Professional Documents
Culture Documents
Ethical Hacking: A License To Hack
Ethical Hacking: A License To Hack
Ethical Hacking: A License To Hack
A License to Hack
Kopal Trivedi
CS-III year
0809013043
INTRODUCTION
The explosive growth of the Internet has brought many
good things…As with most technological advances, there
is also a dark side same is the case with internet:
CRIMINAL HACKING.
Ethical Hacking- It is the testing of resources for a good
cause and for the betterment of technology.
Ethical hacking- also known as penetration testing or
intrusion testing or red teaming and it focuses on
Securing and protecting IT systems.
In this type of hacking independent computer security
Professionals break into the computer systems.
INTRODUCTION (contd.)
Ethical hackers neither damage the target system nor
steal any information.
Ethical hacking can be defined as “a methodology
adopted by ethical hackers to discover the vulnerabilities
existing in information systems’ operating environments.”
Ethical hackers employ the same tools and techniques as
the intruders.
Who are ETHICAL HACKERS ?
E-MAIL
HACKING
SYSTEM
HACKING
NETWORK
HACKING
WIRELESS
HACKING
E-MAIL HACKING
E-MAIL TRAVEL PATH
E-MAIL HACKING (contd.)
E-mail hacking
includes-
Sending a fake e-
mail
E-mail password
Hacking
Phishing
SYSTEM HACKING
System Hacking (contd.)
System Hacking (contd.)
It includes:
Live Boot Disk Attack
Brute Force Attack
Privilege Escalation
Counter Measures For System Hacking
It includes:
SNIFFING
ARP POISONING
Network Hacking (contd.)
WIRELESS HACKING
Wireless Hacking (contd.)
Basic Terminologies used in Wireless Hacking
are :
Access Point
SSID
BSSID
Channel
Power
Wireless Hacking (contd.)
It includes :
WAR DRIVING
a).Active War Driving
b).Passive War Driving
How to apply Wireless Security ?