ethical hacking n vapt presentation by suvrat jain

25
ETHICAL HACKING A LICENCE TO HACK Suvrat Jain 11042 CSE, 3 rd year

Upload: suvrat-jain

Post on 16-Nov-2014

1.033 views

Category:

Education


11 download

DESCRIPTION

a perfect example of your 6 weeks summer training ppt. Course-Ethical Hacking , its info and VAPT- Vulnerability Assessment n Penetration testing. about how vulnerability scanning , tools used , cracking password , etc.

TRANSCRIPT

Page 1: Ethical Hacking n VAPT presentation by Suvrat jain

ETHICAL HACKINGA LICENCE TO HACK

Suvrat Jain11042

CSE, 3rd year

Page 2: Ethical Hacking n VAPT presentation by Suvrat jain

What is hacking ?

• Computer hacking is when someone modifies computer hardware or software in a way that alters the creator's original intent.

What is Ethical Hacking ?

• Ethical hacking is when person breaches the security with authorization for the purpose of finding loopholes(security issues).

Page 3: Ethical Hacking n VAPT presentation by Suvrat jain

Ty p e s o f h a c ke rs

Page 4: Ethical Hacking n VAPT presentation by Suvrat jain

Types of hacker

• White Hat Hackers:– who specializes in penetration testing and in other testing

methodologies to ensure the security of an organization's information systems.

• Black Hat Hackers:– A black hat is the villain or bad guy, especially in a western movie

in which such a character would stereotypically wear a black hat in contrast to the hero's white hat.

• Gray Hat Hackers:– A grey hat, in the hacking community, refers to a skilled hacker

whose activities fall somewhere between white and black hat hackers on a variety of spectra

Page 5: Ethical Hacking n VAPT presentation by Suvrat jain

What is information security Information security means protecting information and

information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

Term Information Security follows CIA

Confidentiality Integrity Availability

Page 6: Ethical Hacking n VAPT presentation by Suvrat jain

Confidentiality : Assurance that the information is accessible only to those authorized to have access.

Confidentiality breaches may occur due to improper data handling or a hacking attempt.

Integrity : The data or resources in term of preventing improper and unauthorized changes. Assurance that

Information can be relied upon to be sufficiently accurate for its purpose.

Availability : Assurance that the systems responsible for delivering storing , and processing Information are

accessible when required by the authorized users.

Page 7: Ethical Hacking n VAPT presentation by Suvrat jain

Threat – An action or event which is a potential challenge to Security.

Vulnerability – It is the existence of a Flaw or Error in the Design of the System which can cause undesired results ranging from Compromise of System Security to Service or System Unavailability.

Attack – An action which attempts to violate or challenge the Integrity or Security of a System.

Exploit – A defined way to breach the security of a System or Product using an identified vulnerability.

Essential Terminology's

Page 8: Ethical Hacking n VAPT presentation by Suvrat jain

Identifying Vulnerabilities

• Identifying vulnerabilities through a vulnerability appraisal– Determines the current security weaknesses that

could expose assets to threats• Two categories of software and hardware

tools– Vulnerability scanning– Penetration testing

Page 9: Ethical Hacking n VAPT presentation by Suvrat jain

Vulnerability Scanning

• Vulnerability scanning is typically used by an organization to identify weaknesses in the system– That need to be addressed in order to increase the

level of security• Tools include port scanners, network scanner,

protocol analyzers, vulnerability scanners, the Open Vulnerability and Assessment Language, and password crackers

Page 10: Ethical Hacking n VAPT presentation by Suvrat jain

IP Addresses and Ports

Internet protocol (IP) addressesThe primary form of address identification on a TCP/IP

networkUsed to uniquely identify each network device

Port numberTCP/IP uses a numeric value as an identifier to

applications and services on the systems Each datagram (packet) contains not only the

source and destination IP addressesBut also the source port and destination port

Page 11: Ethical Hacking n VAPT presentation by Suvrat jain

TCP/IP Ports

Page 12: Ethical Hacking n VAPT presentation by Suvrat jain

Port Scanners

Port scannerSends probes to interesting ports on a target

systemDetermines the state of a port to know what

applications are running and could be exploited Three port states:

Open, closed, and blocked

Page 13: Ethical Hacking n VAPT presentation by Suvrat jain
Page 14: Ethical Hacking n VAPT presentation by Suvrat jain

Network Scanner

Software tools that can identify all the systems connected to a network

Most network mappers utilize the TCP/IP protocol ICMP

Internet Control Message Protocol (ICMP)Used by PING to identify devicesLess useful for modern versions of Windows

Page 15: Ethical Hacking n VAPT presentation by Suvrat jain

Network Scanner (continued)

Page 16: Ethical Hacking n VAPT presentation by Suvrat jain

Protocol Analyzers

• Also called a sniffer– Captures each packet to decode and analyze its

contents– Can fully decode application-layer network

protocols• Common uses include:– Network troubleshooting– Network traffic characterization– Security analysis

Page 17: Ethical Hacking n VAPT presentation by Suvrat jain
Page 18: Ethical Hacking n VAPT presentation by Suvrat jain

Vulnerability Scanners

Products that look for vulnerabilities in networks or systemsHelp network administrators find security problems

Most vulnerability scanners maintain a database that categorizes and describes the vulnerabilities that it can detect

Other types of vulnerability scanners combine the features of a port scanner and network mapper

Page 19: Ethical Hacking n VAPT presentation by Suvrat jain
Page 20: Ethical Hacking n VAPT presentation by Suvrat jain

Password Crackers Password

A secret combination of letters and numbers that only the user knows

Because passwords are common yet provide weak security, they are a frequent focus of attacks

Password cracker programs Use the file of hashed passwords and then attempts to

break the hashed passwords offline The most common offline password cracker programs

are based on dictionary attacks or rainbow tables

Page 21: Ethical Hacking n VAPT presentation by Suvrat jain
Page 22: Ethical Hacking n VAPT presentation by Suvrat jain

Shadow File

A defense against password cracker programs for UNIX and Linux systems

On a system without a shadow fiileThe passwd file that contains the hashed

passwords and other user information is visible to all users

The shadow file can only be accessed at the highest level and contains only the hashed passwords

Page 23: Ethical Hacking n VAPT presentation by Suvrat jain

Penetration Testing

• Method of evaluating the security of a computer system or network– By simulating a malicious attack instead of just

scanning for vulnerabilities– Involves a more active analysis of a system for

vulnerabilities• One of the first tools that was widely used for

penetration testing as well as by attackers was SATAN

Page 24: Ethical Hacking n VAPT presentation by Suvrat jain

SATAN SATAN could improve the security of a network by

performing penetration testing To determine the strength of the security for the

network and what vulnerabilities may still have existed SATAN would:

Recognize several common networking-related security problems

Report the problems without actually exploiting them Offer a tutorial that explained the problem, what its

impact could be, and how to resolve the problem

Page 25: Ethical Hacking n VAPT presentation by Suvrat jain