SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
Presented to ATMIYA University
ethical
/ˈɛθɪk(ə)l/
adjective
relating to moral principles or the
branch of knowledge
dealing with these.
Krutarth Vasavada
• B.E. (Electronics and Communication), AITS 2002-06
• M.S. (Computer Engineering), San Jose State University,
California, US
• Certified Cloud Security Professional, ISC2
• 13+ Years into Software Product Development,
Cybersecurity, Information Security Audits, Data
Privacy & Compliance
• Worked in India, USA, EU (currently) in Automobile,
Chemicals, Insurance, Investment Banking, and e-
Commerce domains.
Topics
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why hack(ing)?
03
Type of attacks
04
Cause of attacks
05
Prevention
06
Career
Opportunities
07
Let’s Refresh: Why Cybersecurity?
CONFIDENTIALITY
Unauthorized individuals or
entities can not get any
information that is not intended
for them.
INTEGRITY
The accuracy and
completeness of data must be
assured.
AVAILABILITY
It must be ensured that vital
information is available
whenever needed.
Let’s Refresh: How are we dealing with cyber
attacks?
To be honest, pretty badly! Here’s the list of data breaches occurred during the year 2020 so far.
Next Topic
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why hack(ing)?
03
Type of attacks
04
Cause of attacks
05
Prevention
06
Career
Opportunities
07
What is Hacking?
Hacking is an attempt to exploit
a computer system or a private
network.
In simple words, it is the
unauthorized access made
over computer network security
systems for some illicit / illegal
purpose.
What is Ethical Hacking?
Ethical Hacking is an attempt to
exploit a computer system or a
private network.
In simple words, it is the
unauthorized access made
over computer network security
systems for some illicit / illegal
known / valid / approved
purpose.
Characteristics of Ethical Hacking
• Target is almost always known
• Identity of technical professionals involved
is known to some extent
• Neither the target system is damaged, nor
information is stolen
• Vulnerabilities are always reported back to
the owner(s)
Who is an ethical hacker?
Person who is
• interested in cybersecurity
• keen to explore various computer networks
• aware of damage a security loophole can cause
• interested in improving overall security of the
target system
Remember, being motivated by monitory reasons is
NOT a bad thing for an ethical hacker.
Next Topic
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why
hack(ing)?
03
Type of attacks
04
Cause of attacks
05
Prevention
06
Career
Opportunities
07
Who is interested in hacking – ethically or
otherwise?
Individuals
Corporations
Governments
Why to hack – ethically or otherwise?
Many reasons
• Steal information
• Earn money (not always a bad thing!)
• Just for fun!
• Attack enemy system/company/country/ideology
• To understand the current security status of the
system
• To remain secure
Next Topic
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why hack(ing)?
03
Type of
attacks
04
Cause of attacks
05
Prevention
06
Career
Opportunities
07
Hacking Attack
Success, scale, and impact of any hacking attempt
depends on three things.
Exploitability – How easy the system is to exploit?
Prevalence – How widespread/prevalent the
system and vulnerability are?
Detectability – How easy it is to detect the intended
security defect?
Type of Vulnerabilities
Before understanding type of attacks, it is important
to understand type of vulnerabilities.
Let’s go the most trusted industry standard
resource:
Open Web Application Security Project (OWASP)
Commonly Known Cybersecurity Attacks
Denial-of-service (DoS)
and distributed denial-
of-service (DDoS)
Man-in-the-middle
(MitM)
Phishing Drive-by attack
Identity Theft SQL Injection
Cross-site scripting
(XSS)
Eavesdropping
Malware/Ransomware
Next Topic
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why hack(ing)?
03
Type of attacks
04
Cause of
attacks
05
Prevention
06
Career
Opportunities
07
How an attack is caused?
Footprinting
Sniffing
Fingerprinting
DNS Poisoning
Social Engineering
Password Hacking
Attack type: Footprinting
In this type of attack, a hacker attempts to gather
something information around
• Domain name
• IP Addresses
• Namespaces
• Employee information
• Phone numbers
• E-mails
• Job Information
Depending on type of the target system, this can be very
crucial or not-so-crucial information.
Attack type: Sniffing
Sniffing is the process of monitoring and capturing all the packets passing
through a given network using sniffing tools.
It is a form of “tapping phone wires” and get to know about the
conversation. It is also called wiretapping applied to the computer
networks.
One can sniff the following sensitive information from a network −
Email traffic
FTP passwords
Web traffics
Telnet passwords
Router configuration
Chat sessions
DNS traffic
Attack type: Fingerprinting
Active Fingerprinting
Active fingerprinting is accomplished by sending specially
crafted packets to a target machine and then noting down
its response and analyzing the gathered information to
determine the target OS.
Passive Fingerprinting
Passive fingerprinting is based on sniffer traces from the
remote system. Based on the sniffer traces (such as
Wireshark) of the packets, you can determine the operating
system of the remote host.
Attack type: DNS Poisoning
DNS Poisoning is a technique that tricks a DNS server into
believing that it has received authentic information when, in
reality, it has not. It results in the substitution of false IP
address at the DNS level where web addresses are
converted into numeric IP addresses.
DNS poisoning is used to redirect the users to fake pages
which are managed by the attackers.
Attack type: Social Engineering
A phishing attack is a computer-based social engineering,
where an attacker crafts an email that appears legitimate.
Such emails have the same look and feel as those received
from the original site, but they might contain links to fake
websites. If you are not careful enough, then you will type
your user ID and password and will try to login which will
result in failure and by that time, the attacker will have your
ID and password to attack your original account.
Attack type: Password/Dictionary Hacking
In a dictionary attack, the hacker uses a predefined list of
words from a dictionary to try and guess the password. If
the set password is weak, then a dictionary attack can
decode it quite fast.
Topics
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why hack(ing)?
03
Type of attacks
04
Cause of attacks
05
Prevention
06
Career
Opportunities
07
How to prevent attacks
Question: Is it possible to be 100% secure?
Answer: It depends.
Answer Explanation: Don’t put a $10 lock on a $5 bicycle!
How to prevent attacks
Each attack requires unique approach in averting them.
Multiple factors contribute in determining the course of
action.
• Tactical Fix or Strategic Solution?
• Impacted target audience?
• Geography?
• Functional area/Domain?
• Historical trends? etc.
How to prevent attacks
Good News – Ethical Hackers Can Help!
• Know their subject
• Understand impact of an attack
• Aware of known vulnerabilities
• Wide range of tools/technology to choose from
• Most importantly – no malicious intention
Remember…
The more you sweat in peace,
the less you bleed in war!
Ethical hacking is a proactive and preventive measure
Next Topic
Let’s Refresh
01
What is hacking?
– Ethical /
Unethical
02
Why hack(ing)?
03
Type of attacks
04
Cause of attacks
05
Prevention
06
Career
Opportunities
07
What are the skills needed?
computer systems expertise
strong programming skills
computer networking knowledge
patience
Which tools* can help me?
nmap
burp suite
etherpeak
qualysguard
webinspect
postman
etc.
* there can never be an exhaustive or a definitive tool list. Consider these as a
recommendation to start with.
How to avail career opportunities?
Step 1
•Obtain a Bachelor’s degree in Computer Science (or, similar) or A+ Certification
•Gain an understanding of the most common hardware and software technologies.
Step 2
•Get into a programmer’s role for a few years
Step 3
•Proceed to get network certifications or security certification
Step 4
•Keep going through various books, tutorials and papers to understand various computer security aspects
Step 5
•Master the art of penetration testing, footprinting and reconnaissance, and social engineering.
Step 6
•Certified Ethical Hacker (CEH) Certification
In conclusion
“Government agencies and business organizations
today are in constant need of ethical hackers to
combat the growing threat to IT security. A lot of
government agencies, professionals and
corporations now understand that if you want to
protect a system, you cannot do it by just locking
your doors”
EC-Council
Questions?
Thank you!

Contenu connexe

Tendances

Tendances (20)

Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking
HackingHacking
Hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 

Similaire à Ethical Hacking by Krutarth Vasavada

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
uzair
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
Steve Lodin
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
UISGCON
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
rajkumar jonuboyena
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
amrutharam
 

Similaire à Ethical Hacking by Krutarth Vasavada (20)

Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptx
 
CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Think Like a Bad Guy "Hacker" - Change the game to proactively protect your ...
Think Like a Bad Guy "Hacker" -  Change the game to proactively protect your ...Think Like a Bad Guy "Hacker" -  Change the game to proactively protect your ...
Think Like a Bad Guy "Hacker" - Change the game to proactively protect your ...
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 

Dernier

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 

Dernier (20)

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 

Ethical Hacking by Krutarth Vasavada

  • 1. Presented to ATMIYA University ethical /ˈɛθɪk(ə)l/ adjective relating to moral principles or the branch of knowledge dealing with these.
  • 2. Krutarth Vasavada • B.E. (Electronics and Communication), AITS 2002-06 • M.S. (Computer Engineering), San Jose State University, California, US • Certified Cloud Security Professional, ISC2 • 13+ Years into Software Product Development, Cybersecurity, Information Security Audits, Data Privacy & Compliance • Worked in India, USA, EU (currently) in Automobile, Chemicals, Insurance, Investment Banking, and e- Commerce domains.
  • 3. Topics Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 4. Let’s Refresh: Why Cybersecurity? CONFIDENTIALITY Unauthorized individuals or entities can not get any information that is not intended for them. INTEGRITY The accuracy and completeness of data must be assured. AVAILABILITY It must be ensured that vital information is available whenever needed.
  • 5. Let’s Refresh: How are we dealing with cyber attacks? To be honest, pretty badly! Here’s the list of data breaches occurred during the year 2020 so far.
  • 6. Next Topic Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 7. What is Hacking? Hacking is an attempt to exploit a computer system or a private network. In simple words, it is the unauthorized access made over computer network security systems for some illicit / illegal purpose.
  • 8. What is Ethical Hacking? Ethical Hacking is an attempt to exploit a computer system or a private network. In simple words, it is the unauthorized access made over computer network security systems for some illicit / illegal known / valid / approved purpose.
  • 9. Characteristics of Ethical Hacking • Target is almost always known • Identity of technical professionals involved is known to some extent • Neither the target system is damaged, nor information is stolen • Vulnerabilities are always reported back to the owner(s)
  • 10. Who is an ethical hacker? Person who is • interested in cybersecurity • keen to explore various computer networks • aware of damage a security loophole can cause • interested in improving overall security of the target system Remember, being motivated by monitory reasons is NOT a bad thing for an ethical hacker.
  • 11. Next Topic Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 12. Who is interested in hacking – ethically or otherwise? Individuals Corporations Governments
  • 13. Why to hack – ethically or otherwise? Many reasons • Steal information • Earn money (not always a bad thing!) • Just for fun! • Attack enemy system/company/country/ideology • To understand the current security status of the system • To remain secure
  • 14. Next Topic Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 15. Hacking Attack Success, scale, and impact of any hacking attempt depends on three things. Exploitability – How easy the system is to exploit? Prevalence – How widespread/prevalent the system and vulnerability are? Detectability – How easy it is to detect the intended security defect?
  • 16. Type of Vulnerabilities Before understanding type of attacks, it is important to understand type of vulnerabilities. Let’s go the most trusted industry standard resource: Open Web Application Security Project (OWASP)
  • 17. Commonly Known Cybersecurity Attacks Denial-of-service (DoS) and distributed denial- of-service (DDoS) Man-in-the-middle (MitM) Phishing Drive-by attack Identity Theft SQL Injection Cross-site scripting (XSS) Eavesdropping Malware/Ransomware
  • 18. Next Topic Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 19. How an attack is caused? Footprinting Sniffing Fingerprinting DNS Poisoning Social Engineering Password Hacking
  • 20. Attack type: Footprinting In this type of attack, a hacker attempts to gather something information around • Domain name • IP Addresses • Namespaces • Employee information • Phone numbers • E-mails • Job Information Depending on type of the target system, this can be very crucial or not-so-crucial information.
  • 21. Attack type: Sniffing Sniffing is the process of monitoring and capturing all the packets passing through a given network using sniffing tools. It is a form of “tapping phone wires” and get to know about the conversation. It is also called wiretapping applied to the computer networks. One can sniff the following sensitive information from a network − Email traffic FTP passwords Web traffics Telnet passwords Router configuration Chat sessions DNS traffic
  • 22. Attack type: Fingerprinting Active Fingerprinting Active fingerprinting is accomplished by sending specially crafted packets to a target machine and then noting down its response and analyzing the gathered information to determine the target OS. Passive Fingerprinting Passive fingerprinting is based on sniffer traces from the remote system. Based on the sniffer traces (such as Wireshark) of the packets, you can determine the operating system of the remote host.
  • 23. Attack type: DNS Poisoning DNS Poisoning is a technique that tricks a DNS server into believing that it has received authentic information when, in reality, it has not. It results in the substitution of false IP address at the DNS level where web addresses are converted into numeric IP addresses. DNS poisoning is used to redirect the users to fake pages which are managed by the attackers.
  • 24. Attack type: Social Engineering A phishing attack is a computer-based social engineering, where an attacker crafts an email that appears legitimate. Such emails have the same look and feel as those received from the original site, but they might contain links to fake websites. If you are not careful enough, then you will type your user ID and password and will try to login which will result in failure and by that time, the attacker will have your ID and password to attack your original account.
  • 25. Attack type: Password/Dictionary Hacking In a dictionary attack, the hacker uses a predefined list of words from a dictionary to try and guess the password. If the set password is weak, then a dictionary attack can decode it quite fast.
  • 26. Topics Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 27. How to prevent attacks Question: Is it possible to be 100% secure? Answer: It depends. Answer Explanation: Don’t put a $10 lock on a $5 bicycle!
  • 28. How to prevent attacks Each attack requires unique approach in averting them. Multiple factors contribute in determining the course of action. • Tactical Fix or Strategic Solution? • Impacted target audience? • Geography? • Functional area/Domain? • Historical trends? etc.
  • 29. How to prevent attacks Good News – Ethical Hackers Can Help! • Know their subject • Understand impact of an attack • Aware of known vulnerabilities • Wide range of tools/technology to choose from • Most importantly – no malicious intention
  • 30. Remember… The more you sweat in peace, the less you bleed in war! Ethical hacking is a proactive and preventive measure
  • 31. Next Topic Let’s Refresh 01 What is hacking? – Ethical / Unethical 02 Why hack(ing)? 03 Type of attacks 04 Cause of attacks 05 Prevention 06 Career Opportunities 07
  • 32. What are the skills needed? computer systems expertise strong programming skills computer networking knowledge patience
  • 33. Which tools* can help me? nmap burp suite etherpeak qualysguard webinspect postman etc. * there can never be an exhaustive or a definitive tool list. Consider these as a recommendation to start with.
  • 34. How to avail career opportunities? Step 1 •Obtain a Bachelor’s degree in Computer Science (or, similar) or A+ Certification •Gain an understanding of the most common hardware and software technologies. Step 2 •Get into a programmer’s role for a few years Step 3 •Proceed to get network certifications or security certification Step 4 •Keep going through various books, tutorials and papers to understand various computer security aspects Step 5 •Master the art of penetration testing, footprinting and reconnaissance, and social engineering. Step 6 •Certified Ethical Hacker (CEH) Certification
  • 35. In conclusion “Government agencies and business organizations today are in constant need of ethical hackers to combat the growing threat to IT security. A lot of government agencies, professionals and corporations now understand that if you want to protect a system, you cannot do it by just locking your doors” EC-Council