SlideShare una empresa de Scribd logo
1 de 21
CAUTION
  HACKER A
           T
    WORK

Ethical Hacking
Hacking


• Hacking is an act of penetrating computer
  systems to gain knowledge about the system
  and how it works.

• Hacking is the act of gaining access without
  legal authorization to a computer or computer
  network or network resources.
Hacking means making something
work regardless of the circumstances
Hacking is not very complex
Ethical Hacking

• Ethical hacking is the use of hacking
  knowledge to attempt to enter a network to
  find its loopholes and back doors.

• It is often referred to as ‘legalized hacking’
  and yes it is indeed legal and can even reap a
  lot of profits for highly skilled individuals.
Hacker
• Hackers are actually computer enthusiasts who know
  a lot about computers and computer networks and
  use this knowledge with a criminal intent.

• He is a person who uses his hacking skills and tool
  sets for destructive or offensive purposes such as
  disseminating viruses or performing DoS attacks to
  compromise or bring down systems and networks.

• Hackers are sometimes paid to damage corporate
  reputations or steal or reveal credit-card information
Types of Hackers

• White hat –
   Good guys
   Don’t use their skills for illegal purposes
   Computer security experts

• Black hat –
    Bad guys
    Use their skills for illegal purposes
    Criminals
Types of Hackers
• Script kiddies –
    Wannabe hackers
    No technical skills
    Have no clue about what’s happening in

• Elite hackers –
    Usually professionals
    Develop new attacks/tools
Why perform an ethical hack?

   To determine flaws and vulnerabilities
   To provide a quantitative metric for evaluating
    systems and networks
   To measure against pre-established baselines
   To determine risk to the organization
   To design mitigating controls
Skills Required Becoming an Ethical Hacker

   Criminal mindset
   Thorough knowledge about Computer
    programming, Networking and operating
    systems. highly targeted platforms (such as
    Windows, Unix, and Linux), etc.
   Patience, persistence, and immense perseverance
Levels in Ethical Hacking
Ethical Hacking Steps
Footprinting
   Gathering information of target information
       Internet             Domain name, network
                            blocks, IP addresses open to
                            Net, TCP and UDP services
                            running, ACLs, IDSes

       Intranet             Protocols (IP,NETBIOS),
                            internal domain names, etc

       Remote access        Phone numbers, remote
                            control, telnet,
                            authentication

       Extranet             Connection origination,
                            destination, type, access
                            control
Scanning
   After obtaining a list of network and IP addresses
    scanning starts:
       ping sweeps (active machines): user pinger in Windows and
        nmap in Linux/UNIX. This is an example of pinger.

       TCP port scanning (open ports in active machines): SYN
        and connect scans work with most hosts. SYN is stealthier
        and may not be logged.

       In Windows NT use SuperScan and in Linux/UNIX use
        nmap. See an example of SuperScan. BUT, hackers use
        scripts with binary files, not graphical tools.
                                                                    14
Types of Scanning

    Scanning Type               Purpose

Port scanning         Determines open ports and
                      services

Network scanning      IP addresses


Vulnerability scanning Presence of known
                       weaknesses
Scanning Tools

■   Nmap
■   Nessus
■   SNMP Scanner
■   THC-Scan
■   Netscan
■   IPSecScan
Enumeration
• After scanning process and is the process of
  gathering and compiling usernames, machine
  names, network resources, shares, and
  services.
• It also refers to actively querying or
  connecting to a target system to acquire this
  information.
Attack
• SQL injection
• SQL injection is a code injection technique that
  exploits a security vulnerability occurring in the
  database layer of an application.

• The vulnerability is present when user input is either
  incorrectly filtered for string literal escape characters
  embedded in SQL statements or user input is not
  strongly typed and thereby unexpectedly executed.
SQL injection

• During a SQL injection attack, malicious code is
  inserted into a web form field or the website’s code to
  make a system execute a command shell or other
  arbitrary commands.
• Just as a legitimate user enters queries and additions
  to the SQL database via a web form, the hacker can
  insert commands to the SQL server through the same
  web form field.
Wireless Hacking Techniques

• Cracking encryption and authentication
  mechanism
• Eavesdropping or sniffing
• Denial of Service
• AP masquerading or spoofing
• MAC spoofing
Wi-Fi network security
• Use Strong Encryption Protocol
• Don’t Announce Yourself-Disable SSID
• Change Default Administrator Passwords and
  Usernames
• Limit Access To Your Access Point
• Do Not Auto-Connect to Open Wi-Fi Networks
• Assign Static IP Addresses to Devices
• Enable Firewalls On Each Computer and the Router
• Position the Router or Access Point Safe

Más contenido relacionado

La actualidad más candente

La actualidad más candente (19)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
 
An Introduction to Ethical Hacking
An Introduction to Ethical HackingAn Introduction to Ethical Hacking
An Introduction to Ethical Hacking
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking by shivam
Ethical hacking by shivamEthical hacking by shivam
Ethical hacking by shivam
 
Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing
 

Similar a Ethical Hacking

324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
ssuserde23af
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 

Similar a Ethical Hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Phases of penetration testing
Phases of penetration testingPhases of penetration testing
Phases of penetration testing
 
Ethical hacking presentation.pptx
Ethical hacking presentation.pptxEthical hacking presentation.pptx
Ethical hacking presentation.pptx
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
An Toan Thong Tin.pptx
An Toan Thong Tin.pptxAn Toan Thong Tin.pptx
An Toan Thong Tin.pptx
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Ethical Hacking

  • 1. CAUTION HACKER A T WORK Ethical Hacking
  • 2. Hacking • Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works. • Hacking is the act of gaining access without legal authorization to a computer or computer network or network resources.
  • 3. Hacking means making something work regardless of the circumstances
  • 4. Hacking is not very complex
  • 5. Ethical Hacking • Ethical hacking is the use of hacking knowledge to attempt to enter a network to find its loopholes and back doors. • It is often referred to as ‘legalized hacking’ and yes it is indeed legal and can even reap a lot of profits for highly skilled individuals.
  • 6. Hacker • Hackers are actually computer enthusiasts who know a lot about computers and computer networks and use this knowledge with a criminal intent. • He is a person who uses his hacking skills and tool sets for destructive or offensive purposes such as disseminating viruses or performing DoS attacks to compromise or bring down systems and networks. • Hackers are sometimes paid to damage corporate reputations or steal or reveal credit-card information
  • 7. Types of Hackers • White hat –  Good guys  Don’t use their skills for illegal purposes  Computer security experts • Black hat –  Bad guys  Use their skills for illegal purposes  Criminals
  • 8. Types of Hackers • Script kiddies –  Wannabe hackers  No technical skills  Have no clue about what’s happening in • Elite hackers –  Usually professionals  Develop new attacks/tools
  • 9. Why perform an ethical hack?  To determine flaws and vulnerabilities  To provide a quantitative metric for evaluating systems and networks  To measure against pre-established baselines  To determine risk to the organization  To design mitigating controls
  • 10. Skills Required Becoming an Ethical Hacker  Criminal mindset  Thorough knowledge about Computer programming, Networking and operating systems. highly targeted platforms (such as Windows, Unix, and Linux), etc.  Patience, persistence, and immense perseverance
  • 11. Levels in Ethical Hacking
  • 13. Footprinting  Gathering information of target information Internet Domain name, network blocks, IP addresses open to Net, TCP and UDP services running, ACLs, IDSes Intranet Protocols (IP,NETBIOS), internal domain names, etc Remote access Phone numbers, remote control, telnet, authentication Extranet Connection origination, destination, type, access control
  • 14. Scanning  After obtaining a list of network and IP addresses scanning starts:  ping sweeps (active machines): user pinger in Windows and nmap in Linux/UNIX. This is an example of pinger.  TCP port scanning (open ports in active machines): SYN and connect scans work with most hosts. SYN is stealthier and may not be logged.  In Windows NT use SuperScan and in Linux/UNIX use nmap. See an example of SuperScan. BUT, hackers use scripts with binary files, not graphical tools. 14
  • 15. Types of Scanning Scanning Type Purpose Port scanning Determines open ports and services Network scanning IP addresses Vulnerability scanning Presence of known weaknesses
  • 16. Scanning Tools ■ Nmap ■ Nessus ■ SNMP Scanner ■ THC-Scan ■ Netscan ■ IPSecScan
  • 17. Enumeration • After scanning process and is the process of gathering and compiling usernames, machine names, network resources, shares, and services. • It also refers to actively querying or connecting to a target system to acquire this information.
  • 18. Attack • SQL injection • SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. • The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed.
  • 19. SQL injection • During a SQL injection attack, malicious code is inserted into a web form field or the website’s code to make a system execute a command shell or other arbitrary commands. • Just as a legitimate user enters queries and additions to the SQL database via a web form, the hacker can insert commands to the SQL server through the same web form field.
  • 20. Wireless Hacking Techniques • Cracking encryption and authentication mechanism • Eavesdropping or sniffing • Denial of Service • AP masquerading or spoofing • MAC spoofing
  • 21. Wi-Fi network security • Use Strong Encryption Protocol • Don’t Announce Yourself-Disable SSID • Change Default Administrator Passwords and Usernames • Limit Access To Your Access Point • Do Not Auto-Connect to Open Wi-Fi Networks • Assign Static IP Addresses to Devices • Enable Firewalls On Each Computer and the Router • Position the Router or Access Point Safe