SlideShare a Scribd company logo
SEMINAR ON
ETHICAL HACKING
PRESENTED BY:
DEVENDRA KUMAR YADAV
1
ELECTRICAL AND ELECTRONICS DEPARTMENT
G. L. BAJAJ INSTITUTE OF TECHNOLOGY AND MANAGEMENT
CONTENT
 What is Hacking?
 What is Ethical Hacking?
 Types of Hackers
 Phases of Hacking
 Countermeasures
 Recent cases of Hacking
 References
What is Hacking?
Hacking refers to exploiting system vulnerabilities and
compromising security controls to gain unauthorised or
inappropriate access to the system resources.
It involves modifying system or application features to achieve a
goal outside of the creator’s original purpose.
Hacking can be used to steal and redistribute intellectual property
leading to business loss.
What is Ethical Hacking?
Ethical Hacking
involves the use of
hacking tools, tricks and
techniques to identify
vulnerabilities so as to
ensure system security.
It focuses on stimulating
techniques used by
attackers to verify the
existence of exploitable
vulnerabilities in the
system.
Types of Hackers
White Hat
Black Hat
Grey Hat
Individuals professing
hackers skills and using
them for the defensive
purpose also known as
Security Analysts.
Individuals with
extraordinary computing
skills, resorting to
malicious or destructive
activities and are also
known as Crackers.
Individuals who work
both offensive and
defensive at various
works.
Phases of Hacking
Clearing
Tracks
Maintaining
Access
Gaining
Access
Scanning
Reconnaiss
ance
Hacking Phases: Reconnaissance
Reconnaissance
Scanning
Gaining
Access
Maintaining
Access
Clearing
Tracks
Reconnaissance refers to a preparatory phase
where an attackers seeks to gather
information about a target prior to launching
an attack.
Could be the future point of return, noted for
ease of entry for an attack when more about
the target is known on a board scale.
Reconnaissance target range may include
the target organization’s clients employee,
operations, network and systems.
Reconna
issance
Scanning
Gaining
Access
Hacking Phases: Scanning
Clearing
Tracks
Maintaining
Access
 Pre-Attack Phase: Scanning refers to the
pre-attack phase when the attackers scans the
networks for specific information gathered
during reconnaissance.
 Port Scanner: Scanning can include use of
diameter, port scanner’s, network mapper,
ping tools, vulnerabilities scanner etc.
 Extract Information: Attackers extract
information such as live machines, port, port
status, OS details, device type, system
uptime, etc to launch attack.
Hacking Phases: Gaining Access
Reconnai
ssance
Maintaining
Access
Clearing
Tracks
Scanning
Gaining
Access
Gaining access refers to the point where the
attacker obtains access to the operating system or
applications on the computer or network.
The Attackers can escalate privileges to obtain
complete control of the system. In the process,
intermediate systems that are connected to it are
also compromised.
The attacker can gain access at the operating
system level, application level, or network level.
Example include password cracking, buffer
overflows, denial of service, session hijacking
etc.
Hacking Phase: Maintaining Access
Reconnai
ssance
Maintaining
Access
Scanning
Gaining
Access
Clearing
Tracks
 Maintaining access refers to the phase when the
attackers tries to retain his or her ownership of the
system.
 Attackers may prevent the system from being
owned by other attackers by securing their
exclusive access with Blackdoor, Rootkits, or
Trojans.
 Attackers can upload, download or manipulate
data, applications and configurations on the owned
system.
 Attackers use the compromised system to launch
further attacks
Hacking Phase: Clearing Tracks
Reconnais
sance
Scanning
Gaining
Access
Maintaining
Access
Clearing
Tracks
 Covering tracks refers to the activities carried
out by an attacker to hide malicious acts.
 The attackers intentions includes: Continuing
access to the victim’s system, remaining
unnoticed and uncaught, deleting evidence
that might lead to his prosecution.
 The attackers overwrites the serve, system
and application logs to avoid suspicion.
Countermeasures
 Do not responds to the Phishing email and calls.
 Regularly change password of the accounts & try to use
special characters in the password.
 To avoid atm fraud try not to swipe atm card at any random
shop & change pin within months.
 Do not reveal any personal information on the social
networking sites such as on Facebook and Twitter.
Recent Cases of Hacking
 In August 2013, 1 billion
yahoo mail account passwords
has been leaked and the
information were compromised.
This is one of biggest data
breach in the history.
 3.2 million SBI bank account
was hacked by the hackers of
China and unauthorised transection
is done, this is the biggest breach in
the history of the Indian bank.
References
 Kimberly Graves. “CEH: Certified Ethical Hacker Study Guide”, John Wiley &
Sons, Inc.
 C. Palmer. “Ethical hacking”, IBM SYSTEMS JOURNAL, VOL 40, NO 3, 2001.
 Steven DeFino, Larry Greenblatt. “CEH: Certified Ethical Hacker Review Guide
version7.1”
 Ethical Hacking – GIAC, URL: www.giac.org/paper/gsec/2468/ethical-
hacking/104292

More Related Content

PPTX
Ppt on cyber security
Avani Patel
 
PPTX
Web security
Jatin Grover
 
PPT
Cyber crime
Muhammad Osama Khalid
 
PPTX
Man in The Middle Attack
Deepak Upadhyay
 
PPTX
Social engineering-Attack of the Human Behavior
James Krusic
 
PPTX
Cyber security
TaimoorArshad5
 
PDF
Cyber security training
Wilmington University
 
PPTX
Cyber Crime & Security
Uday Bhaskarwar
 
Ppt on cyber security
Avani Patel
 
Web security
Jatin Grover
 
Man in The Middle Attack
Deepak Upadhyay
 
Social engineering-Attack of the Human Behavior
James Krusic
 
Cyber security
TaimoorArshad5
 
Cyber security training
Wilmington University
 
Cyber Crime & Security
Uday Bhaskarwar
 

What's hot (20)

PPTX
Detection of phishing websites
m srikanth
 
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
PPTX
Application security
Hagar Alaa el-din
 
PPTX
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
 
PPTX
Cyber Security PPT.pptx
56ushodayareddy
 
PPTX
IT Security DOs and DON'Ts
Amir Ali Mokhberi
 
PDF
Iam presentation
AWS UG PK
 
PPTX
Cse ethical hacking ppt
SHAHID ANSARI
 
PPT
Malware Analysis Made Simple
Paul Melson
 
PPTX
Social Media Security
Del Belcher
 
PPTX
Cyber crime and security
Sharath Raj
 
PDF
IDOR Know-How.pdf
Bhashit Pandya
 
PPSX
Information Security and Ethical Hacking
Divyank Jindal
 
PPTX
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
PPTX
Dark web
danielcometa97
 
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
PPTX
Cyber security
Rishav Sadhu
 
PDF
End-User Security Awareness
Surya Bathulapalli
 
Detection of phishing websites
m srikanth
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Application security
Hagar Alaa el-din
 
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
 
Cyber Security PPT.pptx
56ushodayareddy
 
IT Security DOs and DON'Ts
Amir Ali Mokhberi
 
Iam presentation
AWS UG PK
 
Cse ethical hacking ppt
SHAHID ANSARI
 
Malware Analysis Made Simple
Paul Melson
 
Social Media Security
Del Belcher
 
Cyber crime and security
Sharath Raj
 
IDOR Know-How.pdf
Bhashit Pandya
 
Information Security and Ethical Hacking
Divyank Jindal
 
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Dark web
danielcometa97
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Cyber security
Rishav Sadhu
 
End-User Security Awareness
Surya Bathulapalli
 

Similar to Ethical hacking (20)

PPTX
Ethical hacking
Prabhat kumar Suman
 
PPTX
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
PPTX
Ethical Hacking
Aditya Vikram Singhania
 
PPTX
Ethical Hacking
Nitheesh Adithyan
 
PPTX
Ethical Hacking
Namrata Raiyani
 
PPTX
Ethical Hacking Overview
Subhoneel Datta
 
PPTX
ethical hacking
samprada123
 
DOCX
Ethical hacking
Nitheesh Adithyan
 
PPTX
Introduction to Pre-Cybersecurity.pptx
youfanlimboo
 
PPTX
Introduction ethical hacking
Vishal Kumar
 
PDF
Ethical Hacking And Hacking Attacks
Aman Gupta
 
PPTX
Ethical Hacking.pptx
MadhuKumar114889
 
PPTX
Ethical hacking : Its methodologies and tools
chrizjohn896
 
PPT
Module 1 Introduction
leminhvuong
 
PPT
Introduction To Ethical Hacking
Akshay Kale
 
PPTX
Ethical hacking introduction to ethical hacking
MissStevenson1
 
PPTX
Ethical hacking
Vishesh Singhal
 
PPTX
Ethical hacking introduction to ethical hacking
missstevenson01
 
PPTX
Ethical hacking
Ritwick Mukherjee
 
PPTX
Ethical Hacking .pptx
johnnymaaza
 
Ethical hacking
Prabhat kumar Suman
 
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
Ethical Hacking
Aditya Vikram Singhania
 
Ethical Hacking
Nitheesh Adithyan
 
Ethical Hacking
Namrata Raiyani
 
Ethical Hacking Overview
Subhoneel Datta
 
ethical hacking
samprada123
 
Ethical hacking
Nitheesh Adithyan
 
Introduction to Pre-Cybersecurity.pptx
youfanlimboo
 
Introduction ethical hacking
Vishal Kumar
 
Ethical Hacking And Hacking Attacks
Aman Gupta
 
Ethical Hacking.pptx
MadhuKumar114889
 
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Module 1 Introduction
leminhvuong
 
Introduction To Ethical Hacking
Akshay Kale
 
Ethical hacking introduction to ethical hacking
MissStevenson1
 
Ethical hacking
Vishesh Singhal
 
Ethical hacking introduction to ethical hacking
missstevenson01
 
Ethical hacking
Ritwick Mukherjee
 
Ethical Hacking .pptx
johnnymaaza
 

Recently uploaded (20)

DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PDF
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
Virus sequence retrieval from NCBI database
yamunaK13
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 

Ethical hacking

  • 1. SEMINAR ON ETHICAL HACKING PRESENTED BY: DEVENDRA KUMAR YADAV 1 ELECTRICAL AND ELECTRONICS DEPARTMENT G. L. BAJAJ INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 2. CONTENT  What is Hacking?  What is Ethical Hacking?  Types of Hackers  Phases of Hacking  Countermeasures  Recent cases of Hacking  References
  • 3. What is Hacking? Hacking refers to exploiting system vulnerabilities and compromising security controls to gain unauthorised or inappropriate access to the system resources. It involves modifying system or application features to achieve a goal outside of the creator’s original purpose. Hacking can be used to steal and redistribute intellectual property leading to business loss.
  • 4. What is Ethical Hacking? Ethical Hacking involves the use of hacking tools, tricks and techniques to identify vulnerabilities so as to ensure system security. It focuses on stimulating techniques used by attackers to verify the existence of exploitable vulnerabilities in the system.
  • 5. Types of Hackers White Hat Black Hat Grey Hat Individuals professing hackers skills and using them for the defensive purpose also known as Security Analysts. Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as Crackers. Individuals who work both offensive and defensive at various works.
  • 7. Hacking Phases: Reconnaissance Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks Reconnaissance refers to a preparatory phase where an attackers seeks to gather information about a target prior to launching an attack. Could be the future point of return, noted for ease of entry for an attack when more about the target is known on a board scale. Reconnaissance target range may include the target organization’s clients employee, operations, network and systems.
  • 8. Reconna issance Scanning Gaining Access Hacking Phases: Scanning Clearing Tracks Maintaining Access  Pre-Attack Phase: Scanning refers to the pre-attack phase when the attackers scans the networks for specific information gathered during reconnaissance.  Port Scanner: Scanning can include use of diameter, port scanner’s, network mapper, ping tools, vulnerabilities scanner etc.  Extract Information: Attackers extract information such as live machines, port, port status, OS details, device type, system uptime, etc to launch attack.
  • 9. Hacking Phases: Gaining Access Reconnai ssance Maintaining Access Clearing Tracks Scanning Gaining Access Gaining access refers to the point where the attacker obtains access to the operating system or applications on the computer or network. The Attackers can escalate privileges to obtain complete control of the system. In the process, intermediate systems that are connected to it are also compromised. The attacker can gain access at the operating system level, application level, or network level. Example include password cracking, buffer overflows, denial of service, session hijacking etc.
  • 10. Hacking Phase: Maintaining Access Reconnai ssance Maintaining Access Scanning Gaining Access Clearing Tracks  Maintaining access refers to the phase when the attackers tries to retain his or her ownership of the system.  Attackers may prevent the system from being owned by other attackers by securing their exclusive access with Blackdoor, Rootkits, or Trojans.  Attackers can upload, download or manipulate data, applications and configurations on the owned system.  Attackers use the compromised system to launch further attacks
  • 11. Hacking Phase: Clearing Tracks Reconnais sance Scanning Gaining Access Maintaining Access Clearing Tracks  Covering tracks refers to the activities carried out by an attacker to hide malicious acts.  The attackers intentions includes: Continuing access to the victim’s system, remaining unnoticed and uncaught, deleting evidence that might lead to his prosecution.  The attackers overwrites the serve, system and application logs to avoid suspicion.
  • 12. Countermeasures  Do not responds to the Phishing email and calls.  Regularly change password of the accounts & try to use special characters in the password.  To avoid atm fraud try not to swipe atm card at any random shop & change pin within months.  Do not reveal any personal information on the social networking sites such as on Facebook and Twitter.
  • 13. Recent Cases of Hacking  In August 2013, 1 billion yahoo mail account passwords has been leaked and the information were compromised. This is one of biggest data breach in the history.  3.2 million SBI bank account was hacked by the hackers of China and unauthorised transection is done, this is the biggest breach in the history of the Indian bank.
  • 14. References  Kimberly Graves. “CEH: Certified Ethical Hacker Study Guide”, John Wiley & Sons, Inc.  C. Palmer. “Ethical hacking”, IBM SYSTEMS JOURNAL, VOL 40, NO 3, 2001.  Steven DeFino, Larry Greenblatt. “CEH: Certified Ethical Hacker Review Guide version7.1”  Ethical Hacking – GIAC, URL: www.giac.org/paper/gsec/2468/ethical- hacking/104292