Seminar On Ethical Hacking Submitted To: Submitted By:

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

ETHICAL HACKING.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Ethical Hacking Pratheeba Murugesan. HACKER AENDA  What is Ethical Hacking?  Who are ethical hackers?  Every Website-A Target  Get out of jail free.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Rootkit Definition A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a.
What is hacking? Taeho Oh
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
CYBER CRIME AND SECURITY TRENDS
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Hacker Zombie Computer Reflectors Target.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Topic 5: Basic Security.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Filip Chytrý Everyone of you in here can help us improve online security....
PRESENTED BY : Bhupendra Singh
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Technical Implementation: Security Risks
Botnets A collection of compromised machines
Topic 5 Penetration Testing 滲透測試
Computer Security and Ethical Hacking
Ethical Hacking By: Erin Noonan.
Critical Security Controls
Backdoor Attacks.
Secure Software Confidentiality Integrity Data Security Authentication
Onno W. Purbo Cracking Techniques Onno W. Purbo
Operating system Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Impact Of ICT “Hacking”
Answer the questions to reveal the blocks and guess the picture.
Botnets A collection of compromised machines
Teaching Computing to GCSE
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Risk of the Internet At Home
Preparing for The Present & The Future
Forensics Week 12.
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
Ethical Hacking.
– Communication Technology in a Changing World
Computer Security By: Muhammed Anwar.
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
WJEC GCSE Computer Science
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
Presentation transcript:

Seminar On Ethical Hacking Submitted To: Submitted By: CNC ANIRUDH P MENON 1

Content Introduction Ethical Hacking Hackers Types of Hackers Hacking Process Why do We need Ethical Hacking Required Skills of an Ethical Hacker

Content… What do hackers do after Hacking? Advantages Disadvantages Future Enhancements Conclusion and Personal suggestion Demonstration RAT

Introduction Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use,but with one major difference that Ethical hacking is legal.

Ethical Hacking Independent computer security Professionals breaking into the computer systems. Neither damage the target systems nor steal information. Evaluate target systems security and report back to owners about the vulnerabilities found.

Hackers A person who enjoys learning details of a programming language or system A person who enjoys actually doing the programming rather than just theorizing about it A person capable of appreciating someone else's hacking A person who picks up programming quickly A person who is an expert at a particular programming language or system

Types of Hackers Black Hat Hacker White Hat Hacker Grey Hat Hacker

Black-Hat Hacker A black hat hackers or crackers are individuals with extraordinary computing skills, resorting to malicious or destructive activities. That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others.

White-Hat Hacker White hat hackers are those individuals professing hacker skills and using them for defensive purposes. This means that the white hat hackers use their knowledge and skill for the good of others and for the common good.

Grey-Hat Hackers These are individuals who work both offensively and defensively at various times. We cannot predict their behavior. Sometimes they use their skills for the common good while in some other times he uses them for their personal gains.

Hacking Process General step of hacking Foot Printing Scanning Gaining Access Maintaining Access

Foot Printing Whois lookup NS lookup IP lookup

Scanning Port Scanning Network Scanning Finger Printing Fire Walking

Gaining Access Password Attacks Social Engineering Viruses

Maintaining Access Os BackDoors Trojans Clears Tracks

Why Do We Need Ethical Hacking Protection from possible External Attacks Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Restricted Data

Required Skills of an Ethical Hacker Microsoft: skills in operation, configuration and management. Linux: knowledge of Linux/Unix; security setting, configuration, and services. Firewalls: configurations, and operation of intrusion detection systems.

Required Skills of an Ethical Hacker…. Routers: knowledge of routers, routing protocols, and access control lists Mainframes Network Protocols: TCP/IP; how they function and can be manipulated. Project Management: leading, planning, organizing, and controlling a penetration testing team.

What do hackers do after hacking?... Patch Security hole The other hackers can’t intrude Clear logs and hide themselves Install rootkit ( backdoor ) The hacker who hacked the system can use the system later It contains Trojan virus, and so on

What do hackers do after hacking? Install scanner program mscan, sscan, nmap Install exploit program Install denial of service program Use all of installed programs silently

Advantages ‘’To catch a thief you have to think like a thief” Helps in closing the open holes in the system network Provides security to banking and financial establishments Prevents website defacements An evolving technique

Disadvantages All depends upon the trustworthiness of the ethical hacker Hiring professionals is expensive.

  Future Enhancements As it an evolving branch the scope of enhancement in technology is immense. No ethical hacker can ensure the system security by using the same technique repeatedly. More enhanced software’s should be used for optimum protection.

Conclusion and Personal suggestion In the preceding sections we saw the methodology of hacking, why should we aware of hacking and some tools which a hacker may use. Now we can see what can we do against hacking or to protect ourselves from hacking. The first thing we should do is to keep ourselves updated about those software’s we and using for official and reliable sources. Educate the employees and the users against black hat hacking.

Model for Network Security

Demonstration RAT To create RAT (remote access Trojan) Binding to a file Establishing connection Attacking Clearing tracks Exiting

Any Questions and Quires?????????

THANK YOU