ethical hacking powerpoint

17
Ethical Hacking By: Renelyn Tuazon 4CpE-1

Upload: ren-tuazon

Post on 13-Apr-2017

89 views

Category:

Engineering


7 download

TRANSCRIPT

Page 1: Ethical Hacking Powerpoint

Ethical HackingBy: Renelyn Tuazon 4CpE-1

Page 2: Ethical Hacking Powerpoint

What is Hacking?

• act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them.

• usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer.

Page 3: Ethical Hacking Powerpoint

• A computer expert who does the act of hacking is called a “Hacker".

• Hackers are those who seek knowledge, to understand how systems operate, how they are designed, and then attempt to play with these systems.

Page 4: Ethical Hacking Powerpoint

Ethical Hacking

• Hacking is usually legal as long as it is being done to find weaknesses and help identify potential threats in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.  

Page 5: Ethical Hacking Powerpoint

• An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. 

Page 6: Ethical Hacking Powerpoint

Ethical Hacker Commandments:

• Work Ethically• Respect Privacy• Avoid Crashes of your Systems

Page 7: Ethical Hacking Powerpoint

Ethical Hacking - Process

Page 8: Ethical Hacking Powerpoint

Reconnaissance

• Reconnaissance is a set of processes and techniques used to covertly discover and collect information about a target system.

• refers to preparatory phase where an attacker learns about all of the possible attack vectors that can be used in their plan.

Page 9: Ethical Hacking Powerpoint

Scanning and Enumeration

• Scanning is the process where the attacker begins to actively probe a target machine or network for vulnerabilities that can be exploited.

• Enumeration is the ability of the hacker to convince some servers to give them information that is vital to them to make an attack.

Page 10: Ethical Hacking Powerpoint

Gaining Access

• In this process, the vulnerability is located and you attempt to exploit it in order to enterinto the system.

• This is the actual hacking phase in which the hacker gains access to the system.

Page 11: Ethical Hacking Powerpoint

Maintaining Access

• After gaining access, the hacker installs some backdoors in order to enter into the system when he needs access in this owned system in future.

Page 12: Ethical Hacking Powerpoint

Clearing Tracks

• “Everybody knows a good hacker but nobody knows a great hacker.”

• This process is actually an unethical activity. It has to do with the deletion of logs of all the activities that take place during the hacking process.

Page 13: Ethical Hacking Powerpoint

Reporting

• Reporting is the last step of finishing the ethical hacking process. Here the Ethical Hacker compiles a report with his findings and the job that was done such as the tools used, the success rate, vulnerabilities found, and the exploit processes .

Page 14: Ethical Hacking Powerpoint

Ethical Hacking Tools

• Nmap (Network Mapper)• Metasploit• Burp Suite• Angry IP Scanner• Cain and Abel

Page 15: Ethical Hacking Powerpoint

Advantages:

• Helps in closing the open holes in the system network

• Provides security to banking and financial establishments

• Prevents website defacements

Page 16: Ethical Hacking Powerpoint

Disadvantages:

• All depends upon the trustworthiness of the ethical hacker.

• Hiring professionals is expensive.

Page 17: Ethical Hacking Powerpoint

References:

• http://www.dummies.com/programming/networking/ethical-hacker-commandments/

• https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_pdf_version.htm