Professional Documents
Culture Documents
Ethical Hacking
Ethical Hacking
Ethical Hacking
Presented By:
Al Hassane BAH
Content
What is Hacking?
Ethical Hacking
Phase of Hacking.
Why do We need Ethical Hacking
Phase of Hacking
Vulnerability Assessment.
Vulnerability Assessment Process.
Vulnerability scanning Tool.
What is Hacking?
Hacking is the process of identifying and exploiting weakness in a
system or a network to gain unauthorized access to data and system
resources
It focuses on stimulating
techniques used by attackers to verify the
existence of exploitable
vulnerabilities in the system.
Why do We need Ethical Hacking..
Phase of Hacking
Reconnaissa
nce
Clearing
Scanning
Tracks
Maintaining Gaining
Access Access
Hacking Phase: Reconnaissance
Gaining access refers to the point where the attackers obtains access
to the operating system or applications on the computer or network.
The Attackers can escalate privileges to obtain complete control of
the system. In the process, intermediate systems that are connected
to it are also compromised.
The attacker can gain access at the operating system level,
application level, or network level.
Example include password cracking, buffer overflows, denial of
service, session hijacking etc.
Hacking Phase: Maintaining Access
Nmap is a network scanner, monitor host and discover all the IP which is
connected to network.
Nmap can be used to:
Create a complete network map.
Find remote IP addresses of hosts.
Detect open ports.
Audit server security standards.
It is well documented you can find
everything using command.
Nmap run on major computer operating system and binary package
available
for windows, Linux, Mac O S etc
Penetration Testing
Penetration testing is the process of hacking a system with the
permission from the owner of that system, to evaluate security, Hack
value, attacks, exploits, zero-day vulnerability and other components
such as threats, vulnerabilities and daisy chaining.
Thank Yo u …