2. UNIT- I:
Introduction to Ethical Hacking: Hacking, Ethical Hacking, Difference
between the Ethical Hacking and Unethical Hacking. Types of Hackers,
Three parts of the web.
Foot printing: Objectives of Foot Printing, Understanding Foot Printing
concepts, Types of Foot printing, Foot Printing through search engines,
advanced Hacking techniques, Web services and social networking sites.
Understanding Web site Foot printing, E-mail Foot printing and
Competitive Intelligence. Understanding Whois, DNS and Network Foot
printing
3. UNIT – II
Foot printing Tools: Foot printing through Social Engineering, Understanding
different Foot Printing Tools-MALTEGO, RECON-NG and FOCA and Counter
Measures.
Scanning Networks: Overview of network scanning, understanding various
scanning tools-NMAP, ZEN MAP, angryip.org, PacketBuilder2.0, checking for live
systems, Scanning tools for mobile, Overview of scanning pen testing.
4. UNIT – III
Enumeration: What is enumeration? Understanding different techniques of enumeration-SNMP,
LDAP, NTP, and DNS.
Vulnerability analysis: Vulnerability research, Vulnerability classification, what is vulnerability
assessment-Nessus professional ,GFI languard, Openvas, Retina CS, Qualys free scan, Nitko,
Microsoft base line security analiser, automated vulnerable detection system, types of
vulnerability assessments, Exploit database, Types of vulnerability tools, Characteristics of a
good vulnerability assessment solution, Choosing a vulnerability tool, Criteria for choosing a
vulnerability assessment tool, Best practices for selecting vulnerability tools.
5. UNIT – IV
System Hacking: Overview of CEH Hacking methodology, understanding different
techniques to gain access to the system, privilege escalation techniques,
overview of different types of rootkits, techniques to hide the evidence of compromise,
system hacking penetration testing.
Password cracking: Types of password attacks, online tools to search default
passwords: default password.info, ZTE default usernames and passwords,
`Active online attack: Trojan/spyware/keyloggers, Password relevance tools.
6. UNIT – V
Malware threats: How hackers use Trojans, common ports used by trojans,
trojan horse construction kit, RIG exploit kit, command shell trojan, remote
access trojan, Study of spyrix.com, flaticon.com and anti-trojan software.
Sniffing: sniffing concepts, sniffing tools-Wireshark tool, oxid.it,
Sniffer detection techniques: PING and DNS methods.
Social Engineering: Understanding social engineering concepts, Social
Engineering Techniques, Insider Threats, Impersonation on Social
Networking Sites, Identity Theft, and countermeasures
7. UNIT – VI
Session Hijacking: Understanding Session Hijacking Concepts,
Application-Level Session Hijacking, Network Level Session Hijacking,
overview of Session Hijacking Tools, Understanding Countermeasures and
Penetration Testing.
SQL Injection: SQL Injection Concepts, Types of SQL Injection, SQL
Injection Methodology SQL Injection Tools, Evasion Techniques and
Countermeasure.
13. Hacking
Hacking is the act of compromising digital devices and networks
through unauthorized access to an account or computer system.
Hacking is not always a malicious act, but it is most commonly
associated with illegal activity and data theft by cyber criminals.
Hacking refers to the misuse of devices like computers,
smartphones, tablets, and networks to cause damage to or corrupt
systems, gather information on users, steal data and documents, or
disrupt data-related activity.
14. HACKER
They are powerful skilled individuals who break into the system by
bypassing the security measures to achieve a goal.
A person who performs hacking is called a hacker.
21. Green hat hacker
A green hat hacker is someone who is new to the hacking world but is
intently focused on increasing their cyberattack skills.
They primarily focus on gaining knowledge on how to perform
cyberattacks on the same level as their black hat counterparts.
Their main intent is to eventually evolve into a full-fledged hacker,
so they spend their time looking for learning opportunities from more
experienced hackers.
Motives: To learn how to become an experienced hacker
22. Blue hat hackers
Blue hat hackers are hired by organizations to bug-test a
new software or system network before it’s released. Their
role is to find loopholes or security vulnerabilities in
the new software and remedy them before it launches.
Motives: To identify vulnerabilities in new organizational
software before it’s released
23. Red Hat
Government-Hired Hackers
Red hat hackers are hired by government agencies to spot
vulnerabilities in security systems, with a specific focus
on finding and disarming black hat hackers.
They’re known to be particularly ruthless in their hunt for
black hat criminals, and typically use any means possible
to take them down. This often looks like using the same
tactics as black hat hackers and using them against them—
using the same malware, viruses and other strategies to
compromise their machines from the inside out.
24. Ethical Hacking
Ethical Hacking is performed by White Hat Hackers to find the
security vulnerabilities of the system and prevent the Black Hat
hackers from illegally infiltrating and stealing data from any
system.
The big organizations perform ethical hacking to test the
cybersecurity level and identify the weak points.
Ethical hacking is performed as per the rules and regulations set
by the legal authorities.
25. Unethical Hacking
Unethical Hacking or Black Hat hacking is performed by cybercriminals
with the false intention of stealing sensitive data, money, and access the
restricted networks and systems.
Such type of hacking is practiced to disrupt official website networks
and infiltrate communication between two or more parties.
Unethical hacking is hacking done by violating the rules and
regulations set by the legal authorities.
26. Difference between Ethical & unethical Hacking
S. No. Hacking Ethical Hacking
1.
Steal valuable information of
company and individual for illegal
activity
Hack system to reduce
vulnerabilities of company’s system
2.
Illegal practice and considered a
crime
Legal practice, authorized by the
company or individual
3.
Such types of hackers are called
black-hat hackers
Such types of hackers are called
white-hat hackers
4.
Such hackers try to access restricted
networks through illegal practices and
reduce the security of data.
Such hackers create firewalls and
security protocols.
5.
They work for themselves for dirty
money.
They work with different
government agencies and big tech
companies.
27. Parts of Web
The web is divided into three categories, which are
The Surface Web,
Deep Web, and
Dark Web
30. Surface Web:
The surface web is the normal web that is everyone knows and it is
visible for all users who use the internet.
The websites on the surface web are mostly indexed or promoted by
search engines. Google, Bing, Yahoo, etc.
All these are the search engines where users come and search the
content accordingly his/her needs.
The user can open websites and collect information. But the interesting
thing is that on the surface web have only 4% of the content is only
available for the general public in the entire ocean of the web.
The internet is a huge and vast amount of information but the big
amount of people don’t know. And they think only what they see only
this is the internet nothing else.
31. The deep web
The deep web is the secret web that is not visible for the normal user only who has
access and who is authorized can access and use the information.
It is a group of many different websites or many pages but they are not indexed by
search engines.
It is used to storing most personal information like Cloud storage, any Organization’s
Personal Data, and Military Data, etc.
32.
33. Deep web
Simple examples of deep web content include financial data, social security
databases, email inboxes, social media, medical documentation, legal files, blog
posts that are pending review and web page redesigns that are in progress.
The dark web technically speaking, is a subsection of the deep web
More than 200,000 websites exist on the deep web.
The volume of public data on the deep web is 400 to 500 times greater than that of
surface web.
The deep web hosts approximately 7,500 terabytes of data, compared to the
19 terabytes hosted on the surface web.
34. The dark web
The dark web also known as the darknet, it is an encrypted part of the internet that isn’t
indexed by search engines like Google, Bing, Yahoo, etc. The dark web is a
subdirectory of the deep web.
35. Dark web
Dark web pages need special software such as the Tor browser with the appropriate
decryption key, in addition to access rights and understanding of the place to find the content.
The Dark Web is composed of Networks and may only be accessed with special software
(based on the network you would like to connect to, together with TOR Network employing
the TOR proxy and proxy ) and specifically configured network settings, which means you
properly and anonymously connect with the Network.
36. Dark Web
The content on the dark web has the potential to be more
dangerous, this content is usually walled off from regular users.
However, it is entirely possible for regular users to accidentally
come across harmful content while browsing the deep web, which is
much more easily accessible.
37.
38. Hacking Phases
The following are the five phases of hacking: -
1. Reconnaissance
2. Scanning
3. Gaining Access
4. Maintaining Access
5. Clearing Tracks
39. 1. Reconnaissance
Reconnaissance is an initial preparing phase for the attacker
to get ready for an attack by gathering the information about
the target before launching an attack using different tools and
techniques.
Emp details, Ip address, domain names, sub domain names,
location, etc
40. Types of Reconnaissance
Passive Reconnaissance, the hacker is acquiring the information
about
target without interacting the target directly. An example of passive
reconnaissance is public or social media searching for gaining
information
about the target.
Active Reconnaissance is gaining information by acquiring the target
directly. Examples of active reconnaissance are via calls, emails, help
desk or
technical departments.
41. 2. Scanning
Scanning phase is a pre-attack phase.
In this phase, attacker scans the network by information acquired during
the initial phase of reconnaissance.
Scanning tools include Scanners such as Port scanners, Network
mappers, client tools such as ping, as well as vulnerabilities scanner.
During the scanning phase, attacker finally fetches the information of
ports including port status, operating system information, device
type, live machines, and other information depending upon
scanning.
42. 3. Gaining Access
Gaining access phase of hacking is the point where the hacker gets
the
control over an operating system, application or computer
network.
Techniques include password cracking, denial of service, session
hijacking or buffer overflow and others are used to gain
unauthorized access.
After accessing the system; the attacker escalates the privileges to
obtain complete control over services and process and compromise
the connected intermediate systems.
43. 4. Maintaining Access / Escalation of
Privileges
Maintaining access phase is the point when an attacker is trying to maintain
the access, ownership & control over the compromised systems.
Similarly, attacker prevents the owner from being owned by any other hacker.
They use Backdoors, Rootkits or Trojans to retain their ownership.
In this phase, an attacker may steal information by uploading the information to
the remote server, download any file on the resident system, and manipulate
the data and
configuration.
To compromise other systems, the attacker uses this compromised system to
launch attacks.
44. 5. Clearing Tracks
An attacker must hide his identity by covering the tracks. Covering tracks
are those activities which are carried out to hide the malicious
activities.
Covering track is most required for an attacker to fulfill their intentions by
continuing the access to the compromised system, remain undetected &
gain what they want, remain unnoticed and wipe all evidence that indicates
his identity.
To manipulate the identity and evidence, the attacker overwrites the system,
application, and other related logs to avoid suspicion.