ethical hacking by- nagendra saini

18
ETHICAL HACKING PRESENTED BY :- NAGENDRA KUMAR ROLL NO :- 11EBKIT205

Upload: nk-saini

Post on 22-Nov-2014

689 views

Category:

Technology


6 download

DESCRIPTION

it's just a presentation on ethical hacking..(Y)

TRANSCRIPT

Page 1: Ethical hacking By- NAGENDRA SAINI

ETHICAL HACKING

PRESENTED BY :- NAGENDRA KUMAR

ROLL NO :- 11EBKIT205

Page 2: Ethical hacking By- NAGENDRA SAINI

CONTENT

Overview of Hacking Hacking VS Cracking Why do hackers hack? Qualities of Hackers Types of Hacker Ethical Hacking – Process Advantages and Disadvantages How can protect the system? What should do after hacked?

Page 3: Ethical hacking By- NAGENDRA SAINI

OVERVIEW OF HACKING

It is Legal

Permission is obtained from the target

Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner

Also Called – Attack & Penetration Testing.

Page 4: Ethical hacking By- NAGENDRA SAINI

HACKING VS CRACKING

Hacker The person who hack .

Cracker System destroyer.

HACKING WITH MALICIOUS INTENTION IS CRACKING

The basic difference is hackers do not do anything disastrous.

Cracking yield more devastating results. Cracking is crime. Cyber crime are the results of cracking ,not hacking

Page 5: Ethical hacking By- NAGENDRA SAINI

WHY DO PEOPLE HACK??

To make security stronger ( Ethical Hacking )

Just for fun

Show off

Hack other systems secretly & Steal important information

Page 6: Ethical hacking By- NAGENDRA SAINI

WHAT ARE THE VARIOUS QUALITIES A HACKER

SHOULD POSSES

Good coder

well knowledgeable person both hard ware as well as soft ware

Should have knowledge on security system

Trusted person

Page 7: Ethical hacking By- NAGENDRA SAINI

TYPES OF HACKER

BLACK HAT HACK

ER

WHITE HAT HACK

ER

GRAYHAT

HACKER

Page 8: Ethical hacking By- NAGENDRA SAINI

HACKING - PROCESS

Foot Printing

Scanning

Gaining Access

Maintaining Access

Page 9: Ethical hacking By- NAGENDRA SAINI

FOOT PRINTING

Who is Lookup

NS lookup

IP Lookup

Page 10: Ethical hacking By- NAGENDRA SAINI

SCANNING

Port scanning

Network scanning

Finger Printing

Fire walking

Page 11: Ethical hacking By- NAGENDRA SAINI

SCANNING

Page 12: Ethical hacking By- NAGENDRA SAINI

GAINING ACCESS

Password Attacks

Social Engineering

Viruses

Page 13: Ethical hacking By- NAGENDRA SAINI

MAINTAINING ACCESS

Os Back-Doors

Trojans

Clearing tracks

Page 14: Ethical hacking By- NAGENDRA SAINI

ADVANTAGES & DISADVANTAGES

Advantages Provides security to banking and financial

establishments Prevents website defacements An evolving technique To catch a thief you have to think like a thiefDisadvantages All depends upon the trustworthiness of the

ethical hacker Hiring professionals is expensive.

Page 15: Ethical hacking By- NAGENDRA SAINI

HOW CAN WE PROTECT THE SYSTEM?

Patch security hole often

Encrypt important data

Remove unused program

Setup log-host

Backup the system often

Setup firewall

Page 16: Ethical hacking By- NAGENDRA SAINI

WHAT SHOULD DO AFTER HACKED?

Shutdown the system

Separate the system from network

Restore the system with the backup Or reinstall all programs

Page 17: Ethical hacking By- NAGENDRA SAINI

HACKING GROWTH RATE

It is clear from the graph it is increasing day by day.

Page 18: Ethical hacking By- NAGENDRA SAINI

THANK YOU