SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
Code Of Ethics
Instructor :Syed Hassan “Adlyar”
7th Semester
15th April 2017
Prepared By: Masihuallah Karimi Ethical Hacking
Ethical Hacking
Prepared By: Masihuallah Karimi
Outline
What is Hacking
History Of Hacking
Types Of Hacking
Who is Hacker?
Types Of Hackers
Introduction & Definition Of Ethical Hacking
What Do Ethical Hackers Do?
Goals Attackers Try to Achieve
An Ethical Hacker’s Skill Set
Ethical Hacking Terminology
The Phases of Ethical Hacking
Identifying Types of Ethical Hacks
Prepared By: Masihuallah Karimi
What is Hacking
act of illegally entering a computer system, and making unauthorized changes to the files and
data contain within.
The Process of attempting to gain or successfully gaining, unauthorized access to computer
resources is called Hacking
Prepared By: Masihuallah Karimi
History Of Hacking
Hacking has been a part of computing for more then a century.
The first computer hacker emerged at MIT University in 1960.
University facilities with huge mainframe computers , like MIT’s artificial intelligence lab,
become staging grounds for hackers. At first, “hacker ” was a positive term for a person with a
mastery of computers who could push programs beyond what the were designed to do.
Prepared By: Masihuallah Karimi
Types of Hacking
There are many types of hacking like below but we don’t focus on them we will introduce
Ethical hacking
Website Hacking
Network Hacking
Ethical Hacking
Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
Prepared By: Masihuallah Karimi
Who is a Hacker?
In the computer security context, a hacker is someone who seeks and exploits
weaknesses in a computer system or computer network.
any programming specialist who has expertise to enter computer network unauthorized.
Prepared By: Masihuallah Karimi
Who is a Hacker?
Prepared By: Masihuallah Karimi
Types Of Hackers?
Prepared By: Masihuallah Karimi
Hackers can be divided into three groups:
White Hats
 Black Hats
 Gray Hats
White Hats Hackers
Prepared By: Masihuallah Karimi
Ethical hackers usually fall into the white-hat category
White hats are the good guys, the ethical hackers who use their hacking skills for defensive
purposes.
White-hat hackers are usually security professionals with knowledge of hacking and the hacker
toolset and who use this knowledge to locate weaknesses and implement countermeasures.
White hats are those who hack with permission from the data owner.
Black Hats Hackers
Prepared By: Masihuallah Karimi
Black hats are the bad guys: the malicious hackers or crackers who use their skills for illegal or
malicious purposes.
They break System otherwise violate the system integrity of remote systems, with malicious
intent.
Having gained unauthorized access, black-hat hackers destroy vital data, deny legitimate users
service, and just cause problems for their targets
Grey Hats Hackers
Prepared By: Masihuallah Karimi
Gray hats are hackers who may work offensively or defensively, depending on the situation.
Gray-hat hackers may just be interested in hacking tools and technologies and are not malicious black
hats.
Gray hats are self-proclaimed ethical hackers, who are interested in hacker tools mostly from a curiosity
standpoint.
They may want to highlight security problems in a system or educate victims so they secure their
systems properly.
These hackers are doing their “victims” a favor.
Introduction to Ethical Hacking
Prepared By: Masihuallah Karimi
Ethical Hacking
Prepared By: Masihuallah Karimi
using the same software tools and techniques as malicious hackers to find the security
weakness in computer networks and systems.
Then I apply the necessary fix or patch to prevent the malicious hacker from gaining access to
the data.
ethical hackers must always act in a professional manner to differentiate themselves from
malicious hackers.
Gaining the trust of the client and taking all precautions to do no harm to their systems during
a test are critical to being a professional.
 Another key component of ethical hacking is to always gain permission from the data owner
prior to accessing the computer system.
What Do Ethical Hackers Do?
Prepared By: Masihuallah Karimi
Ethical hackers are motivated by different reasons, but their purpose is usually the same as
that of crackers: they’re trying to determine what an intruder can see on a targeted network or
system, and what the hacker can do with that information. This process of testing the security of
a system or network is known as a penetration test, or pen test.
Goals Attackers Try to Achieve
Prepared By: Masihuallah Karimi
Whether perpetuated by an ethical hacker or malicious hacker, all attacks are an attempt to
breach computer system security.
Security consists of four basic elements:
1. Confidentiality
2. Authenticity
3. Integrity
4. Availability
A hacker’s goal is to exploit vulnerabilities in a system or network to find a weakness in one or
more of the four elements of security.
Goals Attackers Try to Achieve
Prepared By: Masihuallah Karimi
For example, in performing a denial-of-service (DoS) attack, a hacker attacks the availability
elements of systems and networks.
Information theft, such as stealing passwords or other data as it travels in clear text across
trusted networks, is a confidentiality attack, because it allows someone other than the intended
recipient to gain access to the data.
Bit-flipping attacks are considered integrity attacks because the data may have been tampered
with in transit or at rest on computer systems; therefore, system administrators are unable to
verify the data is as the sender intended it.
MAC address spoofing is an authentication attack because it allows an unauthorized device to
connect to the network when Media Access Control (MAC) filtering is in place, such as on a
wireless network.
By spoofing the MAC address of a legitimate wireless station, an intruder can take on that
station’s identity and use the network.
An Ethical Hacker’s Skill Set
Prepared By: Masihuallah Karimi
Ethical hackers who stay a step ahead of malicious hackers must be computer systems experts
who are very knowledgeable about :
computer programming, networking, and operating systems.
In-depth knowledge about highly targeted platforms (such as Windows, Unix, and Linux) is also
a requirement.
Patience, persistence, and immense perseverance are important qualities for ethical hackers .
Networking, web programming, and database skills are all useful in performing ethical hacking
and vulnerability testing.
Most ethical hackers are knowledgeable about security areas and related issues but don’t
necessarily have a strong command of the countermeasures that can prevent attacks.
Ethical Hacking Terminology
Prepared By: Masihuallah Karimi
Being able to understand and define terminology is an important part of a CEH’s responsibility.
Threat : An environment or situation that could lead to a potential breach of security.
Exploit : A piece of software or technology that takes advantage of a bug, glitch, or
vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a
computer system.
Vulnerability : The existence of a software flaw, logic design, or implementation error that can
lead to an unexpected and undesirable event executing bad or damaging instructions to the
system.
Target of Evaluation (TOE) : A system, program, or network that is the subject of a security
analysis or attack. Ethical hackers are usually concerned with high-value TOEs, systems that
contain sensitive information such as account numbers, passwords, Social Security numbers, or
other confidential data
Ethical Hacking Terminology
Prepared By: Masihuallah Karimi
Attack : An attack occurs when a system is compromised based on a vulnerability.
The Phases of Ethical Hacking
Prepared By: Masihuallah Karimi
The process of ethical hacking can be broken down into five distinct phases.
Phases of hacking
The Phases of Ethical Hacking
Prepared By: Masihuallah Karimi
Phase 1: Reconnaissance
reconnaissance involves gathering information about a potential target without the targeted
individual’s or company’s knowledge.
reconnaissance can be as simple as watching a building to identify what time employees enter
the building and when they leave.
However, most reconnaissance is done sitting in front of a computer.
The Phases of Ethical Hacking
Prepared By: Masihuallah Karimi
Phase 2: Scanning
Scanning involves taking the information discovered during reconnaissance and using it to examine the network.
Tools that a hacker may employ during the scanning phase include
Dialers
Port scanners
Internet Control Message Protocol (ICMP) scanners
Ping sweeps
Network mappers
Vulnerability scanners
Hackers are seeking any information that can help them perpetrate an attack on a target, such as the following:
The Phases of Ethical Hacking
Prepared By: Masihuallah Karimi
Phase 2: Scanning
Hackers are seeking any information that can help them perpetrate an attack on a target, such as the
following:
 Computer names
 Operating system (OS)
 Installed software
 IP addresses
 User accounts
The Phases of Ethical Hacking
Prepared By: Masihuallah Karimi
Phase 3: Gaining Access
Phase 3 is when the real hacking takes place. Vulnerabilities exposed during the reconnaissance
and scanning phase are now exploited to gain access to the target system.
Phase 4: Maintaining Access
Once a hacker has gained access to a target system, they want to keep that access for future
exploitation and attacks. Sometimes, hackers harden the system from other hackers or security
personnel by securing their exclusive access with backdoors, rootkits, and Trojans.
The Phases of Ethical Hacking
Prepared By: Masihuallah Karimi
Phase 5: Covering Tracks
 Once hackers have been able to gain and maintain access, they cover their tracks to avoid
detection by security personnel, to continue to use the owned system, to remove evidence of
hacking, or to avoid legal action.
Hackers try to remove all traces of the attack, such as log files or intrusion detection system
(IDS) alarms.
Identifying Types of Ethical Hacks
Prepared By: Masihuallah Karimi
 Ethical hackers use many different methods to breach an organization’s security during a
simulated attack or penetration test.
Most ethical hackers have a specialty in one or a few of the following attack methods.
Here are the most common entry points for an attack:
Remote Network :
 A remote network hack attempts to simulate an intruder launching an
attack over the Internet.
The ethical hacker tries to break or find vulnerability in the outside defenses of the network,
such as firewall, proxy, or router vulnerabilities.
Identifying Types of Ethical Hacks
Prepared By: Masihuallah Karimi
Remote Dial-Up Network :
A remote dial-up network hack tries to simulate an intruder launching an attack against the
client’s modem pools.
Local Network :
A local area network (LAN) hack simulates someone with physical access gaining additional
unauthorized access using the local network.
The ethical hacker must gain direct access to the local network in order to launch this type of
attack.
Wireless LANs (WLANs) fall in this category and have added an entirely new avenue of attack as
radio waves travel through building structures.
Identifying Types of Ethical Hacks
Prepared By: Masihuallah Karimi
Stolen Equipment :
A stolen-equipment hack simulates theft of a critical information resource such as a laptop
owned by an employee.
Information such as usernames, passwords, security settings, and encryption types can be
gained by stealing a laptop.
Social Engineering :
A social-engineering attack checks the security and integrity of the organization’s employees by
using the telephone or face-to-face communication to gather information for use in an attack.
Social-engineering attacks can be used to acquire usernames, passwords, or other
organizational security measures.
Identifying Types of Ethical Hacks
Prepared By: Masihuallah Karimi
Physical Entry :
A physical-entry attack attempts to compromise the organization’s physical premises.
An ethical hacker who gains physical access can plant viruses, Trojans, rootkits, or hardware key
loggers (physical device used to record keystrokes) directly on systems in the target network.
THE END
Hacking and Ethical Hacking

Contenu connexe

Tendances

Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Simplilearn
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Penetration testing
Penetration testing Penetration testing
Penetration testing PTC
 
An Introduction to Ethical Hacking
An Introduction to Ethical HackingAn Introduction to Ethical Hacking
An Introduction to Ethical HackingVinny Vessel
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...Edureka!
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingRaghav Bisht
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacksSugirtha Jasmine M
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paperBilal Hameed
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 

Tendances (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Penetration testing
Penetration testing Penetration testing
Penetration testing
 
An Introduction to Ethical Hacking
An Introduction to Ethical HackingAn Introduction to Ethical Hacking
An Introduction to Ethical Hacking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 

Similaire à Hacking and Ethical Hacking

Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxAnshumaanTiwari2
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Mohammad Affan
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptxInfosectrain3
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 

Similaire à Hacking and Ethical Hacking (20)

Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Hacking
HackingHacking
Hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 

Dernier

FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 

Dernier (20)

FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 

Hacking and Ethical Hacking

  • 1. Code Of Ethics Instructor :Syed Hassan “Adlyar” 7th Semester 15th April 2017 Prepared By: Masihuallah Karimi Ethical Hacking
  • 2. Ethical Hacking Prepared By: Masihuallah Karimi
  • 3. Outline What is Hacking History Of Hacking Types Of Hacking Who is Hacker? Types Of Hackers Introduction & Definition Of Ethical Hacking What Do Ethical Hackers Do? Goals Attackers Try to Achieve An Ethical Hacker’s Skill Set Ethical Hacking Terminology The Phases of Ethical Hacking Identifying Types of Ethical Hacks Prepared By: Masihuallah Karimi
  • 4. What is Hacking act of illegally entering a computer system, and making unauthorized changes to the files and data contain within. The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking Prepared By: Masihuallah Karimi
  • 5. History Of Hacking Hacking has been a part of computing for more then a century. The first computer hacker emerged at MIT University in 1960. University facilities with huge mainframe computers , like MIT’s artificial intelligence lab, become staging grounds for hackers. At first, “hacker ” was a positive term for a person with a mastery of computers who could push programs beyond what the were designed to do. Prepared By: Masihuallah Karimi
  • 6. Types of Hacking There are many types of hacking like below but we don’t focus on them we will introduce Ethical hacking Website Hacking Network Hacking Ethical Hacking Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking Prepared By: Masihuallah Karimi
  • 7. Who is a Hacker? In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. any programming specialist who has expertise to enter computer network unauthorized. Prepared By: Masihuallah Karimi
  • 8. Who is a Hacker? Prepared By: Masihuallah Karimi
  • 9. Types Of Hackers? Prepared By: Masihuallah Karimi Hackers can be divided into three groups: White Hats  Black Hats  Gray Hats
  • 10. White Hats Hackers Prepared By: Masihuallah Karimi Ethical hackers usually fall into the white-hat category White hats are the good guys, the ethical hackers who use their hacking skills for defensive purposes. White-hat hackers are usually security professionals with knowledge of hacking and the hacker toolset and who use this knowledge to locate weaknesses and implement countermeasures. White hats are those who hack with permission from the data owner.
  • 11. Black Hats Hackers Prepared By: Masihuallah Karimi Black hats are the bad guys: the malicious hackers or crackers who use their skills for illegal or malicious purposes. They break System otherwise violate the system integrity of remote systems, with malicious intent. Having gained unauthorized access, black-hat hackers destroy vital data, deny legitimate users service, and just cause problems for their targets
  • 12. Grey Hats Hackers Prepared By: Masihuallah Karimi Gray hats are hackers who may work offensively or defensively, depending on the situation. Gray-hat hackers may just be interested in hacking tools and technologies and are not malicious black hats. Gray hats are self-proclaimed ethical hackers, who are interested in hacker tools mostly from a curiosity standpoint. They may want to highlight security problems in a system or educate victims so they secure their systems properly. These hackers are doing their “victims” a favor.
  • 13. Introduction to Ethical Hacking Prepared By: Masihuallah Karimi
  • 14. Ethical Hacking Prepared By: Masihuallah Karimi using the same software tools and techniques as malicious hackers to find the security weakness in computer networks and systems. Then I apply the necessary fix or patch to prevent the malicious hacker from gaining access to the data. ethical hackers must always act in a professional manner to differentiate themselves from malicious hackers. Gaining the trust of the client and taking all precautions to do no harm to their systems during a test are critical to being a professional.  Another key component of ethical hacking is to always gain permission from the data owner prior to accessing the computer system.
  • 15. What Do Ethical Hackers Do? Prepared By: Masihuallah Karimi Ethical hackers are motivated by different reasons, but their purpose is usually the same as that of crackers: they’re trying to determine what an intruder can see on a targeted network or system, and what the hacker can do with that information. This process of testing the security of a system or network is known as a penetration test, or pen test.
  • 16. Goals Attackers Try to Achieve Prepared By: Masihuallah Karimi Whether perpetuated by an ethical hacker or malicious hacker, all attacks are an attempt to breach computer system security. Security consists of four basic elements: 1. Confidentiality 2. Authenticity 3. Integrity 4. Availability A hacker’s goal is to exploit vulnerabilities in a system or network to find a weakness in one or more of the four elements of security.
  • 17. Goals Attackers Try to Achieve Prepared By: Masihuallah Karimi For example, in performing a denial-of-service (DoS) attack, a hacker attacks the availability elements of systems and networks. Information theft, such as stealing passwords or other data as it travels in clear text across trusted networks, is a confidentiality attack, because it allows someone other than the intended recipient to gain access to the data. Bit-flipping attacks are considered integrity attacks because the data may have been tampered with in transit or at rest on computer systems; therefore, system administrators are unable to verify the data is as the sender intended it. MAC address spoofing is an authentication attack because it allows an unauthorized device to connect to the network when Media Access Control (MAC) filtering is in place, such as on a wireless network. By spoofing the MAC address of a legitimate wireless station, an intruder can take on that station’s identity and use the network.
  • 18. An Ethical Hacker’s Skill Set Prepared By: Masihuallah Karimi Ethical hackers who stay a step ahead of malicious hackers must be computer systems experts who are very knowledgeable about : computer programming, networking, and operating systems. In-depth knowledge about highly targeted platforms (such as Windows, Unix, and Linux) is also a requirement. Patience, persistence, and immense perseverance are important qualities for ethical hackers . Networking, web programming, and database skills are all useful in performing ethical hacking and vulnerability testing. Most ethical hackers are knowledgeable about security areas and related issues but don’t necessarily have a strong command of the countermeasures that can prevent attacks.
  • 19. Ethical Hacking Terminology Prepared By: Masihuallah Karimi Being able to understand and define terminology is an important part of a CEH’s responsibility. Threat : An environment or situation that could lead to a potential breach of security. Exploit : A piece of software or technology that takes advantage of a bug, glitch, or vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a computer system. Vulnerability : The existence of a software flaw, logic design, or implementation error that can lead to an unexpected and undesirable event executing bad or damaging instructions to the system. Target of Evaluation (TOE) : A system, program, or network that is the subject of a security analysis or attack. Ethical hackers are usually concerned with high-value TOEs, systems that contain sensitive information such as account numbers, passwords, Social Security numbers, or other confidential data
  • 20. Ethical Hacking Terminology Prepared By: Masihuallah Karimi Attack : An attack occurs when a system is compromised based on a vulnerability.
  • 21. The Phases of Ethical Hacking Prepared By: Masihuallah Karimi The process of ethical hacking can be broken down into five distinct phases. Phases of hacking
  • 22. The Phases of Ethical Hacking Prepared By: Masihuallah Karimi Phase 1: Reconnaissance reconnaissance involves gathering information about a potential target without the targeted individual’s or company’s knowledge. reconnaissance can be as simple as watching a building to identify what time employees enter the building and when they leave. However, most reconnaissance is done sitting in front of a computer.
  • 23. The Phases of Ethical Hacking Prepared By: Masihuallah Karimi Phase 2: Scanning Scanning involves taking the information discovered during reconnaissance and using it to examine the network. Tools that a hacker may employ during the scanning phase include Dialers Port scanners Internet Control Message Protocol (ICMP) scanners Ping sweeps Network mappers Vulnerability scanners Hackers are seeking any information that can help them perpetrate an attack on a target, such as the following:
  • 24. The Phases of Ethical Hacking Prepared By: Masihuallah Karimi Phase 2: Scanning Hackers are seeking any information that can help them perpetrate an attack on a target, such as the following:  Computer names  Operating system (OS)  Installed software  IP addresses  User accounts
  • 25. The Phases of Ethical Hacking Prepared By: Masihuallah Karimi Phase 3: Gaining Access Phase 3 is when the real hacking takes place. Vulnerabilities exposed during the reconnaissance and scanning phase are now exploited to gain access to the target system. Phase 4: Maintaining Access Once a hacker has gained access to a target system, they want to keep that access for future exploitation and attacks. Sometimes, hackers harden the system from other hackers or security personnel by securing their exclusive access with backdoors, rootkits, and Trojans.
  • 26. The Phases of Ethical Hacking Prepared By: Masihuallah Karimi Phase 5: Covering Tracks  Once hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action. Hackers try to remove all traces of the attack, such as log files or intrusion detection system (IDS) alarms.
  • 27. Identifying Types of Ethical Hacks Prepared By: Masihuallah Karimi  Ethical hackers use many different methods to breach an organization’s security during a simulated attack or penetration test. Most ethical hackers have a specialty in one or a few of the following attack methods. Here are the most common entry points for an attack: Remote Network :  A remote network hack attempts to simulate an intruder launching an attack over the Internet. The ethical hacker tries to break or find vulnerability in the outside defenses of the network, such as firewall, proxy, or router vulnerabilities.
  • 28. Identifying Types of Ethical Hacks Prepared By: Masihuallah Karimi Remote Dial-Up Network : A remote dial-up network hack tries to simulate an intruder launching an attack against the client’s modem pools. Local Network : A local area network (LAN) hack simulates someone with physical access gaining additional unauthorized access using the local network. The ethical hacker must gain direct access to the local network in order to launch this type of attack. Wireless LANs (WLANs) fall in this category and have added an entirely new avenue of attack as radio waves travel through building structures.
  • 29. Identifying Types of Ethical Hacks Prepared By: Masihuallah Karimi Stolen Equipment : A stolen-equipment hack simulates theft of a critical information resource such as a laptop owned by an employee. Information such as usernames, passwords, security settings, and encryption types can be gained by stealing a laptop. Social Engineering : A social-engineering attack checks the security and integrity of the organization’s employees by using the telephone or face-to-face communication to gather information for use in an attack. Social-engineering attacks can be used to acquire usernames, passwords, or other organizational security measures.
  • 30. Identifying Types of Ethical Hacks Prepared By: Masihuallah Karimi Physical Entry : A physical-entry attack attempts to compromise the organization’s physical premises. An ethical hacker who gains physical access can plant viruses, Trojans, rootkits, or hardware key loggers (physical device used to record keystrokes) directly on systems in the target network. THE END