SlideShare a Scribd company logo
Powerpoint Templates
Page 1
Powerpoint Templates
ETHICAL HACKING
Presented By:
MUKUL AGARWAL
MCA [LE]
TCA1305077
MAY 2014
Powerpoint Templates
Page 2
CoNTENT
2
• Overview of Hacking
• Types of Hacker
• Why do Hackers hack ?
• Hacker’s Language
• Hackers’ language
• What is Ethical Hacking
• Why do we need Ethical Hacking
• Methodology of Ethical Hacking
• History of cryptography
• Ethical Hacking Tools
• Some Cases of Hacking
• Skills of an Ethical Hacker
• References
Powerpoint Templates
Page 3
oVERVIEW oF HACKING
3
• Hack
– the rapid crafting of a new program or the
making of changes to existing, usually
complicated software
• Hacker
– The person who hacks
• Cracker
– System destroyer
Powerpoint Templates
Page 4
TYPES oF HACKER
3
 White Hat Hackers:
A White Hat who specializes in penetration testing and in
other testing methodologies to ensure the security of an
organization's information systems.
 Black Hat Hackers:
A Black Hat is the villain or bad guy, especially in a western
movie in which such a character would wear a black hat in
contrast to the hero's white hat.
 Gray Hat Hackers:
A Grey Hat, in the hacking community, refers to a skilled
hacker whose activities fall somewhere between white and
black hat hackers on a variety of spectra.
Powerpoint Templates
Page 5
WHY Do PEoPLE HACK
To make security stronger ( Ethical
Hacking )
Just for fun
Show off
Hack other systems secretly
Notify many people their thought
Steal important information
Destroy enemy’s computer network
during the war.
Powerpoint Templates
Page 6
HACKER’S LANGuAGE
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
Powerpoint Templates
Page 7
HACKER’S LANGuAGE TRANSLATIoN
• Ex:
–1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3
th1s wh3n 1 h4ck3d 1n
–I did not hack this page, it was like this
when I hacked in
Powerpoint Templates
Page 8
What is Ethical hacking
• It is Legal
• Permission is obtained from the target
• Part of an overall security program
• Identify vulnerabilities visible from Internet at particular
point of time
• Ethical hackers possesses same skills, mindset and tools
of a hacker but the attacks are done in a non-destructive
manner
• Also Called – Attack & Penetration Testing
Powerpoint Templates
Page 9
Why Do WE nEED Ethical hacking
Viruses, Trojan
Horses,
and Worms
Social
Engineering
Automated
Attacks
Accidental
Breaches in
Security Denial of
Service (DoS)
Organizational
Attacks
Restricted
Data
Protection from possible External Attacks
Powerpoint Templates
Page 10
MEthoDology oF hacking
Powerpoint Templates
Page 11
1. REconnaissancE
This is also known as foot-printing. This is the first
stage in the methodology of hacking. As given in
the analogy, this is the stage in which the hacker
collects information about the company which the
personal is going to hack.
Powerpoint Templates
Page 12
2. scanning
Scanning is the second phase in the hacking
methodology in which the hacker tries to make a
blue print of the target network. It is similar to a
thief going through your neighborhood and
checking every door and window on each house to
see which ones are open and which ones are
locked.
Powerpoint Templates
Page 13
EnuMERation
Enumeration is the ability of a hacker to convince
some servers to give them information that is
vital to them to make an attack. By doing this
hacker aims to find what resources and shares
can be found in the system
Powerpoint Templates
Page 14
3. gaining accEss
This is the actual hacking phase in which the
hacker gains access to the system. The hacker
will make use of all the information he collected in
the pre-attacking phases.
Powerpoint Templates
Page 15
4. Maintaining access
Now the hacker is inside the system by some
means by password guessing or exploiting some
of its vulnerabilities. This means that he is now in
a position to upload some files and download
some of them.
Powerpoint Templates
Page 16
5. covering tracks
Now we come to the final step in the hacking. There
is a saying that “everybody knows a good hacker
but nobody knows a great hacker”. This means that
a good hacker can always clear tracks or any record
that they may be present in the network to prove that
he was here.
Powerpoint Templates
Page 17
17
History of cryptograpHy
• Cryptanalysis studies the process of breaking
encryption algorithms
• When a new encryption algorithm is
developed, cryptanalysts study it and try to
break it
– Or prove that it is impractical to break it
(taking much time and many resources)
Powerpoint Templates
Page 18
18
enigMa
• Used by the
Germans during
World War II
– Replaced letters
as they were
typed
– Substitutions
were computed
using a key and a
set of switches.
Powerpoint Templates
Page 19
19
steganograpHy
• The process of hiding data in plain view in
pictures, graphics, or text
– Example: changing colors slightly to
encode individual bits in an image
• The image on the left contains the image on
the right hidden in it.
Powerpoint Templates
Page 20
20
syMMetric cryptograpHy
algoritHMs
• Symmetric algorithms have one key that
encrypts and decrypts data
• Advantages
– Symmetric algorithms are fast
– They are difficult to break if a large key size
is used
– Only one key needed
Powerpoint Templates
Page 21
21
syMMetric cryptograpHy
• One key encrypts and decrypts data
• Cleartext with Key makes Ciphertext
• Ciphertext with Key makes Cleartext
Winning Lotto
#s:
aWDHOP#@-w9
aWDHOP#@-w9 Winning Lotto
#s:
Powerpoint Templates
Page 22
ETHICAL HACKING TOOLS
• Samspade
Samspade is a simple tool which provides us information
about a particular host. This tool is very much helpful in finding
the addresses, phone numbers etc
• Email Tracker and Visual Route
We often used to receive many spam messages in our mailbox. We
don’t know where it comes from. Email tracker is software which
helps us to find from which server the mail does actually came from.
Every message we receive will have a header associated with it. The
email tracker uses this header information for find the location.
Powerpoint Templates
Page 23
SOmE CASES Of HACKING
• Sony - Around 77 million users of Sony’s Play station network
could have had their information stolen by hackers in April 2011.
• RSA Security - In March 2011, RSA Security was hacked when a
spoof email containing an infected Excel spread sheet tricked
employees into allowing hackers to access the system.
• InfraGard Atlanta - As an FBI partner, you would imagine
InfraGard Atlanta to have the most up-to-date Internet security
available. However, in June 2011 the company was hacked and
180 usernames and passwords were stolen.
• Gmail - The Gmail accounts of Chinese human activists were
hacked, suggesting that the Chinese government masterminded
this attack, especially because of the widespread restrictions within
the country.
Powerpoint Templates
Page 24
SKILLS Of AN ETHICAL HACKEr
• Routers - knowledge of routers, routing
protocols and access control lists.
• Microsoft - skills in operation ,
configuration and management.
• Linux - knowledge of Linux/Unix; security
setting, configuration, and services.
• Firewalls - configuration, & operation of
intrusion detection systems.
Powerpoint Templates
Page 25
rEfErENCES
 en.wikipedia.org/
 howstuffworks.com/
 slideshare.net/
 authorstream.com/
 123seminarsonly.com/
23
Powerpoint Templates
Page 26
THANK YOU

More Related Content

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
VipinYadav257
 
Password Attacks.pdf
Password Attacks.pdfPassword Attacks.pdf
Password Attacks.pdf
Andy32903
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
himanshujoshi238
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Session Hijacking
Session HijackingSession Hijacking
Session Hijacking
n|u - The Open Security Community
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
Sweta Kumari Barnwal
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
DEEPIKA WALIA
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Nitheesh Adithyan
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Raghav Bisht
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
BugRaptors
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
Sushil Ranjan
 

Similar to Ethical Hacking (20)

Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
Abhilash Ak
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
Prasad Pawar
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
Session Slide
Session SlideSession Slide
Session Slide
Muralidharan Radhakrishnan
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Punit Goswami
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
HassanAhmedShaikh1
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
daxgame
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
Offensive Security basics part 1
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1
wharpreet
 
Hacking intro
Hacking introHacking intro
Hacking intro
Milind Mishra
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
SourabhRuhil4
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
Claus Cramon Houmann
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rishabha Garg
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
Abhilash Ak
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
Prasad Pawar
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
HassanAhmedShaikh1
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
daxgame
 
Offensive Security basics part 1
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1
wharpreet
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
Claus Cramon Houmann
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
 

Recently uploaded (20)

TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtBuckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Lynda Kane
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your UsersAutomation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Lynda Kane
 
Salesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docxSalesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docx
José Enrique López Rivera
 
"PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System""PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System"
Jainul Musani
 
"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko
Fwdays
 
Rock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning JourneyRock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning Journey
Lynda Kane
 
Datastucture-Unit 4-Linked List Presentation.pptx
Datastucture-Unit 4-Linked List Presentation.pptxDatastucture-Unit 4-Linked List Presentation.pptx
Datastucture-Unit 4-Linked List Presentation.pptx
kaleeswaric3
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Automation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From AnywhereAutomation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From Anywhere
Lynda Kane
 
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5..."Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
Fwdays
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtBuckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Lynda Kane
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your UsersAutomation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Lynda Kane
 
Salesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docxSalesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docx
José Enrique López Rivera
 
"PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System""PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System"
Jainul Musani
 
"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko
Fwdays
 
Rock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning JourneyRock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning Journey
Lynda Kane
 
Datastucture-Unit 4-Linked List Presentation.pptx
Datastucture-Unit 4-Linked List Presentation.pptxDatastucture-Unit 4-Linked List Presentation.pptx
Datastucture-Unit 4-Linked List Presentation.pptx
kaleeswaric3
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Automation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From AnywhereAutomation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From Anywhere
Lynda Kane
 
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5..."Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
Fwdays
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 

Ethical Hacking

  • 1. Powerpoint Templates Page 1 Powerpoint Templates ETHICAL HACKING Presented By: MUKUL AGARWAL MCA [LE] TCA1305077 MAY 2014
  • 2. Powerpoint Templates Page 2 CoNTENT 2 • Overview of Hacking • Types of Hacker • Why do Hackers hack ? • Hacker’s Language • Hackers’ language • What is Ethical Hacking • Why do we need Ethical Hacking • Methodology of Ethical Hacking • History of cryptography • Ethical Hacking Tools • Some Cases of Hacking • Skills of an Ethical Hacker • References
  • 3. Powerpoint Templates Page 3 oVERVIEW oF HACKING 3 • Hack – the rapid crafting of a new program or the making of changes to existing, usually complicated software • Hacker – The person who hacks • Cracker – System destroyer
  • 4. Powerpoint Templates Page 4 TYPES oF HACKER 3  White Hat Hackers: A White Hat who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.  Black Hat Hackers: A Black Hat is the villain or bad guy, especially in a western movie in which such a character would wear a black hat in contrast to the hero's white hat.  Gray Hat Hackers: A Grey Hat, in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra.
  • 5. Powerpoint Templates Page 5 WHY Do PEoPLE HACK To make security stronger ( Ethical Hacking ) Just for fun Show off Hack other systems secretly Notify many people their thought Steal important information Destroy enemy’s computer network during the war.
  • 6. Powerpoint Templates Page 6 HACKER’S LANGuAGE 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x
  • 7. Powerpoint Templates Page 7 HACKER’S LANGuAGE TRANSLATIoN • Ex: –1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1 h4ck3d 1n –I did not hack this page, it was like this when I hacked in
  • 8. Powerpoint Templates Page 8 What is Ethical hacking • It is Legal • Permission is obtained from the target • Part of an overall security program • Identify vulnerabilities visible from Internet at particular point of time • Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner • Also Called – Attack & Penetration Testing
  • 9. Powerpoint Templates Page 9 Why Do WE nEED Ethical hacking Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data Protection from possible External Attacks
  • 11. Powerpoint Templates Page 11 1. REconnaissancE This is also known as foot-printing. This is the first stage in the methodology of hacking. As given in the analogy, this is the stage in which the hacker collects information about the company which the personal is going to hack.
  • 12. Powerpoint Templates Page 12 2. scanning Scanning is the second phase in the hacking methodology in which the hacker tries to make a blue print of the target network. It is similar to a thief going through your neighborhood and checking every door and window on each house to see which ones are open and which ones are locked.
  • 13. Powerpoint Templates Page 13 EnuMERation Enumeration is the ability of a hacker to convince some servers to give them information that is vital to them to make an attack. By doing this hacker aims to find what resources and shares can be found in the system
  • 14. Powerpoint Templates Page 14 3. gaining accEss This is the actual hacking phase in which the hacker gains access to the system. The hacker will make use of all the information he collected in the pre-attacking phases.
  • 15. Powerpoint Templates Page 15 4. Maintaining access Now the hacker is inside the system by some means by password guessing or exploiting some of its vulnerabilities. This means that he is now in a position to upload some files and download some of them.
  • 16. Powerpoint Templates Page 16 5. covering tracks Now we come to the final step in the hacking. There is a saying that “everybody knows a good hacker but nobody knows a great hacker”. This means that a good hacker can always clear tracks or any record that they may be present in the network to prove that he was here.
  • 17. Powerpoint Templates Page 17 17 History of cryptograpHy • Cryptanalysis studies the process of breaking encryption algorithms • When a new encryption algorithm is developed, cryptanalysts study it and try to break it – Or prove that it is impractical to break it (taking much time and many resources)
  • 18. Powerpoint Templates Page 18 18 enigMa • Used by the Germans during World War II – Replaced letters as they were typed – Substitutions were computed using a key and a set of switches.
  • 19. Powerpoint Templates Page 19 19 steganograpHy • The process of hiding data in plain view in pictures, graphics, or text – Example: changing colors slightly to encode individual bits in an image • The image on the left contains the image on the right hidden in it.
  • 20. Powerpoint Templates Page 20 20 syMMetric cryptograpHy algoritHMs • Symmetric algorithms have one key that encrypts and decrypts data • Advantages – Symmetric algorithms are fast – They are difficult to break if a large key size is used – Only one key needed
  • 21. Powerpoint Templates Page 21 21 syMMetric cryptograpHy • One key encrypts and decrypts data • Cleartext with Key makes Ciphertext • Ciphertext with Key makes Cleartext Winning Lotto #s: aWDHOP#@-w9 aWDHOP#@-w9 Winning Lotto #s:
  • 22. Powerpoint Templates Page 22 ETHICAL HACKING TOOLS • Samspade Samspade is a simple tool which provides us information about a particular host. This tool is very much helpful in finding the addresses, phone numbers etc • Email Tracker and Visual Route We often used to receive many spam messages in our mailbox. We don’t know where it comes from. Email tracker is software which helps us to find from which server the mail does actually came from. Every message we receive will have a header associated with it. The email tracker uses this header information for find the location.
  • 23. Powerpoint Templates Page 23 SOmE CASES Of HACKING • Sony - Around 77 million users of Sony’s Play station network could have had their information stolen by hackers in April 2011. • RSA Security - In March 2011, RSA Security was hacked when a spoof email containing an infected Excel spread sheet tricked employees into allowing hackers to access the system. • InfraGard Atlanta - As an FBI partner, you would imagine InfraGard Atlanta to have the most up-to-date Internet security available. However, in June 2011 the company was hacked and 180 usernames and passwords were stolen. • Gmail - The Gmail accounts of Chinese human activists were hacked, suggesting that the Chinese government masterminded this attack, especially because of the widespread restrictions within the country.
  • 24. Powerpoint Templates Page 24 SKILLS Of AN ETHICAL HACKEr • Routers - knowledge of routers, routing protocols and access control lists. • Microsoft - skills in operation , configuration and management. • Linux - knowledge of Linux/Unix; security setting, configuration, and services. • Firewalls - configuration, & operation of intrusion detection systems.
  • 25. Powerpoint Templates Page 25 rEfErENCES  en.wikipedia.org/  howstuffworks.com/  slideshare.net/  authorstream.com/  123seminarsonly.com/ 23