SlideShare a Scribd company logo
Seminar Report
                    on
      โ€œ ETHICAL โ€“ HACKING โ€
                   Submitted
                      BY
        Mr : - โ€œ Parag S. Kosarkar        โ€œ
          Semester / Section โ€œ โ€“ 6 th A
                  Roll No : - 41




                23 FEB , 2012 - 13
Department of Computer Technology PART TIME DEGREE
                      PROGRAM

        YESHWANTRAO CHAVAN COLLEGE OF
              ENGINEERING, Nagpur

    (An Autonomous Institution Affiliated to Rashtrasant
          Tukadoji Maharaj Nagpur University)
Presenting Seminar
         On
INTRODUCTION : -
  ๏ฑ Ethical hacking - also known as penetration testing or intrusion
    testing or red teaming has become a major concern for businesses
    and governments.

  ๏ฑ Companies are worried about the possibility of being โ€œhackedโ€ and
    potential customers are worried about maintaining control of
    personal information.

  ๏ฑ Necessity of computer security professionals to break into the
    systems of the organisation.
  ๏ฑ Ethical hackers employ the same tools and techniques as the
    intruders.

  ๏ฑ They neither damage the target systems nor steal information.

  ๏ฑ The tool is not an automated hacker program rather it is an audit
    that both identifies the vulnerabilities of a system and provide
    advice on how to eliminate them.
FAMOUS HACKERS IN HISTORY : -

        ๏ถ KEVIN MITNICK         ๏ถ IAN MURPHY




        ๏ถ JOHAN HELSINGUIS      ๏ถ MARK ABENE




        ๏ถ ROBERT MORRIS         ๏ถ LINUS TORVALDS
=


Contents to be Explained : -

    ๏ฑ SQL Injection
    ๏ฑ Keylogging
    ๏ฑ Tabnapping
    ๏ฑ Phishing
    ๏ฑ RAT โ€“ Remote Administration
     Tools or Trojans
    ๏ฑ Cookie Stealing
    ๏ฑ What Precautions can be done
     to Avoid being Hacked ?
Comman Phases of Hacking:-
   An ethical hacker follows processes similar to those of a
malicious hacker. The steps to gain and maintain entry into a
computer system are similar no matter what the hackerโ€™s
intentions are. There are five phases that hackers generally
follow in hacking a system.


๏ƒผ Phase 1 โ€“ Recognise System
๏ƒผ Phase 2 โ€“ Scanning Process
๏ƒผ Phase 3 - Gaining Access
๏ƒผ Phase 4 - Maintaining Access
๏ƒผ Phase 5 - Covering Tracks
What is Hacking ?             ๏ฑ Hacking refers to an array
                                of activities which area
                                done to intrude some
                                one elseโ€™s Personal
                                Information space so as
                                to use it for malicious
                                , unwanted purpose.


What is Cracking ?
๏ฑ Cracking is almost the same as hacking because they
  both get into the peoples server & accounts illegally.

๏ฑ But a cracker destroys the information & software
  that it gets into, which can cause System Down.
Proffesional Criminals or Crackers : -
   ๏ฑ Make a living by breaking into the systems and
     selling the information.

Hacker & Ethical Hacker : -
  ๏ฑ Hacker can Access computer system or network
    information without their permission.
  ๏ฑ Breaks the LAWS , can go to Prison !

  ๏ฑ Ethical Hacker does the same but with the legal
    permission.
  ๏ฑ Employed by companies to perform penetration
    tests. Quick โ€“ Heal Hires Hackers.
What you can do Legally ?
 ๏ฑ As an Ethical hacker , be aware of what is allowed &
   what is not .
 ๏ฑ Laws involving technologies are changing according to
   the Techology changes.
 ๏ฑ Some hacking tools on your computer might be illegal
   to possess.
IS PORT โ€“ Scanning Legal ?
 ๏ฑ   Government does not see to it as violation.
 ๏ฑ   It is Legal
 ๏ฑ   As noninvasive or non destructible in Nature.
 ๏ฑ   Mostly port 8080 , 80 & 443 are Open
What is SQL โ€“ INJECTION ?

SQL โ€“ Injection is one of the popular web application
hacking method using injection attack, an unauthorized
person can access the Database of the website. Attacker
can extract the data from Database.

What hacker can do with the SQL injection attack ?
๏ฑ ByPassing Logins
๏ฑ Accessing secret data
๏ฑ Modifying content of website
๏ฑ Shutting down the My SQL server
๏ฑ Google Dorking
๏ฑ Example :      * inurl:index.php?id=
                 * inurl:galary.php?id=
Checking the Vulnerability : -

๏ฑ Now lets us check the vulnerability of Target โ€“ Website
  to check the vulnerability add the (โ€˜) at the end of the
  url and hit enter.
    Eg : - http://www.anywebsite.com/index.php?id=2โ€™


๏ฑ If the page remains same
  or do not gives any
  message saying โ€ฆ

โ€œ Error 404 โ€“ page not found
then its Ok ! โ€
What is a Keylogger?
          A keylogger is a piece of malicious software, usually
called "spyware" or "malware," that records every keystroke you
make on a keyboard. Keyloggers can be installed without your
knowledge or consent when you visit a Web site or read an e-mail,
install a program, or perform other activities. Once installed, the
keylogger records all your keystrokes, and then e-mails the
information and other data to the computer hacker.
How Keyloggers are Constructed :
๏ฑ The main idea behind keyloggers is to get in between any two links in the
  chain of events between when a key is pressed and when information about
  that keystroke is displayed on the monitor.

๏ฑ This can be achieved using video surveillance : a hardware bug in the
  keyboard, wiring or the computer itself; intercepting input/output;
  substituting the keyboard driver; using a filter driver in the keyboard stack;
  intercepting kernel functions by any means possible (substituting addresses
  in system tables, splicing function code, etc.); intercepting DLL functions in
  user mode, and requesting information from the keyboard using standard
  documented methods.

๏ฑ Keyloggers can be divided into two categories: keylogging devices and
  keylogging software. Keyloggers that fall into the first category are usually
  small devices that can be fixed to the keyboard or placed within a cable or
  the computer itself. The keylogging software category is made up of
  dedicated programs designed to track and log keystrokes.
KEYLOGGERโ€™S Can Be Spread Using : -
  ๏ฑ   MP3 music files
  ๏ฑ   E-mail attachments
  ๏ฑ   Clicking on deceptive popโ€“ups
  ๏ฑ   P2P networks
  ๏ฑ   AVI files (i.e., "YouTube" or other
      videos)
  ๏ฑ   A legitimate Web site link, picture, or
      story that was malfaced
  ๏ฑ   Downloaded games or any other PC
      tools or programs
  ๏ฑ   Faked malicious Web sites that
      impersonate popular sites (sites such
      as Google, eBay, Amazon, Yahoo,
      banks) or anti-virus programs
TABNAPPING ?
                                      From the combination of
                              'tab' and 'kidnapping' - could be
                              used by clever phishers to dupe
                              users into giving up passwords by
                              secretly changing already-open
                              browser tabs. All of the major
                              browsers on Windows and Mac OS
                              X are vulnerable to the attack.
Because most people keep multiple
tabs open, often for long periods, and
because they trust that the contents
and label of a tab are immutable,
tabnapping could become the next
big thing in identity theft.
What is PHISHING ?
๏ฑ Suppose you check your e-mail one day and
  find a message from your bank. You've
  gotten e-mail from them before, but this one
  seems suspicious, especially since it
  threatens to close your account if you don't
  reply immediately. What do you do ?
๏ฑ
  PHISHING, a method of online identity
  theft. In addition to stealing personal and
  financial data, phishers can infect
  computers with viruses and convince people
  to participate unwittingly in money
  laundering.
๏ฑ
  Most people associate phishing with e-mail
  messages that spoof , or mimic, banks
  , credit card companies or other business
  like Amazon and eBay .
๏ฑ Planning : - Phishers decide which business to target and determine how to get e-
  mail addresses for the customers of that business. They often use the same mass-
  mailing and address collection techniques as spammers.

๏ฑ Setup : - Once they know which business to spoof and who their victims
  are, phishers create methods for delivering the message and collecting the data.
  Most often, this involves e-mail addressesand a Web page.

๏ฑ Attack :- This is the step people are most familiar with -- the phisher sends a phony
  message that appears to be from a reputable source.

๏ฑ Collection :- Phishers record the information victims enter into Web pages or popup
  windows.

๏ฑ Since most people won't reveal their bank account, credit card number or
  password to just anyone, phishers have to take extra steps to trick their victims into
  giving up this information. This kind of deceptive attempt to get information is
  called โ€œ Social - Engineering โ€œ

๏ฑ Phishers often use real company logos and copy legitimate e-mail
  messages, replacing the links with ones that direct the victim to a fraudulent page.
REMOTE ADMINISTRATION TOOLS โ€“ RATโ€Ÿs
   ๏ฑ It provides an attacker with nearly unlimited access to host
     computer along with Screen Capture, File management, shell
     control and device drivers control.
   ๏ฑ RAT is used to remotely connect and manage single or multiple
   computers.




   ๏ฑ RATs uses reverse connections to connect remote system and
     hence are more likely to remain undetected. They can hide and
     Server or Master and Slave.
   ๏ฑ A Trojan generally has two parts Clientaster. So a server side
      is installed on a remote host and the attacker manipulates it
      with client software.
   ๏ฑ In olden days making a Trojan was a job of master programmer
     but now a days several Trojan building tools are available.
โ€œ Whatโ€Ÿs COOKIE โ€“ STEALING ? โ€
๏ฑ Cookies are small files that stored on users computer by
  websites when a user visits them.

๏ฑ The stored Cookies are used by the web server to identify
  and authenticate the user . For example when a user logins
  in Facebook a unique string is generated and one copy of it
  is saved on the server and other is saved on the users
  browser as Cookies, Both are matched every time the user
  does any thing in his account.
๏ฑ
  So if we steal the victims cookie and inject them in our
  browser we will be able to imitate the victims identity to
  the web server and thus we will be able to login is his
  account . This is called as โ€œ Side - Jacking โ€.The best thing
  about this is that we need not no the victims id or password
  all we need is the victims cookie.
How be โ€œSAFE โ€ from Being HACKED โ€ฆ
๏ฑ Always browse sites on a secure https
  connection.Facebook has setting for it.

๏ฑ Always use good and reputed antivirus
  software.If possible use Internet Security
  Suites of those.To stay safe online too.

๏ฑ Use FIREWALLS such as comodo , sygate
  , zone โ€“ alarm , sunbelt.

๏ฑ Never save password on your pc or on
  internet cafรฉโ€™s.

๏ฑ Use a good password manager that secures
  your password lnline and logs in for you
  automatically. Eg. Lastpass

๏ฑ Always clear all private and temp. data using
  a cleaner soft, to leave no traces and remove
  tracking cookies. Eg : ccleaner .
Some Steps in Social Networking which can make you SURF โ€“ SAFLY โ€ฆ
In โ€œ FACEBOOK & GMAIL โ€ Do following settings :




  ๏ฑ Login in to your Account ;

  ๏ฑ Goto settings their click on security tab > their edit >

  ๏ฑ Click onto Browse Facebook on a secure connection (https) when possible.

  ๏ฑ Also check on Login Notifications This makes whenever you Log In it will
    send you an message to your โ€œ Number & Mail โ€œ that your account is being
    logged in by some1 if U are not then take action on it with login details
    given.
REFRENCES : -
 ๏ฑ Paragkosarkar.blogspot.com
 ๏ฑ Desitech.tk
 ๏ฑ Learnhackingathome.com
 ๏ฑ Gprshub.com
 ๏ฑ Indiahax.tk



                                Soโ€ฆ
                                 What You Wanna be ?
                                    HACKER
                                          or
                                    CRACKER
                                  Choice is Your โ€žs !!!
Presented By : -
PARAG S. KOSARKAR

More Related Content

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manish Mudhliyar
ย 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
Akiumi Hasegawa
ย 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
Nicholas Davis
ย 
Password hacking
Password hackingPassword hacking
Password hacking
Abhay pal
ย 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
ย 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
Srikanth VNV
ย 
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
ย 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
Hafizra Mas
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
ย 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
JasminJaman1
ย 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
ย 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
ABHAY PATHAK
ย 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
Amol Deshmukh
ย 
Web defacement
Web defacementWeb defacement
Web defacement
student
ย 
Hackers
HackersHackers
Hackers
Liliya Nachalova
ย 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
ย 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
ย 
internet security
internet securityinternet security
internet security
Cheryl Tanicala-Roldan
ย 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Harshit Upadhyay
ย 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
Akiumi Hasegawa
ย 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
Nicholas Davis
ย 
Password hacking
Password hackingPassword hacking
Password hacking
Abhay pal
ย 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
ย 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
Srikanth VNV
ย 
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
ย 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
Hafizra Mas
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
ย 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
JasminJaman1
ย 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
ABHAY PATHAK
ย 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
Amol Deshmukh
ย 
Web defacement
Web defacementWeb defacement
Web defacement
student
ย 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
ย 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
ย 

Viewers also liked (9)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manas Das
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
shahhardik27
ย 
Erectile Dysfunction Symptoms And Treatment
Erectile Dysfunction Symptoms And TreatmentErectile Dysfunction Symptoms And Treatment
Erectile Dysfunction Symptoms And Treatment
Manas Das
ย 
Hacking
HackingHacking
Hacking
Ranjan Som
ย 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
Sweta Leena Panda
ย 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Neel Kamal
ย 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
ย 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
giridhar_sadasivuni
ย 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manas Das
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
shahhardik27
ย 
Erectile Dysfunction Symptoms And Treatment
Erectile Dysfunction Symptoms And TreatmentErectile Dysfunction Symptoms And Treatment
Erectile Dysfunction Symptoms And Treatment
Manas Das
ย 
Hacking
HackingHacking
Hacking
Ranjan Som
ย 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
Sweta Leena Panda
ย 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Neel Kamal
ย 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
ย 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
ย 

Similar to Parag presentation on ethical hacking (20)

my new HACKING
my new HACKINGmy new HACKING
my new HACKING
BABATUNDE OLANREWAJU GEORGE
ย 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
ย 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
ย 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
Gaurav Mishra
ย 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
aashish2cool4u
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
ย 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
ย 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Prabhat kumar Suman
ย 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
ย 
Ict Hacking
Ict   HackingIct   Hacking
Ict Hacking
Hafizra Mas
ย 
Cyber security and detailed informat.ppt
Cyber security and detailed informat.pptCyber security and detailed informat.ppt
Cyber security and detailed informat.ppt
raga04269
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
ย 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
ย 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
- Mark - Fullbright
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Md Mudassir
ย 
Hacking
HackingHacking
Hacking
blues_mfi
ย 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
AmardeepKumar621436
ย 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Syed Irshad Ali
ย 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
Dan Morrill
ย 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
ย 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
ย 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
Gaurav Mishra
ย 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
aashish2cool4u
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
ย 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
ย 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
ย 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
ย 
Ict Hacking
Ict   HackingIct   Hacking
Ict Hacking
Hafizra Mas
ย 
Cyber security and detailed informat.ppt
Cyber security and detailed informat.pptCyber security and detailed informat.ppt
Cyber security and detailed informat.ppt
raga04269
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
ย 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
ย 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
- Mark - Fullbright
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Md Mudassir
ย 
Hacking
HackingHacking
Hacking
blues_mfi
ย 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
AmardeepKumar621436
ย 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Syed Irshad Ali
ย 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
Dan Morrill
ย 

Recently uploaded (20)

Rock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning JourneyRock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning Journey
Lynda Kane
ย 
"Client Partnership โ€” the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership โ€” the Path to Exponential Growth for Companies Sized 50-5..."Client Partnership โ€” the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership โ€” the Path to Exponential Growth for Companies Sized 50-5...
Fwdays
ย 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
ย 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
ย 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
ย 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
ย 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
ย 
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from AnywhereAutomation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Lynda Kane
ย 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
ย 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
ย 
Buckeye Dreamin' 2023: De-fogging Debug Logs
Buckeye Dreamin' 2023: De-fogging Debug LogsBuckeye Dreamin' 2023: De-fogging Debug Logs
Buckeye Dreamin' 2023: De-fogging Debug Logs
Lynda Kane
ย 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
ย 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
ย 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
ย 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
ย 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
ย 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
ย 
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtBuckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Lynda Kane
ย 
Leading AI Innovation As A Product Manager - Michael Jidael
Leading AI Innovation As A Product Manager - Michael JidaelLeading AI Innovation As A Product Manager - Michael Jidael
Leading AI Innovation As A Product Manager - Michael Jidael
Michael Jidael
ย 
Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.
gregtap1
ย 
Rock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning JourneyRock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning Journey
Lynda Kane
ย 
"Client Partnership โ€” the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership โ€” the Path to Exponential Growth for Companies Sized 50-5..."Client Partnership โ€” the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership โ€” the Path to Exponential Growth for Companies Sized 50-5...
Fwdays
ย 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
ย 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
ย 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
ย 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
ย 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
ย 
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from AnywhereAutomation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Lynda Kane
ย 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
ย 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
ย 
Buckeye Dreamin' 2023: De-fogging Debug Logs
Buckeye Dreamin' 2023: De-fogging Debug LogsBuckeye Dreamin' 2023: De-fogging Debug Logs
Buckeye Dreamin' 2023: De-fogging Debug Logs
Lynda Kane
ย 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
ย 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
ย 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
ย 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
ย 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
ย 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
ย 
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtBuckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Lynda Kane
ย 
Leading AI Innovation As A Product Manager - Michael Jidael
Leading AI Innovation As A Product Manager - Michael JidaelLeading AI Innovation As A Product Manager - Michael Jidael
Leading AI Innovation As A Product Manager - Michael Jidael
Michael Jidael
ย 
Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.
gregtap1
ย 

Parag presentation on ethical hacking

  • 1. Seminar Report on โ€œ ETHICAL โ€“ HACKING โ€ Submitted BY Mr : - โ€œ Parag S. Kosarkar โ€œ Semester / Section โ€œ โ€“ 6 th A Roll No : - 41 23 FEB , 2012 - 13 Department of Computer Technology PART TIME DEGREE PROGRAM YESHWANTRAO CHAVAN COLLEGE OF ENGINEERING, Nagpur (An Autonomous Institution Affiliated to Rashtrasant Tukadoji Maharaj Nagpur University)
  • 3. INTRODUCTION : - ๏ฑ Ethical hacking - also known as penetration testing or intrusion testing or red teaming has become a major concern for businesses and governments. ๏ฑ Companies are worried about the possibility of being โ€œhackedโ€ and potential customers are worried about maintaining control of personal information. ๏ฑ Necessity of computer security professionals to break into the systems of the organisation. ๏ฑ Ethical hackers employ the same tools and techniques as the intruders. ๏ฑ They neither damage the target systems nor steal information. ๏ฑ The tool is not an automated hacker program rather it is an audit that both identifies the vulnerabilities of a system and provide advice on how to eliminate them.
  • 4. FAMOUS HACKERS IN HISTORY : - ๏ถ KEVIN MITNICK ๏ถ IAN MURPHY ๏ถ JOHAN HELSINGUIS ๏ถ MARK ABENE ๏ถ ROBERT MORRIS ๏ถ LINUS TORVALDS
  • 5. = Contents to be Explained : - ๏ฑ SQL Injection ๏ฑ Keylogging ๏ฑ Tabnapping ๏ฑ Phishing ๏ฑ RAT โ€“ Remote Administration Tools or Trojans ๏ฑ Cookie Stealing ๏ฑ What Precautions can be done to Avoid being Hacked ?
  • 6. Comman Phases of Hacking:- An ethical hacker follows processes similar to those of a malicious hacker. The steps to gain and maintain entry into a computer system are similar no matter what the hackerโ€™s intentions are. There are five phases that hackers generally follow in hacking a system. ๏ƒผ Phase 1 โ€“ Recognise System ๏ƒผ Phase 2 โ€“ Scanning Process ๏ƒผ Phase 3 - Gaining Access ๏ƒผ Phase 4 - Maintaining Access ๏ƒผ Phase 5 - Covering Tracks
  • 7. What is Hacking ? ๏ฑ Hacking refers to an array of activities which area done to intrude some one elseโ€™s Personal Information space so as to use it for malicious , unwanted purpose. What is Cracking ? ๏ฑ Cracking is almost the same as hacking because they both get into the peoples server & accounts illegally. ๏ฑ But a cracker destroys the information & software that it gets into, which can cause System Down.
  • 8. Proffesional Criminals or Crackers : - ๏ฑ Make a living by breaking into the systems and selling the information. Hacker & Ethical Hacker : - ๏ฑ Hacker can Access computer system or network information without their permission. ๏ฑ Breaks the LAWS , can go to Prison ! ๏ฑ Ethical Hacker does the same but with the legal permission. ๏ฑ Employed by companies to perform penetration tests. Quick โ€“ Heal Hires Hackers.
  • 9. What you can do Legally ? ๏ฑ As an Ethical hacker , be aware of what is allowed & what is not . ๏ฑ Laws involving technologies are changing according to the Techology changes. ๏ฑ Some hacking tools on your computer might be illegal to possess. IS PORT โ€“ Scanning Legal ? ๏ฑ Government does not see to it as violation. ๏ฑ It is Legal ๏ฑ As noninvasive or non destructible in Nature. ๏ฑ Mostly port 8080 , 80 & 443 are Open
  • 10. What is SQL โ€“ INJECTION ? SQL โ€“ Injection is one of the popular web application hacking method using injection attack, an unauthorized person can access the Database of the website. Attacker can extract the data from Database. What hacker can do with the SQL injection attack ? ๏ฑ ByPassing Logins ๏ฑ Accessing secret data ๏ฑ Modifying content of website ๏ฑ Shutting down the My SQL server ๏ฑ Google Dorking ๏ฑ Example : * inurl:index.php?id= * inurl:galary.php?id=
  • 11. Checking the Vulnerability : - ๏ฑ Now lets us check the vulnerability of Target โ€“ Website to check the vulnerability add the (โ€˜) at the end of the url and hit enter. Eg : - http://www.anywebsite.com/index.php?id=2โ€™ ๏ฑ If the page remains same or do not gives any message saying โ€ฆ โ€œ Error 404 โ€“ page not found then its Ok ! โ€
  • 12. What is a Keylogger? A keylogger is a piece of malicious software, usually called "spyware" or "malware," that records every keystroke you make on a keyboard. Keyloggers can be installed without your knowledge or consent when you visit a Web site or read an e-mail, install a program, or perform other activities. Once installed, the keylogger records all your keystrokes, and then e-mails the information and other data to the computer hacker.
  • 13. How Keyloggers are Constructed : ๏ฑ The main idea behind keyloggers is to get in between any two links in the chain of events between when a key is pressed and when information about that keystroke is displayed on the monitor. ๏ฑ This can be achieved using video surveillance : a hardware bug in the keyboard, wiring or the computer itself; intercepting input/output; substituting the keyboard driver; using a filter driver in the keyboard stack; intercepting kernel functions by any means possible (substituting addresses in system tables, splicing function code, etc.); intercepting DLL functions in user mode, and requesting information from the keyboard using standard documented methods. ๏ฑ Keyloggers can be divided into two categories: keylogging devices and keylogging software. Keyloggers that fall into the first category are usually small devices that can be fixed to the keyboard or placed within a cable or the computer itself. The keylogging software category is made up of dedicated programs designed to track and log keystrokes.
  • 14. KEYLOGGERโ€™S Can Be Spread Using : - ๏ฑ MP3 music files ๏ฑ E-mail attachments ๏ฑ Clicking on deceptive popโ€“ups ๏ฑ P2P networks ๏ฑ AVI files (i.e., "YouTube" or other videos) ๏ฑ A legitimate Web site link, picture, or story that was malfaced ๏ฑ Downloaded games or any other PC tools or programs ๏ฑ Faked malicious Web sites that impersonate popular sites (sites such as Google, eBay, Amazon, Yahoo, banks) or anti-virus programs
  • 15. TABNAPPING ? From the combination of 'tab' and 'kidnapping' - could be used by clever phishers to dupe users into giving up passwords by secretly changing already-open browser tabs. All of the major browsers on Windows and Mac OS X are vulnerable to the attack. Because most people keep multiple tabs open, often for long periods, and because they trust that the contents and label of a tab are immutable, tabnapping could become the next big thing in identity theft.
  • 16. What is PHISHING ? ๏ฑ Suppose you check your e-mail one day and find a message from your bank. You've gotten e-mail from them before, but this one seems suspicious, especially since it threatens to close your account if you don't reply immediately. What do you do ? ๏ฑ PHISHING, a method of online identity theft. In addition to stealing personal and financial data, phishers can infect computers with viruses and convince people to participate unwittingly in money laundering. ๏ฑ Most people associate phishing with e-mail messages that spoof , or mimic, banks , credit card companies or other business like Amazon and eBay .
  • 17. ๏ฑ Planning : - Phishers decide which business to target and determine how to get e- mail addresses for the customers of that business. They often use the same mass- mailing and address collection techniques as spammers. ๏ฑ Setup : - Once they know which business to spoof and who their victims are, phishers create methods for delivering the message and collecting the data. Most often, this involves e-mail addressesand a Web page. ๏ฑ Attack :- This is the step people are most familiar with -- the phisher sends a phony message that appears to be from a reputable source. ๏ฑ Collection :- Phishers record the information victims enter into Web pages or popup windows. ๏ฑ Since most people won't reveal their bank account, credit card number or password to just anyone, phishers have to take extra steps to trick their victims into giving up this information. This kind of deceptive attempt to get information is called โ€œ Social - Engineering โ€œ ๏ฑ Phishers often use real company logos and copy legitimate e-mail messages, replacing the links with ones that direct the victim to a fraudulent page.
  • 18. REMOTE ADMINISTRATION TOOLS โ€“ RATโ€Ÿs ๏ฑ It provides an attacker with nearly unlimited access to host computer along with Screen Capture, File management, shell control and device drivers control. ๏ฑ RAT is used to remotely connect and manage single or multiple computers. ๏ฑ RATs uses reverse connections to connect remote system and hence are more likely to remain undetected. They can hide and Server or Master and Slave. ๏ฑ A Trojan generally has two parts Clientaster. So a server side is installed on a remote host and the attacker manipulates it with client software. ๏ฑ In olden days making a Trojan was a job of master programmer but now a days several Trojan building tools are available.
  • 19. โ€œ Whatโ€Ÿs COOKIE โ€“ STEALING ? โ€
  • 20. ๏ฑ Cookies are small files that stored on users computer by websites when a user visits them. ๏ฑ The stored Cookies are used by the web server to identify and authenticate the user . For example when a user logins in Facebook a unique string is generated and one copy of it is saved on the server and other is saved on the users browser as Cookies, Both are matched every time the user does any thing in his account. ๏ฑ So if we steal the victims cookie and inject them in our browser we will be able to imitate the victims identity to the web server and thus we will be able to login is his account . This is called as โ€œ Side - Jacking โ€.The best thing about this is that we need not no the victims id or password all we need is the victims cookie.
  • 21. How be โ€œSAFE โ€ from Being HACKED โ€ฆ ๏ฑ Always browse sites on a secure https connection.Facebook has setting for it. ๏ฑ Always use good and reputed antivirus software.If possible use Internet Security Suites of those.To stay safe online too. ๏ฑ Use FIREWALLS such as comodo , sygate , zone โ€“ alarm , sunbelt. ๏ฑ Never save password on your pc or on internet cafรฉโ€™s. ๏ฑ Use a good password manager that secures your password lnline and logs in for you automatically. Eg. Lastpass ๏ฑ Always clear all private and temp. data using a cleaner soft, to leave no traces and remove tracking cookies. Eg : ccleaner .
  • 22. Some Steps in Social Networking which can make you SURF โ€“ SAFLY โ€ฆ In โ€œ FACEBOOK & GMAIL โ€ Do following settings : ๏ฑ Login in to your Account ; ๏ฑ Goto settings their click on security tab > their edit > ๏ฑ Click onto Browse Facebook on a secure connection (https) when possible. ๏ฑ Also check on Login Notifications This makes whenever you Log In it will send you an message to your โ€œ Number & Mail โ€œ that your account is being logged in by some1 if U are not then take action on it with login details given.
  • 23. REFRENCES : - ๏ฑ Paragkosarkar.blogspot.com ๏ฑ Desitech.tk ๏ฑ Learnhackingathome.com ๏ฑ Gprshub.com ๏ฑ Indiahax.tk Soโ€ฆ What You Wanna be ? HACKER or CRACKER Choice is Your โ€žs !!!
  • 24. Presented By : - PARAG S. KOSARKAR