ethical hacking for computer science
TRANSCRIPT
![Page 1: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/1.jpg)
H4CK||\|G 1$ 9OOD
23/2/2016@sarath&surenthar1
![Page 2: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/2.jpg)
By SARATHKUMAR.K (MCA-B)
SURENDHAR.R (MCA-B)23/2/2016@sarath&surenthar
2
![Page 3: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/3.jpg)
CONTENTS What is Ethical Hacking? Types of Hackers Sniffing Phishing Key loggers Social Engineering Conclusion
23/2/2016@sarath&surenthar3
![Page 4: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/4.jpg)
WHAT IS HACKING? Hacking is a gain unauthorized access to
data in a system or computer. act of illegally entering a computer system,
and making unauthorized changes to the files and data contain within
Cracking : some one who destructs things.
23/2/2016@sarath&surenthar4
![Page 5: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/5.jpg)
WHAT IS ETHICAL HACKING?Ethical Hacking is testing the resources for a good cause and for the
Betterment of technology. Learn about the system and trying to find its
weaknesses. Techniques of Criminal hackers-Detection-
Prevention Given Completely trustworthy
23/2/2016@sarath&surenthar5
![Page 6: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/6.jpg)
TYPES OF HACKERS
BLACK HAT HACKER
GREY HAT HACKER
WHITE HAT HACKER
23/2/2016@sarath&surenthar6
![Page 7: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/7.jpg)
WHITE HAT HACKERS
Good guys
Don’t use their skills for illegal purpose
Computer security experts and help to protect from Black hat hackers…
23/2/2016@sarath&surenthar7
![Page 8: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/8.jpg)
BLACK HAT HACKERS
Bad guys.
Use their skills for their personnel gain
Hack banks, credit cards and defense websites.
23/2/2016@sarath&surenthar8
![Page 9: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/9.jpg)
GREY HAT HACKERS
They are the combination of Black Hat Hackers and White Hat Hackers.
Use their skills for their personnel gain
Goal of grey hat hackers is to provide National Security.
23/2/2016@sarath&surenthar9
![Page 10: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/10.jpg)
FEW HACKING TECHNOLOGIES
Password Cracking
SNIFFING
PHISHING
KEYLOGGERS
SOCIAL ENGINEERING
23/2/2016@sarath&surenthar10
![Page 11: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/11.jpg)
There are many methods for cracking the password and then get in to the system.
The simplest method is to guess the password. But this is a tedious work.
In order to make this work easier there are many automated tools for password guessing
like Cain and Abel
Password Cracking
23/2/2016@sarath&surenthar11
![Page 12: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/12.jpg)
SNIFFING
Sniffer is a program that monitor or reading all network traffic passing in and out over a network.
(Telnet, FTP, SMTP, HTTP) that all protocol are vulnerable for sniffing
Because it send data and password in clear text. Sniffing can be use both the ways legally or illegally like for monitor network traffic, network security and for stealing information like password, files from the network.
23/2/2016@sarath&surenthar12
![Page 13: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/13.jpg)
23/2/2016@sarath&surenthar13
![Page 14: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/14.jpg)
PHISHINGPhishing is the method used to steal personal information through spamming or other deceptive means. There are a number of different phishing techniques used to obtain personal information from users. Email / Spam
Phishers may send the same email to millions of users, requesting them to fill in personal details
Web Based Delivery Web based delivery is one of the most sophisticated phishing
techniques. Also known as “man-in-the-middle,” the hacker is located in between the original website and the phishing system.
Instant Messaging Instant messaging is the method in which the user receives a message
with a link directing them to a fake phishing website 23/2/2016@sarath&surenthar14
![Page 15: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/15.jpg)
23/2/2016@sarath&surenthar15
![Page 16: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/16.jpg)
KEYLOGGERS Key logger is a software which records each and every
key strokes you enter, include mouse click. Loggers are two types…
Hardware keylogger Software keylogger
Hardware Keylogger This is a thumb size device it records all keystrokes we enter from keyboard, then save it in its memory. Later this data will be analyzed. Software Keylogger
Software keylogger can be installed in the victims system, it records all keystrokes we enter from keyboard and takes the screen shots and saved in the hidden path. 23/2/2016@sarath&surenthar
16
![Page 17: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/17.jpg)
23/2/2016@sarath&surenthar17
![Page 18: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/18.jpg)
SOCIAL ENGINEERING Social engineering is the art of manipulating people so
they give up confidential information. When individuals are targeted the criminals are usually
trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer.
In the security chain human is the weakest link, because they trust everyone easily.
23/2/2016@sarath&surenthar18
![Page 19: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/19.jpg)
ADVANTAGES
Prevents website defacements.
Analyzing the weakness to find the loop holes. To improve high security
Provides security to banking and financial establishment.
To catch a thief you have to think like a thief.
DISADVANTAGES All depends upon the trustworthiness of the
ethical hacker. Hiring professionals is expensive 23/2/2016@sarath&surenthar
19
![Page 20: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/20.jpg)
People trust security, for security purpose we need Ethical Hacking.
Ethical hacking provides results which can be used to strengthen a information technology environments security
CONCLUSION
23/2/2016@sarath&surenthar20
![Page 21: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/21.jpg)
@sarath&surenthar
![Page 22: Ethical hacking for computer science](https://reader034.vdocument.in/reader034/viewer/2022042706/58865aad1a28ab26598b5c57/html5/thumbnails/22.jpg)
THANK YOU
@sarath&surenther