Cyber Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 26

Presented by:

J.Sripranav
(20AG1A0425)
Contents

 Introduction
 Ethical hacking
 Who are hackers
 Why do hackers hack
 Types of hackers
 What should do after hack
 Hacking process
 Why do we need ethical hacking
 Required skills of an ethical hacker
 What do hackers do after hacking
 Advantages
 Disadvantages
 Future enhancements
 Conclusion
Introduction
Ethical hacking also known as penetration
testing or white-hat hacking,involves the same
tools, tricks, and techniques that hackers use,
but with one major difference that ethical
hacking legal.
Ethical hacking

 Independent computer security professionals breaking into the


computer systems
 Neither damage the target systems nor steal information
 Evaluate target systems security and report back to owners about the
bugs found.
Who are hackers?
 A person who enjoy learning details of a programming
language or system.
 A person who enjoy actually doing the programming
rather then just theorizing about it.
 A person capable of appreciating someone else’s hacking.
 A person who picks up programming quickly.
 A person who is an expert at a particular programming or a system.
Why do hackers hack?
 Just for fun
 Show off
 Hack others systems secretly
 Notify many people their thought
 Steal important information
 Destroy enemy’s computer network during the war
Ethical hackers are not criminal
hackers
 Completely trustworthy
 Strong programming and computer networking skills
 Learn about the system and trying to fid its weaknesses
 Techniques of criminal hackers-detection-prevention
Types of hackers

 Black hat hacker

 White hack hacker

 Grey hat hacker


Black hat hacker
 A black hat hackers or crackers are individuals with
extraordinary computing skills, restoring to malicious or
destructive activities.
 That is black hat hackers use their own personal gains
probably by hurting others.
White hat hackers
 White hat hackers are those individuals professing hackers
skills and using them for defensive purpose.
 This means that the white hat hackers use their knowledge and
skill for the good of others and for the common good.
Grey hat hackers
 Theseare individuals who work both offensively and
defensively at various times.
 We cannot predict their behavior.
 Sometimes they use their skills for the common good while in
some other times he use them for their personal gains.
What should do after hacked?

 Shutdown or turn off the system


 Separate the system from the network
 Restore the system with the backup or reinstall all programs
 Connect the system to the network
 It can be good to call the police
Hacking process
 Foot printing
 Scanning

 Gaining access
 Maintaining access
Foot printing
 Whois lookup
 Ns lookup
 Ip lookup
Scanning
 Port scanning
 Network scanning
 Finger printing
 Fire walking
Gaining Access
 Password attacks
 Social engineering
 viruses
Maintaining Access
 Os BackDoors
 Trojans

 Clears Tracks
Requried skills of an ethical hacker

 Microsoft: skills in operation, configuration and management.


 Linux: knowledge of linux/unix; security setting, configuration, and
services.
 Firewalls: configurations, and operation of intrusion detection systems.
 Routers: knowledge of routers, routing protocols, and access control lists
 Mainframes: knowledge of mainframes
 Network protocols: TCP/IP; how they function and can be manipulated.
 Project management: leading,planning,organizing, and controlling a
penetration testing team.
What do hackers do after hacking?...

 Patch security hole


 The other hackers cant intrude
 Clear logs and hide themselves
 Installrootkit (backdoor)
 The hacker who hacked the system can use the system later
 It contains trojan virus, and so on
 Install irc related program
 Identd,irc,bitchhx,eggdrop,bnc
What do hackers do after hacking?

 Instakk scanner program


Mscan,sscan,nmap

 Install exploit program


 Install denial of service program
 Use all of installed programs silently
Advantages
 To catch a thief you have to think like thief.
 Helps in closing the open holes in the system network.
 Provides security to banking and financial
establishments.
 Prevents website defacements.
 An evolving technique.
Disadvantages
 Alldepends upon the trustworthiness of the ethical
hacker.
 Hiring professionals is expensive.
Future Enhancements
 Asit an evolving branch the scope of enhancement in
technology is immense.
 Noethical hacker can ensure the system security by using the
same technology repeatedly.
 More enhanced softwares should be used for optimum
protection.
Conclusion
 Inthe preceding section we saw the methodology of hacking.
why should we aware of hacking and some tools which a
hacker may use.
 Now we can see what can we do against hacking or to protect
ourselves from hacking.
 The first thing we should do is keep ourselves updated about
the software’s we and using for official and reliable sources.
 Educate the employees and the users against the black hat
hackers.

You might also like