SlideShare a Scribd company logo
1 of 51
  Ethical Hacking By: Aashish Sharma CS Final Year 0609210001
HACKER
>Definitions< ,[object Object],[object Object],[object Object]
What is Ethical Hacking?   ,[object Object],[object Object],[object Object]
Ethical Hacking ,[object Object],[object Object],[object Object]
Ethical Hackers but not Criminal Hackers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Source: CERT-India January - 2005 Defacement Statistics for Indian Websites June 01, 2004 to Dec.31, 2004  Domains No of Defacements  .com  922 .gov.in  24 .org  53 .net  39 .biz  12 .co.in  48 .ac.in  13 .info  3 .nic.in  2 .edu  2 other 13 Total 1131
Source: CERT/CC Total Number of Hacking Incidents Graph upto fiscal year 2003
Types of hacking Normal data transfer Interruption Interception Modification Fabrication
Why do hackers hack? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What do hackers do after hacking? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Being Prepared ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modes of Ethical Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anatomy of an attack: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers Black Hats White Hats Gray Hats
Black Hats :  -> Hacker  s pecialized in unauthorized, illegal penetration. -> Use computers to attack systems for profit, for revenge, or for political motivations  White Hats :  ->   Hacker who identifies  security weakness in a computer system or network and  ->   Exposes these weakness that will allow the system's owners to fix the breach. Grey Hats : ->  Hybrid between White Hats and Black Hats.
Script Kiddies : ->  U se scripts or programs  developed by others  to attack computer systems and networks.  ->  Objective  - To impress their friends or gain credit in computer-enthusiast communities. Hactivism  :  ->  The non-violent use of illegal or legally ambiguous digital tools in  pursuit of political ends .  -> W riting of code to promote political ideology - promoting expressive politics, free speech, human rights.
Classes of Attack ,[object Object],[object Object],[object Object],[object Object]
Authentication ,[object Object],[object Object],[object Object],[object Object]
Client-Side Attacks    Focuses  on the abuse or exploitation of a web site's users.   Attack Examples :  1.  Content Spoofing 2.  Cross-Site Scripting
Command Execution ,[object Object],[object Object],[object Object],[object Object]
SQL Injection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Information Disclosure ,[object Object],[object Object],[object Object],[object Object]
Hacking ,[object Object],[object Object]
Google Hacking Queries Inurl :   inurl:admin  inurl:passwd filetype:txt Index of :  &quot;Index of /secret &quot; &quot;Index of /credit-card &quot; Intitle :  ?intitle:index.of?MP3 Songname ?intitle:index.of?ebook BookName
Viruses: ,[object Object],[object Object]
[object Object],[object Object]
Horses: ,[object Object],[object Object]
Hell Raising: ,[object Object],[object Object]
Cont. ,[object Object]
Wireless Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless (continued) ,[object Object],[object Object],[object Object],[object Object]
War Chalking: ,[object Object]
Based on old hobo  language ----- 
 
Hacking Tools:  Web Based Password Cracking
Cain and Abel
Cain and Abel (Cont.)
Legion
Brutus
CERT - The Experts ,[object Object]
 
http://www.hackerhighschool.org/
 
Penalties under IT Act, 2000 ,[object Object],[object Object],[object Object]
Penalties under IT Act, 2000 ,[object Object],[object Object]
Penalties under Indian Penal Code ,[object Object],[object Object]
Penalties under Indian Penal Code ,[object Object],[object Object]
Penalties under Indian Penal Code ,[object Object],[object Object]
[object Object]

More Related Content

What's hot

What's hot (20)

Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
HACKING
HACKINGHACKING
HACKING
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
hacking
hackinghacking
hacking
 

Viewers also liked

[iROC Webinar] Do I Need to Worry About Soft Errors?
[iROC Webinar] Do I Need to Worry About Soft Errors? [iROC Webinar] Do I Need to Worry About Soft Errors?
[iROC Webinar] Do I Need to Worry About Soft Errors?
iROCTech
 
Touch Screen Technology
Touch Screen TechnologyTouch Screen Technology
Touch Screen Technology
Gvs Bharadwaj
 

Viewers also liked (20)

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Hacking
HackingHacking
Hacking
 
[iROC Webinar] Do I Need to Worry About Soft Errors?
[iROC Webinar] Do I Need to Worry About Soft Errors? [iROC Webinar] Do I Need to Worry About Soft Errors?
[iROC Webinar] Do I Need to Worry About Soft Errors?
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
Cover cs project
Cover cs projectCover cs project
Cover cs project
 
Touch Screen Technology
Touch Screen TechnologyTouch Screen Technology
Touch Screen Technology
 
Online music store
Online music storeOnline music store
Online music store
 
Cain
CainCain
Cain
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
 
09 Cain And Abel
09 Cain And Abel09 Cain And Abel
09 Cain And Abel
 
Google fiber
Google fiberGoogle fiber
Google fiber
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 

Similar to Ethical Hacking

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 

Similar to Ethical Hacking (20)

Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Ethical Hacking

  • 1. Ethical Hacking By: Aashish Sharma CS Final Year 0609210001
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Source: CERT-India January - 2005 Defacement Statistics for Indian Websites June 01, 2004 to Dec.31, 2004 Domains No of Defacements .com 922 .gov.in 24 .org 53 .net 39 .biz 12 .co.in 48 .ac.in 13 .info 3 .nic.in 2 .edu 2 other 13 Total 1131
  • 8. Source: CERT/CC Total Number of Hacking Incidents Graph upto fiscal year 2003
  • 9. Types of hacking Normal data transfer Interruption Interception Modification Fabrication
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Hackers Black Hats White Hats Gray Hats
  • 16. Black Hats : -> Hacker s pecialized in unauthorized, illegal penetration. -> Use computers to attack systems for profit, for revenge, or for political motivations White Hats : -> Hacker who identifies security weakness in a computer system or network and -> Exposes these weakness that will allow the system's owners to fix the breach. Grey Hats : -> Hybrid between White Hats and Black Hats.
  • 17. Script Kiddies : -> U se scripts or programs developed by others to attack computer systems and networks. -> Objective - To impress their friends or gain credit in computer-enthusiast communities. Hactivism : -> The non-violent use of illegal or legally ambiguous digital tools in pursuit of political ends . -> W riting of code to promote political ideology - promoting expressive politics, free speech, human rights.
  • 18.
  • 19.
  • 20. Client-Side Attacks  Focuses on the abuse or exploitation of a web site's users.  Attack Examples : 1. Content Spoofing 2. Cross-Site Scripting
  • 21.
  • 22.
  • 23.  
  • 24.
  • 25.
  • 26. Google Hacking Queries Inurl : inurl:admin inurl:passwd filetype:txt Index of : &quot;Index of /secret &quot; &quot;Index of /credit-card &quot; Intitle : ?intitle:index.of?MP3 Songname ?intitle:index.of?ebook BookName
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Based on old hobo language ----- 
  • 36.  
  • 37. Hacking Tools: Web Based Password Cracking
  • 39. Cain and Abel (Cont.)
  • 42.
  • 43.  
  • 45.  
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.