SlideShare a Scribd company logo
1 of 28
ETHICAL HACKING

    PRESENTED
         BY
 SWETA LEENA PANDA
HIGHLIGHTS

•   Who is hacker
•   Different kinds of system attacks
•   Required Skills of an Ethical Hacker
•   Methodology of Hacking:
•   Virus Types
•   Security & Counter Measures
•   Advantages & Disadvantages
WHO IS HACKER

• A person who enjoys learning details
  of a programming language or
• system
• A person who enjoys actually doing the
  programming rather than
  just theorizing about it
• A person capable of appreciating
  someone else's hacking
• A person who picks up programming
  quickly
• A person who is an expert at a
  particular programming language or
  system.
Different kinds of system
          attacks
Required Skills of an Ethical
           Hacker
• Microsoft: skills in operation,
  configuration and management.

• Linux: knowledge of Linux/Unix;
  security setting, configuration, and
  services.

• Firewalls: configurations, and operation
  of intrusion detection systems.
• Routers: knowledge of routers, routing
  protocols, and access control lists
  Mainframes
• Network Protocols: TCP/IP; how they
  function and can be manipulated.
• Project Management: leading, planning,
  organizing, and controlling a
  penetration testing team
Methodology of Hacking:

•   Reconnaissance
•   Scanning & Enumeration
•   Gaining access
•   Maintaining access
•   clearing tracks
Reconnaissance:
• The literal meaning of the word
  reconnaissance means a preliminary
  survey to gain information. This is also
  known as foot-printing. This is the first
  stage in the methodology of hacking.
Scanning &Enumeration
• Scanning is the second phase in the
  hacking methodology in which
• the hacker tries to make a blue print of
  the target network.
Enumeration
• Enumeration is the ability of a hacker
  to convince some servers to give them
  information that is vital to them to
  make an attack.
Gaining access
• This is the actual hacking phase in
  which the hacker gains access to the
  system. The hacker will make use of all
  the information he collected in the pre-
  attacking phases.
Maintaining Access
• Now the hacker is inside the system by
  some means by password guessing or
  exploiting some of its vulnerabilities .In
  the network scenario the hacker will do
  it by uploading some software like
  Trojan horses, sniffers, key stroke
  loggers etc.
Clearing Tracks

• Now we come to the final step in the
  hacking. There is a saying that
  everybody knows a good hacker but
  nobody knows a great hacker .
Virus Types
VIRUS

A program that when run, has the ability
to self-replicate by infecting other
programs and files on your computer.
The word virus has incorrectly become
a general term that encompasses
Trojans, worms, and viruses.
Boot Sector Virus
Boot sector viruses infect either the
master boot record of the hard disk or
the floppy drive.
Examples of boot- sector viruses are
Michelangelo and Stoned.
File or Program Viruses
Some files/programs, when executed,
load the virus in the memory and
perform predefined functions to infect
the system. They infect program files
with extensions like .EXE, .COM,
.BIN, .DRV and .SYS .

Some common file viruses are Sunday,
Cascade.
Multipartite Viruses
• A multipartite virus is a computer virus that
  infects multiple different target platforms,
  and remains recursively infective in each
  target.
• Ghostball was the first multipartite virus,
  discovered by Fridrik Skulason in October
  1989.
  Other examples are Invader, Flip, etc.
Stealth Viruses

These viruses are stealthy in nature
means it uses various methods for
hiding themselves to avoid detection.
They sometimes remove themselves
from the memory temporarily to avoid
detection by antivirus.
Polymorphic Viruses
Polymorphic viruses have the ability to
mutate implying that they change the
viral code known as the signature each
time they spread or infect. Thus an
antivirus program which is scanning
for specific virus codes unable to
detect it's presence.
Macro Viruses
A macro virus is a computer virus that
"infects" a Microsoft Word or similar
application and causes a sequence of
actions to be performed automatically.
A macro virus is often spread as an e-
mail virus. Well-known examples are
Concept Virus and Melissa Worm.
Security & Counter Measures
 Use of anti-viruses.
 Proper logout after use of mail id.
 Manual opening browser
 don't open spam.
 Password protected admin account.
 Patch security hole often
 Encrypt important data
    Ex) pgp, ssh
 Do not run unused daemon
 Remove unused setuid/setgid program
 Setup loghost

   Backup the system often
 Setup firewall
 Setup IDS
    Ex) snort
Hacking prone areas
Advantages

 Provides security to banking and
  financial establishments
 Prevents website defacements
 An evolving technique
 To catch a thief you have to think like a
  thief
Disadvantages
 All depends upon the trustworthiness
  of the ethical hacker
 Hiring professionals is expensive.
Please send suggestions and feedbacks
     I am waiting for your replay.
           THANK YOU

More Related Content

What's hot

What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationSecurity Innovation
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Securitypadmeshagrekar
 
Information Assurance And Security - Chapter 2 - Lesson 3
Information Assurance And Security - Chapter 2 - Lesson 3Information Assurance And Security - Chapter 2 - Lesson 3
Information Assurance And Security - Chapter 2 - Lesson 3MLG College of Learning, Inc
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmmandynova
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Practical Incident Response - Work Guide
Practical Incident Response - Work GuidePractical Incident Response - Work Guide
Practical Incident Response - Work GuideEduardo Chavarro
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityGeevarghese Titus
 
Cambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksCambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksAPNIC
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 

What's hot (19)

What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 
OSCh19
OSCh19OSCh19
OSCh19
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Information Assurance And Security - Chapter 2 - Lesson 3
Information Assurance And Security - Chapter 2 - Lesson 3Information Assurance And Security - Chapter 2 - Lesson 3
Information Assurance And Security - Chapter 2 - Lesson 3
 
Malware
MalwareMalware
Malware
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Practical Incident Response - Work Guide
Practical Incident Response - Work GuidePractical Incident Response - Work Guide
Practical Incident Response - Work Guide
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksCambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacks
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 

Viewers also liked (7)

BRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAMEBRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAME
 
DrData
DrDataDrData
DrData
 
DrData Project
DrData ProjectDrData Project
DrData Project
 
MARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATIONMARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATION
 
Personality
PersonalityPersonality
Personality
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 

Similar to ETHICAL HACKING

Similar to ETHICAL HACKING (20)

Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Regression
RegressionRegression
Regression
 
Sangeetha Venture
Sangeetha VentureSangeetha Venture
Sangeetha Venture
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdf
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malicious
MaliciousMalicious
Malicious
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
Introduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf fileIntroduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf file
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 

More from Sweta Leena Panda

ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management Sweta Leena Panda
 
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Sweta Leena Panda
 
SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR Sweta Leena Panda
 
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYGOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYSweta Leena Panda
 
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIESMARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES Sweta Leena Panda
 
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR Sweta Leena Panda
 

More from Sweta Leena Panda (20)

ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management
 
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
BRAND CRISIS
BRAND CRISIS BRAND CRISIS
BRAND CRISIS
 
SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR
 
TALENT MANAGEMENT
TALENT MANAGEMENT TALENT MANAGEMENT
TALENT MANAGEMENT
 
BUSINESS ETHICS
BUSINESS ETHICSBUSINESS ETHICS
BUSINESS ETHICS
 
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYGOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
 
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIESMARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
 
SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING
 
CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR
 
CRAFT BUSINESS
CRAFT BUSINESS CRAFT BUSINESS
CRAFT BUSINESS
 
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
 
INDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTORINDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTOR
 
Job Analysis of Operation
Job Analysis of Operation Job Analysis of Operation
Job Analysis of Operation
 
Orion'16 presentation
Orion'16  presentationOrion'16  presentation
Orion'16 presentation
 
RETAIL DESIGN
RETAIL DESIGN RETAIL DESIGN
RETAIL DESIGN
 
RETAIL MANAGEMENT IN INDIA
RETAIL MANAGEMENT IN INDIARETAIL MANAGEMENT IN INDIA
RETAIL MANAGEMENT IN INDIA
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

ETHICAL HACKING

  • 1. ETHICAL HACKING PRESENTED BY SWETA LEENA PANDA
  • 2. HIGHLIGHTS • Who is hacker • Different kinds of system attacks • Required Skills of an Ethical Hacker • Methodology of Hacking: • Virus Types • Security & Counter Measures • Advantages & Disadvantages
  • 3. WHO IS HACKER • A person who enjoys learning details of a programming language or • system • A person who enjoys actually doing the programming rather than just theorizing about it
  • 4. • A person capable of appreciating someone else's hacking • A person who picks up programming quickly • A person who is an expert at a particular programming language or system.
  • 5. Different kinds of system attacks
  • 6. Required Skills of an Ethical Hacker • Microsoft: skills in operation, configuration and management. • Linux: knowledge of Linux/Unix; security setting, configuration, and services. • Firewalls: configurations, and operation of intrusion detection systems.
  • 7. • Routers: knowledge of routers, routing protocols, and access control lists Mainframes • Network Protocols: TCP/IP; how they function and can be manipulated. • Project Management: leading, planning, organizing, and controlling a penetration testing team
  • 8. Methodology of Hacking: • Reconnaissance • Scanning & Enumeration • Gaining access • Maintaining access • clearing tracks
  • 9. Reconnaissance: • The literal meaning of the word reconnaissance means a preliminary survey to gain information. This is also known as foot-printing. This is the first stage in the methodology of hacking.
  • 10. Scanning &Enumeration • Scanning is the second phase in the hacking methodology in which • the hacker tries to make a blue print of the target network.
  • 11. Enumeration • Enumeration is the ability of a hacker to convince some servers to give them information that is vital to them to make an attack.
  • 12. Gaining access • This is the actual hacking phase in which the hacker gains access to the system. The hacker will make use of all the information he collected in the pre- attacking phases.
  • 13. Maintaining Access • Now the hacker is inside the system by some means by password guessing or exploiting some of its vulnerabilities .In the network scenario the hacker will do it by uploading some software like Trojan horses, sniffers, key stroke loggers etc.
  • 14. Clearing Tracks • Now we come to the final step in the hacking. There is a saying that everybody knows a good hacker but nobody knows a great hacker .
  • 16. VIRUS A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. The word virus has incorrectly become a general term that encompasses Trojans, worms, and viruses.
  • 17. Boot Sector Virus Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. Examples of boot- sector viruses are Michelangelo and Stoned.
  • 18. File or Program Viruses Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS . Some common file viruses are Sunday, Cascade.
  • 19. Multipartite Viruses • A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. • Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989. Other examples are Invader, Flip, etc.
  • 20. Stealth Viruses These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus.
  • 21. Polymorphic Viruses Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presence.
  • 22. Macro Viruses A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically. A macro virus is often spread as an e- mail virus. Well-known examples are Concept Virus and Melissa Worm.
  • 23. Security & Counter Measures  Use of anti-viruses.  Proper logout after use of mail id.  Manual opening browser  don't open spam.  Password protected admin account.
  • 24.  Patch security hole often  Encrypt important data  Ex) pgp, ssh  Do not run unused daemon  Remove unused setuid/setgid program  Setup loghost Backup the system often  Setup firewall  Setup IDS  Ex) snort
  • 26. Advantages  Provides security to banking and financial establishments  Prevents website defacements  An evolving technique  To catch a thief you have to think like a thief
  • 27. Disadvantages  All depends upon the trustworthiness of the ethical hacker  Hiring professionals is expensive.
  • 28. Please send suggestions and feedbacks I am waiting for your replay. THANK YOU