ethical hacking powerpoint

Post on 13-Apr-2017

89 Views

Category:

Engineering

7 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Ethical HackingBy: Renelyn Tuazon 4CpE-1

What is Hacking?

• act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them.

• usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer.

• A computer expert who does the act of hacking is called a “Hacker".

• Hackers are those who seek knowledge, to understand how systems operate, how they are designed, and then attempt to play with these systems.

Ethical Hacking

• Hacking is usually legal as long as it is being done to find weaknesses and help identify potential threats in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.  

• An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. 

Ethical Hacker Commandments:

• Work Ethically• Respect Privacy• Avoid Crashes of your Systems

Ethical Hacking - Process

Reconnaissance

• Reconnaissance is a set of processes and techniques used to covertly discover and collect information about a target system.

• refers to preparatory phase where an attacker learns about all of the possible attack vectors that can be used in their plan.

Scanning and Enumeration

• Scanning is the process where the attacker begins to actively probe a target machine or network for vulnerabilities that can be exploited.

• Enumeration is the ability of the hacker to convince some servers to give them information that is vital to them to make an attack.

Gaining Access

• In this process, the vulnerability is located and you attempt to exploit it in order to enterinto the system.

• This is the actual hacking phase in which the hacker gains access to the system.

Maintaining Access

• After gaining access, the hacker installs some backdoors in order to enter into the system when he needs access in this owned system in future.

Clearing Tracks

• “Everybody knows a good hacker but nobody knows a great hacker.”

• This process is actually an unethical activity. It has to do with the deletion of logs of all the activities that take place during the hacking process.

Reporting

• Reporting is the last step of finishing the ethical hacking process. Here the Ethical Hacker compiles a report with his findings and the job that was done such as the tools used, the success rate, vulnerabilities found, and the exploit processes .

Ethical Hacking Tools

• Nmap (Network Mapper)• Metasploit• Burp Suite• Angry IP Scanner• Cain and Abel

Advantages:

• Helps in closing the open holes in the system network

• Provides security to banking and financial establishments

• Prevents website defacements

Disadvantages:

• All depends upon the trustworthiness of the ethical hacker.

• Hiring professionals is expensive.

References:

• http://www.dummies.com/programming/networking/ethical-hacker-commandments/

• https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_pdf_version.htm

top related