19
ETHICAL HACKING

Seminar Ppt

Embed Size (px)

Citation preview

Page 1: Seminar Ppt

ETHICAL HACKING

Page 2: Seminar Ppt

TABLE OF CONTENTSINTRODUCTION

HACKING

ETHICAL HACKING

METHODOLOGY OF ETHICAL HACKING

ETHICAL HACKING TOOLS

ADVANTAGES & DISADVANTAGES

FUTURE ENHANCEMENTS

CONCLUSIONS

REFERENCES

Page 3: Seminar Ppt

INTRODUCTION

Ethical hacking

Security

Tools employed are same.

Ethical hackers do not damage system.

Page 4: Seminar Ppt

HACKERA clever programmer.

CHARACTERISTICS OF HACKER One who:

Enjoys programming .

Appreciating someone else's hacking.

Expert.

 

Page 5: Seminar Ppt

TYPES OF HACKERS

BLACK HAT HACKER

WHITE HAT HACKER

GREY HAT HACKER

Page 6: Seminar Ppt

Fig1: Library of congress webpage before attack

ILLUSTRATION OF HACKING

Page 7: Seminar Ppt

Fig 2: Library of congress webpage after attack

Page 8: Seminar Ppt

FLOWCHART FOR HACKING

Fig 3: General hacking

Page 9: Seminar Ppt

ETHICAL HACKING Vulnerabilities existing.

SKILLS FOR ETHICAL HACKERMicrosoft

Linux

Firewalls

Network Protocols

Routers

Patience

Page 10: Seminar Ppt

ETHICAL HACKING

COMMANDMENTS

Working ethically.

Respecting privacy.

Not crashing your systems.

Page 11: Seminar Ppt

METHODOLOGY OF HACKINGReconnaissance

Scanning

Enumeration

Gaining access

Maintaining access

Clearing Tracks

Page 12: Seminar Ppt

ETHICAL HACKING TOOLSSamspade

Fig 4: Samspade GUI

Page 13: Seminar Ppt

Email Tracker and Visual Route

Fig 5: Email Tracker GUI

Page 14: Seminar Ppt

Visual Route: displays location using IP address.

Fig 6: Visual Route GUI

Page 15: Seminar Ppt

ADVANTAGES

To catch thief.

To close open holes.

Provides security.

DISADVANTAGESDepends on trustworthiness.

Expensive.

Page 16: Seminar Ppt

FUTURE ENHANCEMENTSEmploy new techniques.

Tools should be updated.

Page 17: Seminar Ppt

CONCLUSIONSGet updated about softwares.

Educate against black hat hacking.

Firewalls and other security measures.

The password should be made strong.

Page 18: Seminar Ppt

REFERENCES1. C.C PALMER IBM SYSTEMS JOURNAL, VOL 40, NO 3,

2001

2.Computer Security Education and Research- 1540-

7993/06/$20.00 © 2006 IEEE-IEEE Security and

Privacy

3.About Penetration Testing-1540-7993/07/$25.00 ©

2007 IEEE- IEEE Security and Privacy

Page 19: Seminar Ppt

QUERIES ?

THANK YOU