SlideShare a Scribd company logo
INTRODUCTION TO CEH
PRESENTED BY:HEMANT MITAL
WHY SHOULD WE KNOW ABOUT
CEH?
• In this Tech-savvy world of 21st
Century every one is
engaged with internet, through whatsapp , twitter,
facebook , net-banking & lots of other platforms are
there.
• And some criminal minded persons commit crimes here,
which is included under cyber-crime.
• We should be aware about crimes happening around in the
cyber-space, so we can protect ourselves.
WHAT A CEH DO?
•  A CEH is hired to locate and repair application
and system security vulnerabilities to preempt
exploitations by black hat hackers and others
with potentially illegal intentions. 
•Ethical hackers employ the same tools and
techniques as the intruders.
EXAMPLES OF CYBER CRIME
STEPS FOR PEN TESTING
1. Preparation
2. Footprinting
3. Enumeration & Fingerprinting
4. Identification of Vulnerabilities
5. Attack – Exploit the Vulnerabilities
6. Cover tracks
PREPARATION
• Identification of Targets – company websites, mail servers, extranets, etc.
• Signing of Contract
• Agreement on protection against any legal issues
• Contracts to clearly specifies the limits and dangers of the test
• Specifics on Denial of Service Tests, Social Engineering, etc.
• Time window for Attacks
• Total time for the testing
• Prior Knowledge of the systems
• Key people who are made aware of the testing
FOOTPRINTING
Collecting as much information about the target
•DNS Servers
•IP Ranges
•Administrative Contacts
•Problems revealed by administrators
Information Sources
•Search engines
•Forums
•Tools – PING, whois, Traceroute, nslookup,
ENUMERATION & FINGERPRINTING
• Specific targets determined
• Identification of Services / open ports
• Operating System Enumeration
• Methods
• Banner grabbing
• Responses to various protocol (ICMP &TCP) commands
• Port / Service Scans – TCP Connect, TCP SYN, TCP FIN, etc.
• Tools
• Nmap, tcpdump, ssh, telnet
IDENTIFICATION OF
VULNERABILITIES
Vulnerabilities
•Insecure Configuration
•Weak passwords
•Unpatched vulnerabilities in services, Operating systems, applications
•Possible Vulnerabilities in Services, Operating Systems
•Insecure programming
•Weak Access Control
IDENTIFICATION OF
VULNERABILITIES
Methods
•Unpatched / Possible Vulnerabilities – Tools, Vulnerability information
Websites
•Weak Passwords – Default Passwords, Brute force, Social Engineering,
Listening to Traffic
•Insecure Programming – SQL Injection, Listening to Traffic
•Weak Access Control – Using the Application Logic, SQL Injection
ATTACK – EXPLOIT THE
VULNERABILITIES
• Obtain as much information (trophies) from the Target Asset
• Gaining Normal Access
• Escalation of privileges
• Obtaining access to other connected systems
• Last Ditch Effort – Denial of Service
ATTACK – EXPLOIT THE
VULNERABILITIES
• Network Infrastructure Attacks
• Connecting to the network through modem
• Weaknesses in TCP / IP, NetBIOS
• Flooding the network to cause DOS
• Operating System Attacks
• Application Specific Attacks
• Exploiting implementations of HTTP, SMTP protocols
ATTACK – EXPLOIT THE
VULNERABILITIES
• Gaining access to application Databases
• SQL Injection
• Spamming
Exploits
• Free exploits from Hacker Websites
• Customised free exploits
• Internally Developed
• Tools – Nessus, Metasploit Framework
REPORTING
Methodology
•Exploited Conditions & Vulnerabilities that could not
be exploited
•Proof for Exploits - Trophies
•Practical Security solutions
OTHER IMPORTANT TECHNICES
• Social Engineering
• Denial of Service
• Session Hijacking
• SQL Injection
• IDS, Firewalls and Honeypots
OTHER IMPORTANT TECHNICES(CONTINUED…)
• Buffer Overflow
• Cryptography
• Hacking Wireless Networks
• SNIFFING
• Trojan horse
OTHER IMPORTANT TECHNICES(CONTINUED…)
• Viruses and Worms
• Hacking Web Applications
• Hacking Mobile Platforms

More Related Content

PPTX
Cyber crime and security (1)
PPTX
Cyber crimeppt1-samweg1 (1)
PPTX
Types of Attack in Information and Network Security
PPTX
Cybercrime
PDF
Voicemail_Protection
PPT
ETHICAL HACKING
PDF
Cs8792 cns - unit v
PPT
Ethical hacking
Cyber crime and security (1)
Cyber crimeppt1-samweg1 (1)
Types of Attack in Information and Network Security
Cybercrime
Voicemail_Protection
ETHICAL HACKING
Cs8792 cns - unit v
Ethical hacking

What's hot (19)

PPTX
Design and Analyze Secure Networked Systems - 1
PPTX
Exfiltration slides-v1-release
PPTX
computer viruses
DOCX
Jeffrey_Smith_Resume_2016
PPTX
Crontab Cyber Security session 3
PPTX
CS8792 - Cryptography and Network Security
PDF
DRC -- Cybersecurity concepts2015
PPT
Module 1 Introduction
PPTX
Ethical Hacking Redefined
ODP
Network Security Topic 1 intro
PPT
Information Assurance Presentation
PPTX
Security in Computer System
PPTX
2014-09-03 Cybersecurity and Computer Crimes
PPTX
Computer Security
PPTX
Software Security
PPTX
Noorhidayu Yussof (Presentation 3)
PPTX
Hacking intro
PDF
Security in computer systems fundamentals
Design and Analyze Secure Networked Systems - 1
Exfiltration slides-v1-release
computer viruses
Jeffrey_Smith_Resume_2016
Crontab Cyber Security session 3
CS8792 - Cryptography and Network Security
DRC -- Cybersecurity concepts2015
Module 1 Introduction
Ethical Hacking Redefined
Network Security Topic 1 intro
Information Assurance Presentation
Security in Computer System
2014-09-03 Cybersecurity and Computer Crimes
Computer Security
Software Security
Noorhidayu Yussof (Presentation 3)
Hacking intro
Security in computer systems fundamentals
Ad

Similar to Introduction to ceh (20)

PDF
Certified Ethical Hacking - Book Summary
PPT
Ethical hacking
PPT
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
PPT
324515851-Ethical-Hacking-Ppt-Download4575.ppt
PPT
324515851-Ethical-Hacking-Ppt-Download4575.ppt
PPT
Ethical hacking by shivam
PPT
Ethical hacking-ppt-download4575
PPT
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
PPTX
Ethical hacking/ Penetration Testing
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
Hacking - penetration tools
PPTX
Hacking and Penetration Testing - a beginners guide
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PDF
CEH Exam Practice Questions and Answers Part 2.pdf
PDF
CEH Exam Practice Questions and Answers Part - 2.pdf
PDF
CEH Exam Practice Q&A Part 2 by InfosecTrain
PPTX
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
PDF
Hacking - CEH Cheat Sheet Exercises.pdf
PDF
1435488539 221998
Certified Ethical Hacking - Book Summary
Ethical hacking
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
Ethical hacking by shivam
Ethical hacking-ppt-download4575
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical hacking/ Penetration Testing
Inetsecurity.in Ethical Hacking presentation
Hacking - penetration tools
Hacking and Penetration Testing - a beginners guide
Ethical Hacking n VAPT presentation by Suvrat jain
CEH Exam Practice Questions and Answers Part 2.pdf
CEH Exam Practice Questions and Answers Part - 2.pdf
CEH Exam Practice Q&A Part 2 by InfosecTrain
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
Hacking - CEH Cheat Sheet Exercises.pdf
1435488539 221998
Ad

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Tartificialntelligence_presentation.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Getting Started with Data Integration: FME Form 101
PPT
Teaching material agriculture food technology
PDF
Encapsulation theory and applications.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Empathic Computing: Creating Shared Understanding
Encapsulation_ Review paper, used for researhc scholars
Tartificialntelligence_presentation.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Diabetes mellitus diagnosis method based random forest with bat algorithm
Network Security Unit 5.pdf for BCA BBA.
Dropbox Q2 2025 Financial Results & Investor Presentation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
SOPHOS-XG Firewall Administrator PPT.pptx
1. Introduction to Computer Programming.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Getting Started with Data Integration: FME Form 101
Teaching material agriculture food technology
Encapsulation theory and applications.pdf
Spectral efficient network and resource selection model in 5G networks
gpt5_lecture_notes_comprehensive_20250812015547.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Introduction to ceh

  • 2. WHY SHOULD WE KNOW ABOUT CEH? • In this Tech-savvy world of 21st Century every one is engaged with internet, through whatsapp , twitter, facebook , net-banking & lots of other platforms are there. • And some criminal minded persons commit crimes here, which is included under cyber-crime. • We should be aware about crimes happening around in the cyber-space, so we can protect ourselves.
  • 3. WHAT A CEH DO? •  A CEH is hired to locate and repair application and system security vulnerabilities to preempt exploitations by black hat hackers and others with potentially illegal intentions.  •Ethical hackers employ the same tools and techniques as the intruders.
  • 5. STEPS FOR PEN TESTING 1. Preparation 2. Footprinting 3. Enumeration & Fingerprinting 4. Identification of Vulnerabilities 5. Attack – Exploit the Vulnerabilities 6. Cover tracks
  • 6. PREPARATION • Identification of Targets – company websites, mail servers, extranets, etc. • Signing of Contract • Agreement on protection against any legal issues • Contracts to clearly specifies the limits and dangers of the test • Specifics on Denial of Service Tests, Social Engineering, etc. • Time window for Attacks • Total time for the testing • Prior Knowledge of the systems • Key people who are made aware of the testing
  • 7. FOOTPRINTING Collecting as much information about the target •DNS Servers •IP Ranges •Administrative Contacts •Problems revealed by administrators Information Sources •Search engines •Forums •Tools – PING, whois, Traceroute, nslookup,
  • 8. ENUMERATION & FINGERPRINTING • Specific targets determined • Identification of Services / open ports • Operating System Enumeration • Methods • Banner grabbing • Responses to various protocol (ICMP &TCP) commands • Port / Service Scans – TCP Connect, TCP SYN, TCP FIN, etc. • Tools • Nmap, tcpdump, ssh, telnet
  • 9. IDENTIFICATION OF VULNERABILITIES Vulnerabilities •Insecure Configuration •Weak passwords •Unpatched vulnerabilities in services, Operating systems, applications •Possible Vulnerabilities in Services, Operating Systems •Insecure programming •Weak Access Control
  • 10. IDENTIFICATION OF VULNERABILITIES Methods •Unpatched / Possible Vulnerabilities – Tools, Vulnerability information Websites •Weak Passwords – Default Passwords, Brute force, Social Engineering, Listening to Traffic •Insecure Programming – SQL Injection, Listening to Traffic •Weak Access Control – Using the Application Logic, SQL Injection
  • 11. ATTACK – EXPLOIT THE VULNERABILITIES • Obtain as much information (trophies) from the Target Asset • Gaining Normal Access • Escalation of privileges • Obtaining access to other connected systems • Last Ditch Effort – Denial of Service
  • 12. ATTACK – EXPLOIT THE VULNERABILITIES • Network Infrastructure Attacks • Connecting to the network through modem • Weaknesses in TCP / IP, NetBIOS • Flooding the network to cause DOS • Operating System Attacks • Application Specific Attacks • Exploiting implementations of HTTP, SMTP protocols
  • 13. ATTACK – EXPLOIT THE VULNERABILITIES • Gaining access to application Databases • SQL Injection • Spamming Exploits • Free exploits from Hacker Websites • Customised free exploits • Internally Developed • Tools – Nessus, Metasploit Framework
  • 14. REPORTING Methodology •Exploited Conditions & Vulnerabilities that could not be exploited •Proof for Exploits - Trophies •Practical Security solutions
  • 15. OTHER IMPORTANT TECHNICES • Social Engineering • Denial of Service • Session Hijacking • SQL Injection • IDS, Firewalls and Honeypots
  • 16. OTHER IMPORTANT TECHNICES(CONTINUED…) • Buffer Overflow • Cryptography • Hacking Wireless Networks • SNIFFING • Trojan horse
  • 17. OTHER IMPORTANT TECHNICES(CONTINUED…) • Viruses and Worms • Hacking Web Applications • Hacking Mobile Platforms