Upload
anup-dudani
View
220
Download
0
Embed Size (px)
Citation preview
8/7/2019 ETHICAL_HACKING(the final presentation)
1/21
-A way to get the licensee of hacking
8/7/2019 ETHICAL_HACKING(the final presentation)
2/21
8/7/2019 ETHICAL_HACKING(the final presentation)
3/21
` Need for Security
` Types of Ethical Hackers
` What is Ethical Hacking?
` What do an Ethical Hacker do?
8/7/2019 ETHICAL_HACKING(the final presentation)
4/21
` Methodology of Hacking
` Techniques used in password cracking
` Tools used in Ethical hacking
`Advantages & disadvantages
` Conclusion
8/7/2019 ETHICAL_HACKING(the final presentation)
5/21
8/7/2019 ETHICAL_HACKING(the final presentation)
6/21
` Loss of confidential data
` Damage or destruction of data
` Damage or destruction of computer
system
` Loss of reputation of a company
8/7/2019 ETHICAL_HACKING(the final presentation)
7/21
` Black-Hat Hackers:-are individuals with extraordinary
computing skills, resorting to malicious or destructive
activities.
` White-Hat hackers:-are those individuals professing
hacker skills and using them for defensive purposes
` Grey Hat Hackers- These are individuals who work both
offensively and defensively at various times.
8/7/2019 ETHICAL_HACKING(the final presentation)
8/21
` Ethical hacking is defined as an methodology
adopted by ethical hackers to discover the existing
vulnerabilities of information systems operating
environment.
8/7/2019 ETHICAL_HACKING(the final presentation)
9/21
Stephen Wozniak Tim Berners-LeeLinus Torvalds
Richard Stallman
Tsutom
uShimom
ura
8/7/2019 ETHICAL_HACKING(the final presentation)
10/21
` He penetrates the network systems to find
vulnerabilities in it with the permission of
administrator.
8/7/2019 ETHICAL_HACKING(the final presentation)
11/21
` Working Ethicaly
` Respecting privacy
` Not crashing your system
8/7/2019 ETHICAL_HACKING(the final presentation)
12/21
Reconnaissance- It is a preliminary test to gain
information
` Scann
ing- is the hacking methodology in which the
hacker tries to make a blue print of the target network.
` Enumeration-is the ability of a hacker to convince some
servers to give them information that is vital to them tomake an attack
`
8/7/2019 ETHICAL_HACKING(the final presentation)
13/21
` Gaining access- actual hacking phase in which
the hacker gains access to the system
` Maintaining access-It is the phase in which
the hacker can download and upload some files
` Clearing tracks- everybody knows a good
hacker but nobody knows a great hacker.
8/7/2019 ETHICAL_HACKING(the final presentation)
14/21
` ictionary cracking- In this method, there is dictionary of
words
` Brute force cracking-In this method, the combination of
various letters & digits is used
` Hybrid cracking-In this method, first it tries for the dictionary
cracking then bruce force cracking
` Social engineering-In this method, the hacker literally asks
the target for password by doing some fraud.
8/7/2019 ETHICAL_HACKING(the final presentation)
15/21
` Samspade-is a simple tool which provides usinformation about a particular host
` Email Tracker-is a software which helps us to findfrom which server does the mail actually came from.
` Visual Route-is a tool which displays the location of aparticular server with the help of IP addresses.
` War Dialing
` Pingers
` Super scan
` Nmap etc
8/7/2019 ETHICAL_HACKING(the final presentation)
16/21
8/7/2019 ETHICAL_HACKING(the final presentation)
17/21
8/7/2019 ETHICAL_HACKING(the final presentation)
18/21
`Advantages
` Disadvantages
` Conclusion
` References- Google, Hacking for
dummmies, gohacking.com, unofficial
guide to Ethical hacking by Ankit Fadia
8/7/2019 ETHICAL_HACKING(the final presentation)
19/21
8/7/2019 ETHICAL_HACKING(the final presentation)
20/21
8/7/2019 ETHICAL_HACKING(the final presentation)
21/21
QUERIES?????