ethical hacking

28
ETHICAL HACKING PRESENTED BY SWETA LEENA PANDA

Upload: sweta-panda

Post on 22-Nov-2014

1.425 views

Category:

Education


3 download

DESCRIPTION

Here in this slide i describe the BASIC ... For the Beginners...some general idea & topics i have covered here...My next slide can give more information about hacking... this is the general & only for the beginners.Hope my slide help you to get the thing you want for.

TRANSCRIPT

Page 1: ETHICAL HACKING

ETHICAL HACKING

PRESENTED

BY

SWETA LEENA PANDA

Page 2: ETHICAL HACKING

HIGHLIGHTS

• Who is hacker• Different kinds of system attacks• Required Skills of an Ethical Hacker• Methodology of Hacking:• Virus Types• Security & Counter Measures• Advantages & Disadvantages

Page 3: ETHICAL HACKING

WHO IS HACKER

• A person who enjoys learning details of a programming language or

• system

• A person who enjoys actually doing the programming rather than

just theorizing about it

Page 4: ETHICAL HACKING

• A person capable of appreciating someone else's hacking

• A person who picks up programming quickly

• A person who is an expert at a particular programming language or system.

Page 5: ETHICAL HACKING

Different kinds of system attacks

Page 6: ETHICAL HACKING

Required Skills of an Ethical Hacker

• Microsoft: skills in operation, configuration and management.

• Linux: knowledge of Linux/Unix; security setting, configuration, and services.

• Firewalls: configurations, and operation of intrusion detection systems.

Page 7: ETHICAL HACKING

• Routers: knowledge of routers, routing protocols, and access control lists Mainframes

• Network Protocols: TCP/IP; how they function and can be manipulated.

• Project Management: leading, planning, organizing, and controlling a penetration testing team

Page 8: ETHICAL HACKING

Methodology of Hacking:

• Reconnaissance

• Scanning & Enumeration

• Gaining access

• Maintaining access

• clearing tracks

Page 9: ETHICAL HACKING

Reconnaissance:• The literal meaning of the word

reconnaissance means a preliminary survey to gain information. This is also known as foot-printing. This is the first stage in the methodology of hacking.

Page 10: ETHICAL HACKING

Scanning &Enumeration

• Scanning is the second phase in the hacking methodology in which

• the hacker tries to make a blue print of the target network.

Page 11: ETHICAL HACKING

Enumeration

• Enumeration is the ability of a hacker to convince some servers to give them information that is vital to them to make an attack.

Page 12: ETHICAL HACKING

Gaining access

• This is the actual hacking phase in which the hacker gains access to the system. The hacker will make use of all the information he collected in the pre-attacking phases.

Page 13: ETHICAL HACKING

Maintaining Access• Now the hacker is inside the system by

some means by password guessing or exploiting some of its vulnerabilities .In the network scenario the hacker will do it by uploading some software like Trojan horses, sniffers, key stroke loggers etc.

Page 14: ETHICAL HACKING

Clearing Tracks

• Now we come to the final step in the hacking. There is a saying that everybody knows a good hacker but nobody knows a great hacker .

Page 15: ETHICAL HACKING

Virus Types

Page 16: ETHICAL HACKING

VIRUS

A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. The word virus has incorrectly become a general term that encompasses Trojans, worms, and viruses.

Page 17: ETHICAL HACKING

Boot Sector Virus

Boot sector viruses infect either the master boot record of the hard disk or the floppy drive.

Examples of boot- sector viruses are Michelangelo and Stoned.

Page 18: ETHICAL HACKING

File or Program Viruses

Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

Page 19: ETHICAL HACKING

Multipartite Viruses

• A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target.

• Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.Other examples are Invader, Flip, etc.

Page 20: ETHICAL HACKING

Stealth Viruses

These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus.

Page 21: ETHICAL HACKING

Polymorphic Viruses

Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presence.

Page 22: ETHICAL HACKING

Macro Viruses

A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically. A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.

Page 23: ETHICAL HACKING

Security & Counter Measures

Use of anti-viruses.Proper logout after use of mail id.Manual opening browser don't open spam.Password protected admin account.

Page 24: ETHICAL HACKING

Patch security hole often Encrypt important data

Ex) pgp, ssh Do not run unused daemon Remove unused setuid/setgid program Setup loghost

Backup the system often Setup firewall Setup IDS

Ex) snort

Page 25: ETHICAL HACKING

Hacking prone areas

Page 26: ETHICAL HACKING

Advantages

Provides security to banking and financial establishments

Prevents website defacementsAn evolving techniqueTo catch a thief you have to think like a

thief

Page 27: ETHICAL HACKING

Disadvantages

All depends upon the trustworthiness of the ethical hacker

Hiring professionals is expensive.

Page 28: ETHICAL HACKING

Please send suggestions and feedbacks I am waiting for your replay. THANK YOU