SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Submitted to:- DEEPESH NAMDEV
(HOD of EE & EC)
Submitted by:- UMESH KUMAR MAHAWAR
(14EGKXX020)
What is CEH?
 CEH refers to Certified Ethical Hacker.
 CEH is 100% Network Offensive Course,
not Defensive.
 This course includes System Hacking,
Web Servers Hacking, Mobile Platforms
Hacking, Wireless Networks Hacking etc.
What is Ethical Hacking?
 Ethical hacking refers to the act of locating weaknesses
and vulnerabilities of computer and information systems
by duplicating the intent and actions of malicious hackers.
 Identify vulnerabilities visible from Internet at particular
point of time.
 It is Legal.
 Permission is obtained from the target.
 Part of an overall Security Program.
 Ethical Hacker possesses same skills, mindset and tools of
a hacker but the attacks are done in a non-destructive
manner.
Hacker v/s Ethical Hacker?
 Hacker
 Access computer system or Network without authorization
 Breaks the law
 Ethical Hacker
 Performs most of same activities but with owner’s permission
 Employed by organizations to perform Penetration Tests
Types of Hacker
 White Hat Hacker
 Good guys who don’t use their skills for illegal purposes.
 Computer Security Experts & help to protect from Black Hat.
 Black Hat Hacker
 Bad guys who use their skills maliciously for personal gain.
 Hack banks, steal credit cards & deface websites.
 Grey Hat Hacker
 It is combination of both Black & White Hat Hackers.
 Goal of Grey Hat Hackers is to provide National Security.
Why do People Hack?
 To make Security Stronger (Ethical Hacking)
 Hack other systems secretly & steal important
information that causes financial loss, reputation
loss to targeted organization
 Revenge
 Show off
 Just for Fun
Why Ethical Hacking
Why Ethical Hacking
Why Ethical Hacking
Some Recent Hacking Activities
 Recently Jio’s Database got hacked, It was vulnerability of their Web Server.
 With this hack Personal details of anyone can be seen by anyone just by entering
mobile number.
 Some months ago, a Ransomware Virus named WannaCry attacked over 104
countries including India.
 Wannacry Encrypted all the data of system and asks for money to decrypt them
back.
 Wannacry works on SMB (Server Message Block)
 On 15 August 2017, many government websites were hacked by Pakistani
Hackers.
 As payback Indian hackers also hacked many Pakistani govt. websites.
Hacking process
Footprinting
Scanning
EnumerationAttack & Gaining Access
Escalating Privilege,
Covering Tracks &
Creating Backdoors
1. Footprinting
Footprinting refers to gathering all
useful information about the target
Tools for Footprinting:-
 WhoIs Lookup
 NS Lookup
 IP Lookup Fig. :- NS Lookup Tool
WhoIs Lookup
2. Scanning & Enumeration
3. Gaining Access
Password Attacks
Social Engineering
Viruses
4. Maintaining Access & Clearing Tracks
OS Backdoors
Trojans
Clearing Tracks
Some Tools
• WhoIs, ping
• Tracert, nslookup
Footprinting
• Nmap
• Nessus
Scanning
Enumeration
What are Various Qualities a Hacker should
posses?
 Good Coder
 Well knowledgeable person of
both Hardware as well as
Software
 Should have knowledge on
Security System
 Trusted Person
Some tips to protect your System from
Hackers
 Keep your system fully patched
 All OS Security Updates should be installed periodically
 Don’t use Pirated Software's
 Remove unused Programs
 Have a Good Anti-Virus and keep its virus definitions up-to-
date
 Firewall should be turned ON
 Setup IDS (Hardware Firewall)
Advantages of Ethical Hacking
 Can be used to recover lost information
 Teaches that no technology is 100%
secure
 To test how good security is on your own
system, known as White Hat Hacking
 To prevent website, system or network
hacking from Black Hat Hackers.
Disadvantages
All depends upon the trustworthiness of
the Ethical Hacker
Allowing the company’s financial and
banking details to be seen
Hiring Professionals is Expensive
“To catch a thief you have to think like a thief”

Weitere ähnliche Inhalte

Was ist angesagt?

Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

Was ist angesagt? (20)

Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Social engineering
Social engineering Social engineering
Social engineering
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 

Ähnlich wie Ethical Hacking PPT (CEH)

CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 

Ähnlich wie Ethical Hacking PPT (CEH) (20)

CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 

Ethical Hacking PPT (CEH)

  • 1. Submitted to:- DEEPESH NAMDEV (HOD of EE & EC) Submitted by:- UMESH KUMAR MAHAWAR (14EGKXX020)
  • 2. What is CEH?  CEH refers to Certified Ethical Hacker.  CEH is 100% Network Offensive Course, not Defensive.  This course includes System Hacking, Web Servers Hacking, Mobile Platforms Hacking, Wireless Networks Hacking etc.
  • 3. What is Ethical Hacking?  Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers.  Identify vulnerabilities visible from Internet at particular point of time.  It is Legal.  Permission is obtained from the target.  Part of an overall Security Program.  Ethical Hacker possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner.
  • 4. Hacker v/s Ethical Hacker?  Hacker  Access computer system or Network without authorization  Breaks the law  Ethical Hacker  Performs most of same activities but with owner’s permission  Employed by organizations to perform Penetration Tests
  • 5. Types of Hacker  White Hat Hacker  Good guys who don’t use their skills for illegal purposes.  Computer Security Experts & help to protect from Black Hat.  Black Hat Hacker  Bad guys who use their skills maliciously for personal gain.  Hack banks, steal credit cards & deface websites.  Grey Hat Hacker  It is combination of both Black & White Hat Hackers.  Goal of Grey Hat Hackers is to provide National Security.
  • 6. Why do People Hack?  To make Security Stronger (Ethical Hacking)  Hack other systems secretly & steal important information that causes financial loss, reputation loss to targeted organization  Revenge  Show off  Just for Fun
  • 10. Some Recent Hacking Activities  Recently Jio’s Database got hacked, It was vulnerability of their Web Server.  With this hack Personal details of anyone can be seen by anyone just by entering mobile number.  Some months ago, a Ransomware Virus named WannaCry attacked over 104 countries including India.  Wannacry Encrypted all the data of system and asks for money to decrypt them back.  Wannacry works on SMB (Server Message Block)  On 15 August 2017, many government websites were hacked by Pakistani Hackers.  As payback Indian hackers also hacked many Pakistani govt. websites.
  • 11. Hacking process Footprinting Scanning EnumerationAttack & Gaining Access Escalating Privilege, Covering Tracks & Creating Backdoors
  • 12. 1. Footprinting Footprinting refers to gathering all useful information about the target Tools for Footprinting:-  WhoIs Lookup  NS Lookup  IP Lookup Fig. :- NS Lookup Tool
  • 14. 2. Scanning & Enumeration
  • 15. 3. Gaining Access Password Attacks Social Engineering Viruses
  • 16. 4. Maintaining Access & Clearing Tracks OS Backdoors Trojans Clearing Tracks
  • 17. Some Tools • WhoIs, ping • Tracert, nslookup Footprinting • Nmap • Nessus Scanning Enumeration
  • 18. What are Various Qualities a Hacker should posses?  Good Coder  Well knowledgeable person of both Hardware as well as Software  Should have knowledge on Security System  Trusted Person
  • 19. Some tips to protect your System from Hackers  Keep your system fully patched  All OS Security Updates should be installed periodically  Don’t use Pirated Software's  Remove unused Programs  Have a Good Anti-Virus and keep its virus definitions up-to- date  Firewall should be turned ON  Setup IDS (Hardware Firewall)
  • 20. Advantages of Ethical Hacking  Can be used to recover lost information  Teaches that no technology is 100% secure  To test how good security is on your own system, known as White Hat Hacking  To prevent website, system or network hacking from Black Hat Hackers.
  • 21. Disadvantages All depends upon the trustworthiness of the Ethical Hacker Allowing the company’s financial and banking details to be seen Hiring Professionals is Expensive
  • 22. “To catch a thief you have to think like a thief”