SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1356
ETHICAL HACKING
Dhruval Shah1, Rajvi Shah2, Aditya Nag3
1,2,3Computer Department, Thakur College of Engineering and Technology, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract:- During the development of the Internet,
computer security has become a major concern for
businesses and governments. We live in security era, where
we are securing all our belongings beneath different modes
of lock however it's difficult within the case of system
security. As nowadays all the information is availableonline,
a large number of users are accessing it, some of them use
this information for gaining knowledge and some use it to
know how to use this informationtodestroyorsteal thedata
of websites or databases without the knowledge of the
owner. The state of security on web is becoming dangerous
and it is becoming worse day by day. So to tackle all such
problems "Hackers" come into picture. They are called as
Ethical Hackers. This paper describes what is hacking, who
are hackers, what is their code of conduct and in what way
they are helpful to the society. This paper will also highlight
the opportunities in the field of Ethical Hacking.
Keywords:- Hackers, Ethical Hackers, security
1. INTRODUCTION
As the computer technology advances, it has its darker side
also; HACKERS. In today world the size of the internet is
growing at a very fast rate, a large amount of data is moving
online, therefore, data security is the major issue. Today,
you'll be able to notice certified moral Hackers operating
with a number of the best and largest firmsacrossindustries
like tending, financial, government, energy andmuchmore!!
Nowadays an outsized range of firms, organizations,
organizations, banks, and websites are targeted by the
various types of hacking attacks by the hackers. Generally,
after hearing the term hacker we all think of the bad guys
who are computers experts with bad intensions,whotriesto
steal, leak or destroy someone'sconfidential orvaluabledata
without their knowledge. They are the persons with very
high computer skills who tries to break into someone
else security for gaining access to their personal
information, but all the times it is not like that. To overcome
the risk of being hacked by the hackers we have Ethical
Hackers in the industry, who are also computer experts just
like the hackers but with good intensions or bounded by
some set of rule and regulations by the various
organizations.
1.1 What Is Hacking?
Hacking is that the technique of finding the weak links or
loopholes within the laptop systems or the networks and
exploiting it to achieve unauthorized access to information
or to alter the option of the target computer systems or the
networks. Hacking describes the modification within the
hardware, code or the networks to accomplish certain goals
that don't seem to be aligned with the user goals.. In
contrast, it is also called breaking into someone's security
and stealing their personal or secret data such as phone
numbers, credit card details, addresses, online banking
passwords etc. Hackers are classified into three groups:
1. White Hat Hackers
2. Black Hat Hackers
3. Grey Hat Hackers
1.2 What is Ethical Hacking?
With the expansion of the web, pc security has become a
significant concern for businesses and governments. They
want to be ready to profit of the web for electronic
commerce, and alternative pursuits, however they're
troubled concerning the likelihood of being hacked.
In the seek for how to approach the matter, organizations
came to comprehend that one amongst the most effective
ways in which to guage theunwelcomepersonthreattotheir
interests would be to have freelance pc security
professionals decide to burgled their pc systems.Thistheme
is comparable to having freelance auditors inherit a
corporation to verify its accountancy records. In the case of
pc security, these tiger groups or moral hackers would use
an equivalent tools and techniques because the intruders,
but they would neither damage the target systems nor steal
information. Instead, theymightappraisethetargetsystems'
security and report back to the homeowners with the
vulnerabilities they found and directions for the way to
remedy them.
Ethical Hacking ≈ Hacking Ethical Hacking ≠ Cracking
2. Importance of Ethical Hacking
Government agencies and business organisation nowadays
ar in constant would like of moral hackers to combat the
growing threat to that security.Alotofgovernmentagencies,
professional and corporations now understand that if you
want to protect a system, you cannot do it by just locking
your doors. New worms, malware,viruses,and ransom ware
are multiplying every day and is creating a need for ethical
hacking services to safeguard the networks of businesses,
government agencies or defence.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1357
The Code of Conduct of an Ethical Hacker: -
 Identifying and determining the confidentiality
and privacy of the data of any organization before
 The intensions of an ethical hacker must be very
clear, that not to harm the client or organization.
 Working within the limits set by the client or the
organization, do not go beyond them.
 After the hacking do not disclose the private or
confidential findings during the hacking with others.
 Identifying and determining the confidentialityand
privacy of the data of any organisation before
hacking and should not violate any rule and
regulations.
 Before and after the hacking maintaining the
transparency with the client or owner of the
organisation.
 The intension of an ethical hacker must be very
clear, that not harm the client or organisation.
 Working within the limits set by the client or the
organisation, do not go beyond them.
 After the hacking do not disclose the private or
confidential findingsduringthehackingwithothers.
Need of Ethical hacking in Industry:
As every organisation has its own confidential information
which may be hacked by the malicious hackers or can be
broken by them thus so as to guard that information the
organisations heir moral hackers and permit them to hack
their own systems ethically any find flaws or loopholes in
their systems and proper them before any hacker hacks it.
3. Techniques of Ethical Hacking
 Information Gathering
 Vulnerability scanning
 Exploitation
 Test Analysis
 Information Gathering
In this step, the testers collectasmuchinformation about the
web application as possible and gain understanding of its
logic. The information gathered will be used to create a
knowledge base to act upon in later steps.Thetestersshould
gather all information even if it seems useless and unrelated
since no one knows at the outsetwhatbitsofinformation are
needed. This step can be carried out in many different ways:
by using public tools such as search engines; usingscanners;
sending simple HTTP requests etc.
 Vulnerability Analysis
Using the knowledge collected from the information
gathering step, the testers then scan the vulnerabilities that
exist in the web application. The testers can conduct testing
on configuration management, business logic in this step,
web server vulnerabilities, authentication mechanism
vulnerabilities, input-based vulnerabilities and function-
specific vulnerabilities are examined.
 Exploitation
After the vulnerability analysis, the testers should have a
idea of the areas that will be targeted for exploits. With the
list of vulnerabilities on hand, the two applications were
then exploited.
 Test Analysis
It is the interface of the result, the testers and the target
entity. It is important that the target entity is aware of
attacker modus techniques and toolsonwhichattackersrely
on.
4. Footprinting
Footprinting is the art of finding/gathering information
relating to the target to be attacked. For example,ifsomeone
wants to rob a bank that is done first is the bank's office is
located, where the cashier used to save money, bank routes
to escape preparation and various matters related to the
target. This information is beneficial to a hacker who is
trying to crack a whole system. The purposeistoaccumulate
as much information as possible, including the target’s
platform, applicationsoftwaretechnology, backenddatabase
version, configurations, and possibly even the network
architecture/ topology.
Here are some key pieces of information that a security
expert usually gathers about a website:
1. Related domains and subdomains
2. Technology and programming languages being used
3. Cached pages
4. Website history
5. Publically indexed files on search engines
6. Default pages and login forms
7. Related IP addresses
8. Other services running on those IP addresses
9. The version of the services/software being used
10. Publicly disclosed vulnerabilities in the software being
used
11. Default users
12. Default passwords
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1358
13. Valid email address and usernames
5. Phishing Technique
Phishing is a type of internet fraud that uses false or
deceptive content to trick users and extract information
from them. Phishing historicallyusede-mailsasa mediumto
reach its target, but soon spread to other forms of
communication like websites, SMS’s
THE REASON WHY PHISHING PREVAILS?
1. Lack of computer system knowledge
2. Lack of knowledge of security indicators
3. Lack of understanding of the verification process
E-MAIL PHISHING
Phishing emails are messages designed to fool the recipient
into handing over personal information,suchasloginnames,
passwords, credit card numbers, account credentials, social
security numbers, etc. Fraudulent emails harm their victims
through the loss of funds and identity theft. They also hurt
Internet business, because people lose their trustinInternet
transactions for fear that they will become victims of fraud.
How Phishing works.
Phishing attacks typically rely on social networking
techniques applied to email or other electronic
communication methods, including direct messages sent
over social networks, SMS text messages and other instant
messaging modes.
 z-shadow tool
What is Z-Shadow?
Z-Shadow is a website specially designed for hacking
Facebook or other social site.
like Facebook, gmail and many more. You just need to create
an account on that website and have to copy the URL of the
site which your victim uses. For example if you want to hack
Facebook, then you just need to copy the URL of the fake
Facebook page. Don’t worry no account get bans or
suspended because z-shadow is specially created for
hacking. Now send this URL to your target, and when they
click it, it opens up a new page which requires them to add
their ID and password. This page is backed by your Z-
Shadow profile and when they their credentials to enter,
they get hacked and you can get the results. Results will be
available in your z-shadow account. Now you can easily use
that ID and password for whatever you want to do.
 Anti-phishing and countermeasure
There are several methods to protect users from phishing
attacks. But prevention is not enough. We need detection
measures to get early warning signals when a phishing
attack is being planned or is in progress.
The attacker needs to setup a look-alike site. First, a domain
name is registered. Many times attackers register a domain
which sounds similar to the original. If they are targeting
www.abcbank.com attackers might register
www.abccbank.com.
There is also a website www.phishtank.com where you can
check by putting the site which you already have and
phishtank will check throughout their database if such a
website is marked as a phishing website.Ifyoualreadyknow
that the website is a phishing site you can also put up on
phishtank and mark that website as phishing website.
6. Conclusions
The whole world is moving towards the enhancement of
technology, and more, with thistherisk ofsecurityincreases.
This paper described about the hackers and ethical hackers
who tried to illegally break into the security. In the ADPS,
hacking plays a significant role because it deals with either
side of being smart or unhealthy. Then in the next section it
describe the importance and the techniques of ethical
hacking. Further, this paper tells about how hackers enter
into the system called as footprinting. It also describe about
phishing which tells what is phishing, how does phishing
works. In conclusion, it must be said that ethical hacking is a
tool which can help in better understanding of the system
and improving the security techniques as well.
REFERENCES
[1] https://www.researchgate.net/publication/271079090
_ETHICAL_HACKING_Tools_Techniques_and_Approache
s
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1359
[2] Bansal, A., & Arora, M. (2012).Ethical HackingandSocial
Security. Radix International Journal of Research in
Social Science, 1(11), 1-16
[3] https://www.researchgate.net/publication/316431977
_Ethical_Hacking_and_Hacking_Attacks
[4] Study of Ethical Hacking a paper by (Bhawana Sahare,
Ankit Naik, Shashikala Khandey)
http://www.ijecs.in/issue/v4-i4/68%20ijecs.pdf
[5] "FootPrinting-First Step of Ethical Hacking".

More Related Content

What's hot (20)

Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
Femi Ashaye
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET Journal
 
Improve Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingImprove Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness Training
Triskele Labs
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
Mastel Indonesia
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
AbhilashYadav14
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
princejhulan
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
Ulf Mattsson
 
Data Analytics in Cyber Security - Intellisys 2015 Keynote
Data Analytics in Cyber Security - Intellisys 2015 KeynoteData Analytics in Cyber Security - Intellisys 2015 Keynote
Data Analytics in Cyber Security - Intellisys 2015 Keynote
HPCC Systems
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
Numaan Huq
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security Challenges
Jorge Sebastiao
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET Journal
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
Vikas Jain
 
How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016
Ulf Mattsson
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
Ulf Mattsson
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
Cameron Forbes Over
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
Shannon G., MBA
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach Analysis
Tal Be'ery
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
Kim Jensen
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
Femi Ashaye
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET Journal
 
Improve Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingImprove Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness Training
Triskele Labs
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
Mastel Indonesia
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
AbhilashYadav14
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
Ulf Mattsson
 
Data Analytics in Cyber Security - Intellisys 2015 Keynote
Data Analytics in Cyber Security - Intellisys 2015 KeynoteData Analytics in Cyber Security - Intellisys 2015 Keynote
Data Analytics in Cyber Security - Intellisys 2015 Keynote
HPCC Systems
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
Numaan Huq
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security Challenges
Jorge Sebastiao
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET Journal
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
Vikas Jain
 
How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016
Ulf Mattsson
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
Ulf Mattsson
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
Cameron Forbes Over
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
Shannon G., MBA
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach Analysis
Tal Be'ery
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
Kim Jensen
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
Chinatu Uzuegbu
 

Similar to IRJET- Ethical Hacking (20)

IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET Journal
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
asharshaikh8
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
homeworkping4
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
AbimbolaFisher1
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
IRJET Journal
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
Salaj Goyal
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
ShivamSharma909
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
johnnymaaza
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
Ahmed Banafa
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
Raghav Bisht
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET Journal
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Infosectrain3
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Vishesh Singhal
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Nathan Mathis
 
Cyber Investigation Portal
Cyber Investigation PortalCyber Investigation Portal
Cyber Investigation Portal
IRJET Journal
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.
Cetpa Infotech
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
Skippedltd
 
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET Journal
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
asharshaikh8
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
homeworkping4
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
AbimbolaFisher1
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
IRJET Journal
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
ShivamSharma909
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
johnnymaaza
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
Ahmed Banafa
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
Raghav Bisht
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET Journal
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Infosectrain3
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Nathan Mathis
 
Cyber Investigation Portal
Cyber Investigation PortalCyber Investigation Portal
Cyber Investigation Portal
IRJET Journal
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.
Cetpa Infotech
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
Skippedltd
 

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 

Recently uploaded (20)

"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
The Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLabThe Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLab
Journal of Soft Computing in Civil Engineering
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 

IRJET- Ethical Hacking

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1356 ETHICAL HACKING Dhruval Shah1, Rajvi Shah2, Aditya Nag3 1,2,3Computer Department, Thakur College of Engineering and Technology, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract:- During the development of the Internet, computer security has become a major concern for businesses and governments. We live in security era, where we are securing all our belongings beneath different modes of lock however it's difficult within the case of system security. As nowadays all the information is availableonline, a large number of users are accessing it, some of them use this information for gaining knowledge and some use it to know how to use this informationtodestroyorsteal thedata of websites or databases without the knowledge of the owner. The state of security on web is becoming dangerous and it is becoming worse day by day. So to tackle all such problems "Hackers" come into picture. They are called as Ethical Hackers. This paper describes what is hacking, who are hackers, what is their code of conduct and in what way they are helpful to the society. This paper will also highlight the opportunities in the field of Ethical Hacking. Keywords:- Hackers, Ethical Hackers, security 1. INTRODUCTION As the computer technology advances, it has its darker side also; HACKERS. In today world the size of the internet is growing at a very fast rate, a large amount of data is moving online, therefore, data security is the major issue. Today, you'll be able to notice certified moral Hackers operating with a number of the best and largest firmsacrossindustries like tending, financial, government, energy andmuchmore!! Nowadays an outsized range of firms, organizations, organizations, banks, and websites are targeted by the various types of hacking attacks by the hackers. Generally, after hearing the term hacker we all think of the bad guys who are computers experts with bad intensions,whotriesto steal, leak or destroy someone'sconfidential orvaluabledata without their knowledge. They are the persons with very high computer skills who tries to break into someone else security for gaining access to their personal information, but all the times it is not like that. To overcome the risk of being hacked by the hackers we have Ethical Hackers in the industry, who are also computer experts just like the hackers but with good intensions or bounded by some set of rule and regulations by the various organizations. 1.1 What Is Hacking? Hacking is that the technique of finding the weak links or loopholes within the laptop systems or the networks and exploiting it to achieve unauthorized access to information or to alter the option of the target computer systems or the networks. Hacking describes the modification within the hardware, code or the networks to accomplish certain goals that don't seem to be aligned with the user goals.. In contrast, it is also called breaking into someone's security and stealing their personal or secret data such as phone numbers, credit card details, addresses, online banking passwords etc. Hackers are classified into three groups: 1. White Hat Hackers 2. Black Hat Hackers 3. Grey Hat Hackers 1.2 What is Ethical Hacking? With the expansion of the web, pc security has become a significant concern for businesses and governments. They want to be ready to profit of the web for electronic commerce, and alternative pursuits, however they're troubled concerning the likelihood of being hacked. In the seek for how to approach the matter, organizations came to comprehend that one amongst the most effective ways in which to guage theunwelcomepersonthreattotheir interests would be to have freelance pc security professionals decide to burgled their pc systems.Thistheme is comparable to having freelance auditors inherit a corporation to verify its accountancy records. In the case of pc security, these tiger groups or moral hackers would use an equivalent tools and techniques because the intruders, but they would neither damage the target systems nor steal information. Instead, theymightappraisethetargetsystems' security and report back to the homeowners with the vulnerabilities they found and directions for the way to remedy them. Ethical Hacking ≈ Hacking Ethical Hacking ≠ Cracking 2. Importance of Ethical Hacking Government agencies and business organisation nowadays ar in constant would like of moral hackers to combat the growing threat to that security.Alotofgovernmentagencies, professional and corporations now understand that if you want to protect a system, you cannot do it by just locking your doors. New worms, malware,viruses,and ransom ware are multiplying every day and is creating a need for ethical hacking services to safeguard the networks of businesses, government agencies or defence.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1357 The Code of Conduct of an Ethical Hacker: -  Identifying and determining the confidentiality and privacy of the data of any organization before  The intensions of an ethical hacker must be very clear, that not to harm the client or organization.  Working within the limits set by the client or the organization, do not go beyond them.  After the hacking do not disclose the private or confidential findings during the hacking with others.  Identifying and determining the confidentialityand privacy of the data of any organisation before hacking and should not violate any rule and regulations.  Before and after the hacking maintaining the transparency with the client or owner of the organisation.  The intension of an ethical hacker must be very clear, that not harm the client or organisation.  Working within the limits set by the client or the organisation, do not go beyond them.  After the hacking do not disclose the private or confidential findingsduringthehackingwithothers. Need of Ethical hacking in Industry: As every organisation has its own confidential information which may be hacked by the malicious hackers or can be broken by them thus so as to guard that information the organisations heir moral hackers and permit them to hack their own systems ethically any find flaws or loopholes in their systems and proper them before any hacker hacks it. 3. Techniques of Ethical Hacking  Information Gathering  Vulnerability scanning  Exploitation  Test Analysis  Information Gathering In this step, the testers collectasmuchinformation about the web application as possible and gain understanding of its logic. The information gathered will be used to create a knowledge base to act upon in later steps.Thetestersshould gather all information even if it seems useless and unrelated since no one knows at the outsetwhatbitsofinformation are needed. This step can be carried out in many different ways: by using public tools such as search engines; usingscanners; sending simple HTTP requests etc.  Vulnerability Analysis Using the knowledge collected from the information gathering step, the testers then scan the vulnerabilities that exist in the web application. The testers can conduct testing on configuration management, business logic in this step, web server vulnerabilities, authentication mechanism vulnerabilities, input-based vulnerabilities and function- specific vulnerabilities are examined.  Exploitation After the vulnerability analysis, the testers should have a idea of the areas that will be targeted for exploits. With the list of vulnerabilities on hand, the two applications were then exploited.  Test Analysis It is the interface of the result, the testers and the target entity. It is important that the target entity is aware of attacker modus techniques and toolsonwhichattackersrely on. 4. Footprinting Footprinting is the art of finding/gathering information relating to the target to be attacked. For example,ifsomeone wants to rob a bank that is done first is the bank's office is located, where the cashier used to save money, bank routes to escape preparation and various matters related to the target. This information is beneficial to a hacker who is trying to crack a whole system. The purposeistoaccumulate as much information as possible, including the target’s platform, applicationsoftwaretechnology, backenddatabase version, configurations, and possibly even the network architecture/ topology. Here are some key pieces of information that a security expert usually gathers about a website: 1. Related domains and subdomains 2. Technology and programming languages being used 3. Cached pages 4. Website history 5. Publically indexed files on search engines 6. Default pages and login forms 7. Related IP addresses 8. Other services running on those IP addresses 9. The version of the services/software being used 10. Publicly disclosed vulnerabilities in the software being used 11. Default users 12. Default passwords
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1358 13. Valid email address and usernames 5. Phishing Technique Phishing is a type of internet fraud that uses false or deceptive content to trick users and extract information from them. Phishing historicallyusede-mailsasa mediumto reach its target, but soon spread to other forms of communication like websites, SMS’s THE REASON WHY PHISHING PREVAILS? 1. Lack of computer system knowledge 2. Lack of knowledge of security indicators 3. Lack of understanding of the verification process E-MAIL PHISHING Phishing emails are messages designed to fool the recipient into handing over personal information,suchasloginnames, passwords, credit card numbers, account credentials, social security numbers, etc. Fraudulent emails harm their victims through the loss of funds and identity theft. They also hurt Internet business, because people lose their trustinInternet transactions for fear that they will become victims of fraud. How Phishing works. Phishing attacks typically rely on social networking techniques applied to email or other electronic communication methods, including direct messages sent over social networks, SMS text messages and other instant messaging modes.  z-shadow tool What is Z-Shadow? Z-Shadow is a website specially designed for hacking Facebook or other social site. like Facebook, gmail and many more. You just need to create an account on that website and have to copy the URL of the site which your victim uses. For example if you want to hack Facebook, then you just need to copy the URL of the fake Facebook page. Don’t worry no account get bans or suspended because z-shadow is specially created for hacking. Now send this URL to your target, and when they click it, it opens up a new page which requires them to add their ID and password. This page is backed by your Z- Shadow profile and when they their credentials to enter, they get hacked and you can get the results. Results will be available in your z-shadow account. Now you can easily use that ID and password for whatever you want to do.  Anti-phishing and countermeasure There are several methods to protect users from phishing attacks. But prevention is not enough. We need detection measures to get early warning signals when a phishing attack is being planned or is in progress. The attacker needs to setup a look-alike site. First, a domain name is registered. Many times attackers register a domain which sounds similar to the original. If they are targeting www.abcbank.com attackers might register www.abccbank.com. There is also a website www.phishtank.com where you can check by putting the site which you already have and phishtank will check throughout their database if such a website is marked as a phishing website.Ifyoualreadyknow that the website is a phishing site you can also put up on phishtank and mark that website as phishing website. 6. Conclusions The whole world is moving towards the enhancement of technology, and more, with thistherisk ofsecurityincreases. This paper described about the hackers and ethical hackers who tried to illegally break into the security. In the ADPS, hacking plays a significant role because it deals with either side of being smart or unhealthy. Then in the next section it describe the importance and the techniques of ethical hacking. Further, this paper tells about how hackers enter into the system called as footprinting. It also describe about phishing which tells what is phishing, how does phishing works. In conclusion, it must be said that ethical hacking is a tool which can help in better understanding of the system and improving the security techniques as well. REFERENCES [1] https://www.researchgate.net/publication/271079090 _ETHICAL_HACKING_Tools_Techniques_and_Approache s
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1359 [2] Bansal, A., & Arora, M. (2012).Ethical HackingandSocial Security. Radix International Journal of Research in Social Science, 1(11), 1-16 [3] https://www.researchgate.net/publication/316431977 _Ethical_Hacking_and_Hacking_Attacks [4] Study of Ethical Hacking a paper by (Bhawana Sahare, Ankit Naik, Shashikala Khandey) http://www.ijecs.in/issue/v4-i4/68%20ijecs.pdf [5] "FootPrinting-First Step of Ethical Hacking".