SlideShare a Scribd company logo
1 of 28
CONTENT
 INTRODUCTION        METHODOLOGY

 HISTORY             REPORTING

 TYPES OF HACKERS    CONCLUSION

 ETHICAL HACKING     ADVANTAGES AND
                       DISADVANTAGES
 HACKING
                      CONCLUSION
 ETHICAL HACKING
  COMMANDMENTS        REFERENCE
INTRODUCTION

 Ethical hacking also known as penetration testing
  or White-hat hacking, involves the same tools,
  tricks and techniques that hackers use, but with
  one major difference that ethical hacking is legal.

 Ethical hacking can also ensure that vendors
  claims about the security of their products
  legitimate.
SECURITY
 Security is the condition of being protect against
  danger or loss. In the general sense, security is a
  concept similar to safety.
 Information security means protecting information
  and information systems from unauthorized access,
  use, disclosure, disruption, modification or destruc-
  tion.

                    Need for security
  There may be several forms of damages which are obviously
  interrelated which are produced by the intruders.
HISTORY HIGHLIGHTS

 In one early ethical hack, the United States Air Force
  conducted a “security evaluation” of the Multiuse
  operating systems for “potential use as a two-level
  (secret/top secret) systems.”


 Most notable of these was the work by Farmer and
  Venom, which was originally posted to Usenet in
  December of 1993.
HACKING

 Eric Raymond, compiler of “The New Hacker’s Dictionary”,
  defines a hacker as a clever programmer.


 A “Good hack” is a clever solution to a programming
  problem and “hacking” is the act of doing it.
TYPE OF HACKERS

 Black-Hat Hackers



 White-Hat Hackers



 Grey-Hat Hackers
ETHICAL HACKING

 A methodology adopted by ethical hackers to discover
  the vulnerabilities existing in information systems
  operating environments.

 With the growth of the internet, computer security has
  become a Major concern for businesses and govern-
  ments.

 Evaluate the intruder threat to their interests would be
  to have independent computer security professionals
  attempt to break into their computer systems.
What does an Ethical Hacker do ?

 An ethical hacker is a person doing ethical
  hacking that is he is a security personal who
  tries to penetrate in to a network to find if
  there is some vulnerability in the system. An
  ethical hacker will always have the permission
  to enter into the target network.

 If he succeed in penetrating into the system
  then he will report to the company with a
  detailed report about the particular vulnerab-
  ility exploiting which he got in to the system.
Required Skills of an Ethical Hacker :


 Microsoft :
 Linux :
 Firewalls :
 Routers :
 Network Protocols :
 Project Management :
ETHICAL HACKING COMMANDMENTS


 Working ethically


 Respecting privacy



 Not crashing your systems:
METHODOLOGY OF HACKING

Reconnaissance

Scanning & Enumeration

Gaining access

 Maintaining access

Clearing tracks
 Reconnaissance:
  This literal meaning of the Word reconnaissance means a
  preliminary survey to gain the information . This is also known as
  foot-printing. As given in the analogy, this is the stage in which the
  hacker collects information about the company which the personal
  is going to hack. This is one of the pre-attacking phases.


 Scanning:
   The hacker tries to make a blue print of the target network. The
  blue print includes the IP addresses of the target network which
  are live, the services which are running on those systems and so
  on Modern port scanning uses TCP protocol to do scanning and
  they could even detect the operating systems running on the
  particular hosts.
Enumeration:
Enumeration is the ability of a hacker to convince some servers to
give them information that is vital to them to make an attack. By
doing this the hacker aims to find what resources and shares can
be found in the system, what valid user account and user groups
are there in the network, what applications will be there etc.

Gaining access
This is the actual hacking phase in which the hacker gains access
to the system. The hacker will make use of all the information he
collected in the pre-attacking phases. Usually the main hindrance
to gaining access to a system is the passwords. In the System
hacking first the hacker will try to get in to the system.
 Password Cracking:
 There are many methods for cracking the password and then
 get in to the system. The simplest method is to guess the
 password. But this is a tedious work. But in order to make this
 work easier there are many automated tools for password
 guessing like legion.


 Privilege escalation
 Privilege escalation is the process of raising the privileges once
 the hacker gets in to the system The privilege escalation
 process usually uses the vulnerabilities present in the host
 operating system or the software. There are many tools like
 hk.exe, metasploit etc. One such community of hackers is the
 metasploit
 Maintaining Access:
  Now the hacker is inside the system . This means that he is now
  in a position to upload some files and download some of them.
  The next aim will be to make an easier path to get in when he
  comes the next time. This is analogous to making a small hidden
  door in the building so that he can directly enter in to the
  building through the door easily
 Clearing Tracks:
   Whenever a hacker downloads some file or installs some
   software, its log will be stored in the server logs. So in order to
   erase the hacker uses man tools. One such tool is windows
   resource kit’s auditpol.exe. Another tool which eliminates any
   physical evidence is the evidence eliminator.. The Evidence
   Eliminator deletes all such evidences.
Ethical hacking tools:


Ethical hackers utilize and have developed variety of tools
intrude into different kinds of systems and to evaluate the
security levels. The nature of these tools differs widely.
Samspade:

Samspade is a simple tool which provides us
information about a particular host. This tool is
very much helpful in finding the addresses, phone
number etc
Email Tracker and Visual Route:


 Email tracker is a software which help us to find from
which server the mail does actually came from. Every
message we receive will have a header associated with
It . The email tracker uses this header information for find
location.

Visual route is a tool which displays the location a
particular server with the help of IP addresses. When we
connect this with the email tracker we can find the
server which actually sends the mail .
Advantages and disadvantages:
Ethical hacking nowadays is a backbone of network
security .Each day its relevance is increasing ,the
major pros & cons of ethical hacking

 Advantages
  “To catch a thief you have to think like a thief”
  Help in closing the open holes in the network
  Provides security to banking and financial
   establishments
  Prevents website defacements
  An evolving technique
Disadvantages
 All depend upon the trustworthiness of the
 ethical hacker

 Hiring professionals is expensive
Future enhancements:

 As it an evolving branch the scope of
enhancement in technology is       immense. No
ethical hacker can ensure the system security by
using the same technique repeatedly. He would
He would have to improve , develop and explore
new avenues repeatedly.

 More enhanced software’s should be used for
optimum protection . Tools used , need to be
updated regularly and more efficient ones need to
be developed
Conclusion
One of the main aim of the seminar is to make
others understand that there are so many tools
through which a hacker can get into a system. Its
various perspectives.

Student
  A student should understand that no software is
made with zero Vulnerability. So while they are
studying they should study the various possibilities
and should study how to prevent that because they
are the professionals of tomorrow
Professionals
    Professionals should understand that business is
directly related to security. So they should make
new software with vulnerabilities as less as
possible. if they are not aware of these then they
won’t be cautions enough in security matters

 In the preceding sections we saw the
methodology of hacking, why should we aware of
hacking and tools and some tools which a hacker
may use . Now we can see what we can do against
hacking or to protect ourselves from hacking .

 the first thing is we should keep ourselves
updated about those          software's us and using
for official and reliable sources .
Educate employees and the users against black
hacking.

Use every possible security measures

 Every time make our password strong by making it
harder and longer to be cracked.
REFERENCE

 www.scribd.com

 www.wikipedia/seminartopics/ethical haching.org

 www. Seminarsonly/ethical hacking.com
Ethical Hacking

More Related Content

What's hot

Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 

What's hot (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Similar to Ethical Hacking

CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 

Similar to Ethical Hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullah
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

More from Nitheesh Adithyan (6)

HTML
HTMLHTML
HTML
 
CSS
CSSCSS
CSS
 
Google fiber
Google fiberGoogle fiber
Google fiber
 
Google fiber front page
Google fiber   front pageGoogle fiber   front page
Google fiber front page
 
Google fiber
Google fiberGoogle fiber
Google fiber
 
Ethical hacking front page
Ethical hacking   front pageEthical hacking   front page
Ethical hacking front page
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Ethical Hacking

  • 1.
  • 2.
  • 3. CONTENT  INTRODUCTION  METHODOLOGY  HISTORY  REPORTING  TYPES OF HACKERS  CONCLUSION  ETHICAL HACKING  ADVANTAGES AND DISADVANTAGES  HACKING  CONCLUSION  ETHICAL HACKING COMMANDMENTS  REFERENCE
  • 4. INTRODUCTION  Ethical hacking also known as penetration testing or White-hat hacking, involves the same tools, tricks and techniques that hackers use, but with one major difference that ethical hacking is legal.  Ethical hacking can also ensure that vendors claims about the security of their products legitimate.
  • 5. SECURITY  Security is the condition of being protect against danger or loss. In the general sense, security is a concept similar to safety.  Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruc- tion. Need for security There may be several forms of damages which are obviously interrelated which are produced by the intruders.
  • 6. HISTORY HIGHLIGHTS  In one early ethical hack, the United States Air Force conducted a “security evaluation” of the Multiuse operating systems for “potential use as a two-level (secret/top secret) systems.”  Most notable of these was the work by Farmer and Venom, which was originally posted to Usenet in December of 1993.
  • 7. HACKING  Eric Raymond, compiler of “The New Hacker’s Dictionary”, defines a hacker as a clever programmer.  A “Good hack” is a clever solution to a programming problem and “hacking” is the act of doing it.
  • 8. TYPE OF HACKERS  Black-Hat Hackers  White-Hat Hackers  Grey-Hat Hackers
  • 9. ETHICAL HACKING  A methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems operating environments.  With the growth of the internet, computer security has become a Major concern for businesses and govern- ments.  Evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
  • 10. What does an Ethical Hacker do ?  An ethical hacker is a person doing ethical hacking that is he is a security personal who tries to penetrate in to a network to find if there is some vulnerability in the system. An ethical hacker will always have the permission to enter into the target network.  If he succeed in penetrating into the system then he will report to the company with a detailed report about the particular vulnerab- ility exploiting which he got in to the system.
  • 11. Required Skills of an Ethical Hacker :  Microsoft :  Linux :  Firewalls :  Routers :  Network Protocols :  Project Management :
  • 12. ETHICAL HACKING COMMANDMENTS  Working ethically  Respecting privacy  Not crashing your systems:
  • 13. METHODOLOGY OF HACKING Reconnaissance Scanning & Enumeration Gaining access  Maintaining access Clearing tracks
  • 14.  Reconnaissance: This literal meaning of the Word reconnaissance means a preliminary survey to gain the information . This is also known as foot-printing. As given in the analogy, this is the stage in which the hacker collects information about the company which the personal is going to hack. This is one of the pre-attacking phases.  Scanning: The hacker tries to make a blue print of the target network. The blue print includes the IP addresses of the target network which are live, the services which are running on those systems and so on Modern port scanning uses TCP protocol to do scanning and they could even detect the operating systems running on the particular hosts.
  • 15. Enumeration: Enumeration is the ability of a hacker to convince some servers to give them information that is vital to them to make an attack. By doing this the hacker aims to find what resources and shares can be found in the system, what valid user account and user groups are there in the network, what applications will be there etc. Gaining access This is the actual hacking phase in which the hacker gains access to the system. The hacker will make use of all the information he collected in the pre-attacking phases. Usually the main hindrance to gaining access to a system is the passwords. In the System hacking first the hacker will try to get in to the system.
  • 16.  Password Cracking: There are many methods for cracking the password and then get in to the system. The simplest method is to guess the password. But this is a tedious work. But in order to make this work easier there are many automated tools for password guessing like legion.  Privilege escalation Privilege escalation is the process of raising the privileges once the hacker gets in to the system The privilege escalation process usually uses the vulnerabilities present in the host operating system or the software. There are many tools like hk.exe, metasploit etc. One such community of hackers is the metasploit
  • 17.  Maintaining Access: Now the hacker is inside the system . This means that he is now in a position to upload some files and download some of them. The next aim will be to make an easier path to get in when he comes the next time. This is analogous to making a small hidden door in the building so that he can directly enter in to the building through the door easily  Clearing Tracks: Whenever a hacker downloads some file or installs some software, its log will be stored in the server logs. So in order to erase the hacker uses man tools. One such tool is windows resource kit’s auditpol.exe. Another tool which eliminates any physical evidence is the evidence eliminator.. The Evidence Eliminator deletes all such evidences.
  • 18. Ethical hacking tools: Ethical hackers utilize and have developed variety of tools intrude into different kinds of systems and to evaluate the security levels. The nature of these tools differs widely.
  • 19. Samspade: Samspade is a simple tool which provides us information about a particular host. This tool is very much helpful in finding the addresses, phone number etc
  • 20. Email Tracker and Visual Route:  Email tracker is a software which help us to find from which server the mail does actually came from. Every message we receive will have a header associated with It . The email tracker uses this header information for find location. Visual route is a tool which displays the location a particular server with the help of IP addresses. When we connect this with the email tracker we can find the server which actually sends the mail .
  • 21. Advantages and disadvantages: Ethical hacking nowadays is a backbone of network security .Each day its relevance is increasing ,the major pros & cons of ethical hacking Advantages  “To catch a thief you have to think like a thief”  Help in closing the open holes in the network  Provides security to banking and financial establishments  Prevents website defacements  An evolving technique
  • 22. Disadvantages  All depend upon the trustworthiness of the ethical hacker  Hiring professionals is expensive
  • 23. Future enhancements:  As it an evolving branch the scope of enhancement in technology is immense. No ethical hacker can ensure the system security by using the same technique repeatedly. He would He would have to improve , develop and explore new avenues repeatedly.  More enhanced software’s should be used for optimum protection . Tools used , need to be updated regularly and more efficient ones need to be developed
  • 24. Conclusion One of the main aim of the seminar is to make others understand that there are so many tools through which a hacker can get into a system. Its various perspectives. Student A student should understand that no software is made with zero Vulnerability. So while they are studying they should study the various possibilities and should study how to prevent that because they are the professionals of tomorrow
  • 25. Professionals Professionals should understand that business is directly related to security. So they should make new software with vulnerabilities as less as possible. if they are not aware of these then they won’t be cautions enough in security matters  In the preceding sections we saw the methodology of hacking, why should we aware of hacking and tools and some tools which a hacker may use . Now we can see what we can do against hacking or to protect ourselves from hacking .  the first thing is we should keep ourselves updated about those software's us and using for official and reliable sources .
  • 26. Educate employees and the users against black hacking. Use every possible security measures  Every time make our password strong by making it harder and longer to be cracked.
  • 27. REFERENCE  www.scribd.com  www.wikipedia/seminartopics/ethical haching.org  www. Seminarsonly/ethical hacking.com