SlideShare a Scribd company logo
5
Most read
10
Most read
11
Most read
Ethical Hacking
 Hacker is a computer user who attempts to gain
unauthorized access to proprietary computer system
mainly for personal gain or motivated by a challenge.
 Someone who maliciously breaks into systems for
personal gain. Technically, these criminals are crackers
(criminal hackers). Crackers break into (crack) systems
with malicious intent. They are out for personal gain:
fame, profit, and even revenge. They modify, delete,
and steal critical information, often making other
people miserable.
 The Team hacker is reclaimed by computer programmer
who argue that some one breaking into computers is
better called a Cracker.
 White hats
• Ethical hacker who breaks security but who does
so for altruistic or at least non-malicious reasons.
• Ethical hackers who use their hacking skills for
defensive purposes.
Black hats
• Black hats are the bad guys.
• Uses technology for terrorism, vandalism, identity
theft, intellectual proper theft.
 Grey hats
• Grey hats are hackers who may work offensively or
defensively, depending on the situation.
• The dividing line between hacker and cracker.
Ethical hacking—also known as
penetration testing or white-hat
hacking—involves the same
tools,tricks,and techniques that hackers
use, but with one major difference: Ethical
hacking is legal. Ethical hacking is
performed with the target’s permission.
To catch a thief, think like a thief-That’s
the basis for ethical hacking.
 Nontechnical attacks
 Network-infrastructure attacks
 Operating-system attacks
 Application and other specialized attacks
 Working Ethically
 Respecting Privacy
 Not crashing your systems
 Finding Security Holes
 Giving Advices
 Preventing A Real Attack
 Formulating your plan
 Selecting tools
 Executing the plan
 Evaluating results
 Moving on
 Approval for Ethical hacking is essential. Make what
you’re doing known and visible — at least to the
decision makers. A well-defined scope includes the
following information:-
 Specific systems to be tested.
 Risks that are involved.
 When the tests are performed and your overall timeline.
 How the tests are performed.
 How much knowledge of the systems you have before
you start testing.
 What is done when a major vulnerability is discovered.
Make sure you that you’re using the right tool for the
task:
 To crack passwords, you need a cracking tool such as
LC4, John the Ripper, or pwdump.
 For an in-depth analysis of a Web application, a Web-
application assessment tool (such as Whisker or
WebInspect) is more appropriate than a network
analyzer (such as Ethereal).
Start with a broad view and narrow your focus:-
 Search the Internet for your organization’s name, your
computer and network system names, and your IP
addresses.
 Narrow your scope, targeting the specific systems
you’re testing.
 Further narrow your focus with a more critical eye.
Perform actual scans and other detailed tests on your
systems.
 Perform the attacks, if that’s what you choose to do.
 Assess your results to see what you uncovered,
assuming that the vulnerabilities haven’t been made
obvious before now. This is where knowledge counts.
Evaluating the results and correlating the specific
vulnerabilities discovered is a skill that gets better with
experience. You’ll end up knowing your systems as well
as anyone else. This makes the evaluation process much
simpler moving forward.
 Submit a formal report to upper management or to your
customer, outlining your results.
 When you’ve finished your ethical hacking tests, you
still need to implement your analysis and
recommendations to make sure your systems are
secure.
 New security vulnerabilities continually appear.
Information systems constantly change and become
more complex. New hacker exploits and security
vulnerabilities are regularly uncovered. You may
discover new ones! Security tests are a snapshot of the
security posture of your systems. At any time,
everything can change, especially after software
upgrades, adding computer systems, or applying
patches. Plan to test regularly.
 Satan (Security Administrator’s Tool for Analyzing
Networks)
 Microsoft Baseline Security Analyzer 2.0
 F.B.I RAT (Full Backdoor Intergration) V0.1
 CeWL- Custom Word List
 WarVOX- War Dialing Reloaded
 Kon- Boot—Hack Windows & Linux Passwords!
Ethical Hacking

More Related Content

PPTX
Password Attack
PPT
Ethical Hacking Powerpoint
PPTX
Ethical hacking presentation
PPTX
Introduction To Ethical Hacking
PPTX
Ethical hacking : Its methodologies and tools
PPTX
Ethical hacking
PPTX
Ethical hacking
Password Attack
Ethical Hacking Powerpoint
Ethical hacking presentation
Introduction To Ethical Hacking
Ethical hacking : Its methodologies and tools
Ethical hacking
Ethical hacking

What's hot (20)

PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
ETHICAL HACKING PRESENTATION
PDF
Incident response methodology
PPT
Ethical hacking presentation
PPT
Web security
PPTX
Cia security model
PPTX
Cyber security
PDF
1. introduction to cyber security
PDF
Introduction to foot printing
PDF
Secure Code Review 101
PPTX
PPTX
Ethical hacking
PPT
Cyber Crime and Security
PPTX
Basics of Denial of Service Attacks
PDF
Password Management
PPTX
Footprinting and reconnaissance
PPTX
Hacking
PPTX
Presentation of Social Engineering - The Art of Human Hacking
PPTX
Network security
Cybersecurity Attack Vectors: How to Protect Your Organization
ETHICAL HACKING PRESENTATION
Incident response methodology
Ethical hacking presentation
Web security
Cia security model
Cyber security
1. introduction to cyber security
Introduction to foot printing
Secure Code Review 101
Ethical hacking
Cyber Crime and Security
Basics of Denial of Service Attacks
Password Management
Footprinting and reconnaissance
Hacking
Presentation of Social Engineering - The Art of Human Hacking
Network security

Similar to Ethical Hacking (20)

DOCX
Ethical Hacking
PPTX
EthicalHacking_AakashTakale
PDF
Ethical Hacking : Understanding the Basics
PPTX
UNIT I PPT.pptxsdVDSVDAVDSBGVGNhfzgnnzgdngfh
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PPTX
Ethical hacking concept-Part 1
DOCX
Ethical hacking
DOCX
Full seminar report on ethical hacking
PDF
Network Penetration Testing Service
DOCX
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
PPTX
Ethical Hacking
PDF
What is Ethical Hacking-defination, examples and techniques.pdf
PDF
🔐 Ethical Hacking Lifecycle_ A Beginner’s Guide to Cybersecurity’s First Line...
PPTX
GETTING STARTED WITH THE ETHICAL HACKING.pptx
PPTX
Ethical hacking/ Penetration Testing
PPT
Ethical hacking
PPT
Ethical hacking
PPTX
Introduction-to-Ethical-Hacking and Terminologies.pptx
DOCX
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
PDF
Master Ethical Hacking Basics Like a Pro
Ethical Hacking
EthicalHacking_AakashTakale
Ethical Hacking : Understanding the Basics
UNIT I PPT.pptxsdVDSVDAVDSBGVGNhfzgnnzgdngfh
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical hacking concept-Part 1
Ethical hacking
Full seminar report on ethical hacking
Network Penetration Testing Service
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
Ethical Hacking
What is Ethical Hacking-defination, examples and techniques.pdf
🔐 Ethical Hacking Lifecycle_ A Beginner’s Guide to Cybersecurity’s First Line...
GETTING STARTED WITH THE ETHICAL HACKING.pptx
Ethical hacking/ Penetration Testing
Ethical hacking
Ethical hacking
Introduction-to-Ethical-Hacking and Terminologies.pptx
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Master Ethical Hacking Basics Like a Pro

More from BugRaptors (20)

PPTX
Performance Testing - A Catalyst In Software Testing Landscape
PDF
13 Things To Keep In Mind For Enhanced Mobile App UI/UX Design
PPTX
Why Companies Need to Leverage ERP Testing Services?
PPTX
BFSI Testing Solutions - To Streamline BFSI Sector
PPTX
Media Streaming App Testing - Knowing The Significance
PPTX
Manual Testing - Developing A Quick Perspective
PDF
Regression Testing - An Overview
PDF
Cloud Testing - Reinforcing Cloud Technology
PPTX
Importance of Performance Testing.pptx
PDF
Media & Entertainment Testing Services –BugRaptors
PPTX
Usability Testing - Connect With Target Audience With Perfect UX
PDF
Tips To Follow For A Simple QA Process
PDF
CRM Testing Services - Ensure Smooth Functioning of Complex CRM Workflows
PPTX
Test Automation - Everything You Need To Know
PPTX
Stress testing ERP frameworks
PDF
Top 10 Automation Testing Tools
PPTX
Software Testing Trends For 2021
PDF
Banking App Testing - To Evaluate Performance
PDF
Test Automation Trends For 2021
PPTX
ERP Testing Strategy For Large Scale Organizations
Performance Testing - A Catalyst In Software Testing Landscape
13 Things To Keep In Mind For Enhanced Mobile App UI/UX Design
Why Companies Need to Leverage ERP Testing Services?
BFSI Testing Solutions - To Streamline BFSI Sector
Media Streaming App Testing - Knowing The Significance
Manual Testing - Developing A Quick Perspective
Regression Testing - An Overview
Cloud Testing - Reinforcing Cloud Technology
Importance of Performance Testing.pptx
Media & Entertainment Testing Services –BugRaptors
Usability Testing - Connect With Target Audience With Perfect UX
Tips To Follow For A Simple QA Process
CRM Testing Services - Ensure Smooth Functioning of Complex CRM Workflows
Test Automation - Everything You Need To Know
Stress testing ERP frameworks
Top 10 Automation Testing Tools
Software Testing Trends For 2021
Banking App Testing - To Evaluate Performance
Test Automation Trends For 2021
ERP Testing Strategy For Large Scale Organizations

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
cuic standard and advanced reporting.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
KodekX | Application Modernization Development
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
Cloud computing and distributed systems.
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectral efficient network and resource selection model in 5G networks
cuic standard and advanced reporting.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Digital-Transformation-Roadmap-for-Companies.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
KodekX | Application Modernization Development
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Advanced methodologies resolving dimensionality complications for autism neur...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Teaching material agriculture food technology

Ethical Hacking

  • 2.  Hacker is a computer user who attempts to gain unauthorized access to proprietary computer system mainly for personal gain or motivated by a challenge.
  • 3.  Someone who maliciously breaks into systems for personal gain. Technically, these criminals are crackers (criminal hackers). Crackers break into (crack) systems with malicious intent. They are out for personal gain: fame, profit, and even revenge. They modify, delete, and steal critical information, often making other people miserable.  The Team hacker is reclaimed by computer programmer who argue that some one breaking into computers is better called a Cracker.
  • 4.  White hats • Ethical hacker who breaks security but who does so for altruistic or at least non-malicious reasons. • Ethical hackers who use their hacking skills for defensive purposes. Black hats • Black hats are the bad guys. • Uses technology for terrorism, vandalism, identity theft, intellectual proper theft.  Grey hats • Grey hats are hackers who may work offensively or defensively, depending on the situation. • The dividing line between hacker and cracker.
  • 5. Ethical hacking—also known as penetration testing or white-hat hacking—involves the same tools,tricks,and techniques that hackers use, but with one major difference: Ethical hacking is legal. Ethical hacking is performed with the target’s permission. To catch a thief, think like a thief-That’s the basis for ethical hacking.
  • 6.  Nontechnical attacks  Network-infrastructure attacks  Operating-system attacks  Application and other specialized attacks
  • 7.  Working Ethically  Respecting Privacy  Not crashing your systems
  • 8.  Finding Security Holes  Giving Advices  Preventing A Real Attack
  • 9.  Formulating your plan  Selecting tools  Executing the plan  Evaluating results  Moving on
  • 10.  Approval for Ethical hacking is essential. Make what you’re doing known and visible — at least to the decision makers. A well-defined scope includes the following information:-  Specific systems to be tested.  Risks that are involved.  When the tests are performed and your overall timeline.  How the tests are performed.  How much knowledge of the systems you have before you start testing.  What is done when a major vulnerability is discovered.
  • 11. Make sure you that you’re using the right tool for the task:  To crack passwords, you need a cracking tool such as LC4, John the Ripper, or pwdump.  For an in-depth analysis of a Web application, a Web- application assessment tool (such as Whisker or WebInspect) is more appropriate than a network analyzer (such as Ethereal).
  • 12. Start with a broad view and narrow your focus:-  Search the Internet for your organization’s name, your computer and network system names, and your IP addresses.  Narrow your scope, targeting the specific systems you’re testing.  Further narrow your focus with a more critical eye. Perform actual scans and other detailed tests on your systems.  Perform the attacks, if that’s what you choose to do.
  • 13.  Assess your results to see what you uncovered, assuming that the vulnerabilities haven’t been made obvious before now. This is where knowledge counts. Evaluating the results and correlating the specific vulnerabilities discovered is a skill that gets better with experience. You’ll end up knowing your systems as well as anyone else. This makes the evaluation process much simpler moving forward.  Submit a formal report to upper management or to your customer, outlining your results.
  • 14.  When you’ve finished your ethical hacking tests, you still need to implement your analysis and recommendations to make sure your systems are secure.  New security vulnerabilities continually appear. Information systems constantly change and become more complex. New hacker exploits and security vulnerabilities are regularly uncovered. You may discover new ones! Security tests are a snapshot of the security posture of your systems. At any time, everything can change, especially after software upgrades, adding computer systems, or applying patches. Plan to test regularly.
  • 15.  Satan (Security Administrator’s Tool for Analyzing Networks)  Microsoft Baseline Security Analyzer 2.0  F.B.I RAT (Full Backdoor Intergration) V0.1  CeWL- Custom Word List  WarVOX- War Dialing Reloaded  Kon- Boot—Hack Windows & Linux Passwords!