Seminar Ppt

Post on 23-Oct-2014

366 views 0 download

Tags:

Transcript of Seminar Ppt

ETHICAL HACKING

TABLE OF CONTENTSINTRODUCTION

HACKING

ETHICAL HACKING

METHODOLOGY OF ETHICAL HACKING

ETHICAL HACKING TOOLS

ADVANTAGES & DISADVANTAGES

FUTURE ENHANCEMENTS

CONCLUSIONS

REFERENCES

INTRODUCTION

Ethical hacking

Security

Tools employed are same.

Ethical hackers do not damage system.

HACKERA clever programmer.

CHARACTERISTICS OF HACKER One who:

Enjoys programming .

Appreciating someone else's hacking.

Expert.

 

TYPES OF HACKERS

BLACK HAT HACKER

WHITE HAT HACKER

GREY HAT HACKER

Fig1: Library of congress webpage before attack

ILLUSTRATION OF HACKING

Fig 2: Library of congress webpage after attack

FLOWCHART FOR HACKING

Fig 3: General hacking

ETHICAL HACKING Vulnerabilities existing.

SKILLS FOR ETHICAL HACKERMicrosoft

Linux

Firewalls

Network Protocols

Routers

Patience

ETHICAL HACKING

COMMANDMENTS

Working ethically.

Respecting privacy.

Not crashing your systems.

METHODOLOGY OF HACKINGReconnaissance

Scanning

Enumeration

Gaining access

Maintaining access

Clearing Tracks

ETHICAL HACKING TOOLSSamspade

Fig 4: Samspade GUI

Email Tracker and Visual Route

Fig 5: Email Tracker GUI

Visual Route: displays location using IP address.

Fig 6: Visual Route GUI

ADVANTAGES

To catch thief.

To close open holes.

Provides security.

DISADVANTAGESDepends on trustworthiness.

Expensive.

FUTURE ENHANCEMENTSEmploy new techniques.

Tools should be updated.

CONCLUSIONSGet updated about softwares.

Educate against black hat hacking.

Firewalls and other security measures.

The password should be made strong.

REFERENCES1. C.C PALMER IBM SYSTEMS JOURNAL, VOL 40, NO 3,

2001

2.Computer Security Education and Research- 1540-

7993/06/$20.00 © 2006 IEEE-IEEE Security and

Privacy

3.About Penetration Testing-1540-7993/07/$25.00 ©

2007 IEEE- IEEE Security and Privacy

QUERIES ?

THANK YOU