Here in this slide i describe the BASIC ... For the Beginners...some general idea & topics i have covered here...My next slide can give more information about hacking... this is the general & only for the beginners.Hope my slide help you to get the thing you want for.
2. HIGHLIGHTS
• Who is hacker
• Different kinds of system attacks
• Required Skills of an Ethical Hacker
• Methodology of Hacking:
• Virus Types
• Security & Counter Measures
• Advantages & Disadvantages
3. WHO IS HACKER
• A person who enjoys learning details
of a programming language or
• system
• A person who enjoys actually doing the
programming rather than
just theorizing about it
4. • A person capable of appreciating
someone else's hacking
• A person who picks up programming
quickly
• A person who is an expert at a
particular programming language or
system.
6. Required Skills of an Ethical
Hacker
• Microsoft: skills in operation,
configuration and management.
• Linux: knowledge of Linux/Unix;
security setting, configuration, and
services.
• Firewalls: configurations, and operation
of intrusion detection systems.
7. • Routers: knowledge of routers, routing
protocols, and access control lists
Mainframes
• Network Protocols: TCP/IP; how they
function and can be manipulated.
• Project Management: leading, planning,
organizing, and controlling a
penetration testing team
9. Reconnaissance:
• The literal meaning of the word
reconnaissance means a preliminary
survey to gain information. This is also
known as foot-printing. This is the first
stage in the methodology of hacking.
10. Scanning &Enumeration
• Scanning is the second phase in the
hacking methodology in which
• the hacker tries to make a blue print of
the target network.
11. Enumeration
• Enumeration is the ability of a hacker
to convince some servers to give them
information that is vital to them to
make an attack.
12. Gaining access
• This is the actual hacking phase in
which the hacker gains access to the
system. The hacker will make use of all
the information he collected in the pre-
attacking phases.
13. Maintaining Access
• Now the hacker is inside the system by
some means by password guessing or
exploiting some of its vulnerabilities .In
the network scenario the hacker will do
it by uploading some software like
Trojan horses, sniffers, key stroke
loggers etc.
14. Clearing Tracks
• Now we come to the final step in the
hacking. There is a saying that
everybody knows a good hacker but
nobody knows a great hacker .
16. VIRUS
A program that when run, has the ability
to self-replicate by infecting other
programs and files on your computer.
The word virus has incorrectly become
a general term that encompasses
Trojans, worms, and viruses.
17. Boot Sector Virus
Boot sector viruses infect either the
master boot record of the hard disk or
the floppy drive.
Examples of boot- sector viruses are
Michelangelo and Stoned.
18. File or Program Viruses
Some files/programs, when executed,
load the virus in the memory and
perform predefined functions to infect
the system. They infect program files
with extensions like .EXE, .COM,
.BIN, .DRV and .SYS .
Some common file viruses are Sunday,
Cascade.
19. Multipartite Viruses
• A multipartite virus is a computer virus that
infects multiple different target platforms,
and remains recursively infective in each
target.
• Ghostball was the first multipartite virus,
discovered by Fridrik Skulason in October
1989.
Other examples are Invader, Flip, etc.
20. Stealth Viruses
These viruses are stealthy in nature
means it uses various methods for
hiding themselves to avoid detection.
They sometimes remove themselves
from the memory temporarily to avoid
detection by antivirus.
21. Polymorphic Viruses
Polymorphic viruses have the ability to
mutate implying that they change the
viral code known as the signature each
time they spread or infect. Thus an
antivirus program which is scanning
for specific virus codes unable to
detect it's presence.
22. Macro Viruses
A macro virus is a computer virus that
"infects" a Microsoft Word or similar
application and causes a sequence of
actions to be performed automatically.
A macro virus is often spread as an e-
mail virus. Well-known examples are
Concept Virus and Melissa Worm.
23. Security & Counter Measures
Use of anti-viruses.
Proper logout after use of mail id.
Manual opening browser
don't open spam.
Password protected admin account.
24. Patch security hole often
Encrypt important data
Ex) pgp, ssh
Do not run unused daemon
Remove unused setuid/setgid program
Setup loghost
Backup the system often
Setup firewall
Setup IDS
Ex) snort
26. Advantages
Provides security to banking and
financial establishments
Prevents website defacements
An evolving technique
To catch a thief you have to think like a
thief
27. Disadvantages
All depends upon the trustworthiness
of the ethical hacker
Hiring professionals is expensive.