Submitted to:- DEEPESH NAMDEV
(HOD of EE & EC)
Submitted by:- UMESH KUMAR MAHAWAR
(14EGKXX020)
What is CEH?
 CEH refers to Certified Ethical Hacker.
 CEH is 100% Network Offensive Course,
not Defensive.
 This course includes System Hacking,
Web Servers Hacking, Mobile Platforms
Hacking, Wireless Networks Hacking etc.
What is Ethical Hacking?
 Ethical hacking refers to the act of locating weaknesses
and vulnerabilities of computer and information systems
by duplicating the intent and actions of malicious hackers.
 Identify vulnerabilities visible from Internet at particular
point of time.
 It is Legal.
 Permission is obtained from the target.
 Part of an overall Security Program.
 Ethical Hacker possesses same skills, mindset and tools of
a hacker but the attacks are done in a non-destructive
manner.
Hacker v/s Ethical Hacker?
 Hacker
 Access computer system or Network without authorization
 Breaks the law
 Ethical Hacker
 Performs most of same activities but with owner’s permission
 Employed by organizations to perform Penetration Tests
Types of Hacker
 White Hat Hacker
 Good guys who don’t use their skills for illegal purposes.
 Computer Security Experts & help to protect from Black Hat.
 Black Hat Hacker
 Bad guys who use their skills maliciously for personal gain.
 Hack banks, steal credit cards & deface websites.
 Grey Hat Hacker
 It is combination of both Black & White Hat Hackers.
 Goal of Grey Hat Hackers is to provide National Security.
Why do People Hack?
 To make Security Stronger (Ethical Hacking)
 Hack other systems secretly & steal important
information that causes financial loss, reputation
loss to targeted organization
 Revenge
 Show off
 Just for Fun
Why Ethical Hacking
Why Ethical Hacking
Why Ethical Hacking
Some Recent Hacking Activities
 Recently Jio’s Database got hacked, It was vulnerability of their Web Server.
 With this hack Personal details of anyone can be seen by anyone just by entering
mobile number.
 Some months ago, a Ransomware Virus named WannaCry attacked over 104
countries including India.
 Wannacry Encrypted all the data of system and asks for money to decrypt them
back.
 Wannacry works on SMB (Server Message Block)
 On 15 August 2017, many government websites were hacked by Pakistani
Hackers.
 As payback Indian hackers also hacked many Pakistani govt. websites.
Hacking process
Footprinting
Scanning
EnumerationAttack & Gaining Access
Escalating Privilege,
Covering Tracks &
Creating Backdoors
1. Footprinting
Footprinting refers to gathering all
useful information about the target
Tools for Footprinting:-
 WhoIs Lookup
 NS Lookup
 IP Lookup Fig. :- NS Lookup Tool
WhoIs Lookup
2. Scanning & Enumeration
3. Gaining Access
Password Attacks
Social Engineering
Viruses
4. Maintaining Access & Clearing Tracks
OS Backdoors
Trojans
Clearing Tracks
Some Tools
• WhoIs, ping
• Tracert, nslookup
Footprinting
• Nmap
• Nessus
Scanning
Enumeration
What are Various Qualities a Hacker should
posses?
 Good Coder
 Well knowledgeable person of
both Hardware as well as
Software
 Should have knowledge on
Security System
 Trusted Person
Some tips to protect your System from
Hackers
 Keep your system fully patched
 All OS Security Updates should be installed periodically
 Don’t use Pirated Software's
 Remove unused Programs
 Have a Good Anti-Virus and keep its virus definitions up-to-
date
 Firewall should be turned ON
 Setup IDS (Hardware Firewall)
Advantages of Ethical Hacking
 Can be used to recover lost information
 Teaches that no technology is 100%
secure
 To test how good security is on your own
system, known as White Hat Hacking
 To prevent website, system or network
hacking from Black Hat Hackers.
Disadvantages
All depends upon the trustworthiness of
the Ethical Hacker
Allowing the company’s financial and
banking details to be seen
Hiring Professionals is Expensive
“To catch a thief you have to think like a thief”

Ethical Hacking PPT (CEH)

  • 1.
    Submitted to:- DEEPESHNAMDEV (HOD of EE & EC) Submitted by:- UMESH KUMAR MAHAWAR (14EGKXX020)
  • 2.
    What is CEH? CEH refers to Certified Ethical Hacker.  CEH is 100% Network Offensive Course, not Defensive.  This course includes System Hacking, Web Servers Hacking, Mobile Platforms Hacking, Wireless Networks Hacking etc.
  • 3.
    What is EthicalHacking?  Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers.  Identify vulnerabilities visible from Internet at particular point of time.  It is Legal.  Permission is obtained from the target.  Part of an overall Security Program.  Ethical Hacker possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner.
  • 4.
    Hacker v/s EthicalHacker?  Hacker  Access computer system or Network without authorization  Breaks the law  Ethical Hacker  Performs most of same activities but with owner’s permission  Employed by organizations to perform Penetration Tests
  • 5.
    Types of Hacker White Hat Hacker  Good guys who don’t use their skills for illegal purposes.  Computer Security Experts & help to protect from Black Hat.  Black Hat Hacker  Bad guys who use their skills maliciously for personal gain.  Hack banks, steal credit cards & deface websites.  Grey Hat Hacker  It is combination of both Black & White Hat Hackers.  Goal of Grey Hat Hackers is to provide National Security.
  • 6.
    Why do PeopleHack?  To make Security Stronger (Ethical Hacking)  Hack other systems secretly & steal important information that causes financial loss, reputation loss to targeted organization  Revenge  Show off  Just for Fun
  • 7.
  • 8.
  • 9.
  • 10.
    Some Recent HackingActivities  Recently Jio’s Database got hacked, It was vulnerability of their Web Server.  With this hack Personal details of anyone can be seen by anyone just by entering mobile number.  Some months ago, a Ransomware Virus named WannaCry attacked over 104 countries including India.  Wannacry Encrypted all the data of system and asks for money to decrypt them back.  Wannacry works on SMB (Server Message Block)  On 15 August 2017, many government websites were hacked by Pakistani Hackers.  As payback Indian hackers also hacked many Pakistani govt. websites.
  • 11.
    Hacking process Footprinting Scanning EnumerationAttack &Gaining Access Escalating Privilege, Covering Tracks & Creating Backdoors
  • 12.
    1. Footprinting Footprinting refersto gathering all useful information about the target Tools for Footprinting:-  WhoIs Lookup  NS Lookup  IP Lookup Fig. :- NS Lookup Tool
  • 13.
  • 14.
    2. Scanning &Enumeration
  • 15.
    3. Gaining Access PasswordAttacks Social Engineering Viruses
  • 16.
    4. Maintaining Access& Clearing Tracks OS Backdoors Trojans Clearing Tracks
  • 17.
    Some Tools • WhoIs,ping • Tracert, nslookup Footprinting • Nmap • Nessus Scanning Enumeration
  • 18.
    What are VariousQualities a Hacker should posses?  Good Coder  Well knowledgeable person of both Hardware as well as Software  Should have knowledge on Security System  Trusted Person
  • 19.
    Some tips toprotect your System from Hackers  Keep your system fully patched  All OS Security Updates should be installed periodically  Don’t use Pirated Software's  Remove unused Programs  Have a Good Anti-Virus and keep its virus definitions up-to- date  Firewall should be turned ON  Setup IDS (Hardware Firewall)
  • 20.
    Advantages of EthicalHacking  Can be used to recover lost information  Teaches that no technology is 100% secure  To test how good security is on your own system, known as White Hat Hacking  To prevent website, system or network hacking from Black Hat Hackers.
  • 21.
    Disadvantages All depends uponthe trustworthiness of the Ethical Hacker Allowing the company’s financial and banking details to be seen Hiring Professionals is Expensive
  • 22.
    “To catch athief you have to think like a thief”