Seminar Ethical Hacking
Seminar Ethical Hacking
On
Ethical Hacking
Submitted By
Vavaliya Piyush D.
Submitted To
Naran Lala
History of Hacking:-
h) 1986: Congress passes Computer Fraud and Abuse Act; crime to break
into computer systems.
• BASIC MEANING :
In simple words Ethical Hacking is testing the resources for a good
cause and for the betterment of technology. It also means to secure the
system.
• TECHNICAL MEANING :
Technically Ethical Hacking is done by a computer hacker who is hired
by an organization to undertake non malicious hacking work in order to
discover computer-security flaws.
G
W
h
:B
TYPES OF HACKERS
tkL
glyb Sp
in
m ro
rsA
d
Ce
ck
a
Job of each hacker
The White Hat Approach:
The term "white hat" in Internet slang refers to an ethical computer hacker, or
a computer security expert, who specializes in penetration testing and in other testing
methodologies to ensure the security of an organization's information systems.
A "black hat" hacker is a hacker who "violates computer security for little
reason beyond maliciousness or for personal gain" .The Black Box model follows a
stochastic approach to the attack .
Advantages:
a) These are good hackers.
b) Have registered police records
c) Generally owned by companies for security designing
d) They have high salaries
Successful ethical hackers possess a variety of skills. First and foremost, they
must be completely trustworthy.
They are also adept at installing and maintaining systems that use the more
popular operating systems (e.g., Linux or Windows 2000) used on target systems.
These base skills are augmented with detailed knowledge of the hardware and
software provided by the more popular computer and networking hardware
vendors.
Globally, the hiring of ethical hackers is on the rise with most of them working
with top consulting firms.
In the United States, an ethical hacker can make upwards of $120,000 per
annum.
http://www.infosecacademy.com
• (C|EH) examination
Outsider attack
Physical entry
Anatomy of an attack:
• Reconnaissance – attacker gathers information; can include social
engineering.
• Scanning – searches for open ports (port scan) probes target for
vulnerabilities.
• Covering tracks – deletes files, hides files, and erases log files. So that
attacker cannot be detected or penalized.
Ec-Council
Ec-Council Topics Covered
Introduction to Ethical Hacking
Foot printing
Scanning
Enumeration
System Hacking
Sniffers
Denial of Service
Social Engineering
Session Hijacking
SQL Injection
Viruses
Novell Hacking
Linux Hacking
Buffer Overflows
Cryptography
File Query
Browser caching
SQL Injection
Pages with sensitive data should not be cached: page content is easily accessed
using browser’s history.
• Issues that arise are Information is stored on a local computer (as files or in the
browser’s history) Unencrypted data can be intercepted on the network and/or
logged into unprotected web log files.
Malicious code can secretly gather sensitive data from user while using authentic
website (login, password, cookie).