KEMBAR78
CSE-Ethical-Hacking-ppt.pptx
www.studymafia.org
Submitted To: Submitted By:
www.studymafia.org www.studymafia.org
Seminar
On
Ethical Hacking
 Introduction
 Ethical Hacking
 Hackers
 Types of Hackers
 Hacking Process
 Why do We need Ethical Hacking
 Required Skills of an Ethical Hacker
 What do hackers do after Hacking?
 Advantages
 Disadvantages
 Future Enhancements
 Conclusion
 Ethical hacking also known as penetration testing or
white-hat hacking, involves the same tools, tricks, and
techniques that hackers use, but with one major difference that
Ethical hacking is legal.
 Ethical hacking, is legally breaking into computers and
devices to test an organization's defenses.
 Independent computer security Professionals breaking into the
computer systems.
 Neither damage the target systems nor steal information.
 Evaluate target systems security and report back to owners
about the vulnerabilities found.
 A person who enjoys learning details of a
programming language or system
 A person who enjoys actually doing the
programming rather than just theorizing about it
 A person capable of appreciating someone else's
hacking
 A person who picks up programming quickly
 A person who is an expert at a particular programming
language or system
 Black Hat Hacker
 White Hat Hacker
 Grey Hat Hacker
 A black hat hackers or crackers are individuals with
extraordinary computing skills, resorting to malicious or
destructive activities.
 That is black hat hackers use their knowledge and skill for
their own personal gains probably by hurting others.
 White hat hackers are those individuals professing
hacker skills and using them for defensive purposes.
 This means that the white hat hackers use their
knowledge and skill for the good of others and for the
common good.
 These are individuals who work both offensively and
defensively at various times.
 We cannot predict their behavior.
 Sometimes they use their skills for the common good while in
some other times he uses them for their personal gains.
 Foot Printing
 Scanning
 Gaining Access
 Maintaining Access
 Whois lookup
 NS lookup
 IP lookup
 Port Scanning
 Network Scanning
 Finger Printing
 Fire Walking
 Password Attacks
 Social Engineering
 Viruses
 Os BackDoors
 Trojans
 Clears Tracks
Viruses, Trojan
Horses,
and Worms
Social
Engineering
Automated
Attacks
Accidental
Breaches in
Security Denial of
Service (DoS)
Organizational
Attacks
Restricted
Data
Protection from possible External Attacks
 Microsoft: skills in operation, configuration and management.
 Linux: knowledge of Linux/Unix; security setting,
configuration, and services.
 Firewalls: configurations, and operation of intrusion detection
systems.
 Routers: knowledge of routers, routing protocols, and access
control lists
 Mainframes
 Network Protocols: TCP/IP; how they function and can be
manipulated.
 Project Management: leading, planning, organizing, and
controlling a penetration testing team.
 Patch Security hole
 The other hackers can’t intrude
 Clear logs and hide themselves
 Install rootkit ( backdoor )
 The hacker who hacked the system can use the
system later
 It contains trojan virus, and so on
 Install irc related program
 identd, irc, bitchx, eggdrop, bnc
 Install scanner program
 mscan, sscan, nmap
 Install exploit program
 Install denial of service program
 Use all of installed programs silently
 ‘’To catch a thief you have to think like a thief”
 Helps in closing the open holes in the system network
 Provides security to banking and financial establishments
 Prevents website defacements
 An evolving technique
 All depends upon the trustworthiness of the ethical hacker
 Hiring professionals is expensive.
 As it an evolving branch the scope of enhancement in
technology is immense.
 No ethical hacker can ensure the system security by using the
same technique repeatedly.
 More enhanced software’s should be used for optimum
protection.
 In the preceding sections we saw the methodology of hacking,
why should we aware of hacking and some tools which a
hacker may use.
 Now we can see what can we do against hacking or to protect
ourselves from hacking.
 The first thing we should do is to keep ourselves updated
about those software’s we and using for official and reliable
sources.
 Educate the employees and the users against black hat
hacking.
 www.google.com
 www.wikipedia.com
 www.studymafia.org
Thanks

CSE-Ethical-Hacking-ppt.pptx

  • 1.
    www.studymafia.org Submitted To: SubmittedBy: www.studymafia.org www.studymafia.org Seminar On Ethical Hacking
  • 2.
     Introduction  EthicalHacking  Hackers  Types of Hackers  Hacking Process  Why do We need Ethical Hacking  Required Skills of an Ethical Hacker
  • 3.
     What dohackers do after Hacking?  Advantages  Disadvantages  Future Enhancements  Conclusion
  • 4.
     Ethical hackingalso known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal.  Ethical hacking, is legally breaking into computers and devices to test an organization's defenses.
  • 5.
     Independent computersecurity Professionals breaking into the computer systems.  Neither damage the target systems nor steal information.  Evaluate target systems security and report back to owners about the vulnerabilities found.
  • 6.
     A personwho enjoys learning details of a programming language or system  A person who enjoys actually doing the programming rather than just theorizing about it  A person capable of appreciating someone else's hacking  A person who picks up programming quickly  A person who is an expert at a particular programming language or system
  • 7.
     Black HatHacker  White Hat Hacker  Grey Hat Hacker
  • 8.
     A blackhat hackers or crackers are individuals with extraordinary computing skills, resorting to malicious or destructive activities.  That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others.
  • 9.
     White hathackers are those individuals professing hacker skills and using them for defensive purposes.  This means that the white hat hackers use their knowledge and skill for the good of others and for the common good.
  • 10.
     These areindividuals who work both offensively and defensively at various times.  We cannot predict their behavior.  Sometimes they use their skills for the common good while in some other times he uses them for their personal gains.
  • 11.
     Foot Printing Scanning  Gaining Access  Maintaining Access
  • 12.
     Whois lookup NS lookup  IP lookup
  • 13.
     Port Scanning Network Scanning  Finger Printing  Fire Walking
  • 14.
     Password Attacks Social Engineering  Viruses
  • 15.
     Os BackDoors Trojans  Clears Tracks
  • 16.
    Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breachesin Security Denial of Service (DoS) Organizational Attacks Restricted Data Protection from possible External Attacks
  • 17.
     Microsoft: skillsin operation, configuration and management.  Linux: knowledge of Linux/Unix; security setting, configuration, and services.  Firewalls: configurations, and operation of intrusion detection systems.
  • 18.
     Routers: knowledgeof routers, routing protocols, and access control lists  Mainframes  Network Protocols: TCP/IP; how they function and can be manipulated.  Project Management: leading, planning, organizing, and controlling a penetration testing team.
  • 19.
     Patch Securityhole  The other hackers can’t intrude  Clear logs and hide themselves  Install rootkit ( backdoor )  The hacker who hacked the system can use the system later  It contains trojan virus, and so on  Install irc related program  identd, irc, bitchx, eggdrop, bnc
  • 20.
     Install scannerprogram  mscan, sscan, nmap  Install exploit program  Install denial of service program  Use all of installed programs silently
  • 21.
     ‘’To catcha thief you have to think like a thief”  Helps in closing the open holes in the system network  Provides security to banking and financial establishments  Prevents website defacements  An evolving technique
  • 22.
     All dependsupon the trustworthiness of the ethical hacker  Hiring professionals is expensive.
  • 23.
     As itan evolving branch the scope of enhancement in technology is immense.  No ethical hacker can ensure the system security by using the same technique repeatedly.  More enhanced software’s should be used for optimum protection.
  • 24.
     In thepreceding sections we saw the methodology of hacking, why should we aware of hacking and some tools which a hacker may use.  Now we can see what can we do against hacking or to protect ourselves from hacking.  The first thing we should do is to keep ourselves updated about those software’s we and using for official and reliable sources.  Educate the employees and the users against black hat hacking.
  • 25.
  • 26.

Editor's Notes