Ethical Hacking
Ethical Hacking
L H AC
H IC A
ET
PRESENTED BY :
Sarjerao Mengane
CONTENT
INTRODUCTION METHODOLOGY
HISTORY REPORTING
Black-Hat Hackers-
-----Ethical Hacker
White-Hat Hackers
-----Cracker
Grey-Hat Hackers
----- Skilled Hacker
ETHICAL HACKING
Microsoft :
Linux :
Firewalls :
Routers :
Network Protocols :
Project Management :
Reconnaissance:
This literal meaning of the Word reconnaissance means a
preliminary survey to gain the information . This is also known as
foot-printing. As given in the analogy, this is the stage in which the
hacker collects information about the company which the personal
is going to hack. This is one of the pre-attacking phases.
Scanning:
The hacker tries to make a blue print of the target network. The
blue print includes the IP addresses of the target network which
are live, the services which are running on those systems and so
on Modern port scanning uses TCP protocol to do scanning and
they could even detect the operating systems running on the
particular hosts.
Password Cracking:
There are many methods for cracking the password and then
get in to the system. The simplest method is to guess the
password. But this is a tedious work. But in order to make this
work easier there are many automated tools for password
guessing like legion.
Privilege escalation
Privilege escalation is the process of raising the privileges once
the hacker gets in to the system The privilege escalation
process usually uses the vulnerabilities present in the host
operating system or the software. There are many tools like
hk.exe, metasploit etc. One such community of hackers is the
metasploit
Ethical hacking tools:
Advantages
“To catch a thief you have to think like a thief”
Help in closing the open holes in the network
Provides security to banking and financial
establishments
Prevents website defacements
An evolving technique
Future enhancements:
Student
A student should understand that no software is
made with zero Vulnerability. So while they are
studying they should study the various possibilities
and should study how to prevent that because they
are the professionals of tomorrow
REFERENCE
www.scribd.com
www.wikipedia/seminartopics/ethical haching.org