SlideShare a Scribd company logo
1 of 25
1
WHAT IS ETHICAL HACKING
 Ethical hacking are the terms that describe hacking
performed to help a company or individual identify
potential threats on the computer or network.
 An ethical hacker attempts to hack their way past the
system security, finding any weak points in the security
that could be exploited by other hackers.
2
What does an Ethical Hacker do ?
An ethical hacker is a person
I. Who tries to penetrate into a network to find if
there is some vulnerability in the system and they
Have permission for that.
II. If he succeed in penetrating into the system he
goes to the next level and then he will report
about the vulnerability exploiting which he got
in to the system.
3
For Indian organizations, these statistics should serve as a wake up call.
I. As per the CSRT statistics, more than 16,000 Indian websites were
hacked every year.
II. A total of 294 websites belonging to various ministries and government
departments were hacked in 2012 .
III. The script kiddies of today becomes the real hackers of tomorrow, who
are well equipped to steal Indian government information discreetly.
Why – Ethical Hacking
4
Total Number of Hacking Incidents
5
Ethical Hacking
 It is Legal
 Permission is obtained from the target
 It is the Part of an overall security program
 Ethical hackers possesses same skills, mindset and tools of a
hacker but the attacks are done in a non-destructive
manner
6
Who are Hackers?
 Someone who bypasses the system’s access controls by taking advantage of
security weaknesses left in the system by developers .
 Person who likes to examine the code of programs to see how they work …
then uses his computer expertise for gaining access to computer systems
without permission and tampering with programs and data. At that point, this
individual would steal information and install backdoors and virus.
 Hacker means cracker nowadays.
7
Why do people hack??
To make security stronger ( Ethical Hacking )
Just for fun
Hack other systems secretly
Notify many people their thought
Steal important information
8
TYPEs OF HACKERS
 White-Hat Hackers
(Ethical Hackers)
 Black-Hat Hackers
 Grey-Hat Hackers
9
10
Types of hackers cont..
White Hat Hackers:
A white hat is specializes in penetration testing and in other
testing methodologies to ensure the security of an organization's
information systems.
Black Hat Hackers:
A black hat is the villain or bad guy, especially in a western movie
in which such a character would stereotypically wear a black hat
in contrast to the hero's white hat and they always works as
anonymous.
 Gray Hat Hackers:
A grey hat, in the hacking community, refers to a skilled hacker
whose activities fall somewhere between white and black hat
hackers on a variety of spectra.
10
 Script Kiddies:
 Use scripts or programs developed by others to attack computer systems
and networks.
 Phreak
 A phreak is someone who breaks into the telephone network illegally, to
make free long-distance phone calls or to tap phone lines.
 Cyber Punk
 Recent mutation of … the hacker, cracker, and phreak
Types of hackers cont..
11
ETHICAL Hacking - Process
12
• Preparation1
• Foot printing2
• Enumeration & Fingerprinting3
• Identification of Vulnerabilities4
• Attack5
• Gaining Access6
• Escalating privilege7
• Covering tracks8
• Creating back doors9
1. Preparation
Identification of Targets – company websites, mail servers, etc.
Signing of Contract
Agreement on protection against any legal issues
Contracts clearly specifies the limits and dangers of the test
Total time for the testing
Prior Knowledge of the systems
13
2. Foot printing
Foot printing is the technique of gathering information about computer systems—
Collecting as much information about the target
DNS Servers
IP Ranges
Admin Contacts
Problems revealed by admin
Information Sources
Search engines
Forums
Tools – PING, whois, Traceroute,etc
14
3. Enumeration & Fingerprinting
Enumeration is a process to gather the information about user names and network
resources .
Fingerprinting identifies specifics of your hardware and software configurations--
Specific targets determined
Identification of Services / open ports
Operating System Enumeration
Methods
Banner grabbing
Port / Service Scans
Tools
Hping, Firewalk, netcat, ssh, telnet, etc.
15
4. Identification of Vulnerabilities
Vulnerability is a weakness which allows an attacker to reduce system's
information assurance.
Insecure Configuration
Weak passwords
Insecure programming
Weak Access Control
16
5. Attack–Exploit the vulnerabilities
Network Infrastructure Attacks
Connecting to the network through modem
Weaknesses in TCP / IP
Flooding the network
Operating System Attacks
Attacking Authentication Systems
Exploiting Protocol Implementations
Exploiting Insecure configuration
Breaking File-System Security
17
6. Gaining access:
Enough data has been gathered at this point to make an informed attempt to
access the target
Techniques
 Network sniffing – searching of sensitive information like password
 File share brute forcing
 Password file grab
 Buffer overflows
18
7. Escalating Privileges
If only user-level access was obtained in the last step, the attacker will
now seek to gain complete control of the system
Techniques
 Password cracking
19
8. Covering Tracks
Once total ownership of the target is secured, hiding this fact from system
administrators.
Techniques
 Clear logs-Eliminating logging evidence to become anonymous
 Hide tools
20
9. Creating Back Doors
Trap doors will be laid in various parts of the system to ensure that privileged
access is easily regained at the whim of the intruder
Techniques
 Create fake user accounts
 Plant remote control services
 Install monitoring mechanisms
 Replace apps with Trojans and virus
21
Why can’t defend against hackers?
There are many unknown security hole
Hackers need to know only one security hole to hack the system
Admin need to know all security holes to defend the system
Ethical hackers find those security holes by testing
22
Ethical Hacker - Commandments
Working Ethically
Trustworthiness
No misuse for personal gain
Hacking is not a crime when it is done under set of rules…
That’s why it is termed as ETHICAL HACKING!!!
23
 Always security professionals are one step behind the hackers and crackers.
 Plan for the unplanned attacks.
 The role of ethical hacking in security is to provide customers with
awareness of how they could be attacked and why they are targeted.
 “This country needs more and better quality of Ethical Hackers
and for that more and more individual should consider it as a
profession.”
24
25

More Related Content

What's hot

Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trendsHadeel Sadiq Obaid
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking PresentationAmanUllah115928
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
 

What's hot (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Hacking
HackingHacking
Hacking
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 

Viewers also liked

Value chain analysis and value engineering
Value chain analysis and value engineeringValue chain analysis and value engineering
Value chain analysis and value engineeringAKSHAY KHATRI
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
P&G Gillet Negotiation - Boy meets girl
P&G Gillet Negotiation - Boy meets girlP&G Gillet Negotiation - Boy meets girl
P&G Gillet Negotiation - Boy meets girlAKSHAY KHATRI
 
Industrial Marketing_Vizag steel
Industrial Marketing_Vizag steelIndustrial Marketing_Vizag steel
Industrial Marketing_Vizag steelAKSHAY KHATRI
 
Employee onboarding and employee engagement in it organizations human resourc...
Employee onboarding and employee engagement in it organizations human resourc...Employee onboarding and employee engagement in it organizations human resourc...
Employee onboarding and employee engagement in it organizations human resourc...AKSHAY KHATRI
 
Factors Mediating Relationship Between Quality of work life and employees ret...
Factors Mediating Relationship Between Quality of work life and employees ret...Factors Mediating Relationship Between Quality of work life and employees ret...
Factors Mediating Relationship Between Quality of work life and employees ret...AKSHAY KHATRI
 
Marketing Management - Watch Company
Marketing Management - Watch CompanyMarketing Management - Watch Company
Marketing Management - Watch CompanyAKSHAY KHATRI
 
life insurance-TV commercials analysis
life insurance-TV commercials analysislife insurance-TV commercials analysis
life insurance-TV commercials analysisAKSHAY KHATRI
 
Total Quality Management in Banking Sector
Total Quality Management in Banking SectorTotal Quality Management in Banking Sector
Total Quality Management in Banking SectorAKSHAY KHATRI
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 

Viewers also liked (19)

Direct marketing
Direct marketingDirect marketing
Direct marketing
 
Value chain analysis and value engineering
Value chain analysis and value engineeringValue chain analysis and value engineering
Value chain analysis and value engineering
 
Information technology act
Information technology actInformation technology act
Information technology act
 
P&G Gillet Negotiation - Boy meets girl
P&G Gillet Negotiation - Boy meets girlP&G Gillet Negotiation - Boy meets girl
P&G Gillet Negotiation - Boy meets girl
 
Graphene
GrapheneGraphene
Graphene
 
Industrial Marketing_Vizag steel
Industrial Marketing_Vizag steelIndustrial Marketing_Vizag steel
Industrial Marketing_Vizag steel
 
Employee onboarding and employee engagement in it organizations human resourc...
Employee onboarding and employee engagement in it organizations human resourc...Employee onboarding and employee engagement in it organizations human resourc...
Employee onboarding and employee engagement in it organizations human resourc...
 
Factors Mediating Relationship Between Quality of work life and employees ret...
Factors Mediating Relationship Between Quality of work life and employees ret...Factors Mediating Relationship Between Quality of work life and employees ret...
Factors Mediating Relationship Between Quality of work life and employees ret...
 
Marketing Management - Watch Company
Marketing Management - Watch CompanyMarketing Management - Watch Company
Marketing Management - Watch Company
 
Walmart
WalmartWalmart
Walmart
 
life insurance-TV commercials analysis
life insurance-TV commercials analysislife insurance-TV commercials analysis
life insurance-TV commercials analysis
 
tech mahindra
tech mahindratech mahindra
tech mahindra
 
Total Quality Management in Banking Sector
Total Quality Management in Banking SectorTotal Quality Management in Banking Sector
Total Quality Management in Banking Sector
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
it act 2000
it act 2000it act 2000
it act 2000
 

Similar to Ethical hacking

A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGNathan Mathis
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical HackingMasih Karimi
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2Ishaq Shinwari
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingHassanAhmedShaikh1
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET Journal
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 

Similar to Ethical hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Ethical hacking

  • 1. 1
  • 2. WHAT IS ETHICAL HACKING  Ethical hacking are the terms that describe hacking performed to help a company or individual identify potential threats on the computer or network.  An ethical hacker attempts to hack their way past the system security, finding any weak points in the security that could be exploited by other hackers. 2
  • 3. What does an Ethical Hacker do ? An ethical hacker is a person I. Who tries to penetrate into a network to find if there is some vulnerability in the system and they Have permission for that. II. If he succeed in penetrating into the system he goes to the next level and then he will report about the vulnerability exploiting which he got in to the system. 3
  • 4. For Indian organizations, these statistics should serve as a wake up call. I. As per the CSRT statistics, more than 16,000 Indian websites were hacked every year. II. A total of 294 websites belonging to various ministries and government departments were hacked in 2012 . III. The script kiddies of today becomes the real hackers of tomorrow, who are well equipped to steal Indian government information discreetly. Why – Ethical Hacking 4
  • 5. Total Number of Hacking Incidents 5
  • 6. Ethical Hacking  It is Legal  Permission is obtained from the target  It is the Part of an overall security program  Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner 6
  • 7. Who are Hackers?  Someone who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers .  Person who likes to examine the code of programs to see how they work … then uses his computer expertise for gaining access to computer systems without permission and tampering with programs and data. At that point, this individual would steal information and install backdoors and virus.  Hacker means cracker nowadays. 7
  • 8. Why do people hack?? To make security stronger ( Ethical Hacking ) Just for fun Hack other systems secretly Notify many people their thought Steal important information 8
  • 9. TYPEs OF HACKERS  White-Hat Hackers (Ethical Hackers)  Black-Hat Hackers  Grey-Hat Hackers 9
  • 10. 10 Types of hackers cont.. White Hat Hackers: A white hat is specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. Black Hat Hackers: A black hat is the villain or bad guy, especially in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat and they always works as anonymous.  Gray Hat Hackers: A grey hat, in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra. 10
  • 11.  Script Kiddies:  Use scripts or programs developed by others to attack computer systems and networks.  Phreak  A phreak is someone who breaks into the telephone network illegally, to make free long-distance phone calls or to tap phone lines.  Cyber Punk  Recent mutation of … the hacker, cracker, and phreak Types of hackers cont.. 11
  • 12. ETHICAL Hacking - Process 12 • Preparation1 • Foot printing2 • Enumeration & Fingerprinting3 • Identification of Vulnerabilities4 • Attack5 • Gaining Access6 • Escalating privilege7 • Covering tracks8 • Creating back doors9
  • 13. 1. Preparation Identification of Targets – company websites, mail servers, etc. Signing of Contract Agreement on protection against any legal issues Contracts clearly specifies the limits and dangers of the test Total time for the testing Prior Knowledge of the systems 13
  • 14. 2. Foot printing Foot printing is the technique of gathering information about computer systems— Collecting as much information about the target DNS Servers IP Ranges Admin Contacts Problems revealed by admin Information Sources Search engines Forums Tools – PING, whois, Traceroute,etc 14
  • 15. 3. Enumeration & Fingerprinting Enumeration is a process to gather the information about user names and network resources . Fingerprinting identifies specifics of your hardware and software configurations-- Specific targets determined Identification of Services / open ports Operating System Enumeration Methods Banner grabbing Port / Service Scans Tools Hping, Firewalk, netcat, ssh, telnet, etc. 15
  • 16. 4. Identification of Vulnerabilities Vulnerability is a weakness which allows an attacker to reduce system's information assurance. Insecure Configuration Weak passwords Insecure programming Weak Access Control 16
  • 17. 5. Attack–Exploit the vulnerabilities Network Infrastructure Attacks Connecting to the network through modem Weaknesses in TCP / IP Flooding the network Operating System Attacks Attacking Authentication Systems Exploiting Protocol Implementations Exploiting Insecure configuration Breaking File-System Security 17
  • 18. 6. Gaining access: Enough data has been gathered at this point to make an informed attempt to access the target Techniques  Network sniffing – searching of sensitive information like password  File share brute forcing  Password file grab  Buffer overflows 18
  • 19. 7. Escalating Privileges If only user-level access was obtained in the last step, the attacker will now seek to gain complete control of the system Techniques  Password cracking 19
  • 20. 8. Covering Tracks Once total ownership of the target is secured, hiding this fact from system administrators. Techniques  Clear logs-Eliminating logging evidence to become anonymous  Hide tools 20
  • 21. 9. Creating Back Doors Trap doors will be laid in various parts of the system to ensure that privileged access is easily regained at the whim of the intruder Techniques  Create fake user accounts  Plant remote control services  Install monitoring mechanisms  Replace apps with Trojans and virus 21
  • 22. Why can’t defend against hackers? There are many unknown security hole Hackers need to know only one security hole to hack the system Admin need to know all security holes to defend the system Ethical hackers find those security holes by testing 22
  • 23. Ethical Hacker - Commandments Working Ethically Trustworthiness No misuse for personal gain Hacking is not a crime when it is done under set of rules… That’s why it is termed as ETHICAL HACKING!!! 23
  • 24.  Always security professionals are one step behind the hackers and crackers.  Plan for the unplanned attacks.  The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.  “This country needs more and better quality of Ethical Hackers and for that more and more individual should consider it as a profession.” 24
  • 25. 25

Editor's Notes

  1. //According to Nasscom, India will require at least 77,000 ethical hackers every year whereas we are producing only 15,000 in a year, currently.  This results into a significant demand of ethical hackers which are employed on a very high pay scale.
  2. ------ As u see that most of indian websites are defaced means attacked by the hackers in the graph shown ------ Csrt : cyber security response team
  3. As shown in graph these are the Government websites hacking incidences
  4. Now we see who are hackers
  5. Now we see the different types of hackers
  6. Domain Name System (DNS) is a standard technology for managing the names of Web sites  Whois:  look up domain and IP owner information Ping – Shows how long it takes for packets to reach host  traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol
  7. TCP (Transmission Control Protocol) is a set of rules hping is a free packet generator and analyzer for the TCP/IP protocol  Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding Netcat is a computer networking service for reading from and writing to network connections using TCP tcpdump is a common packet analyser Secure Shell (SSH) is a cryptographic network protocol for secure data communication  Telnet is a user command and an underlying TCPIP protocol for accessing remote computers  SNMP specific ports Banner Grabbing is a technique used by hackers to extract information about a host
  8. NetBIOS (Network Basic Input/Output System) is a program that allows applications on different computers to communicate within a local area network  Flooding is a Denial of Service (DoS) attack that is designed to bring a network or service down by flooding it with large amounts of traffic. 
  9. network sniffing is a network layer attack consisting ... in search of sensitive information like passwords Brute force cracking is method used by application programs to crack encrypted data, such as passwords buffer overflows to corrupt the execution stack of a web application
  10. //This country needs more and better quality of Ethical Hackers and for that more and more individual should consider it as a profession
  11. Domain Name System (DNS) is a standard technology for managing the names of Web sites  Whois:  look up domain and IP owner information Ping – Shows how long it takes for packets to reach host  traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol TCP (Transmission Control Protocol) is a set of rules hping is a free packet generator and analyzer for the TCP/IP protocol  Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding Netcat is a computer networking service for reading from and writing to network connections using TCP tcpdump is a common packet analyser Secure Shell (SSH) is a cryptographic network protocol for secure data communication  Telnet is a user command and an underlying TCPIP protocol for accessing remote computers  SNMP specific ports Banner Grabbing is a technique used by hackers to extract information about a host Flooding is a Denial of Service (DoS) attack that is designed to bring a network or service down by flooding it with large amounts of traffic.  buffer overflows to corrupt the execution stack of a web application //This country needs more and better quality of Ethical Hackers and for that more and more individual should consider it as a profession