Ethical Hacking
Ethical Hacking
FULL COURSE
Types of Hacking/Hacker
What is Hacking?
Hacking Simply Refers To “Gaining Unauthorized Access Into a
System” or we can also say that the main aim of Hacking is “To
Compromise the security of a system in order to gain Access into it.
Website Hacking :- Hacking a website means taking unauthorized control over a web server and its associated software
such as databases and other interfaces.
Ethical Hacking :- Ethical Hacking Involves finding weaknesses in a computer or a network system for testing purpose
and finally getting them fixed.
Email Hacking :- It includes getting unauthorized access on an Email account and using it without taking the
Permission of its owner.
Computer Hacking :- This is the process of stealing computer ID and Password by applying hacking methods and
getting unauthorized access to a computer system.
Password Hacking :- This is the process of recovering secret password from data that has been stored in or
transmitted by a computer system.
TYPES OF HACKER
* Black Hat Hacker, also known as crackers, are those who hack in order to gain unauthorized access to a system and
harm its operations or steal sensitive information.
* Black Hat Hacker is always illegal because of its bad intent which includes stealing corporate data, violating privacy,
damaging the system, blocking networks.
* White Hat Hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find
out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.
* Ethical Hacking is not illegal and it is one of the demanding jobs available in the IT industry. There are numerous
companies that hire ethical hackers for penetration testing and vulnerability assessments.
* Hacker who is like a coin, two sided. They work for both offensive and defensive work. Generally benefit oriented.
PURPOSE OF
HACKING
• Identity Theft
• Fraud
• Theft of Password
• Dos/Ddos
• Network Hacking
• Cyber Bullying
• Ransomeware
• Phishing
• Malware
Cyber security
C - confidentiality
( Model ) I - integrity
A - Availability
2. Integrity :- This Ensures that the integrity of the data is maintained and that no
unauthorized changes have been made to the data. Example – MD5 Signature hashing or checksum.
RECONNA
ISSANCE
COVERING
SCANNING
TARCKS
MAINTAINING GAINING
ACCESS ACCESS
In the information security world, an attacker attacks the target system with the three main components behind
it. "Motive or Objective" of an attack makes an attacker focus on attacking a particular system. Another major
component is "Method" that is used by an attacker to gain access to a target system.Vulnerability also helps the
attacker to fulfill his intentions. These three components are the major blocks on which an attack depends.
= + +
* What is Footprinting ?
The Fine art of gathering target information is called Footprinting.
* Types of Footprinting ?
There are two types of Footprinting.
I. Internal Footprinting
II. External Footprinting
I. Internal Footprinting :- Footprinting perform inside the network is known as internal footprinting. Example:-
Dumpster Diving, Shoulder Surfing.
II. External Footprinting :- When attacker is not connected to the target network, in order to gather information,
external footprinting is used. External footprinting provides huge information about the data. Example :- Website,
google, Whois etc.
* Basic Recon
I. Ping
Wappalyzer Extension
II. Tracert
III. nslookup Buildwidth
Advance google search
* Some important Website for Recon. Domain-Dossier
I. Whois Lookup :- https://whois.domaintools.com/ DNSlytics
II. Netcraft Visualping
III. Wayback machine
Spyse
IV. Dns :- https://dnsdumpster.com/
V. Viewdnsinfo Phonebook.cz
* Subdomain Recon
I. Subdomain :- https://subdomainfinder.c99.nl/
II. Virustotal
III. Pentest Tools
IV. Ip2location
V. crt,.sh
LIKE | SHARE | SUBSCRIBE
What is Scanning ?
Scanning is a set of procedures for identifying live hosts , ports and services , discovering operating system and
architecture of target System, Identifying Vulnerabilities and threats in the network. Network Scanning is used to create a
profile of the target organization.
Scanning refers to collecting more information using complex and aggressive
reconnaissance.
.
Types of Scanning
I. Port Scanning
II. Networking Scanning
III. Vulnerability Scanning
I. Port Scanning :- Port Scanning is the name for the technique used to identify open port and services available on a
network host. It is some time utilized by security technicians to audit computer for vulnerabilities, however it is also used
by hacker to target victims.
• Scan all ports and running servies
• Well Knows ports form 0 to 1023
• Registered ports from 1024 to 49151
• Dynamic ports from 49152 to 65535
11. Networking Scanning :- Lists the active hosts and IP address network scanning is a procedure for identifying active
hosts on a network, either to attack them or access the security of the network.
111. Vulnerability Scanning :- Vulnerability Scanning is a method for checking whether a system is exploitable by
identifying its vulnerabilities. A vulnerability scanner consists of a scanning engine and a catalog. The catalog includes a list
of common files with known vulnerabilities and common exploits for a range of servers.
PROTOCOL PORT
FTP TRANSFER 20
FTP CONTROL 21
SSH 22
TELNET 23
SMTP 25
DNS 53
HTTP 80
HTTPS 443
POP3 110
IMAP 142
IMAP3 220
NETBIOS-NS 137
➢ Why is network Scanning Important?
The Purpose of network Scanning is scanning is to manage maintain and secure the system using data found by the
scanner. Network scanning is used to recognize available network services discover and recognize and filtering system
in place look at what operating systems are in use and to protect the network from attacker.
Banner grabbing or “ OS Fingerprinting “ is a method used to determine the OS that is running on a remote target
system. It is important Scanning method, as the attacker will have a higher probability of success. If the OS of the target
system is know ( many vulnerabilities are OS-specific ). The attacker can then formulate on attack Strategy based on the
target System. There are two types of Banner Grabbing Techniques are described below
➢ Nmap Explained
Nmap (Network Mapper) is a network scanner created by Gordon Lyon. Nmap is used to
discover hosts and services on a computer network by sending packets and analyzing the responses.
Nmap provides a number of features for probing computer networks, including host discovery and service
and operating system detection. These features are extensible by scripts that provide more advanced
service detection, vulnerability detection and other features. Nmap can adapt to network conditions
including latency and congestion during a scan.
ENUMERATION
What is Enumeration ?
▪ Enumeration is the process of extracting username machine names, network resources, shares and services from a
system or network. In the enumeration phase an attacker creates active connections with the system and sends
directed queries to gain more information about the target. The attacker uses the information collected using
enumeration to identify vulnerability in the system security, which help them to exploit the target system.
▪ Enumeration makes a fixed active connection to a system.
▪ Enumeration can be used to gain information on :-
▪ Network shares
▪ IP tables
▪ Routing Table
▪ Machine names
▪ NTP enumeration
▪ SNMP enumeration
▪ Linux/Windows enumeration
▪ SMB enumeration