SlideShare a Scribd company logo
1 of 16
ETHICAL HACKING AND
SYSTEM ADMINISTRATION
By Rajan Maharjan
 Hacking
 Types of Hackers
 Ethical Hacking
 System Administrator
 Administration includes
 Skills and Prerequisites
 Career in ethical hacking and system
administration
 Hacking is unauthorized use of computer
and network resources.
 According to Computer Crime Research
Center:“It is act of gaining access
without legal authorization to computer
or computer network.”
 Dec 04 2013
Hackers Compromise 2 Million
Facebook, Twitter and Gmail Accounts
http://mashable.com/2013/12/04/hackers-facebook-twitter-gmail/
 Jan 29 2014
GoDaddy Admits Hacker’s Social
Engineering Led It To Divulge Info In
@N Twitter Account Hack
http://techcrunch.com/2014/01/29/godaddy-admits-hackers-social-engineering-
led-it-to-divulge-info-in-n-twitter-account-hack/
 Record-breaking DDoS attack in
Europe hits 400Gbps
http://news.cnet.com/8301-1009_3-57618762-83/record-breaking-ddos-attack-
in-europe-hits-400gbps/
The term hacker has dual usage in modern
days but was defined in early days as:
HACKER noun
1.A person who enjoys learning the details of
computer systems and how to stretch their
capabilities—as opposed to most users of
computers, who prefer to learn only the
minimum
amount necessary.
2. One who programs enthusiastically or who
enjoys programming rather than just theorizing
about programming.
TYPES OF HACKERS
 Black hats :– highly skilled, malicious,
destructive “crackers” ; offensive
 White hats – skills used for defensive
security analysts ; defensive
 Gray hats – offensively and defensively;
will hack for different reasons, depends
on situation.
ETHICAL HACKING
 Ethical hacking ,also known as penetration
testing or white-hat hacking with the
permission of the target.
 involves the same tools, tricks, and
techniques that hackers use, i.e, by
duplicating the intent and actions of
malicious hacker.
Ethical Hackers
 Trustworthy security professional
 Applies hacking skills for defensive purpose
 Has very strong programming skill and system
understanding
 Firewalls: configurations, and operation of
intrusion detection systems.
 License to hack
 The International Council of E-Commerce
Consultants (EC-Council) provides a professional
certification for Certified Ethical Hackers (CEH).
ETHICAL HACKING PROCESS
1. Preparation
 Identification of target – website, mail server
etc.
 Signing of contract
 Agreement on protection against any legal
issue.
 Contracts to clearly specify limits and
dangers of the test.
 Total time for testing.
 Key people made aware of testing.
ETHICAL HACKING PROCESS CONTD..
2. FOOTPRINTING
 Collecting required information about target:
DNS server. IP ranges. Administrative
contacts. Problem reveled by administrator.
3. ENUMERATION AND FINGERPRINTING
 Operating system enumeration. Identification of
services/open port.
3. IDENTIFICATION OF VULNERABILITIES:
 Vulnerabilities Insecure configuration. Weak
passwords. Insecure programming. Weak
access control.
SYSTEM ADMINISTRATOR
 A system administrator, or sysadmin, is a
person who is responsible for the upkeep,
configuration, and reliable operation of
computer systems; especially multi-user
computers, such as servers.
Network administrator
Database administrator
System Engineer
IT Engineer
ROLES OF SYSADMIN
 Installing, maintaining and troubleshooting
workstations, servers, OSs, software applications and
other computing systems
 Creating user accounts and assigning user
permissions
 Security and Firewall Setup
 Creating backup and retrieval policies and assigning
bulk storage
 Creating System and network monitoring systems
 Updating systems upon release of new OSs or software
ROLES OF SYSADMIN CONTD..
 Strategic planning for service and system outages
 Light programming or scripting System-related project
management
 User training and management High-level technical
knowledge and technical support experience
 Hardware and software system security, such as
protection against hardware theft and abuse,
malware/spyware and unauthorized use of systems
and components, including firewall and intrusion
detection system(IDS)
DESIRED TRAITS AND SKILLS
 Deep understanding of system and netwoking
 Cloud Technology
 Linux
 Virtualization
 Routing Protocols and Layers (IP,TCP, OSPF)
 Scripting ( bash, python, powershell etc)
 Database administration
 Certifications ( MCSE,RHCE, CCNA, CEH etc ) *
 Problem solving ability
 Multitasking
 Patience
CAREER OPPORTUNITIES
 Local and global opportunities
 Software Companies
 Banks
 ISPs
 Department of IT in all companies
 Freelancing
 Lot more
THANKYOU ALL!
ANY QUESTIONS?
razanwidz@gmail.com
http://np.linkedin.com/pub/rajan-maharjan/4a/552/68b/
facebook.com/rjnmhrjn

More Related Content

What's hot

Operating system components
Operating system componentsOperating system components
Operating system componentsSyed Zaid Irshad
 
Advanced Operating System- Introduction
Advanced Operating System- IntroductionAdvanced Operating System- Introduction
Advanced Operating System- IntroductionDebasis Das
 
Multicore processors and its advantages
Multicore processors and its advantagesMulticore processors and its advantages
Multicore processors and its advantagesNitesh Tudu
 
Chapter 01 - Introduction
Chapter 01 - IntroductionChapter 01 - Introduction
Chapter 01 - IntroductionCésar de Souza
 
Memory organization
Memory organizationMemory organization
Memory organizationAL- AMIN
 
Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt onu9
 
Parallel processing (simd and mimd)
Parallel processing (simd and mimd)Parallel processing (simd and mimd)
Parallel processing (simd and mimd)Bhavik Vashi
 
FUNDAMENTALS OF INTERNET AND WORLD WIDE WEB
FUNDAMENTALS OF INTERNET AND WORLD WIDE WEBFUNDAMENTALS OF INTERNET AND WORLD WIDE WEB
FUNDAMENTALS OF INTERNET AND WORLD WIDE WEBMuniba Bukhari
 
Buses And Its Types Formation
Buses And Its Types FormationBuses And Its Types Formation
Buses And Its Types Formationalihaxxan
 
Computer Memory Hierarchy Computer Architecture
Computer Memory Hierarchy Computer ArchitectureComputer Memory Hierarchy Computer Architecture
Computer Memory Hierarchy Computer ArchitectureHaris456
 
Direct Memory Access(DMA)
Direct Memory Access(DMA)Direct Memory Access(DMA)
Direct Memory Access(DMA)Page Maker
 
Introduction to Computer Architecture and Organization
Introduction to Computer Architecture and OrganizationIntroduction to Computer Architecture and Organization
Introduction to Computer Architecture and OrganizationDr. Balaji Ganesh Rajagopal
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux SystemWayne Jones Jnr
 
Microchip: CXL Use Cases and Enabling Ecosystem
Microchip: CXL Use Cases and Enabling EcosystemMicrochip: CXL Use Cases and Enabling Ecosystem
Microchip: CXL Use Cases and Enabling EcosystemMemory Fabric Forum
 

What's hot (20)

Multicore computers
Multicore computersMulticore computers
Multicore computers
 
cache memory
 cache memory cache memory
cache memory
 
Operating system components
Operating system componentsOperating system components
Operating system components
 
Processors
ProcessorsProcessors
Processors
 
Advanced Operating System- Introduction
Advanced Operating System- IntroductionAdvanced Operating System- Introduction
Advanced Operating System- Introduction
 
Multicore processors and its advantages
Multicore processors and its advantagesMulticore processors and its advantages
Multicore processors and its advantages
 
Chapter 01 - Introduction
Chapter 01 - IntroductionChapter 01 - Introduction
Chapter 01 - Introduction
 
Memory organization
Memory organizationMemory organization
Memory organization
 
Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt
 
Parallel computing persentation
Parallel computing persentationParallel computing persentation
Parallel computing persentation
 
Internal memory
Internal memoryInternal memory
Internal memory
 
Parallel processing (simd and mimd)
Parallel processing (simd and mimd)Parallel processing (simd and mimd)
Parallel processing (simd and mimd)
 
FUNDAMENTALS OF INTERNET AND WORLD WIDE WEB
FUNDAMENTALS OF INTERNET AND WORLD WIDE WEBFUNDAMENTALS OF INTERNET AND WORLD WIDE WEB
FUNDAMENTALS OF INTERNET AND WORLD WIDE WEB
 
IPV6 INTRODUCTION
IPV6 INTRODUCTIONIPV6 INTRODUCTION
IPV6 INTRODUCTION
 
Buses And Its Types Formation
Buses And Its Types FormationBuses And Its Types Formation
Buses And Its Types Formation
 
Computer Memory Hierarchy Computer Architecture
Computer Memory Hierarchy Computer ArchitectureComputer Memory Hierarchy Computer Architecture
Computer Memory Hierarchy Computer Architecture
 
Direct Memory Access(DMA)
Direct Memory Access(DMA)Direct Memory Access(DMA)
Direct Memory Access(DMA)
 
Introduction to Computer Architecture and Organization
Introduction to Computer Architecture and OrganizationIntroduction to Computer Architecture and Organization
Introduction to Computer Architecture and Organization
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux System
 
Microchip: CXL Use Cases and Enabling Ecosystem
Microchip: CXL Use Cases and Enabling EcosystemMicrochip: CXL Use Cases and Enabling Ecosystem
Microchip: CXL Use Cases and Enabling Ecosystem
 

Similar to Ethical hacking and System administration

VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxlmelaine
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkataamiyadutta
 
V1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docV1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docpraveena06
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacksijdmtaiir
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityHome
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeterS.E. CTS CERT-GOV-MD
 
It security
It securityIt security
It securityavi2607
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsDam Frank
 
ThreatModeling.ppt
ThreatModeling.pptThreatModeling.ppt
ThreatModeling.ppttashon2
 
Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecurityMetrics
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxGauravWankar2
 

Similar to Ethical hacking and System administration (20)

VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
V1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docV1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.doc
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacks
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
It security
It securityIt security
It security
 
Hacking
HackingHacking
Hacking
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT Systems
 
ThreatModeling.ppt
ThreatModeling.pptThreatModeling.ppt
ThreatModeling.ppt
 
Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop Connection
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Ethical hacking and System administration

  • 1. ETHICAL HACKING AND SYSTEM ADMINISTRATION By Rajan Maharjan
  • 2.  Hacking  Types of Hackers  Ethical Hacking  System Administrator  Administration includes  Skills and Prerequisites  Career in ethical hacking and system administration
  • 3.  Hacking is unauthorized use of computer and network resources.  According to Computer Crime Research Center:“It is act of gaining access without legal authorization to computer or computer network.”
  • 4.  Dec 04 2013 Hackers Compromise 2 Million Facebook, Twitter and Gmail Accounts http://mashable.com/2013/12/04/hackers-facebook-twitter-gmail/  Jan 29 2014 GoDaddy Admits Hacker’s Social Engineering Led It To Divulge Info In @N Twitter Account Hack http://techcrunch.com/2014/01/29/godaddy-admits-hackers-social-engineering- led-it-to-divulge-info-in-n-twitter-account-hack/  Record-breaking DDoS attack in Europe hits 400Gbps http://news.cnet.com/8301-1009_3-57618762-83/record-breaking-ddos-attack- in-europe-hits-400gbps/
  • 5. The term hacker has dual usage in modern days but was defined in early days as: HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities—as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming.
  • 6. TYPES OF HACKERS  Black hats :– highly skilled, malicious, destructive “crackers” ; offensive  White hats – skills used for defensive security analysts ; defensive  Gray hats – offensively and defensively; will hack for different reasons, depends on situation.
  • 7. ETHICAL HACKING  Ethical hacking ,also known as penetration testing or white-hat hacking with the permission of the target.  involves the same tools, tricks, and techniques that hackers use, i.e, by duplicating the intent and actions of malicious hacker.
  • 8. Ethical Hackers  Trustworthy security professional  Applies hacking skills for defensive purpose  Has very strong programming skill and system understanding  Firewalls: configurations, and operation of intrusion detection systems.  License to hack  The International Council of E-Commerce Consultants (EC-Council) provides a professional certification for Certified Ethical Hackers (CEH).
  • 9. ETHICAL HACKING PROCESS 1. Preparation  Identification of target – website, mail server etc.  Signing of contract  Agreement on protection against any legal issue.  Contracts to clearly specify limits and dangers of the test.  Total time for testing.  Key people made aware of testing.
  • 10. ETHICAL HACKING PROCESS CONTD.. 2. FOOTPRINTING  Collecting required information about target: DNS server. IP ranges. Administrative contacts. Problem reveled by administrator. 3. ENUMERATION AND FINGERPRINTING  Operating system enumeration. Identification of services/open port. 3. IDENTIFICATION OF VULNERABILITIES:  Vulnerabilities Insecure configuration. Weak passwords. Insecure programming. Weak access control.
  • 11. SYSTEM ADMINISTRATOR  A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers. Network administrator Database administrator System Engineer IT Engineer
  • 12. ROLES OF SYSADMIN  Installing, maintaining and troubleshooting workstations, servers, OSs, software applications and other computing systems  Creating user accounts and assigning user permissions  Security and Firewall Setup  Creating backup and retrieval policies and assigning bulk storage  Creating System and network monitoring systems  Updating systems upon release of new OSs or software
  • 13. ROLES OF SYSADMIN CONTD..  Strategic planning for service and system outages  Light programming or scripting System-related project management  User training and management High-level technical knowledge and technical support experience  Hardware and software system security, such as protection against hardware theft and abuse, malware/spyware and unauthorized use of systems and components, including firewall and intrusion detection system(IDS)
  • 14. DESIRED TRAITS AND SKILLS  Deep understanding of system and netwoking  Cloud Technology  Linux  Virtualization  Routing Protocols and Layers (IP,TCP, OSPF)  Scripting ( bash, python, powershell etc)  Database administration  Certifications ( MCSE,RHCE, CCNA, CEH etc ) *  Problem solving ability  Multitasking  Patience
  • 15. CAREER OPPORTUNITIES  Local and global opportunities  Software Companies  Banks  ISPs  Department of IT in all companies  Freelancing  Lot more