finalppt-130416080041-phpapp01
-
Upload
nishachauhan -
Category
Documents
-
view
216 -
download
2
description
Transcript of finalppt-130416080041-phpapp01
TYPES OF NON-VERBAL COMMUNICATION
ETHICAL HACKING
PRESENTED BY :- SWETA LEENA PANDA
ROLL NO :- B410054
HACKER
CONTENTOverview of HackingWhy do hackers hack?Types of HackerLevel of HackersHackers languageEthical Hacking ProcessHow can protect the system?What should do after hacked?Final words
OVERVIEW OF HACKING It is Legal
Permission is obtained from the target
Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner
Also Called Attack & Penetration Testing.
HACKING VS CRACKING
HackerThe person who hack
CrackerSystem intruder/destroyer
HACKING WITH MALICIOUS INTENTION IS CRACKINGThe basic difference is hackers do not do anything disastrous.Cracking yield more devastating results.Cracking is crime.Cyber crime are the results of cracking ,not hacking
THE GREAT HACKER WAR
Kevin Mitnick The most famous, and undoubtedly most gifted hacker in history, made a name for himself in 1981 at the tender age of 17 by getting into a phone exchange, which allowed him to redirect subscriber calls in any way he wanted. In 1983, he achieved his first major coup - and also his first arrest - when he accessed a Pentagon computer. It was his repeated offenses that made him a target of the FBI. He was sentenced to five years in prison in the 1990s, but today he is a security consultant and owns his own company: Mitnick Security.John Draper known as "Cap'n Crunch", Draper was one of the first hackers in history. This moniker comes from the cereal of the same name, inside of which he once discovered a toy whistle (provided as a gift to entice children to ask parents for the cereal). He discovered that he could use the whistle to hack a telephone line and get free phone calls - all that was necessary was to produce a precise tone in the receiver for the method to work. He was arrested in 1976 and sentenced to two months in prison.
Kevin Poulsen :-The current editor-in-chief of Wired was formerly known for rather different activities. In 1983, when he too was only 17 years old, he made his first intrusions into different networks, resulting in a few run-ins with the US legal system. He continued with his illegal activities until his arrest by the FBI in April 1991. In 1994 he was sentenced to four years in prison.
Adrian Lamo Lamo has certainly driven the highest number of network administrators insane. From Microsoft to Yahoo!, going through Sun Microsystems, MacDonald's, Cingular, AOL or even the New York Times, he is credited with all types of intrusions and corporate security system violations. He has bypassed protections with disconcerting simplicity: during a broadcast of the NBC Nightly News, the host asked him to prove his talents in front of the camera, and he responded by gaining access to the company's internal network in less than five minutes. Today he is an expert in security and enjoys full freedom of movement, after being under the surveillance of US authorities for many years.
Why do people hack??To make security stronger ( Ethical Hacking )
Just for fun
Show off
Hack other systems secretly & Steal important information
What are the various qualities a hacker should possesGood coder
well knowledgeable person both hard ware as well as soft ware
Should have knowledge on security system
Trusted person
Types of hacker
Label of hacker10Hackers language1 -> i or l3 -> e4 -> a 7 -> t9 -> g0 -> o$ -> s| -> i or
|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x
Hackers language translationEXAMPLE:- Hacking is good
H4ck||\|g 1$ 900d
Hacking - ProcessFoot Printing
Scanning
Gaining Access
Maintaining Access
Foot Printing
Whois Lookup
NS lookup
IP Lookup
ScanningPort scanning
Network scanning
Finger Printing
Fire walking
Scanning
Gaining accessPassword Attacks
Social Engineering
Viruses
Maintaining accessOs BackDoors
Trojans
Clearing tracks
Advantages & DisadvantagesAdvantagesProvides security to banking and financial establishmentsPrevents website defacements An evolving technique To catch a thief you have to think like a thiefDisadvantages All depends upon the trustworthiness of the ethical hacker Hiring professionals is expensive.
How can we protect the system? Patch security hole oftenEncrypt important dataEx) pgp, sshDo not run unused daemonRemove unused programSetup loghostBackup the system oftenSetup firewallSetup IDSEx) snort
What should do after hacked?Shutdown the systemOr turn off the systemSeparate the system from networkRestore the system with the backupOr reinstall all programsConnect the system to the network
H4cking prone areas
Hacking GROWTH RATE
It is clear from the graph it is increasing day by day.Please give your suggestions and feedbacksAny question ?
THANK YOU