SlideShare a Scribd company logo
ETHICAL HACKING
SUMMER TRAINING
Copyright © 2015 Accenture All rights reserved. 2
OVERVIEW OF HACKING
Hacking
Examine something very minutely
The rapid crafting of new program or
the making of changes to
existing,usually complicated software.
Copyright © 2015 Accenture All rights reserved. 3
OBJECTIVES OF ETHICAL HACKING
 Ethical hacking offers an objective analysis of an
organizations information security posture for organizations of
any level of security expertise.
 The result of such an assessment is an actionable report with
valuable remediation advice tailored to the customers unique
IT environment,capabilities,and security objectives.
 As organizations of all sizes and sophistication levels can
benefit from objective expert.third party analysis,ethical
hacking has become a more mainstream service in the past
decade.
Copyright © 2015 Accenture All rights reserved. 4
FUTURE SCOPE OF ETHICAL HACKING
 As it an evolving branch the scope of
enhancement in technology is immense.No ethical
hacker can ensure the system security by using
the same technique repeatedly.He would have to
improve,develop and explore new avenues
repeatedly.
 More enhanced software’s should be used for
optimum protection.Tools used,need to be
updated regularly and more efficient ones
needtobe developed.
Copyright © 2015 Accenture All rights reserved. 5
HACKING VS CRACKING
 HACKER
The person who hacks.
 CRACKER
System intuder/destroyer.
 Hacking With Malicious Intention Is Cracking
 The basic difference is hackers do not do anything disastrous.
 Cracking yield more devastating results.
 Cracking is CRIME.
 Cyber crime are the results of cracking,not hacking.
Copyright © 2015 Accenture All rights reserved. 6
WHY DO PEOPLE HACK??
To make security stronger(Ethical Hacking)
Just for Fun
Show off
Hack other systems secretly & steal
important information.
Copyright © 2015 Accenture All rights reserved. 7
TYPES OF HACKER
White Hat Hacker
 Good guys
 Don’t use their skill for illegal purpose
 Computer security experts and help to protect from Black Hats.
Black Hat Hacker
 Bad guys
 Use their skill maliciously for personal gain
 Hack books,used credit cards and deface websites
Grey Hat Hacker
 It is a combination of white hat and black hat Hackers.
 Goal of grey hat hackers is to provide national security
Copyright © 2015 Accenture All rights reserved. 8
HACKER AND ETHICAL HACKER
Hacker
 Access computer system or network without
authorization
 Breaks the law
Ethical Hacker
 Performs most of the same activities buit with owners
permission
 Employeed by companies to perform Penetration Tests
Copyright © 2015 Accenture All rights reserved. 9
WHAT ARE THE VARIOUS
QUALITIES A HACKER SHOULD
POSSES
 Good coder
 Well knowledgeable person both hardware as well as well as
software
 Should have knowledge on security system
 Trusted person
Copyright © 2015 Accenture All rights reserved. 10
HACKING -PROCESS
FootPrinting
Scanning
Gaining Access
Maintaining Access
Clearing Traces
Copyright © 2015 Accenture All rights reserved. 11
FOOTPRINTING
Footprinting is the technique used for gathering information about
computer systems.
 Who is Lookup
 NS lookup
 IP Lookup
Copyright © 2015 Accenture All rights reserved. 12
SCANNING
Network scanning is a procedure for identifying active hosts
on a network,either for the purpose of attacking them or for
network security assessment.
 Port Scanning
 Network Scanning
 Finger Printing
 Fire walking
Copyright © 2015 Accenture All rights reserved. 13
Gaining Access
Gaining access is the most important phase of an attack in terms of
potential damage,Attackers need not always gain priviliges of
system to cause damage.
 Password Attack
 Social Engineering
 Viruses
Copyright © 2015 Accenture All rights reserved. 14
MAINTAINING ACCESS
Once an attacker gains access to the target system,the
attacker can choose to use both the system and its
resources,and further use the system a launch pad to scan and
exploit other systems,or to keep a low profile and continue
exploiting.
 Trojans
 Malwares
 Clearing tracks
Copyright © 2015 Accenture All rights reserved. 15
ADVANTAGES & DISADVANTAGES
ADVANTAGES
 Provides security to banking and financial establishments
 Prevents website defacements
 An evolving technique
 To catch a thief you have to think like a thief
DISADVANTAGES
 All depends upon the trustworthiness of the ethical hacker
 Hiring professionals is expensive.
Copyright © 2015 Accenture All rights reserved. 16
REQUIRED SKILLS OF ETHICAL
HACKER
 Linux: knowledge of linux/unix;security setting,configuration,and
services.
 Routers: knowledge of routers,routing protocols,and access control lists.
 Firewalls: configurations,and operationof intrusion detection system
 Microsoft: skills in operation,configuration and management.
 Technical & Security Knowledge
 Operating System Knowledge
 Network Knowledge
 Computer Expert
Copyright © 2015 Accenture All rights reserved. 17
TYPES OF ATTACKS
Operating System a attack
Dos attack
Ddos attack
Spoofing attack
Password attack
Application attack
Identity attack
Copyright © 2015 Accenture All rights reserved. 18
HOW CAN WE PROTECT THE SYSTEM?
 Patch security hole often
 Encrypt important data
 Do not run unused daemon
 Remove unused program
 Setup loghost
 Backup the system often
 Setup Firewall
 Setup IDS
Copyright © 2015 Accenture All rights reserved. 19
WHAT SHOULD DO AFTER HACKED?
Shutdown the system.
Separate the system from network
Restore the system with the backup
Connect the system to the network
Copyright © 2015 Accenture All rights reserved. 20
Conclusion
 In the preceeding sections we saw the methodology of
hacking,why should we aware of hacking and some tools
which a hacker may use.
 Now we can see what can we do against hacking or to
protect ourselves from hacking.
 The first thing we should do is to keep ourselves updated
about those softwares we and using for official and
reliable sources.
 Educate the employees and the users against black hat
hacking.
Ethical hacking

More Related Content

PPTX
Cyber security
PPTX
Career Guidance on Cybersecurity by Mohammed Adam
PDF
4. Mitigating a Cyber Attack
PPT
Ethical hacking
PPTX
Cyber Threat Intelligence
PPTX
Webinar cybersecurity presentation-6-2018 (final)
PPTX
Cybersecurity service provider
PDF
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber security
Career Guidance on Cybersecurity by Mohammed Adam
4. Mitigating a Cyber Attack
Ethical hacking
Cyber Threat Intelligence
Webinar cybersecurity presentation-6-2018 (final)
Cybersecurity service provider
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC

What's hot (20)

PPTX
Threat intelligence in security
PDF
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
PDF
Cyber intelligence for corporate security
PPT
Introduction To Ethical Hacking
PPTX
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
PDF
Cyber Intelligence Vision Information Sheet 20Nov2013
PDF
Incident handling of cyber espionage
PPTX
Ethical hacking
PDF
Deception Technology: Use Cases & Implementation Approaches
PDF
Game Changing Cyber Defensive Strategies for 2019
PPTX
Protecting application delivery without network security blind spots
PPTX
Ethical hacking
PDF
Cyber threat intelligence ppt
PDF
Threat Intelligence Is Like Three Day Potty Training
PPTX
The Internet of Everything is Here
PPTX
Ethical Hacking
PPTX
Ethical hacking
PDF
Ceh v11 all you need to know-converted
PDF
Detect & Remediate Malware & Advanced Targeted Attacks
PPTX
A Career in Cybersecurity
Threat intelligence in security
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cyber intelligence for corporate security
Introduction To Ethical Hacking
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
Cyber Intelligence Vision Information Sheet 20Nov2013
Incident handling of cyber espionage
Ethical hacking
Deception Technology: Use Cases & Implementation Approaches
Game Changing Cyber Defensive Strategies for 2019
Protecting application delivery without network security blind spots
Ethical hacking
Cyber threat intelligence ppt
Threat Intelligence Is Like Three Day Potty Training
The Internet of Everything is Here
Ethical Hacking
Ethical hacking
Ceh v11 all you need to know-converted
Detect & Remediate Malware & Advanced Targeted Attacks
A Career in Cybersecurity

Similar to Ethical hacking (20)

PPTX
this ppt is based on ethica l hacking _
PPTX
Ethical hacking
PPTX
Ethical hacking BY Thariq ibnu Ubaidhullah
PPTX
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
PPTX
CSSE-Ethical-Hacking-ppt.pptx
PPTX
dane Technical seminar Be in computer Engineeringppt.pptx
PPT
Ethical hacking a licence to hack
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
PDF
Challenges 14 security (1).pdf
PPTX
Ethical-Hacking-ppt.pptx
PPTX
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
PPTX
Cse ethical hacking ppt
PPT
Ethicalhackingalicencetohack 120223062548-phpapp01
PDF
01_Metasploit - The Elixir of Network Security
DOCX
Ethical hacking.
PDF
Fidelis - Live Demonstration of Deception Solution
PPTX
Mining attackers mind
PPTX
Summer training in jaipur
this ppt is based on ethica l hacking _
Ethical hacking
Ethical hacking BY Thariq ibnu Ubaidhullah
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
CSSE-Ethical-Hacking-ppt.pptx
dane Technical seminar Be in computer Engineeringppt.pptx
Ethical hacking a licence to hack
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Challenges 14 security (1).pdf
Ethical-Hacking-ppt.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Cse ethical hacking ppt
Ethicalhackingalicencetohack 120223062548-phpapp01
01_Metasploit - The Elixir of Network Security
Ethical hacking.
Fidelis - Live Demonstration of Deception Solution
Mining attackers mind
Summer training in jaipur

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Tartificialntelligence_presentation.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Hybrid model detection and classification of lung cancer
PDF
STKI Israel Market Study 2025 version august
PPT
What is a Computer? Input Devices /output devices
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Modernising the Digital Integration Hub
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Zenith AI: Advanced Artificial Intelligence
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Univ-Connecticut-ChatGPT-Presentaion.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Getting started with AI Agents and Multi-Agent Systems
WOOl fibre morphology and structure.pdf for textiles
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Web App vs Mobile App What Should You Build First.pdf
Developing a website for English-speaking practice to English as a foreign la...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Module 1.ppt Iot fundamentals and Architecture
Tartificialntelligence_presentation.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Hybrid model detection and classification of lung cancer
STKI Israel Market Study 2025 version august
What is a Computer? Input Devices /output devices
A comparative study of natural language inference in Swahili using monolingua...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx

Ethical hacking

  • 2. Copyright © 2015 Accenture All rights reserved. 2 OVERVIEW OF HACKING Hacking Examine something very minutely The rapid crafting of new program or the making of changes to existing,usually complicated software.
  • 3. Copyright © 2015 Accenture All rights reserved. 3 OBJECTIVES OF ETHICAL HACKING  Ethical hacking offers an objective analysis of an organizations information security posture for organizations of any level of security expertise.  The result of such an assessment is an actionable report with valuable remediation advice tailored to the customers unique IT environment,capabilities,and security objectives.  As organizations of all sizes and sophistication levels can benefit from objective expert.third party analysis,ethical hacking has become a more mainstream service in the past decade.
  • 4. Copyright © 2015 Accenture All rights reserved. 4 FUTURE SCOPE OF ETHICAL HACKING  As it an evolving branch the scope of enhancement in technology is immense.No ethical hacker can ensure the system security by using the same technique repeatedly.He would have to improve,develop and explore new avenues repeatedly.  More enhanced software’s should be used for optimum protection.Tools used,need to be updated regularly and more efficient ones needtobe developed.
  • 5. Copyright © 2015 Accenture All rights reserved. 5 HACKING VS CRACKING  HACKER The person who hacks.  CRACKER System intuder/destroyer.  Hacking With Malicious Intention Is Cracking  The basic difference is hackers do not do anything disastrous.  Cracking yield more devastating results.  Cracking is CRIME.  Cyber crime are the results of cracking,not hacking.
  • 6. Copyright © 2015 Accenture All rights reserved. 6 WHY DO PEOPLE HACK?? To make security stronger(Ethical Hacking) Just for Fun Show off Hack other systems secretly & steal important information.
  • 7. Copyright © 2015 Accenture All rights reserved. 7 TYPES OF HACKER White Hat Hacker  Good guys  Don’t use their skill for illegal purpose  Computer security experts and help to protect from Black Hats. Black Hat Hacker  Bad guys  Use their skill maliciously for personal gain  Hack books,used credit cards and deface websites Grey Hat Hacker  It is a combination of white hat and black hat Hackers.  Goal of grey hat hackers is to provide national security
  • 8. Copyright © 2015 Accenture All rights reserved. 8 HACKER AND ETHICAL HACKER Hacker  Access computer system or network without authorization  Breaks the law Ethical Hacker  Performs most of the same activities buit with owners permission  Employeed by companies to perform Penetration Tests
  • 9. Copyright © 2015 Accenture All rights reserved. 9 WHAT ARE THE VARIOUS QUALITIES A HACKER SHOULD POSSES  Good coder  Well knowledgeable person both hardware as well as well as software  Should have knowledge on security system  Trusted person
  • 10. Copyright © 2015 Accenture All rights reserved. 10 HACKING -PROCESS FootPrinting Scanning Gaining Access Maintaining Access Clearing Traces
  • 11. Copyright © 2015 Accenture All rights reserved. 11 FOOTPRINTING Footprinting is the technique used for gathering information about computer systems.  Who is Lookup  NS lookup  IP Lookup
  • 12. Copyright © 2015 Accenture All rights reserved. 12 SCANNING Network scanning is a procedure for identifying active hosts on a network,either for the purpose of attacking them or for network security assessment.  Port Scanning  Network Scanning  Finger Printing  Fire walking
  • 13. Copyright © 2015 Accenture All rights reserved. 13 Gaining Access Gaining access is the most important phase of an attack in terms of potential damage,Attackers need not always gain priviliges of system to cause damage.  Password Attack  Social Engineering  Viruses
  • 14. Copyright © 2015 Accenture All rights reserved. 14 MAINTAINING ACCESS Once an attacker gains access to the target system,the attacker can choose to use both the system and its resources,and further use the system a launch pad to scan and exploit other systems,or to keep a low profile and continue exploiting.  Trojans  Malwares  Clearing tracks
  • 15. Copyright © 2015 Accenture All rights reserved. 15 ADVANTAGES & DISADVANTAGES ADVANTAGES  Provides security to banking and financial establishments  Prevents website defacements  An evolving technique  To catch a thief you have to think like a thief DISADVANTAGES  All depends upon the trustworthiness of the ethical hacker  Hiring professionals is expensive.
  • 16. Copyright © 2015 Accenture All rights reserved. 16 REQUIRED SKILLS OF ETHICAL HACKER  Linux: knowledge of linux/unix;security setting,configuration,and services.  Routers: knowledge of routers,routing protocols,and access control lists.  Firewalls: configurations,and operationof intrusion detection system  Microsoft: skills in operation,configuration and management.  Technical & Security Knowledge  Operating System Knowledge  Network Knowledge  Computer Expert
  • 17. Copyright © 2015 Accenture All rights reserved. 17 TYPES OF ATTACKS Operating System a attack Dos attack Ddos attack Spoofing attack Password attack Application attack Identity attack
  • 18. Copyright © 2015 Accenture All rights reserved. 18 HOW CAN WE PROTECT THE SYSTEM?  Patch security hole often  Encrypt important data  Do not run unused daemon  Remove unused program  Setup loghost  Backup the system often  Setup Firewall  Setup IDS
  • 19. Copyright © 2015 Accenture All rights reserved. 19 WHAT SHOULD DO AFTER HACKED? Shutdown the system. Separate the system from network Restore the system with the backup Connect the system to the network
  • 20. Copyright © 2015 Accenture All rights reserved. 20 Conclusion  In the preceeding sections we saw the methodology of hacking,why should we aware of hacking and some tools which a hacker may use.  Now we can see what can we do against hacking or to protect ourselves from hacking.  The first thing we should do is to keep ourselves updated about those softwares we and using for official and reliable sources.  Educate the employees and the users against black hat hacking.