PREPARED BY : Harsh patel dhruv patel sreejit sundaram.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS Chapter 11.
Personal Info 1 Prepared by: Mr. NHEAN Sophan  Presenter: Mr. NHEAN Sophan  Position: Desktop Support  Company: Khalibre Co,. Ltd 
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
Web server security Dr Jim Briggs WEBP security1.
Computer Networks IGCSE ICT Section 4.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
What is FORENSICS? Why do we need Network Forensics?
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
CONTENTS  INTRODUCTION.  KEYWORDS  WHAT IS FIREWALL ?  WHY WE NEED FIREWALL ?  WHY NOT OTHER SECURITY MECHANISM ?  HOW FIREWALL WORKS ?  WHAT IT.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Anitvirus and Firewall Nathan Wun, Adam Staron, Kyle Tarnowski, Ryan Bywater.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
SETTING UP AN INTERNET NETWORK What you’ll need Your options How does data travel the Internet? Different terminology.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Malicious Software.
A Network Security -Firewall Bruce Turin.
DoS/DDoS attack and defense
Computer Security By Duncan Hall.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Role Of Network IDS in Network Perimeter Defense.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Cryptography and Network Security
Cisco Router Technology. Overview Topics :- Overview of cisco Overview of cisco Introduction of Router Introduction of Router How Router Works How Router.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Final Project: Advanced Security Blade IPS and DLP blades.
Eric Van Horn Cosc 356.  Nearly every organization in todays era uses computers and a network to send, receive, and store information  Very important.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Chapter 40 Internet Security.
Seminar On Ethical Hacking Submitted To: Submitted By:
Backdoor Attacks.
Computer Data Security & Privacy
Cisco Router Technology
Firewalls.
Security in Networking
Unit 27: Network Operating Systems
Network Security: IP Spoofing and Firewall
I. Basic Network Concepts
FIREWALL.
Test 3 review FTP & Cybersecurity
Presentation transcript:

PREPARED BY : Harsh patel dhruv patel sreejit sundaram

INTRODUCTION TO HACKING  HACKING means going to into system and exploring the hosts system and getting whatever exploring the hosts system and getting whatever information you need and getting yourself out and information you need and getting yourself out and clearing your trails without getting yourself busted. clearing your trails without getting yourself busted.

HACKER  HACKER are intelligent computer professionals who are Interested in learning advanced techniques about operating system programming languages and application software.  HACKER try to gain in depth knowledge of a system and use that information to find out the possible security gaps in a system HACKER share their knowledge with other people and this increase security awarness.

CRACKER  CRACKER are individual who break into computer with malicious intent.  CRACKER try to get unauthorized access into a system and cause damage or destroy confidential information.  They break into or otherwise violate the system integrity of remote machines, with evil intent.

ETHICS OF HACKING  Essentially, hackers are intelligent computer programmer Who follow an ethic: Who follow an ethic: Hackers should never harm the system they break into. Hackers should never harm the system they break into.  Hackers believe that: Access to computer should be unlimited and total. Access to computer should be unlimited and total. All information should be free. All information should be free. Authorities should be mistrusted and decentralization Authorities should be mistrusted and decentralization Promoted. Promoted. Hackers should create the beauty of a computer. Hackers should create the beauty of a computer. Hackers should be judged by their hacking skills. Hackers should be judged by their hacking skills.

TYPES OF SECURITY Network security violations can be broadly divided into Network security violations can be broadly divided into five distinct area: five distinct area:  AUTHENFICATION:  ACCESS CONTROL:  DATA INTEGRITY:  DATA CONFIDENTIALITY:  DENIAL OF SERVICE ATTACKS:

FIREWALL  A FIREWALL is a network security system designed to prevent unauthorized access to a private network from any other network.  Typically, it works closely with a router program to determine if a packet should be forwarded to its destination.  It also provides a proxy service that makes network requests on behalf of the users on a network.

TYPES OF FIREWALL  ROUTER-BASED FIREWALL:

 PROXY-BASED FIREWALL:

What does a firewall do?  A firewall can analyze all the traffic between a network and the Internet.  It is examines all the traffic between two networks.  it is routed between the networks, otherwise it is stopped.  It checks the protocol which the packet being delivered and also check port number to which it is being sent.  The main function of firewall is to provide centralized access control on how users use the network.

What can’t a firewall do?  A firewall cannot prevent individual users with modems from dialing into or out of the network, bypassing the firewall altogether.  If employee can do some mistakes so it can’t be controlled by firewall.  the planning of any security policy but that cannot be solved with firewalls alone.

Who needs a firewall?  Any person who is responsible for a private network and connect with a public network.  For more a person who connect so much as single computer with internet via modem needed personal firewall.  Many dial-up users believe that other types of protection will protect them.They are feel that no one can break their security in the computer.  Some dial-up users have victims of major attacks and they lost their files and also a lots of work.

IP-ADDRESS  Every system connected to a particular network has a unique identification said IP address or internet protocol address Which is just as in real world every person has his own contact address.  Getting the internet protocol or the IP address of a remote system is said to the most important step in hacking of a system.

STRUCTURE OF IP ADDRESS  IP address divided into a number of classes which have different ranges. Class A: 8 bits for Netid & 24 bits for Hostid. Class B: 16 bits for Netid & 16 bits for Hostid. Class C: 24 bits for Netid & 8 bits for Hostid. Class D: 32-bit multicast Groupid. Class E: Currently not in use.

ABOUT THE PORTS  Ports are virtual pipes that allow internet services such as file transfer protocol and exchange to share a single physical connection.  Usually hackers run a port scanning program to list the ports available and then find out websites that lists weakness & try to get a match for target system.

TYPES OF PORTS There are mainly five types of ports available. Port NoServices No –21FTP No –23Telenet No –25SMPT No –80HTTP-appache No –125POP3

HOW TO HACK There are four steps to hacking.  Step-1: Getting access to site Using ports through internet hacker gets an access to target system. Using ports through internet hacker gets an access to target system.  Step-2: Gaining control of the system Now hacker take the overall control of the target system. Now hacker take the overall control of the target system.

HOW TO HACK  Step3: Covering Traces Hacker finds the path to hack anything in the target system. Hacker finds the path to hack anything in the target system.  Step4: Keeping that Account Hacker never use his personal account to hack anything. Hacker never use his personal account to hack anything.

ATTITUDE OF HACKER A true hacker has a purpose and a reason for breaking into any box.A true hacker why is doing what A true hacker has a purpose and a reason for breaking into any box.A true hacker why is doing what he does and is doing it for reason like knowledge free he does and is doing it for reason like knowledge free information and access. information and access. so if you want to be Hacker,repeat the following things until you believe them. so if you want to be Hacker,repeat the following things until you believe them.  The world is full of fascinating problems waiting to be solved. solved.

 Nobody should ever have to solve a problem twice.  Boredom and drudgery are evil.  Freedom is good.  Attitude is no substitute for competence.

BIBLIOGRAPHY  Hacking tools & techniques by NIIT.  Basics of network security, firewalls by NIIT.  Internet