Top Banner
Ethical Hacking A TYPE OF HACKING
16
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ethical hacking

Ethical HackingA TYPE OF HACKING

Page 2: Ethical hacking

What is Ethical Hacking

• Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network.

Page 3: Ethical hacking

• An ethical hacker attempts to bypass way past the system security and search for any weak points that could be exploited by malicious hackers.

This is a mark that you are a Ethical Hacker

Page 4: Ethical hacking

Ethical Hacking

What They “KNOW” What They “DO”

Page 5: Ethical hacking

Hacking Web ApplicationsHacking into Cisco routersBreaking into databases with SQL InjectionJustifying a penetration test to management & customers

What They “KNOW”

Page 6: Ethical hacking

Hacking Web Applications• If a person hack in a existing web site or web application’s database,

cookie or cache memory is said the person is hacking web application or site.

• For example if your friend hacked your Facebook account for any reason it will be come under this heading.

Page 7: Ethical hacking

Hacking into Cisco routers

• Hacking is useful because Cisco routers are very fast, some with 18 T1 connections on one system, and they are very flexible and can be used in DoS attacks or to hack other systems since most of them run telnet.

Page 8: Ethical hacking

Breaking into databases with SQL Injection

• SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

• SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.

Page 9: Ethical hacking

Justifying a penetration test to management & customers

• This test is very essential for both the consumer and Hacker because it satisfy both the consumer and hacker.

Page 10: Ethical hacking

What They “DO”Data retrieval with SQL Injection HackingCheck wireless security via hackingSolve Malicious event.Unix, Windows and Cisco password cracking

Page 11: Ethical hacking

Data retrieval with SQL Injection Hacking

• SQL injection technique where DNS resolution process is exploited for retrieval of malicious SQL query results. Resulting DNS requests are intercepted by attackers themselves at the controlled remote name server extracting valuable data

Page 12: Ethical hacking

Check wireless security via hacking

• Hacking into your wireless system to check all the security majors are working properly or not and if any thing can be update to provide more security that what a Ethical hacker do.

Page 13: Ethical hacking

Solve Malicious event

• All anti-virus or anti-malware software are come under this heading. These software not only solve but also stop these type of actions.

Page 14: Ethical hacking

Unix, Windows and Cisco password cracking

• This a very important part of ethical hacking because it allow consumer to stay protected and alerted about there passwords.

Page 15: Ethical hacking

Some Visuals about Ethical Hacking

Page 16: Ethical hacking

Thank You All