SlideShare a Scribd company logo
By
Sourabh S. Badve
(CEH/ECSA)
INTRODUCTI
ON

What is hacking?
TYPES OF HACKERS
    White hat hacker

    Black hat hacker

    Gray hat hacker

    Ghost hacker

    Script kiddies
What is “Ethical Hacking” ?

     Penetration Testing

     Security Testing
Steps involved in Ethical Hacking :
 Signing of Contract

   Footprinting OR Reconnaisance
   Enumeration & Fingerprinting (Scanning)
   Identification of vulnerabilities
   Attack – Exploit the vulnerabilities
   Reporting
Signing of contract


   •     A contract between the tester i.e.
       ethical hacker and organization i.e.
       client
   •     specifies certain conditions and
       terms of test being conducted
   •     signed by both the parties.
Footprinting OR Reconnaissance

  Collecting as much information about the
  target.

  Tools used –

    nslookup, traceroute, whois etc.
Enumeration & Fingerprinting (scanning)
•   Determining the target.
•   Identification of services and open ports.
•   Enumerating operating system.

    Tools used-

           Nmap, SNMP scanner, netcat, telnet etc.
Identification of vulnerabilities
•  Insecure configuration
• Weak passwords
• Unpatched vulnerabilities in services, operating
  system and application
• Possible vulnerabilities in services, operating
  system and applications
• Insecure programming
• Weak Access control
• Tools and Techniques used-
     Vulnerability scanners like Nessus, Listening to
traffic, Password crackers, Default passwords, Brute
force, Social engineering, SQL injection,
vulnerability information website e.g.
http://cve.mitre.org,
http://www.securityfocus.com
Attack – Exploit the vulnerabilities
•   Obtain information(trophies) from the target system
•   Gaining normal access
•   Escalating privileges
•   Obtain access to other connected systems
•   Operating system attacks
•   Tools used-

     Nessus, Metasploit, Framework,
   Tools
Thank you!

More Related Content

What's hot (20)

The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
OWASP Foundation
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Monika Deswal
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
DARSHANBHAVSAR14
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
 
Phishing
PhishingPhishing
Phishing
Alka Falwaria
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
Ammar WK
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Harendra Singh
 
Social engineering
Social engineeringSocial engineering
Social engineering
ankushmohanty
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
Leandro Bennaton
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
Lior Rokach
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Nitheesh Adithyan
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
Social engineering
Social engineeringSocial engineering
Social engineering
Maulik Kotak
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
NishaYadav177
 
Password Attack
Password Attack Password Attack
Password Attack
Sina Manavi
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
Geeks Anonymes
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
SubhradeepMaji
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
أحلام انصارى
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Cyber Agency
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
OWASP Foundation
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
DARSHANBHAVSAR14
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
Ammar WK
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
Leandro Bennaton
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
Lior Rokach
 
Social engineering
Social engineeringSocial engineering
Social engineering
Maulik Kotak
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
NishaYadav177
 
Password Attack
Password Attack Password Attack
Password Attack
Sina Manavi
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
Geeks Anonymes
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
SubhradeepMaji
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Cyber Agency
 

Similar to Ethical hacking (20)

Cyber Security Hacking and Attack Tree Analysis
Cyber Security Hacking and Attack Tree AnalysisCyber Security Hacking and Attack Tree Analysis
Cyber Security Hacking and Attack Tree Analysis
AvinashAvuthu2
 
Cyber Security Penetration Testing Tools
Cyber Security Penetration Testing ToolsCyber Security Penetration Testing Tools
Cyber Security Penetration Testing Tools
AvinashAvuthu2
 
Ethical h
Ethical hEthical h
Ethical h
Dr. Salman Iqbal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
kawsarahmedchoudhuryzzz
 
Ethical h
Ethical hEthical h
Ethical h
kawsarahmedchoudhuryzzz
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
sumanth1201
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
shahhardik27
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
shahhardik27
 
ethical hacking
ethical hackingethical hacking
ethical hacking
Neelima Bawa
 
External Penetration Testing What You Need to Know.pdf
External Penetration Testing What You Need to Know.pdfExternal Penetration Testing What You Need to Know.pdf
External Penetration Testing What You Need to Know.pdf
Teceze Ltd
 
CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
DhananjaySingh23178
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
KIYALIBAN1
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
Lec_11_Introduction to Cyber Security.pdf
Lec_11_Introduction to Cyber Security.pdfLec_11_Introduction to Cyber Security.pdf
Lec_11_Introduction to Cyber Security.pdf
MohammedAdel426426
 
Introduction to ceh
Introduction  to cehIntroduction  to ceh
Introduction to ceh
Hemant Mittal
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sayantan Sur
 
Ethical hacking by shivam
Ethical hacking by shivamEthical hacking by shivam
Ethical hacking by shivam
Shivam Ðreamchazer
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
Pawan Patil
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
shahhardik27
 

More from Sourabh Badve (8)

Ipsec 2
Ipsec 2Ipsec 2
Ipsec 2
Sourabh Badve
 
Ip routing
Ip routingIp routing
Ip routing
Sourabh Badve
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Sourabh Badve
 
Basic ip traffic management with access control lists
Basic ip traffic management with access control listsBasic ip traffic management with access control lists
Basic ip traffic management with access control lists
Sourabh Badve
 
Cryptography
CryptographyCryptography
Cryptography
Sourabh Badve
 
Basic router configuration
Basic router configurationBasic router configuration
Basic router configuration
Sourabh Badve
 
Corporate security
Corporate securityCorporate security
Corporate security
Sourabh Badve
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
Sourabh Badve
 

Recently uploaded (20)

Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Operations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdfOperations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdf
Arab Academy for Science, Technology and Maritime Transport
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdfBiophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
PKLI-Institute of Nursing and Allied Health Sciences Lahore , Pakistan.
 
How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 

Ethical hacking

  • 3. TYPES OF HACKERS  White hat hacker  Black hat hacker  Gray hat hacker  Ghost hacker  Script kiddies
  • 4. What is “Ethical Hacking” ?  Penetration Testing  Security Testing
  • 5. Steps involved in Ethical Hacking :  Signing of Contract  Footprinting OR Reconnaisance  Enumeration & Fingerprinting (Scanning)  Identification of vulnerabilities  Attack – Exploit the vulnerabilities  Reporting
  • 6. Signing of contract • A contract between the tester i.e. ethical hacker and organization i.e. client • specifies certain conditions and terms of test being conducted • signed by both the parties.
  • 7. Footprinting OR Reconnaissance Collecting as much information about the target. Tools used – nslookup, traceroute, whois etc.
  • 8. Enumeration & Fingerprinting (scanning) • Determining the target. • Identification of services and open ports. • Enumerating operating system. Tools used- Nmap, SNMP scanner, netcat, telnet etc.
  • 9. Identification of vulnerabilities • Insecure configuration • Weak passwords • Unpatched vulnerabilities in services, operating system and application • Possible vulnerabilities in services, operating system and applications • Insecure programming • Weak Access control • Tools and Techniques used- Vulnerability scanners like Nessus, Listening to traffic, Password crackers, Default passwords, Brute force, Social engineering, SQL injection, vulnerability information website e.g. http://cve.mitre.org, http://www.securityfocus.com
  • 10. Attack – Exploit the vulnerabilities • Obtain information(trophies) from the target system • Gaining normal access • Escalating privileges • Obtain access to other connected systems • Operating system attacks • Tools used- Nessus, Metasploit, Framework,
  • 11. Tools