SlideShare une entreprise Scribd logo
1  sur  15
E t h ic a l
H a c k in g
HACKING
PREHISTORY                          ►   Draper builds a "blue box"
► 1960s: The Dawn of                    used with whistle allows
  Hacking                               phreaks to make free calls.
  Original meaning of the word      ►   Steve Wozniak and Steve
  "hack" started at MIT; meant          Jobs, future founders of
  elegant, witty or inspired way        Apple Computer, make and
  of doing almost anything;             sell blue boxes.
  hacks were programming                THE GOLDEN AGE
  shortcuts                             (1980-1991)
ELDER DAYS (1970-1979)              ►   1980: Hacker Message
► 1970s: Phone Phreaks and              Boards and Groups
  Cap'n Crunch: One phreak,             Hacking groups form; such as
  John Draper (aka "Cap'n               Legion of Doom (US), Chaos
  Crunch"), discovers a toy             Computer Club (Germany).
  whistle inside Cap'n Crunch       ►   1983: Kids' Games
  cereal gives 2600-hertz signal,       Movie "War Games"
  and can access AT&T's long-           introduces public to hacking.
  distance switching system.
THE GREAT HACKER WAR              ►   1989: The Germans ,
► Legion of Doom vs Masters           the KGB and Kevin
  of Deception; online warfare;       Mitnick.
  jamming phone lines.            ►   German Hackers
► 1984: Hacker 'Zines                 arrested for breaking into
  Hacker magazine 2600                U.S. computers; sold
  publication; online 'zine           information to Soviet KGB.
  Phrack.                         ►   Hacker "The Mentor“
CRACKDOWN (1986-1994)                 arrested; publishes
► 1986: Congress passes               Hacker's Manifesto.
  Computer Fraud and Abuse        ►   Kevin Mitnick convicted;
  Act; crime to break into            first person convicted
  computer systems.                   under law against gaining
► 1988: The Morris Worm               access to interstate
                                      network for criminal
  Robert T. Morris, Jr., launches     purposes.
  self-replicating worm on
  ARPAnet.
Ethical Hacking
► Independent   computer security
  Professionals breaking into the
  computer systems.
► Neither damage the target systems
  nor steal information.
► Evaluate target systems security and
  report back to owners about the
  vulnerabilities found.
Ethical Hackers but not Criminal
            Hackers
 ► Completely   trustworthy.
 ► Strong programming and computer
   networking skills.
 ► Learn about the system and trying to
   find its weaknesses.
 ► Techniques of Criminal hackers-
   Detection-Prevention.
 ► Published research papers or released
   security software.
 ► No Ex-hackers.
Being Prepared
►    What can an intruder see on the target systems?
►    What can an intruder do with that information?
►    Does anyone at the target notice the intruder's attempts or
     successes?


6.   What are you trying to protect?
7.   Who are you trying to protect against?
8.   How much time, effort, and money are you willing to
     expend to obtain adequate protection?
Ethical Hacker’s Prospective
►   Ethical Hacker’s demand a lot of time and
    persistence.
►   Security evaluation plan
        1.   Identify system to be tested
        2.   How to test?
        3.   Limitations on that testing
►   Evaluation done under a “no-holds-barred”
    approach.
►   Clients should be aware of risks.
►   Limit prior knowledge of test.
Required Skills of an Ethical
               Hacker
►   Routers: knowledge of routers, routing protocols, and
    access control lists
►   Microsoft: skills in operation, configuration and
    management.
►   Linux: knowledge of Linux/Unix; security setting,
    configuration, and services.
►   Firewalls: configurations, and operation of intrusion
    detection systems.
►   Mainframes
►   Network Protocols: TCP/IP; how they function and can
    be manipulated.
►   Project Management: knowledge of leading, planning,
    organizing, and controlling a penetration testing team.
Kinds of Testing
► Remote   Network
► Remote dial-up network
► Local network
► Stolen laptop computer
► Social engineering
► Physical entry


1.Total outsider
2.Semi-outsider
3.Valid user
REVIEW
Therefore Ethical Hackers and Network
Security experts are highly required as well
as demanded by many organization’s for the
security of their own data, if it fell in the
wrong hands a competitor might use it for
corporate espionage, a hacker might use it
to break into the client’s computers, or a
prankster might just post the report’s
contents on the Web as a joke.
Ethical hacking

Contenu connexe

Tendances

What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 

Tendances (20)

What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 

Similaire à Ethical hacking

Similaire à Ethical hacking (20)

Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lecture
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Hacking
HackingHacking
Hacking
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
Hacking
HackingHacking
Hacking
 
hacking
hackinghacking
hacking
 
Hacking
HackingHacking
Hacking
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 

Dernier

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Dernier (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Ethical hacking

  • 1. E t h ic a l H a c k in g
  • 3. PREHISTORY ► Draper builds a "blue box" ► 1960s: The Dawn of used with whistle allows Hacking phreaks to make free calls. Original meaning of the word ► Steve Wozniak and Steve "hack" started at MIT; meant Jobs, future founders of elegant, witty or inspired way Apple Computer, make and of doing almost anything; sell blue boxes. hacks were programming THE GOLDEN AGE shortcuts (1980-1991) ELDER DAYS (1970-1979) ► 1980: Hacker Message ► 1970s: Phone Phreaks and Boards and Groups Cap'n Crunch: One phreak, Hacking groups form; such as John Draper (aka "Cap'n Legion of Doom (US), Chaos Crunch"), discovers a toy Computer Club (Germany). whistle inside Cap'n Crunch ► 1983: Kids' Games cereal gives 2600-hertz signal, Movie "War Games" and can access AT&T's long- introduces public to hacking. distance switching system.
  • 4. THE GREAT HACKER WAR ► 1989: The Germans , ► Legion of Doom vs Masters the KGB and Kevin of Deception; online warfare; Mitnick. jamming phone lines. ► German Hackers ► 1984: Hacker 'Zines arrested for breaking into Hacker magazine 2600 U.S. computers; sold publication; online 'zine information to Soviet KGB. Phrack. ► Hacker "The Mentor“ CRACKDOWN (1986-1994) arrested; publishes ► 1986: Congress passes Hacker's Manifesto. Computer Fraud and Abuse ► Kevin Mitnick convicted; Act; crime to break into first person convicted computer systems. under law against gaining ► 1988: The Morris Worm access to interstate network for criminal Robert T. Morris, Jr., launches purposes. self-replicating worm on ARPAnet.
  • 5.
  • 6.
  • 7.
  • 8. Ethical Hacking ► Independent computer security Professionals breaking into the computer systems. ► Neither damage the target systems nor steal information. ► Evaluate target systems security and report back to owners about the vulnerabilities found.
  • 9. Ethical Hackers but not Criminal Hackers ► Completely trustworthy. ► Strong programming and computer networking skills. ► Learn about the system and trying to find its weaknesses. ► Techniques of Criminal hackers- Detection-Prevention. ► Published research papers or released security software. ► No Ex-hackers.
  • 10. Being Prepared ► What can an intruder see on the target systems? ► What can an intruder do with that information? ► Does anyone at the target notice the intruder's attempts or successes? 6. What are you trying to protect? 7. Who are you trying to protect against? 8. How much time, effort, and money are you willing to expend to obtain adequate protection?
  • 11. Ethical Hacker’s Prospective ► Ethical Hacker’s demand a lot of time and persistence. ► Security evaluation plan 1. Identify system to be tested 2. How to test? 3. Limitations on that testing ► Evaluation done under a “no-holds-barred” approach. ► Clients should be aware of risks. ► Limit prior knowledge of test.
  • 12. Required Skills of an Ethical Hacker ► Routers: knowledge of routers, routing protocols, and access control lists ► Microsoft: skills in operation, configuration and management. ► Linux: knowledge of Linux/Unix; security setting, configuration, and services. ► Firewalls: configurations, and operation of intrusion detection systems. ► Mainframes ► Network Protocols: TCP/IP; how they function and can be manipulated. ► Project Management: knowledge of leading, planning, organizing, and controlling a penetration testing team.
  • 13. Kinds of Testing ► Remote Network ► Remote dial-up network ► Local network ► Stolen laptop computer ► Social engineering ► Physical entry 1.Total outsider 2.Semi-outsider 3.Valid user
  • 14. REVIEW Therefore Ethical Hackers and Network Security experts are highly required as well as demanded by many organization’s for the security of their own data, if it fell in the wrong hands a competitor might use it for corporate espionage, a hacker might use it to break into the client’s computers, or a prankster might just post the report’s contents on the Web as a joke.