Date post: | 21-Mar-2017 |
Category: |
Technology |
Upload: | shahid-ansari |
View: | 36 times |
Download: | 9 times |
A Seminar ON
ETHICAL HACKING By
SHAHID ANSARI MCA
Department of Computer Science and EngineeringMadan Mohan Malaviya University of Technology Session(2015-16)
ContentsIntroduction What is Hacking? Ethical Hacking Types of HackersProcess of Ethical HackingEthical Hacking toolsRequired Skills of an Ethical HackerWhat do hackers do after hacking?Advantages and disadvantages Conclusion
Introduction
Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal.
What is hacking ?
Hacking is unauthorized use of computer and network resources. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.
Ethical HackingIndependent computer security Professionals breaking into the
computer systems. Neither damage the target systems nor steal information. Evaluate target systems security and report back to owners
about the vulnerabilities found.
Why Do We Need Ethical Hacking
Viruses, Trojan Horses,
and Worms
SocialEngineering
AutomatedAttacks
Accidental Breaches in
Security Denial ofService (DoS)
OrganizationalAttacks
RestrictedData
Protection from possible External Attacks
HackersA person who enjoys learning details of a programming
language or system A person who enjoys actually doing the programming
rather than just theorizing about it A person capable of appreciating someone else's hacking A person who picks up programming quicklyA person who is an expert at a particular programming
language or system
Types of Hackers
Black Hat HackerWhite Hat HackerGrey Hat Hacker
Ethical Hacking Process
Foot PrintingScanning/enumerationGaining AccessMaintaining AccessClearing tracks
Foot Printing
There are two types of foot-printing- Active foot-printing Passive foot-printing Active Foot-printing: Mirroring websites Email tracing Server verification Passive Foot-Printing :Google search Whois queries DNS lookup Social networking sites
Scanning
Port ScanningNetwork ScanningVulnerability Scanning
Enumeration
There are differen type of enumeration. NetBios SNMP DNS
Gaining AccessThis is the actual hacking phase in which
the hacker gains access to the system. The hacker exploits the system.
Maintaining Access
Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system. The hacker has exploited a vulnerability and can tamper and compromise the system.
Ethical hacking tools: Email tracker and visual route
Sam spade
Email tracker and visual route
Email tracker and visual route
Sam spade
What do hackers do after hacking? Install scanner program
mscan, sscan, nmapInstall exploit programInstall denial of service programUse all of installed programs silentlyPatch Security hole
The other hackers can’t intrude
Install rootkit ( backdoor ) It contains trojan virus, and so on
AdvantagesTo catch a thief you have to think like a thief.
Helps in closing the open holes in the system network.
Provides security to banking and financial establishments.
Prevents website defacements.
Disadvantages
All depends upon the trustworthiness of the ethical hacker.
Hiring professionals is expensive.
ConclusionIn the preceding sections we saw the methodology of hacking,
why should we aware of hacking and some tools which a hacker may use.
Now we can see what can we do against hacking or to protect ourselves from hacking.
The first thing we should do is to keep ourselves updated about those software’s we and using for official and reliable sources.
Educate the employees and the users against black hat hacking.
References
www.hackersonlineclub.comwww.hackthissite.orgwww.wikihow.com
Thank You