Cse ethical hacking ppt

A
Seminar
ON
ETHICAL HACKING
By
SHAHID ANSARI
MCA
Department of Computer Science and Engineering
Madan Mohan Malaviya University of Technology Session(2015-16)
Contents
 Introduction
 What is Hacking?
 Ethical Hacking
 Types of Hackers
 Process of Ethical Hacking
 Ethical Hacking tools
 Required Skills of an Ethical Hacker
 What do hackers do after hacking?
 Advantages and disadvantages
 Conclusion
Introduction
Ethical hacking also known as penetration testing or
white-hat hacking, involves the same tools, tricks, and
techniques that hackers use, but with one major difference that
Ethical hacking is legal.
What is hacking ?
Hacking is unauthorized use of computer and network
resources. Computer hacking is the practice of modifying
computer hardware and software to accomplish a goal
outside of the creator’s original purpose.
Ethical Hacking
 Independent computer security Professionals breaking into the
computer systems.
 Neither damage the target systems nor steal information.
 Evaluate target systems security and report back to owners
about the vulnerabilities found.
Why Do We Need Ethical Hacking
Viruses, Trojan
Horses,
and Worms
Social
Engineering
Automated
Attacks
Accidental
Breaches in
Security Denial of
Service (DoS)
Organizational
Attacks
Restricted
Data
Protection from possible External Attacks
Hackers
 A person who enjoys learning details of a programming
language or system
 A person who enjoys actually doing the programming
rather than just theorizing about it
 A person capable of appreciating someone else's hacking
 A person who picks up programming quickly
 A person who is an expert at a particular programming
language or system
Cse ethical hacking ppt
Types of Hackers
 Black Hat Hacker
 White Hat Hacker
 Grey Hat Hacker
Ethical Hacking Process
 Foot Printing
 Scanning/enumeration
 Gaining Access
 Maintaining Access
 Clearing tracks
Foot Printing
There are two types of foot-printing-
 Active foot-printing
 Passive foot-printing
Active Foot-printing:
 Mirroring websites
 Email tracing
 Server verification
Passive Foot-Printing :
 Google search
 Whois queries
 DNS lookup
 Social networking sites
Scanning
 Port Scanning
 Network Scanning
 Vulnerability Scanning
Enumeration
There are differen type of enumeration.
 NetBios
 SNMP
 DNS
Gaining Access
 This is the actual hacking phase in which the
hacker gains access to the system. The hacker
exploits the system.
Maintaining Access
 Maintaining Access refers to the phase when the
hacker tries to retain his 'ownership' of the system.
The hacker has exploited a vulnerability and can
tamper and compromise the system.
Ethical hacking tools:
 Email tracker and visual route
 Sam spade
Email tracker and visual route
Email tracker and visual route
Sam spade
What do hackers do after hacking?
 Install scanner program
 mscan, sscan, nmap
 Install exploit program
 Install denial of service program
 Use all of installed programs silently
 Patch Security hole
 The other hackers can’t intrude
 Install rootkit ( backdoor )
 It contains trojan virus, and so on
Advantages
 To catch a thief you have to think like a thief.
 Helps in closing the open holes in the system network.
 Provides security to banking and financial establishments.
 Prevents website defacements.
Disadvantages
 All depends upon the trustworthiness of the ethical hacker.
 Hiring professionals is expensive.
Conclusion
 In the preceding sections we saw the methodology of hacking,
why should we aware of hacking and some tools which a
hacker may use.
 Now we can see what can we do against hacking or to protect
ourselves from hacking.
 The first thing we should do is to keep ourselves updated
about those software’s we and using for official and reliable
sources.
 Educate the employees and the users against black hat hacking.
References
www.hackersonlineclub.com
www.hackthissite.org
www.wikihow.com
Cse ethical hacking ppt
Thank You
1 von 25

Recomendados

Ethical Hacking Powerpoint von
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
3.9K views17 Folien
Ethical hacking von
Ethical hackingEthical hacking
Ethical hackingAlapan Banerjee
822 views39 Folien
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co... von
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
937 views17 Folien
PowerPoint Presentation On Ethical Hacking in Brief (Simple) von
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
19.9K views24 Folien
Ethical hacking von
Ethical hackingEthical hacking
Ethical hackingVipinYadav257
431 views25 Folien

Más contenido relacionado

Was ist angesagt?

Ethical hacking Presentation von
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
3K views17 Folien
Inetsecurity.in Ethical Hacking presentation von
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
1.4K views35 Folien
Ethical hacking von
Ethical hackingEthical hacking
Ethical hackingA Raheem Ansari
1.6K views15 Folien
Ethical Hacking von
Ethical HackingEthical Hacking
Ethical HackingTharindu Kalubowila
2.9K views20 Folien
Ethical Hacking von
Ethical HackingEthical Hacking
Ethical HackingKeith Brooks
10.8K views34 Folien
Ethical hacking von
Ethical hackingEthical hacking
Ethical hackingGoutham Shetty
344 views18 Folien

Was ist angesagt?(20)

Inetsecurity.in Ethical Hacking presentation von Joshua Prince
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince1.4K views
Introduction To Ethical Hacking von Raghav Bisht
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Raghav Bisht324 views
Introduction to ethical hacking von ankit sarode
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode2.1K views
Ethical hacking von Anumadil1
Ethical hackingEthical hacking
Ethical hacking
Anumadil1519 views
Ethical hacking von arohan6
Ethical hackingEthical hacking
Ethical hacking
arohan6701 views
ETHICAL HACKING PRESENTATION von Yash Shukla
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
Yash Shukla445 views
Ethical hacking : Its methodologies and tools von chrizjohn896
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896622 views
Cyber security von Pihu Goel
Cyber securityCyber security
Cyber security
Pihu Goel3.9K views

Destacado

ORAÇÃO DIANTE DE JESUS EUCARÍSTICO von
ORAÇÃO DIANTE DE JESUS EUCARÍSTICOORAÇÃO DIANTE DE JESUS EUCARÍSTICO
ORAÇÃO DIANTE DE JESUS EUCARÍSTICOGRUPO DE ORAÇÃO ANJO RAFAEL
203 views11 Folien
La tierra von
La tierraLa tierra
La tierrasandraaf
297 views3 Folien
La tierra von
La tierraLa tierra
La tierrasandraaf
163 views3 Folien
Reseña la isla del tesoro von
Reseña la isla del tesoroReseña la isla del tesoro
Reseña la isla del tesoro_male23
107 views1 Folie
Reseña la isla del tesoro von
Reseña la isla del tesoroReseña la isla del tesoro
Reseña la isla del tesoro_male23
102 views1 Folie
VINHOS E MITOS von
VINHOS E MITOSVINHOS E MITOS
VINHOS E MITOSGRUPO DE ORAÇÃO ANJO RAFAEL
222 views3 Folien

Destacado(20)

La tierra von sandraaf
La tierraLa tierra
La tierra
sandraaf297 views
La tierra von sandraaf
La tierraLa tierra
La tierra
sandraaf163 views
Reseña la isla del tesoro von _male23
Reseña la isla del tesoroReseña la isla del tesoro
Reseña la isla del tesoro
_male23107 views
Reseña la isla del tesoro von _male23
Reseña la isla del tesoroReseña la isla del tesoro
Reseña la isla del tesoro
_male23102 views
Введение в реверс-инжиниринг вредоносного ПО - Сергей Харюк von HackIT Ukraine
Введение в реверс-инжиниринг вредоносного ПО - Сергей ХарюкВведение в реверс-инжиниринг вредоносного ПО - Сергей Харюк
Введение в реверс-инжиниринг вредоносного ПО - Сергей Харюк
HackIT Ukraine733 views
Mapa de empatía de un alumno invidente de von Ros2016
Mapa de empatía de un alumno invidente deMapa de empatía de un alumno invidente de
Mapa de empatía de un alumno invidente de
Ros2016347 views
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb... von DETER-Project
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
DETER-Project2.2K views
A zsenális automatizálás von Vida Ágnes
A zsenális automatizálásA zsenális automatizálás
A zsenális automatizálás
Vida Ágnes11.9K views
Profi Marketing Automatizálás sorozat von Vida Ágnes
Profi Marketing Automatizálás sorozatProfi Marketing Automatizálás sorozat
Profi Marketing Automatizálás sorozat
Vida Ágnes26.4K views
La isla del tesoro von Irene12233
La isla del tesoroLa isla del tesoro
La isla del tesoro
Irene12233147 views

Similar a Cse ethical hacking ppt

Summer training in jaipur von
Summer training in jaipurSummer training in jaipur
Summer training in jaipurcyber cure
150 views30 Folien
Presentation on Ethical Hacking ppt von
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
142.7K views29 Folien
Ethical hacking ppt by shantanu arora von
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
354 views29 Folien
Ethical-Hacking-ppt.pptx von
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
26 views26 Folien
CSE-Ethical-Hacking-ppt.pptx von
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
52 views26 Folien
CSSE-Ethical-Hacking-ppt.pptx von
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
47 views24 Folien

Similar a Cse ethical hacking ppt(20)

Summer training in jaipur von cyber cure
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
cyber cure150 views
Presentation on Ethical Hacking ppt von Shravan Sanidhya
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya142.7K views
CSSE-Ethical-Hacking-ppt.pptx von VishnuVarma47
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma4747 views
Cse ethical hacking ppt von shreya_omar
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
shreya_omar1.4K views
Hacking and Ethical Hacking von Masih Karimi
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
Masih Karimi357 views
Ethical Hacking.pptx von achint20
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
achint2019 views
Ethical hacking BY Thariq ibnu Ubaidhullah von pongada123
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullah
pongada12321 views
Ethical Hacking .pptx von johnnymaaza
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
johnnymaaza108 views
Ethical Hacking PPT (CEH) von Umesh Mahawar
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar3.5K views
Final report ethical hacking von samprada123
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada12333K views
A REVIEW PAPER ON ETHICAL HACKING von Nathan Mathis
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Nathan Mathis3 views

Último

Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... von
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...ShapeBlue
79 views17 Folien
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... von
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...ShapeBlue
144 views12 Folien
"Surviving highload with Node.js", Andrii Shumada von
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada Fwdays
53 views29 Folien
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue von
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueShapeBlue
93 views15 Folien
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... von
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...ShapeBlue
146 views15 Folien
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool von
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPoolShapeBlue
84 views10 Folien

Último(20)

Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... von ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue79 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... von ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue144 views
"Surviving highload with Node.js", Andrii Shumada von Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays53 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue von ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue93 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... von ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue146 views
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool von ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue84 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT von ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue166 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc160 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... von ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue85 views
Future of AR - Facebook Presentation von Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty62 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows von Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software385 views
Business Analyst Series 2023 - Week 4 Session 7 von DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10126 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
The Power of Heat Decarbonisation Plans in the Built Environment von IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE69 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue von ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue163 views
NTGapps NTG LowCode Platform von Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu365 views
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... von ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue154 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... von ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue98 views

Cse ethical hacking ppt

  • 1. A Seminar ON ETHICAL HACKING By SHAHID ANSARI MCA Department of Computer Science and Engineering Madan Mohan Malaviya University of Technology Session(2015-16)
  • 2. Contents  Introduction  What is Hacking?  Ethical Hacking  Types of Hackers  Process of Ethical Hacking  Ethical Hacking tools  Required Skills of an Ethical Hacker  What do hackers do after hacking?  Advantages and disadvantages  Conclusion
  • 3. Introduction Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal.
  • 4. What is hacking ? Hacking is unauthorized use of computer and network resources. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.
  • 5. Ethical Hacking  Independent computer security Professionals breaking into the computer systems.  Neither damage the target systems nor steal information.  Evaluate target systems security and report back to owners about the vulnerabilities found.
  • 6. Why Do We Need Ethical Hacking Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data Protection from possible External Attacks
  • 7. Hackers  A person who enjoys learning details of a programming language or system  A person who enjoys actually doing the programming rather than just theorizing about it  A person capable of appreciating someone else's hacking  A person who picks up programming quickly  A person who is an expert at a particular programming language or system
  • 9. Types of Hackers  Black Hat Hacker  White Hat Hacker  Grey Hat Hacker
  • 10. Ethical Hacking Process  Foot Printing  Scanning/enumeration  Gaining Access  Maintaining Access  Clearing tracks
  • 11. Foot Printing There are two types of foot-printing-  Active foot-printing  Passive foot-printing Active Foot-printing:  Mirroring websites  Email tracing  Server verification Passive Foot-Printing :  Google search  Whois queries  DNS lookup  Social networking sites
  • 12. Scanning  Port Scanning  Network Scanning  Vulnerability Scanning
  • 13. Enumeration There are differen type of enumeration.  NetBios  SNMP  DNS
  • 14. Gaining Access  This is the actual hacking phase in which the hacker gains access to the system. The hacker exploits the system. Maintaining Access  Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system. The hacker has exploited a vulnerability and can tamper and compromise the system.
  • 15. Ethical hacking tools:  Email tracker and visual route  Sam spade
  • 16. Email tracker and visual route
  • 17. Email tracker and visual route
  • 19. What do hackers do after hacking?  Install scanner program  mscan, sscan, nmap  Install exploit program  Install denial of service program  Use all of installed programs silently  Patch Security hole  The other hackers can’t intrude  Install rootkit ( backdoor )  It contains trojan virus, and so on
  • 20. Advantages  To catch a thief you have to think like a thief.  Helps in closing the open holes in the system network.  Provides security to banking and financial establishments.  Prevents website defacements.
  • 21. Disadvantages  All depends upon the trustworthiness of the ethical hacker.  Hiring professionals is expensive.
  • 22. Conclusion  In the preceding sections we saw the methodology of hacking, why should we aware of hacking and some tools which a hacker may use.  Now we can see what can we do against hacking or to protect ourselves from hacking.  The first thing we should do is to keep ourselves updated about those software’s we and using for official and reliable sources.  Educate the employees and the users against black hat hacking.

Hinweis der Redaktion

  1. 1