SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Ethical Hacking
PRESENTED BY :-
SWETA LEENA PANDA
HACKER
CONTENT
♩ Overview of Hacking
♩ Types of hacking
♩ Hacker
♩ Types of Hacker
♩ Why do hackers hack?
♩ How can kid hack?
♩ What does a script kid know?
♩ Hackers language
♩ How to translate the hackers’ language
♩ Ethical Hacking
♩ Ethical Hacking – Process
♩ What hackers do after hacking?
♩ Why can’t defend against hackers?
♩ How can protect the system?
♩ What should do after hacked?
♩ Final words
overview of hacking
♩ Hack
   – Examine something very minutely
   – the rapid crafting of a new program or the making of
     changes to existing, usually complicated software
♩ Hacker
   – The person who hacks
♩ Cracker
   – System intruder/destroyer
HACKER
♩ Someone who bypasses the system’s access controls by
  taking advantage of security weaknesses left in the system
  by developers
♩ Person who is totally immersed in computer technology
  and programming, and who likes to examine the code of
  programs to see how they work 
 then uses his or her
  computer expertise for illicit purposes such as gaining
  access to computer systems without permission and
  tampering with programs and data. At that point, this
  individual would steal information and install backdoors,
  virus and Trojans
♩ Hacker means cracker nowadays.
Types of hacker
♩ White Hat Hackers:
   – who specializes in penetration testing and in other testing
     methodologies to ensure the security of an organization's
     information systems.
♩ Black Hat Hackers:
   – A black hat is the villain or bad guy, especially in a western
     movie in which such a character would stereotypically wear a
     black hat in contrast to the hero's white hat.
♩ Gray Hat Hackers:
   – A grey hat, in the hacking community, refers to a skilled hacker
     whose activities fall somewhere between white and black hat
     hackers on a variety of spectra
Types of hacker
♩ Script Kiddies:
   – who use scripts or programs developed by others to attack
     computer systems and networks and deface websites. [
♩ Phreak
   – Person who breaks into telecommunications systems to [commit]
     theft
♩ Cyber Punk
   – Recent mutation of 
 the hacker, cracker, and phreak
Why do people hack??
♩ To make security stronger ( Ethical Hacking
  )
♩ Just for fun
♩ Show off
♩ Hack other systems secretly
♩ Notify many people their thought
♩ Steal important information
♩ Destroy enemy’s computer network during
  the war
How can kid hack?
♩ Kid has much of time
   – Kid can search for longer time than other people
♩ All hacking program is easy to use
♩ Kid doesn’t have to know how the hacking program works
♩ These kids are called script kiddies
Hackers language :
1 -> i or l     || -> n
3 -> e          |/| -> m
4 -> a          s -> z
7 -> t          z -> s
9 -> g          f -> ph
0 -> o          ph -> f
$ -> s          x -> ck
| -> i or       ck -> x
What is Ethical Hacking
♩ It is Legal
♩ Permission is obtained from the target
♩ Part of an overall security program
♩ Identify vulnerabilities visible from Internet
  at particular point of time
♩ Ethical hackers possesses same skills,
  mindset and tools of a hacker but the attacks
  are done in a non-destructive manner
♩ Also Called – Attack & Penetration Testing,
Hackers language translation
EXAMPLE:-
    Hacking is good




       H4ck|||g 1$ 900d
Hacking - Process
1. Preparation
2. Foot printing
3. Enumeration & Fingerprinting
4. Identification of Vulnerabilities
5. Attack – Exploit the Vulnerabilities
6. Gaining Access
7. Escalating privilege
8. Covering tracks
9. Creating back doors
Preparation
♩ Identification of Targets – company websites, mail servers,
  extranets, etc.
♩ Signing of Contract
   –   Agreement on protection against any legal issues
   –   Contracts to clearly specifies the limits and dangers of the test
   –   Specifics on Denial of Service Tests, Social Engineering, etc.
   –   Time window for Attacks
   –   Total time for the testing
   –   Prior Knowledge of the systems
   –   Key people who are made aware of the testing
Foot printing
Collecting as much information about the
  target
 DNS Servers
 IP Ranges
 Administrative Contacts
 Problems revealed by administrators
Information Sources
♩ Search engines
♩ Forums
♩ Databases – whois,
♩ Tools – PING, whois, Traceroute, nslookup
Enumeration & Fingerprinting
♩ Specific targets determined
♩ Identification of Services / open ports
♩ Operating System Enumeration


Methods
 Banner grabbing
 Responses to various protocol (ICMP
  &TCP) commands
 Port / Service Scans – TCP Connect, TCP
  SYN, TCP FIN, etc.
Identification of Vulnerabilities
Vulnerabilities:
 It is a weakness which allows an attacker to
  reduce a system's information assurance.
♩ Insecure Configuration
♩ Weak passwords
♩ Unpatched vulnerabilities in services,
  Operating systems, applications
♩ Possible Vulnerabilities in Services,
  Operating Systems
♩ Insecure programming,Weak Access
Tools
Vulnerability Scanners - Nessus, ISS, SARA,
  SAINT
Listening to Traffic – Ethercap, tcpdump
Password Crackers – John the ripper, LC4,
  Pwdump
Intercepting Web Traffic – Achilles, Whisker,
  Legion
Gaining access:
♩ Enough data has been gathered at this point to make an informed
  attempt to access the target
♩ Techniques
   – Password eavesdropping
   – File share brute forcing
   – Password file grab
   – Buffer overflows
Escalating Privileges
♩ If only user-level access was obtained in the last step, the attacker will
  now seek to gain complete control of the system
♩ Techniques
   – Password cracking
   – Known exploits
Covering Tracks
♩ Once total ownership of the target is
  secured, hiding this fact from system
  administrators becomes paramount, lest
  they quickly end the romp.
♩ Techniques
  – Clear logs
  – Hide tools
Creating Back Doors
♩ Trap doors will be laid in various parts of the system to ensure that
  privileged access is easily regained at the whim of the intruder
♩ Techniques
   – Create rogue user accounts
   – Schedule batch jobs
   – Infect startup files
   – Plant remote control services
   – Install monitoring mechanisms
   – Replace apps with trojans
Denial of Service
♩  If an attacker is unsuccessful in gaining access, they may use readily
  available exploit code to disable a target as a last resort
♩ Techniques
    – SYN flood
    – ICMP techniques
    – Identical SYN requests
    – Overlapping fragment/offset bugs
    – Out of bounds TCP options (OOB)
    – DDoS
What do hackers do after hacking?
♩ Patch security hole
   – The other hackers can’t intrude
♩ Clear logs and hide themselves
♩ Install rootkit ( backdoor )
   – The hacker who hacked the system can use the system later
   – It contains trojan virus, and so on
♩ Install irc related program
   – identd, irc, bitchx, eggdrop, bnc
♩ Install scanner program
   – mscan, sscan, nmap
♩ Install exploit program
♩ Install denial of service program
♩ Use all of installed programs silently
How can protect the system?
 Patch security hole often
 Encrypt important data
    Ex) pgp, ssh
 Do not run unused daemon
 Remove unused setuid/setgid program
 Setup loghost


   ‱ Backup the system often
 Setup firewall
 Setup IDS
    Ex) snort
What should do after hacked?
♩ Shutdown the system
   – Or turn off the system
♩ Separate the system from network
♩ Restore the system with the backup
   – Or reinstall all programs
♩ Connect the system to the network
H4CKING VS CR4CKING

♩ HACKING WITH MALICIOUS
 INTENTION IS CRACKING
The basic difference is hackers do not do
 anything disastrous.
Cracking yield more devastating results.
Cracking is crime.
Cyber crime are the results of cracking ,not
 hacking
H4cking prone areas
Please send suggestions and feedbacks
I am waiting for your replay.
           THANK YOU

Weitere Àhnliche Inhalte

Was ist angesagt?

Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )Elipeta Sotabento
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testingMohit Belwal
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chainAnkita Ganguly
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 

Was ist angesagt? (20)

Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ceh v5 module 02 footprinting
Ceh v5 module 02 footprintingCeh v5 module 02 footprinting
Ceh v5 module 02 footprinting
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testing
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Reconnaissance
ReconnaissanceReconnaissance
Reconnaissance
 

Andere mochten auch

TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
BRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAMEBRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAMESweta Leena Panda
 
How to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyHow to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyTan
 
Puppy Pendrive
Puppy PendrivePuppy Pendrive
Puppy PendriveMohan R
 
MARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATIONMARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATIONSweta Leena Panda
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hackingsatish kumar
 
Towards open and reproducible neuroscience in the age of big data
Towards open and  reproducible neuroscience in the age of big dataTowards open and  reproducible neuroscience in the age of big data
Towards open and reproducible neuroscience in the age of big dataKrzysztof Gorgolewski
 
Installation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvdInstallation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvdgourav kottawar
 
blue_eye_technology_jeevagan
blue_eye_technology_jeevaganblue_eye_technology_jeevagan
blue_eye_technology_jeevaganjeevagan nagarajan
 
Real people and real politics
Real people and real politicsReal people and real politics
Real people and real politicsNewsworks
 

Andere mochten auch (20)

TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking
HackingHacking
Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
BRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAMEBRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAME
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
DrData Project
DrData ProjectDrData Project
DrData Project
 
DrData
DrDataDrData
DrData
 
How to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyHow to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easily
 
Puppy Pendrive
Puppy PendrivePuppy Pendrive
Puppy Pendrive
 
MARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATIONMARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATION
 
Personality
PersonalityPersonality
Personality
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Marketing intelliegence How to know more
Marketing intelliegence How to know moreMarketing intelliegence How to know more
Marketing intelliegence How to know more
 
Crownpoint church of Christ
Crownpoint church of ChristCrownpoint church of Christ
Crownpoint church of Christ
 
Towards open and reproducible neuroscience in the age of big data
Towards open and  reproducible neuroscience in the age of big dataTowards open and  reproducible neuroscience in the age of big data
Towards open and reproducible neuroscience in the age of big data
 
Installation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvdInstallation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvd
 
blue_eye_technology_jeevagan
blue_eye_technology_jeevaganblue_eye_technology_jeevagan
blue_eye_technology_jeevagan
 
Real people and real politics
Real people and real politicsReal people and real politics
Real people and real politics
 

Ähnlich wie Ethical Hacking Guide Covering Footprinting, Vulnerabilities, Gaining Access

Ethical hacking
Ethical hackingEthical hacking
Ethical hackingRishabha Garg
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingANURAG CHAKRABORTY
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Gopal Rathod
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingRavi Rajput
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testingchampubhaiya8
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.pptssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.pptssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.pptssuserde23af
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPrasad Pawar
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
ethical hacking
ethical hackingethical hacking
ethical hackingNeelima Bawa
 

Ähnlich wie Ethical Hacking Guide Covering Footprinting, Vulnerabilities, Gaining Access (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575
 
Ethical hacking by shivam
Ethical hacking by shivamEthical hacking by shivam
Ethical hacking by shivam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
ethical Hack
ethical Hackethical Hack
ethical Hack
 
Wm4
Wm4Wm4
Wm4
 
Wm4
Wm4Wm4
Wm4
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 

Mehr von Sweta Leena Panda

ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management Sweta Leena Panda
 
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Sweta Leena Panda
 
SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR Sweta Leena Panda
 
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYGOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYSweta Leena Panda
 
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIESMARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES Sweta Leena Panda
 
SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING Sweta Leena Panda
 
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR Sweta Leena Panda
 
INDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTORINDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTORSweta Leena Panda
 
Job Analysis of Operation
Job Analysis of Operation Job Analysis of Operation
Job Analysis of Operation Sweta Leena Panda
 
RETAIL MANAGEMENT IN INDIA
RETAIL MANAGEMENT IN INDIARETAIL MANAGEMENT IN INDIA
RETAIL MANAGEMENT IN INDIA Sweta Leena Panda
 

Mehr von Sweta Leena Panda (20)

ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management
 
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
BRAND CRISIS
BRAND CRISIS BRAND CRISIS
BRAND CRISIS
 
SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR
 
TALENT MANAGEMENT
TALENT MANAGEMENT TALENT MANAGEMENT
TALENT MANAGEMENT
 
BUSINESS ETHICS
BUSINESS ETHICSBUSINESS ETHICS
BUSINESS ETHICS
 
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYGOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
 
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIESMARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
 
SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING
 
CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR
 
CRAFT BUSINESS
CRAFT BUSINESS CRAFT BUSINESS
CRAFT BUSINESS
 
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
 
INDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTORINDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTOR
 
Job Analysis of Operation
Job Analysis of Operation Job Analysis of Operation
Job Analysis of Operation
 
Orion'16 presentation
Orion'16  presentationOrion'16  presentation
Orion'16 presentation
 
RETAIL DESIGN
RETAIL DESIGN RETAIL DESIGN
RETAIL DESIGN
 
RETAIL MANAGEMENT IN INDIA
RETAIL MANAGEMENT IN INDIARETAIL MANAGEMENT IN INDIA
RETAIL MANAGEMENT IN INDIA
 

KĂŒrzlich hochgeladen

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

KĂŒrzlich hochgeladen (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Ethical Hacking Guide Covering Footprinting, Vulnerabilities, Gaining Access

  • 1. Ethical Hacking PRESENTED BY :- SWETA LEENA PANDA
  • 3. CONTENT ♩ Overview of Hacking ♩ Types of hacking ♩ Hacker ♩ Types of Hacker ♩ Why do hackers hack? ♩ How can kid hack? ♩ What does a script kid know? ♩ Hackers language ♩ How to translate the hackers’ language
  • 4. ♩ Ethical Hacking ♩ Ethical Hacking – Process ♩ What hackers do after hacking? ♩ Why can’t defend against hackers? ♩ How can protect the system? ♩ What should do after hacked? ♩ Final words
  • 5. overview of hacking ♩ Hack – Examine something very minutely – the rapid crafting of a new program or the making of changes to existing, usually complicated software ♩ Hacker – The person who hacks ♩ Cracker – System intruder/destroyer
  • 6. HACKER ♩ Someone who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers ♩ Person who is totally immersed in computer technology and programming, and who likes to examine the code of programs to see how they work 
 then uses his or her computer expertise for illicit purposes such as gaining access to computer systems without permission and tampering with programs and data. At that point, this individual would steal information and install backdoors, virus and Trojans ♩ Hacker means cracker nowadays.
  • 7. Types of hacker ♩ White Hat Hackers: – who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. ♩ Black Hat Hackers: – A black hat is the villain or bad guy, especially in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat. ♩ Gray Hat Hackers: – A grey hat, in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra
  • 8. Types of hacker ♩ Script Kiddies: – who use scripts or programs developed by others to attack computer systems and networks and deface websites. [ ♩ Phreak – Person who breaks into telecommunications systems to [commit] theft ♩ Cyber Punk – Recent mutation of 
 the hacker, cracker, and phreak
  • 9. Why do people hack?? ♩ To make security stronger ( Ethical Hacking ) ♩ Just for fun ♩ Show off ♩ Hack other systems secretly ♩ Notify many people their thought ♩ Steal important information ♩ Destroy enemy’s computer network during the war
  • 10. How can kid hack? ♩ Kid has much of time – Kid can search for longer time than other people ♩ All hacking program is easy to use ♩ Kid doesn’t have to know how the hacking program works ♩ These kids are called script kiddies
  • 11. Hackers language : 1 -> i or l || -> n 3 -> e |/| -> m 4 -> a s -> z 7 -> t z -> s 9 -> g f -> ph 0 -> o ph -> f $ -> s x -> ck | -> i or ck -> x
  • 12. What is Ethical Hacking ♩ It is Legal ♩ Permission is obtained from the target ♩ Part of an overall security program ♩ Identify vulnerabilities visible from Internet at particular point of time ♩ Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner ♩ Also Called – Attack & Penetration Testing,
  • 13. Hackers language translation EXAMPLE:- Hacking is good H4ck|||g 1$ 900d
  • 14. Hacking - Process 1. Preparation 2. Foot printing 3. Enumeration & Fingerprinting 4. Identification of Vulnerabilities 5. Attack – Exploit the Vulnerabilities 6. Gaining Access 7. Escalating privilege 8. Covering tracks 9. Creating back doors
  • 15. Preparation ♩ Identification of Targets – company websites, mail servers, extranets, etc. ♩ Signing of Contract – Agreement on protection against any legal issues – Contracts to clearly specifies the limits and dangers of the test – Specifics on Denial of Service Tests, Social Engineering, etc. – Time window for Attacks – Total time for the testing – Prior Knowledge of the systems – Key people who are made aware of the testing
  • 16. Foot printing Collecting as much information about the target  DNS Servers  IP Ranges  Administrative Contacts  Problems revealed by administrators
  • 17. Information Sources ♩ Search engines ♩ Forums ♩ Databases – whois, ♩ Tools – PING, whois, Traceroute, nslookup
  • 18. Enumeration & Fingerprinting ♩ Specific targets determined ♩ Identification of Services / open ports ♩ Operating System Enumeration Methods  Banner grabbing  Responses to various protocol (ICMP &TCP) commands  Port / Service Scans – TCP Connect, TCP SYN, TCP FIN, etc.
  • 19. Identification of Vulnerabilities Vulnerabilities:  It is a weakness which allows an attacker to reduce a system's information assurance. ♩ Insecure Configuration ♩ Weak passwords ♩ Unpatched vulnerabilities in services, Operating systems, applications ♩ Possible Vulnerabilities in Services, Operating Systems ♩ Insecure programming,Weak Access
  • 20. Tools Vulnerability Scanners - Nessus, ISS, SARA, SAINT Listening to Traffic – Ethercap, tcpdump Password Crackers – John the ripper, LC4, Pwdump Intercepting Web Traffic – Achilles, Whisker, Legion
  • 21. Gaining access: ♩ Enough data has been gathered at this point to make an informed attempt to access the target ♩ Techniques – Password eavesdropping – File share brute forcing – Password file grab – Buffer overflows
  • 22. Escalating Privileges ♩ If only user-level access was obtained in the last step, the attacker will now seek to gain complete control of the system ♩ Techniques – Password cracking – Known exploits
  • 23. Covering Tracks ♩ Once total ownership of the target is secured, hiding this fact from system administrators becomes paramount, lest they quickly end the romp. ♩ Techniques – Clear logs – Hide tools
  • 24. Creating Back Doors ♩ Trap doors will be laid in various parts of the system to ensure that privileged access is easily regained at the whim of the intruder ♩ Techniques – Create rogue user accounts – Schedule batch jobs – Infect startup files – Plant remote control services – Install monitoring mechanisms – Replace apps with trojans
  • 25. Denial of Service ♩ If an attacker is unsuccessful in gaining access, they may use readily available exploit code to disable a target as a last resort ♩ Techniques – SYN flood – ICMP techniques – Identical SYN requests – Overlapping fragment/offset bugs – Out of bounds TCP options (OOB) – DDoS
  • 26. What do hackers do after hacking? ♩ Patch security hole – The other hackers can’t intrude ♩ Clear logs and hide themselves ♩ Install rootkit ( backdoor ) – The hacker who hacked the system can use the system later – It contains trojan virus, and so on ♩ Install irc related program – identd, irc, bitchx, eggdrop, bnc
  • 27. ♩ Install scanner program – mscan, sscan, nmap ♩ Install exploit program ♩ Install denial of service program ♩ Use all of installed programs silently
  • 28. How can protect the system?  Patch security hole often  Encrypt important data  Ex) pgp, ssh  Do not run unused daemon  Remove unused setuid/setgid program  Setup loghost ‱ Backup the system often  Setup firewall  Setup IDS  Ex) snort
  • 29. What should do after hacked? ♩ Shutdown the system – Or turn off the system ♩ Separate the system from network ♩ Restore the system with the backup – Or reinstall all programs ♩ Connect the system to the network
  • 30. H4CKING VS CR4CKING ♩ HACKING WITH MALICIOUS INTENTION IS CRACKING The basic difference is hackers do not do anything disastrous. Cracking yield more devastating results. Cracking is crime. Cyber crime are the results of cracking ,not hacking
  • 32. Please send suggestions and feedbacks I am waiting for your replay. THANK YOU