SlideShare a Scribd company logo
ETHICAL HACKING AND
SYSTEM ADMINISTRATION
By Rajan Maharjan
 Hacking
 Types of Hackers
 Ethical Hacking
 System Administrator
 Administration includes
 Skills and Prerequisites
 Career in ethical hacking and system
administration
 Hacking is unauthorized use of computer
and network resources.
 According to Computer Crime Research
Center:“It is act of gaining access
without legal authorization to computer
or computer network.”
 Dec 04 2013
Hackers Compromise 2 Million
Facebook, Twitter and Gmail Accounts
http://mashable.com/2013/12/04/hackers-facebook-twitter-gmail/
 Jan 29 2014
GoDaddy Admits Hacker’s Social
Engineering Led It To Divulge Info In
@N Twitter Account Hack
http://techcrunch.com/2014/01/29/godaddy-admits-hackers-social-engineering-
led-it-to-divulge-info-in-n-twitter-account-hack/
 Record-breaking DDoS attack in
Europe hits 400Gbps
http://news.cnet.com/8301-1009_3-57618762-83/record-breaking-ddos-attack-
in-europe-hits-400gbps/
The term hacker has dual usage in modern
days but was defined in early days as:
HACKER noun
1.A person who enjoys learning the details of
computer systems and how to stretch their
capabilities—as opposed to most users of
computers, who prefer to learn only the
minimum
amount necessary.
2. One who programs enthusiastically or who
enjoys programming rather than just theorizing
about programming.
TYPES OF HACKERS
 Black hats :– highly skilled, malicious,
destructive “crackers” ; offensive
 White hats – skills used for defensive
security analysts ; defensive
 Gray hats – offensively and defensively;
will hack for different reasons, depends
on situation.
ETHICAL HACKING
 Ethical hacking ,also known as penetration
testing or white-hat hacking with the
permission of the target.
 involves the same tools, tricks, and
techniques that hackers use, i.e, by
duplicating the intent and actions of
malicious hacker.
Ethical Hackers
 Trustworthy security professional
 Applies hacking skills for defensive purpose
 Has very strong programming skill and system
understanding
 Firewalls: configurations, and operation of
intrusion detection systems.
 License to hack
 The International Council of E-Commerce
Consultants (EC-Council) provides a professional
certification for Certified Ethical Hackers (CEH).
ETHICAL HACKING PROCESS
1. Preparation
 Identification of target – website, mail server
etc.
 Signing of contract
 Agreement on protection against any legal
issue.
 Contracts to clearly specify limits and
dangers of the test.
 Total time for testing.
 Key people made aware of testing.
ETHICAL HACKING PROCESS CONTD..
2. FOOTPRINTING
 Collecting required information about target:
DNS server. IP ranges. Administrative
contacts. Problem reveled by administrator.
3. ENUMERATION AND FINGERPRINTING
 Operating system enumeration. Identification of
services/open port.
3. IDENTIFICATION OF VULNERABILITIES:
 Vulnerabilities Insecure configuration. Weak
passwords. Insecure programming. Weak
access control.
SYSTEM ADMINISTRATOR
 A system administrator, or sysadmin, is a
person who is responsible for the upkeep,
configuration, and reliable operation of
computer systems; especially multi-user
computers, such as servers.
Network administrator
Database administrator
System Engineer
IT Engineer
ROLES OF SYSADMIN
 Installing, maintaining and troubleshooting
workstations, servers, OSs, software applications and
other computing systems
 Creating user accounts and assigning user
permissions
 Security and Firewall Setup
 Creating backup and retrieval policies and assigning
bulk storage
 Creating System and network monitoring systems
 Updating systems upon release of new OSs or software
ROLES OF SYSADMIN CONTD..
 Strategic planning for service and system outages
 Light programming or scripting System-related project
management
 User training and management High-level technical
knowledge and technical support experience
 Hardware and software system security, such as
protection against hardware theft and abuse,
malware/spyware and unauthorized use of systems
and components, including firewall and intrusion
detection system(IDS)
DESIRED TRAITS AND SKILLS
 Deep understanding of system and netwoking
 Cloud Technology
 Linux
 Virtualization
 Routing Protocols and Layers (IP,TCP, OSPF)
 Scripting ( bash, python, powershell etc)
 Database administration
 Certifications ( MCSE,RHCE, CCNA, CEH etc ) *
 Problem solving ability
 Multitasking
 Patience
CAREER OPPORTUNITIES
 Local and global opportunities
 Software Companies
 Banks
 ISPs
 Department of IT in all companies
 Freelancing
 Lot more
THANKYOU ALL!
ANY QUESTIONS?
razanwidz@gmail.com
http://np.linkedin.com/pub/rajan-maharjan/4a/552/68b/
facebook.com/rjnmhrjn

More Related Content

PDF
Natural Language Interface: Advantages & Dis-Advantages
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PPTX
Bio-metric Attendance System
PDF
student application form Java Netbeans
PPT
Learning Management Systems - Selecting an LMS
PPTX
Electronic Mail
PPS
Internet safety
PPTX
It security and awareness training 5 10-2018
Natural Language Interface: Advantages & Dis-Advantages
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Bio-metric Attendance System
student application form Java Netbeans
Learning Management Systems - Selecting an LMS
Electronic Mail
Internet safety
It security and awareness training 5 10-2018

What's hot (20)

PPTX
Cybersecurity Training
PPTX
Desktop application
PPSX
Brute force attack
PDF
Student Management System
DOCX
Information security proposal for electronic door lock
PDF
main report on restaurant
PPTX
Internet security powerpoint
PPTX
Password Policy and Account Lockout Policies
PPTX
computer viruses power point presentation
PPTX
Introduction to Malwares
PPTX
Spam & Phishing
PPTX
Phising a Threat to Network Security
PDF
Internet Safety
DOCX
Online Job Portal
PPTX
Phishing techniques
PPTX
Guest Lecture-Computer and Cyber Security.pptx
PPTX
Cybersecurity Awareness Training
PDF
Social Engineering Attacks & Principles
PDF
Cybersecurity Awareness Training Presentation v2021.08
PPTX
Data Security - English
Cybersecurity Training
Desktop application
Brute force attack
Student Management System
Information security proposal for electronic door lock
main report on restaurant
Internet security powerpoint
Password Policy and Account Lockout Policies
computer viruses power point presentation
Introduction to Malwares
Spam & Phishing
Phising a Threat to Network Security
Internet Safety
Online Job Portal
Phishing techniques
Guest Lecture-Computer and Cyber Security.pptx
Cybersecurity Awareness Training
Social Engineering Attacks & Principles
Cybersecurity Awareness Training Presentation v2021.08
Data Security - English

Similar to Ethical hacking and System administration (20)

PDF
VTU network security(10 ec832) unit 6 notes
DOCX
Final Project – Incident Response Exercise SAMPLE.docx
PDF
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
PDF
User_Access_IIA-LA_3-9-2016
DOC
V1_I2_2012_Paper4.doc
PDF
Detection of Distributed Denial of Service Attacks
PPTX
CyberSecurity and Importance of cybersecurity
PDF
Cyber Security
DOCX
Computer security and privacy
PPTX
Cybercrime and Security
PDF
Solvit identity is the new perimeter
PPTX
It security
PPT
Hacking
PPTX
IT Audit - Shadow IT Systems
PPT
ThreatModeling.ppt
PDF
Securing Your Remote Access Desktop Connection
PDF
Cyber security and cyber law
PPTX
SEMINAR ON CYBER SECURITY.pptx
PPTX
Computer security
PPT
Cloud computing final show
VTU network security(10 ec832) unit 6 notes
Final Project – Incident Response Exercise SAMPLE.docx
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
User_Access_IIA-LA_3-9-2016
V1_I2_2012_Paper4.doc
Detection of Distributed Denial of Service Attacks
CyberSecurity and Importance of cybersecurity
Cyber Security
Computer security and privacy
Cybercrime and Security
Solvit identity is the new perimeter
It security
Hacking
IT Audit - Shadow IT Systems
ThreatModeling.ppt
Securing Your Remote Access Desktop Connection
Cyber security and cyber law
SEMINAR ON CYBER SECURITY.pptx
Computer security
Cloud computing final show

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
KodekX | Application Modernization Development
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PPTX
sap open course for s4hana steps from ECC to s4
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
MIND Revenue Release Quarter 2 2025 Press Release
KodekX | Application Modernization Development
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Building Integrated photovoltaic BIPV_UPV.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Dropbox Q2 2025 Financial Results & Investor Presentation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Programs and apps: productivity, graphics, security and other tools
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
sap open course for s4hana steps from ECC to s4

Ethical hacking and System administration

  • 1. ETHICAL HACKING AND SYSTEM ADMINISTRATION By Rajan Maharjan
  • 2.  Hacking  Types of Hackers  Ethical Hacking  System Administrator  Administration includes  Skills and Prerequisites  Career in ethical hacking and system administration
  • 3.  Hacking is unauthorized use of computer and network resources.  According to Computer Crime Research Center:“It is act of gaining access without legal authorization to computer or computer network.”
  • 4.  Dec 04 2013 Hackers Compromise 2 Million Facebook, Twitter and Gmail Accounts http://mashable.com/2013/12/04/hackers-facebook-twitter-gmail/  Jan 29 2014 GoDaddy Admits Hacker’s Social Engineering Led It To Divulge Info In @N Twitter Account Hack http://techcrunch.com/2014/01/29/godaddy-admits-hackers-social-engineering- led-it-to-divulge-info-in-n-twitter-account-hack/  Record-breaking DDoS attack in Europe hits 400Gbps http://news.cnet.com/8301-1009_3-57618762-83/record-breaking-ddos-attack- in-europe-hits-400gbps/
  • 5. The term hacker has dual usage in modern days but was defined in early days as: HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities—as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming.
  • 6. TYPES OF HACKERS  Black hats :– highly skilled, malicious, destructive “crackers” ; offensive  White hats – skills used for defensive security analysts ; defensive  Gray hats – offensively and defensively; will hack for different reasons, depends on situation.
  • 7. ETHICAL HACKING  Ethical hacking ,also known as penetration testing or white-hat hacking with the permission of the target.  involves the same tools, tricks, and techniques that hackers use, i.e, by duplicating the intent and actions of malicious hacker.
  • 8. Ethical Hackers  Trustworthy security professional  Applies hacking skills for defensive purpose  Has very strong programming skill and system understanding  Firewalls: configurations, and operation of intrusion detection systems.  License to hack  The International Council of E-Commerce Consultants (EC-Council) provides a professional certification for Certified Ethical Hackers (CEH).
  • 9. ETHICAL HACKING PROCESS 1. Preparation  Identification of target – website, mail server etc.  Signing of contract  Agreement on protection against any legal issue.  Contracts to clearly specify limits and dangers of the test.  Total time for testing.  Key people made aware of testing.
  • 10. ETHICAL HACKING PROCESS CONTD.. 2. FOOTPRINTING  Collecting required information about target: DNS server. IP ranges. Administrative contacts. Problem reveled by administrator. 3. ENUMERATION AND FINGERPRINTING  Operating system enumeration. Identification of services/open port. 3. IDENTIFICATION OF VULNERABILITIES:  Vulnerabilities Insecure configuration. Weak passwords. Insecure programming. Weak access control.
  • 11. SYSTEM ADMINISTRATOR  A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers. Network administrator Database administrator System Engineer IT Engineer
  • 12. ROLES OF SYSADMIN  Installing, maintaining and troubleshooting workstations, servers, OSs, software applications and other computing systems  Creating user accounts and assigning user permissions  Security and Firewall Setup  Creating backup and retrieval policies and assigning bulk storage  Creating System and network monitoring systems  Updating systems upon release of new OSs or software
  • 13. ROLES OF SYSADMIN CONTD..  Strategic planning for service and system outages  Light programming or scripting System-related project management  User training and management High-level technical knowledge and technical support experience  Hardware and software system security, such as protection against hardware theft and abuse, malware/spyware and unauthorized use of systems and components, including firewall and intrusion detection system(IDS)
  • 14. DESIRED TRAITS AND SKILLS  Deep understanding of system and netwoking  Cloud Technology  Linux  Virtualization  Routing Protocols and Layers (IP,TCP, OSPF)  Scripting ( bash, python, powershell etc)  Database administration  Certifications ( MCSE,RHCE, CCNA, CEH etc ) *  Problem solving ability  Multitasking  Patience
  • 15. CAREER OPPORTUNITIES  Local and global opportunities  Software Companies  Banks  ISPs  Department of IT in all companies  Freelancing  Lot more