secure shell - a presentation on ethical hacking

29

Upload: nitish-kasar

Post on 08-Jun-2015

323 views

Category:

Technology


3 download

DESCRIPTION

Ethical Hacking Presentation By Prashant Bhende and Nitish Kasar

TRANSCRIPT

Page 1: Secure Shell - a Presentation on Ethical Hacking
Page 2: Secure Shell - a Presentation on Ethical Hacking

Seminar onEthical Hacking

SECURE SHELL

BY

Mr. NITISH KASAR

AND

MR.PRASHANT BHENDE

Page 3: Secure Shell - a Presentation on Ethical Hacking

WARNING – This Seminar is intended for educational purpose . We are not responsible for any misuse of

techniques taught in this seminar

Page 4: Secure Shell - a Presentation on Ethical Hacking

What is Hacking

Who is Hacker

Page 5: Secure Shell - a Presentation on Ethical Hacking

Hacking is derived from word Hack. Hack sense to "something try to break”

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose

Hacking is a Art of Finding Vulnerability inApplicationSystemNetwork

And can compromise them to get access over the system and the network.

What is Hacking ?

Page 6: Secure Shell - a Presentation on Ethical Hacking

A Hacker is who An enthusiastic and skillful computer programmer or user.A person who uses computers to gain unauthorized access to data.

Hacker is aware of every weak and part of security related to computer or network

Who is Hacker ?

Page 7: Secure Shell - a Presentation on Ethical Hacking

T y p e s o f H a c k e r :

Black Hat Grey Hat White Hat

Page 8: Secure Shell - a Presentation on Ethical Hacking

White Hat Hacker: - Use Their Hacking Skills and Knowledge for Good Purpose - Identifies a security weakness in a computer system or network

but doesn’t takes malicious advantage of it

- They are also known as “Ethical Hacker”.

Black Hat Hacker:- Use Their Hacking Skills and Knowledge for Malicious Purpose- Identifies a security weakness in a computer system or network and

exposes it to other hackers or public without notifying to the Victim- They are also known as “Crackers”.

Grey Hat Hackers: - Grey hat hackers are those guys who use their skills for both

ethical and unethical Purpose

Page 9: Secure Shell - a Presentation on Ethical Hacking

Other Types of HackerElite Hacker

Hacktivist

Whacker

Phreaker

Script Kiddies

Page 10: Secure Shell - a Presentation on Ethical Hacking

Script Kiddies: Those guys who actually don’t know

anything about hacking process, they use tools which available on the internet for free for attack

Phreakers: A phreaker are those guys who focuses on

communication systems to steal card num., make free phone calls, and get access illegally to communication devices.

Whackers: Whackers uses their skills to hack

wireless networks.

Page 11: Secure Shell - a Presentation on Ethical Hacking

Hactivist: These kind of hackers compromise

systems with some political or social reasons.

Elite Hackers: These kinds of hackers are the most skilled among other types of

hackers. They have thorough knowledge of computer systems, programming languages. They Know what there are getting into.

Page 12: Secure Shell - a Presentation on Ethical Hacking

Need of Ethical Hacking

Page 13: Secure Shell - a Presentation on Ethical Hacking
Page 14: Secure Shell - a Presentation on Ethical Hacking
Page 15: Secure Shell - a Presentation on Ethical Hacking

Phishing attack Punjab National Bank Customers

Page 16: Secure Shell - a Presentation on Ethical Hacking

Recent Facebook Scam

Page 17: Secure Shell - a Presentation on Ethical Hacking

Need of Ethical Hacking ? ?

• To make the Cyberspace more secure.

• Respond to Cyber Crimes • To explore various threats that a system could have and ultimately report it to the concerned authorities.

Page 18: Secure Shell - a Presentation on Ethical Hacking

Basic Steps of Hacking

Foot Printing

Scanning

Gaining Access

Maintain Access

Covering Tracks

Page 19: Secure Shell - a Presentation on Ethical Hacking

Terminologies you should about

• Vulnerability: It is Weakness of any programming code like buffer overflow, that helps to hack any systems or network.

• Exploit: It is piece of malicious code that takes advantages of un-patched vulnerability in Program.

• Payload : After exploiting a vulnerability in software application , payload assists further to maintain connection with attacked system.

Page 20: Secure Shell - a Presentation on Ethical Hacking

Terminologies you should about

Virus

Worms

Trojans

Key loggers

Spywares

Page 21: Secure Shell - a Presentation on Ethical Hacking
Page 22: Secure Shell - a Presentation on Ethical Hacking

Career in Hacking • According to Nasscom, demand for ethical hackers is estimated at over 77,000 in India every year.

•Against this, India is producing only 20,000-25,000 ethical hackers.

Page 23: Secure Shell - a Presentation on Ethical Hacking

Career in Hacking:

Page 24: Secure Shell - a Presentation on Ethical Hacking

Secure Shell Level-1

Course Duration:30 days

1.Introduction to Ethics of Hacking

2.Networking basics

3.Introduction to Linux

4.Windows hacking

5.Footprinting

6.Scanning

7.Proxy basics

8.DOS Attacks

9.Google hacking

10.Malwares

11.Cryptography

12.Stegnography

13.Firewall

14.Pentration Methodologies

15.Email hacking and security

16.Social Engineering

17.Online safety

Page 25: Secure Shell - a Presentation on Ethical Hacking

Certificate for Participation. Tool kit. E-books. Cyber laws documents. Tutorial books. Operating system.

Secure Shell level-1

Page 26: Secure Shell - a Presentation on Ethical Hacking

How to make a SECURE Password

UPPERCASE , lowercase lettersLength Should be more than 12 charactersShould contain at least 2 numbersShould contain Special SymbolLetters Replaced with Special Symbol e.g. s, S = $ ; a = @; I, I= !Whitespaces Phrases e.g.

Page 27: Secure Shell - a Presentation on Ethical Hacking
Page 28: Secure Shell - a Presentation on Ethical Hacking

Question ???..............

Page 29: Secure Shell - a Presentation on Ethical Hacking

THANK YOU !!!