1
What is Ethical Hacking ?
Ethical Hacking - Process
Why – Ethical Hacking ?
Reporting
Ethical Hacking – Commandments
2
What is Ethical Hacking ??
Also Called – Attack & Penetration Testing,
White-hat hacking, Red teaming.
Process of breaking into systems for :-
 Personal or Commercial Gains.
 Malicious Intent – Causing sever damage to
Information & Assets.
3
SOMEONE WHO
LIKES TO TINKER
WITH SOFTWARE
OR ELECTRONIC
SYSTEMS
4
WHITE-HAT
HACKERS
BLACK-HAT
HACKERS
GRAY-HAT
HACKERS
5
6
It is Legal.
Permission is obtained from the target.
Part of an overall security program.
Identify vulnerabilities visible from Internet a
particular point of time.
Ethical hackers possesses same skills, mindset and
tools of a hacker but the attacks are done in a non-
destructive manner.
7
8
Defacement Statistics for Indian Websites
June 01, 2004 to Dec.31, 2014
Domains No of Defacements
.com 922
.gov.in 24
.org 53
.net 39
.biz 12
.co.in 48
.ac.in 13
.info 3
.nic.in 2
.edu 2
other 13
Total 1131
Source: CERT-India
9
10
Viruses, Trojan
Horses,
and Worms
Social
Engineering
Automated
Attacks
Accidental
Breaches in
Security Denial of
Service (DoS)
Organizational
Attacks
Restricted
Data
Protection from possible External attacks
11
Will have same mind set & tools as do
hackers have but in a non destructive
manner.
Will have permissions to enter into the
target network.
To find the vulnerability.
To report the vulnerability to the
organization.
12
 Preparation.
 Foot-printing.
 Enumeration & Fingerprinting.
 Identification of Vulnerabilities
 Attack – Exploit the Vulnerabilities.
 Clearing tracks.
13
Specific systems to be tested.
Risks that are involved.
When the tests are to be performed & the overall
time.
Amount of knowledge of the systems.
What is to be done when vulnerability is discovered.
14
Collecting as much information about the target
DNS Servers
IP Ranges
Administrative Contacts
Problems revealed by administrators
oInformation Sources
oSearch engines
oForums
oDatabases – whois, ripe, arin, apnic
Tools – PING, whois, Traceroute, DIG, nslookup,
samspade.
15
Specific targets determined
Identification of Services / open ports.
To find other hosts in the entire network.
Tools :-Nmap, FScan, Hping,
Firewalk, netcat, tcpdump,
ssh, telnet, SNMP Scanner.
16
 Insecure Configuration.
 Weak Passwords – Default Passwords, Brute
force, Social Engineering, Listening to Traffic.
 Insecure Programming – SQL Injection,
Listening to Traffic.
Weak Access Control – Using the Application
Logic, SQL Injection Weak Access Control.
VULNERABILITIES :-
17
Application Specific Attacks
Exploiting implementations of HTTP, SMTP protocols.
Gaining access to application Databases.
SQL Injection.
Spamming
18
•Helps in closing the open holes in the system network.
•Provides security to banking and financial establishments.
•Prevents website defacements .
•“To catch a thief you have to think like a thief”.
•All depends upon the trustworthiness of the ethical hacker.
•Hiring professionals is expensive.
19

More Related Content

PPT
Ethical hacking by shivam
PPTX
Web hacking 1.0
PPT
Ethical hacking-ppt-download4575
PDF
Introduction to the advanced persistent threat and hactivism
PPTX
Extracting the Malware Signal from Internet Noise
PDF
Hacking and Ethical Hacking
PPTX
Ethical hacking introduction to ethical hacking
PPTX
Security protection On banking systems using ethical hacking.
Ethical hacking by shivam
Web hacking 1.0
Ethical hacking-ppt-download4575
Introduction to the advanced persistent threat and hactivism
Extracting the Malware Signal from Internet Noise
Hacking and Ethical Hacking
Ethical hacking introduction to ethical hacking
Security protection On banking systems using ethical hacking.

What's hot (18)

PPTX
Ethical Hacking PPT (CEH)
PPTX
Penetration testing
 
PPTX
Ethical Hacking
PPTX
Advanced persistent threat (apt)
PPTX
Hacking
PPTX
Introduction ethical hacking
PDF
Sophisticated Attacks vs. Advanced Persistent Security
PPTX
Ethical hacking : Its methodologies and tools
PPTX
Ethical hacking
PPTX
Introduction To Ethical Hacking
PPTX
Cyber Security-Ethical Hacking
PPTX
Ethical hacking a research paper
PPTX
Types of Attack in Information and Network Security
PPTX
Ethical hacking
PPTX
Ethical hacking
PPT
Ethical Hacking Powerpoint
PPTX
Virus and hacker (2)mmm
PPTX
Common Techniques To Identify Advanced Persistent Threat (APT)
Ethical Hacking PPT (CEH)
Penetration testing
 
Ethical Hacking
Advanced persistent threat (apt)
Hacking
Introduction ethical hacking
Sophisticated Attacks vs. Advanced Persistent Security
Ethical hacking : Its methodologies and tools
Ethical hacking
Introduction To Ethical Hacking
Cyber Security-Ethical Hacking
Ethical hacking a research paper
Types of Attack in Information and Network Security
Ethical hacking
Ethical hacking
Ethical Hacking Powerpoint
Virus and hacker (2)mmm
Common Techniques To Identify Advanced Persistent Threat (APT)
Ad

Viewers also liked (20)

PPTX
Ethical Hacking
PPTX
Ethical hacking presentation
PDF
Ethical hacking & Information Security
PPT
ethical hacking tips
PPTX
Ethical hacking 2016
PPTX
Parag presentation on ethical hacking
DOC
php&mysql with Ethical Hacking
DOCX
Ethical hacking front page
PPTX
PPT on Ethical Hacking
PPTX
How to hack or what is ethical hacking
PPTX
Ethical hacking
PPTX
PPT
Ethical hacking ppt_presentation_way2project_in
PPTX
Cse ethical hacking ppt
PPT
hacking
DOCX
Ethical hacking.
PPTX
Hacking
PPTX
Ethical hacking
PPTX
Ethical hacking/ Penetration Testing
DOCX
Ethical hacking
Ethical Hacking
Ethical hacking presentation
Ethical hacking & Information Security
ethical hacking tips
Ethical hacking 2016
Parag presentation on ethical hacking
php&mysql with Ethical Hacking
Ethical hacking front page
PPT on Ethical Hacking
How to hack or what is ethical hacking
Ethical hacking
Ethical hacking ppt_presentation_way2project_in
Cse ethical hacking ppt
hacking
Ethical hacking.
Hacking
Ethical hacking
Ethical hacking/ Penetration Testing
Ethical hacking
Ad

Similar to Presentation1 (20)

PPT
Ethical Hacking
PPTX
ethical hacking
PPT
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
PPT
324515851-Ethical-Hacking-Ppt-Download4575.ppt
PPT
324515851-Ethical-Hacking-Ppt-Download4575.ppt
PPTX
Ethical Hacking
PPT
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
PPTX
Ethical Hacking justvamshi .pptx
PPTX
Ethical hacking
PPTX
Ethical hacking
PPT
Ethical Hacking
PPTX
Ethical Hacking basics ppt, all types hacking
PPTX
building foundation for ethical hacking.ppt
PPTX
ethical hacking
PPTX
PDF
IRJET-Ethical Hacking
PDF
ISACA Ethical Hacking Presentation 10/2011
PPTX
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
PPT
Ethical hacking
PPTX
Session on Cyber security and Ethical Hacking.pptx
Ethical Hacking
ethical hacking
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
Ethical Hacking
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking justvamshi .pptx
Ethical hacking
Ethical hacking
Ethical Hacking
Ethical Hacking basics ppt, all types hacking
building foundation for ethical hacking.ppt
ethical hacking
IRJET-Ethical Hacking
ISACA Ethical Hacking Presentation 10/2011
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
Ethical hacking
Session on Cyber security and Ethical Hacking.pptx

Presentation1

  • 1. 1
  • 2. What is Ethical Hacking ? Ethical Hacking - Process Why – Ethical Hacking ? Reporting Ethical Hacking – Commandments 2
  • 3. What is Ethical Hacking ?? Also Called – Attack & Penetration Testing, White-hat hacking, Red teaming. Process of breaking into systems for :-  Personal or Commercial Gains.  Malicious Intent – Causing sever damage to Information & Assets. 3
  • 4. SOMEONE WHO LIKES TO TINKER WITH SOFTWARE OR ELECTRONIC SYSTEMS 4
  • 6. 6 It is Legal. Permission is obtained from the target. Part of an overall security program. Identify vulnerabilities visible from Internet a particular point of time. Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non- destructive manner.
  • 7. 7
  • 8. 8 Defacement Statistics for Indian Websites June 01, 2004 to Dec.31, 2014 Domains No of Defacements .com 922 .gov.in 24 .org 53 .net 39 .biz 12 .co.in 48 .ac.in 13 .info 3 .nic.in 2 .edu 2 other 13 Total 1131 Source: CERT-India
  • 9. 9
  • 10. 10 Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data Protection from possible External attacks
  • 11. 11 Will have same mind set & tools as do hackers have but in a non destructive manner. Will have permissions to enter into the target network. To find the vulnerability. To report the vulnerability to the organization.
  • 12. 12  Preparation.  Foot-printing.  Enumeration & Fingerprinting.  Identification of Vulnerabilities  Attack – Exploit the Vulnerabilities.  Clearing tracks.
  • 13. 13 Specific systems to be tested. Risks that are involved. When the tests are to be performed & the overall time. Amount of knowledge of the systems. What is to be done when vulnerability is discovered.
  • 14. 14 Collecting as much information about the target DNS Servers IP Ranges Administrative Contacts Problems revealed by administrators oInformation Sources oSearch engines oForums oDatabases – whois, ripe, arin, apnic Tools – PING, whois, Traceroute, DIG, nslookup, samspade.
  • 15. 15 Specific targets determined Identification of Services / open ports. To find other hosts in the entire network. Tools :-Nmap, FScan, Hping, Firewalk, netcat, tcpdump, ssh, telnet, SNMP Scanner.
  • 16. 16  Insecure Configuration.  Weak Passwords – Default Passwords, Brute force, Social Engineering, Listening to Traffic.  Insecure Programming – SQL Injection, Listening to Traffic. Weak Access Control – Using the Application Logic, SQL Injection Weak Access Control. VULNERABILITIES :-
  • 17. 17 Application Specific Attacks Exploiting implementations of HTTP, SMTP protocols. Gaining access to application Databases. SQL Injection. Spamming
  • 18. 18 •Helps in closing the open holes in the system network. •Provides security to banking and financial establishments. •Prevents website defacements . •“To catch a thief you have to think like a thief”. •All depends upon the trustworthiness of the ethical hacker. •Hiring professionals is expensive.
  • 19. 19