ethical hacking introduction
TRANSCRIPT
![Page 1: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/1.jpg)
Ethical Hacking Part 1 - BASICS
Maulik Kotak(ROCKHACK)
![Page 2: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/2.jpg)
./whoami
0 If You want to Hack some one First Hack Your self.
0 I am NOT a Hacker Just Learning for Security analyst.
![Page 3: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/3.jpg)
ETHICAL HACKING
![Page 4: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/4.jpg)
HACKING
Hacking is unauthorized use of computer and network resources.
According to Computer Crime Research Center: “It is act of gaining access without legal authorization to computer or computer network.”
![Page 5: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/5.jpg)
Hacker
0Someone who tries to break into computer systems for any illegal purpose.
0Someone who maliciously breaks into systems for personal gain. These are criminals.
![Page 6: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/6.jpg)
TYPES OF HACKERS
Black hat hacker. White hat hacker. Gray hat hacker.
![Page 7: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/7.jpg)
Black Hat 0They use their knowledge and skill set for illegal0activities, destructive intents.0E.g.-to gain money (online robbery), to take revenge.0Disgruntled0Employees is the best example of Black Hats.
Attackers0 (Black Hat Hackers) are not at all concerned with
security0professionals (WhiteHathackers). Actually these
hackers Are Bad Guys!!!
![Page 8: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/8.jpg)
White Hat
0They use their knowledge and skill set for0good, constructive intents. They find out new security0 loopholes and their solutions.0E.g.-Cyber Security Peoples (FBI , NYPD, US-Homeland
Security Breach)
![Page 9: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/9.jpg)
Gray Hat
0 Individuals who works both offensively and0defensively at various times0E.g.-Third Party Security Testing in IT sectors
![Page 10: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/10.jpg)
BLACK HAT
HACKER
WHITE HAT
HACKER
GRAYHAT
HACKER
![Page 11: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/11.jpg)
WHY DO PEOPLE HACK??
0To Make a Security Stronger.
0 Just For Fun.
0Show Off
0Hack Other System Secretly and steal Important information.
![Page 12: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/12.jpg)
WHAT ARE THE VARIOUS QUALITIES A HACKER SHOULD POSSES
0Good coder.
0Well Knowledge about hardware and Software.
0Should have knowledge on security System.
![Page 13: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/13.jpg)
What is ethical hacking ?
0Ethical hacking ,also known as penetration testing or white-hat hacking involves the same tools, tricks, and techniques that hackers use, i.e., by duplicating the intent and actions of malicious hackers.
0Ethical hacking is performed with the target’s permission.
![Page 14: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/14.jpg)
An Ethical Hacker, also known as a white hat hacker, or simply a white hat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy.They have strong programming and computer networking v skills.Continuous updating of their knowledge on computer and network security is required.They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
Who are Ethical Hackers?
![Page 15: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/15.jpg)
Ethical Hacker StrategiesAn Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy.They have strong programming and computer networking skills.They should have more patience.Continuous updating of their knowledge on computer and network security is required.They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
![Page 16: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/16.jpg)
1. Foot printing2. Scanning3. Gaining Access4. Maintaining Access
ETHICAL HACKING PROCESS
![Page 17: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/17.jpg)
FOOT PRINTING
1. Who is Lookup
2. Ns Lookup
3. IP Lookup
![Page 18: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/18.jpg)
SCANNING
1. Port Scanning
2. Network Scanning
3. Finger Printing
![Page 19: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/19.jpg)
SCANNING
![Page 20: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/20.jpg)
GAINING ACCESS
0Password attack
0Social Engineering.
0 Virus
![Page 21: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/21.jpg)
MAINTAINING ACCESS
1. OS backdoors
2. Trojan
3. Clearing Track
![Page 22: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/22.jpg)
HACKING GROWTH RATEIt is clear from the graph it is increasing day by day.
![Page 23: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/23.jpg)
ADVANTAGES
These are good hackers.
Have genuine license to hack. Generally owned by companies for security designing.
Provides security to banking and financial establishments.
![Page 24: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/24.jpg)
Conclusions
Always security professionals are one step behind the hackers and crackers.
Plan for the unplanned attacks.
The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.
![Page 25: Ethical Hacking Introduction](https://reader036.vdocuments.mx/reader036/viewer/2022062503/58ee6a8a1a28ab934e8b46b5/html5/thumbnails/25.jpg)
THANK YOU !! For Regarding any question contact me !!
http://www.maulikkotak.webnode.comhttp://www.facebook.com/maulikkotakstar
http://www.twitter.com/maulikkotakstar