ETHICAL_HACKING(the final presentation)

Embed Size (px)

Citation preview

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    1/21

    -A way to get the licensee of hacking

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    2/21

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    3/21

    ` Need for Security

    ` Types of Ethical Hackers

    ` What is Ethical Hacking?

    ` What do an Ethical Hacker do?

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    4/21

    ` Methodology of Hacking

    ` Techniques used in password cracking

    ` Tools used in Ethical hacking

    `Advantages & disadvantages

    ` Conclusion

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    5/21

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    6/21

    ` Loss of confidential data

    ` Damage or destruction of data

    ` Damage or destruction of computer

    system

    ` Loss of reputation of a company

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    7/21

    ` Black-Hat Hackers:-are individuals with extraordinary

    computing skills, resorting to malicious or destructive

    activities.

    ` White-Hat hackers:-are those individuals professing

    hacker skills and using them for defensive purposes

    ` Grey Hat Hackers- These are individuals who work both

    offensively and defensively at various times.

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    8/21

    ` Ethical hacking is defined as an methodology

    adopted by ethical hackers to discover the existing

    vulnerabilities of information systems operating

    environment.

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    9/21

    Stephen Wozniak Tim Berners-LeeLinus Torvalds

    Richard Stallman

    Tsutom

    uShimom

    ura

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    10/21

    ` He penetrates the network systems to find

    vulnerabilities in it with the permission of

    administrator.

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    11/21

    ` Working Ethicaly

    ` Respecting privacy

    ` Not crashing your system

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    12/21

    Reconnaissance- It is a preliminary test to gain

    information

    ` Scann

    ing- is the hacking methodology in which the

    hacker tries to make a blue print of the target network.

    ` Enumeration-is the ability of a hacker to convince some

    servers to give them information that is vital to them tomake an attack

    `

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    13/21

    ` Gaining access- actual hacking phase in which

    the hacker gains access to the system

    ` Maintaining access-It is the phase in which

    the hacker can download and upload some files

    ` Clearing tracks- everybody knows a good

    hacker but nobody knows a great hacker.

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    14/21

    ` ictionary cracking- In this method, there is dictionary of

    words

    ` Brute force cracking-In this method, the combination of

    various letters & digits is used

    ` Hybrid cracking-In this method, first it tries for the dictionary

    cracking then bruce force cracking

    ` Social engineering-In this method, the hacker literally asks

    the target for password by doing some fraud.

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    15/21

    ` Samspade-is a simple tool which provides usinformation about a particular host

    ` Email Tracker-is a software which helps us to findfrom which server does the mail actually came from.

    ` Visual Route-is a tool which displays the location of aparticular server with the help of IP addresses.

    ` War Dialing

    ` Pingers

    ` Super scan

    ` Nmap etc

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    16/21

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    17/21

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    18/21

    `Advantages

    ` Disadvantages

    ` Conclusion

    ` References- Google, Hacking for

    dummmies, gohacking.com, unofficial

    guide to Ethical hacking by Ankit Fadia

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    19/21

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    20/21

  • 8/7/2019 ETHICAL_HACKING(the final presentation)

    21/21

    QUERIES?????