SlideShare una empresa de Scribd logo
1 de 31
Ethical Hacking
By: Himanshu Joshi
Contents
● What is hacking??
● What is Ethical hacking??
● Types of hacker.
● Hackers language.
● Footprinting.
● DOS & DDOS.
● FUD.
● RAT.
● phishing.
...conti.
● SQL Injections.
● VPN.
● Tor.
● Scanning
● Gaining Access.
● Maintaining Access.
● Advantages and Disadvantages.
● How can we protect the system?
● What should do after hacked?
WHAT DO YOU THINK, WHO IS A
HACKER ?
OR
Hackers
...conti.
● Hacking is finding ways to
make something do something it
wasn’t originally intended or
designed to do.
● Hacking is gaining a deep
understanding of how
something works and finding
ways to manipulate it.
● Hacking in and of itself is not a
negative thing.
Ethical Hacking
● Skilled professional who hacks into a
system/network to scan for pitfalls
and the probable targets that a
Cracker might exploit.
● Hacking is usually legal as long as it
is being done to find weaknesses in a
computer or network system for
testing purpose. This sort of hacking
is what we call Ethical Hacking.
...conti.
● In fact, they both use the
same skills; however, an
ethical hacker uses those
skills in a legitimate,
lawful manner to try to
find vulnerabilities and
fix them before the bad
guys can get there and
try to break in.
● They break into systems
legally and ethically.
Types of Hackers
White hat :-
● They will hack into your system with the good
intention of finding vulnerabilities and help you
remove virus and malware from your system.
Black hat :-
● These hackers look for vulnerabilities in individual
PCs, organizations and bank systems.
● Using any loopholes they may find, they can hack into
your network and get access to your personal, business
and financial information.
..conti.
Gray hat :-
● A hacker who hacks into an organization and finds some
vulnerability may leak it over the Internet or inform the
organization about it.
Script kiddies :-
● Their primary purpose is often to impress their friends or gain
attention.
● Using off-the-shelf codes and tools, these hackers may launch
some attacks without bothering for the quality of the attack.
...conti.
Green hat :-
● These hackers are the amateurs in the online world of
hacking.
● These newbies have a desire to become full-blown hackers
and are very curious to learn.
Blue hat :-
● Main agenda is to take revenge on anyone who makes them
angry.
● They have no desire for learning and may use simple cyber
attacks
...conti.
Red hat :-
● They are ruthless when it comes to dealing with black hat hackers.
● Red hat hacker will launch a series of aggressive cyber attacks and malware on
the hacker that the hacker may as well have to replace the whole system.
State/Nation Sponsored Hackers :-
State or Nation sponsored hackers are those who have been employed by their
state or nation's government to snoop in and penetrate through full security to
gain confidential information from other governments to stay at the top online.
..conti.
Hacktivist :-
Hacker or a group of anonymous hackers who think
they can bring about social changes and often hack
government and organizations to gain attention or share
their displeasure over opposing their line of thought.
Malicious Insider or Whistleblower :-
● These hackers may take privilege from their easy
access to information and their role within the company
to hack the system
Hackers language
1-> i or | |V|-> m
3-> e s-> z
4-> a z-> s
7-> t f-> ph
9-> g ph-> f
$->s x-> ck
|-> i ck-> x
||-> n o-> 0
Hacking language translation
Example :-
Hacking is good
H4ck|||g 1$ 900d
Footprinting
● The process of collecting as much as information as possible
about the target system to find ways to penetrate into the system.
● Information such as ip address, Whois records, DNS information,
an operating system used, employee email id, Phone numbers etc
is collected.
● Know Security Posture
● Reduce Attack Area.
● Identify vulnerabilities.
● Draw Network map
DOS & DDOS
● DOS is an attack used to deny legitimate users
access to a resource such as accessing a website,
network, emails, etc. or making it extremely slow.
● DDOS type of attack is performed by a number of
compromised machines that all target the same
victim. It floods the network with data packets.
● This results in the server failing to respond to all the
requests.
FUD
● Can stand for data that had been encrypted, making
it appear to be random noise. It can also stand for
software that cannot be detected by anti-viruses
when a scan is performed. The term is used in
hacker circles to refer to something that appears to
be clean to many anti-viruses, even though it is a
hacking tool.
● Crypter.
RAT
● A remote access Trojan (RAT) is a malware program
that includes a back door for administrative control
over the target computer.
● RATs are usually downloaded invisibly with a user-
requested program.
● sent as an email attachment.
● the intruder may use it to distribute RATs to other
vulnerable computers and establish a botnet.
phishing
● phishing is basically a method in which hacker uses
Phish or fake pages or fake applications to capture
the sensitive information from victim.
● Sensitive information can be userid passwords, bank
account details, personal details, phone number,
even verification codes that authorized services like
Google and Facebook send to phones for verifying
authenticity.
SQL Injections
● SQL Injection is an attack that poisons dynamic
SQL statements to comment out certain parts of
the statement or appending a condition that will
always be true.
● It takes advantage of the design flaws in poorly
designed web applications to exploit SQL
statements to execute malicious SQL code.
VPN
● A virtual private network (VPN) extends a private
network across a public network, such as the
Internet. It enables a computer or network-enabled
device to send and receive data across shared or
public networks as if it were directly connected to
the private network, while benefiting from the
functionality, security and management policies of
the private network
Tor
● TOR is a type of browser which is made for the
hackers in the hackers world. It is helpful to hide
your IP address and have a great capacity to make a
tunnel between your device and server. This is also
said to be onion browser.
● The main use of this TOR browser is for surfing the
entire deep and dark web items.
Scanning
...conti.
● Scanning is a set of procedures for identifying live
hosts, ports, and services, discovering Operating
system and architecture of target system, Identifying
vulnerabilities and threats in the network. Network
scanning is used to create a profile of the target
organization.
● Port scanning.
● Network scanning.
Gaining Access
● Gaining access is the most important phase of an attack in
terms of potential damage.
● Stopping a service can be carried out by killing processes,
using a logic/time bomb, or even reconfiguring and
crashing the system.
● Resources can be exhausted locally by filling up outgoing
communication links.
● Password attacks.
● Viruses.
Maintaining Access
● The attacker can choose to use both the system and
its resources and further use the system as a launch
pad to scan and exploit other systems, or he can
keep a low profile and continue exploiting the
system.
● Trojans.
● Clearing tracks.
Advantages and Disadvantages
Advantages
● Provides security to banking and financial.
● Establishments.
● Prevents website defacements.
● An evolving technique.
● To catch a thief you have to think like a thief.
Disadvantages
● Depends upon the trustworthiness of the ethical hacker.
● Hiring professionals is expensive.
How can we protect the system?
● Patch security hole often.
● Encrypt important data.
● Do not run unused daemon.
● Remove unused program.
● Setup loghost.
● Backup the system often.
● Setup firewall.
● Setup IDS.
What should do after hached?
● Shut down the system.
● Separate the system from the network.
● Restore the system with the backup (or reinstall
all programs).
● Then connect the system to the network.
Thank you!

Más contenido relacionado

La actualidad más candente

Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 

La actualidad más candente (20)

ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Hacking
HackingHacking
Hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Ceh v5 module 02 footprinting
Ceh v5 module 02 footprintingCeh v5 module 02 footprinting
Ceh v5 module 02 footprinting
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Similar a Ethical hacking ppt

Access Control - Week 4
Access Control - Week 4Access Control - Week 4
Access Control - Week 4
jemtallon
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 

Similar a Ethical hacking ppt (20)

Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .
 
M1-02-HowCriminalsPlan.pdf
M1-02-HowCriminalsPlan.pdfM1-02-HowCriminalsPlan.pdf
M1-02-HowCriminalsPlan.pdf
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Information Security
Information SecurityInformation Security
Information Security
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network Security
 
Access Control - Week 4
Access Control - Week 4Access Control - Week 4
Access Control - Week 4
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Types of attack -Part2
Types of attack -Part2Types of attack -Part2
Types of attack -Part2
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Network security
Network securityNetwork security
Network security
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
 
Unit-2 ICS.ppt
Unit-2 ICS.pptUnit-2 ICS.ppt
Unit-2 ICS.ppt
 

Último

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Último (20)

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 

Ethical hacking ppt

  • 2. Contents ● What is hacking?? ● What is Ethical hacking?? ● Types of hacker. ● Hackers language. ● Footprinting. ● DOS & DDOS. ● FUD. ● RAT. ● phishing.
  • 3. ...conti. ● SQL Injections. ● VPN. ● Tor. ● Scanning ● Gaining Access. ● Maintaining Access. ● Advantages and Disadvantages. ● How can we protect the system? ● What should do after hacked?
  • 4. WHAT DO YOU THINK, WHO IS A HACKER ? OR
  • 6. ...conti. ● Hacking is finding ways to make something do something it wasn’t originally intended or designed to do. ● Hacking is gaining a deep understanding of how something works and finding ways to manipulate it. ● Hacking in and of itself is not a negative thing.
  • 7. Ethical Hacking ● Skilled professional who hacks into a system/network to scan for pitfalls and the probable targets that a Cracker might exploit. ● Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.
  • 8. ...conti. ● In fact, they both use the same skills; however, an ethical hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in. ● They break into systems legally and ethically.
  • 9. Types of Hackers White hat :- ● They will hack into your system with the good intention of finding vulnerabilities and help you remove virus and malware from your system. Black hat :- ● These hackers look for vulnerabilities in individual PCs, organizations and bank systems. ● Using any loopholes they may find, they can hack into your network and get access to your personal, business and financial information.
  • 10. ..conti. Gray hat :- ● A hacker who hacks into an organization and finds some vulnerability may leak it over the Internet or inform the organization about it. Script kiddies :- ● Their primary purpose is often to impress their friends or gain attention. ● Using off-the-shelf codes and tools, these hackers may launch some attacks without bothering for the quality of the attack.
  • 11. ...conti. Green hat :- ● These hackers are the amateurs in the online world of hacking. ● These newbies have a desire to become full-blown hackers and are very curious to learn. Blue hat :- ● Main agenda is to take revenge on anyone who makes them angry. ● They have no desire for learning and may use simple cyber attacks
  • 12. ...conti. Red hat :- ● They are ruthless when it comes to dealing with black hat hackers. ● Red hat hacker will launch a series of aggressive cyber attacks and malware on the hacker that the hacker may as well have to replace the whole system. State/Nation Sponsored Hackers :- State or Nation sponsored hackers are those who have been employed by their state or nation's government to snoop in and penetrate through full security to gain confidential information from other governments to stay at the top online.
  • 13. ..conti. Hacktivist :- Hacker or a group of anonymous hackers who think they can bring about social changes and often hack government and organizations to gain attention or share their displeasure over opposing their line of thought. Malicious Insider or Whistleblower :- ● These hackers may take privilege from their easy access to information and their role within the company to hack the system
  • 14. Hackers language 1-> i or | |V|-> m 3-> e s-> z 4-> a z-> s 7-> t f-> ph 9-> g ph-> f $->s x-> ck |-> i ck-> x ||-> n o-> 0
  • 15. Hacking language translation Example :- Hacking is good H4ck|||g 1$ 900d
  • 16. Footprinting ● The process of collecting as much as information as possible about the target system to find ways to penetrate into the system. ● Information such as ip address, Whois records, DNS information, an operating system used, employee email id, Phone numbers etc is collected. ● Know Security Posture ● Reduce Attack Area. ● Identify vulnerabilities. ● Draw Network map
  • 17. DOS & DDOS ● DOS is an attack used to deny legitimate users access to a resource such as accessing a website, network, emails, etc. or making it extremely slow. ● DDOS type of attack is performed by a number of compromised machines that all target the same victim. It floods the network with data packets. ● This results in the server failing to respond to all the requests.
  • 18. FUD ● Can stand for data that had been encrypted, making it appear to be random noise. It can also stand for software that cannot be detected by anti-viruses when a scan is performed. The term is used in hacker circles to refer to something that appears to be clean to many anti-viruses, even though it is a hacking tool. ● Crypter.
  • 19. RAT ● A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. ● RATs are usually downloaded invisibly with a user- requested program. ● sent as an email attachment. ● the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet.
  • 20. phishing ● phishing is basically a method in which hacker uses Phish or fake pages or fake applications to capture the sensitive information from victim. ● Sensitive information can be userid passwords, bank account details, personal details, phone number, even verification codes that authorized services like Google and Facebook send to phones for verifying authenticity.
  • 21. SQL Injections ● SQL Injection is an attack that poisons dynamic SQL statements to comment out certain parts of the statement or appending a condition that will always be true. ● It takes advantage of the design flaws in poorly designed web applications to exploit SQL statements to execute malicious SQL code.
  • 22. VPN ● A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer or network-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security and management policies of the private network
  • 23. Tor ● TOR is a type of browser which is made for the hackers in the hackers world. It is helpful to hide your IP address and have a great capacity to make a tunnel between your device and server. This is also said to be onion browser. ● The main use of this TOR browser is for surfing the entire deep and dark web items.
  • 25. ...conti. ● Scanning is a set of procedures for identifying live hosts, ports, and services, discovering Operating system and architecture of target system, Identifying vulnerabilities and threats in the network. Network scanning is used to create a profile of the target organization. ● Port scanning. ● Network scanning.
  • 26. Gaining Access ● Gaining access is the most important phase of an attack in terms of potential damage. ● Stopping a service can be carried out by killing processes, using a logic/time bomb, or even reconfiguring and crashing the system. ● Resources can be exhausted locally by filling up outgoing communication links. ● Password attacks. ● Viruses.
  • 27. Maintaining Access ● The attacker can choose to use both the system and its resources and further use the system as a launch pad to scan and exploit other systems, or he can keep a low profile and continue exploiting the system. ● Trojans. ● Clearing tracks.
  • 28. Advantages and Disadvantages Advantages ● Provides security to banking and financial. ● Establishments. ● Prevents website defacements. ● An evolving technique. ● To catch a thief you have to think like a thief. Disadvantages ● Depends upon the trustworthiness of the ethical hacker. ● Hiring professionals is expensive.
  • 29. How can we protect the system? ● Patch security hole often. ● Encrypt important data. ● Do not run unused daemon. ● Remove unused program. ● Setup loghost. ● Backup the system often. ● Setup firewall. ● Setup IDS.
  • 30. What should do after hached? ● Shut down the system. ● Separate the system from the network. ● Restore the system with the backup (or reinstall all programs). ● Then connect the system to the network.