SlideShare a Scribd company logo
Ethical Hacking
Introduction
History Of Hacking
What do ethical hackers do?
What damage is caused?
Original web pageHacked web page
Ethical hacking
Original  web pageHacked web page
System Hacking: Administrator password guessing
Performing automated password guessing
Tool: LegionLegion automates the password guessing in NetBIOS sessions. Legion will scan multiple Class C IP address ranges for Windows shares and also offers a manual dictionary attack tool.
Password Guessing Counter Measures
Manual Password Cracking Algorithm
Automatic Password Cracking Algorithm
Password Cracking Counter Measures
Trojans and Backdoors
Ethical hacking
Tool: Donald DickDonald Dick is a tool that enables a user to control another computer over a network.It uses a client server architecture with the server residing on the victim's computer.
It’s Real
Social Engineering
People are usually theweakest link in thesecurity chain.A successful defensedepends on having goodpolicies in place andeducating employees tofollow the policies. Social Engineering is thehardest form of attack todefend against because itcannot be defended withhardware or softwareHuman Weakness
Types of Social Engineering
ExampleA man calls to a company help desk and says he’s forgotten his passwordIn a panic, he adds that if he misses a deadline on an big advertising project his boss might even fire him offThe help desk worker feels sorry for it and resets the password-- unwittingly giving the clean entrance in theCorporate network
Security Policies - ChecklistAccount Setup
Password change policy
Help desk procedures

More Related Content

PPTX
Skills that make network security training easy
PDF
VAPT Infomagnum
PPT
Ethicalhackingalicencetohack 120223062548-phpapp01
PPTX
Introduction To Vulnerability Assessment & Penetration Testing
PDF
Supply chain-attack
PDF
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
PPTX
External Attacks Against Pivileged Accounts
PDF
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
Skills that make network security training easy
VAPT Infomagnum
Ethicalhackingalicencetohack 120223062548-phpapp01
Introduction To Vulnerability Assessment & Penetration Testing
Supply chain-attack
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
External Attacks Against Pivileged Accounts
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...

What's hot (20)

PPTX
Network Security Risks and Challenges for Enterprises
PPTX
How Does a Data Breach Happen?
PPTX
Gaining A Foothold
PDF
Security Testing for Test Professionals
PPT
Security testing
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPT
Presentation
PPTX
3 steps to 4x the risk coverage of CA ControlMinder
PPTX
Ancaman & kelemahan server
PPT
Ethical hacking a licence to hack
PPTX
What is security testing and why it is so important?
PPTX
Integrated cyber defense
PDF
IBM Cybersecurity Analyst
PDF
CIS14: Physical and Logical Access Control Convergence
PPT
Security & control in management information system
PPTX
Ethical Hacking & Penetration Testing
PPTX
Network Security for Employees
PPTX
Cryptography and Network Security # Lecture 2
PPTX
Secure Data Workflow
Network Security Risks and Challenges for Enterprises
How Does a Data Breach Happen?
Gaining A Foothold
Security Testing for Test Professionals
Security testing
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Presentation
3 steps to 4x the risk coverage of CA ControlMinder
Ancaman & kelemahan server
Ethical hacking a licence to hack
What is security testing and why it is so important?
Integrated cyber defense
IBM Cybersecurity Analyst
CIS14: Physical and Logical Access Control Convergence
Security & control in management information system
Ethical Hacking & Penetration Testing
Network Security for Employees
Cryptography and Network Security # Lecture 2
Secure Data Workflow

Similar to Ethical hacking (20)

PPTX
Social engineering
PDF
Social engineering
PDF
Social Engineering.pdf
PPTX
Ethical Hacking and Network Defence 1.pptx
PPTX
Hacking the Human - How Secure Is Your Organization?
PPTX
Ethical Hacking - Copy.pptx
PDF
Need For Ethical & Security Issue In It
PPTX
Unmasking-Social-Engineering-Attacks.pptx
PPTX
Introduction to ethical hacking
PPTX
Lec 1- Intro to cyber security and recommendations
PPTX
Ethical Dilemmas/Issues in CyberWorld
PDF
Ethical hacking
PPT
Information Security - A Discussion
PPTX
Ethical Hacking
PPTX
National information security education & awareness program
PDF
Module 9 (social engineering)
PPT
Social Engineering: Protecting Yourself on the Campus Network
PPT
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
PPT
It security in healthcare
PDF
TH3 Professional Developper CEH social engineering
Social engineering
Social engineering
Social Engineering.pdf
Ethical Hacking and Network Defence 1.pptx
Hacking the Human - How Secure Is Your Organization?
Ethical Hacking - Copy.pptx
Need For Ethical & Security Issue In It
Unmasking-Social-Engineering-Attacks.pptx
Introduction to ethical hacking
Lec 1- Intro to cyber security and recommendations
Ethical Dilemmas/Issues in CyberWorld
Ethical hacking
Information Security - A Discussion
Ethical Hacking
National information security education & awareness program
Module 9 (social engineering)
Social Engineering: Protecting Yourself on the Campus Network
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
It security in healthcare
TH3 Professional Developper CEH social engineering

More from Presentaionslive.blogspot.com (20)

PPSX
Cloud Computing Introduction
PPT
PPT
PPT
Networksecurity&cryptography
PPT
Brain computer interface
PPT
Information Security
DOC
4g magic communication
PPT
Spattern matching using biometric techniques
PPT
Novel architecture
PPT
PPT
Multimedia and gaming
PPT
A multimodal interaction framework for pervasive game applications
PPT
1 spattern matching using biometric techniques
PPT
Unique p mail-addressing 97-03
PPT
Brain Computer Interface
Cloud Computing Introduction
Networksecurity&cryptography
Brain computer interface
Information Security
4g magic communication
Spattern matching using biometric techniques
Novel architecture
Multimedia and gaming
A multimodal interaction framework for pervasive game applications
1 spattern matching using biometric techniques
Unique p mail-addressing 97-03
Brain Computer Interface

Recently uploaded (20)

PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Computing-Curriculum for Schools in Ghana
PDF
Empowerment Technology for Senior High School Guide
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PDF
1_English_Language_Set_2.pdf probationary
PPTX
20th Century Theater, Methods, History.pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
IGGE1 Understanding the Self1234567891011
PDF
HVAC Specification 2024 according to central public works department
PDF
advance database management system book.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Chinmaya Tiranga quiz Grand Finale.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Computing-Curriculum for Schools in Ghana
Empowerment Technology for Senior High School Guide
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Hazard Identification & Risk Assessment .pdf
1_English_Language_Set_2.pdf probationary
20th Century Theater, Methods, History.pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
IGGE1 Understanding the Self1234567891011
HVAC Specification 2024 according to central public works department
advance database management system book.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
AI-driven educational solutions for real-life interventions in the Philippine...
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape

Ethical hacking