SlideShare a Scribd company logo
Ethical hacking
Submitted to
Mr Purushottam Das
Presented By
Punit Goswami
CSE 3rd Sem
Ethical Hacking
Offense as the best
defense
What is hacking ?
A little clarification…
▪ Hacking is any curiosity driven approach to finding weakness
in a system.
▪ Exploiting these weaknesses depends on the purpose of
breaching.
▪ Commonly misunderstood as a cracker.
▪ Cracker is somebody who uses the breaches and exploits in a
system only for malicious usage.
▪ Hacking is about making things do what they were not made
to do.
▪ A person who uses breaches and exploits for increasing
knowledge or breaches them for security auditing is a Hacker.
Kinds of hackers…
Because hackers too occur of kinds…
Hackers too come in types…
▪ Script Kiddie:
Knows how to use tools or methods made by experienced hackers.
Does not necessarily know or understand the background working of the tools or
methods.
Is just curious or wants to show off.
Hackers too come in types…
▪ White Hat Hackers:
Do hacking for research and defensive purposes.
Try to improve the robustness of a system by finding flaws in a security system and
fixing them.
Mostly work for or in an organization or individually.
Hackers too come in types…
▪ Black Hat Hacker:
Hackers with malicious intents while breaking into a system.
Cyber criminals who steal money, passwords, infect systems.
Practically everything that media shows about hacking and its illegal strings.
Hackers too come in types…
▪ GreyHat Hackers:
Are neither purely malicious nor completely defensive.
Their nature depends on the situation.
May not have malicious intents but would still like to break into the systems that
they are not authorized to.
Hackers too come in types…
▪ Hacktivist:
A new genre of hackers.
Use their collective knowledge and potential to protest against politically or
religiously sensitive issues.
Have become the most popular category of hackers being talked about nowadays.
The C-I-A Triad
Basic security concepts…
Basic Security Concepts
▪ Confidentiality
When information is compromised by someone not authorized to do so it is a loss of
confidentiality.
Is an important attribute.
Requires internal cohesiveness of set of data.
Research papers
Insurance records
New product Specifications
Private Information of People
Basic Security Concepts
▪ Integrity
For an information which is very sensitive, its corruption can be disastrous.
If this information is kept on an unsecured network, chances of it being corrupted,
modified or changed increases.
This loss of integrity indicates that unauthorised changes have been made to the
information.
Electronics fund transfer, Air traffic controlling, Financial accounting
Basic Security Concepts
▪ Availability
This is often the most important criteria in service oriented businesses.
When information is erased or becomes inaccessible to an authorised entity, it is loss of
availability.
Phases of
Hacking
oInformation Gathering
oScanning
oGaining Access
oReporting Vulnerability
oMaintaining Access
oCovering Tracks
InformationGathering
Scanning
GainingAccess
Reporting Vulnerability
MaintainingAccess
Covering Tracks
History of Hacking
Tracing the roots…
▪ Early 1970s: John Draper made a long distance call for free by
blowing a precise tone into a telephone that told the phone system
to open the line.
▪ Early 1980s: Milwaukee based 414s charged of 60 computer break-
ins from Memorial Sloan Kettering Cancer Centre to the Los
Alamos National Laboratory.
▪ Late 1980s: 25 year old Kevin Mitnick secretly monitors the emails
of MCI and Digital Equipment security officials.
▪ Early 1990s: AT&T long distance service made to crash on Martin Luther
King Jr. Day.
Security breach into Griffith Air Force Base Station, pewit
computers at NASA and the Korean Atomic Research Institute.
▪ Michael Shim
E-bay
Amazon
and Yahoo.
15 years old.
Methods toHacking
The different ways and paths taken during a hacking process…
System Hacking
oPassword Cracking
Use probabilities of password guesses to match with the
original passwords.
Brute Forcing
Matching all possible key combinations.
Dictionary Attacks
Using dictionary words to crack passwords.
Key logging
Tracking and spying on the inputs done on a system
through the keyboard.
System Hacking
oRootkits and RATs
Use malwares or spywares to observe and steal files containing
passwords or their hashes.
1. Application Level Rootkits
2. Kernel Level Rootkits
3. Hardware Level Rootkits
4. Boot loader Level Rootkits
SQL Injection
oSimple SQL Injection
Practical approach of bypassing login form using malicious
SQL entries.
Example:
If you put
‘or’1’=‘1
in both username and password fields of a login form
vulnerable to SQL injection, then it bypasses the login form.
SQL Injection
oUnion SQL Injection
The union operation of the SQL databases is used to find the
vulnerable column of entries.
This vulnerable column can be further used to rig out meta data
about the database.
SQL Injection
oBlind SQL Injection
It asks the database “True OR False” based questions and
determines the answer based on the applications response.
SQL Injection
oAdvanced SQL Injection
Error messages are used to extract information.
Example:
Warning: mysql_fetch_array():supplied
argument is not valid MySQL result resource
in
D:Inetpubvhostskpccvicharvibhag.orghttpdo
csadminclassesclsCollection.php on line
124
Above is a generic error message through which we can extract a
lot of information about the database.
SQL Injection
oAdvanced SQL Injection
1. Message says that the back-end is running on MySQl
2. Path stated starts with D:inetpubvhosts…
this means the Operating System is Windows based
and the web server being used is IIS.

More Related Content

What's hot (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Mukul Agarwal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Garla Prajwal
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Edureka!
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
Masih Karimi
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Nitheesh Adithyan
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
MissStevenson1
 
Hacking Kishor
Hacking KishorHacking Kishor
Hacking Kishor
kishor sharma
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
Sainath Volam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Praneeth Reddy
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
United Group Of Institution
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
kawsarahmedchoudhuryzzz
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Kunal Gawade, CFE
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Simplilearn
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
ethical hacking
ethical hackingethical hacking
ethical hacking
samprada123
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
Santosh Kumar
 
Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module
ankit sarode
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
Arjun Tomar
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Edureka!
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
Masih Karimi
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
MissStevenson1
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
Sainath Volam
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Simplilearn
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module
ankit sarode
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
Arjun Tomar
 

Similar to Ethical hacking (20)

Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
ShivamSharma909
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
ankit gandharkar
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
Rishabha Garg
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
youfanlimboo
 
introduction class1(HACKING), basic information
introduction class1(HACKING), basic informationintroduction class1(HACKING), basic information
introduction class1(HACKING), basic information
animefun210
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ritwick Mukherjee
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
BishalRay8
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
JawaidAbdulHameed
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
BhupeshDhapola2
 
Hacking
HackingHacking
Hacking
akam bajalan
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
Yogesh Chauhan
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
GovandJamalSaeed
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
Abhilash Ak
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
ShivamSharma909
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
ankit gandharkar
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
Rishabha Garg
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
youfanlimboo
 
introduction class1(HACKING), basic information
introduction class1(HACKING), basic informationintroduction class1(HACKING), basic information
introduction class1(HACKING), basic information
animefun210
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
BishalRay8
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
JawaidAbdulHameed
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
BhupeshDhapola2
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
GovandJamalSaeed
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
Abhilash Ak
 

Recently uploaded (20)

IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
The Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLabThe Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLab
Journal of Soft Computing in Civil Engineering
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Journal of Soft Computing in Civil Engineering
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 

Ethical hacking

  • 2. Submitted to Mr Purushottam Das Presented By Punit Goswami CSE 3rd Sem
  • 3. Ethical Hacking Offense as the best defense
  • 4. What is hacking ? A little clarification…
  • 5. ▪ Hacking is any curiosity driven approach to finding weakness in a system. ▪ Exploiting these weaknesses depends on the purpose of breaching. ▪ Commonly misunderstood as a cracker. ▪ Cracker is somebody who uses the breaches and exploits in a system only for malicious usage. ▪ Hacking is about making things do what they were not made to do. ▪ A person who uses breaches and exploits for increasing knowledge or breaches them for security auditing is a Hacker.
  • 6. Kinds of hackers… Because hackers too occur of kinds…
  • 7. Hackers too come in types… ▪ Script Kiddie: Knows how to use tools or methods made by experienced hackers. Does not necessarily know or understand the background working of the tools or methods. Is just curious or wants to show off.
  • 8. Hackers too come in types… ▪ White Hat Hackers: Do hacking for research and defensive purposes. Try to improve the robustness of a system by finding flaws in a security system and fixing them. Mostly work for or in an organization or individually.
  • 9. Hackers too come in types… ▪ Black Hat Hacker: Hackers with malicious intents while breaking into a system. Cyber criminals who steal money, passwords, infect systems. Practically everything that media shows about hacking and its illegal strings.
  • 10. Hackers too come in types… ▪ GreyHat Hackers: Are neither purely malicious nor completely defensive. Their nature depends on the situation. May not have malicious intents but would still like to break into the systems that they are not authorized to.
  • 11. Hackers too come in types… ▪ Hacktivist: A new genre of hackers. Use their collective knowledge and potential to protest against politically or religiously sensitive issues. Have become the most popular category of hackers being talked about nowadays.
  • 12. The C-I-A Triad Basic security concepts…
  • 13. Basic Security Concepts ▪ Confidentiality When information is compromised by someone not authorized to do so it is a loss of confidentiality. Is an important attribute. Requires internal cohesiveness of set of data. Research papers Insurance records New product Specifications Private Information of People
  • 14. Basic Security Concepts ▪ Integrity For an information which is very sensitive, its corruption can be disastrous. If this information is kept on an unsecured network, chances of it being corrupted, modified or changed increases. This loss of integrity indicates that unauthorised changes have been made to the information. Electronics fund transfer, Air traffic controlling, Financial accounting
  • 15. Basic Security Concepts ▪ Availability This is often the most important criteria in service oriented businesses. When information is erased or becomes inaccessible to an authorised entity, it is loss of availability.
  • 16. Phases of Hacking oInformation Gathering oScanning oGaining Access oReporting Vulnerability oMaintaining Access oCovering Tracks
  • 24. ▪ Early 1970s: John Draper made a long distance call for free by blowing a precise tone into a telephone that told the phone system to open the line. ▪ Early 1980s: Milwaukee based 414s charged of 60 computer break- ins from Memorial Sloan Kettering Cancer Centre to the Los Alamos National Laboratory. ▪ Late 1980s: 25 year old Kevin Mitnick secretly monitors the emails of MCI and Digital Equipment security officials.
  • 25. ▪ Early 1990s: AT&T long distance service made to crash on Martin Luther King Jr. Day. Security breach into Griffith Air Force Base Station, pewit computers at NASA and the Korean Atomic Research Institute. ▪ Michael Shim E-bay Amazon and Yahoo. 15 years old.
  • 26. Methods toHacking The different ways and paths taken during a hacking process…
  • 27. System Hacking oPassword Cracking Use probabilities of password guesses to match with the original passwords. Brute Forcing Matching all possible key combinations. Dictionary Attacks Using dictionary words to crack passwords. Key logging Tracking and spying on the inputs done on a system through the keyboard.
  • 28. System Hacking oRootkits and RATs Use malwares or spywares to observe and steal files containing passwords or their hashes. 1. Application Level Rootkits 2. Kernel Level Rootkits 3. Hardware Level Rootkits 4. Boot loader Level Rootkits
  • 29. SQL Injection oSimple SQL Injection Practical approach of bypassing login form using malicious SQL entries. Example: If you put ‘or’1’=‘1 in both username and password fields of a login form vulnerable to SQL injection, then it bypasses the login form.
  • 30. SQL Injection oUnion SQL Injection The union operation of the SQL databases is used to find the vulnerable column of entries. This vulnerable column can be further used to rig out meta data about the database.
  • 31. SQL Injection oBlind SQL Injection It asks the database “True OR False” based questions and determines the answer based on the applications response.
  • 32. SQL Injection oAdvanced SQL Injection Error messages are used to extract information. Example: Warning: mysql_fetch_array():supplied argument is not valid MySQL result resource in D:Inetpubvhostskpccvicharvibhag.orghttpdo csadminclassesclsCollection.php on line 124 Above is a generic error message through which we can extract a lot of information about the database.
  • 33. SQL Injection oAdvanced SQL Injection 1. Message says that the back-end is running on MySQl 2. Path stated starts with D:inetpubvhosts… this means the Operating System is Windows based and the web server being used is IIS.