24
ETHICAL HACKING B .Krishna Teja Reddy Md . Haseeb furkhan

Ethical Hacking Ppt

Embed Size (px)

Citation preview

Page 1: Ethical Hacking Ppt

ETHICAL HACKING

B .Krishna Teja Reddy

Md . Haseeb furkhan

Page 2: Ethical Hacking Ppt

Contents - Hacking

Hacking? Who is Hacker? History of Hacking Hacking incidents Types of Hacking How do Hackers Hack? Why do Hackers Hack? What Hackers do after Hacking? How to be a real Hacker?

Page 3: Ethical Hacking Ppt

HACKING

What Hack actually mean???Hack definition:

1) an article or project without constructive end

2) work undertaken on bad self-advice

3)Examine something very minutely

Page 4: Ethical Hacking Ppt

Who is hacker?

Hacker

– The person who hacks

Cracker

– System intruder/destroyer

Page 5: Ethical Hacking Ppt

History of hacking

Telephone hacking– Use telephone freely– It’s called phreaking

Computer virus– Destroy many computers

Network hacking– Hack the important server remotely and

destroy/modify/disclose the information

Page 6: Ethical Hacking Ppt

Hacking incidents

Internet Worm– Robert T. Morris made an internet worm. It

spread through the internet and crashed about 6000 systems.

Indian Defense Server– Recent hacking of Defense top secrets by

CHINEESE

And many more…..

Page 7: Ethical Hacking Ppt

Types of hacking

U S

Normal

data transfer

U S

U S

U S

U S

Interruption Interception

H

H

Modification

H

Fabrication

S-Server H-Hacker U-User

Page 8: Ethical Hacking Ppt

How Hackers Hack?

E-mail Hacking– Email forgery , Password Cracking, Phishing

System Hacking– Key loggers , Trojans, Backdoors , viruses

Wireless Hacking– WLAN hacking , network hacking

Web Server Hacking– Hacking websites , servers , databases etc

Page 9: Ethical Hacking Ppt

Why do hackers hack?

Just for fun Show off To know others secrets Notify many people their thought Steal important information Destroy enemy’s computer network

during the war

Page 10: Ethical Hacking Ppt

What do hackers do after hacking?

Patch security hole– The other hackers can’t intrude

Clear logs and hide themselves Install rootkit ( backdoor )

– The hacker who hacked the system can use the system later

– It contains trojan or other viruses and so on

Uses system silently without users notice

Page 11: Ethical Hacking Ppt

How can be a real hacker?

Study C/C++/python/assembly language Study computer architecture Study operating system Study computer network Examine the hacking tools thoroughly Think the problem of the computer Lots of practice and patience

Page 12: Ethical Hacking Ppt

Contents – Ethical Hacking

Ethical Hacking Who are Ethical Hackers? Why Ethical Hacking? Why cant prevent Hacking How Ethical Hacker defends? How to protect against Hacking? What to do after being Hacked Laws , fine and penalties Computer fraud & abuse act

Page 13: Ethical Hacking Ppt

ETHICAL HACKING

It is Legal Permission is obtained from the target user Part of an overall security program Learn about the system and trying to find its

weaknesses.

Page 14: Ethical Hacking Ppt

Who are Ethical Hackers???

Completely trustworthy. Strong programming and computer

networking skills. Techniques of Criminal hackers-

Detection-Prevention. Ethical hackers possesses same skills,

mindset and tools of a hacker but the attacks are done in a non-destructive manner

White-hat – Ethical HackersBlack-hat – Hackers

Page 15: Ethical Hacking Ppt

Why Ethical Hacking???

Page 16: Ethical Hacking Ppt

Why Ethical Hacking??

June 01, 2006 to Dec.31, 2006

Domains No of Defacements

.com 922

.gov.in 24

.org 53

.net 39

.biz 12

.co.in 48

.ac.in 13

.info 3

.nic.in 2

.edu 2

other 13

Total 1131

Defacement Statistics for Indian Websites

Page 17: Ethical Hacking Ppt

Why can’t we be protect against hacking?

There are many unknown security hole Hackers need to know only one security

hole to hack the system Admin need to know all security holes to

defend the system

Page 18: Ethical Hacking Ppt

How Ethical Hackers defend???

Harden the servers Scan, test and apply patches Monitor logs Train the technical staff on security Serious policy and procedures!

Page 19: Ethical Hacking Ppt

How to prevent Hacking???

Encrypt important data– Ex) confidential data

Do not run unknown programs Setup firewall

– Ex) ipchains , antivirus Check unintentional changes Backup the system often Good physical security

Page 20: Ethical Hacking Ppt

What to do after being hacked?

Shutdown the system– Or turn off the system

Separate the system from network Restore the system with the backup

– Or reinstall all programs

Connect the system to the network It can be good to call the police

Page 21: Ethical Hacking Ppt

Laws,Fines and Penalities

Hackers, virus and worm writers could get 20 years to life in federal prison.

Anyone who uses computers to cause death or bodily harm, such as bringing down power grids or airport control centers, can get the maximum sentence.

The sentence is increased by 25% if they steal personal information.

The sentence is increased by 50% if they share the stolen information.

If posted on the Internet, sentence is doubled!

Page 22: Ethical Hacking Ppt

Computer Fraud & Abuse Act

Offense -Sentence Obtaining National Security Information -10 (20) years Compromising the Confidentiality of a Computer -1 or 5 Trespassing in a Government Computer -1 (10) Accessing a Computer to Defraud & Obtain Value -5

(10) Knowing Transmission and Intentional Damage -10 (20

or life) Intentional Access and Reckless Damage -5 (20) Intentional Access and Damage -1 (10) Trafficking in Passwords -1 (10) Extortion Involving Threats to Damage Computer -5 (10)

Page 23: Ethical Hacking Ppt

ANY QUERIES??

ANY QUERIES??

Page 24: Ethical Hacking Ppt

THANK YOU