SlideShare ist ein Scribd-Unternehmen logo
1 von 14
What is ethical hacking?
Ethical hacking, often performed by white hats
or skilled computer experts, is the use of
programming skills to determine vulnerabilities
in computer systems.
History
 Kevin mitnic(1995)



 Gary mckinnon (2002)
Hacking methods:

 Brute force hack




 Fake login hack




 Cookie steal hack




 Web mail hack
Types of hackers:
     white hat hacker

      grey hat hacker

     black hat hacker
Hacking with ethics
Hacking website:
  • open the website u want to hack
  • Provide wrong user name and password
  • Right click on the page->go to view source->html
  • Delete the java script from the source carefully
  • Give input=“password” type=“password” -> replace
  • File-> saveas->store inhard disk->goto saved page and
   open it ---->u can see some changes
 Locally stored passwords


 Trojan


 Key logger


 Impersonation Sniffing


 Sniffing


 Social engineering
Basicneeds for hacking:

 First u can
  learn about
  computers
  you are in
  much
  femeliar
  about HTML
  language
CODE:
 Learn about hardware , dos, batch files
 Port scanning
 Learn programming languages
  HTML,C++,Perl….etc
 How to secure yourself
 FTP(file transfer protocol)
 TCP/IP,UDP,DHCP
Shop admin hacking :
Finding vp-asp 5.00
 In google.com type vp-asp 5.00 and install software
 Page will be like this ***://***.victim.com/shop/shop
 displaycategories.asp
 Now the URL will be like this
  ****://***.victim.com/shop/shoping140.mdb
 If you don’t download the database try this
 the URL will be
  ****://***.victim.com/sp/resx/shoping1   40.mdb
 If u see error messg try this
    ***://***.victim.com/shop/shopping 500.m db
 download mdb file
 Admin page is usually located here
 ***://***victim.com/shop/shopadmin.asp
Hacking windows X-P:
 Boot the pc in safe mode
 Select the safe mode option
 Try rebooting pc in DOS
 Now, Access to
  c:Windowssysytem32configSAM
 Rename SAM as SAM.mj
 Go to cmd prompt and type next user
 Hold Ctrl+Alt key and press DEL twice
Conclusion:
 The role of ETHICAL HACKING in security is to
 provide customers with awareness of how they could
 potentially be attacked and why they would be
 targeted. The only way to anticipate the actions of a
 hacker is to act like the hacker.
PRESENTED BY-
A.SIRISHA
M.MANJEERA

Weitere ähnliche Inhalte

Andere mochten auch (12)

Final PhD Seminar
Final PhD SeminarFinal PhD Seminar
Final PhD Seminar
 
Softskill brief description,the way to change our attitude
Softskill brief description,the way to change our attitudeSoftskill brief description,the way to change our attitude
Softskill brief description,the way to change our attitude
 
Variational Bayes
Variational BayesVariational Bayes
Variational Bayes
 
Bayesian modelling and computation for Raman spectroscopy
Bayesian modelling and computation for Raman spectroscopyBayesian modelling and computation for Raman spectroscopy
Bayesian modelling and computation for Raman spectroscopy
 
Wearable computer
Wearable computerWearable computer
Wearable computer
 
Brain fingerprinting tech
Brain fingerprinting techBrain fingerprinting tech
Brain fingerprinting tech
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Oracle Sql & PLSQL Complete guide
Oracle Sql & PLSQL Complete guideOracle Sql & PLSQL Complete guide
Oracle Sql & PLSQL Complete guide
 
Surface computing by raviteja
Surface computing by ravitejaSurface computing by raviteja
Surface computing by raviteja
 
Brain gate
Brain gateBrain gate
Brain gate
 
Testing fundamentals
Testing fundamentalsTesting fundamentals
Testing fundamentals
 
Image processing ppt
Image processing pptImage processing ppt
Image processing ppt
 

Ähnlich wie Ethical hacking (2)

Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxDrMajidMumtaz
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptricagip499
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
Columbus WordCamp 2015
Columbus WordCamp 2015Columbus WordCamp 2015
Columbus WordCamp 2015Jason Packer
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedfangjiafu
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hackingSahil Rai
 
Hacking and cracking
Hacking and crackingHacking and cracking
Hacking and crackingDeepak kumar
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itZoltan Balazs
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTDHRUV562167
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profitDavid Stockton
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1rayborg
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeJeremiah Grossman
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...CODE BLUE
 
Securious talk at the SWCSC event on 24th Feb 2016.
Securious talk at the SWCSC event on 24th Feb 2016.Securious talk at the SWCSC event on 24th Feb 2016.
Securious talk at the SWCSC event on 24th Feb 2016.Peter Jones
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profitDavid Stockton
 

Ähnlich wie Ethical hacking (2) (20)

Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptx
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Columbus WordCamp 2015
Columbus WordCamp 2015Columbus WordCamp 2015
Columbus WordCamp 2015
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Hacking and cracking
Hacking and crackingHacking and cracking
Hacking and cracking
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profit
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
 
Securious talk at the SWCSC event on 24th Feb 2016.
Securious talk at the SWCSC event on 24th Feb 2016.Securious talk at the SWCSC event on 24th Feb 2016.
Securious talk at the SWCSC event on 24th Feb 2016.
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profit
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Ethical hacking (2)

  • 1.
  • 2. What is ethical hacking? Ethical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems.
  • 3. History  Kevin mitnic(1995)  Gary mckinnon (2002)
  • 4. Hacking methods: Brute force hack Fake login hack Cookie steal hack Web mail hack
  • 5. Types of hackers:  white hat hacker  grey hat hacker  black hat hacker
  • 6. Hacking with ethics Hacking website: • open the website u want to hack • Provide wrong user name and password • Right click on the page->go to view source->html • Delete the java script from the source carefully • Give input=“password” type=“password” -> replace • File-> saveas->store inhard disk->goto saved page and open it ---->u can see some changes
  • 7.  Locally stored passwords  Trojan  Key logger  Impersonation Sniffing  Sniffing  Social engineering
  • 8. Basicneeds for hacking:  First u can learn about computers you are in much femeliar about HTML language
  • 9. CODE:  Learn about hardware , dos, batch files  Port scanning  Learn programming languages HTML,C++,Perl….etc  How to secure yourself  FTP(file transfer protocol)  TCP/IP,UDP,DHCP
  • 10. Shop admin hacking : Finding vp-asp 5.00  In google.com type vp-asp 5.00 and install software  Page will be like this ***://***.victim.com/shop/shop  displaycategories.asp  Now the URL will be like this ****://***.victim.com/shop/shoping140.mdb
  • 11.  If you don’t download the database try this  the URL will be ****://***.victim.com/sp/resx/shoping1 40.mdb  If u see error messg try this ***://***.victim.com/shop/shopping 500.m db  download mdb file  Admin page is usually located here ***://***victim.com/shop/shopadmin.asp
  • 12. Hacking windows X-P:  Boot the pc in safe mode  Select the safe mode option  Try rebooting pc in DOS  Now, Access to c:Windowssysytem32configSAM  Rename SAM as SAM.mj  Go to cmd prompt and type next user  Hold Ctrl+Alt key and press DEL twice
  • 13. Conclusion:  The role of ETHICAL HACKING in security is to provide customers with awareness of how they could potentially be attacked and why they would be targeted. The only way to anticipate the actions of a hacker is to act like the hacker.