ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

ETHICAL HACKING.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Computer Threats I can understand computer threats and how to protect myself from these threats.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Hands-On Ethical Hacking and Network Defense
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Hacking and Network Defense. Introduction  With the media attention covering security breaches at even the most tightly controlled organization, it is.
Computer Hacking Cybercrime (1).
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Introduction of Internet security Sui Wang IS300.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer crimes.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Filip Chytrý Everyone of you in here can help us improve online security....
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Seminar On Ethical Hacking Submitted To: Submitted By:
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Impact Of ICT “Hacking”
Answer the questions to reveal the blocks and guess the picture.
Computer Security Elaine Munn Introduction to Computer Security.
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
Faculty of Science IT Department By Raz Dara MA.
Ethical Hacking.
Computer Security By: Muhammed Anwar.
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
How hackers do it Ron Woerner Security Administrator CSG Systems, Inc.
Test 3 review FTP & Cybersecurity
Presentation transcript:

ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology

 Companies are worried about the possibility of being “hacked” and potential customers are worried about maintaining control of personal information.  Ethical Hacking is not an automated hacker program rather it is an audit that both identifies the vulnerabilities of a system and provide advice on how to eliminate them.  To catch a thief,think like a thief.

 A Person who enjoys learning the details of computer systems and how to stretch their capabilities.  One who program enthusiastically.  Enjoys programming rather than just theorizing about it.

 Old School Hackers: 1960s style Stanford or MIT hackers. Do not have malicious intent, but do have lack of concern for privacy and proprietary information. They believe the Internet was designed to be an open system.  Script Kiddies or Cyber-criminals: Between 12-30; bored in school; get caught due to bragging online; intent is to vandalize or disrupt systems.  Professional Criminals or Crackers: Make a living by breaking into systems and selling the information.  Coders and Virus Writers: See themselves as an elite; programming background and write code but won’t use it themselves; have their own networks called “zoos”; leave it to others to release their code into “The Wild” or Internet.

Source: CERT-India January June 01, 2004 to Dec.31, 2004 DomainsNo of Defacements.com922.gov.in24.org53.net39.biz12.co.in48.ac.in13.info3.nic.in2.edu2 other13 Total1131 Defacement Statistics for Indian Websites

Source: CERT/CC Total Number of Incidents INCREMENT IN ATTACKS WITH TIME

 Ethical hacking is a scheme of having independent computer security professionals who attempt to break into the system to find vulnerabilities in the system.  Dynamic process.  Also known as penetration testing.  Neither damage the target systems nor steal information.  Evaluate target systems security and report back to owners about the vulnerabilities found.

8  Hackers ◦ Access computer system or network without authorization ◦ Breaks the law; can go to prison  Crackers ◦ Break into systems to steal or destroy data ◦ U.S. Department of Justice calls both hackers  Ethical hacker ◦ Performs most of the same activities but with owner’s permission

Someone who is  Skilled  Programming and networking skills  Installation and maintenance skills  System management skills  Knowledgeable  Hardware and software  Trustworthy  Patient and Persistent  Certified

10  When doing a penetration test, have a written contract giving you permission to attack the network  Using a contract is just good business  Contracts may be useful in court  Have an attorney read over your contract before sending or signing it

Black Hat Hacker: Use knowledge for personal gain. White Hat Hacker: Use skills for defensive purposes. Grey Hat Hacker: Work both offensively & defensively.

Five steps of hacking: 1. Footprinting 2. Scanning and enumeration 3. Gaining access 4. Maintaining access 5. Clearing tracks

Objective Target Address range, namespace, acquisition and information gathering are essential to a surgical attack. Techniques & Tools 1. Open source search 2. Samspade 3. tracker & visual route

Objective Make blue print of target network. Techniques & Tools 1. War dialing 2. Pinger 3. Port Scanning 4. Nmap(Network Mapper) 5. Enumeration

Objective Enough data has been gathered at this point to make an informed attempt to access the target. Techniques & Tools 1. Password eavesdropping 2. LoftCrack 3. Priviledge Escalation 4. Metaspoilt 5. Man in Middle Attack

Objective Now hacker is inside the system. Next aim is to make an easier path to get in when he comes next time. Techniques & Tools 1. Key Stroke Logger 2. Create rogue user accounts 3. Infect startup files 4. Install monitoring mechanisms 5. Wrappers 6. Replace applications with trojans 7. Elitewrap

Objective Once total ownership of the target is secured, hiding the fact that hacker is here from system administrators becomes paramount. Techniques & Tools 1. Auditpol.exe 2. Eslave 3. Evidence Eliminator 4. Winzapper

Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data Different kinds of system attacks

 Helps in closing the open holes in the system network  Provides security to banking and financial establishments  Prevents website defacements  An evolving technique

 All depends upon the trustworthiness of the ethical hacker.  Hiring professionals is expensive.

Main aim of seminar is to make you understand that there are so many tools through which a hacker can get in to a system. Various needs from various perspectives:  Student: A student should understand that no software is made with zero Vulnerabilities.  Professionals: Professionals should understand that business is directly related to Security. So they should make new software with vulnerabilities as less as possible.  Users: If software is highly secure but user is unaware of security then it would be like a secured building with all doors open by insider.