Ethical Hacking - Explained

20

description

Introduction to Ethical Hacking. Explained Very Simple : Hacking vs Ethical Hacking Presented at TechNet 2014 : Government Polytechnic,Ahmedabad

Transcript of Ethical Hacking - Explained

Page 1: Ethical Hacking - Explained
Page 2: Ethical Hacking - Explained

WHAT DO YOU MEAN BY HACKER ..?? Government Polytechnic, Ahmedabad

Page 3: Ethical Hacking - Explained

Hacker : A person, having an intimate understanding of the internal workings of a system, computers and computer networks in particular. When the person efforts to misuse his skill in an unofficial way he is called Hacker.

Government Polytechnic, Ahmedabad

Page 4: Ethical Hacking - Explained

Government Polytechnic, Ahmedabad

Categories of Hacker

1.White Hat2.Grey Hat3.Black Hat4.Phreaker5.Script Kiddies6.Hactivist

Communities of Hackers

1.White Hat2.Grey Hat3.Black Hat4.Phreaker5.Script Kiddies6.Hacktivist

Government Polytechnic, Ahmedabad

Page 5: Ethical Hacking - Explained

1. White Hat : A white hat is the hero or good guy, especially in

computing, where it refers to an Ethical Hacker or Penetration Tester who focuses on securing and protecting IT systems.

Such people are Employed by Companies where these Professionals are sometimes called Tiger Teams or Red Teams.

Government Polytechnic, Ahmedabad

Page 6: Ethical Hacking - Explained

2. Grey Hat : A grey hat, refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not.

They are a hybrid between white and black hat hackers.

Government Polytechnic, Ahmedabad

Page 7: Ethical Hacking - Explained

3. Black Hat : A black hat is the villain or bad guy. It refers to a hacker that breaks into networks or computers, or creates computer viruses. They are specialized in unauthorized penetration of information systems.

They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Hence they should not be confused with ethical hackers.

Government Polytechnic, Ahmedabad

Page 8: Ethical Hacking - Explained

4. Phreaker : The person who acts of gaining unauthorized access to Telecommunication systems, especially to obtain Free Calls.

Government Polytechnic, Ahmedabad

Page 9: Ethical Hacking - Explained

5. Script Kiddies : Script kiddies are like amateur kids who gains illegal access to computer systems, often by using hacking programs downloaded from the internet. Their objective is to try to impress their friends.

Government Polytechnic, Ahmedabad

Page 10: Ethical Hacking - Explained

6. Hacktivist : Hacktivist is a mixture of the words Hacker and Activist.

They have taken to defacing websites or computer systems for political reasons or social aim.

Government Polytechnic, Ahmedabad

Page 11: Ethical Hacking - Explained

Some Malicious Hacking Strategies :As there are steps to develop any software so as Every hackers do follow some predefined rules or steps to hack into the system.

1. Information : The basic information gathering about the target system.2. Scanning : Scanning the target system for open ports and services running on the open ports etc.3. Gaining Access : Gaining the actual access of the particular target system by exploiting the system.4. Maintaining Access : Keeping the access of the system.5. Clearing Tracks : To remove the footprints if any so as to remain undetected from the victim.

Government Polytechnic, Ahmedabad

Page 12: Ethical Hacking - Explained

Not all Hackers do evil work. Here's what you need to know to use your Hacking Skills to do Good.

'Ethical Hacking' Is A Form of 'Legal Hacking' That Is Done With The Permission of An Organization To Help Increase Its Security.

Government Polytechnic, Ahmedabad

Page 13: Ethical Hacking - Explained

Government Polytechnic, Ahmedabad

Viruses, Trojan Horses,

and Worms

SocialEngineering

AutomatedAttacks

Accidental Breaches in

Security Denial ofService (DoS)

OrganizationalAttacks

RestrictedData

Why Do We Need Ethical Hacking

Government Polytechnic, Ahmedabad

Page 14: Ethical Hacking - Explained

Who are CEH? : Certified Ethical Hackers are Technically Skilled IT Professionals With A Strong Desire To Solve Problems And Prevent Malicious Hackers From Causing Damage To Network Systems.

Government Polytechnic, Ahmedabad

Page 15: Ethical Hacking - Explained

How To Be Ethical Hacker :

One Can Become A Ethical Hacker by Getting Just A Formal Training in Ethical Hacking to Learn The Basic Fundamentals of Hacking.

As You Became A Ethical Hacker You Need Motivation, Dedication, Initiative, Self-education And Tough Knowledge To Improve Your-Self As Per The New Innovations.

Government Polytechnic, Ahmedabad

Page 16: Ethical Hacking - Explained

Job : There Are Lucrative Jobs Available In Government Organizations, Banks, Financial Institutions, Military Establishments And Private Companies.

India will need more than 4 lakh ethical hackers by 2015. -Rediff.com

Government Polytechnic, Ahmedabad

Page 17: Ethical Hacking - Explained

What to Learn : Learn Operating Systems like Windows, Mac and especially UNIX as it is regarded as the original operating system built by hackers.

Evaluate your strengths and interests and gain some basic programming knowledge such as C,C++, or Java. Experience with various networking devices and networking protocols.

Government Polytechnic, Ahmedabad

Page 18: Ethical Hacking - Explained

As a Ethical Hacker Keep in Mind :

* Always keep learning new things.

* Don’t do it just for fun.

* Never do it just for money.

* Keep you focus intact in your job.

* Always work within the law and never try to break it.

Government Polytechnic, Ahmedabad

Page 19: Ethical Hacking - Explained

Always Stay connected …To The Hacker Community By Sharing Technical Information And Ideas.

Government Polytechnic, Ahmedabad

“The one who can hack it, can only secure it”

Page 20: Ethical Hacking - Explained

Government Polytechnic Ahmedabad

Government Polytechnic, Ahmedabad

TechNet 2014

Gunjan Panara Vishwa Soni Pooja Mahida (126170307057) (126170307020)(126170307029)