ethical hacking for computer science

22
H4CK||\|G 1$ 9OOD 23/2/2016 @sarath&surenthar 1

Upload: sarath-kumar

Post on 24-Jan-2017

134 views

Category:

Education


1 download

TRANSCRIPT

Page 1: Ethical hacking for computer science

H4CK||\|G 1$ 9OOD

23/2/2016@sarath&surenthar1

Page 2: Ethical hacking for computer science

By SARATHKUMAR.K (MCA-B)

SURENDHAR.R (MCA-B)23/2/2016@sarath&surenthar

2

Page 3: Ethical hacking for computer science

CONTENTS What is Ethical Hacking? Types of Hackers Sniffing Phishing Key loggers Social Engineering Conclusion

23/2/2016@sarath&surenthar3

Page 4: Ethical hacking for computer science

WHAT IS HACKING? Hacking is a gain unauthorized access to

data in a system or computer. act of illegally entering a computer system,

and making unauthorized changes to the files and data contain within

Cracking : some one who destructs things.

23/2/2016@sarath&surenthar4

Page 5: Ethical hacking for computer science

WHAT IS ETHICAL HACKING?Ethical Hacking is testing the resources for a good cause and for the

Betterment of technology. Learn about the system and trying to find its

weaknesses. Techniques of Criminal hackers-Detection-

Prevention Given Completely trustworthy

23/2/2016@sarath&surenthar5

Page 6: Ethical hacking for computer science

TYPES OF HACKERS

BLACK HAT HACKER

GREY HAT HACKER

WHITE HAT HACKER

23/2/2016@sarath&surenthar6

Page 7: Ethical hacking for computer science

WHITE HAT HACKERS

Good guys

Don’t use their skills for illegal purpose

Computer security experts and help to protect from Black hat hackers…

23/2/2016@sarath&surenthar7

Page 8: Ethical hacking for computer science

BLACK HAT HACKERS

Bad guys.

Use their skills for their personnel gain

Hack banks, credit cards and defense websites.

23/2/2016@sarath&surenthar8

Page 9: Ethical hacking for computer science

GREY HAT HACKERS

They are the combination of Black Hat Hackers and White Hat Hackers.

Use their skills for their personnel gain

Goal of grey hat hackers is to provide National Security.

23/2/2016@sarath&surenthar9

Page 10: Ethical hacking for computer science

FEW HACKING TECHNOLOGIES

Password Cracking

SNIFFING

PHISHING

KEYLOGGERS

SOCIAL ENGINEERING

23/2/2016@sarath&surenthar10

Page 11: Ethical hacking for computer science

There are many methods for cracking the password and then get in to the system.

The simplest method is to guess the password. But this is a tedious work.

In order to make this work easier there are many automated tools for password guessing

like Cain and Abel

Password Cracking

23/2/2016@sarath&surenthar11

Page 12: Ethical hacking for computer science

SNIFFING

Sniffer is a program that monitor or reading all network traffic passing in and out over a network. 

(Telnet, FTP, SMTP, HTTP) that all protocol are vulnerable for sniffing

Because it send data and password in clear text. Sniffing can be use both the ways legally or illegally like for monitor network traffic, network security and for stealing information like password, files from the network.

23/2/2016@sarath&surenthar12

Page 13: Ethical hacking for computer science

23/2/2016@sarath&surenthar13

Page 14: Ethical hacking for computer science

PHISHINGPhishing is the method used to steal personal information through spamming or other deceptive means. There are a number of different phishing techniques used to obtain personal information from users. Email / Spam

Phishers may send the same email to millions of users, requesting them to fill in personal details

Web Based Delivery Web based delivery is one of the most sophisticated phishing

techniques. Also known as “man-in-the-middle,” the hacker is located in between the original website and the phishing system.

Instant Messaging Instant messaging is the method in which the user receives a message

with a link directing them to a fake phishing website 23/2/2016@sarath&surenthar14

Page 15: Ethical hacking for computer science

23/2/2016@sarath&surenthar15

Page 16: Ethical hacking for computer science

KEYLOGGERS Key logger is a software which records each and every

key strokes you enter, include mouse click. Loggers are two types…

Hardware keylogger Software keylogger

Hardware Keylogger This is a thumb size device it records all keystrokes we enter from keyboard, then save it in its memory. Later this data will be analyzed. Software Keylogger

Software keylogger can be installed in the victims system, it records all keystrokes we enter from keyboard and takes the screen shots and saved in the hidden path. 23/2/2016@sarath&surenthar

16

Page 17: Ethical hacking for computer science

23/2/2016@sarath&surenthar17

Page 18: Ethical hacking for computer science

SOCIAL ENGINEERING Social engineering is the art of manipulating people so

they give up confidential information. When individuals are targeted the criminals are usually

trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer.

In the security chain human is the weakest link, because they trust everyone easily.

23/2/2016@sarath&surenthar18

Page 19: Ethical hacking for computer science

ADVANTAGES

Prevents website defacements.

Analyzing the weakness to find the loop holes. To improve high security

Provides security to banking and financial establishment.

To catch a thief you have to think like a thief.

DISADVANTAGES All depends upon the trustworthiness of the

ethical hacker. Hiring professionals is expensive 23/2/2016@sarath&surenthar

19

Page 20: Ethical hacking for computer science

People trust security, for security purpose we need Ethical Hacking.

Ethical hacking provides results which can be used to strengthen a information technology environments security

CONCLUSION

23/2/2016@sarath&surenthar20

Page 21: Ethical hacking for computer science

@sarath&surenthar

Page 22: Ethical hacking for computer science

THANK YOU

@sarath&surenther