Transcript

Ethical HackingA TYPE OF HACKING

What is Ethical Hacking

• Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network.

• An ethical hacker attempts to bypass way past the system security and search for any weak points that could be exploited by malicious hackers.

This is a mark that you are a Ethical Hacker

Ethical Hacking

What They “KNOW” What They “DO”

Hacking Web ApplicationsHacking into Cisco routersBreaking into databases with SQL InjectionJustifying a penetration test to management & customers

What They “KNOW”

Hacking Web Applications• If a person hack in a existing web site or web application’s database,

cookie or cache memory is said the person is hacking web application or site.

• For example if your friend hacked your Facebook account for any reason it will be come under this heading.

Hacking into Cisco routers

• Hacking is useful because Cisco routers are very fast, some with 18 T1 connections on one system, and they are very flexible and can be used in DoS attacks or to hack other systems since most of them run telnet.

Breaking into databases with SQL Injection

• SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

• SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.

Justifying a penetration test to management & customers

• This test is very essential for both the consumer and Hacker because it satisfy both the consumer and hacker.

What They “DO”Data retrieval with SQL Injection HackingCheck wireless security via hackingSolve Malicious event.Unix, Windows and Cisco password cracking

Data retrieval with SQL Injection Hacking

• SQL injection technique where DNS resolution process is exploited for retrieval of malicious SQL query results. Resulting DNS requests are intercepted by attackers themselves at the controlled remote name server extracting valuable data

Check wireless security via hacking

• Hacking into your wireless system to check all the security majors are working properly or not and if any thing can be update to provide more security that what a Ethical hacker do.

Solve Malicious event

• All anti-virus or anti-malware software are come under this heading. These software not only solve but also stop these type of actions.

Unix, Windows and Cisco password cracking

• This a very important part of ethical hacking because it allow consumer to stay protected and alerted about there passwords.

Some Visuals about Ethical Hacking

Thank You All

top related