seminar ppt
TRANSCRIPT
ETHICAL HACKING
TABLE OF CONTENTSINTRODUCTION
HACKING
ETHICAL HACKING
METHODOLOGY OF ETHICAL HACKING
ETHICAL HACKING TOOLS
ADVANTAGES & DISADVANTAGES
FUTURE ENHANCEMENTS
CONCLUSIONS
REFERENCES
INTRODUCTION
Ethical hacking
Security
Tools employed are same.
Ethical hackers do not damage system.
HACKERA clever programmer.
CHARACTERISTICS OF HACKER One who:
Enjoys programming .
Appreciating someone else's hacking.
Expert.
TYPES OF HACKERS
BLACK HAT HACKER
WHITE HAT HACKER
GREY HAT HACKER
Fig1: Library of congress webpage before attack
ILLUSTRATION OF HACKING
Fig 2: Library of congress webpage after attack
FLOWCHART FOR HACKING
Fig 3: General hacking
ETHICAL HACKING Vulnerabilities existing.
SKILLS FOR ETHICAL HACKERMicrosoft
Linux
Firewalls
Network Protocols
Routers
Patience
ETHICAL HACKING
COMMANDMENTS
Working ethically.
Respecting privacy.
Not crashing your systems.
METHODOLOGY OF HACKINGReconnaissance
Scanning
Enumeration
Gaining access
Maintaining access
Clearing Tracks
ETHICAL HACKING TOOLSSamspade
Fig 4: Samspade GUI
Email Tracker and Visual Route
Fig 5: Email Tracker GUI
Visual Route: displays location using IP address.
Fig 6: Visual Route GUI
ADVANTAGES
To catch thief.
To close open holes.
Provides security.
DISADVANTAGESDepends on trustworthiness.
Expensive.
FUTURE ENHANCEMENTSEmploy new techniques.
Tools should be updated.
CONCLUSIONSGet updated about softwares.
Educate against black hat hacking.
Firewalls and other security measures.
The password should be made strong.
REFERENCES1. C.C PALMER IBM SYSTEMS JOURNAL, VOL 40, NO 3,
2001
2.Computer Security Education and Research- 1540-
7993/06/$20.00 © 2006 IEEE-IEEE Security and
Privacy
3.About Penetration Testing-1540-7993/07/$25.00 ©
2007 IEEE- IEEE Security and Privacy
QUERIES ?
THANK YOU