+ All Categories
Home > Technology > Cse ethical hacking ppt

Cse ethical hacking ppt

Date post: 21-Mar-2017
Category:
Upload: shahid-ansari
View: 36 times
Download: 9 times
Share this document with a friend
25
A Seminar ON ETHICAL HACKING By SHAHID ANSARI MCA Department of Computer Science and Engineering Madan Mohan Malaviya University of Technology Session(2015-16)
Transcript
Page 1: Cse ethical hacking ppt

A Seminar ON

ETHICAL HACKING By

SHAHID ANSARI MCA

Department of Computer Science and EngineeringMadan Mohan Malaviya University of Technology Session(2015-16)

Page 2: Cse ethical hacking ppt

ContentsIntroduction What is Hacking? Ethical Hacking Types of HackersProcess of Ethical HackingEthical Hacking toolsRequired Skills of an Ethical HackerWhat do hackers do after hacking?Advantages and disadvantages Conclusion

Page 3: Cse ethical hacking ppt

Introduction

Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal.

Page 4: Cse ethical hacking ppt

What is hacking ?

Hacking is unauthorized use of computer and network resources. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.

Page 5: Cse ethical hacking ppt

Ethical HackingIndependent computer security Professionals breaking into the

computer systems. Neither damage the target systems nor steal information. Evaluate target systems security and report back to owners

about the vulnerabilities found.

Page 6: Cse ethical hacking ppt

Why Do We Need Ethical Hacking

Viruses, Trojan Horses,

and Worms

SocialEngineering

AutomatedAttacks

Accidental Breaches in

Security Denial ofService (DoS)

OrganizationalAttacks

RestrictedData

Protection from possible External Attacks

Page 7: Cse ethical hacking ppt

HackersA person who enjoys learning details of a programming

language or system A person who enjoys actually doing the programming

rather than just theorizing about it A person capable of appreciating someone else's hacking A person who picks up programming quicklyA person who is an expert at a particular programming

language or system

Page 8: Cse ethical hacking ppt
Page 9: Cse ethical hacking ppt

Types of Hackers

Black Hat HackerWhite Hat HackerGrey Hat Hacker

Page 10: Cse ethical hacking ppt

Ethical Hacking Process

Foot PrintingScanning/enumerationGaining AccessMaintaining AccessClearing tracks

Page 11: Cse ethical hacking ppt

Foot Printing

There are two types of foot-printing- Active foot-printing Passive foot-printing Active Foot-printing: Mirroring websites Email tracing Server verification Passive Foot-Printing :Google search Whois queries DNS lookup Social networking sites

Page 12: Cse ethical hacking ppt

Scanning

Port ScanningNetwork ScanningVulnerability Scanning

Page 13: Cse ethical hacking ppt

Enumeration

There are differen type of enumeration. NetBios SNMP DNS

Page 14: Cse ethical hacking ppt

Gaining AccessThis is the actual hacking phase in which

the hacker gains access to the system. The hacker exploits the system.

Maintaining Access

Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system. The hacker has exploited a vulnerability and can tamper and compromise the system.

Page 15: Cse ethical hacking ppt

Ethical hacking tools: Email tracker and visual route

Sam spade

Page 16: Cse ethical hacking ppt

Email tracker and visual route

Page 17: Cse ethical hacking ppt

Email tracker and visual route

Page 18: Cse ethical hacking ppt

Sam spade

Page 19: Cse ethical hacking ppt

What do hackers do after hacking? Install scanner program

mscan, sscan, nmapInstall exploit programInstall denial of service programUse all of installed programs silentlyPatch Security hole

The other hackers can’t intrude

Install rootkit ( backdoor ) It contains trojan virus, and so on

Page 20: Cse ethical hacking ppt

AdvantagesTo catch a thief you have to think like a thief.

Helps in closing the open holes in the system network.

Provides security to banking and financial establishments.

Prevents website defacements.

Page 21: Cse ethical hacking ppt

Disadvantages

All depends upon the trustworthiness of the ethical hacker.

Hiring professionals is expensive.

Page 22: Cse ethical hacking ppt

ConclusionIn the preceding sections we saw the methodology of hacking,

why should we aware of hacking and some tools which a hacker may use.

Now we can see what can we do against hacking or to protect ourselves from hacking.

The first thing we should do is to keep ourselves updated about those software’s we and using for official and reliable sources.

Educate the employees and the users against black hat hacking.

Page 23: Cse ethical hacking ppt

References

www.hackersonlineclub.comwww.hackthissite.orgwww.wikihow.com

Page 24: Cse ethical hacking ppt
Page 25: Cse ethical hacking ppt

Thank You


Recommended