Ethical Hacking: A License To Hack

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 24

ETHICAL HACKING

A License to Hack

Kopal Trivedi
CS-III year
0809013043
INTRODUCTION
 The explosive growth of the Internet has brought many
good things…As with most technological advances, there
is also a dark side same is the case with internet:
CRIMINAL HACKING.
 Ethical Hacking- It is the testing of resources for a good
cause and for the betterment of technology.
 Ethical hacking- also known as penetration testing or
intrusion testing or red teaming and it focuses on
Securing and protecting IT systems.
 In this type of hacking independent computer security
Professionals break into the computer systems.
INTRODUCTION (contd.)
 Ethical hackers neither damage the target system nor
steal any information.
 Ethical hacking can be defined as “a methodology
adopted by ethical hackers to discover the vulnerabilities
existing in information systems’ operating environments.”
 Ethical hackers employ the same tools and techniques as
the intruders.
Who are ETHICAL HACKERS ?

 An ethical hacker is a person who has a good knowledge


of computers specially in terms of coding and networking.
 The skills that an Ethical Hacker should posses are:
 COMPLETELY TRUSTWORTHY.
 Should have very strong programming and
computer networking skills and have been in
NETWORKING field for several years.
TYPES OF ETHICAL HACKERS

 White Hat Hacker- He is the one who performs


ethical hacking, usually a security professional.
 Black Hat Hacker- He is the one who performs
UNETHICAL Hacking.
 Grey Hat Hacker- He is the computer guy who
sometimes act illegally, sometimes in goodwill,
and sometimes for monetary gains.
Types of Ethical Hacking

 E-MAIL
HACKING
 SYSTEM
HACKING
 NETWORK
HACKING
 WIRELESS
HACKING
E-MAIL HACKING
E-MAIL TRAVEL PATH
E-MAIL HACKING (contd.)

 E-mail hacking
includes-
 Sending a fake e-
mail
 E-mail password
Hacking
 Phishing
SYSTEM HACKING
System Hacking (contd.)
System Hacking (contd.)
 It includes:
 Live Boot Disk Attack
 Brute Force Attack
 Privilege Escalation
 Counter Measures For System Hacking

a) Configuring a Strong Login Password


b) Steganography
System Hacking (contd.)
 Steganography– It is the technique to place text content
behind the images.
 Windows internal command as well as Steganography
tools “IMAGE HIDE” can be used to perform this
technique.
 If the image file is “Pic.jpg” and text file is
“Message.text”, then the command to hide the message
would be : Copy/b Pic.jpg+Message.txt Final.jpg
 To view the hidden message “right click on
Final.jpg>Open with Notepad>Go to the end of the file”.
NETWORK HACKING
Network Hacking (contd.)

 It includes:

 SNIFFING

 ARP POISONING
Network Hacking (contd.)
WIRELESS HACKING
Wireless Hacking (contd.)
 Basic Terminologies used in Wireless Hacking
are :
 Access Point
 SSID
 BSSID
 Channel
 Power
Wireless Hacking (contd.)

 It includes :
 WAR DRIVING
a).Active War Driving
b).Passive War Driving
How to apply Wireless Security ?

 Hide the Wireless Network


 Use a WEP key
 Wi-fi protected Access
 Mac filtering
 Choosing the Best key.
CONCLUSION
 Never underestimate the attacker or overestimate
our existing posture.
 A company may be target not just for its
information but potentially for its various
transactions.
 To protect against an attack, understanding where
the systems are vulnerable is necessary.
 Ethical hacking helps companies first comprehend
their risk and then, manage them.
Conclusion (contd.)

 Always remember that security professionals are


one step behind the hackers and crackers.
 Plan for the unplanned attacks.
 The role of ethical hacking in security is to
provide customers with awareness of how they
could be attacked and why they are targeted.
“Security though a pain”, is necessary.
QUERIES

You might also like