor“ CRACKDOWN (1986-1994) arrested; publishes ► 1986: Congress passes Hacker's Manifesto. Computer Fraud and Abuse ► Kevin Mitnick convicted; Act; crime to break into first person convicted computer systems. under law against gaining ► 1988: The Morris Worm access to interstate network for criminal Robert T. Morris, Jr., launches purposes. self-replicating worm on ARPAnet.
  • 5.
  • 6.
  • 7.
  • 8. Ethical Hacking ► Independent computer security Professionals breaking into the computer systems. ► Neither damage the target systems nor steal information. ► Evaluate target systems security and report back to owners about the vulnerabilities found.
  • 9. Ethical Hackers but not Criminal Hackers ► Completely trustworthy. ► Strong programming and computer networking skills. ► Learn about the system and trying to find its weaknesses. ► Techniques of Criminal hackers- Detection-Prevention. ► Published research papers or released security software. ► No Ex-hackers.
  • 10. Being Prepared ► What can an intruder see on the target systems? ► What can an intruder do with that information? ► Does anyone at the target notice the intruder's attempts or successes? 6. What are you trying to protect? 7. Who are you trying to protect against? 8. How much time, effort, and money are you willing to expend to obtain adequate protection?
  • 11. Ethical Hacker’s Prospective ► Ethical Hacker’s demand a lot of time and persistence. ► Security evaluation plan 1. Identify system to be tested 2. How to test? 3. Limitations on that testing ► Evaluation done under a “no-holds-barred” approach. ► Clients should be aware of risks. ► Limit prior knowledge of test.
  • 12. Required Skills of an Ethical Hacker ► Routers: knowledge of routers, routing protocols, and access control lists ► Microsoft: skills in operation, configuration and management. ► Linux: knowledge of Linux/Unix; security setting, configuration, and services. ► Firewalls: configurations, and operation of intrusion detection systems. ► Mainframes ► Network Protocols: TCP/IP; how they function and can be manipulated. ► Project Management: knowledge of leading, planning, organizing, and controlling a penetration testing team.
  • 13. Kinds of Testing ► Remote Network ► Remote dial-up network ► Local network ► Stolen laptop computer ► Social engineering ► Physical entry 1.Total outsider 2.Semi-outsider 3.Valid user
  • 14. REVIEW Therefore Ethical Hackers and Network Security experts are highly required as well as demanded by many organization’s for the security of their own data, if it fell in the wrong hands a competitor might use it for corporate espionage, a hacker might use it to break into the client’s computers, or a prankster might just post the report’s contents on the Web as a joke.