0% found this document useful (0 votes)
134 views2 pages

Ethical Hacking PPT

The document discusses the process of ethical hacking which involves using the same tools and techniques as illegal hackers but within legal limits to test an organization's security. It explains the different types of hackers, the typical steps in ethical hacking including footprinting, scanning, gaining access and maintaining access. Required skills for ethical hackers and advantages and disadvantages of ethical hacking are also covered.

Uploaded by

Sagar Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
134 views2 pages

Ethical Hacking PPT

The document discusses the process of ethical hacking which involves using the same tools and techniques as illegal hackers but within legal limits to test an organization's security. It explains the different types of hackers, the typical steps in ethical hacking including footprinting, scanning, gaining access and maintaining access. Required skills for ethical hackers and advantages and disadvantages of ethical hacking are also covered.

Uploaded by

Sagar Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Ethical

hacking ppt pdf

What is ethical hacking pdf.


Ethical hacking ppt pdf download. Ethical hacking methods. What is ethical hacking ppt. Ethical hacking seminar ppt with pdf report. Concept of ethical hacking.

Ethical Hacking Seminar and PPT with pdf report: Ethical hacking is also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal.Also See: Android PPTEthical Hacking is used in closing the open holes in the system network. It also
provides security to banking and financial establishments and prevents website defacements. But there are some disadvantages of ethical hacking such as:All depends upon the trustworthiness of the ethical hackerHiring professionals is expensive.Types of HackersBlack Hat HackerWhite Hat HackerGrey Hat HackerHacking ProcessFoot
PrintingScanningGaining AccessMaintaining AccessAlso See: Digital Signature PPTRequired Skills of an Ethical HackerMicrosoft: skills in operation, configuration and management.Linux: knowledge of Linux/Unix; security setting, configuration, and services.Firewalls: configurations, and operation of intrusion detection systems.Routers: knowledge
of routers, routing protocols, and access control listsMainframesNetwork Protocols: TCP/IP; how they function and can be manipulated.Content of the Seminar and pdf report for Ethical HackingIntroductionEthical HackingHackersTypes of HackersHacking ProcessWhy do We need Ethical HackingRequired Skills of an Ethical HackerWhat do hackers
do after Hacking?AdvantagesDisadvantagesFuture EnhancementsConclusionAlso See: Digital Watermarking PPTHere we are giving you Ethical Hacking Seminar and PPT with PDF report. All you need to do is just click on the download link and get it.Ethical Hacking PPT and Seminar Free DownloadEthical Hacking pdf Report Free DownloadIt was
all about Ethical Hacking Seminar and PPT with pdf report. If you liked it then please share it or if you want to ask anything then please hit the comment button. 05:34+00:00Sumit ThakurMCAEthical Hacking Seminar and PPT with pdf report: Ethical hacking is also known as penetration testing or white-hat hacking, involves the same tools, tricks,
and techniques that hackers use, but with one major difference that Ethical hacking is legal.Also See: Android PPTEthical Hacking Seminar PPT with pdf report Ethical Hacking...Sumit ThakurSumit [email protected] am an Indian Blogger. I am passionate about blogging. If you want to ask me anything about blogging then
feel free to ask StudyMafia Be the first to like this 1 Computer Security and Ethical Hacking 2 Contents Overview of Hacking Types of hacking Hacker Types of HackerWhy do hackers hack? How can kid hack? What does a script kid know? Hackers language How to translate the hackers’ language 3 Content continued… Ethical Hacking Ethical
Hacking – ProcessWhat hackers do after hacking? Why can’t defend against hackers? How can protect the system? What should do after hacked? Final words 4 overview of hacking Hack Examine something very minutelythe rapid crafting of a new program or the making of changes to existing, usually complicated software Hacker The person who
hacks Cracker System intruder/destroyer 5 Types of hacking Normal data transfer Interruption InterceptionModification Fabrication 6 HACKER : Someone who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers Person who is totally immersed in computer technology and programming,
and who likes to examine the code of programs to see how they work … then uses his or her computer expertise for illicit purposes such as gaining access to computer systems without permission and tampering with programs and data. At that point, this individual would steal information and install backdoors, virus and Trojans Hacker means cracker
nowadays. 7 Types of hacker White Hat Hackers:who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. Black Hat Hackers: A black hat is the villain or bad guy, especially in a western movie in which such a character would stereotypically wear a black hat in contrast to
the hero's white hat. Gray Hat Hackers: A grey hat, in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra 8 Types of hacker continued…Script Kiddies: who use scripts or programs developed by others to attack computer systems and networks and deface
websites.[ Phreak Person who breaks into telecommunications systems to [commit] theft Cyber Punk Recent mutation of … the hacker, cracker, and phreak 9 Why do people hack?? To make security stronger ( Ethical Hacking )Just for fun Show off Hack other systems secretly Notify many people their thought Steal important information Destroy
enemy’s computer network during the war 10 How can kid hack? Kid has much of timeKid can search for longer time than other people All hacking program is easy to use Kid doesn’t have to know how the hacking program works These kids are called script kiddies 11 What do a Script Kiddies know???Don’t know how to use vi Don’t know what unix is
Don’t know what they do Know how to intrude the system Know how to crash the system Know where the hacking programs are 12 Hackers language : 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l |\| -> n |\/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x 13 Hackers langauge translationEx) 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3n 1 h4ck3d 1n I did not hack this page, it was like this when I hacked in 14 What is Ethical HackingIt is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet at particular point of time Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are
done in a non-destructive manner Also Called – Attack & Penetration Testing, 15 Hacking - Process Preparation Foot printingEnumeration & Fingerprinting Identification of Vulnerabilities Attack – Exploit the Vulnerabilities Gaining Access Escalating privilege Covering tracks Creating back doors 16 1. Preparation Identification of Targets – company
websites, mail servers, extranets, etc. Signing of Contract Agreement on protection against any legal issues Contracts to clearly specifies the limits and dangers of the test Specifics on Denial of Service Tests, Social Engineering, etc. Time window for Attacks Total time for the testing Prior Knowledge of the systems Key people who are made aware of
the testing 17 2.
Foot printing Collecting as much information about the targetDNS Servers IP Ranges Administrative Contacts Problems revealed by administrators Information Sources Search engines Forums Databases – whois, Tools – PING, whois, Traceroute, nslookup 18 3. Enumeration & FingerprintingSpecific targets determined Identification of Services / open
ports Operating System Enumeration Methods Banner grabbing Responses to various protocol (ICMP &TCP) commands Port / Service Scans – TCP Connect, TCP SYN, TCP FIN, etc. Tools Nmap, FScan, Hping, Firewalk, netcat, tcpdump, ssh, telnet, SNMP Scanner 19 4. Identification of VulnerabilitiesIt is a weakness which allows an attacker to
reduce a system's information assurance.
Insecure Configuration Weak passwords Unpatched vulnerabilities in services, Operating systems, applications Possible Vulnerabilities in Services, Operating Systems Insecure programming Weak Access Control 20 Identification of Vulnerabilities cont..Tools Vulnerability Scanners - Nessus, ISS, SARA, SAINT Listening to Traffic – Ethercap, tcpdump
Password Crackers – John the ripper, LC4, Pwdump Intercepting Web Traffic – Achilles, Whisker, Legion 21 5. Attack – Exploit the vulnerabilitiesNetwork Infrastructure Attacks Connecting to the network through modem Weaknesses in TCP / IP, NetBIOS Flooding the network to cause DOS Operating System Attacks Attacking Authentication Systems
Exploiting Protocol Implementations Exploiting Insecure configuration Breaking File-System Security 22 6. Gaining access: Enough data has been gathered at this point to make an informed attempt to access the target Techniques Password eavesdropping File share brute forcing Password file grab Buffer overflows 23 7. Escalating PrivilegesIf only
user-level access was obtained in the last step, the attacker will now seek to gain complete control of the system Techniques Password cracking Known exploits 24 8. Covering Tracks Once total ownership of the target is secured, hiding this fact from system administrators becomes paramount, lest they quickly end the romp.
Techniques Clear logs Hide tools 25 9. Creating Back Doors Trap doors will be laid in various parts of the system to ensure that privileged access is easily regained at the whim of the intruder Techniques Create rogue user accounts Schedule batch jobs Infect startup files Plant remote control services Install monitoring mechanisms Replace apps with
trojans 26 Denial of Service If an attacker is unsuccessful in gaining access, they may use readily available exploit code to disable a target as a last resort Techniques SYN flood ICMP techniques Identical SYN requests Overlapping fragment/offset bugs Out of bounds TCP options (OOB) DDoS 27 What do hackers do after hacking? (1)Patch security
hole The other hackers can’t intrude Clear logs and hide themselves Install rootkit ( backdoor ) The hacker who hacked the system can use the system later It contains trojan virus, and so on Install irc related program identd, irc, bitchx, eggdrop, bnc 28 What do hackers do after hacking? (2)Install scanner program mscan, sscan, nmap Install exploit
program Install denial of service program Use all of installed programs silently 29 Why can’t defend against hackers?There are many unknown security hole Hackers need to know only one security hole to hack the system Admin need to know all security holes to defend the system 30 How can protect the system?Patch security hole often Encrypt
important data Ex) pgp, ssh Do not run unused daemon Remove unused setuid/setgid program Setup loghost Backup the system often Setup firewall Setup IDS Ex) snort 31 What should do after hacked?Shutdown the system Or turn off the system Separate the system from network Restore the system with the backup Or reinstall all programs
Connect the system to the network 32 Thank You !!! Be the first to like this You're Reading a Free Preview Pages 8 to 13 are not shown in this preview. You're Reading a Free Preview Pages 18 to 27 are not shown in this preview. Ethical hack ing ppt pdf Ethical hack ing ppt pdf Ethical hacking ppt pdf DOWNLOAD! DIRECT DOWNLOAD! Ethical
hacking ppt pdf This PPT will give you a brief idea of Ethical Hacking. ethical hacking ppt slides INTRODUCTION TOETHICAL HACKING By Neel kamal. This page contains Ethical Hacking Seminar and PPT with pdf report.Download Ethical Hacking complete documentation with ppt and pdf for.This Page Provides the Latest Information on
EthicalHacking with Fr ee Download of Seminar Re port and PPT in PDF and DOC Format. Also Explore the.Hackers and their vocabularyThreats and risks Types of hackers Gaining access Intrusion detection and prevention Legal and ethical issues. Ethical Hacking -authorSTREAM Presentation. Pls send this ppt to eyinadekaygmail.com.thanks.
September 7, 2013 at 1. ethical hacking ppt in ieee format Overview Old School Hackers: History earthquake hazard analysis issues and insights pdf of Hacking Ec-Council: Certified EthicalHacker Learning Competencies Teaching Resources: Ethical. Strong programming and computer networking skills. Date: 17032015. Learn about the system and
trying to.

ISACA Presentation: Ethical Hacking: 24 October, 2006. ethical hacking ppt 2014 Introduction and comments by three Ethical Hacking Practitioners.Ethical hacking - computer engineering seminars. ethical hacking ppt for seminars Note: - This seminar download only contain PPT. ethical hacking ppt and documentation free download
Published.Hacking and as well the detailed role of the ethical hacking as the. Hello sir, its a wonderful and knowledgeable ppt plz would u snd me it for. Centralized idea of the ethical hacking and all its aspects as a whole. ethical hacking ppt abstract SEMINAR ON NETWORK SECURITY AND ETHICAL HACKING. Date: 17032015.Ethical Hacking.
Every Website-A Target Getout of jail free card. Paper Presentation On Ethical Hacking. ethical hacking ppt pdf download If Any One Requires This PPT, Abstract PDF File With Out Strikingsoon WaterMarks or Required.Ethical hacking by C.

ethical hacking ppt slideshare The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast storesof.Introducing ethical hacking and essential terminology for the module. Understanding the different phases involved in an exploit bya hacker. Overview of.CEHV7- 01 -Certified Ethical Hacker Series
Introduction.flv, 13-Jun-2014 07: ebu zehra mezhepler tarihi pdf 45. CEHV7 - Module 01 - Introduction to Ethical Hacking.pdf, 13-Jun-2014 10: 27.EC-Council Certified Ethical Hacker v6. Academia.edu uses cookies to personalize content, tailor ads and improve the user experience. By using our site, you agree to our collection of information through
the use of cookies. To learn more, view our Privacy Policy.

You might also like