SlideShare ist ein Scribd-Unternehmen logo
1 von 39
BY:-
ALAPAN RANJAN BANERJEE
CONTENTS
 INTRODUCTION
 ETHICAL HACKING
 HISTORY OF ETHICAL HACKING
 HACKERS
 TYPES OF HACKERS
 PHASES OF HACKING PROCESS
 WHY WE NEED ETHICAL HACKING
 REQURIED SKILLS
 WHAT TO DO AFTER ETHICAL HACKING
 CASE STUDY
 ADVANTAGE
 DISADVANTAGE
 CEH
 FUTURE SCOPE AND CONCLUTION
INTRODUCTION
 What is HACKING?
 Why we need this?
 The main purpose of this study is to
reveal the brief idea of the ethical
hacking and its affairs with the
corporate security.
 What to do after hacking?
ETHICAL HACKING
 Hacking is usually done to gain
unauthorized access to a computer
system or computer network.
 Ethical hacking is legal.
 Different from unethical hacking
HISTORY OF ETHICAL HACKING
 The phrase “ethical
hacking” was first
used in 1995 by IBM
Vice president John
Patrick.
 Origin of hacker
 Phreaking and tiger
team
 Rise of black hat
hacker
 The renaissance of
the ethical hackers
TYPES OF HACKER
Black Hat Hacker
White Hat Hacker
Grey Hat Hacker
 Use their knowledge and skill
for their own personal gains
probably by hurting others.
 They work sometimes for
common good, sometime for
personal gains.
 Use their knowledge and skills
for good of others and for the
common good.
SOME TOOLS OF HACKING
 1. Metasploit
 2. Acunetix WVS
 3. Nmap
 4. Wireshark
 5. oclHashcat
 6. Nessus Vulnerability Scanner
 7. Maltego
 8. Social-Engineer Toolkit
 9. Netsparker
 10. w3af
PHASES OF HACKING PROCESS
Foot printing or Reconnaissance
 It is a technique used for gathering
information about the computer
system
 what kind of framework is used and
the entities they belong to.
Scanning
 Port scanning
 Network scanning
 Figure printing
 Fire walking
Gaining access
Password attacks
Using viruses
Maintaining access
 Hackers have to maintain the access
because if they lost the access it is
very difficult to gain the access again.
 they make their own vulnerabilities to
gain the access again.
Clearing tracks
 At last they clear the tracks so that
no one can follow his/her tracks to
gain access.
ORGANIZATIONAL
ATTACKS
Organization
faces a variety
of cyber
threats, so it
can be hard to
know what
defenses to
priorities.
PERSONAL DATA
BREACHES
 It means a
breach of
security leading
to accidental or
unlawful
destruction
SOCIAL ENGINEERING
 Hackers is also
someone that calls
you, pretends to
be a federal agent
and makes you
hand over your
user name and
password over the
phones, what we
know as social
engineering.
AUTOMTED ATTACKS
 An automated
attacks is simply
when computers do
the heavy lifting in
finding vulnerable
websites to exploit
DENIAL OF SERVICE
 It is an attack
meant shut down a
machine or
network, making an
inaccessible to its
intended user.
VIRUS, WORMS & TROJAN
HORSES
 Virus is a computer
program usually hidden
within another program
that produces copies of
itself and insert them
into other programs or
files and usually performs
a malicious actions.
 Worms are similar to
viruses.
 Trojan horses is a
program that does
something undocumented
which the programmer
intended,
REQURIEDSKILLS OF ETHICAL HACKERS
 Configuration, operation,
security settings of any OS.
 Good knowledge about routers,
mainframes, network protocol.
 Good knowledge about project
management.
WHAT TO DO AFTER ETHICAL HACKING
 Patch security holes
 Clear logs and hide themselves
 Install rootkit
 Install IRC (Internet relay chat) related programs
 Install scanner program
 Install exploit program
PATCH SECURITY HOLES
 Applying patch
to OS is pivotal
to network
security.
CLEAR LOGS AND HIDE
THEMSELVES
 On any OS or
any website
after the
hack and
leaving hackers
should clear
logs of the
system
INSTALL ROOTKIT
Once installed
it hides and
runs with
administrator
privilege.
INSTALL IRC RELATED
PROGRAM
 we can use IRC
servers
anywhere, or
set up our
own, rather
than be tied in
to centralized
messengers.
INSTALL SCANNER
PROGRAM
 A hacking tool such
as the Netsparker
online web
vulnerability scanner
assists securities
professionals and
penetration testers
to automate a huge
chunk of their tasks
during penetration
testing.
INSTALL EXPLOIT
PEOGRAM
 An exploit is
any attack
that takes
advantage of
vulnerabilities
in applications
or hardware
INSTALL DENIAL OF SERVICE
PROGRAM
Ethical hacking case study: The Zomato case
 Highlights how the
government should use
bug bounty
programmers
 A hacker broke into the
database of Zomato,
India’s largest online
restaurant guide, and
accessed five vital
details – names, emails,
numeric user IDs, user
names and password
hashes – of around 17
million users.
CASE STUDY OF ETHICAL HACKING
 The
Organization
 What Happened
 Impact
ADVANTAGE
 To catch a thief you have to think
like a thief.
 Helps to close the open holes
 Provides security
 Prevents website defacement
DISADVANTAGE
Hiring professionals is
expensive.
All depends upon hackers.
 A Certified Ethical
Hacker is a skilled
professional who
understands and knows
how to look for
weaknesses and
vulnerabilities in target
systems and uses the
same and tools as a
malicious hacker,
 but in a lawful and
legitimate manner to
assess the security
posture of a target
system(s).
FUTURE EHANCEMENT
Ethical hacking

Weitere ähnliche Inhalte

Was ist angesagt?

Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking PresentationAmanUllah115928
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxAnshumaanTiwari2
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to MetasploitGTU
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 

Was ist angesagt? (20)

Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to Metasploit
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Password Attack
Password Attack Password Attack
Password Attack
 

Ähnlich wie Ethical hacking

Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipurcyber cure
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptshreya_omar
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptxachint20
 

Ähnlich wie Ethical hacking (20)

Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
EthicalHacking.pptx
EthicalHacking.pptxEthicalHacking.pptx
EthicalHacking.pptx
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 

Kürzlich hochgeladen

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Kürzlich hochgeladen (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Ethical hacking

  • 2. CONTENTS  INTRODUCTION  ETHICAL HACKING  HISTORY OF ETHICAL HACKING  HACKERS  TYPES OF HACKERS  PHASES OF HACKING PROCESS  WHY WE NEED ETHICAL HACKING  REQURIED SKILLS  WHAT TO DO AFTER ETHICAL HACKING  CASE STUDY  ADVANTAGE  DISADVANTAGE  CEH  FUTURE SCOPE AND CONCLUTION
  • 3. INTRODUCTION  What is HACKING?  Why we need this?  The main purpose of this study is to reveal the brief idea of the ethical hacking and its affairs with the corporate security.  What to do after hacking?
  • 4. ETHICAL HACKING  Hacking is usually done to gain unauthorized access to a computer system or computer network.  Ethical hacking is legal.  Different from unethical hacking
  • 5. HISTORY OF ETHICAL HACKING  The phrase “ethical hacking” was first used in 1995 by IBM Vice president John Patrick.  Origin of hacker  Phreaking and tiger team  Rise of black hat hacker  The renaissance of the ethical hackers
  • 6. TYPES OF HACKER Black Hat Hacker White Hat Hacker Grey Hat Hacker
  • 7.  Use their knowledge and skill for their own personal gains probably by hurting others.
  • 8.  They work sometimes for common good, sometime for personal gains.
  • 9.  Use their knowledge and skills for good of others and for the common good.
  • 10. SOME TOOLS OF HACKING  1. Metasploit  2. Acunetix WVS  3. Nmap  4. Wireshark  5. oclHashcat  6. Nessus Vulnerability Scanner  7. Maltego  8. Social-Engineer Toolkit  9. Netsparker  10. w3af
  • 11. PHASES OF HACKING PROCESS
  • 12. Foot printing or Reconnaissance  It is a technique used for gathering information about the computer system  what kind of framework is used and the entities they belong to.
  • 13. Scanning  Port scanning  Network scanning  Figure printing  Fire walking
  • 15. Maintaining access  Hackers have to maintain the access because if they lost the access it is very difficult to gain the access again.  they make their own vulnerabilities to gain the access again.
  • 16. Clearing tracks  At last they clear the tracks so that no one can follow his/her tracks to gain access.
  • 17.
  • 18. ORGANIZATIONAL ATTACKS Organization faces a variety of cyber threats, so it can be hard to know what defenses to priorities.
  • 19. PERSONAL DATA BREACHES  It means a breach of security leading to accidental or unlawful destruction
  • 20. SOCIAL ENGINEERING  Hackers is also someone that calls you, pretends to be a federal agent and makes you hand over your user name and password over the phones, what we know as social engineering.
  • 21. AUTOMTED ATTACKS  An automated attacks is simply when computers do the heavy lifting in finding vulnerable websites to exploit
  • 22. DENIAL OF SERVICE  It is an attack meant shut down a machine or network, making an inaccessible to its intended user.
  • 23. VIRUS, WORMS & TROJAN HORSES  Virus is a computer program usually hidden within another program that produces copies of itself and insert them into other programs or files and usually performs a malicious actions.  Worms are similar to viruses.  Trojan horses is a program that does something undocumented which the programmer intended,
  • 24. REQURIEDSKILLS OF ETHICAL HACKERS  Configuration, operation, security settings of any OS.  Good knowledge about routers, mainframes, network protocol.  Good knowledge about project management.
  • 25. WHAT TO DO AFTER ETHICAL HACKING  Patch security holes  Clear logs and hide themselves  Install rootkit  Install IRC (Internet relay chat) related programs  Install scanner program  Install exploit program
  • 26. PATCH SECURITY HOLES  Applying patch to OS is pivotal to network security.
  • 27. CLEAR LOGS AND HIDE THEMSELVES  On any OS or any website after the hack and leaving hackers should clear logs of the system
  • 28. INSTALL ROOTKIT Once installed it hides and runs with administrator privilege.
  • 29. INSTALL IRC RELATED PROGRAM  we can use IRC servers anywhere, or set up our own, rather than be tied in to centralized messengers.
  • 30. INSTALL SCANNER PROGRAM  A hacking tool such as the Netsparker online web vulnerability scanner assists securities professionals and penetration testers to automate a huge chunk of their tasks during penetration testing.
  • 31. INSTALL EXPLOIT PEOGRAM  An exploit is any attack that takes advantage of vulnerabilities in applications or hardware
  • 32. INSTALL DENIAL OF SERVICE PROGRAM
  • 33. Ethical hacking case study: The Zomato case  Highlights how the government should use bug bounty programmers  A hacker broke into the database of Zomato, India’s largest online restaurant guide, and accessed five vital details – names, emails, numeric user IDs, user names and password hashes – of around 17 million users.
  • 34. CASE STUDY OF ETHICAL HACKING  The Organization  What Happened  Impact
  • 35. ADVANTAGE  To catch a thief you have to think like a thief.  Helps to close the open holes  Provides security  Prevents website defacement
  • 37.  A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same and tools as a malicious hacker,  but in a lawful and legitimate manner to assess the security posture of a target system(s).