2. Contents
• Introduction to hacking
• Types of hackers
• Classification of hackers
• Steps performed by a hacker
• IP address ranges
• Tracing of IP address
• Email Protocol
• Proxy Servers
• Security
• Conclusion
3. Introduction to Hacking
Hacking: An art as well as a skill depending on a person’s
knowledge and skill.
Hacking
Positive
Negative
Ethical Hacking: Penetration testing focusing on
securing and protecting IT systems.
4. Types of Hackers
• White Hat Hacker
• Black Hat Hacker
• Grey Hat Hacker
5. White Hat Hacker
• Perform Ethical Hacking
• Have knowledge of hacking and hacker
toolset
• Locate security weaknesses and implement
countermeasures
• Also known as Penetration Tester
• Focus on securing and protecting IT systems
6. Black Hat Hacker
• Perform unethical hacking
• Are criminal hackers or crackers
• Use their skills for illegal or malicious purposes
• Focus on Security Cracking and Data Stealing
7. Grey Hat Hacker
• Sometimes acts legally and sometimes not
• Do not hack for personal gain
• Do not have malicious intentions
• May occasionally commit crimes
• Are hybrid between White Hat and Black Hat
Hackers
8. Classification of hackers
• Have ability to find unique vulnerability
Coders • Have deep understanding of OSI Layer
Model and TCP/IP Stacks
• Have experience with os
Admin • Exploit existing vulnerabilities
Script • Use scripts and programs developed by
others
Kiddies • Can cause serious problems
9. Steps Performed by a Hacker
Reconnais
sance
Clearing
Scanning
tracks
Maintaining Gaining
access access
13. IP ADDRESS RANGES
classes ranges
Class-a 0000.0.0.0 to 127.255.255.255
Class-b 128.0.0.0 to 191.255.255.255
Class-c 192.0.0.0 to 223.255.255.255
Class-d 224.0.0.0 to 239.255.255.255
Class-e 240.0.0.0 to 255.255.255
14. TRACING OF IP ADDRESS
Click on email msg.
Show original
Copy the header from written path.
Open www. What is my ip address.com
Click on Trace email
Paste it to the header section
Click on getsoures.
get IP address and location .
15. SECURITY THREATS
• Denial of service
• Interception
• Manipulation
• Masquerading
• Repudiation
16. Proxy Server
• Intermediary between a workstation user and the internet
• Hackers use the proxy server on the internet to make their identity
invisible to the target.
LAN
PC
2nd PC
Internet Proxy Server Router/Switch
Wireless
connection
17. Types of proxies:
Proxy
Transparent Anonymous Elite
Simple Distorting
18. SECURITY
• Confidentiality
• Integrity
• Availability
• Use antivirus.
• Proper logout after use of email id.
• Don’t open spam.
• Password protected admin account.
19. CONCLUSION
• “To catch a thief think like a thief
similarly To catch a hacker think
like a hacker”.