ethical hacking introduction

25
Ethical Hacking Part 1 - BASICS Maulik Kotak (ROCKHACK)

Upload: maulik-kotak

Post on 13-Apr-2017

2.262 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Ethical Hacking Introduction

Ethical Hacking Part 1 - BASICS

Maulik Kotak(ROCKHACK)

Page 2: Ethical Hacking Introduction

./whoami

0 If You want to Hack some one First Hack Your self.

0 I am NOT a Hacker Just Learning for Security analyst.

Page 3: Ethical Hacking Introduction

ETHICAL HACKING

Page 4: Ethical Hacking Introduction

HACKING

Hacking is unauthorized use of computer and network resources.

According to Computer Crime Research Center: “It is act of gaining access without legal authorization to computer or computer network.”

Page 5: Ethical Hacking Introduction

Hacker

0Someone who tries to break into computer systems for any illegal purpose.

0Someone who maliciously breaks into systems for personal gain. These are criminals.

Page 6: Ethical Hacking Introduction

TYPES OF HACKERS

Black hat hacker. White hat hacker. Gray hat hacker.

Page 7: Ethical Hacking Introduction

Black Hat 0They use their knowledge and skill set for illegal0activities, destructive intents.0E.g.-to gain money (online robbery), to take revenge.0Disgruntled0Employees is the best example of Black Hats.

Attackers0 (Black Hat Hackers) are not at all concerned with

security0professionals (WhiteHathackers). Actually these

hackers Are Bad Guys!!!

Page 8: Ethical Hacking Introduction

White Hat

0They use their knowledge and skill set for0good, constructive intents. They find out new security0 loopholes and their solutions.0E.g.-Cyber Security Peoples (FBI , NYPD, US-Homeland

Security Breach)

Page 9: Ethical Hacking Introduction

Gray Hat

0 Individuals who works both offensively and0defensively at various times0E.g.-Third Party Security Testing in IT sectors

Page 10: Ethical Hacking Introduction

BLACK HAT

HACKER

WHITE HAT

HACKER

GRAYHAT

HACKER

Page 11: Ethical Hacking Introduction

WHY DO PEOPLE HACK??

0To Make a Security Stronger.

0 Just For Fun.

0Show Off

0Hack Other System Secretly and steal Important information.

Page 12: Ethical Hacking Introduction

WHAT ARE THE VARIOUS QUALITIES A HACKER SHOULD POSSES

0Good coder.

0Well Knowledge about hardware and Software.

0Should have knowledge on security System.

Page 13: Ethical Hacking Introduction

What is ethical hacking ?

0Ethical hacking ,also known as penetration testing or white-hat hacking involves the same tools, tricks, and techniques that hackers use, i.e., by duplicating the intent and actions of malicious hackers.

0Ethical hacking is performed with the target’s permission.

Page 14: Ethical Hacking Introduction

An Ethical Hacker, also known as a white hat hacker, or simply a white hat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy.They have strong programming and computer networking v skills.Continuous updating of their knowledge on computer and network security is required.They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.

Who are Ethical Hackers?

Page 15: Ethical Hacking Introduction

Ethical Hacker StrategiesAn Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy.They have strong programming and computer networking skills.They should have more patience.Continuous updating of their knowledge on computer and network security is required.They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.

Page 16: Ethical Hacking Introduction

1. Foot printing2. Scanning3. Gaining Access4. Maintaining Access

ETHICAL HACKING PROCESS

Page 17: Ethical Hacking Introduction

FOOT PRINTING

1. Who is Lookup

2. Ns Lookup

3. IP Lookup

Page 18: Ethical Hacking Introduction

SCANNING

1. Port Scanning

2. Network Scanning

3. Finger Printing

Page 19: Ethical Hacking Introduction

SCANNING

Page 20: Ethical Hacking Introduction

GAINING ACCESS

0Password attack

0Social Engineering.

0 Virus

Page 21: Ethical Hacking Introduction

MAINTAINING ACCESS

1. OS backdoors

2. Trojan

3. Clearing Track

Page 22: Ethical Hacking Introduction

HACKING GROWTH RATEIt is clear from the graph it is increasing day by day.

Page 23: Ethical Hacking Introduction

ADVANTAGES

These are good hackers.

Have genuine license to hack. Generally owned by companies for security designing.

Provides security to banking and financial establishments. 

Page 24: Ethical Hacking Introduction

Conclusions

Always security professionals are one step behind the hackers and crackers.

Plan for the unplanned attacks.

The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.

Page 25: Ethical Hacking Introduction

THANK YOU !! For Regarding any question contact me !!

http://www.maulikkotak.webnode.comhttp://www.facebook.com/maulikkotakstar

http://www.twitter.com/maulikkotakstar