ec council

Upload: ashwin-reji

Post on 06-Apr-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Ec Council

    1/22

  • 8/3/2019 Ec Council

    2/22

    Are Your Students Ready To Play

    The (Ethical) Hacking Game?

  • 8/3/2019 Ec Council

    3/22

    Problem Definition

    Why Security?

    Direct impact of security breach oncorporate asset base and goodwill

    Increasing complexity of computer infrastructure administration andmanagement

    Copyright by EC-Council

    All rights reserved. Reproduction is strictly prohibited.

  • 8/3/2019 Ec Council

    4/22

    Hacking - For Good

    Who are they?

    White Hat hackers.

    Computer and network experts who possess a variety of

    knowledge and skills concerning the web, network and

    operating systems, programming, and physical security.Abide by ethical principles which prevent them from abusing

    computer systems.

    Trusted individuals with strict confidentiality policies.

  • 8/3/2019 Ec Council

    5/22

  • 8/3/2019 Ec Council

    6/22

    What is Hacking?

    Unauthorized use of computer and network resources.

    Hacker originally meant a very gifted programmer.

    Hacking is a felony in the US and most other countries.

    When it is done by request and under a contract between anethical hacker and an organization, it is OK

    The difference is that the ethical hacker has authorization to

    probe the target.

  • 8/3/2019 Ec Council

    7/22

    Hacking - For Good

    Ethical Hacking

    The Best Defense Is A Good Offense.

    Performed for the sake of enhancing the performance of a deviceor exposing the vulnerabilities of a security system for the benefitof the system administrator.

    Penetration Testing- analysis and probe of system for purpose oftargeting flaws and weaknesses that could be hacked and exploitedby a malicious hacker (Black Hat hackers).

    - Old/unpatched software. - Poor configuration of

    - Disabled or faulty security Web servers.

    systems.

  • 8/3/2019 Ec Council

    8/22

    Hackers - For good

    Who uses them?

    Increasingly, companies of all types and sizes arehiring security experts to act like the enemy.

    Some companies have departments dedicated to ethicalhacking:

    IBM

    Microsoft

  • 8/3/2019 Ec Council

    9/22

    Hacktivism

  • 8/3/2019 Ec Council

    10/22

    Why Information Security is Important

    > Information Security Job Roles/Responsibilities.> Front Line (Receptionist, secretaries, Information Workers, HR,

    Accounting, Non-IT personnel)

    > Responsibilities Protect Corporate information

    > Vulnerable to Social Engineering attacks leaking sensitive

    information, or portions of the big Picture allowing attackers to gain

    access. Computer Virus/Worms/Trojans, Etc.

    > 1st Level IT, Help Desk, Support Specialists, Network

    Administrators.

    > Responsibilities Adhere to Security/General IT Policy. Standard

    Configurations and supporting roles to superiors, internal and

    external clients.> Vulnerable to Social Engineering, Mis-configurations, Commonmistakes exposing serious vulnerability

  • 8/3/2019 Ec Council

    11/22

    Now, Its time to play!

    EC-Council

    Here comes the part you all came for

  • 8/3/2019 Ec Council

    12/22

    Copyright by EC-CouncilAll rights reserved. Reproduction is strictly prohibited.

  • 8/3/2019 Ec Council

    13/22

    E

    CC Fulfills the Need Ethical Hacking and Countermeasures

    (C|EH)

    CEH understand tools and techniques used

    Attack tools by those outside the network

    Compromise tools by those inside the network

    Thinking like a hacker

    Copyright by EC-CouncilAll rights reserved. Reproduction is strictly prohibited.

  • 8/3/2019 Ec Council

    14/22

    Ec-Council

    Certified Ethical Hacker

    www.eccouncil.org

    ISBN 0-9729362-1-1

  • 8/3/2019 Ec Council

    15/22

    E

    CC Fulfills the Need Ethical Hacking and Countermeasures

    (C|EH)

    CEH understand tools and techniques used

    Attack tools by those outside the network

    Compromise tools by those inside the network

    Thinking like a hacker

    Copyright by EC-CouncilAll rights reserved. Reproduction is strictly prohibited.

  • 8/3/2019 Ec Council

    16/22

    PING

  • 8/3/2019 Ec Council

    17/22

    Keylogger

  • 8/3/2019 Ec Council

    18/22

    Hacking Tools: Web Based Password Cracking

  • 8/3/2019 Ec Council

    19/22

    Scanning

    Objective

    Bulk target assessment and identification of listing

    services focuses the attention on the most

    promising avenues of entry

    Techniques

    Ping sweep

    TCP/UDP port scan

    OS Detection

  • 8/3/2019 Ec Council

    20/22

    www.archive.org (contd)

    Copyright by EC-CouncilAll rights reserved. Reproduction is strictly prohibited.

  • 8/3/2019 Ec Council

    21/22

  • 8/3/2019 Ec Council

    22/22

    INTER-NETWORKZ 04812562777

    CAREER ADVISOR - +91-9946587888

    E- mail: [email protected]

    www.inter-networkz.com