Ethical Hacking Introduction

Post on 13-Apr-2017

2.260 views 0 download

Transcript of Ethical Hacking Introduction

Ethical Hacking Part 1 - BASICS

Maulik Kotak(ROCKHACK)

./whoami

0 If You want to Hack some one First Hack Your self.

0 I am NOT a Hacker Just Learning for Security analyst.

ETHICAL HACKING

HACKING

Hacking is unauthorized use of computer and network resources.

According to Computer Crime Research Center: “It is act of gaining access without legal authorization to computer or computer network.”

Hacker

0Someone who tries to break into computer systems for any illegal purpose.

0Someone who maliciously breaks into systems for personal gain. These are criminals.

TYPES OF HACKERS

Black hat hacker. White hat hacker. Gray hat hacker.

Black Hat 0They use their knowledge and skill set for illegal0activities, destructive intents.0E.g.-to gain money (online robbery), to take revenge.0Disgruntled0Employees is the best example of Black Hats.

Attackers0 (Black Hat Hackers) are not at all concerned with

security0professionals (WhiteHathackers). Actually these

hackers Are Bad Guys!!!

White Hat

0They use their knowledge and skill set for0good, constructive intents. They find out new security0 loopholes and their solutions.0E.g.-Cyber Security Peoples (FBI , NYPD, US-Homeland

Security Breach)

Gray Hat

0 Individuals who works both offensively and0defensively at various times0E.g.-Third Party Security Testing in IT sectors

BLACK HAT

HACKER

WHITE HAT

HACKER

GRAYHAT

HACKER

WHY DO PEOPLE HACK??

0To Make a Security Stronger.

0 Just For Fun.

0Show Off

0Hack Other System Secretly and steal Important information.

WHAT ARE THE VARIOUS QUALITIES A HACKER SHOULD POSSES

0Good coder.

0Well Knowledge about hardware and Software.

0Should have knowledge on security System.

What is ethical hacking ?

0Ethical hacking ,also known as penetration testing or white-hat hacking involves the same tools, tricks, and techniques that hackers use, i.e., by duplicating the intent and actions of malicious hackers.

0Ethical hacking is performed with the target’s permission.

An Ethical Hacker, also known as a white hat hacker, or simply a white hat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy.They have strong programming and computer networking v skills.Continuous updating of their knowledge on computer and network security is required.They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.

Who are Ethical Hackers?

Ethical Hacker StrategiesAn Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy.They have strong programming and computer networking skills.They should have more patience.Continuous updating of their knowledge on computer and network security is required.They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.

1. Foot printing2. Scanning3. Gaining Access4. Maintaining Access

ETHICAL HACKING PROCESS

FOOT PRINTING

1. Who is Lookup

2. Ns Lookup

3. IP Lookup

SCANNING

1. Port Scanning

2. Network Scanning

3. Finger Printing

SCANNING

GAINING ACCESS

0Password attack

0Social Engineering.

0 Virus

MAINTAINING ACCESS

1. OS backdoors

2. Trojan

3. Clearing Track

HACKING GROWTH RATEIt is clear from the graph it is increasing day by day.

ADVANTAGES

These are good hackers.

Have genuine license to hack. Generally owned by companies for security designing.

Provides security to banking and financial establishments. 

Conclusions

Always security professionals are one step behind the hackers and crackers.

Plan for the unplanned attacks.

The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.

THANK YOU !! For Regarding any question contact me !!

http://www.maulikkotak.webnode.comhttp://www.facebook.com/maulikkotakstar

http://www.twitter.com/maulikkotakstar