SlideShare a Scribd company logo
By
A.K.Jayanth Vinay
T.Naveena
III-C.S.E
MITS
Madanapalle
. Contents
➔ Abstract
➔ Introduction
➔ Procedure of Information Security
➔ Real Time Information Hacking “Places & Attacks”
➔ Tools used in hacking for different purposes
➔ Security Maintenance Tips
➔ Opportunities in Information Security
➔ Challenges for Information Security
➔ Conclusion
➔ Reference
The paper focuses on the real time security issues of information security
and protection mechanisms. We introduce the hacking and anti-measures
to be taken. We also discuss the typical areas of information gathering and
how to protect from being hacked. We list out a few Hacking Techniques
and Attacks used by hackers. We also focus on the step by step process for
securing systems. We discuss about some information theft and
information misused concepts to state the importance of information
security. It discuss some attacks like phishing, session hijacking, sniffing,
social engineering, hashing etc. and present securing techniques like
cryptography, authentication, firewall etc. and finally conclude the real
time caution to be taken to maintain security for information which is
information security.
Keywords: Information, security, protection, hacking, phishing, session
hijacking, sniffing, social engineering, hashing, cryptography,
authentication, firewall, attacks, techniques.
ABSTRACT
 Information security is the term which itself defines that protection of
information. Information security refers to the security of information which
is typically data finally.
 We have two different types of security to be maintained 1. Physical
Security 2. Software Security. The data can be of different types as
images, documents, videos, mp3 etc. files.
 Information security focuses on all kinds of resources where data is resting.
That means it focuses on device security as well as network security.
 Information day by day is increasing rapidly around us which can be stated
from rapid growth of IoT, Big Data and Big Data Analytics.
 Each and every device in IoT is creating lots of data daily and exported to
cloud, where we don’t know about the security of the data producing. Data
protection and privacy has higher demand. It mainly deals about integrity,
availability and confidentiality.
Introduction
Procedure of
Information
security
Real Time Information
Hacking “Places &
Attacks”
Hacking tools
Security
maintenance
tips
Introduction
Procedure of
Information
security
Real Time Information
Hacking “Places &
Attacks”
Hacking tools
Security
maintenance
tips
Reconnaissance:
Information gathering about the target
Scanning & Enumeration
To take the data from recon-step and apply
tools to gain further details like port numbers,
protocol details etc.
Gaining Access:
Attacking on victim system after identifying the
attack to be performed and controlling the
system access
Maintaining Access:
After gaining access the access is maintained
to gather targets details when ever necessary
Covering Tracks:
Once after the work is over
vulnerabilities(backdoors) must be close to
avoid the risk of getting caught or to prevent
that backdoor to help another hacker and
create problem to first one
Introduction
Procedure of
Information
security
Real Time Information
Hacking “Places &
Attacks”
Hacking tools
Security
maintenance
tips
Places
 Social engineering sites
Facebook, WhatsApp, Hike, LinkedIn, Twitter etc.
 Dumpster diving places
Recycle Bin, Trash in commercial network
oriented organizations(where they are working in
a server), secondary storage devices etc.
 Networking areas
Public Wi-Fi places, open hotspots, having a
hacking in our private network is also a danger
etc.
 Domain Name Service
Whois.net, yougetsignal etc.
 Reverse Look Up
Whitepages.com, truecaller etc.
 Websites and Blogs
Posts in blogs and websites also provide a lot of
sufficient data like interests, what internet services
target is using, sites target is visiting etc.
Introduction
Procedure of
Information
security
Security
maintenance
tips
Attacks
Phishing:
Morphing a website can be stated as Phishing. Copying
a webpage of a website and changing the server
address as of our choice.
Key logging:
This is a method used for recording the actions
performed by a device by installing a software in the
device and allowing that to send data to the admin
Social Engineering:
This is a technique where the user is cheated by all
means and trying to get the information physically
without any risking.
Sniffing:
sniffing is the method used to capture the data and
trying to get the required details (username, password)
from those captured data packets with in a network.
Session Hijacking:
session hijacking is the technique used to hijack a
device and control it in a network.
Real Time Information
Hacking “Places &
Attacks”
Hacking tools
Introduction
Procedure of
Information
security
Real Time Information
Hacking “Places &
Attacks”
Hacking tools
Security
maintenance
tips
RAT techniques (Remote Access Tool):
This is a technique where an application is sent to the victim
if he installs it assuming as useful application then the device
will be hacked with lack of knowledge to user
Hashing:
knowing the location of the password in memory and trying
to remove it or change it without authentication
SQL Injection:
It is an attack to inject SQL commands into SQL statements
via webpages as input. This commands compromise the
database and its security
Dictionary hacking:
password cracking techniques are a few methods to hack
passwords and enter an authentication secured systems
Network hacking Techniques:
There are Viruses, Malwares, Worms and Trojans which are
sent to our devices without our notice in a network. They
access control over our device.
Attacks
Introduction
Procedure of
Information
security
Real Time Information
Hacking “Places &
Attacks”
Hacking tools
Security
maintenance
tips
TOOLS USED IN HACKING FOR DIFFERENT PURPOSES
PHISHING:
000webhost, my3gb etc.
Key logging:
keylogger, actualkeylogger
etc.
Social Engineering:
Facebook, Twitter, Whatsapp
Google Hacking etc.
Sniffing:
WireShark, Smartsniff etc.
Session Hijacking:
FireSheep, WireShark etc.
Introduction
Procedure of
Information
security
Real Time Information
Hacking “Places &
Attacks”
Hacking tools
Security
maintenance
tips
TOOLS USED IN HACKING
FOR
DIFFERENT PURPOSES
Remote Access Tools:
AndroRAT, DroidRAT etc.
Hashing:
OPH crack, MD5, SHA1 etc.
Virus, Trojans, Malware:
NeuclearRat, Ardamax,
ILOVEYOU, etc.
SQL Injection:
Havij, sqlmap etc.
Dictionary Hacking:
Brutus, RainbowCrack etc.
 Don’t expose lots of data to internet
 Use a good anti-virus to secure from external attacks
 Learn ethical hacking and try to hack your system and check
your security level
 Configure operating system firewall properly
 If you are using cloud services make sure the privacy policy &
check security levels
 communicate cryptographically in order to maintain security
 Use authentication where ever possible which provide high
security
 Try to set an alert if any attack is detected by proper system
or network configuration
 Do not use any default IP address, username, passwords etc.
 Uninstall unwanted as well as unknown applications
(programs) running on your device
Introduction
Procedure of
Information
security
Real Time Information
Hacking “Places &
Attacks”
Hacking tools
Security
maintenance
tips
SECURITY MAINTAINANCE TIPS
 Information security guys have lots of demand for growing IoT society,
everywhere security is being a big problem.
 Malicious hackers are trying to enter into networks and cause harm to
systems.
 There are many events where many people are losing lots of money in
online scams and many are committing suicide for their personal data
being hacked and being blackmailed.
 There are many issues in society which require lots of Information
Security Experts. That is the reason why cisco, Innobuzz etc.
 World famous ethical hacking teaching companies training lots of
members from their company and recruiting for different world famous
companies as well as to government to solve Information Security
problems
 At every place in society there is a need for security like IoT, Big Data,
Cloud Computing etc.
OPPORTUNITIES OF INFORMATION SECURITY
Security maintenance
tips
ReferencesOpportunities Challenges Conclusion
 Lack of knowledge over computer and
networks to people is making people
victims to hackers.
 Selfishness in hackers making them to
turn around into black hat hackers
 Developing hacking methodologies and
lack of awareness
 No proper usage of Good Antivirus
software
 Tending to use free version antivirus
software which stops limited number of
viruses
 No proper encouragement of security
concepts of computers and networks in
educational institutions compared with
other computer concepts
Security maintenance
tips
ReferencesOpportunities Challenges Conclusion
Challenges to Information Security
Security maintenance
tips
ReferencesOpportunities Challenges Conclusion
With these we would like to state that Information
Security has lots of future and anyone don’t want
to their data to be hacked by someone else. So it’s
better to have knowledge over ethical hacking and
secure our systems as well as to help our society.
We also hope this information would help you to
secure your Information. So its time for you to
check how far your computer is SAFE.
Conclusion
Security maintenance
tips
ReferencesOpportunities Challenges Conclusion
 www.Innobuzz.in
 www.hackersforcharity.com
 www.wikipedia.org
 hackersforcharity.org
 hackersonlineclub.com
 forum.xda-developers.com
 www.hackthissite.org
 www.theinternetofthings.eu
 www.Internetofthingswiki.com
 www.sas.com
 www.cloudcomputing.ieee.org
References
ThanQ…

More Related Content

PPSX
Information Security and Ethical Hacking
DOCX
Full seminar report on ethical hacking
PPTX
Ethical hacking : Its methodologies and tools
PPTX
Information security & ethical hacking
PPTX
Career in Ethical Hacking
PPTX
Presentation on Ethical Hacking ppt
PPT
ETHICAL HACKING
PPTX
Ethical hacking a research paper
Information Security and Ethical Hacking
Full seminar report on ethical hacking
Ethical hacking : Its methodologies and tools
Information security & ethical hacking
Career in Ethical Hacking
Presentation on Ethical Hacking ppt
ETHICAL HACKING
Ethical hacking a research paper

What's hot (18)

PPTX
Introduction To Ethical Hacking
PPTX
Cse ethical hacking ppt
PPT
Introduction to Hacking
PPTX
Penetration testing
 
PPTX
Hacktrikz - Introduction to Information Security & Ethical Hacking
PPTX
Cyber Security-Ethical Hacking
PPTX
Cse ethical hacking ppt
PPT
Ethical hacking
PPTX
Ethical Hacking PPT (CEH)
PPTX
Ethical Hacking
PPTX
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PPTX
Ethical Hacking
PPTX
Ethical hacking basics
PPTX
Ethical hacking
PPT
Ethical hacking ppt_presentation_way2project_in
PPT
Ethical Hacking
PPTX
Ethical hacking
PDF
Ethical Hacking Tools
Introduction To Ethical Hacking
Cse ethical hacking ppt
Introduction to Hacking
Penetration testing
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Cyber Security-Ethical Hacking
Cse ethical hacking ppt
Ethical hacking
Ethical Hacking PPT (CEH)
Ethical Hacking
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Ethical Hacking
Ethical hacking basics
Ethical hacking
Ethical hacking ppt_presentation_way2project_in
Ethical Hacking
Ethical hacking
Ethical Hacking Tools

Similar to Ethical hacking for information security (20)

PPTX
CYBER SECURITY AND ETHICAL HACKING.pptx
PPTX
Module 1Introduction to cyber security.pptx
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
Ethical-Hacking-ppt.pptx
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
PPTX
CSSE-Ethical-Hacking-ppt.pptx
PPTX
Ashar Shaikh A-84 SEMINAR.pptx
PDF
Top Cyber Security Interview Questions and Answers 2022.pdf
PPTX
An An Exploration Into the Cyber Security
PDF
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
PDF
CyberSecurity.pdf
PDF
Ethical Hacking
PPTX
Computer-Security.pptx
PPTX
Ethical Hacking .pptx
PPTX
Cyber Security and Data Privacy in Information Systems.pptx
PDF
Cyber security notes or Mca/bca about security
PPTX
Summer training in jaipur
PPTX
All About Network Security & its Essentials.pptx
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPT
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
CYBER SECURITY AND ETHICAL HACKING.pptx
Module 1Introduction to cyber security.pptx
CSE-Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
CSSE-Ethical-Hacking-ppt.pptx
Ashar Shaikh A-84 SEMINAR.pptx
Top Cyber Security Interview Questions and Answers 2022.pdf
An An Exploration Into the Cyber Security
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
CyberSecurity.pdf
Ethical Hacking
Computer-Security.pptx
Ethical Hacking .pptx
Cyber Security and Data Privacy in Information Systems.pptx
Cyber security notes or Mca/bca about security
Summer training in jaipur
All About Network Security & its Essentials.pptx
CSE-Ethical-Hacking-ppt.pptx
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt

Recently uploaded (20)

PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Institutional Correction lecture only . . .
PPTX
Cell Types and Its function , kingdom of life
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
master seminar digital applications in india
PPTX
Lesson notes of climatology university.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Sports Quiz easy sports quiz sports quiz
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Renaissance Architecture: A Journey from Faith to Humanism
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Module 4: Burden of Disease Tutorial Slides S2 2025
O7-L3 Supply Chain Operations - ICLT Program
Anesthesia in Laparoscopic Surgery in India
Institutional Correction lecture only . . .
Cell Types and Its function , kingdom of life
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Basic Mud Logging Guide for educational purpose
master seminar digital applications in india
Lesson notes of climatology university.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Cell Structure & Organelles in detailed.
102 student loan defaulters named and shamed – Is someone you know on the list?
VCE English Exam - Section C Student Revision Booklet
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Sports Quiz easy sports quiz sports quiz
O5-L3 Freight Transport Ops (International) V1.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx

Ethical hacking for information security

  • 2. . Contents ➔ Abstract ➔ Introduction ➔ Procedure of Information Security ➔ Real Time Information Hacking “Places & Attacks” ➔ Tools used in hacking for different purposes ➔ Security Maintenance Tips ➔ Opportunities in Information Security ➔ Challenges for Information Security ➔ Conclusion ➔ Reference
  • 3. The paper focuses on the real time security issues of information security and protection mechanisms. We introduce the hacking and anti-measures to be taken. We also discuss the typical areas of information gathering and how to protect from being hacked. We list out a few Hacking Techniques and Attacks used by hackers. We also focus on the step by step process for securing systems. We discuss about some information theft and information misused concepts to state the importance of information security. It discuss some attacks like phishing, session hijacking, sniffing, social engineering, hashing etc. and present securing techniques like cryptography, authentication, firewall etc. and finally conclude the real time caution to be taken to maintain security for information which is information security. Keywords: Information, security, protection, hacking, phishing, session hijacking, sniffing, social engineering, hashing, cryptography, authentication, firewall, attacks, techniques. ABSTRACT
  • 4.  Information security is the term which itself defines that protection of information. Information security refers to the security of information which is typically data finally.  We have two different types of security to be maintained 1. Physical Security 2. Software Security. The data can be of different types as images, documents, videos, mp3 etc. files.  Information security focuses on all kinds of resources where data is resting. That means it focuses on device security as well as network security.  Information day by day is increasing rapidly around us which can be stated from rapid growth of IoT, Big Data and Big Data Analytics.  Each and every device in IoT is creating lots of data daily and exported to cloud, where we don’t know about the security of the data producing. Data protection and privacy has higher demand. It mainly deals about integrity, availability and confidentiality. Introduction Procedure of Information security Real Time Information Hacking “Places & Attacks” Hacking tools Security maintenance tips
  • 5. Introduction Procedure of Information security Real Time Information Hacking “Places & Attacks” Hacking tools Security maintenance tips Reconnaissance: Information gathering about the target Scanning & Enumeration To take the data from recon-step and apply tools to gain further details like port numbers, protocol details etc. Gaining Access: Attacking on victim system after identifying the attack to be performed and controlling the system access Maintaining Access: After gaining access the access is maintained to gather targets details when ever necessary Covering Tracks: Once after the work is over vulnerabilities(backdoors) must be close to avoid the risk of getting caught or to prevent that backdoor to help another hacker and create problem to first one
  • 6. Introduction Procedure of Information security Real Time Information Hacking “Places & Attacks” Hacking tools Security maintenance tips Places  Social engineering sites Facebook, WhatsApp, Hike, LinkedIn, Twitter etc.  Dumpster diving places Recycle Bin, Trash in commercial network oriented organizations(where they are working in a server), secondary storage devices etc.  Networking areas Public Wi-Fi places, open hotspots, having a hacking in our private network is also a danger etc.  Domain Name Service Whois.net, yougetsignal etc.  Reverse Look Up Whitepages.com, truecaller etc.  Websites and Blogs Posts in blogs and websites also provide a lot of sufficient data like interests, what internet services target is using, sites target is visiting etc.
  • 7. Introduction Procedure of Information security Security maintenance tips Attacks Phishing: Morphing a website can be stated as Phishing. Copying a webpage of a website and changing the server address as of our choice. Key logging: This is a method used for recording the actions performed by a device by installing a software in the device and allowing that to send data to the admin Social Engineering: This is a technique where the user is cheated by all means and trying to get the information physically without any risking. Sniffing: sniffing is the method used to capture the data and trying to get the required details (username, password) from those captured data packets with in a network. Session Hijacking: session hijacking is the technique used to hijack a device and control it in a network. Real Time Information Hacking “Places & Attacks” Hacking tools
  • 8. Introduction Procedure of Information security Real Time Information Hacking “Places & Attacks” Hacking tools Security maintenance tips RAT techniques (Remote Access Tool): This is a technique where an application is sent to the victim if he installs it assuming as useful application then the device will be hacked with lack of knowledge to user Hashing: knowing the location of the password in memory and trying to remove it or change it without authentication SQL Injection: It is an attack to inject SQL commands into SQL statements via webpages as input. This commands compromise the database and its security Dictionary hacking: password cracking techniques are a few methods to hack passwords and enter an authentication secured systems Network hacking Techniques: There are Viruses, Malwares, Worms and Trojans which are sent to our devices without our notice in a network. They access control over our device. Attacks
  • 9. Introduction Procedure of Information security Real Time Information Hacking “Places & Attacks” Hacking tools Security maintenance tips TOOLS USED IN HACKING FOR DIFFERENT PURPOSES PHISHING: 000webhost, my3gb etc. Key logging: keylogger, actualkeylogger etc. Social Engineering: Facebook, Twitter, Whatsapp Google Hacking etc. Sniffing: WireShark, Smartsniff etc. Session Hijacking: FireSheep, WireShark etc.
  • 10. Introduction Procedure of Information security Real Time Information Hacking “Places & Attacks” Hacking tools Security maintenance tips TOOLS USED IN HACKING FOR DIFFERENT PURPOSES Remote Access Tools: AndroRAT, DroidRAT etc. Hashing: OPH crack, MD5, SHA1 etc. Virus, Trojans, Malware: NeuclearRat, Ardamax, ILOVEYOU, etc. SQL Injection: Havij, sqlmap etc. Dictionary Hacking: Brutus, RainbowCrack etc.
  • 11.  Don’t expose lots of data to internet  Use a good anti-virus to secure from external attacks  Learn ethical hacking and try to hack your system and check your security level  Configure operating system firewall properly  If you are using cloud services make sure the privacy policy & check security levels  communicate cryptographically in order to maintain security  Use authentication where ever possible which provide high security  Try to set an alert if any attack is detected by proper system or network configuration  Do not use any default IP address, username, passwords etc.  Uninstall unwanted as well as unknown applications (programs) running on your device Introduction Procedure of Information security Real Time Information Hacking “Places & Attacks” Hacking tools Security maintenance tips SECURITY MAINTAINANCE TIPS
  • 12.  Information security guys have lots of demand for growing IoT society, everywhere security is being a big problem.  Malicious hackers are trying to enter into networks and cause harm to systems.  There are many events where many people are losing lots of money in online scams and many are committing suicide for their personal data being hacked and being blackmailed.  There are many issues in society which require lots of Information Security Experts. That is the reason why cisco, Innobuzz etc.  World famous ethical hacking teaching companies training lots of members from their company and recruiting for different world famous companies as well as to government to solve Information Security problems  At every place in society there is a need for security like IoT, Big Data, Cloud Computing etc. OPPORTUNITIES OF INFORMATION SECURITY Security maintenance tips ReferencesOpportunities Challenges Conclusion
  • 13.  Lack of knowledge over computer and networks to people is making people victims to hackers.  Selfishness in hackers making them to turn around into black hat hackers  Developing hacking methodologies and lack of awareness  No proper usage of Good Antivirus software  Tending to use free version antivirus software which stops limited number of viruses  No proper encouragement of security concepts of computers and networks in educational institutions compared with other computer concepts Security maintenance tips ReferencesOpportunities Challenges Conclusion Challenges to Information Security
  • 14. Security maintenance tips ReferencesOpportunities Challenges Conclusion With these we would like to state that Information Security has lots of future and anyone don’t want to their data to be hacked by someone else. So it’s better to have knowledge over ethical hacking and secure our systems as well as to help our society. We also hope this information would help you to secure your Information. So its time for you to check how far your computer is SAFE. Conclusion
  • 15. Security maintenance tips ReferencesOpportunities Challenges Conclusion  www.Innobuzz.in  www.hackersforcharity.com  www.wikipedia.org  hackersforcharity.org  hackersonlineclub.com  forum.xda-developers.com  www.hackthissite.org  www.theinternetofthings.eu  www.Internetofthingswiki.com  www.sas.com  www.cloudcomputing.ieee.org References