SlideShare ist ein Scribd-Unternehmen logo
1 von 19
ETHICAL HACKING
Contents

• Introduction to hacking
• Types of hackers
• Classification of hackers
• Steps performed by a hacker
• IP address ranges
• Tracing of IP address
• Email Protocol
• Proxy Servers
• Security
• Conclusion
Introduction to Hacking

Hacking: An art as well as a skill depending on a person’s
          knowledge and skill.

                     Hacking


               Positive
                          Negative


  Ethical Hacking: Penetration testing focusing on
                      securing and protecting IT systems.
Types of Hackers


    • White Hat Hacker


    • Black Hat Hacker


    • Grey Hat Hacker
White Hat Hacker

• Perform Ethical Hacking

• Have knowledge of hacking and hacker
 toolset
• Locate security weaknesses and implement
 countermeasures
• Also known as Penetration Tester
• Focus on securing and protecting IT systems
Black Hat Hacker

• Perform unethical hacking
• Are criminal hackers or crackers
• Use their skills for illegal or malicious purposes
• Focus on Security Cracking and Data Stealing
Grey Hat Hacker

• Sometimes acts legally and sometimes not
• Do not hack for personal gain
• Do not have malicious intentions
• May occasionally commit crimes
• Are hybrid between White Hat and Black Hat
 Hackers
Classification of hackers

          • Have ability to find unique vulnerability
Coders    • Have deep understanding of OSI Layer
            Model and TCP/IP Stacks



          • Have experience with os
Admin     • Exploit existing vulnerabilities



 Script   • Use scripts and programs developed by
            others
Kiddies   • Can cause serious problems
Steps Performed by a Hacker

                         Reconnais
                           sance



      Clearing
                                          Scanning
       tracks




           Maintaining               Gaining
             access                  access
Reconnaissance
• Google
• Samspade
• Email tracker and visual route


           Scanning
• War dialing and pingers
• Port scanning
• Enumeration
Password Cracking

• Dictionary Cracking
• Brute Force Cracking
• Hybrid Cracking
• Social Engineering
• Metasploit
• Man in the middle attack
Maintaining access

•Key stroke loggers
•Trojan horses
•Backdoors
•Wrappers
IP ADDRESS RANGES
classes           ranges
Class-a           0000.0.0.0 to 127.255.255.255
Class-b           128.0.0.0 to 191.255.255.255
Class-c           192.0.0.0 to 223.255.255.255
Class-d           224.0.0.0 to 239.255.255.255
Class-e           240.0.0.0 to 255.255.255
TRACING OF IP ADDRESS
             Click on email msg.


                Show original


     Copy the header from written path.


    Open www. What is my ip address.com


            Click on Trace email


        Paste it to the header section


             Click on getsoures.


        get IP address and location .
SECURITY THREATS

•   Denial of service
•   Interception
•   Manipulation
•   Masquerading
•   Repudiation
Proxy Server
   • Intermediary between a workstation user and the internet
   • Hackers use the proxy server on the internet to make their identity
     invisible to the target.
                                             LAN




                                                              PC




                                                            2nd PC

Internet         Proxy Server       Router/Switch

                                                                       Wireless
                                                                       connection
Types of proxies:


                         Proxy




Transparent            Anonymous              Elite




              Simple             Distorting
SECURITY

•   Confidentiality
•   Integrity
•   Availability
•   Use antivirus.
•   Proper logout after use of email id.
•   Don’t open spam.
•   Password protected admin account.
CONCLUSION

• “To catch a thief think like a thief
  similarly To catch a hacker think
  like a hacker”.

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 

Was ist angesagt? (20)

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network security
Network securityNetwork security
Network security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 

Andere mochten auch

Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. ppt
Naveen Sihag
 
Zeal for Life Presentation
Zeal for Life PresentationZeal for Life Presentation
Zeal for Life Presentation
jonsale
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
amrutharam
 

Andere mochten auch (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
A P J Abdul Kalam
A P J Abdul KalamA P J Abdul Kalam
A P J Abdul Kalam
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. ppt
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking
HackingHacking
Hacking
 
Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009
Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009
Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009
 
Zeal for Life Presentation
Zeal for Life PresentationZeal for Life Presentation
Zeal for Life Presentation
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Reflective Audio Journaling
Reflective Audio JournalingReflective Audio Journaling
Reflective Audio Journaling
 
Lecture 15 fraud schemes - james a. hall book chapter 3
Lecture 15  fraud schemes - james a. hall book chapter 3Lecture 15  fraud schemes - james a. hall book chapter 3
Lecture 15 fraud schemes - james a. hall book chapter 3
 
The Strategy of Journaling
The Strategy of JournalingThe Strategy of Journaling
The Strategy of Journaling
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber crime journal by central detective training school
Cyber crime journal by central detective training schoolCyber crime journal by central detective training school
Cyber crime journal by central detective training school
 

Ähnlich wie Ethical hacking

Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 

Ähnlich wie Ethical hacking (20)

ethicalhacking-1
ethicalhacking-1ethicalhacking-1
ethicalhacking-1
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
hacking ,bluetooth
hacking ,bluetoothhacking ,bluetooth
hacking ,bluetooth
 
Ethical hacking.pptx
Ethical hacking.pptxEthical hacking.pptx
Ethical hacking.pptx
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
 
Hacking
HackingHacking
Hacking
 
Malware cryptomining uploadv3
Malware cryptomining uploadv3Malware cryptomining uploadv3
Malware cryptomining uploadv3
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Electronic security
Electronic securityElectronic security
Electronic security
 
Electronic Security
Electronic SecurityElectronic Security
Electronic Security
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Python-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationPython-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming Operation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 

Mehr von Naveen Sihag (20)

Rise to power adolf hitler
Rise to power adolf hitlerRise to power adolf hitler
Rise to power adolf hitler
 
Networking
NetworkingNetworking
Networking
 
Efective computing
Efective computingEfective computing
Efective computing
 
Bluetooth 1
Bluetooth 1Bluetooth 1
Bluetooth 1
 
Black holes
Black holesBlack holes
Black holes
 
Bluetooth 1
Bluetooth 1Bluetooth 1
Bluetooth 1
 
Black holes
Black holesBlack holes
Black holes
 
Visible light communication
Visible light communicationVisible light communication
Visible light communication
 
Variable frequency drives
Variable frequency drivesVariable frequency drives
Variable frequency drives
 
Usb
UsbUsb
Usb
 
Transducers
TransducersTransducers
Transducers
 
Touch screen technology
Touch screen technologyTouch screen technology
Touch screen technology
 
Solids and semiconductors
Solids and semiconductorsSolids and semiconductors
Solids and semiconductors
 
Sms &mms
Sms &mmsSms &mms
Sms &mms
 
Robotics and collision detection
Robotics and   collision detectionRobotics and   collision detection
Robotics and collision detection
 
Renewable energy
Renewable energyRenewable energy
Renewable energy
 
Red tacton
Red tactonRed tacton
Red tacton
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulation
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Osi
OsiOsi
Osi
 

Ethical hacking

  • 2. Contents • Introduction to hacking • Types of hackers • Classification of hackers • Steps performed by a hacker • IP address ranges • Tracing of IP address • Email Protocol • Proxy Servers • Security • Conclusion
  • 3. Introduction to Hacking Hacking: An art as well as a skill depending on a person’s knowledge and skill. Hacking Positive Negative Ethical Hacking: Penetration testing focusing on securing and protecting IT systems.
  • 4. Types of Hackers • White Hat Hacker • Black Hat Hacker • Grey Hat Hacker
  • 5. White Hat Hacker • Perform Ethical Hacking • Have knowledge of hacking and hacker toolset • Locate security weaknesses and implement countermeasures • Also known as Penetration Tester • Focus on securing and protecting IT systems
  • 6. Black Hat Hacker • Perform unethical hacking • Are criminal hackers or crackers • Use their skills for illegal or malicious purposes • Focus on Security Cracking and Data Stealing
  • 7. Grey Hat Hacker • Sometimes acts legally and sometimes not • Do not hack for personal gain • Do not have malicious intentions • May occasionally commit crimes • Are hybrid between White Hat and Black Hat Hackers
  • 8. Classification of hackers • Have ability to find unique vulnerability Coders • Have deep understanding of OSI Layer Model and TCP/IP Stacks • Have experience with os Admin • Exploit existing vulnerabilities Script • Use scripts and programs developed by others Kiddies • Can cause serious problems
  • 9. Steps Performed by a Hacker Reconnais sance Clearing Scanning tracks Maintaining Gaining access access
  • 10. Reconnaissance • Google • Samspade • Email tracker and visual route Scanning • War dialing and pingers • Port scanning • Enumeration
  • 11. Password Cracking • Dictionary Cracking • Brute Force Cracking • Hybrid Cracking • Social Engineering • Metasploit • Man in the middle attack
  • 12. Maintaining access •Key stroke loggers •Trojan horses •Backdoors •Wrappers
  • 13. IP ADDRESS RANGES classes ranges Class-a 0000.0.0.0 to 127.255.255.255 Class-b 128.0.0.0 to 191.255.255.255 Class-c 192.0.0.0 to 223.255.255.255 Class-d 224.0.0.0 to 239.255.255.255 Class-e 240.0.0.0 to 255.255.255
  • 14. TRACING OF IP ADDRESS Click on email msg. Show original Copy the header from written path. Open www. What is my ip address.com Click on Trace email Paste it to the header section Click on getsoures. get IP address and location .
  • 15. SECURITY THREATS • Denial of service • Interception • Manipulation • Masquerading • Repudiation
  • 16. Proxy Server • Intermediary between a workstation user and the internet • Hackers use the proxy server on the internet to make their identity invisible to the target. LAN PC 2nd PC Internet Proxy Server Router/Switch Wireless connection
  • 17. Types of proxies: Proxy Transparent Anonymous Elite Simple Distorting
  • 18. SECURITY • Confidentiality • Integrity • Availability • Use antivirus. • Proper logout after use of email id. • Don’t open spam. • Password protected admin account.
  • 19. CONCLUSION • “To catch a thief think like a thief similarly To catch a hacker think like a hacker”.