Top Banner
ETHICAL ETHICAL HACKING HACKING Presented By: Manas Ranjan Das Regd No:1121297048 Branch:ECE 1 Guided By: Mr. Baroda Prashnna Sahoo Dept. Of ECE
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ethical hacking

ETHICALETHICAL HACKINGHACKING

Presented By:Manas Ranjan Das

Regd No:1121297048

Branch:ECE

1

Guided By:Mr. Baroda Prashnna SahooDept. Of ECE

Page 2: Ethical hacking

HIGHLIGHTSHIGHLIGHTS• Introduction.

• Is hacking a crime?

• Hacking Vs Cracking.

• Why Ethical H4cking?

• Types of hackers.

• Types of Attacks.

• Security & Counter

Measure.

2

Page 3: Ethical hacking

INTRODUCTIONINTRODUCTION The explosive growth of the Internet has brought many good things : electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution , to name a few. As with most technological advances , there is also a dark side : criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet. With these concerns and others, the ethical hacker can help.

3

Page 4: Ethical hacking

Is hacking a crime??Is hacking a crime??

NO NOT AT ALL HACKING IS NOT A

CRIME4

Page 5: Ethical hacking

Hacker is a word that has two meanings:

Traditionally, a hacker is someone who likes to tinker with software or electronic systems. Hackers enjoy exploring and learning how computer systems operate. They love discovering new ways to work electronically.

Recently, hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals are crackers (criminal hackers).They are out for personal gain: fame, profit, and even revenge. 5

Is hacking a crimeIs hacking a crime????

Page 6: Ethical hacking

Hacking Vs Hacking Vs CrackingCracking

• Hacking with malicious intention is cracking.

• The basic difference is hackers do not do anything disastrous.

• Cracking yield more devastating results.

• Cracking is crime.

• Cyber crime are the results of cracking ,not hacking.

6

Page 7: Ethical hacking

Why Ethical Hacking?

• It is Legal.

• Permission is obtained from the target.

• It is a part of an overall security program.

• Identify vulnerabilities visible from Internet at particular point of time.

• Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner.

7

Page 8: Ethical hacking

Types of hackersTypes of hackers

Distinction on the basis of knowledge: CODERS.

ADMINS.

SCRIPT KIDDES.

Distinction on the basis of legality:WHITE HAT HACKERS.

GREY HAT HACKERS.

BLACK HAT HACKERS.

8

Page 9: Ethical hacking

CODERS• They have full

knowledge.

• They know what exactly they are doing.

• Well aware about the different codes.

• They have complete idea what is going beyond coding. 9

Page 10: Ethical hacking

ADMINS• They knows what they

are doing.

• They don’t have idea that what exactly going beyond codes.

• Result oriented persons

• They are not so harmful.

10

Page 11: Ethical hacking

SCRIPT KIDDESSCRIPT KIDDES• Young in-experienced

hackers.

• Copy codes and techniques from knowledgeable hackers

• Don’t know what’s going beyond the coding.

• Use techniques for fun purpose.

• Sometimes could be very dangerous for the system.

11

Page 12: Ethical hacking

WHITE HAT WHITE HAT HACKERSHACKERS

• White hat hackers are good hackers.

• They have genuine license to hack.

• They have registered police records.

• They involves themselves in good works.

• Generally owned by companies for security designing.

• They have high pay scales.

• Generally these are coders12

Page 13: Ethical hacking

BLACK HAT BLACK HAT HACKERSHACKERS

• Black hat hackers are very dangerous persons.

• They always have motive to earn huge profit.

• These are highly paid persons.

• They evolves themselves mostly in criminal activities.

• These could be coders, admins as well as script kiddies.

13

Page 14: Ethical hacking

GREY HAT HACKERSGREY HAT HACKERS• Grey hat hackers are also known as red

hats.

• They perform both tasks fair as well as unfair.

• Generally these are admins.

• They have little high pay than white hats.

• Generally these are not so dangerous, but sometimes could be.

14

Page 15: Ethical hacking

TYPES OF ATTACKSTYPES OF ATTACKS Brute force attacks.

Buffer Overflow attacks.

Denial of Service (DoS) attacks.

Distributed Denial of Service (DDoS) attacks.

Misconfigurations.

Abuse of Trust.

Back doors and Trojans.

15

Page 16: Ethical hacking

HACKING PRONE HACKING PRONE AREASAREAS

16

Page 17: Ethical hacking

17

Page 18: Ethical hacking

18

Page 19: Ethical hacking

SECURITY & COUNTER SECURITY & COUNTER MEASUREMEASURE

• Use of anti-viruses.

• Proper logout after use of mail id.

• Manual opening browser

• Don't open spam.

• Password protected admin account.

• Always use strong password.

19

Page 20: Ethical hacking

REFERENCE• www.google.com

• www.darshangajara.wordpress.com

• www.way2project.in

20

Page 21: Ethical hacking

21