+ All Categories
Home > Documents > Ethical Hack

Ethical Hack

Date post: 07-Nov-2015
Category:
Upload: sagar
View: 32 times
Download: 2 times
Share this document with a friend
Description:
Hacking Tutorial
Popular Tags:
17
PREDENTED BY-> YUGANT.S.MOHITE
Transcript

Slide 1

PREDENTED BY-> YUGANT.S.MOHITETo knowWhat is Ethical Hacking?Who are ethical hackers?History of hackingTypes of hackersWays to hack a systemPreventing hackingFUTURE OF ETHICAL HACKING

Ethical HackingHacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator , or designer.The greatest risk I.T. faces is security.Hacking refers practice of breaking into systems.Ethical hacking- also known as penetration testing or intrusion testing or red teaming has become a major concern for businesses and governments.

Companies are worried about the possibility of being hacked and potential customers are worried about maintaining control of personal information.

Necessity of computer security professionals to break into the systems of the organization.Who are ethical hackersThe skills ethical hackers should posses

They must be completely trustworthy.

Should have very strong programming and computer networking skills and have been in networking field for several years.

Should have more patience.

Continuous updating of the knowledge on computer and network security is required.

They should know the techniques of the criminals, how their activities might be detected and how to stop them.History of hackingThe term hack was first used by US university staff in mid-1960s .When eBay was first attacked in February 2000 its server was bombarded with fake request for web pages & overloaded the site.A group of teenagers once hacked into AOL and stole credit cards to buy video games.In 1986, after many more break-ins congress passed computer fraud and abuse act.In 1989,german hackers arrested for breaking into US computer ; sold the information to Soviet KGB.In 1998, teenager hacks into bell Atlantic phone system; disabled communication at airports disables runway lights.In 2000, viruses named I OVE YOU & LOVE BUG damaged roughly up to 10 billions of computers.Types Of HackerBlack Hat HackerA black hat hackers or crackers are individuals with extraordinary computing skills, resorting to malicious or destructive activities. That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others.

White Hat HackerWhite hat hackers are those individuals professing hacker skills and using them for defensive purposes. This means that the white hat hackers use their knowledge and skill for the good of others and for the common good.Ways To Hack a SystemVIRUSES & WORMS- they are self-replicating programs or codes fragments.They attach themselves to other programs (viruses) or machines (worms).They shut networks by flooding them.ROUGE ACCESS POINT- they are unsecured wireless access point that outsiders can easily breech.Are most often connected by well-meaning but ignorant employees.

BACK DOORS- they are loop holes in any system.With the aid of computerized searchers (bots) , hackers can probably find any weakness in network.TROJAN HORSES- they enter system by attaching themselves to other programsWhen Trojans are activated , this hacked software kicks off viruses in the system.Denial Of Services- this attacks gives hackers a way to bring down the network without internal access.It floods the access router with bogus traffic (i.e. e-mail or TCP ,packets).Phreaks- they use computer to break into telecommunications network.Script kiddies- they have inadequate technical information & use available information to break into system.

Preventing HackingAnti-virus: the most popular method of protection among personal computers.Mc Afee.com Corp.- provides antivirus software that scans hard drives for infected files.Norton Internet Security- Norton anti virus 2008 secures system from Trojans.Firewalls: used for computer networks & users using continuous online connections.Other software options- other options are used to protect larger networks systems.IDS- Intrusion Detection System is considered one of best protection methodContent Filtering Software- advanced antivirus software that reads compressed files .Allows IT mangers get filtering to block threatening e-mail.Sand Boxing-helps to read malicious codes.At present, security on the Internet is very poor and ethical hacking can be one of the most effective ways to fix serious security problems like cyber crime.The information entrusted to the companies is required to be protected against all kinds of attacks by crackers, which makes their future promising. FUTURE OF ETHICAL HACKING


Recommended