ETHICAL HACKING.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Friendly hacking Penetration testing vs. hacking Kamil Golombek Tel
UNIT 20 The ex-hacker.
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
CS682- Network Management and Security Prof. Katz.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Rootkit Definition A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a.
Computer Security and Penetration Testing
System Security Scanning and Discovery Chapter 14.
Prepared by: Nahed Al-Salah
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
1 Telstra in Confidence Managing Security for our Mobile Technology.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Computer Security and Penetration Testing
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Information Systems Security Computer System Life Cycle Security.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan.
Topic 5: Basic Security.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Computer Security By Duncan Hall.
Joseph Owen.  Aims:  To look at types of hackers  To look at different types of attacks  How to protect your network  Objectives  You will know.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Black + White = Grey Ethical Issues Surrounding the Creation and Distribution of Hacker Tools Used in Distributed Denial of Service Attacks Joseph Levine.
Exploitation Development and Implementation PRESENTER: BRADLEY GREEN.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Filip Chytrý Everyone of you in here can help us improve online security....
Securing Interconnect Networks By: Bryan Roberts.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Network security Vlasov Illia
Topic 5 Penetration Testing 滲透測試
Seminar On Ethical Hacking Submitted To: Submitted By:
Ethical Hacking By: Erin Noonan.
CompTIA Security+ SY0-401 Real Exam Question Answer
Security Standard: “reasonable security”
Secure Software Confidentiality Integrity Data Security Authentication
Answer the questions to reveal the blocks and guess the picture.
Ethical hacking
Year 10 ICT ECDL/ICDL IT Security.
Teaching Computing to GCSE
John Butters Running Tiger Teams
Ethical Hacking.
Test 3 review FTP & Cybersecurity
Presentation transcript:

ETHICAL HACKING

PRESENTED By : Sarjerao Mengane

CONTENT INTRODUCTION METHODOLOGY REPORTING HISTORY CONCLUSION TYPES OF HACKERS ETHICAL HACKING ADVANTAGES AND DISADVANTAGES HACKING CONCLUSION ETHICAL HACKING COMMANDMENTS REFERENCE

INTRODUCTION Ethical hacking also known as penetration testing or White-hat hacking, involves the same tools, tricks and techniques that hackers use, but with one major difference that ethical hacking is legal. Ethical hacking can also ensure that vendors claims about the security of their products legitimate.

SECURITY Need for security Security is the condition of being protect against danger or loss. In the general sense, security is a concept similar to safety. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruc- tion. Need for security There may be several forms of damages which are obviously interrelated which are produced by the intruders.

HISTORY HIGHLIGHTS In one early ethical hack, the United States Air Force conducted a “security evaluation” of the Multiuse operating systems for “potential use as a two-level (secret/top secret) systems.” Most notable of these was the work by Farmer and Venom, which was originally posted to Usenet in December of 1993.

HACKING Eric Raymond, compiler of “The New Hacker’s Dictionary”, defines a hacker as a clever programmer. A “Good hack” is a clever solution to a programming problem and “hacking” is the act of doing it.

TYPE OF HACKERS Black-Hat Hackers- -----Ethical Hacker White-Hat Hackers -----Cracker Grey-Hat Hackers ----- Skilled Hacker

ETHICAL HACKING A methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems operating environments. With the growth of the internet, computer security has become a Major concern for businesses and govern- ments. Evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.

Required Skills of an Ethical Hacker : Microsoft : Linux : Firewalls : Routers : Network Protocols : Project Management :

Reconnaissance: Scanning: This literal meaning of the Word reconnaissance means a preliminary survey to gain the information . This is also known as foot-printing. As given in the analogy, this is the stage in which the hacker collects information about the company which the personal is going to hack. This is one of the pre-attacking phases. Scanning: The hacker tries to make a blue print of the target network. The blue print includes the IP addresses of the target network which are live, the services which are running on those systems and so on Modern port scanning uses TCP protocol to do scanning and they could even detect the operating systems running on the particular hosts.

Password Cracking: Privilege escalation There are many methods for cracking the password and then get in to the system. The simplest method is to guess the password. But this is a tedious work. But in order to make this work easier there are many automated tools for password guessing like legion. Privilege escalation Privilege escalation is the process of raising the privileges once the hacker gets in to the system The privilege escalation process usually uses the vulnerabilities present in the host operating system or the software. There are many tools like hk.exe, metasploit etc. One such community of hackers is the metasploit

Ethical hacking tools: Ethical hackers utilize and have developed variety of tools intrude into different kinds of systems and to evaluate the security levels. The nature of these tools differs widely.

Certifications 1)CISE(Cetified into security expert) 2) AFCEH(Ankit Fadia Certified Ethical Hacker)

Advantages and disadvantages: Ethical hacking nowadays is a backbone of network security .Each day its relevance is increasing ,the major pros & cons of ethical hacking Advantages “To catch a thief you have to think like a thief” Help in closing the open holes in the network Provides security to banking and financial establishments Prevents website defacements An evolving technique

Future enhancements: As it an evolving branch the scope of enhancement in technology is immense. No ethical hacker can ensure the system security by using the same technique repeatedly. He would He would have to improve , develop and explore new avenues repeatedly. More enhanced software’s should be used for optimum protection . Tools used , need to be updated regularly and more efficient ones need to be developed

Conclusion One of the main aim of the seminar is to make others understand that there are so many tools through which a hacker can get into a system. Its various perspectives. Student A student should understand that no software is made with zero Vulnerability. So while they are studying they should study the various possibilities and should study how to prevent that because they are the professionals of tomorrow

REFERENCE www.scribd.com www.wikipedia/seminartopics/ethical haching.org www. Seminarsonly/ethical hacking.com

THANKYOU…!!!