0% found this document useful (0 votes)
16 views

Ethical Hacking

Uploaded by

szc18enxx2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Ethical Hacking

Uploaded by

szc18enxx2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

ETHICAL HACKING

FULL COURSE

Learn | Hack | Secure

LIKE | SHARE | SUBSCRIBE


What is a Hacker?

WHAT YOU WILL What is Hacking?


LEARN?

Types of Hacking/Hacker

LIKE | SHARE | SUBSCRIBE


Advantage Of Hacking

WHAT YOU WILL Disadvantage Of Hacking


LEARN?

Skills Required to Become a


Ethical Hacker

LIKE | SHARE | SUBSCRIBE


Who is a Hacker?

A hacker is an individual who uses computer, networking or other skills


to overcome a technical problem. The term also may refer to anyone
who uses their abilities to gain unauthorized access to systems or
networks in order to commit crimes. A hacker may, for example, steal
information to hurt people via identity theft or bring down a system and,
often, hold it hostage in order to collect a ransom.

What is Hacking?
Hacking Simply Refers To “Gaining Unauthorized Access Into a
System” or we can also say that the main aim of Hacking is “To
Compromise the security of a system in order to gain Access into it.

LIKE | SHARE | SUBSCRIBE


LIKE | SHARE | SUBSCRIBE
Types of Hacking

Website Hacking :- Hacking a website means taking unauthorized control over a web server and its associated software
such as databases and other interfaces.

Ethical Hacking :- Ethical Hacking Involves finding weaknesses in a computer or a network system for testing purpose
and finally getting them fixed.

Email Hacking :- It includes getting unauthorized access on an Email account and using it without taking the
Permission of its owner.

Computer Hacking :- This is the process of stealing computer ID and Password by applying hacking methods and
getting unauthorized access to a computer system.

Password Hacking :- This is the process of recovering secret password from data that has been stored in or
transmitted by a computer system.
TYPES OF HACKER

LIKE | SHARE | SUBSCRIBE


BLACK HAT HACKER

* Black Hat Hacker, also known as crackers, are those who hack in order to gain unauthorized access to a system and
harm its operations or steal sensitive information.

* Black Hat Hacker is always illegal because of its bad intent which includes stealing corporate data, violating privacy,
damaging the system, blocking networks.

WHITE HAT HACKER

* White Hat Hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find
out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.

* Ethical Hacking is not illegal and it is one of the demanding jobs available in the IT industry. There are numerous
companies that hire ethical hackers for penetration testing and vulnerability assessments.

GRAY HAT HACKER

* Hacker who is like a coin, two sided. They work for both offensive and defensive work. Generally benefit oriented.
PURPOSE OF
HACKING

* Just for fun


* Show-off
* Steal important information
* Damaging the System
* Money Extortion
* System Security Testing
* To Break policy Compliance

LIKE | SHARE | SUBSCRIBE


SKILLS-REQUIRED-TO-BECOME-A-ETHICAL-HACKER

1. Computer Networking Skills 4. Programming Language You should Know


2. Computer Skills C Programming Language
3. Linux Skills C++ Programming Language
4. Programming Skills Java Programming Language
5. Basic Hardware Knoweledge Python Programming Language
6. Reverse Engineering Perl Programming Language
7. Cryptography Skills Ruby Programming Language
8. Database Skills JavaScript
9. Problem-solving Skills PHP

LIKE | SHARE | SUBSCRIBE


Types of Cybercrimes

• Identity Theft
• Fraud
• Theft of Password
• Dos/Ddos
• Network Hacking
• Cyber Bullying
• Ransomeware
• Phishing
• Malware
Cyber security

C - confidentiality
( Model ) I - integrity
A - Availability

LIKE | SHARE | SUBSCRIBE


Elements of security
1. CONFIDENTIALITY :- This ensures that data is accessible to only those persons that have
authorized access.

2. Integrity :- This Ensures that the integrity of the data is maintained and that no
unauthorized changes have been made to the data. Example – MD5 Signature hashing or checksum.

* Preventing the unauthorized or unintentional modification of information by authorized


user.
3. Availability :- This ensure that systems that store and process data
are accessiable to authorized users when needed.

LIKE | SHARE | SUBSCRIBE


PHASES OF HACKING

RECONNA
ISSANCE

COVERING
SCANNING
TARCKS

MAINTAINING GAINING
ACCESS ACCESS

LIKE | SHARE | SUBSCRIBE


Motives, Goals, and Objectives of Information Security Attacks

In the information security world, an attacker attacks the target system with the three main components behind
it. "Motive or Objective" of an attack makes an attacker focus on attacking a particular system. Another major
component is "Method" that is used by an attacker to gain access to a target system.Vulnerability also helps the
attacker to fulfill his intentions. These three components are the major blocks on which an attack depends.

= + +

Attack Motive Method Vulnerability


FOOTPRINTING/RECON

* What is Footprinting ?
The Fine art of gathering target information is called Footprinting.

* Types of Footprinting ?
There are two types of Footprinting.
I. Internal Footprinting
II. External Footprinting

I. Internal Footprinting :- Footprinting perform inside the network is known as internal footprinting. Example:-
Dumpster Diving, Shoulder Surfing.
II. External Footprinting :- When attacker is not connected to the target network, in order to gather information,
external footprinting is used. External footprinting provides huge information about the data. Example :- Website,
google, Whois etc.

LIKE | SHARE | SUBSCRIBE


BASIC RECON

* Basic Recon
I. Ping
Wappalyzer Extension
II. Tracert
III. nslookup Buildwidth
Advance google search
* Some important Website for Recon. Domain-Dossier
I. Whois Lookup :- https://whois.domaintools.com/ DNSlytics
II. Netcraft Visualping
III. Wayback machine
Spyse
IV. Dns :- https://dnsdumpster.com/
V. Viewdnsinfo Phonebook.cz
* Subdomain Recon
I. Subdomain :- https://subdomainfinder.c99.nl/
II. Virustotal
III. Pentest Tools
IV. Ip2location
V. crt,.sh
LIKE | SHARE | SUBSCRIBE
What is Scanning ?
Scanning is a set of procedures for identifying live hosts , ports and services , discovering operating system and
architecture of target System, Identifying Vulnerabilities and threats in the network. Network Scanning is used to create a
profile of the target organization.
Scanning refers to collecting more information using complex and aggressive
reconnaissance.
.
Types of Scanning
I. Port Scanning
II. Networking Scanning
III. Vulnerability Scanning
I. Port Scanning :- Port Scanning is the name for the technique used to identify open port and services available on a
network host. It is some time utilized by security technicians to audit computer for vulnerabilities, however it is also used
by hacker to target victims.
• Scan all ports and running servies
• Well Knows ports form 0 to 1023
• Registered ports from 1024 to 49151
• Dynamic ports from 49152 to 65535
11. Networking Scanning :- Lists the active hosts and IP address network scanning is a procedure for identifying active
hosts on a network, either to attack them or access the security of the network.
111. Vulnerability Scanning :- Vulnerability Scanning is a method for checking whether a system is exploitable by
identifying its vulnerabilities. A vulnerability scanner consists of a scanning engine and a catalog. The catalog includes a list
of common files with known vulnerabilities and common exploits for a range of servers.

IMPORTANT PORT NUMBERS

PROTOCOL PORT
FTP TRANSFER 20

FTP CONTROL 21

SSH 22

TELNET 23

SMTP 25

DNS 53

HTTP 80

HTTPS 443

POP3 110

IMAP 142

IMAP3 220

NETBIOS-NS 137
➢ Why is network Scanning Important?
The Purpose of network Scanning is scanning is to manage maintain and secure the system using data found by the
scanner. Network scanning is used to recognize available network services discover and recognize and filtering system
in place look at what operating systems are in use and to protect the network from attacker.

➢ Objective of network Scanning

➢ Discovering Live hosts, IP address and open ports.

➢ Identify specific application versions of a particular services.

➢ Detecting the associated network services of each port.

➢ Discovering operating system and system architecture.

➢ OS Discovery ( Banner Grabbing/OS Figerprint)

Banner grabbing or “ OS Fingerprinting “ is a method used to determine the OS that is running on a remote target
system. It is important Scanning method, as the attacker will have a higher probability of success. If the OS of the target
system is know ( many vulnerabilities are OS-specific ). The attacker can then formulate on attack Strategy based on the
target System. There are two types of Banner Grabbing Techniques are described below

1. Active Banner Grabbing


2. Passive Banner Grabbing
➢ Why Banner Grabbing Important?
An attacker uses banner grabbing to identify the Os used on the target host and thus determine the system
vulnerabilities and exploits that might work on that system to carry out futher attacks.

➢ Nmap Explained

Nmap (Network Mapper) is a network scanner created by Gordon Lyon. Nmap is used to
discover hosts and services on a computer network by sending packets and analyzing the responses.
Nmap provides a number of features for probing computer networks, including host discovery and service
and operating system detection. These features are extensible by scripts that provide more advanced
service detection, vulnerability detection and other features. Nmap can adapt to network conditions
including latency and congestion during a scan.
ENUMERATION

What is Enumeration ?
▪ Enumeration is the process of extracting username machine names, network resources, shares and services from a
system or network. In the enumeration phase an attacker creates active connections with the system and sends
directed queries to gain more information about the target. The attacker uses the information collected using
enumeration to identify vulnerability in the system security, which help them to exploit the target system.
▪ Enumeration makes a fixed active connection to a system.
▪ Enumeration can be used to gain information on :-

▪ Network shares

▪ SNMP data, if they are not secured properly

▪ IP tables

▪ Usernames of different systems

▪ Passwords policies lists


▪ Network Resources and shares

▪ Routing Table

▪ Auditing and service settings

▪ Machine names

▪ Applications and banners

▪ SNMP and DNS details


Enumerations depend on the services that the systems offer. They can be −
▪ DNS enumeration

▪ NTP enumeration

▪ SNMP enumeration

▪ Linux/Windows enumeration

▪ SMB enumeration

Techniques for Enumeration


• Extracting user names using email ID’s

• Extract information using the default password

• Brute Force Active Directory

• Extract user names using SNMP

• Extract user groups from Windows

• Extract information using DNS Zone transfer


Services and Port to Enumerate

• TCP 53: DNS Zone transfer

• TCP 135: Microsoft RPC Endpoint Mapper

• TCP 137: NetBIOS Name Service

• TCP 139: NetBIOS session Service (SMB over NetBIOS)

• TCP 445: SMB over TCP (Direct Host)

• UDP 161: SNMP

• TCP/UDP 389: LDAP

• TCP/UDP 3368: Global Catalog Service

• TCP 25: Simple Mail Transfer Protocol (SMTP

You might also like