SlideShare ist ein Scribd-Unternehmen logo
1 von 19
ETHICAL HACKING
        A LICENCE TO HACK
HACKING:

 Hacking is unauthorized use of computer and
  network resources.
 According to Computer Crime Research
  Center: “It is act of gaining access without
  legal authorization to computer or computer
  network.”
HACKER:

 Someone who tries to break into
  computer systems for any illegal
  purpose.
 Someone who maliciously breaks into systems
  for personal gain. These are criminals.
TYPES OF HACKERS

   Black hat hacker.
   White hat hacker.
   Gray hat hacker.
BLACK BOX MODEL

   Black box model
       Company staff does not know about the test.
       Tester is not given details about the network.
        ▪   Burden is on the tester to find these details

       It is tested, if security personnel are able to
        detect an attack.
WHITE BOX MODEL


   White box model
     Tester
           is told everything about the network
     topology and technology.
         Network diagram is given.

     Tester
          is authorized to interview IT personnel and
     company employees.
     Makes    the tester’s job a little easier.
GRAY BOX MODEL

   Gray box model
     Hybrid   of the white and black box models.
     Company     gives tester partial information.
WHAT IS ETHICAL HACKING ?
 Ethical hacking ,also known as penetration
  testing or white-hat hacking involves the
  same tools, tricks, and techniques that
  hackers use, i.e, by duplicating the intent
  and actions of malicious hackers.
 Ethical hacking is performed with the
  target’s permission.
WHO ARE ETHICAL HACKERS?
   An Ethical Hacker, also known as a whitehat
    hacker, or simply a whitehat, is a security
    professional who applies their hacking skills for
    defensive purposes on behalf of the owners of
    information systems.
   They are completely trustworthy.
   They have strong programming and computer
    networking skills.
   They should have more patience.
   Continuous updating of their knowledge on
    computer and network security is required.
   They should know the techniques of the criminals,
    what their activities would be, how to detected
    them and how to stop them.
REQUIRED SKILLS OF AN ETHICAL HACKER
 Routers: knowledge of routers,
  routing protocols, and access control
  lists.
 Microsoft: skills in operation,
  configuration and management.
 Linux: knowledge of Linux/Unix;
  security setting, configuration, and
  services.
 Firewalls: configurations, and
  operation of intrusion detection
  systems.
ETHICAL HACKING PROCESS

1.   Preparation
2.   Foot printing
3.   Enumeration and fingerprinting
4.   Identification of vulnerabilities
5.   Attack-exploit the vulnerabilities.
PREPARATION:

 Identification of target –company website, mail
  server, extranet.
 Signing of contract

 Agreement on protection against any legal
  issue.
 Contracts to clearly specify limits and dangers
  of the test.
 Total time for testing.

 Key people made aware of testing.
FOOTPRINTING

   Collecting required information about target:
    DNS server.
   IP ranges.
   Administrative contacts.
   Problem reveled by administrator.
ENUMERATION AND FINGERPRINTING

 Operating system enumeration.
 Identification of services/open port.
IDENTIFICATION OF VULNERABILITIES:

   Vulnerabilities
   Insecure configuration.
   Weak passwords.
   Insecure programming.
   Weak access control.
CERTIFICATION

The International Council of E-Commerce
 Consultants (EC-Council) provides a
 professional certification for Certified Ethical
 Hackers (CEH). A certified ethical hacker is
 an ethical hacker who has obtained the
 certification provided by the EC-Council.
ADVANTAGES

 These are good hackers
 Have genuine license to hack

 Generally owned by companies for security
  designing
 Provides security to banking and financial
  establishments
CONCLUSIONS

 Always security professionals are one step
  behind the hackers and crackers.
 Plan for the unplanned attacks.

 The role of ethical hacking in security is to
  provide customers with awareness of how
  they could be attacked and why they are
  targeted.
PRESENTED BY


          SAYANTAN SUR
            BCA(H) – 2

               THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilitiesebusinessmantra
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute forcevishalgohel12195
 
System hacking
System hackingSystem hacking
System hackingCAS
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paperBilal Hameed
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaEdureka!
 

Was ist angesagt? (20)

Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilities
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
System hacking
System hackingSystem hacking
System hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Andere mochten auch

Validus holdings, ltd. (vr) company profile and swot analysis
Validus holdings, ltd. (vr)   company profile and swot analysisValidus holdings, ltd. (vr)   company profile and swot analysis
Validus holdings, ltd. (vr) company profile and swot analysisCompanyProfile123
 
Ontwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebbenOntwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebbenhrmatches
 
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabrasCatálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabrasJuan Albiñana
 
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...Eduardo Nelson German
 
Curso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménezCurso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménezJavier Arenas Jimenez
 
La opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregidaLa opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregidaeducacionsinescuela
 
Powerpoint visita al museo 2
Powerpoint visita al museo 2Powerpoint visita al museo 2
Powerpoint visita al museo 2tangerina2010
 
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)helmuth Fajardo Peña
 
Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN Ana Cláudia Costa
 
Fiziologija reprodukcije
Fiziologija reprodukcijeFiziologija reprodukcije
Fiziologija reprodukcijeEna Horvat
 
next generation smart sensor
next generation smart sensornext generation smart sensor
next generation smart sensorRicha Ritambhara
 
Farmacología ocular
Farmacología ocularFarmacología ocular
Farmacología ocularKarina Soto
 
re:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im Designre:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im DesignMagdalena Reiter
 

Andere mochten auch (17)

Validus holdings, ltd. (vr) company profile and swot analysis
Validus holdings, ltd. (vr)   company profile and swot analysisValidus holdings, ltd. (vr)   company profile and swot analysis
Validus holdings, ltd. (vr) company profile and swot analysis
 
Ontwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebbenOntwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebben
 
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabrasCatálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabras
 
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
 
Uned madrid tips
Uned madrid tipsUned madrid tips
Uned madrid tips
 
Curso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménezCurso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménez
 
Catalogo Feria de Arte flecha 2013
Catalogo Feria de Arte flecha 2013Catalogo Feria de Arte flecha 2013
Catalogo Feria de Arte flecha 2013
 
Marketing en redes sociales
Marketing en redes socialesMarketing en redes sociales
Marketing en redes sociales
 
La opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregidaLa opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregida
 
Powerpoint visita al museo 2
Powerpoint visita al museo 2Powerpoint visita al museo 2
Powerpoint visita al museo 2
 
Proyectos Lifer-2015
Proyectos Lifer-2015Proyectos Lifer-2015
Proyectos Lifer-2015
 
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
 
Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN
 
Fiziologija reprodukcije
Fiziologija reprodukcijeFiziologija reprodukcije
Fiziologija reprodukcije
 
next generation smart sensor
next generation smart sensornext generation smart sensor
next generation smart sensor
 
Farmacología ocular
Farmacología ocularFarmacología ocular
Farmacología ocular
 
re:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im Designre:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im Design
 

Ähnlich wie Ethical Hacking

Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxAnshumaanTiwari2
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptshreya_omar
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 

Ähnlich wie Ethical Hacking (20)

Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Hacking
HackingHacking
Hacking
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Mehr von Sayantan Sur

Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 
Stack using Linked List
Stack using Linked ListStack using Linked List
Stack using Linked ListSayantan Sur
 
Double linked list
Double linked listDouble linked list
Double linked listSayantan Sur
 
Single linked list
Single linked listSingle linked list
Single linked listSayantan Sur
 
Circular linked list
Circular linked listCircular linked list
Circular linked listSayantan Sur
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)Sayantan Sur
 
International Terrorism
International Terrorism International Terrorism
International Terrorism Sayantan Sur
 

Mehr von Sayantan Sur (12)

Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Stack using Linked List
Stack using Linked ListStack using Linked List
Stack using Linked List
 
Stack using Array
Stack using ArrayStack using Array
Stack using Array
 
Array menu
Array menuArray menu
Array menu
 
Double linked list
Double linked listDouble linked list
Double linked list
 
Single linked list
Single linked listSingle linked list
Single linked list
 
Circular linked list
Circular linked listCircular linked list
Circular linked list
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
 
Network Security
Network SecurityNetwork Security
Network Security
 
Visual Studio IDE
Visual Studio IDEVisual Studio IDE
Visual Studio IDE
 
Phising
PhisingPhising
Phising
 
International Terrorism
International Terrorism International Terrorism
International Terrorism
 

Kürzlich hochgeladen

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Kürzlich hochgeladen (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Ethical Hacking

  • 1. ETHICAL HACKING A LICENCE TO HACK
  • 2. HACKING:  Hacking is unauthorized use of computer and network resources.  According to Computer Crime Research Center: “It is act of gaining access without legal authorization to computer or computer network.”
  • 3. HACKER:  Someone who tries to break into computer systems for any illegal purpose.  Someone who maliciously breaks into systems for personal gain. These are criminals.
  • 4. TYPES OF HACKERS  Black hat hacker.  White hat hacker.  Gray hat hacker.
  • 5. BLACK BOX MODEL  Black box model  Company staff does not know about the test.  Tester is not given details about the network. ▪ Burden is on the tester to find these details  It is tested, if security personnel are able to detect an attack.
  • 6. WHITE BOX MODEL  White box model  Tester is told everything about the network topology and technology.  Network diagram is given.  Tester is authorized to interview IT personnel and company employees.  Makes the tester’s job a little easier.
  • 7. GRAY BOX MODEL  Gray box model  Hybrid of the white and black box models.  Company gives tester partial information.
  • 8. WHAT IS ETHICAL HACKING ?  Ethical hacking ,also known as penetration testing or white-hat hacking involves the same tools, tricks, and techniques that hackers use, i.e, by duplicating the intent and actions of malicious hackers.  Ethical hacking is performed with the target’s permission.
  • 9. WHO ARE ETHICAL HACKERS?  An Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems.  They are completely trustworthy.  They have strong programming and computer networking skills.  They should have more patience.  Continuous updating of their knowledge on computer and network security is required.  They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
  • 10. REQUIRED SKILLS OF AN ETHICAL HACKER  Routers: knowledge of routers, routing protocols, and access control lists.  Microsoft: skills in operation, configuration and management.  Linux: knowledge of Linux/Unix; security setting, configuration, and services.  Firewalls: configurations, and operation of intrusion detection systems.
  • 11. ETHICAL HACKING PROCESS 1. Preparation 2. Foot printing 3. Enumeration and fingerprinting 4. Identification of vulnerabilities 5. Attack-exploit the vulnerabilities.
  • 12. PREPARATION:  Identification of target –company website, mail server, extranet.  Signing of contract  Agreement on protection against any legal issue.  Contracts to clearly specify limits and dangers of the test.  Total time for testing.  Key people made aware of testing.
  • 13. FOOTPRINTING  Collecting required information about target:  DNS server.  IP ranges.  Administrative contacts.  Problem reveled by administrator.
  • 14. ENUMERATION AND FINGERPRINTING  Operating system enumeration.  Identification of services/open port.
  • 15. IDENTIFICATION OF VULNERABILITIES:  Vulnerabilities  Insecure configuration.  Weak passwords.  Insecure programming.  Weak access control.
  • 16. CERTIFICATION The International Council of E-Commerce Consultants (EC-Council) provides a professional certification for Certified Ethical Hackers (CEH). A certified ethical hacker is an ethical hacker who has obtained the certification provided by the EC-Council.
  • 17. ADVANTAGES  These are good hackers  Have genuine license to hack  Generally owned by companies for security designing  Provides security to banking and financial establishments
  • 18. CONCLUSIONS  Always security professionals are one step behind the hackers and crackers.  Plan for the unplanned attacks.  The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.
  • 19. PRESENTED BY SAYANTAN SUR BCA(H) – 2 THANK YOU