CAUTION
  HACKER A
           T
    WORK

Ethical Hacking
Hacking


• Hacking is an act of penetrating computer
  systems to gain knowledge about the system
  and how it works.

• Hacking is the act of gaining access without
  legal authorization to a computer or computer
  network or network resources.
Hacking means making something
work regardless of the circumstances
Hacking is not very complex
Ethical Hacking

• Ethical hacking is the use of hacking
  knowledge to attempt to enter a network to
  find its loopholes and back doors.

• It is often referred to as ‘legalized hacking’
  and yes it is indeed legal and can even reap a
  lot of profits for highly skilled individuals.
Hacker
• Hackers are actually computer enthusiasts who know
  a lot about computers and computer networks and
  use this knowledge with a criminal intent.

• He is a person who uses his hacking skills and tool
  sets for destructive or offensive purposes such as
  disseminating viruses or performing DoS attacks to
  compromise or bring down systems and networks.

• Hackers are sometimes paid to damage corporate
  reputations or steal or reveal credit-card information
Types of Hackers

• White hat –
   Good guys
   Don’t use their skills for illegal purposes
   Computer security experts

• Black hat –
    Bad guys
    Use their skills for illegal purposes
    Criminals
Types of Hackers
• Script kiddies –
    Wannabe hackers
    No technical skills
    Have no clue about what’s happening in

• Elite hackers –
    Usually professionals
    Develop new attacks/tools
Why perform an ethical hack?

   To determine flaws and vulnerabilities
   To provide a quantitative metric for evaluating
    systems and networks
   To measure against pre-established baselines
   To determine risk to the organization
   To design mitigating controls
Skills Required Becoming an Ethical Hacker

   Criminal mindset
   Thorough knowledge about Computer
    programming, Networking and operating
    systems. highly targeted platforms (such as
    Windows, Unix, and Linux), etc.
   Patience, persistence, and immense perseverance
Levels in Ethical Hacking
Ethical Hacking Steps
Footprinting
   Gathering information of target information
       Internet             Domain name, network
                            blocks, IP addresses open to
                            Net, TCP and UDP services
                            running, ACLs, IDSes

       Intranet             Protocols (IP,NETBIOS),
                            internal domain names, etc

       Remote access        Phone numbers, remote
                            control, telnet,
                            authentication

       Extranet             Connection origination,
                            destination, type, access
                            control
Scanning
   After obtaining a list of network and IP addresses
    scanning starts:
       ping sweeps (active machines): user pinger in Windows and
        nmap in Linux/UNIX. This is an example of pinger.

       TCP port scanning (open ports in active machines): SYN
        and connect scans work with most hosts. SYN is stealthier
        and may not be logged.

       In Windows NT use SuperScan and in Linux/UNIX use
        nmap. See an example of SuperScan. BUT, hackers use
        scripts with binary files, not graphical tools.
                                                                    14
Types of Scanning

    Scanning Type               Purpose

Port scanning         Determines open ports and
                      services

Network scanning      IP addresses


Vulnerability scanning Presence of known
                       weaknesses
Scanning Tools

■   Nmap
■   Nessus
■   SNMP Scanner
■   THC-Scan
■   Netscan
■   IPSecScan
Enumeration
• After scanning process and is the process of
  gathering and compiling usernames, machine
  names, network resources, shares, and
  services.
• It also refers to actively querying or
  connecting to a target system to acquire this
  information.
Attack
• SQL injection
• SQL injection is a code injection technique that
  exploits a security vulnerability occurring in the
  database layer of an application.

• The vulnerability is present when user input is either
  incorrectly filtered for string literal escape characters
  embedded in SQL statements or user input is not
  strongly typed and thereby unexpectedly executed.
SQL injection

• During a SQL injection attack, malicious code is
  inserted into a web form field or the website’s code to
  make a system execute a command shell or other
  arbitrary commands.
• Just as a legitimate user enters queries and additions
  to the SQL database via a web form, the hacker can
  insert commands to the SQL server through the same
  web form field.
Wireless Hacking Techniques

• Cracking encryption and authentication
  mechanism
• Eavesdropping or sniffing
• Denial of Service
• AP masquerading or spoofing
• MAC spoofing
Wi-Fi network security
• Use Strong Encryption Protocol
• Don’t Announce Yourself-Disable SSID
• Change Default Administrator Passwords and
  Usernames
• Limit Access To Your Access Point
• Do Not Auto-Connect to Open Wi-Fi Networks
• Assign Static IP Addresses to Devices
• Enable Firewalls On Each Computer and the Router
• Position the Router or Access Point Safe

More Related Content

PDF
Cs8792 cns - unit v
PDF
Ethical Hacking Tools
PPTX
Intruders detection
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
Hacktrikz - Introduction to Information Security & Ethical Hacking
PPT
Chapter 2
PPTX
Cse ethical hacking ppt
PPTX
Penetration testing
 
Cs8792 cns - unit v
Ethical Hacking Tools
Intruders detection
Inetsecurity.in Ethical Hacking presentation
Hacktrikz - Introduction to Information Security & Ethical Hacking
Chapter 2
Cse ethical hacking ppt
Penetration testing
 

What's hot (19)

PPT
Ethical Hacking
PPT
Ethical hacking
PPTX
ETHICAL HACKING PRESENTATION
PDF
CNIT 123 Ch 1: Ethical Hacking Overview
PPT
Ethical hacking
PPTX
Ethical hacking : Its methodologies and tools
PPTX
Cse ethical hacking ppt
PDF
Certified Ethical Hacking - Book Summary
PDF
An Introduction to Ethical Hacking
PPTX
Ethical Hacking Redefined
PPT
Introduction to Hacking
PPTX
Network Security & Ethical Hacking
PPTX
Ethical Hacking
PPTX
Ethical hacking
PPT
Ethical hacking
PPTX
Web hacking 1.0
PPTX
Ethical hacking
PPT
Ethical hacking by shivam
PPT
Ethical Hacking and Penetration Testing
Ethical Hacking
Ethical hacking
ETHICAL HACKING PRESENTATION
CNIT 123 Ch 1: Ethical Hacking Overview
Ethical hacking
Ethical hacking : Its methodologies and tools
Cse ethical hacking ppt
Certified Ethical Hacking - Book Summary
An Introduction to Ethical Hacking
Ethical Hacking Redefined
Introduction to Hacking
Network Security & Ethical Hacking
Ethical Hacking
Ethical hacking
Ethical hacking
Web hacking 1.0
Ethical hacking
Ethical hacking by shivam
Ethical Hacking and Penetration Testing

Similar to Ethical Hacking (20)

PDF
What is ethical hacking and complete cyber security presentation on this file
PPTX
Ethical hacking
PPTX
Seucrity in a nutshell
PPTX
Ethical hacking (legal)
PPTX
Detailed_Scanning_and_Footprinting_Ethical_Hacking.pptx
PDF
Ccna sec 01
PPTX
640-554 IT Certification and Career Paths
PPTX
Ethical Hacking
PPTX
Ethical hacking/ Penetration Testing
PPT
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
PPTX
building foundation for ethical hacking.ppt
PPTX
Phases of penetration testing
PPTX
Ethical hacking presentation.pptx
PPTX
Types of Attack in Information and Network Security
PPT
324515851-Ethical-Hacking-Ppt-Download4575.ppt
PPT
324515851-Ethical-Hacking-Ppt-Download4575.ppt
PPT
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
PPT
intrusion detection system (IDS)
PPTX
How to hack or what is ethical hacking
What is ethical hacking and complete cyber security presentation on this file
Ethical hacking
Seucrity in a nutshell
Ethical hacking (legal)
Detailed_Scanning_and_Footprinting_Ethical_Hacking.pptx
Ccna sec 01
640-554 IT Certification and Career Paths
Ethical Hacking
Ethical hacking/ Penetration Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
building foundation for ethical hacking.ppt
Phases of penetration testing
Ethical hacking presentation.pptx
Types of Attack in Information and Network Security
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
intrusion detection system (IDS)
How to hack or what is ethical hacking

Recently uploaded (20)

PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
STKI Israel Market Study 2025 version august
PPTX
Modernising the Digital Integration Hub
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Hybrid model detection and classification of lung cancer
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Unlock new opportunities with location data.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
The various Industrial Revolutions .pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
Group 1 Presentation -Planning and Decision Making .pptx
Module 1.ppt Iot fundamentals and Architecture
Getting started with AI Agents and Multi-Agent Systems
A novel scalable deep ensemble learning framework for big data classification...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
STKI Israel Market Study 2025 version august
Modernising the Digital Integration Hub
Enhancing emotion recognition model for a student engagement use case through...
Hybrid model detection and classification of lung cancer
Univ-Connecticut-ChatGPT-Presentaion.pdf
CloudStack 4.21: First Look Webinar slides
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Unlock new opportunities with location data.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
Chapter 5: Probability Theory and Statistics
Web Crawler for Trend Tracking Gen Z Insights.pptx
O2C Customer Invoices to Receipt V15A.pptx
NewMind AI Weekly Chronicles – August ’25 Week III
The various Industrial Revolutions .pptx
sustainability-14-14877-v2.pddhzftheheeeee

Ethical Hacking

  • 1. CAUTION HACKER A T WORK Ethical Hacking
  • 2. Hacking • Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works. • Hacking is the act of gaining access without legal authorization to a computer or computer network or network resources.
  • 3. Hacking means making something work regardless of the circumstances
  • 4. Hacking is not very complex
  • 5. Ethical Hacking • Ethical hacking is the use of hacking knowledge to attempt to enter a network to find its loopholes and back doors. • It is often referred to as ‘legalized hacking’ and yes it is indeed legal and can even reap a lot of profits for highly skilled individuals.
  • 6. Hacker • Hackers are actually computer enthusiasts who know a lot about computers and computer networks and use this knowledge with a criminal intent. • He is a person who uses his hacking skills and tool sets for destructive or offensive purposes such as disseminating viruses or performing DoS attacks to compromise or bring down systems and networks. • Hackers are sometimes paid to damage corporate reputations or steal or reveal credit-card information
  • 7. Types of Hackers • White hat –  Good guys  Don’t use their skills for illegal purposes  Computer security experts • Black hat –  Bad guys  Use their skills for illegal purposes  Criminals
  • 8. Types of Hackers • Script kiddies –  Wannabe hackers  No technical skills  Have no clue about what’s happening in • Elite hackers –  Usually professionals  Develop new attacks/tools
  • 9. Why perform an ethical hack?  To determine flaws and vulnerabilities  To provide a quantitative metric for evaluating systems and networks  To measure against pre-established baselines  To determine risk to the organization  To design mitigating controls
  • 10. Skills Required Becoming an Ethical Hacker  Criminal mindset  Thorough knowledge about Computer programming, Networking and operating systems. highly targeted platforms (such as Windows, Unix, and Linux), etc.  Patience, persistence, and immense perseverance
  • 11. Levels in Ethical Hacking
  • 13. Footprinting  Gathering information of target information Internet Domain name, network blocks, IP addresses open to Net, TCP and UDP services running, ACLs, IDSes Intranet Protocols (IP,NETBIOS), internal domain names, etc Remote access Phone numbers, remote control, telnet, authentication Extranet Connection origination, destination, type, access control
  • 14. Scanning  After obtaining a list of network and IP addresses scanning starts:  ping sweeps (active machines): user pinger in Windows and nmap in Linux/UNIX. This is an example of pinger.  TCP port scanning (open ports in active machines): SYN and connect scans work with most hosts. SYN is stealthier and may not be logged.  In Windows NT use SuperScan and in Linux/UNIX use nmap. See an example of SuperScan. BUT, hackers use scripts with binary files, not graphical tools. 14
  • 15. Types of Scanning Scanning Type Purpose Port scanning Determines open ports and services Network scanning IP addresses Vulnerability scanning Presence of known weaknesses
  • 16. Scanning Tools ■ Nmap ■ Nessus ■ SNMP Scanner ■ THC-Scan ■ Netscan ■ IPSecScan
  • 17. Enumeration • After scanning process and is the process of gathering and compiling usernames, machine names, network resources, shares, and services. • It also refers to actively querying or connecting to a target system to acquire this information.
  • 18. Attack • SQL injection • SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. • The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed.
  • 19. SQL injection • During a SQL injection attack, malicious code is inserted into a web form field or the website’s code to make a system execute a command shell or other arbitrary commands. • Just as a legitimate user enters queries and additions to the SQL database via a web form, the hacker can insert commands to the SQL server through the same web form field.
  • 20. Wireless Hacking Techniques • Cracking encryption and authentication mechanism • Eavesdropping or sniffing • Denial of Service • AP masquerading or spoofing • MAC spoofing
  • 21. Wi-Fi network security • Use Strong Encryption Protocol • Don’t Announce Yourself-Disable SSID • Change Default Administrator Passwords and Usernames • Limit Access To Your Access Point • Do Not Auto-Connect to Open Wi-Fi Networks • Assign Static IP Addresses to Devices • Enable Firewalls On Each Computer and the Router • Position the Router or Access Point Safe