muzafar mohil p.p.muxi

24
ETHICAL HACKING BY :- Muzafar Ali Mohil dept:- (Bscs)

Upload: dom-mike

Post on 27-May-2015

31 views

Category:

Engineering


2 download

TRANSCRIPT

Page 1: Muzafar mohil p.p.muxi

ETHICAL HACKING

BY :- Muzafar Ali Mohil

dept:- (Bscs)

Page 2: Muzafar mohil p.p.muxi
Page 3: Muzafar mohil p.p.muxi

HACKER

Page 4: Muzafar mohil p.p.muxi

CONTENT

Overview of Hacking Why do hackers hack? Types of Hacker Level of Hackers Hackers language Ethical Hacking – Process How can protect the system? What should do after hacked? Final words

Page 5: Muzafar mohil p.p.muxi

OVERVIEW OF HACKING

It is Legal

Permission is obtained from the target

Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner

Also Called – Attack & Penetration Testing.

Page 6: Muzafar mohil p.p.muxi

HACKING VS CRACKING

Hacker The person who hack

Cracker System intruder/destroyer

HACKING WITH MALICIOUS INTENTION IS CRACKING

The basic difference is hackers do not do anything disastrous.

Cracking yield more devastating results.

Cracking is crime. Cyber crime are the results of cracking ,not hacking

Page 7: Muzafar mohil p.p.muxi

THE GREAT HACKER WAR

Kevin Mitnick The most famous, and undoubtedly most gifted hacker in history, made a name for himself in 1981 at the tender age of 17 by getting into a phone exchange, which allowed him to redirect subscriber calls in any way he wanted. In 1983, he achieved his first major coup - and also his first arrest - when he accessed a Pentagon computer. It was his repeated offenses that made him a target of the FBI. He was sentenced to five years in prison in the 1990s, but today he is a security consultant and owns his own company: Mitnick Security.

John Draper known as "Cap'n Crunch", Draper was one of the first hackers in history. This moniker comes from the cereal of the same name, inside of which he once discovered a toy whistle (provided as a gift to entice children to ask parents for the cereal). He discovered that he could use the whistle to hack a telephone line and get free phone calls - all that was necessary was to produce a precise tone in the receiver for the method to work. He was arrested in 1976 and sentenced to two months in prison.

Page 8: Muzafar mohil p.p.muxi

Why do people hack??

To make security stronger ( Ethical Hacking )

Just for fun

Show off

Hack other systems secretly & Steal important information

Page 9: Muzafar mohil p.p.muxi

What are the various qualities a hacker should

posses Good coder

well knowledgeable person both hard ware as well as soft ware

Should have knowledge on security system

Trusted person

Page 10: Muzafar mohil p.p.muxi

Types of hacker

Page 11: Muzafar mohil p.p.muxi
Page 12: Muzafar mohil p.p.muxi

Hackers language

1 -> i or l3 -> e4 -> a 7 -> t9 -> g0 -> o$ -> s| -> i or

|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x

Page 13: Muzafar mohil p.p.muxi

Hackers language translation

EXAMPLE:- Hacking is good

H4ck||\|g 1$ 900d

Page 14: Muzafar mohil p.p.muxi

Hacking - Process

Foot Printing

Scanning

Gaining Access

Maintaining Access

Page 15: Muzafar mohil p.p.muxi

Foot Printing

Whois Lookup

NS lookup

IP Lookup

Page 16: Muzafar mohil p.p.muxi

Scanning

Port scanning

Network scanning

Finger Printing

Fire walking

Page 17: Muzafar mohil p.p.muxi

Gaining access

Password Attacks

Social Engineering

Viruses

Page 18: Muzafar mohil p.p.muxi

Maintaining access

Os BackDoors

Trojans

Clearing tracks

Page 19: Muzafar mohil p.p.muxi

Advantages & Disadvantages

Advantages Provides security to banking and financial establishments

Prevents website defacements An evolving technique To catch a thief you have to think like a thief

Disadvantages All depends upon the trustworthiness of the ethical hacker

Hiring professionals is expensive.

Page 20: Muzafar mohil p.p.muxi

How can we protect the system?

Patch security hole often Encrypt important data

Ex) pgp, ssh Remove unused program Setup loghost

Backup the system often Setup firewall Setup IDS

Ex) snort

Page 21: Muzafar mohil p.p.muxi

What should do after hacked?

Shutdown the system Or turn off the system

Separate the system from network Restore the system with the backup

Or reinstall all programs Connect the system to the network

Page 22: Muzafar mohil p.p.muxi

H4cking prone areas

Page 23: Muzafar mohil p.p.muxi

Hacking GROWTH RATE

It is clear from the graph it is increasing day by day.

Page 24: Muzafar mohil p.p.muxi

THANK YOU