Ethical Hacking
Submitted By: Submitted To:
Ms. Kanchan Nahar
Name-Sahil Hussain Assistant professor
Roll No.-1324458
BCA-2nd
Semester
Content
• Introduction
• Ethical Hacking
• Who are Hackers
• Why do Hackers hack
• Types of Hackers
• Hacking Process
• Why do We need Ethical Hacking
• Required Skills of an Ethical Hacker
• What do hackers do after Hacking?
• Advantages
• Disadvantages
• Future Enhancements
Introduction
 Ethical hacking also known as
penetration testing or white-hat hacking,
involves the same tools, tricks ,and
Techniques that hackers use ,but with one
major difference that Ethical hacking is
legal.
Ethical Hacking
o Independent computer security Professionals into the
computer systems.
o Neither damage the target systems nor steal information.
o Evaluate target systems security
and report back to owners about
the bugs found.
Who are Hackers ?
• A person who enjoys learning details
of a programming language or system.
• A person who enjoys actually doing the
programming rather than just theorizing about
it.
• A person capable of appreciating someone
else’s hacking.
• A person who picks up programming quickly.
• A person who is an expert at a particular
programming language or system.
Why do hackers hack ?
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify many people their thought.
 Steal important information.
 Destroy enemy’s computer network
during the war.
Ethical Hackers but not Criminal Hackers
o Completely trustworthy.
o Strong programming and computer
networking skills.
o Learn about the system and trying
to find its weaknesses.
o Techniques of Criminal hackers-
Detection-Prevention.
Types of Hackers
o Black Hat Hacker
o White Hat Hacker
o Grey Hat Hacker
Black-Hat Hacker
• A black hat hackers or crackers are
individuals with extra ordinary
computing skills, resorting to
malicious or destructive activities.
• That is black hat hackers use their
knowledge and skill for their own
personal gains probably by hurting
others.
White-Hat Hacker
• White hat hackers are those
individuals professing hacker
skills and using them for
defensive purposes.
• This means that the white hat
hackers use their knowledge and
skill for the good of others and
for the common good.
Grey-Hat Hackers
• These are individuals who work
both offensively and defensively
at various times.
• We cannot predict their behavior.
• Sometimes they use their skills
for the common good while in
some other times he uses them for
their personal gains.
What should do after hacked?
 Shutdown or turn off the system
 Restore the system with the backup
or reinstall all programs
 Connect the system to the network
 It can be good to call the police
Hacking Process
• Foot Printing :Gathering information.
• Scanning : Analyzing networks and systems.
• Gaining Access :Entering a system.
• Maintaining Access :Keeping control for a long
time.
Foot Printing
• Who is lookup :Retrieves domain ownership and
registration details.
• NS lookup :Finds the name servers (DNS) for a domain.
• IP lookup :Checks IP address details like location and ISP.
Scanning
• Port Scanning :Identifying open ports in a network.
• Network Scanning :Finding active devices and
their details in a network.
• Finger Printing : Identifying and gathering details
about a system or device.
• Fire Walking :Gathering information about networks
and servers behind a firewall.
Gaining Access
• Password Attacks :Techniques to steal or crack
passwords.
• Social Engineering :Deceiving people to obtain
sensitive information.
• Viruses :Malicious programs that harm systems.
Maintaining Access
• OS Back Doors :Hidden paths that allow
unauthorized access.
• Trojans : Malicious software disguised as legitimate
programs.
• Clears Tracks : Erasing evidence of hacking
activities.
Why do you need Ethical hacking
Protection from possible External Attacks
Required Skills of an Ethical Hacker
• Microsoft : skills in operation, configuration and management.
• Linux : knowledge of Linux/Unix; security setting, configuration,
and services.
• Firewalls : configurations, and operation of intrusion detection
systems.
Required Skills of an Ethical Hacker….
• Routers : knowledge of routers, routing protocols, and access
control lists
• Mainframes : knowledge of mainframes
• Network Protocols : TCP/IP; how they function and can be
manipulated.
• Project Management : leading, planning, organizing, and
controlling a penetration testing team.
What do hackers do after hacking?...
• Patch Security hole
 The other hackers can’t intrude
• Clear logs and hide themselves
• Install rootkit ( backdoor )
 The hacker who hacked the system can use the
system later
 It contains trojan virus, and so on
• Install irc related program
 identd, irc, bitchx, eggdrop, bnc
What do hackers do after hacking?
• Install scanner program
 m scan, s scan, n map
• Install exploit program
• Install denial of service program
• Use all of installed programs silently
Advantages
• To catch a thief you have to think like a thief.
• Helps in closing the open holes in the system network.
• Provides security to banking and financial establishments.
• Prevents website defacements.
• An evolving technique.
Disadvantages
• All depends upon the trustworthiness of the ethical hacker.
• Hiring professionals is expensive.
Future Enhancements
• As it an evolving branch the scope of enhancement in
technology is immense.
• No ethical hacker can ensure the system security by using the
same technique repeatedly.
• More enhanced software’s should be used for optimum
protection.
References
• www.google.com
• www.wikipedia.org
• www.tutorialspoint.com
Thank You…
Any Questions…?

Ethical Hacking.pptx Hacker Presentation

  • 1.
    Ethical Hacking Submitted By:Submitted To: Ms. Kanchan Nahar Name-Sahil Hussain Assistant professor Roll No.-1324458 BCA-2nd Semester
  • 2.
    Content • Introduction • EthicalHacking • Who are Hackers • Why do Hackers hack • Types of Hackers • Hacking Process • Why do We need Ethical Hacking • Required Skills of an Ethical Hacker • What do hackers do after Hacking? • Advantages • Disadvantages • Future Enhancements
  • 3.
    Introduction  Ethical hackingalso known as penetration testing or white-hat hacking, involves the same tools, tricks ,and Techniques that hackers use ,but with one major difference that Ethical hacking is legal.
  • 4.
    Ethical Hacking o Independentcomputer security Professionals into the computer systems. o Neither damage the target systems nor steal information. o Evaluate target systems security and report back to owners about the bugs found.
  • 5.
    Who are Hackers? • A person who enjoys learning details of a programming language or system. • A person who enjoys actually doing the programming rather than just theorizing about it. • A person capable of appreciating someone else’s hacking. • A person who picks up programming quickly. • A person who is an expert at a particular programming language or system.
  • 6.
    Why do hackershack ?  Just for fun.  Show off.  Hack other systems secretly.  Notify many people their thought.  Steal important information.  Destroy enemy’s computer network during the war.
  • 7.
    Ethical Hackers butnot Criminal Hackers o Completely trustworthy. o Strong programming and computer networking skills. o Learn about the system and trying to find its weaknesses. o Techniques of Criminal hackers- Detection-Prevention.
  • 8.
    Types of Hackers oBlack Hat Hacker o White Hat Hacker o Grey Hat Hacker
  • 9.
    Black-Hat Hacker • Ablack hat hackers or crackers are individuals with extra ordinary computing skills, resorting to malicious or destructive activities. • That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others.
  • 10.
    White-Hat Hacker • Whitehat hackers are those individuals professing hacker skills and using them for defensive purposes. • This means that the white hat hackers use their knowledge and skill for the good of others and for the common good.
  • 11.
    Grey-Hat Hackers • Theseare individuals who work both offensively and defensively at various times. • We cannot predict their behavior. • Sometimes they use their skills for the common good while in some other times he uses them for their personal gains.
  • 12.
    What should doafter hacked?  Shutdown or turn off the system  Restore the system with the backup or reinstall all programs  Connect the system to the network  It can be good to call the police
  • 13.
    Hacking Process • FootPrinting :Gathering information. • Scanning : Analyzing networks and systems. • Gaining Access :Entering a system. • Maintaining Access :Keeping control for a long time.
  • 14.
    Foot Printing • Whois lookup :Retrieves domain ownership and registration details. • NS lookup :Finds the name servers (DNS) for a domain. • IP lookup :Checks IP address details like location and ISP.
  • 15.
    Scanning • Port Scanning:Identifying open ports in a network. • Network Scanning :Finding active devices and their details in a network. • Finger Printing : Identifying and gathering details about a system or device. • Fire Walking :Gathering information about networks and servers behind a firewall.
  • 16.
    Gaining Access • PasswordAttacks :Techniques to steal or crack passwords. • Social Engineering :Deceiving people to obtain sensitive information. • Viruses :Malicious programs that harm systems.
  • 17.
    Maintaining Access • OSBack Doors :Hidden paths that allow unauthorized access. • Trojans : Malicious software disguised as legitimate programs. • Clears Tracks : Erasing evidence of hacking activities.
  • 18.
    Why do youneed Ethical hacking Protection from possible External Attacks
  • 19.
    Required Skills ofan Ethical Hacker • Microsoft : skills in operation, configuration and management. • Linux : knowledge of Linux/Unix; security setting, configuration, and services. • Firewalls : configurations, and operation of intrusion detection systems.
  • 20.
    Required Skills ofan Ethical Hacker…. • Routers : knowledge of routers, routing protocols, and access control lists • Mainframes : knowledge of mainframes • Network Protocols : TCP/IP; how they function and can be manipulated. • Project Management : leading, planning, organizing, and controlling a penetration testing team.
  • 21.
    What do hackersdo after hacking?... • Patch Security hole  The other hackers can’t intrude • Clear logs and hide themselves • Install rootkit ( backdoor )  The hacker who hacked the system can use the system later  It contains trojan virus, and so on • Install irc related program  identd, irc, bitchx, eggdrop, bnc
  • 22.
    What do hackersdo after hacking? • Install scanner program  m scan, s scan, n map • Install exploit program • Install denial of service program • Use all of installed programs silently
  • 23.
    Advantages • To catcha thief you have to think like a thief. • Helps in closing the open holes in the system network. • Provides security to banking and financial establishments. • Prevents website defacements. • An evolving technique.
  • 24.
    Disadvantages • All dependsupon the trustworthiness of the ethical hacker. • Hiring professionals is expensive.
  • 25.
    Future Enhancements • Asit an evolving branch the scope of enhancement in technology is immense. • No ethical hacker can ensure the system security by using the same technique repeatedly. • More enhanced software’s should be used for optimum protection.
  • 26.
  • 27.