SlideShare una empresa de Scribd logo
1 de 19
ETHICAL HACKING
        A LICENCE TO HACK
HACKING:

 Hacking is unauthorized use of computer and
  network resources.
 According to Computer Crime Research
  Center: “It is act of gaining access without
  legal authorization to computer or computer
  network.”
HACKER:

 Someone who tries to break into
  computer systems for any illegal
  purpose.
 Someone who maliciously breaks into systems
  for personal gain. These are criminals.
TYPES OF HACKERS

   Black hat hacker.
   White hat hacker.
   Gray hat hacker.
BLACK BOX MODEL

   Black box model
       Company staff does not know about the test.
       Tester is not given details about the network.
        ▪   Burden is on the tester to find these details

       It is tested, if security personnel are able to
        detect an attack.
WHITE BOX MODEL


   White box model
     Tester
           is told everything about the network
     topology and technology.
         Network diagram is given.

     Tester
          is authorized to interview IT personnel and
     company employees.
     Makes    the tester’s job a little easier.
GRAY BOX MODEL

   Gray box model
     Hybrid   of the white and black box models.
     Company     gives tester partial information.
WHAT IS ETHICAL HACKING ?
 Ethical hacking ,also known as penetration
  testing or white-hat hacking involves the
  same tools, tricks, and techniques that
  hackers use, i.e, by duplicating the intent
  and actions of malicious hackers.
 Ethical hacking is performed with the
  target’s permission.
WHO ARE ETHICAL HACKERS?
   An Ethical Hacker, also known as a whitehat
    hacker, or simply a whitehat, is a security
    professional who applies their hacking skills for
    defensive purposes on behalf of the owners of
    information systems.
   They are completely trustworthy.
   They have strong programming and computer
    networking skills.
   They should have more patience.
   Continuous updating of their knowledge on
    computer and network security is required.
   They should know the techniques of the criminals,
    what their activities would be, how to detected
    them and how to stop them.
REQUIRED SKILLS OF AN ETHICAL HACKER
 Routers: knowledge of routers,
  routing protocols, and access control
  lists.
 Microsoft: skills in operation,
  configuration and management.
 Linux: knowledge of Linux/Unix;
  security setting, configuration, and
  services.
 Firewalls: configurations, and
  operation of intrusion detection
  systems.
ETHICAL HACKING PROCESS

1.   Preparation
2.   Foot printing
3.   Enumeration and fingerprinting
4.   Identification of vulnerabilities
5.   Attack-exploit the vulnerabilities.
PREPARATION:

 Identification of target –company website, mail
  server, extranet.
 Signing of contract

 Agreement on protection against any legal
  issue.
 Contracts to clearly specify limits and dangers
  of the test.
 Total time for testing.

 Key people made aware of testing.
FOOTPRINTING

   Collecting required information about target:
    DNS server.
   IP ranges.
   Administrative contacts.
   Problem reveled by administrator.
ENUMERATION AND FINGERPRINTING

 Operating system enumeration.
 Identification of services/open port.
IDENTIFICATION OF VULNERABILITIES:

   Vulnerabilities
   Insecure configuration.
   Weak passwords.
   Insecure programming.
   Weak access control.
CERTIFICATION

The International Council of E-Commerce
 Consultants (EC-Council) provides a
 professional certification for Certified Ethical
 Hackers (CEH). A certified ethical hacker is
 an ethical hacker who has obtained the
 certification provided by the EC-Council.
ADVANTAGES

 These are good hackers
 Have genuine license to hack

 Generally owned by companies for security
  designing
 Provides security to banking and financial
  establishments
CONCLUSIONS

 Always security professionals are one step
  behind the hackers and crackers.
 Plan for the unplanned attacks.

 The role of ethical hacking in security is to
  provide customers with awareness of how
  they could be attacked and why they are
  targeted.
PRESENTED BY


          SAYANTAN SUR
            BCA(H) – 2

               THANK YOU

Más contenido relacionado

La actualidad más candente

Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilitiesebusinessmantra
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute forcevishalgohel12195
 
System hacking
System hackingSystem hacking
System hackingCAS
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paperBilal Hameed
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaEdureka!
 

La actualidad más candente (20)

Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilities
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
System hacking
System hackingSystem hacking
System hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Destacado

Validus holdings, ltd. (vr) company profile and swot analysis
Validus holdings, ltd. (vr)   company profile and swot analysisValidus holdings, ltd. (vr)   company profile and swot analysis
Validus holdings, ltd. (vr) company profile and swot analysisCompanyProfile123
 
Ontwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebbenOntwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebbenhrmatches
 
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabrasCatálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabrasJuan Albiñana
 
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...Eduardo Nelson German
 
Curso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménezCurso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménezJavier Arenas Jimenez
 
La opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregidaLa opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregidaeducacionsinescuela
 
Powerpoint visita al museo 2
Powerpoint visita al museo 2Powerpoint visita al museo 2
Powerpoint visita al museo 2tangerina2010
 
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)helmuth Fajardo Peña
 
Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN Ana Cláudia Costa
 
Fiziologija reprodukcije
Fiziologija reprodukcijeFiziologija reprodukcije
Fiziologija reprodukcijeEna Horvat
 
next generation smart sensor
next generation smart sensornext generation smart sensor
next generation smart sensorRicha Ritambhara
 
Farmacología ocular
Farmacología ocularFarmacología ocular
Farmacología ocularKarina Soto
 
re:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im Designre:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im DesignMagdalena Reiter
 

Destacado (17)

Validus holdings, ltd. (vr) company profile and swot analysis
Validus holdings, ltd. (vr)   company profile and swot analysisValidus holdings, ltd. (vr)   company profile and swot analysis
Validus holdings, ltd. (vr) company profile and swot analysis
 
Ontwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebbenOntwikkelingen recruiment: Delen is het nieuwe hebben
Ontwikkelingen recruiment: Delen is het nieuwe hebben
 
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabrasCatálogo - Per-Form - Cómo hacer cosas con [sin] palabras
Catálogo - Per-Form - Cómo hacer cosas con [sin] palabras
 
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
Cronograma de la 5ta. fecha del Campeonato CIR 2014 a realizarse en Andalgalá...
 
Uned madrid tips
Uned madrid tipsUned madrid tips
Uned madrid tips
 
Curso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménezCurso seo periodistas teoria javier arenas jiménez
Curso seo periodistas teoria javier arenas jiménez
 
Catalogo Feria de Arte flecha 2013
Catalogo Feria de Arte flecha 2013Catalogo Feria de Arte flecha 2013
Catalogo Feria de Arte flecha 2013
 
Marketing en redes sociales
Marketing en redes socialesMarketing en redes sociales
Marketing en redes sociales
 
La opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregidaLa opcion de educar en casa tesis corregida
La opcion de educar en casa tesis corregida
 
Powerpoint visita al museo 2
Powerpoint visita al museo 2Powerpoint visita al museo 2
Powerpoint visita al museo 2
 
Proyectos Lifer-2015
Proyectos Lifer-2015Proyectos Lifer-2015
Proyectos Lifer-2015
 
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
Aspectos+generales+del+curriculo+ +dr.+gamaliel+morales (1)
 
Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN Monografia Publicidade e Propaganda - UFRN
Monografia Publicidade e Propaganda - UFRN
 
Fiziologija reprodukcije
Fiziologija reprodukcijeFiziologija reprodukcije
Fiziologija reprodukcije
 
next generation smart sensor
next generation smart sensornext generation smart sensor
next generation smart sensor
 
Farmacología ocular
Farmacología ocularFarmacología ocular
Farmacología ocular
 
re:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im Designre:publica 13 - Kontingenz im Design
re:publica 13 - Kontingenz im Design
 

Similar a Ethical Hacking

Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxAnshumaanTiwari2
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptshreya_omar
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 

Similar a Ethical Hacking (20)

Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Hacking
HackingHacking
Hacking
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Más de Sayantan Sur

Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 
Stack using Linked List
Stack using Linked ListStack using Linked List
Stack using Linked ListSayantan Sur
 
Double linked list
Double linked listDouble linked list
Double linked listSayantan Sur
 
Single linked list
Single linked listSingle linked list
Single linked listSayantan Sur
 
Circular linked list
Circular linked listCircular linked list
Circular linked listSayantan Sur
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)Sayantan Sur
 
International Terrorism
International Terrorism International Terrorism
International Terrorism Sayantan Sur
 

Más de Sayantan Sur (12)

Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Stack using Linked List
Stack using Linked ListStack using Linked List
Stack using Linked List
 
Stack using Array
Stack using ArrayStack using Array
Stack using Array
 
Array menu
Array menuArray menu
Array menu
 
Double linked list
Double linked listDouble linked list
Double linked list
 
Single linked list
Single linked listSingle linked list
Single linked list
 
Circular linked list
Circular linked listCircular linked list
Circular linked list
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
 
Network Security
Network SecurityNetwork Security
Network Security
 
Visual Studio IDE
Visual Studio IDEVisual Studio IDE
Visual Studio IDE
 
Phising
PhisingPhising
Phising
 
International Terrorism
International Terrorism International Terrorism
International Terrorism
 

Último

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 

Ethical Hacking

  • 1. ETHICAL HACKING A LICENCE TO HACK
  • 2. HACKING:  Hacking is unauthorized use of computer and network resources.  According to Computer Crime Research Center: “It is act of gaining access without legal authorization to computer or computer network.”
  • 3. HACKER:  Someone who tries to break into computer systems for any illegal purpose.  Someone who maliciously breaks into systems for personal gain. These are criminals.
  • 4. TYPES OF HACKERS  Black hat hacker.  White hat hacker.  Gray hat hacker.
  • 5. BLACK BOX MODEL  Black box model  Company staff does not know about the test.  Tester is not given details about the network. ▪ Burden is on the tester to find these details  It is tested, if security personnel are able to detect an attack.
  • 6. WHITE BOX MODEL  White box model  Tester is told everything about the network topology and technology.  Network diagram is given.  Tester is authorized to interview IT personnel and company employees.  Makes the tester’s job a little easier.
  • 7. GRAY BOX MODEL  Gray box model  Hybrid of the white and black box models.  Company gives tester partial information.
  • 8. WHAT IS ETHICAL HACKING ?  Ethical hacking ,also known as penetration testing or white-hat hacking involves the same tools, tricks, and techniques that hackers use, i.e, by duplicating the intent and actions of malicious hackers.  Ethical hacking is performed with the target’s permission.
  • 9. WHO ARE ETHICAL HACKERS?  An Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems.  They are completely trustworthy.  They have strong programming and computer networking skills.  They should have more patience.  Continuous updating of their knowledge on computer and network security is required.  They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
  • 10. REQUIRED SKILLS OF AN ETHICAL HACKER  Routers: knowledge of routers, routing protocols, and access control lists.  Microsoft: skills in operation, configuration and management.  Linux: knowledge of Linux/Unix; security setting, configuration, and services.  Firewalls: configurations, and operation of intrusion detection systems.
  • 11. ETHICAL HACKING PROCESS 1. Preparation 2. Foot printing 3. Enumeration and fingerprinting 4. Identification of vulnerabilities 5. Attack-exploit the vulnerabilities.
  • 12. PREPARATION:  Identification of target –company website, mail server, extranet.  Signing of contract  Agreement on protection against any legal issue.  Contracts to clearly specify limits and dangers of the test.  Total time for testing.  Key people made aware of testing.
  • 13. FOOTPRINTING  Collecting required information about target:  DNS server.  IP ranges.  Administrative contacts.  Problem reveled by administrator.
  • 14. ENUMERATION AND FINGERPRINTING  Operating system enumeration.  Identification of services/open port.
  • 15. IDENTIFICATION OF VULNERABILITIES:  Vulnerabilities  Insecure configuration.  Weak passwords.  Insecure programming.  Weak access control.
  • 16. CERTIFICATION The International Council of E-Commerce Consultants (EC-Council) provides a professional certification for Certified Ethical Hackers (CEH). A certified ethical hacker is an ethical hacker who has obtained the certification provided by the EC-Council.
  • 17. ADVANTAGES  These are good hackers  Have genuine license to hack  Generally owned by companies for security designing  Provides security to banking and financial establishments
  • 18. CONCLUSIONS  Always security professionals are one step behind the hackers and crackers.  Plan for the unplanned attacks.  The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.
  • 19. PRESENTED BY SAYANTAN SUR BCA(H) – 2 THANK YOU