secure shell - a presentation on ethical hacking
DESCRIPTION
Ethical Hacking Presentation By Prashant Bhende and Nitish KasarTRANSCRIPT
Seminar onEthical Hacking
SECURE SHELL
BY
Mr. NITISH KASAR
AND
MR.PRASHANT BHENDE
WARNING – This Seminar is intended for educational purpose . We are not responsible for any misuse of
techniques taught in this seminar
What is Hacking
Who is Hacker
Hacking is derived from word Hack. Hack sense to "something try to break”
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose
Hacking is a Art of Finding Vulnerability inApplicationSystemNetwork
And can compromise them to get access over the system and the network.
What is Hacking ?
A Hacker is who An enthusiastic and skillful computer programmer or user.A person who uses computers to gain unauthorized access to data.
Hacker is aware of every weak and part of security related to computer or network
Who is Hacker ?
T y p e s o f H a c k e r :
Black Hat Grey Hat White Hat
White Hat Hacker: - Use Their Hacking Skills and Knowledge for Good Purpose - Identifies a security weakness in a computer system or network
but doesn’t takes malicious advantage of it
- They are also known as “Ethical Hacker”.
Black Hat Hacker:- Use Their Hacking Skills and Knowledge for Malicious Purpose- Identifies a security weakness in a computer system or network and
exposes it to other hackers or public without notifying to the Victim- They are also known as “Crackers”.
Grey Hat Hackers: - Grey hat hackers are those guys who use their skills for both
ethical and unethical Purpose
Other Types of HackerElite Hacker
Hacktivist
Whacker
Phreaker
Script Kiddies
Script Kiddies: Those guys who actually don’t know
anything about hacking process, they use tools which available on the internet for free for attack
Phreakers: A phreaker are those guys who focuses on
communication systems to steal card num., make free phone calls, and get access illegally to communication devices.
Whackers: Whackers uses their skills to hack
wireless networks.
Hactivist: These kind of hackers compromise
systems with some political or social reasons.
Elite Hackers: These kinds of hackers are the most skilled among other types of
hackers. They have thorough knowledge of computer systems, programming languages. They Know what there are getting into.
Need of Ethical Hacking
Phishing attack Punjab National Bank Customers
Recent Facebook Scam
Need of Ethical Hacking ? ?
• To make the Cyberspace more secure.
• Respond to Cyber Crimes • To explore various threats that a system could have and ultimately report it to the concerned authorities.
Basic Steps of Hacking
Foot Printing
Scanning
Gaining Access
Maintain Access
Covering Tracks
Terminologies you should about
• Vulnerability: It is Weakness of any programming code like buffer overflow, that helps to hack any systems or network.
• Exploit: It is piece of malicious code that takes advantages of un-patched vulnerability in Program.
• Payload : After exploiting a vulnerability in software application , payload assists further to maintain connection with attacked system.
Terminologies you should about
Virus
Worms
Trojans
Key loggers
Spywares
Career in Hacking • According to Nasscom, demand for ethical hackers is estimated at over 77,000 in India every year.
•Against this, India is producing only 20,000-25,000 ethical hackers.
Career in Hacking:
Secure Shell Level-1
Course Duration:30 days
1.Introduction to Ethics of Hacking
2.Networking basics
3.Introduction to Linux
4.Windows hacking
5.Footprinting
6.Scanning
7.Proxy basics
8.DOS Attacks
9.Google hacking
10.Malwares
11.Cryptography
12.Stegnography
13.Firewall
14.Pentration Methodologies
15.Email hacking and security
16.Social Engineering
17.Online safety
Certificate for Participation. Tool kit. E-books. Cyber laws documents. Tutorial books. Operating system.
Secure Shell level-1
How to make a SECURE Password
UPPERCASE , lowercase lettersLength Should be more than 12 charactersShould contain at least 2 numbersShould contain Special SymbolLetters Replaced with Special Symbol e.g. s, S = $ ; a = @; I, I= !Whitespaces Phrases e.g.
Question ???..............
THANK YOU !!!