Transcript

ETHICALETHICAL HACKINGHACKING

Presented By:Manas Ranjan Das

Regd No:1121297048

Branch:ECE

1

Guided By:Mr. Baroda Prashnna SahooDept. Of ECE

HIGHLIGHTSHIGHLIGHTS• Introduction.

• Is hacking a crime?

• Hacking Vs Cracking.

• Why Ethical H4cking?

• Types of hackers.

• Types of Attacks.

• Security & Counter

Measure.

2

INTRODUCTIONINTRODUCTION The explosive growth of the Internet has brought many good things : electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution , to name a few. As with most technological advances , there is also a dark side : criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet. With these concerns and others, the ethical hacker can help.

3

Is hacking a crime??Is hacking a crime??

NO NOT AT ALL HACKING IS NOT A

CRIME4

Hacker is a word that has two meanings:

Traditionally, a hacker is someone who likes to tinker with software or electronic systems. Hackers enjoy exploring and learning how computer systems operate. They love discovering new ways to work electronically.

Recently, hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals are crackers (criminal hackers).They are out for personal gain: fame, profit, and even revenge. 5

Is hacking a crimeIs hacking a crime????

Hacking Vs Hacking Vs CrackingCracking

• Hacking with malicious intention is cracking.

• The basic difference is hackers do not do anything disastrous.

• Cracking yield more devastating results.

• Cracking is crime.

• Cyber crime are the results of cracking ,not hacking.

6

Why Ethical Hacking?

• It is Legal.

• Permission is obtained from the target.

• It is a part of an overall security program.

• Identify vulnerabilities visible from Internet at particular point of time.

• Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner.

7

Types of hackersTypes of hackers

Distinction on the basis of knowledge: CODERS.

ADMINS.

SCRIPT KIDDES.

Distinction on the basis of legality:WHITE HAT HACKERS.

GREY HAT HACKERS.

BLACK HAT HACKERS.

8

CODERS• They have full

knowledge.

• They know what exactly they are doing.

• Well aware about the different codes.

• They have complete idea what is going beyond coding. 9

ADMINS• They knows what they

are doing.

• They don’t have idea that what exactly going beyond codes.

• Result oriented persons

• They are not so harmful.

10

SCRIPT KIDDESSCRIPT KIDDES• Young in-experienced

hackers.

• Copy codes and techniques from knowledgeable hackers

• Don’t know what’s going beyond the coding.

• Use techniques for fun purpose.

• Sometimes could be very dangerous for the system.

11

WHITE HAT WHITE HAT HACKERSHACKERS

• White hat hackers are good hackers.

• They have genuine license to hack.

• They have registered police records.

• They involves themselves in good works.

• Generally owned by companies for security designing.

• They have high pay scales.

• Generally these are coders12

BLACK HAT BLACK HAT HACKERSHACKERS

• Black hat hackers are very dangerous persons.

• They always have motive to earn huge profit.

• These are highly paid persons.

• They evolves themselves mostly in criminal activities.

• These could be coders, admins as well as script kiddies.

13

GREY HAT HACKERSGREY HAT HACKERS• Grey hat hackers are also known as red

hats.

• They perform both tasks fair as well as unfair.

• Generally these are admins.

• They have little high pay than white hats.

• Generally these are not so dangerous, but sometimes could be.

14

TYPES OF ATTACKSTYPES OF ATTACKS Brute force attacks.

Buffer Overflow attacks.

Denial of Service (DoS) attacks.

Distributed Denial of Service (DDoS) attacks.

Misconfigurations.

Abuse of Trust.

Back doors and Trojans.

15

HACKING PRONE HACKING PRONE AREASAREAS

16

17

18

SECURITY & COUNTER SECURITY & COUNTER MEASUREMEASURE

• Use of anti-viruses.

• Proper logout after use of mail id.

• Manual opening browser

• Don't open spam.

• Password protected admin account.

• Always use strong password.

19

REFERENCE• www.google.com

• www.darshangajara.wordpress.com

• www.way2project.in

20

21

top related