Upload
dom-mike
View
28
Download
2
Tags:
Embed Size (px)
Citation preview
ETHICAL HACKING
BY :- Muzafar Ali Mohil
dept:- (Bscs)
HACKER
CONTENT
Overview of Hacking Why do hackers hack? Types of Hacker Level of Hackers Hackers language Ethical Hacking – Process How can protect the system? What should do after hacked? Final words
OVERVIEW OF HACKING
It is Legal
Permission is obtained from the target
Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner
Also Called – Attack & Penetration Testing.
HACKING VS CRACKING
Hacker The person who hack
Cracker System intruder/destroyer
HACKING WITH MALICIOUS INTENTION IS CRACKING
The basic difference is hackers do not do anything disastrous.
Cracking yield more devastating results.
Cracking is crime. Cyber crime are the results of cracking ,not hacking
THE GREAT HACKER WAR
Kevin Mitnick The most famous, and undoubtedly most gifted hacker in history, made a name for himself in 1981 at the tender age of 17 by getting into a phone exchange, which allowed him to redirect subscriber calls in any way he wanted. In 1983, he achieved his first major coup - and also his first arrest - when he accessed a Pentagon computer. It was his repeated offenses that made him a target of the FBI. He was sentenced to five years in prison in the 1990s, but today he is a security consultant and owns his own company: Mitnick Security.
John Draper known as "Cap'n Crunch", Draper was one of the first hackers in history. This moniker comes from the cereal of the same name, inside of which he once discovered a toy whistle (provided as a gift to entice children to ask parents for the cereal). He discovered that he could use the whistle to hack a telephone line and get free phone calls - all that was necessary was to produce a precise tone in the receiver for the method to work. He was arrested in 1976 and sentenced to two months in prison.
Why do people hack??
To make security stronger ( Ethical Hacking )
Just for fun
Show off
Hack other systems secretly & Steal important information
What are the various qualities a hacker should
posses Good coder
well knowledgeable person both hard ware as well as soft ware
Should have knowledge on security system
Trusted person
Types of hacker
Hackers language
1 -> i or l3 -> e4 -> a 7 -> t9 -> g0 -> o$ -> s| -> i or
|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x
Hackers language translation
EXAMPLE:- Hacking is good
H4ck||\|g 1$ 900d
Hacking - Process
Foot Printing
Scanning
Gaining Access
Maintaining Access
Foot Printing
Whois Lookup
NS lookup
IP Lookup
Scanning
Port scanning
Network scanning
Finger Printing
Fire walking
Gaining access
Password Attacks
Social Engineering
Viruses
Maintaining access
Os BackDoors
Trojans
Clearing tracks
Advantages & Disadvantages
Advantages Provides security to banking and financial establishments
Prevents website defacements An evolving technique To catch a thief you have to think like a thief
Disadvantages All depends upon the trustworthiness of the ethical hacker
Hiring professionals is expensive.
How can we protect the system?
Patch security hole often Encrypt important data
Ex) pgp, ssh Remove unused program Setup loghost
Backup the system often Setup firewall Setup IDS
Ex) snort
What should do after hacked?
Shutdown the system Or turn off the system
Separate the system from network Restore the system with the backup
Or reinstall all programs Connect the system to the network
H4cking prone areas
Hacking GROWTH RATE
It is clear from the graph it is increasing day by day.
THANK YOU