This will give you knowledge about basics of what ethical hacking is and few attacks. This document edited in Ubuntu. Types of hackers explained in detail. what kind of language is used by the hacker. How attacks happen with the help of scanning and access point for the system which is helpfull for the hacker after doing attacks gaining the access and maintaining the access. how to protect the system from the attackers and what to do after the attack happened.
2. Contents
● What is hacking??
● What is Ethical hacking??
● Types of hacker.
● Hackers language.
● Footprinting.
● DOS & DDOS.
● FUD.
● RAT.
● phishing.
3. ...conti.
● SQL Injections.
● VPN.
● Tor.
● Scanning
● Gaining Access.
● Maintaining Access.
● Advantages and Disadvantages.
● How can we protect the system?
● What should do after hacked?
6. ...conti.
● Hacking is finding ways to
make something do something it
wasn’t originally intended or
designed to do.
● Hacking is gaining a deep
understanding of how
something works and finding
ways to manipulate it.
● Hacking in and of itself is not a
negative thing.
7. Ethical Hacking
● Skilled professional who hacks into a
system/network to scan for pitfalls
and the probable targets that a
Cracker might exploit.
● Hacking is usually legal as long as it
is being done to find weaknesses in a
computer or network system for
testing purpose. This sort of hacking
is what we call Ethical Hacking.
8. ...conti.
● In fact, they both use the
same skills; however, an
ethical hacker uses those
skills in a legitimate,
lawful manner to try to
find vulnerabilities and
fix them before the bad
guys can get there and
try to break in.
● They break into systems
legally and ethically.
9. Types of Hackers
White hat :-
● They will hack into your system with the good
intention of finding vulnerabilities and help you
remove virus and malware from your system.
Black hat :-
● These hackers look for vulnerabilities in individual
PCs, organizations and bank systems.
● Using any loopholes they may find, they can hack into
your network and get access to your personal, business
and financial information.
10. ..conti.
Gray hat :-
● A hacker who hacks into an organization and finds some
vulnerability may leak it over the Internet or inform the
organization about it.
Script kiddies :-
● Their primary purpose is often to impress their friends or gain
attention.
● Using off-the-shelf codes and tools, these hackers may launch
some attacks without bothering for the quality of the attack.
11. ...conti.
Green hat :-
● These hackers are the amateurs in the online world of
hacking.
● These newbies have a desire to become full-blown hackers
and are very curious to learn.
Blue hat :-
● Main agenda is to take revenge on anyone who makes them
angry.
● They have no desire for learning and may use simple cyber
attacks
12. ...conti.
Red hat :-
● They are ruthless when it comes to dealing with black hat hackers.
● Red hat hacker will launch a series of aggressive cyber attacks and malware on
the hacker that the hacker may as well have to replace the whole system.
State/Nation Sponsored Hackers :-
State or Nation sponsored hackers are those who have been employed by their
state or nation's government to snoop in and penetrate through full security to
gain confidential information from other governments to stay at the top online.
13. ..conti.
Hacktivist :-
Hacker or a group of anonymous hackers who think
they can bring about social changes and often hack
government and organizations to gain attention or share
their displeasure over opposing their line of thought.
Malicious Insider or Whistleblower :-
● These hackers may take privilege from their easy
access to information and their role within the company
to hack the system
14. Hackers language
1-> i or | |V|-> m
3-> e s-> z
4-> a z-> s
7-> t f-> ph
9-> g ph-> f
$->s x-> ck
|-> i ck-> x
||-> n o-> 0
16. Footprinting
● The process of collecting as much as information as possible
about the target system to find ways to penetrate into the system.
● Information such as ip address, Whois records, DNS information,
an operating system used, employee email id, Phone numbers etc
is collected.
● Know Security Posture
● Reduce Attack Area.
● Identify vulnerabilities.
● Draw Network map
17. DOS & DDOS
● DOS is an attack used to deny legitimate users
access to a resource such as accessing a website,
network, emails, etc. or making it extremely slow.
● DDOS type of attack is performed by a number of
compromised machines that all target the same
victim. It floods the network with data packets.
● This results in the server failing to respond to all the
requests.
18. FUD
● Can stand for data that had been encrypted, making
it appear to be random noise. It can also stand for
software that cannot be detected by anti-viruses
when a scan is performed. The term is used in
hacker circles to refer to something that appears to
be clean to many anti-viruses, even though it is a
hacking tool.
● Crypter.
19. RAT
● A remote access Trojan (RAT) is a malware program
that includes a back door for administrative control
over the target computer.
● RATs are usually downloaded invisibly with a user-
requested program.
● sent as an email attachment.
● the intruder may use it to distribute RATs to other
vulnerable computers and establish a botnet.
20. phishing
● phishing is basically a method in which hacker uses
Phish or fake pages or fake applications to capture
the sensitive information from victim.
● Sensitive information can be userid passwords, bank
account details, personal details, phone number,
even verification codes that authorized services like
Google and Facebook send to phones for verifying
authenticity.
21. SQL Injections
● SQL Injection is an attack that poisons dynamic
SQL statements to comment out certain parts of
the statement or appending a condition that will
always be true.
● It takes advantage of the design flaws in poorly
designed web applications to exploit SQL
statements to execute malicious SQL code.
22. VPN
● A virtual private network (VPN) extends a private
network across a public network, such as the
Internet. It enables a computer or network-enabled
device to send and receive data across shared or
public networks as if it were directly connected to
the private network, while benefiting from the
functionality, security and management policies of
the private network
23. Tor
● TOR is a type of browser which is made for the
hackers in the hackers world. It is helpful to hide
your IP address and have a great capacity to make a
tunnel between your device and server. This is also
said to be onion browser.
● The main use of this TOR browser is for surfing the
entire deep and dark web items.
25. ...conti.
● Scanning is a set of procedures for identifying live
hosts, ports, and services, discovering Operating
system and architecture of target system, Identifying
vulnerabilities and threats in the network. Network
scanning is used to create a profile of the target
organization.
● Port scanning.
● Network scanning.
26. Gaining Access
● Gaining access is the most important phase of an attack in
terms of potential damage.
● Stopping a service can be carried out by killing processes,
using a logic/time bomb, or even reconfiguring and
crashing the system.
● Resources can be exhausted locally by filling up outgoing
communication links.
● Password attacks.
● Viruses.
27. Maintaining Access
● The attacker can choose to use both the system and
its resources and further use the system as a launch
pad to scan and exploit other systems, or he can
keep a low profile and continue exploiting the
system.
● Trojans.
● Clearing tracks.
28. Advantages and Disadvantages
Advantages
● Provides security to banking and financial.
● Establishments.
● Prevents website defacements.
● An evolving technique.
● To catch a thief you have to think like a thief.
Disadvantages
● Depends upon the trustworthiness of the ethical hacker.
● Hiring professionals is expensive.
29. How can we protect the system?
● Patch security hole often.
● Encrypt important data.
● Do not run unused daemon.
● Remove unused program.
● Setup loghost.
● Backup the system often.
● Setup firewall.
● Setup IDS.
30. What should do after hached?
● Shut down the system.
● Separate the system from the network.
● Restore the system with the backup (or reinstall
all programs).
● Then connect the system to the network.