SlideShare a Scribd company logo
Ethical Hacking
PRESENTED BY :-
SWETA LEENA PANDA
HACKER
CONTENT
♦ Overview of Hacking
♦ Types of hacking
♦ Hacker
♦ Types of Hacker
♦ Why do hackers hack?
♦ How can kid hack?
♦ What does a script kid know?
♦ Hackers language
♦ How to translate the hackers’ language
♦ Ethical Hacking
♦ Ethical Hacking – Process
♦ What hackers do after hacking?
♦ Why can’t defend against hackers?
♦ How can protect the system?
♦ What should do after hacked?
♦ Final words
overview of hacking
♦ Hack
   – Examine something very minutely
   – the rapid crafting of a new program or the making of
     changes to existing, usually complicated software
♦ Hacker
   – The person who hacks
♦ Cracker
   – System intruder/destroyer
HACKER
♦ Someone who bypasses the system’s access controls by
  taking advantage of security weaknesses left in the system
  by developers
♦ Person who is totally immersed in computer technology
  and programming, and who likes to examine the code of
  programs to see how they work … then uses his or her
  computer expertise for illicit purposes such as gaining
  access to computer systems without permission and
  tampering with programs and data. At that point, this
  individual would steal information and install backdoors,
  virus and Trojans
♦ Hacker means cracker nowadays.
Types of hacker
♦ White Hat Hackers:
   – who specializes in penetration testing and in other testing
     methodologies to ensure the security of an organization's
     information systems.
♦ Black Hat Hackers:
   – A black hat is the villain or bad guy, especially in a western
     movie in which such a character would stereotypically wear a
     black hat in contrast to the hero's white hat.
♦ Gray Hat Hackers:
   – A grey hat, in the hacking community, refers to a skilled hacker
     whose activities fall somewhere between white and black hat
     hackers on a variety of spectra
Types of hacker
♦ Script Kiddies:
   – who use scripts or programs developed by others to attack
     computer systems and networks and deface websites. [
♦ Phreak
   – Person who breaks into telecommunications systems to [commit]
     theft
♦ Cyber Punk
   – Recent mutation of … the hacker, cracker, and phreak
Why do people hack??
♦ To make security stronger ( Ethical Hacking
  )
♦ Just for fun
♦ Show off
♦ Hack other systems secretly
♦ Notify many people their thought
♦ Steal important information
♦ Destroy enemy’s computer network during
  the war
How can kid hack?
♦ Kid has much of time
   – Kid can search for longer time than other people
♦ All hacking program is easy to use
♦ Kid doesn’t have to know how the hacking program works
♦ These kids are called script kiddies
Hackers language :
1 -> i or l     || -> n
3 -> e          |/| -> m
4 -> a          s -> z
7 -> t          z -> s
9 -> g          f -> ph
0 -> o          ph -> f
$ -> s          x -> ck
| -> i or       ck -> x
What is Ethical Hacking
♦ It is Legal
♦ Permission is obtained from the target
♦ Part of an overall security program
♦ Identify vulnerabilities visible from Internet
  at particular point of time
♦ Ethical hackers possesses same skills,
  mindset and tools of a hacker but the attacks
  are done in a non-destructive manner
♦ Also Called – Attack & Penetration Testing,
Hackers language translation
EXAMPLE:-
    Hacking is good




       H4ck|||g 1$ 900d
Hacking - Process
1. Preparation
2. Foot printing
3. Enumeration & Fingerprinting
4. Identification of Vulnerabilities
5. Attack – Exploit the Vulnerabilities
6. Gaining Access
7. Escalating privilege
8. Covering tracks
9. Creating back doors
Preparation
♦ Identification of Targets – company websites, mail servers,
  extranets, etc.
♦ Signing of Contract
   –   Agreement on protection against any legal issues
   –   Contracts to clearly specifies the limits and dangers of the test
   –   Specifics on Denial of Service Tests, Social Engineering, etc.
   –   Time window for Attacks
   –   Total time for the testing
   –   Prior Knowledge of the systems
   –   Key people who are made aware of the testing
Foot printing
Collecting as much information about the
  target
 DNS Servers
 IP Ranges
 Administrative Contacts
 Problems revealed by administrators
Information Sources
♦ Search engines
♦ Forums
♦ Databases – whois,
♦ Tools – PING, whois, Traceroute, nslookup
Enumeration & Fingerprinting
♦ Specific targets determined
♦ Identification of Services / open ports
♦ Operating System Enumeration


Methods
 Banner grabbing
 Responses to various protocol (ICMP
  &TCP) commands
 Port / Service Scans – TCP Connect, TCP
  SYN, TCP FIN, etc.
Identification of Vulnerabilities
Vulnerabilities:
 It is a weakness which allows an attacker to
  reduce a system's information assurance.
♦ Insecure Configuration
♦ Weak passwords
♦ Unpatched vulnerabilities in services,
  Operating systems, applications
♦ Possible Vulnerabilities in Services,
  Operating Systems
♦ Insecure programming,Weak Access
Tools
Vulnerability Scanners - Nessus, ISS, SARA,
  SAINT
Listening to Traffic – Ethercap, tcpdump
Password Crackers – John the ripper, LC4,
  Pwdump
Intercepting Web Traffic – Achilles, Whisker,
  Legion
Gaining access:
♦ Enough data has been gathered at this point to make an informed
  attempt to access the target
♦ Techniques
   – Password eavesdropping
   – File share brute forcing
   – Password file grab
   – Buffer overflows
Escalating Privileges
♦ If only user-level access was obtained in the last step, the attacker will
  now seek to gain complete control of the system
♦ Techniques
   – Password cracking
   – Known exploits
Covering Tracks
♦ Once total ownership of the target is
  secured, hiding this fact from system
  administrators becomes paramount, lest
  they quickly end the romp.
♦ Techniques
  – Clear logs
  – Hide tools
Creating Back Doors
♦ Trap doors will be laid in various parts of the system to ensure that
  privileged access is easily regained at the whim of the intruder
♦ Techniques
   – Create rogue user accounts
   – Schedule batch jobs
   – Infect startup files
   – Plant remote control services
   – Install monitoring mechanisms
   – Replace apps with trojans
Denial of Service
♦  If an attacker is unsuccessful in gaining access, they may use readily
  available exploit code to disable a target as a last resort
♦ Techniques
    – SYN flood
    – ICMP techniques
    – Identical SYN requests
    – Overlapping fragment/offset bugs
    – Out of bounds TCP options (OOB)
    – DDoS
What do hackers do after hacking?
♦ Patch security hole
   – The other hackers can’t intrude
♦ Clear logs and hide themselves
♦ Install rootkit ( backdoor )
   – The hacker who hacked the system can use the system later
   – It contains trojan virus, and so on
♦ Install irc related program
   – identd, irc, bitchx, eggdrop, bnc
♦ Install scanner program
   – mscan, sscan, nmap
♦ Install exploit program
♦ Install denial of service program
♦ Use all of installed programs silently
How can protect the system?
 Patch security hole often
 Encrypt important data
    Ex) pgp, ssh
 Do not run unused daemon
 Remove unused setuid/setgid program
 Setup loghost


   • Backup the system often
 Setup firewall
 Setup IDS
    Ex) snort
What should do after hacked?
♦ Shutdown the system
   – Or turn off the system
♦ Separate the system from network
♦ Restore the system with the backup
   – Or reinstall all programs
♦ Connect the system to the network
H4CKING VS CR4CKING

♦ HACKING WITH MALICIOUS
 INTENTION IS CRACKING
The basic difference is hackers do not do
 anything disastrous.
Cracking yield more devastating results.
Cracking is crime.
Cyber crime are the results of cracking ,not
 hacking
H4cking prone areas
Please send suggestions and feedbacks
I am waiting for your replay.
           THANK YOU

More Related Content

What's hot (20)

Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
Divyank Jindal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
VipinYadav257
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nandan Kushwaha
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aditya Vikram Singhania
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
SHAHID ANSARI
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
Institute of Information Security (IIS)
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
Ceh v5 module 04 enumeration
Ceh v5 module 04 enumerationCeh v5 module 04 enumeration
Ceh v5 module 04 enumeration
Vi Tính Hoàng Nam
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
Prakashchand Suthar
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
Bilal Hameed
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Siber Güvenlik ve Etik Hacking Sunu - 1
Siber Güvenlik ve Etik Hacking Sunu - 1Siber Güvenlik ve Etik Hacking Sunu - 1
Siber Güvenlik ve Etik Hacking Sunu - 1
Murat KARA
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Prabhat kumar Suman
 

Viewers also liked (20)

TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
giridhar_sadasivuni
 
BRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAMEBRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAME
Sweta Leena Panda
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
 
DrData Project
DrData ProjectDrData Project
DrData Project
Sweta Leena Panda
 
DrData
DrDataDrData
DrData
Sweta Leena Panda
 
How to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyHow to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easily
Tan
 
Puppy Pendrive
Puppy PendrivePuppy Pendrive
Puppy Pendrive
Mohan R
 
MARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATIONMARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATION
Sweta Leena Panda
 
Personality
PersonalityPersonality
Personality
Sweta Leena Panda
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
satish kumar
 
Marketing intelliegence How to know more
Marketing intelliegence How to know moreMarketing intelliegence How to know more
Marketing intelliegence How to know more
Business and Consultant Tourism
 
Crownpoint church of Christ
Crownpoint church of ChristCrownpoint church of Christ
Crownpoint church of Christ
House to House Heart to Heart
 
Towards open and reproducible neuroscience in the age of big data
Towards open and  reproducible neuroscience in the age of big dataTowards open and  reproducible neuroscience in the age of big data
Towards open and reproducible neuroscience in the age of big data
Krzysztof Gorgolewski
 
Installation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvdInstallation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvd
gourav kottawar
 
blue_eye_technology_jeevagan
blue_eye_technology_jeevaganblue_eye_technology_jeevagan
blue_eye_technology_jeevagan
jeevagan nagarajan
 
Real people and real politics
Real people and real politicsReal people and real politics
Real people and real politics
Newsworks
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
 
How to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyHow to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easily
Tan
 
Puppy Pendrive
Puppy PendrivePuppy Pendrive
Puppy Pendrive
Mohan R
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
satish kumar
 
Towards open and reproducible neuroscience in the age of big data
Towards open and  reproducible neuroscience in the age of big dataTowards open and  reproducible neuroscience in the age of big data
Towards open and reproducible neuroscience in the age of big data
Krzysztof Gorgolewski
 
Installation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvdInstallation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvd
gourav kottawar
 
Real people and real politics
Real people and real politicsReal people and real politics
Real people and real politics
Newsworks
 

Similar to ETHICAL HACKING (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rishabha Garg
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
Presentation1
Presentation1Presentation1
Presentation1
Abhishek Malhotra
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
Pawan Patil
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575
Gopal Rathod
 
Ethical hacking by shivam
Ethical hacking by shivamEthical hacking by shivam
Ethical hacking by shivam
Shivam Ðreamchazer
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ravi Rajput
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
champubhaiya8
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
ssuserde23af
 
Master Ethical Hacking Basics Like a Pro
Master Ethical Hacking Basics Like a ProMaster Ethical Hacking Basics Like a Pro
Master Ethical Hacking Basics Like a Pro
ayansheikh45689
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
Prasad Pawar
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan
 
Wm4
Wm4Wm4
Wm4
Umang Patel
 
Wm4
Wm4Wm4
Wm4
Umang Patel
 
ethical Hack
ethical Hackethical Hack
ethical Hack
Viggi Unbeaten
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
Pankaj Dubey
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
Pawan Patil
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575
Gopal Rathod
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
champubhaiya8
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
ssuserde23af
 
Master Ethical Hacking Basics Like a Pro
Master Ethical Hacking Basics Like a ProMaster Ethical Hacking Basics Like a Pro
Master Ethical Hacking Basics Like a Pro
ayansheikh45689
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
Prasad Pawar
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
Pankaj Dubey
 

More from Sweta Leena Panda (20)

ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management
Sweta Leena Panda
 
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
Sweta Leena Panda
 
BRAND CRISIS
BRAND CRISIS BRAND CRISIS
BRAND CRISIS
Sweta Leena Panda
 
SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR
Sweta Leena Panda
 
TALENT MANAGEMENT
TALENT MANAGEMENT TALENT MANAGEMENT
TALENT MANAGEMENT
Sweta Leena Panda
 
BUSINESS ETHICS
BUSINESS ETHICSBUSINESS ETHICS
BUSINESS ETHICS
Sweta Leena Panda
 
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYGOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
Sweta Leena Panda
 
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIESMARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
Sweta Leena Panda
 
SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING
Sweta Leena Panda
 
CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR
Sweta Leena Panda
 
CRAFT BUSINESS
CRAFT BUSINESS CRAFT BUSINESS
CRAFT BUSINESS
Sweta Leena Panda
 
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
Sweta Leena Panda
 
INDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTORINDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTOR
Sweta Leena Panda
 
Job Analysis of Operation
Job Analysis of Operation Job Analysis of Operation
Job Analysis of Operation
Sweta Leena Panda
 
Orion'16 presentation
Orion'16  presentationOrion'16  presentation
Orion'16 presentation
Sweta Leena Panda
 
RETAIL DESIGN
RETAIL DESIGN RETAIL DESIGN
RETAIL DESIGN
Sweta Leena Panda
 
RETAIL MANAGEMENT IN INDIA
RETAIL MANAGEMENT IN INDIARETAIL MANAGEMENT IN INDIA
RETAIL MANAGEMENT IN INDIA
Sweta Leena Panda
 
ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management
Sweta Leena Panda
 
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
Sweta Leena Panda
 
SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR
Sweta Leena Panda
 
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYGOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
Sweta Leena Panda
 
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIESMARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
Sweta Leena Panda
 
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
Sweta Leena Panda
 

Recently uploaded (20)

Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
Political History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptxPolitical History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptx
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 

ETHICAL HACKING

  • 1. Ethical Hacking PRESENTED BY :- SWETA LEENA PANDA
  • 3. CONTENT ♦ Overview of Hacking ♦ Types of hacking ♦ Hacker ♦ Types of Hacker ♦ Why do hackers hack? ♦ How can kid hack? ♦ What does a script kid know? ♦ Hackers language ♦ How to translate the hackers’ language
  • 4. ♦ Ethical Hacking ♦ Ethical Hacking – Process ♦ What hackers do after hacking? ♦ Why can’t defend against hackers? ♦ How can protect the system? ♦ What should do after hacked? ♦ Final words
  • 5. overview of hacking ♦ Hack – Examine something very minutely – the rapid crafting of a new program or the making of changes to existing, usually complicated software ♦ Hacker – The person who hacks ♦ Cracker – System intruder/destroyer
  • 6. HACKER ♦ Someone who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers ♦ Person who is totally immersed in computer technology and programming, and who likes to examine the code of programs to see how they work … then uses his or her computer expertise for illicit purposes such as gaining access to computer systems without permission and tampering with programs and data. At that point, this individual would steal information and install backdoors, virus and Trojans ♦ Hacker means cracker nowadays.
  • 7. Types of hacker ♦ White Hat Hackers: – who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. ♦ Black Hat Hackers: – A black hat is the villain or bad guy, especially in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat. ♦ Gray Hat Hackers: – A grey hat, in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra
  • 8. Types of hacker ♦ Script Kiddies: – who use scripts or programs developed by others to attack computer systems and networks and deface websites. [ ♦ Phreak – Person who breaks into telecommunications systems to [commit] theft ♦ Cyber Punk – Recent mutation of … the hacker, cracker, and phreak
  • 9. Why do people hack?? ♦ To make security stronger ( Ethical Hacking ) ♦ Just for fun ♦ Show off ♦ Hack other systems secretly ♦ Notify many people their thought ♦ Steal important information ♦ Destroy enemy’s computer network during the war
  • 10. How can kid hack? ♦ Kid has much of time – Kid can search for longer time than other people ♦ All hacking program is easy to use ♦ Kid doesn’t have to know how the hacking program works ♦ These kids are called script kiddies
  • 11. Hackers language : 1 -> i or l || -> n 3 -> e |/| -> m 4 -> a s -> z 7 -> t z -> s 9 -> g f -> ph 0 -> o ph -> f $ -> s x -> ck | -> i or ck -> x
  • 12. What is Ethical Hacking ♦ It is Legal ♦ Permission is obtained from the target ♦ Part of an overall security program ♦ Identify vulnerabilities visible from Internet at particular point of time ♦ Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner ♦ Also Called – Attack & Penetration Testing,
  • 13. Hackers language translation EXAMPLE:- Hacking is good H4ck|||g 1$ 900d
  • 14. Hacking - Process 1. Preparation 2. Foot printing 3. Enumeration & Fingerprinting 4. Identification of Vulnerabilities 5. Attack – Exploit the Vulnerabilities 6. Gaining Access 7. Escalating privilege 8. Covering tracks 9. Creating back doors
  • 15. Preparation ♦ Identification of Targets – company websites, mail servers, extranets, etc. ♦ Signing of Contract – Agreement on protection against any legal issues – Contracts to clearly specifies the limits and dangers of the test – Specifics on Denial of Service Tests, Social Engineering, etc. – Time window for Attacks – Total time for the testing – Prior Knowledge of the systems – Key people who are made aware of the testing
  • 16. Foot printing Collecting as much information about the target  DNS Servers  IP Ranges  Administrative Contacts  Problems revealed by administrators
  • 17. Information Sources ♦ Search engines ♦ Forums ♦ Databases – whois, ♦ Tools – PING, whois, Traceroute, nslookup
  • 18. Enumeration & Fingerprinting ♦ Specific targets determined ♦ Identification of Services / open ports ♦ Operating System Enumeration Methods  Banner grabbing  Responses to various protocol (ICMP &TCP) commands  Port / Service Scans – TCP Connect, TCP SYN, TCP FIN, etc.
  • 19. Identification of Vulnerabilities Vulnerabilities:  It is a weakness which allows an attacker to reduce a system's information assurance. ♦ Insecure Configuration ♦ Weak passwords ♦ Unpatched vulnerabilities in services, Operating systems, applications ♦ Possible Vulnerabilities in Services, Operating Systems ♦ Insecure programming,Weak Access
  • 20. Tools Vulnerability Scanners - Nessus, ISS, SARA, SAINT Listening to Traffic – Ethercap, tcpdump Password Crackers – John the ripper, LC4, Pwdump Intercepting Web Traffic – Achilles, Whisker, Legion
  • 21. Gaining access: ♦ Enough data has been gathered at this point to make an informed attempt to access the target ♦ Techniques – Password eavesdropping – File share brute forcing – Password file grab – Buffer overflows
  • 22. Escalating Privileges ♦ If only user-level access was obtained in the last step, the attacker will now seek to gain complete control of the system ♦ Techniques – Password cracking – Known exploits
  • 23. Covering Tracks ♦ Once total ownership of the target is secured, hiding this fact from system administrators becomes paramount, lest they quickly end the romp. ♦ Techniques – Clear logs – Hide tools
  • 24. Creating Back Doors ♦ Trap doors will be laid in various parts of the system to ensure that privileged access is easily regained at the whim of the intruder ♦ Techniques – Create rogue user accounts – Schedule batch jobs – Infect startup files – Plant remote control services – Install monitoring mechanisms – Replace apps with trojans
  • 25. Denial of Service ♦ If an attacker is unsuccessful in gaining access, they may use readily available exploit code to disable a target as a last resort ♦ Techniques – SYN flood – ICMP techniques – Identical SYN requests – Overlapping fragment/offset bugs – Out of bounds TCP options (OOB) – DDoS
  • 26. What do hackers do after hacking? ♦ Patch security hole – The other hackers can’t intrude ♦ Clear logs and hide themselves ♦ Install rootkit ( backdoor ) – The hacker who hacked the system can use the system later – It contains trojan virus, and so on ♦ Install irc related program – identd, irc, bitchx, eggdrop, bnc
  • 27. ♦ Install scanner program – mscan, sscan, nmap ♦ Install exploit program ♦ Install denial of service program ♦ Use all of installed programs silently
  • 28. How can protect the system?  Patch security hole often  Encrypt important data  Ex) pgp, ssh  Do not run unused daemon  Remove unused setuid/setgid program  Setup loghost • Backup the system often  Setup firewall  Setup IDS  Ex) snort
  • 29. What should do after hacked? ♦ Shutdown the system – Or turn off the system ♦ Separate the system from network ♦ Restore the system with the backup – Or reinstall all programs ♦ Connect the system to the network
  • 30. H4CKING VS CR4CKING ♦ HACKING WITH MALICIOUS INTENTION IS CRACKING The basic difference is hackers do not do anything disastrous. Cracking yield more devastating results. Cracking is crime. Cyber crime are the results of cracking ,not hacking
  • 32. Please send suggestions and feedbacks I am waiting for your replay. THANK YOU