SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Introduction
to
Ethical
Hacking
T.L. KALUBOWILA
Content
• What is Information Security
• CIA
• Ethics & Hacking
• Ethical Hacking
• Ethical Hacker Vs Hacker
• Type of Attackers
• Steps
• Benefits
What is Information Security?
Information security is all about protecting the
confidentiality, integrity and availability of
computer system data from those with malicious
intentions.
C I A
•Confidentiality - Ensures that data or an
information system is accessed by only an authorized
person.
•Integrity - Maintaining and assuring the accuracy
and completeness of data over its entire life-cycle.
•Availability - Data and information systems are
available when required.
Ethics
Moral principles that govern a person’s or group’s
behavior.
Hacking
Practice of modifying the features of a system, in order
to accomplish a goal outside of the creator’s original
purpose.
History of Hacking
Hacking in the past 40 years…
• 1960s – MIT’s artificial intelligence lab, became staging
grounds for hackers
• 1970s – John Draper makes a
long-distance call for free
History of Hacking
• 1980s – Kevin Mitnick, secretly monitors the email of MCI
(American Telecommunication company)
and Digital Equipment security officials.
• 1990s – Hackers break into and deface federal web sites, including
the U.S. Department of Justice, U.S. Air Force, CIA, NASA and
others.
Ethical Hacking
Ethical hacking refers to the act of locating weaknesses
and vulnerabilities of computer and information
systems by duplicating the intent and actions of
malicious hackers.
Also known as
Intrusion Testing, Penetration Testing or Red
Teaming
Ethical Hacker Vs. Hacker
Ethical Hacker Hacker
Done legally with permission of the
relevant organization
Done illegally without the consent of
the relevant organization
Done in an attempt to prevent
malicious attacks from being successful
Done in an attempt to make malicious
attacks possible
Disclose any vulnerabilities discovered Exploit discovered vulnerabilities
Type of Attackers
• Script Kiddies – Armatures, copy others codes to attack
• White Hat Hackers – Professional term for ethical hackers
• Black Hat Hackers – Professional term for malicious hackers
• Gray Hat Hackers – Combination of both white and black, hack to learn
and they are self-proclaimed ethical hackers
• State Sponsored Hackers – Limitless time and funding by government
• Spy Hackers – Hired hackers by corporations
• Cyber Terrorists – motivated by religious / political beliefs, they spread
fear, terror and commit murders
Steps
Covering Tracks
Maintain Access
Gaining Access
Scanning
Reconnaissance
1. Reconnaissance
Reconnaissance is probably the longest phase, sometimes lasting weeks or
months. The black hat uses a variety of sources to learn as much as
possible about the target business and how it operates, including
• Internet searches
• Social engineering
• Dumpster diving
• Domain name management/search services
• Non-intrusive network scanning
2. Scanning
Once the attacker has enough information to understand how the business
works and what information of value might be available, he or she begins
the process of scanning perimeter and internal network devices looking for
weaknesses, including
• Open ports
• Open services
• Vulnerable applications, including operating systems
• Weak protection of data in transit
• Make and model of each piece of LAN/WAN equipment
3. Gaining Access
Gaining access to resources is the whole point of a modern-day attack. The
usual goal is to either extract information of value to the attacker or use the
network as a launch site for attacks against other targets. In either
situation, the attacker must gain some level of access to one or more
network devices.
4. Maintain Access
Having gained access, an attacker must maintain access long enough to
accomplish his or her objectives.
5. Covering Tracks
After achieving his or her objectives, the attacker typically takes steps to
hide the intrusion and possible controls left behind for future visits.
Benefits of Ethical Hacking
• Finding vulnerabilities before an attacker.
• Using hacker techniques to closely model a true attack.
• Documenting strong and weak security areas.
• Find the weak seams in a security fabric.
End result is the company’s ability
to prevent an intrusion, before it
occurs.
Disadvantages of Ethical
Hacking
• The ethical hacker using the knowledge they gain to do
malicious hacking activities.
• Allowing the company’s financial and banking details to
be seen.
• The possibility that the ethical hacker will send and/or
place malicious code, viruses, malware and other
destructive and harmful things on a computer system,
• Massive security breaches.
Google Dorks
The Windows Registry is a database that holds your operating
system's configurations and settings. By hacking registries, we can
make windows better.
http://www.howtogeek.com/howto/37920/the-50-best-registry-
hacks-that-make-windows-better/
Registry Hacking
Advanced Google searches used to find security loopholes on
websites and allow hackers to break in to or disrupt the site.
Ethical Hacking
Ethical Hacking

Weitere ähnliche Inhalte

Was ist angesagt?

Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.Coder Tech
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking PresentationAmanUllah115928
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 

Was ist angesagt? (20)

Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
HACKING
HACKINGHACKING
HACKING
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 

Andere mochten auch

Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summaryudemy course
 
Originales y pre impresi
Originales y pre impresiOriginales y pre impresi
Originales y pre impresianunciarte
 
Cyber Security Experts Forum
Cyber Security Experts ForumCyber Security Experts Forum
Cyber Security Experts ForumMelissa Krasnow
 
CMS Hacking Tricks - DerbyCon 4 - 2014
CMS Hacking Tricks - DerbyCon 4 - 2014CMS Hacking Tricks - DerbyCon 4 - 2014
CMS Hacking Tricks - DerbyCon 4 - 2014Greg Foss
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionChris Gates
 
Advanced Threats and Lateral Movement Detection
Advanced Threats and Lateral Movement DetectionAdvanced Threats and Lateral Movement Detection
Advanced Threats and Lateral Movement DetectionGreg Foss
 
Lateral Movement - Hacker Halted 2016
Lateral Movement - Hacker Halted 2016Lateral Movement - Hacker Halted 2016
Lateral Movement - Hacker Halted 2016Xavier Ashe
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hackingeiti panchkula
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hackingSahil Rai
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingRavi Sankar
 
Hacking - Breaking Into It
Hacking - Breaking Into ItHacking - Breaking Into It
Hacking - Breaking Into ItCTruncer
 
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Passive Intelligence Gathering and Analytics - It's All Just Metadata!Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Passive Intelligence Gathering and Analytics - It's All Just Metadata!CTruncer
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardwarenitinmote
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardwarekarlp
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 

Andere mochten auch (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
 
Originales y pre impresi
Originales y pre impresiOriginales y pre impresi
Originales y pre impresi
 
Brit India Wiki
Brit India WikiBrit India Wiki
Brit India Wiki
 
Cyber Security Experts Forum
Cyber Security Experts ForumCyber Security Experts Forum
Cyber Security Experts Forum
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
CMS Hacking Tricks - DerbyCon 4 - 2014
CMS Hacking Tricks - DerbyCon 4 - 2014CMS Hacking Tricks - DerbyCon 4 - 2014
CMS Hacking Tricks - DerbyCon 4 - 2014
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
 
Advanced Threats and Lateral Movement Detection
Advanced Threats and Lateral Movement DetectionAdvanced Threats and Lateral Movement Detection
Advanced Threats and Lateral Movement Detection
 
Lateral Movement - Hacker Halted 2016
Lateral Movement - Hacker Halted 2016Lateral Movement - Hacker Halted 2016
Lateral Movement - Hacker Halted 2016
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
 
Hacking - Breaking Into It
Hacking - Breaking Into ItHacking - Breaking Into It
Hacking - Breaking Into It
 
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Passive Intelligence Gathering and Analytics - It's All Just Metadata!Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 

Ähnlich wie Ethical Hacking

Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-RAKESH SHARMA
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.pptShivaniSingha1
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptxdaxgame
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationJay Nagar
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 

Ähnlich wie Ethical Hacking (20)

Hacking
HackingHacking
Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical_Hacking
Ethical_HackingEthical_Hacking
Ethical_Hacking
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
hacking
hackinghacking
hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
 
Hacking
HackingHacking
Hacking
 

Ethical Hacking

  • 2. Content • What is Information Security • CIA • Ethics & Hacking • Ethical Hacking • Ethical Hacker Vs Hacker • Type of Attackers • Steps • Benefits
  • 3. What is Information Security? Information security is all about protecting the confidentiality, integrity and availability of computer system data from those with malicious intentions.
  • 4. C I A •Confidentiality - Ensures that data or an information system is accessed by only an authorized person. •Integrity - Maintaining and assuring the accuracy and completeness of data over its entire life-cycle. •Availability - Data and information systems are available when required.
  • 5. Ethics Moral principles that govern a person’s or group’s behavior. Hacking Practice of modifying the features of a system, in order to accomplish a goal outside of the creator’s original purpose.
  • 6. History of Hacking Hacking in the past 40 years… • 1960s – MIT’s artificial intelligence lab, became staging grounds for hackers • 1970s – John Draper makes a long-distance call for free
  • 7. History of Hacking • 1980s – Kevin Mitnick, secretly monitors the email of MCI (American Telecommunication company) and Digital Equipment security officials. • 1990s – Hackers break into and deface federal web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others.
  • 8. Ethical Hacking Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Also known as Intrusion Testing, Penetration Testing or Red Teaming
  • 9. Ethical Hacker Vs. Hacker Ethical Hacker Hacker Done legally with permission of the relevant organization Done illegally without the consent of the relevant organization Done in an attempt to prevent malicious attacks from being successful Done in an attempt to make malicious attacks possible Disclose any vulnerabilities discovered Exploit discovered vulnerabilities
  • 10. Type of Attackers • Script Kiddies – Armatures, copy others codes to attack • White Hat Hackers – Professional term for ethical hackers • Black Hat Hackers – Professional term for malicious hackers • Gray Hat Hackers – Combination of both white and black, hack to learn and they are self-proclaimed ethical hackers • State Sponsored Hackers – Limitless time and funding by government • Spy Hackers – Hired hackers by corporations • Cyber Terrorists – motivated by religious / political beliefs, they spread fear, terror and commit murders
  • 11. Steps Covering Tracks Maintain Access Gaining Access Scanning Reconnaissance
  • 12. 1. Reconnaissance Reconnaissance is probably the longest phase, sometimes lasting weeks or months. The black hat uses a variety of sources to learn as much as possible about the target business and how it operates, including • Internet searches • Social engineering • Dumpster diving • Domain name management/search services • Non-intrusive network scanning
  • 13. 2. Scanning Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including • Open ports • Open services • Vulnerable applications, including operating systems • Weak protection of data in transit • Make and model of each piece of LAN/WAN equipment
  • 14. 3. Gaining Access Gaining access to resources is the whole point of a modern-day attack. The usual goal is to either extract information of value to the attacker or use the network as a launch site for attacks against other targets. In either situation, the attacker must gain some level of access to one or more network devices.
  • 15. 4. Maintain Access Having gained access, an attacker must maintain access long enough to accomplish his or her objectives. 5. Covering Tracks After achieving his or her objectives, the attacker typically takes steps to hide the intrusion and possible controls left behind for future visits.
  • 16. Benefits of Ethical Hacking • Finding vulnerabilities before an attacker. • Using hacker techniques to closely model a true attack. • Documenting strong and weak security areas. • Find the weak seams in a security fabric. End result is the company’s ability to prevent an intrusion, before it occurs.
  • 17. Disadvantages of Ethical Hacking • The ethical hacker using the knowledge they gain to do malicious hacking activities. • Allowing the company’s financial and banking details to be seen. • The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on a computer system, • Massive security breaches.
  • 18. Google Dorks The Windows Registry is a database that holds your operating system's configurations and settings. By hacking registries, we can make windows better. http://www.howtogeek.com/howto/37920/the-50-best-registry- hacks-that-make-windows-better/ Registry Hacking Advanced Google searches used to find security loopholes on websites and allow hackers to break in to or disrupt the site.

Hinweis der Redaktion

  1. Confidentiality - Ensures that data or an information system is accessed by only an authorized person. (User Id’s and passwords, access control lists (ACL) and policy based security are some of the methods through which confidentiality is achieved) Integrity - maintaining and assuring the accuracy and completeness of data over its entire life-cycle. (This means that data cannot be modified in an unauthorized or undetected manner.) Availability - Data and information systems are available when required. (Hardware maintenance, software patching/upgrading and network optimization ensures availability)
  2. Covering Tracks - An attacker needs to destroy evidence of his presence and activities for several reasons like being able to maintain access and evade detection (and the resulting punishment).