CAUTION
  HACKER A
           T
    WORK

Ethical Hacking
Hacking


• Hacking is an act of penetrating computer
  systems to gain knowledge about the system
  and how it works.

• Hacking is the act of gaining access without
  legal authorization to a computer or computer
  network or network resources.
Hacking means making something
work regardless of the circumstances
Hacking is not very complex
Ethical Hacking

• Ethical hacking is the use of hacking
  knowledge to attempt to enter a network to
  find its loopholes and back doors.

• It is often referred to as ‘legalized hacking’
  and yes it is indeed legal and can even reap a
  lot of profits for highly skilled individuals.
Hacker
• Hackers are actually computer enthusiasts who know
  a lot about computers and computer networks and
  use this knowledge with a criminal intent.

• He is a person who uses his hacking skills and tool
  sets for destructive or offensive purposes such as
  disseminating viruses or performing DoS attacks to
  compromise or bring down systems and networks.

• Hackers are sometimes paid to damage corporate
  reputations or steal or reveal credit-card information
Types of Hackers

• White hat –
   Good guys
   Don’t use their skills for illegal purposes
   Computer security experts

• Black hat –
    Bad guys
    Use their skills for illegal purposes
    Criminals
Types of Hackers
• Script kiddies –
    Wannabe hackers
    No technical skills
    Have no clue about what’s happening in

• Elite hackers –
    Usually professionals
    Develop new attacks/tools
Why perform an ethical hack?

   To determine flaws and vulnerabilities
   To provide a quantitative metric for evaluating
    systems and networks
   To measure against pre-established baselines
   To determine risk to the organization
   To design mitigating controls
Skills Required Becoming an Ethical Hacker

   Criminal mindset
   Thorough knowledge about Computer
    programming, Networking and operating
    systems. highly targeted platforms (such as
    Windows, Unix, and Linux), etc.
   Patience, persistence, and immense perseverance
Levels in Ethical Hacking
Ethical Hacking Steps
Footprinting
   Gathering information of target information
       Internet             Domain name, network
                            blocks, IP addresses open to
                            Net, TCP and UDP services
                            running, ACLs, IDSes

       Intranet             Protocols (IP,NETBIOS),
                            internal domain names, etc

       Remote access        Phone numbers, remote
                            control, telnet,
                            authentication

       Extranet             Connection origination,
                            destination, type, access
                            control
Scanning
   After obtaining a list of network and IP addresses
    scanning starts:
       ping sweeps (active machines): user pinger in Windows and
        nmap in Linux/UNIX. This is an example of pinger.

       TCP port scanning (open ports in active machines): SYN
        and connect scans work with most hosts. SYN is stealthier
        and may not be logged.

       In Windows NT use SuperScan and in Linux/UNIX use
        nmap. See an example of SuperScan. BUT, hackers use
        scripts with binary files, not graphical tools.
                                                                    14
Types of Scanning

    Scanning Type               Purpose

Port scanning         Determines open ports and
                      services

Network scanning      IP addresses


Vulnerability scanning Presence of known
                       weaknesses
Scanning Tools

■   Nmap
■   Nessus
■   SNMP Scanner
■   THC-Scan
■   Netscan
■   IPSecScan
Enumeration
• After scanning process and is the process of
  gathering and compiling usernames, machine
  names, network resources, shares, and
  services.
• It also refers to actively querying or
  connecting to a target system to acquire this
  information.
Attack
• SQL injection
• SQL injection is a code injection technique that
  exploits a security vulnerability occurring in the
  database layer of an application.

• The vulnerability is present when user input is either
  incorrectly filtered for string literal escape characters
  embedded in SQL statements or user input is not
  strongly typed and thereby unexpectedly executed.
SQL injection

• During a SQL injection attack, malicious code is
  inserted into a web form field or the website’s code to
  make a system execute a command shell or other
  arbitrary commands.
• Just as a legitimate user enters queries and additions
  to the SQL database via a web form, the hacker can
  insert commands to the SQL server through the same
  web form field.
Wireless Hacking Techniques

• Cracking encryption and authentication
  mechanism
• Eavesdropping or sniffing
• Denial of Service
• AP masquerading or spoofing
• MAC spoofing
Wi-Fi network security
• Use Strong Encryption Protocol
• Don’t Announce Yourself-Disable SSID
• Change Default Administrator Passwords and
  Usernames
• Limit Access To Your Access Point
• Do Not Auto-Connect to Open Wi-Fi Networks
• Assign Static IP Addresses to Devices
• Enable Firewalls On Each Computer and the Router
• Position the Router or Access Point Safe

More Related Content

PDF
Cs8792 cns - unit v
PDF
Ethical Hacking Tools
PPTX
Intruders detection
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
Hacktrikz - Introduction to Information Security & Ethical Hacking
PPT
Chapter 2
PPTX
Cse ethical hacking ppt
PPTX
Penetration testing
 
Cs8792 cns - unit v
Ethical Hacking Tools
Intruders detection
Inetsecurity.in Ethical Hacking presentation
Hacktrikz - Introduction to Information Security & Ethical Hacking
Chapter 2
Cse ethical hacking ppt
Penetration testing
 

What's hot (19)

PPT
Ethical Hacking
PPT
Ethical hacking
PPTX
ETHICAL HACKING PRESENTATION
PDF
CNIT 123 Ch 1: Ethical Hacking Overview
PPT
Ethical hacking
PPTX
Ethical hacking : Its methodologies and tools
PPTX
Cse ethical hacking ppt
PDF
Certified Ethical Hacking - Book Summary
PDF
An Introduction to Ethical Hacking
PPTX
Ethical Hacking Redefined
PPT
Introduction to Hacking
PPTX
Network Security & Ethical Hacking
PPTX
Ethical Hacking
PPTX
Ethical hacking
PPT
Ethical hacking
PPTX
Web hacking 1.0
PPTX
Ethical hacking
PPT
Ethical hacking by shivam
PPT
Ethical Hacking and Penetration Testing
Ethical Hacking
Ethical hacking
ETHICAL HACKING PRESENTATION
CNIT 123 Ch 1: Ethical Hacking Overview
Ethical hacking
Ethical hacking : Its methodologies and tools
Cse ethical hacking ppt
Certified Ethical Hacking - Book Summary
An Introduction to Ethical Hacking
Ethical Hacking Redefined
Introduction to Hacking
Network Security & Ethical Hacking
Ethical Hacking
Ethical hacking
Ethical hacking
Web hacking 1.0
Ethical hacking
Ethical hacking by shivam
Ethical Hacking and Penetration Testing

Viewers also liked (12)

PPT
Ethical hacking
PPT
Hacking
PDF
Le Growth Hacking pour acquérir ses véritables utilisateurs
PPT
Security & ethical hacking
PPTX
Parag presentation on ethical hacking
PPTX
Erectile Dysfunction Symptoms And Treatment
PPSX
Hacking
PPTX
ETHICAL HACKING PPT
PPTX
Introduction To Ethical Hacking
PPTX
Ethical hacking presentation
PPTX
Hacking ppt
PPTX
Hacking & its types
Ethical hacking
Hacking
Le Growth Hacking pour acquérir ses véritables utilisateurs
Security & ethical hacking
Parag presentation on ethical hacking
Erectile Dysfunction Symptoms And Treatment
Hacking
ETHICAL HACKING PPT
Introduction To Ethical Hacking
Ethical hacking presentation
Hacking ppt
Hacking & its types

Similar to Ethical hacking (20)

PDF
What is ethical hacking and complete cyber security presentation on this file
ODP
Ethical hacking ppt
PDF
Cisel1 d
PPTX
Ethical hacking
PPT
Introduction To Information Security
PPT
PDF
PDF
PDF
ethical Hack
PPT
Hackers Cracker Network Intruder
PPT
How to become Hackers .
PPTX
Ethical Hacking
PPTX
Information Security Fundamentals - New Horizons Bulgaria
PPT
Hacking 1224807880385377-9
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PPT
Meletis Belsis - Introduction to information security
PPT
Complete notes security
PDF
Hacking.pdf
PDF
Ethical hacking at warp speed
PPT
Hacking Presentation
What is ethical hacking and complete cyber security presentation on this file
Ethical hacking ppt
Cisel1 d
Ethical hacking
Introduction To Information Security
ethical Hack
Hackers Cracker Network Intruder
How to become Hackers .
Ethical Hacking
Information Security Fundamentals - New Horizons Bulgaria
Hacking 1224807880385377-9
Ethical Hacking n VAPT presentation by Suvrat jain
Meletis Belsis - Introduction to information security
Complete notes security
Hacking.pdf
Ethical hacking at warp speed
Hacking Presentation

Recently uploaded (20)

PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
The various Industrial Revolutions .pptx
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
Five Habits of High-Impact Board Members
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Convolutional neural network based encoder-decoder for efficient real-time ob...
1 - Historical Antecedents, Social Consideration.pdf
STKI Israel Market Study 2025 version august
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
The various Industrial Revolutions .pptx
OpenACC and Open Hackathons Monthly Highlights July 2025
NewMind AI Weekly Chronicles – August ’25 Week III
Hindi spoken digit analysis for native and non-native speakers
The influence of sentiment analysis in enhancing early warning system model f...
Chapter 5: Probability Theory and Statistics
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
CloudStack 4.21: First Look Webinar slides
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A review of recent deep learning applications in wood surface defect identifi...
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Abstractive summarization using multilingual text-to-text transfer transforme...
Five Habits of High-Impact Board Members
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor

Ethical hacking

  • 1. CAUTION HACKER A T WORK Ethical Hacking
  • 2. Hacking • Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works. • Hacking is the act of gaining access without legal authorization to a computer or computer network or network resources.
  • 3. Hacking means making something work regardless of the circumstances
  • 4. Hacking is not very complex
  • 5. Ethical Hacking • Ethical hacking is the use of hacking knowledge to attempt to enter a network to find its loopholes and back doors. • It is often referred to as ‘legalized hacking’ and yes it is indeed legal and can even reap a lot of profits for highly skilled individuals.
  • 6. Hacker • Hackers are actually computer enthusiasts who know a lot about computers and computer networks and use this knowledge with a criminal intent. • He is a person who uses his hacking skills and tool sets for destructive or offensive purposes such as disseminating viruses or performing DoS attacks to compromise or bring down systems and networks. • Hackers are sometimes paid to damage corporate reputations or steal or reveal credit-card information
  • 7. Types of Hackers • White hat –  Good guys  Don’t use their skills for illegal purposes  Computer security experts • Black hat –  Bad guys  Use their skills for illegal purposes  Criminals
  • 8. Types of Hackers • Script kiddies –  Wannabe hackers  No technical skills  Have no clue about what’s happening in • Elite hackers –  Usually professionals  Develop new attacks/tools
  • 9. Why perform an ethical hack?  To determine flaws and vulnerabilities  To provide a quantitative metric for evaluating systems and networks  To measure against pre-established baselines  To determine risk to the organization  To design mitigating controls
  • 10. Skills Required Becoming an Ethical Hacker  Criminal mindset  Thorough knowledge about Computer programming, Networking and operating systems. highly targeted platforms (such as Windows, Unix, and Linux), etc.  Patience, persistence, and immense perseverance
  • 11. Levels in Ethical Hacking
  • 13. Footprinting  Gathering information of target information Internet Domain name, network blocks, IP addresses open to Net, TCP and UDP services running, ACLs, IDSes Intranet Protocols (IP,NETBIOS), internal domain names, etc Remote access Phone numbers, remote control, telnet, authentication Extranet Connection origination, destination, type, access control
  • 14. Scanning  After obtaining a list of network and IP addresses scanning starts:  ping sweeps (active machines): user pinger in Windows and nmap in Linux/UNIX. This is an example of pinger.  TCP port scanning (open ports in active machines): SYN and connect scans work with most hosts. SYN is stealthier and may not be logged.  In Windows NT use SuperScan and in Linux/UNIX use nmap. See an example of SuperScan. BUT, hackers use scripts with binary files, not graphical tools. 14
  • 15. Types of Scanning Scanning Type Purpose Port scanning Determines open ports and services Network scanning IP addresses Vulnerability scanning Presence of known weaknesses
  • 16. Scanning Tools ■ Nmap ■ Nessus ■ SNMP Scanner ■ THC-Scan ■ Netscan ■ IPSecScan
  • 17. Enumeration • After scanning process and is the process of gathering and compiling usernames, machine names, network resources, shares, and services. • It also refers to actively querying or connecting to a target system to acquire this information.
  • 18. Attack • SQL injection • SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. • The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed.
  • 19. SQL injection • During a SQL injection attack, malicious code is inserted into a web form field or the website’s code to make a system execute a command shell or other arbitrary commands. • Just as a legitimate user enters queries and additions to the SQL database via a web form, the hacker can insert commands to the SQL server through the same web form field.
  • 20. Wireless Hacking Techniques • Cracking encryption and authentication mechanism • Eavesdropping or sniffing • Denial of Service • AP masquerading or spoofing • MAC spoofing
  • 21. Wi-Fi network security • Use Strong Encryption Protocol • Don’t Announce Yourself-Disable SSID • Change Default Administrator Passwords and Usernames • Limit Access To Your Access Point • Do Not Auto-Connect to Open Wi-Fi Networks • Assign Static IP Addresses to Devices • Enable Firewalls On Each Computer and the Router • Position the Router or Access Point Safe