SlideShare una empresa de Scribd logo
1 de 22
What is hacking???
hacking facebook account???
hacking wifi??
hacking whatsapp??
hacking web site??
INTRODUCTION TO ETHICAL
HACKING
 understanding ethical hacking teminology :
 security
 hack value
 threat
 attack
 vulnerability
 exploit
 target of evaluation
 zero-day vulnerability
 daisy chainig
identifying different types of hacking
techologies
operating systems
applications
shirnk-wrap code
misconfigurations
social engineering
types of hacker
 white hats
 black hats
 Grey hats
 suicide hack
 hacktivism
 script kiddies
security consists of four basic element
confidentiality
authenticity
integrity
availability
penteration testing
types of vulnerabilities
 network service vulnerabilities
 web application vulnerabilities
 mobile application vulnerabilities
 local service vulnerabilities
 system vulnerabilities
 physical vulnerabilities
what is Backdoors?
A BACKDOOR IS A MEANS OF ACCESS TO A COMPUTER PROGRAM
THAT BYPASSES SECURITY MECHANISMS. A PROGRAMMER MAY
SOMETIMES INSTALL A BACKDOOR SO THAT THE PROGRAM CAN BE
ACCESSED FOR TROUBLESHOOTING OR OTHER PURPOSES.
HOWERVER, ATTACKERS OFTEN USE BACK DOORS THAT THEY
DETECT OR INSTALL THEMSELVES
A backdoor is a program or a set of related programs that a hacker installs
on
a target system to allow access to the system at a later time . A backdoor's
goal
is to remove the evidence if intial entry from the system's log files.
But a backdoor may also let a hacker retain access to a machine it has
penetrated even if
the intrusion has already been
detected and remedied by the system administrator
what is Trojan Horse?
 A Trojan is a malicious program disguised as something benign.
Trojans are often downloaded along with another program or software
package.
once installed on a system,they can cause data theft and loss, and
system crashes or
slowdowns,they can also be used as launching points for other attacks
such as distributed
denial of service (DDos).
Many trojans are used to manipulate files on the victim
computer,manage processe,
remotely run commands,intercept keystrokes,
list The Different Types of
Trojans
 Trojans can be created and used to perform different attacks.
some of the most common types of Trojans are:
 Remote Access Trojans (Rats)-- used to gain remote access to a
system
 Data-sending Trojans--used to find data on a system and deliver
data to a hacker
 Destructive Trojans--used to delete or corrupt files on a system
 Denial of service Trojans--used to launch a denial of service
attack
 Proxy Trojans-- used to tunnel traffic or launch hacking attacks
via other system
 ftp Trojans-- used to create an ftp server in order to copy files
into a system
 security software disabler Trojans--used to stop antivirus software
How Do Reverse-connecting trojans
work?
 Reverse-connecting trojans let an attacker access a machine on
the internal network from the outside, the hacker can install a simple
trojan program on a system on the internal network,such as the reverse
www shell server.on a regular basis (usually erver 60 seconds) the internal
server tries to access the external master system to pick up
commands. if the attacker typed something into the master system , this
coomend
is etrieved and excuted on the interal system , reverse www shell uses
standard http. it's
dangerous because it's difficult to detect. it look like a client is
browsing the web from the internal network.
what is sniffers?
 A sniffer can br a packer-capturing or frame-capturing tool it
intercepts traffic on the network and displays it in either a command-line
or Gui format for a hacker to view.
Sniffers are used to capture traffic sent between two systems. Depending
on how the sniffer is used and the security measures in place. a hacker
can use a sniffer to discover usernames , passwords, and other
confidential
information transmitted on the network. several hacking attacks and
various hacking tools require the use if a sniffer to obtian important
information sent from target system. This chapter will describe how
sniffers work and identify the most common sniffer hacking tools.
Hub vs switch
understand arp poisoning
 arp allows the network to translate ip addresses into mac addresses
when one host using tcp/ip on a lan tries to contact another it needs the
mac address or hardware address if the host it's trying to reach
arp poisoning is a technique that's used to attack an ethernet
network and that may let an attacker sniff data frames on a switched lan
or stop the traffic altogether, arp poisoning utilizes arp spoofing where
the purpose is to send fake or spoofed arp messages to an ethernet lan.
arp spoofing tools
arpspoof -i eth0 -t (target ip) (router ip)
understand Man in The middle attack
 the man in the middle attack intercapts a communication between two
systems.
for example in an http transaction the target in the TCp connection
between client and server.
Using different rechniques, the attacjer splits the original TCP connection
into 2 new connections, one between the client and the attacker and the
other
between the attacker and the server, as shown in figure 1 . once the tcp
connection is intercepted,the attacker acts as a proxy , being able to read,
insert and modify th data in intercepted communication.
 mitm attack tools
Ettercap
Dsniff
cain & Abel
DHCP ATTACK
HOW DO DHCP SERVER ATTACK
what is phishing?
 a form of social engineering characterized by attempts to fraudulently
acquire
sensitive information, such as password and credit card details, by
masquerading as a trustworthy person or business in an
apparently official electronic communication, such as an email or an
instant message.
The term phishingarises from the use of increasingly sophisticated lures to
"fish"
for user's financial information and passwords
Understand DNS Cache Poisoning
 DNS spoofing is a computer hacking attack,
whereby data is introduced into a Domian Name System (DNS)
name server's cache database ,causing the name server
to return an incorrect ip address,
diverting traffic to another computer(often the attacker's).
understand web server
 The primary function of a web server is to cater web page to the requset
of clients using the hypertext tansfer protocol (HTTP).
This means delivery of HTML documents and any additional content that may by
included by
a document, such as images, style sheets and scripts
A user agent , commonly a web browser or web crawler, initiates communication by
making a requset for a specific resource using HTTP
and the server responds with the content of that resource or an error message
if unable to do so. The resource is typically a real file on the server's
secondary storage, but this is not necessarily the case and depends on how the web
server is implemented.
understand Http Requset and Response
web application vulnerabilities
 sql injection
 cross site scripting(xss)
 remote code execution
 local file include (lfi(
 remote file include (rfi(
 cross site request forgery (csrf(
 session hijacking

Más contenido relacionado

La actualidad más candente

Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To HackingRaghav Bisht
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Moduleankit sarode
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingDivy Singh Rathore
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - ExplainedGunjan Panara
 

La actualidad más candente (20)

Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Hackers
HackersHackers
Hackers
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of Hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 

Similar a Introduction Ethical hacking by eslam hussein

Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingANURAG CHAKRABORTY
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHackingAve Nawsh
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With GflixacademyGaurav Mishra
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Dan Morrill
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoorsjibinmanjooran
 

Similar a Introduction Ethical hacking by eslam hussein (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 
Cyber security
Cyber security Cyber security
Cyber security
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Security threats
Security threatsSecurity threats
Security threats
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 

Último

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 

Último (20)

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 

Introduction Ethical hacking by eslam hussein

  • 1. What is hacking??? hacking facebook account??? hacking wifi?? hacking whatsapp?? hacking web site??
  • 2. INTRODUCTION TO ETHICAL HACKING  understanding ethical hacking teminology :  security  hack value  threat  attack  vulnerability  exploit  target of evaluation  zero-day vulnerability  daisy chainig
  • 3. identifying different types of hacking techologies operating systems applications shirnk-wrap code misconfigurations social engineering
  • 4. types of hacker  white hats  black hats  Grey hats  suicide hack  hacktivism  script kiddies
  • 5. security consists of four basic element confidentiality authenticity integrity availability
  • 7. types of vulnerabilities  network service vulnerabilities  web application vulnerabilities  mobile application vulnerabilities  local service vulnerabilities  system vulnerabilities  physical vulnerabilities
  • 8. what is Backdoors? A BACKDOOR IS A MEANS OF ACCESS TO A COMPUTER PROGRAM THAT BYPASSES SECURITY MECHANISMS. A PROGRAMMER MAY SOMETIMES INSTALL A BACKDOOR SO THAT THE PROGRAM CAN BE ACCESSED FOR TROUBLESHOOTING OR OTHER PURPOSES. HOWERVER, ATTACKERS OFTEN USE BACK DOORS THAT THEY DETECT OR INSTALL THEMSELVES A backdoor is a program or a set of related programs that a hacker installs on a target system to allow access to the system at a later time . A backdoor's goal is to remove the evidence if intial entry from the system's log files. But a backdoor may also let a hacker retain access to a machine it has penetrated even if the intrusion has already been detected and remedied by the system administrator
  • 9. what is Trojan Horse?  A Trojan is a malicious program disguised as something benign. Trojans are often downloaded along with another program or software package. once installed on a system,they can cause data theft and loss, and system crashes or slowdowns,they can also be used as launching points for other attacks such as distributed denial of service (DDos). Many trojans are used to manipulate files on the victim computer,manage processe, remotely run commands,intercept keystrokes,
  • 10. list The Different Types of Trojans  Trojans can be created and used to perform different attacks. some of the most common types of Trojans are:  Remote Access Trojans (Rats)-- used to gain remote access to a system  Data-sending Trojans--used to find data on a system and deliver data to a hacker  Destructive Trojans--used to delete or corrupt files on a system  Denial of service Trojans--used to launch a denial of service attack  Proxy Trojans-- used to tunnel traffic or launch hacking attacks via other system  ftp Trojans-- used to create an ftp server in order to copy files into a system  security software disabler Trojans--used to stop antivirus software
  • 11. How Do Reverse-connecting trojans work?  Reverse-connecting trojans let an attacker access a machine on the internal network from the outside, the hacker can install a simple trojan program on a system on the internal network,such as the reverse www shell server.on a regular basis (usually erver 60 seconds) the internal server tries to access the external master system to pick up commands. if the attacker typed something into the master system , this coomend is etrieved and excuted on the interal system , reverse www shell uses standard http. it's dangerous because it's difficult to detect. it look like a client is browsing the web from the internal network.
  • 12. what is sniffers?  A sniffer can br a packer-capturing or frame-capturing tool it intercepts traffic on the network and displays it in either a command-line or Gui format for a hacker to view. Sniffers are used to capture traffic sent between two systems. Depending on how the sniffer is used and the security measures in place. a hacker can use a sniffer to discover usernames , passwords, and other confidential information transmitted on the network. several hacking attacks and various hacking tools require the use if a sniffer to obtian important information sent from target system. This chapter will describe how sniffers work and identify the most common sniffer hacking tools.
  • 14. understand arp poisoning  arp allows the network to translate ip addresses into mac addresses when one host using tcp/ip on a lan tries to contact another it needs the mac address or hardware address if the host it's trying to reach arp poisoning is a technique that's used to attack an ethernet network and that may let an attacker sniff data frames on a switched lan or stop the traffic altogether, arp poisoning utilizes arp spoofing where the purpose is to send fake or spoofed arp messages to an ethernet lan. arp spoofing tools arpspoof -i eth0 -t (target ip) (router ip)
  • 15. understand Man in The middle attack  the man in the middle attack intercapts a communication between two systems. for example in an http transaction the target in the TCp connection between client and server. Using different rechniques, the attacjer splits the original TCP connection into 2 new connections, one between the client and the attacker and the other between the attacker and the server, as shown in figure 1 . once the tcp connection is intercepted,the attacker acts as a proxy , being able to read, insert and modify th data in intercepted communication.  mitm attack tools Ettercap Dsniff cain & Abel
  • 17. HOW DO DHCP SERVER ATTACK
  • 18. what is phishing?  a form of social engineering characterized by attempts to fraudulently acquire sensitive information, such as password and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an email or an instant message. The term phishingarises from the use of increasingly sophisticated lures to "fish" for user's financial information and passwords
  • 19. Understand DNS Cache Poisoning  DNS spoofing is a computer hacking attack, whereby data is introduced into a Domian Name System (DNS) name server's cache database ,causing the name server to return an incorrect ip address, diverting traffic to another computer(often the attacker's).
  • 20. understand web server  The primary function of a web server is to cater web page to the requset of clients using the hypertext tansfer protocol (HTTP). This means delivery of HTML documents and any additional content that may by included by a document, such as images, style sheets and scripts A user agent , commonly a web browser or web crawler, initiates communication by making a requset for a specific resource using HTTP and the server responds with the content of that resource or an error message if unable to do so. The resource is typically a real file on the server's secondary storage, but this is not necessarily the case and depends on how the web server is implemented.
  • 21. understand Http Requset and Response
  • 22. web application vulnerabilities  sql injection  cross site scripting(xss)  remote code execution  local file include (lfi(  remote file include (rfi(  cross site request forgery (csrf(  session hijacking