ethical hacking ppt
TRANSCRIPT
![Page 1: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/1.jpg)
ETHICAL HACKING
B .Krishna Teja Reddy
Md . Haseeb furkhan
![Page 2: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/2.jpg)
Contents - Hacking
Hacking? Who is Hacker? History of Hacking Hacking incidents Types of Hacking How do Hackers Hack? Why do Hackers Hack? What Hackers do after Hacking? How to be a real Hacker?
![Page 3: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/3.jpg)
HACKING
What Hack actually mean???Hack definition:
1) an article or project without constructive end
2) work undertaken on bad self-advice
3)Examine something very minutely
![Page 4: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/4.jpg)
Who is hacker?
Hacker
– The person who hacks
Cracker
– System intruder/destroyer
![Page 5: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/5.jpg)
History of hacking
Telephone hacking– Use telephone freely– It’s called phreaking
Computer virus– Destroy many computers
Network hacking– Hack the important server remotely and
destroy/modify/disclose the information
![Page 6: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/6.jpg)
Hacking incidents
Internet Worm– Robert T. Morris made an internet worm. It
spread through the internet and crashed about 6000 systems.
Indian Defense Server– Recent hacking of Defense top secrets by
CHINEESE
And many more…..
![Page 7: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/7.jpg)
Types of hacking
U S
Normal
data transfer
U S
U S
U S
U S
Interruption Interception
H
H
Modification
H
Fabrication
S-Server H-Hacker U-User
![Page 8: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/8.jpg)
How Hackers Hack?
E-mail Hacking– Email forgery , Password Cracking, Phishing
System Hacking– Key loggers , Trojans, Backdoors , viruses
Wireless Hacking– WLAN hacking , network hacking
Web Server Hacking– Hacking websites , servers , databases etc
![Page 9: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/9.jpg)
Why do hackers hack?
Just for fun Show off To know others secrets Notify many people their thought Steal important information Destroy enemy’s computer network
during the war
![Page 10: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/10.jpg)
What do hackers do after hacking?
Patch security hole– The other hackers can’t intrude
Clear logs and hide themselves Install rootkit ( backdoor )
– The hacker who hacked the system can use the system later
– It contains trojan or other viruses and so on
Uses system silently without users notice
![Page 11: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/11.jpg)
How can be a real hacker?
Study C/C++/python/assembly language Study computer architecture Study operating system Study computer network Examine the hacking tools thoroughly Think the problem of the computer Lots of practice and patience
![Page 12: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/12.jpg)
Contents – Ethical Hacking
Ethical Hacking Who are Ethical Hackers? Why Ethical Hacking? Why cant prevent Hacking How Ethical Hacker defends? How to protect against Hacking? What to do after being Hacked Laws , fine and penalties Computer fraud & abuse act
![Page 13: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/13.jpg)
ETHICAL HACKING
It is Legal Permission is obtained from the target user Part of an overall security program Learn about the system and trying to find its
weaknesses.
![Page 14: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/14.jpg)
Who are Ethical Hackers???
Completely trustworthy. Strong programming and computer
networking skills. Techniques of Criminal hackers-
Detection-Prevention. Ethical hackers possesses same skills,
mindset and tools of a hacker but the attacks are done in a non-destructive manner
White-hat – Ethical HackersBlack-hat – Hackers
![Page 15: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/15.jpg)
Why Ethical Hacking???
![Page 16: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/16.jpg)
Why Ethical Hacking??
June 01, 2006 to Dec.31, 2006
Domains No of Defacements
.com 922
.gov.in 24
.org 53
.net 39
.biz 12
.co.in 48
.ac.in 13
.info 3
.nic.in 2
.edu 2
other 13
Total 1131
Defacement Statistics for Indian Websites
![Page 17: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/17.jpg)
Why can’t we be protect against hacking?
There are many unknown security hole Hackers need to know only one security
hole to hack the system Admin need to know all security holes to
defend the system
![Page 18: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/18.jpg)
How Ethical Hackers defend???
Harden the servers Scan, test and apply patches Monitor logs Train the technical staff on security Serious policy and procedures!
![Page 19: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/19.jpg)
How to prevent Hacking???
Encrypt important data– Ex) confidential data
Do not run unknown programs Setup firewall
– Ex) ipchains , antivirus Check unintentional changes Backup the system often Good physical security
![Page 20: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/20.jpg)
What to do after being hacked?
Shutdown the system– Or turn off the system
Separate the system from network Restore the system with the backup
– Or reinstall all programs
Connect the system to the network It can be good to call the police
![Page 21: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/21.jpg)
Laws,Fines and Penalities
Hackers, virus and worm writers could get 20 years to life in federal prison.
Anyone who uses computers to cause death or bodily harm, such as bringing down power grids or airport control centers, can get the maximum sentence.
The sentence is increased by 25% if they steal personal information.
The sentence is increased by 50% if they share the stolen information.
If posted on the Internet, sentence is doubled!
![Page 22: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/22.jpg)
Computer Fraud & Abuse Act
Offense -Sentence Obtaining National Security Information -10 (20) years Compromising the Confidentiality of a Computer -1 or 5 Trespassing in a Government Computer -1 (10) Accessing a Computer to Defraud & Obtain Value -5
(10) Knowing Transmission and Intentional Damage -10 (20
or life) Intentional Access and Reckless Damage -5 (20) Intentional Access and Damage -1 (10) Trafficking in Passwords -1 (10) Extortion Involving Threats to Damage Computer -5 (10)
![Page 23: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/23.jpg)
ANY QUERIES??
ANY QUERIES??
![Page 24: Ethical Hacking Ppt](https://reader036.vdocument.in/reader036/viewer/2022081716/5470f892b4af9fb5288b456b/html5/thumbnails/24.jpg)
THANK YOU