Professional Documents
Culture Documents
Ethical Hacking
Ethical Hacking
Ethical Hacking
Md . Haseeb furkhan
Contents - Hacking
Hacking?
Who is Hacker?
History of Hacking
Hacking incidents
Types of Hacking
How do Hackers Hack?
Why do Hackers Hack?
What Hackers do after Hacking?
How to be a real Hacker?
HACKING
What Hack actually mean???
Hack definition:
1) an article or project without
constructive end
2) work undertaken on bad self-advice
3)Examine something very minutely
Who is hacker?
Hacker
– System intruder/destroyer
History of hacking
Telephone hacking
– Use telephone freely
– It’s called phreaking
Computer virus
– Destroy many computers
Network hacking
– Hack the important server remotely and
destroy/modify/disclose the information
Hacking incidents
Internet Worm
– Robert T. Morris made an internet worm. It
spread through the internet and crashed
about 6000 systems.
Indian Defense Server
– Recent hacking of Defense top secrets by
CHINEESE
And many more…..
Types of hacking
Normal
data transfer
U S S-Server H-Hacker U-User
Interruption Interception
U S U S
Modification Fabrication
U S U S
H H
How Hackers Hack?
E-mail Hacking
– Email forgery , Password Cracking, Phishing
System Hacking
– Key loggers , Trojans, Backdoors , viruses
Wireless Hacking
– WLAN hacking , network hacking
Web Server Hacking
– Hacking websites , servers , databases etc
Why do hackers hack?
Completely trustworthy.
Strong programming and computer
networking skills.
Techniques of Criminal hackers-
Detection-Prevention.
Ethical hackers possesses same skills,
mindset and tools of a hacker but the
attacks are done in a non-destructive
manner
Black-hat – Hackers White-hat – Ethical Hackers
Why Ethical Hacking???
Why Ethical Hacking??
Defacement Statistics for Indian Websites
June 01, 2006 to Dec.31, 2006
Domains No of Defacements
.com 922
.gov.in 24
.org 53
.net 39
.biz 12
.co.in 48
.ac.in 13
.info 3
.nic.in 2
.edu 2
other 13
Total 1131
Why can’t we be protect against
hacking?
There are many unknown security hole
Hackers need to know only one security
hole to hack the system
Admin need to know all security holes to
defend the system
How Ethical Hackers defend???