SlideShare une entreprise Scribd logo
1  sur  22
What is hacking???
hacking facebook account???
hacking wifi??
hacking whatsapp??
hacking web site??
INTRODUCTION TO ETHICAL
HACKING
 understanding ethical hacking teminology :
 security
 hack value
 threat
 attack
 vulnerability
 exploit
 target of evaluation
 zero-day vulnerability
 daisy chainig
identifying different types of hacking
techologies
operating systems
applications
shirnk-wrap code
misconfigurations
social engineering
types of hacker
 white hats
 black hats
 Grey hats
 suicide hack
 hacktivism
 script kiddies
security consists of four basic element
confidentiality
authenticity
integrity
availability
penteration testing
types of vulnerabilities
 network service vulnerabilities
 web application vulnerabilities
 mobile application vulnerabilities
 local service vulnerabilities
 system vulnerabilities
 physical vulnerabilities
what is Backdoors?
A BACKDOOR IS A MEANS OF ACCESS TO A COMPUTER PROGRAM
THAT BYPASSES SECURITY MECHANISMS. A PROGRAMMER MAY
SOMETIMES INSTALL A BACKDOOR SO THAT THE PROGRAM CAN BE
ACCESSED FOR TROUBLESHOOTING OR OTHER PURPOSES.
HOWERVER, ATTACKERS OFTEN USE BACK DOORS THAT THEY
DETECT OR INSTALL THEMSELVES
A backdoor is a program or a set of related programs that a hacker installs
on
a target system to allow access to the system at a later time . A backdoor's
goal
is to remove the evidence if intial entry from the system's log files.
But a backdoor may also let a hacker retain access to a machine it has
penetrated even if
the intrusion has already been
detected and remedied by the system administrator
what is Trojan Horse?
 A Trojan is a malicious program disguised as something benign.
Trojans are often downloaded along with another program or software
package.
once installed on a system,they can cause data theft and loss, and
system crashes or
slowdowns,they can also be used as launching points for other attacks
such as distributed
denial of service (DDos).
Many trojans are used to manipulate files on the victim
computer,manage processe,
remotely run commands,intercept keystrokes,
list The Different Types of
Trojans
 Trojans can be created and used to perform different attacks.
some of the most common types of Trojans are:
 Remote Access Trojans (Rats)-- used to gain remote access to a
system
 Data-sending Trojans--used to find data on a system and deliver
data to a hacker
 Destructive Trojans--used to delete or corrupt files on a system
 Denial of service Trojans--used to launch a denial of service
attack
 Proxy Trojans-- used to tunnel traffic or launch hacking attacks
via other system
 ftp Trojans-- used to create an ftp server in order to copy files
into a system
 security software disabler Trojans--used to stop antivirus software
How Do Reverse-connecting trojans
work?
 Reverse-connecting trojans let an attacker access a machine on
the internal network from the outside, the hacker can install a simple
trojan program on a system on the internal network,such as the reverse
www shell server.on a regular basis (usually erver 60 seconds) the internal
server tries to access the external master system to pick up
commands. if the attacker typed something into the master system , this
coomend
is etrieved and excuted on the interal system , reverse www shell uses
standard http. it's
dangerous because it's difficult to detect. it look like a client is
browsing the web from the internal network.
what is sniffers?
 A sniffer can br a packer-capturing or frame-capturing tool it
intercepts traffic on the network and displays it in either a command-line
or Gui format for a hacker to view.
Sniffers are used to capture traffic sent between two systems. Depending
on how the sniffer is used and the security measures in place. a hacker
can use a sniffer to discover usernames , passwords, and other
confidential
information transmitted on the network. several hacking attacks and
various hacking tools require the use if a sniffer to obtian important
information sent from target system. This chapter will describe how
sniffers work and identify the most common sniffer hacking tools.
Hub vs switch
understand arp poisoning
 arp allows the network to translate ip addresses into mac addresses
when one host using tcp/ip on a lan tries to contact another it needs the
mac address or hardware address if the host it's trying to reach
arp poisoning is a technique that's used to attack an ethernet
network and that may let an attacker sniff data frames on a switched lan
or stop the traffic altogether, arp poisoning utilizes arp spoofing where
the purpose is to send fake or spoofed arp messages to an ethernet lan.
arp spoofing tools
arpspoof -i eth0 -t (target ip) (router ip)
understand Man in The middle attack
 the man in the middle attack intercapts a communication between two
systems.
for example in an http transaction the target in the TCp connection
between client and server.
Using different rechniques, the attacjer splits the original TCP connection
into 2 new connections, one between the client and the attacker and the
other
between the attacker and the server, as shown in figure 1 . once the tcp
connection is intercepted,the attacker acts as a proxy , being able to read,
insert and modify th data in intercepted communication.
 mitm attack tools
Ettercap
Dsniff
cain & Abel
DHCP ATTACK
HOW DO DHCP SERVER ATTACK
what is phishing?
 a form of social engineering characterized by attempts to fraudulently
acquire
sensitive information, such as password and credit card details, by
masquerading as a trustworthy person or business in an
apparently official electronic communication, such as an email or an
instant message.
The term phishingarises from the use of increasingly sophisticated lures to
"fish"
for user's financial information and passwords
Understand DNS Cache Poisoning
 DNS spoofing is a computer hacking attack,
whereby data is introduced into a Domian Name System (DNS)
name server's cache database ,causing the name server
to return an incorrect ip address,
diverting traffic to another computer(often the attacker's).
understand web server
 The primary function of a web server is to cater web page to the requset
of clients using the hypertext tansfer protocol (HTTP).
This means delivery of HTML documents and any additional content that may by
included by
a document, such as images, style sheets and scripts
A user agent , commonly a web browser or web crawler, initiates communication by
making a requset for a specific resource using HTTP
and the server responds with the content of that resource or an error message
if unable to do so. The resource is typically a real file on the server's
secondary storage, but this is not necessarily the case and depends on how the web
server is implemented.
understand Http Requset and Response
web application vulnerabilities
 sql injection
 cross site scripting(xss)
 remote code execution
 local file include (lfi(
 remote file include (rfi(
 cross site request forgery (csrf(
 session hijacking

Contenu connexe

Tendances

Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 

Tendances (20)

Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Hackers
HackersHackers
Hackers
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of Hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 

Similaire à Introduction Ethical hacking by eslam hussein

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
jibinmanjooran
 

Similaire à Introduction Ethical hacking by eslam hussein (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 
Cyber security
Cyber security Cyber security
Cyber security
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Security threats
Security threatsSecurity threats
Security threats
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 

Dernier

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 

Dernier (20)

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Introduction Ethical hacking by eslam hussein

  • 1. What is hacking??? hacking facebook account??? hacking wifi?? hacking whatsapp?? hacking web site??
  • 2. INTRODUCTION TO ETHICAL HACKING  understanding ethical hacking teminology :  security  hack value  threat  attack  vulnerability  exploit  target of evaluation  zero-day vulnerability  daisy chainig
  • 3. identifying different types of hacking techologies operating systems applications shirnk-wrap code misconfigurations social engineering
  • 4. types of hacker  white hats  black hats  Grey hats  suicide hack  hacktivism  script kiddies
  • 5. security consists of four basic element confidentiality authenticity integrity availability
  • 7. types of vulnerabilities  network service vulnerabilities  web application vulnerabilities  mobile application vulnerabilities  local service vulnerabilities  system vulnerabilities  physical vulnerabilities
  • 8. what is Backdoors? A BACKDOOR IS A MEANS OF ACCESS TO A COMPUTER PROGRAM THAT BYPASSES SECURITY MECHANISMS. A PROGRAMMER MAY SOMETIMES INSTALL A BACKDOOR SO THAT THE PROGRAM CAN BE ACCESSED FOR TROUBLESHOOTING OR OTHER PURPOSES. HOWERVER, ATTACKERS OFTEN USE BACK DOORS THAT THEY DETECT OR INSTALL THEMSELVES A backdoor is a program or a set of related programs that a hacker installs on a target system to allow access to the system at a later time . A backdoor's goal is to remove the evidence if intial entry from the system's log files. But a backdoor may also let a hacker retain access to a machine it has penetrated even if the intrusion has already been detected and remedied by the system administrator
  • 9. what is Trojan Horse?  A Trojan is a malicious program disguised as something benign. Trojans are often downloaded along with another program or software package. once installed on a system,they can cause data theft and loss, and system crashes or slowdowns,they can also be used as launching points for other attacks such as distributed denial of service (DDos). Many trojans are used to manipulate files on the victim computer,manage processe, remotely run commands,intercept keystrokes,
  • 10. list The Different Types of Trojans  Trojans can be created and used to perform different attacks. some of the most common types of Trojans are:  Remote Access Trojans (Rats)-- used to gain remote access to a system  Data-sending Trojans--used to find data on a system and deliver data to a hacker  Destructive Trojans--used to delete or corrupt files on a system  Denial of service Trojans--used to launch a denial of service attack  Proxy Trojans-- used to tunnel traffic or launch hacking attacks via other system  ftp Trojans-- used to create an ftp server in order to copy files into a system  security software disabler Trojans--used to stop antivirus software
  • 11. How Do Reverse-connecting trojans work?  Reverse-connecting trojans let an attacker access a machine on the internal network from the outside, the hacker can install a simple trojan program on a system on the internal network,such as the reverse www shell server.on a regular basis (usually erver 60 seconds) the internal server tries to access the external master system to pick up commands. if the attacker typed something into the master system , this coomend is etrieved and excuted on the interal system , reverse www shell uses standard http. it's dangerous because it's difficult to detect. it look like a client is browsing the web from the internal network.
  • 12. what is sniffers?  A sniffer can br a packer-capturing or frame-capturing tool it intercepts traffic on the network and displays it in either a command-line or Gui format for a hacker to view. Sniffers are used to capture traffic sent between two systems. Depending on how the sniffer is used and the security measures in place. a hacker can use a sniffer to discover usernames , passwords, and other confidential information transmitted on the network. several hacking attacks and various hacking tools require the use if a sniffer to obtian important information sent from target system. This chapter will describe how sniffers work and identify the most common sniffer hacking tools.
  • 14. understand arp poisoning  arp allows the network to translate ip addresses into mac addresses when one host using tcp/ip on a lan tries to contact another it needs the mac address or hardware address if the host it's trying to reach arp poisoning is a technique that's used to attack an ethernet network and that may let an attacker sniff data frames on a switched lan or stop the traffic altogether, arp poisoning utilizes arp spoofing where the purpose is to send fake or spoofed arp messages to an ethernet lan. arp spoofing tools arpspoof -i eth0 -t (target ip) (router ip)
  • 15. understand Man in The middle attack  the man in the middle attack intercapts a communication between two systems. for example in an http transaction the target in the TCp connection between client and server. Using different rechniques, the attacjer splits the original TCP connection into 2 new connections, one between the client and the attacker and the other between the attacker and the server, as shown in figure 1 . once the tcp connection is intercepted,the attacker acts as a proxy , being able to read, insert and modify th data in intercepted communication.  mitm attack tools Ettercap Dsniff cain & Abel
  • 17. HOW DO DHCP SERVER ATTACK
  • 18. what is phishing?  a form of social engineering characterized by attempts to fraudulently acquire sensitive information, such as password and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an email or an instant message. The term phishingarises from the use of increasingly sophisticated lures to "fish" for user's financial information and passwords
  • 19. Understand DNS Cache Poisoning  DNS spoofing is a computer hacking attack, whereby data is introduced into a Domian Name System (DNS) name server's cache database ,causing the name server to return an incorrect ip address, diverting traffic to another computer(often the attacker's).
  • 20. understand web server  The primary function of a web server is to cater web page to the requset of clients using the hypertext tansfer protocol (HTTP). This means delivery of HTML documents and any additional content that may by included by a document, such as images, style sheets and scripts A user agent , commonly a web browser or web crawler, initiates communication by making a requset for a specific resource using HTTP and the server responds with the content of that resource or an error message if unable to do so. The resource is typically a real file on the server's secondary storage, but this is not necessarily the case and depends on how the web server is implemented.
  • 21. understand Http Requset and Response
  • 22. web application vulnerabilities  sql injection  cross site scripting(xss)  remote code execution  local file include (lfi(  remote file include (rfi(  cross site request forgery (csrf(  session hijacking