SlideShare a Scribd company logo
Ethical Hacking  Presented By R. Sunil Kumar
Overview History of Internet History of Hacking Ethical Hacking EC-Council : C|EH C|EH Modules
Brief History of Internet 1969  -  The Advanced Research Projects Agency (ARPA) create the ARPANET, the forerunner of the Internet. The first four nodes (networks) of ARPANET consisted of the University of California Los Angeles, University of California Santa Barbara, University of Utah and the Stanford Research Institute. 1983  -  The Internet is founded by splitting the Arpanet into separate military and civilian networks. 1983  -  FidoNet is developed by Tom Jennings. FidoNet will become the most widespread information exchange network in the world for the next 10 years, until the Internet takes over. 1989  -  the WWW is developed at CERN labs, in Switzerland. 1990  -  The Arpanet is dismantled.
Advantages of Internet Sharing Information Collection of Information News Searching Jobs Advertisement Communication Entertainment Online Education Online Results Online Airlines and Railway Schedules Online Medical Advice
Disadvantages of Internet Theft of Personal information Spamming Viruses & Worms Security Problems Immorality Wastage of times chatting, playing games etc
History of Hacking
Hacker
Hackers are here. Where are you?   The explosive growth of the Internet has brought many good things…As with most technological advances, there is also a dark side: criminal hackers.  HACKER  noun.  1. A person who enjoys learning the details of computer systems and how to stretch their capabilities…. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming.  Hacking :  The rapid crafting of a new program or making  changes to  the  existing, usually complicated software
Hacker Classes Black Hats:  Individuals who have extraordinary computing skills resorting to malicious or destructive  purposes. White Hats:   individuals professing hacking skills  and using them for defensive  purposes. Also known as security professionals Gray Hats:   Individuals who work both offensively and defensively at various times. Suicide Hackers:   individuals who aim to bring down the critical infrastructures for a “cause” .
Hacker Classes Script Kiddies or Cyber-Punks:   Between 12-30; predominantly white and male; bored in school; get caught due to bragging online; intent is to vandalize or disrupt systems. Professional Criminals or Crackers:   Make a living by breaking into systems and selling the information. Coders and Virus Writers:   See themselves as an elite; programming background and write code but won’t use it themselves; have their own networks called “zoos”; leave it to others to release their code into “The Wild” or Internet.  ( www.tlc.discovery.com )
Time Line and Major Events
1960s: The Dawn of Hacking MIT becomes home to the first computer hackers, who begin altering software and hardware to make it work better and/or faster. 1970s: Phone Phreaks and Cap'n Crunch:  One phreak, John Draper (aka "Cap'n Crunch"), discovers a toy whistle inside Cap'n Crunch cereal gives 2600-hertz signal, and can access AT&T's long-distance switching system.  Draper  builds a "blue box" used with whistle allows phreaks to make free calls. Steve Wozniak  and Steve Jobs, future founders of Apple Computer, make and sell blue boxes. 1980s: Hacker Message Boards and Groups Hacking groups form; such as Legion of Doom (US), Chaos Computer Club (Germany). 1983: Kids' Games Movie "War Games" introduces public to hacking.
1984: Hacker Zines Hacker magazine 2600 publication; online zine Phrack. 1986:  Congress passes Computer Fraud and Abuse Act; crime to break into computer systems. 1 988: The Morris Worm Robert T. Morris, Jr., launches self-replicating worm on Arpanet. 1989: The Germans , the KGB and Kevin Mitnick. German Hackers  arrested for breaking into U.S. computers; sold information to Soviet KGB ( Komitet Gosudarstvennoy Bezopasnosti) . Hacker "The Mentor“  arrested; publishes Hacker's Manifesto.  1990 : Kevin Mitnick   convicted; first person convicted under law against gaining access to interstate network for criminal purposes.
1990s: Why Buy a Car When You Can Hack One? Radio station call-in contest; hacker-fugitive Kevin Poulsen and friends crack phone; they allegedly get two Porsches, $20,000 cash, vacation trips;  Poulsen now  a freelance journalist covering computer crime.  First Def Con  hacking conference in Las Vegas 1995: The Mitnick Takedown:  Arrested again; charged with stealing 20,000 credit card numbers.  1995:  Russian Hackers  Siphon $10 million from Citibank; Vladimir Levin, leader. 1999  hackers attack Pentagon,  MIT, FBI web sites. damage through attacks on government and military computer systems has been calculated at between $1.5 and $1.8 Billion for 1999 1999:   E-commerce company attacked;  blackmail threats followed by  8 million credit card numbers stolen.
2000  May:  The  ILOVEYOU  worm, also known as VBS/Loveletter and Love Bug worm, is a computer worm written in VBScript. It infected millions of computers worldwide within a few hours of its release.  September: teenage hacker  Jonathan James  becomes first juvenile to serve jail time for hacking. 2001 Microsoft becomes the prominent victim of a new type of hack that attacks the  domain name server . In these denial-of-service attacks, the DNS paths that take users to Microsoft's Web sites are corrupted. August:  Code Red worm , infects tens of thousands of machines.
2002 August: Researcher  Chris Paget  publishes a paper describing " shatter attacks ", detailing how Windows' unauthenticated  messaging system  can be used to take over a machine. The paper raises questions about how securable Windows could ever be. October: The  International Information Systems Security Certification Consortium  - (ISC)2 - confers its 10,000th  CISSP  certification. 2003  March:  CULT OF THE DEAD COW  and  Hacktivismo  are given permission by the  United States Department of Commerce  to export software utilizing strong encryption. December 18:  Milford Man  pleas guilty to hacking.
2004 March:  Myron Tereshchuk  is arrested for attempting to extort $17 million from  Micropatent . July: North Korea claims to have trained 500 hackers who successfully crack South Korean, Japanese, and their allies' computer systems. [18] 2005  September 13 :  Cameron Lacroix  is sentenced to 11 months for gaining access to  T-Mobile USA's  network and exploiting  Paris Hilton's   Sidekick . [19]   November 3 :  Jeanson James Ancheta , whom prosecutors say was a member of the "Botmaster Underground", a group of  script kiddies  mostly noted for their excessive use of  bot attacks  and propagating vast amounts of  spam , was taken into custody after being lured to FBI offices in Los Angeles. [20]
2006  May: Jeanson James Ancheta receives a 57 month prison sentence,  [6]  and is ordered to pay damages amounting to $15,000.00 to the Naval Air Warfare Center in China Lake and the Defense Information Systems Agency, for damage done due to DDoS attacks and hacking. Ancheta also had to forfeit his gains to the government, which include $60,000 in cash, a BMW, and computer equipment  [7] . May: Largest Defacement in Web History is performed by the  Turkish  hacker  iSKORPiTX  who successfully hacked 21,549 websites in one shot.  [8] October: Jesus Oquendo releases Asteroid, a SIP Denial of Service testing tool. It broke all versions of Asterisk until 1.2.13. Asteroid is also known to affect certain SIP Softphones, SIP Phones and possibly other products using the SIP protocol. It was used in  Henning Schulzrinne 's Columbia University seminars. See MITRE CVE-2006-5444 and CVE-2006-5445
2007  May 17:  Estonia  recovers from massive denial-of-service attack [21] June 13: FBI Operation Bot Roast finds over 1 million botnet victims June 21: A  spear phishing  incident at the  Office of the Secretary of Defense  steals sensitive U.S. defense information, leading to significant changes in identity and message-source verification at OSD. August 11:  United Nations  website hacked by Turkish Hacker Kerem125 October 7:  Trend Micro  website successfully hacked by Turkish hacker Janizary(a.k.a Utku) November 29: FBI Operation Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictments
2008  January 18:  Project Chanology  Anon attacks Scientology website servers around the world. Private documents are stolen from Scientology computers and distributed over the Internet. March 7: Around 20 Chinese hackers claim to have gained access to the world's most sensitive sites, including  The Pentagon . They operate from a bare apartment on a Chinese island.
2009  April 1: Conficker worm has infiltrated billions of PCs worldwide including many government-level top-security computer networks.
Ethical Hacking
What is Ethical Hacking?   Ethical hacking  – defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems, operating environments.” With the growth of the Internet, computer security has become a major concern for businesses and governments.  In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
Who are Ethical Hackers?   “ One of the best ways to evaluate the intruder threat is to have an independent computer security professionals attempt to break their computer systems”  Successful ethical hackers possess a variety of skills. First and foremost, they must be completely trustworthy.  Ethical hackers typically have very strong programming and computer networking skills.  They are also adept at installing and maintaining systems that use the more popular operating systems (e.g., Linux , Unix, Windows ) used on target systems.  These base skills are augmented with detailed knowledge of the hardware and software provided by the more popular computer and networking hardware vendors.
Ethical Hacker classes Former Black hats  – Reformed hackers, first-hand experience, lesser credibility perceived W hite hats  – Individual security consultants, knowledgeable about black hats Consulting Firms – Part of ICT firms, good credentials
What do Ethical Hackers do?   An ethical hacker’s evaluation of a system’s security seeks answers to these basic questions:  What can an intruder see on the target systems?  What can an intruder do with that information?  Does anyone at the target notice the intruder’s at tempts or successes?  What are you trying to protect?  What are you trying to protect against?  How much time, effort, and money are you willing to expend to obtain adequate protection?
Required Skills of an Ethical Hacker Routers:   knowledge of routers, routing protocols, and access control lists Windows:   skills in operation, configuration and management. Linux:   knowledge of Linux/Unix; security setting, configuration, and services. Firewalls & IDS & IPS:   configurations, and operation of IDS and IPS. Mainframes Network Protocols:   TCP/IP; how they function and can be manipulated. Project Management:   knowledge of leading, planning, organizing, and controlling a penetration testing team. (Source:  http://www.examcram.com )
Approaches to Ethical Hacking Remote network Remote dial-up network Local network Stolen Equipment Physical entry Social engineering  (Source:  http://www.examcram.com )
Anatomy of an attack: Reconnaissance  – attacker gathers information; can include social engineering. Scanning  – searches for open ports (port scan) probes target for vulnerabilities. Gaining access  – attacker exploits vulnerabilities to get inside system; used for spoofing IP. Maintaining access  – creates backdoor through use of Trojans; once attacker gains access makes sure he/she can get back in. Covering tracks  – deletes files, hides files, and erases log files.  So that attacker cannot be detected or penalized.  (Source:  www.eccouncil.org )
How Much Do Ethical Hackers Get Paid? Globally, the hiring of ethical hackers is on the rise with most of them working with top consulting firms.  In the United States, an ethical hacker can make upwards of $120,000 per annum.  Freelance ethical hackers can expect to make $10,000 per assignment.  Some ranges from $15,000 to  $45,000 for a standalone ethical  hack.
Ec-Council:  Certified Ethical Hacker
EC-COUNCIL International council of electronic commerce consultants Most successful and rapidly growing IT security and certification providers Standardized the concept of “Ethical Hacking” EC-Council was the first to provide certification standards for these “Ethical Hackers” EC-Council has trained more than 60,000 IT professionals, with over 20,000 earning a certification
EC-Council has certified IT professionals from the following organizations as CEH: Novell, Canon, Hewlett Packard, US Air Force Reserve, US Embassy, Verizon, PFIZER, HDFC Bank, University of Memphis, Microsoft Corporation, Worldcom, Trusecure, US Department of Defense, Fedex, Dunlop, British Telecom, Cisco, Supreme Court of the Philippines, United Nations, Ministry of Defense, UK, Nortel Networks, MCI, Check Point Software, KPMG, Fleet International, Cingular Wireless, Columbia Daily Tribune, Johnson & Johnson, Marriott Hotel, Tucson Electric Power Company, Singapore Police Force
(Cont.) PriceWaterhouseCoopers, SAP, Coca-Cola Corporation, Quantum Research, US Military, IBM Global Services, UPS, American Express, FBI, Citibank Corporation, Boehringer Ingelheim, Wipro, New York City Dept Of IT & Telecom – DoITT, United States Marine Corps, Reserve Bank of India, US Air Force, EDS, Bell Canada, SONY, Kodak, Ontario Provincial Police, Harris Corporation, Xerox, Philips Electronics, U.S. Army, Schering, Accenture, Bank One, SAIC, Fujitsu, Deutsche Bank
Certified Ethical Hacker (C|EH) Training EC-Council Academy http://www.eccouncil.org Five-day   Course (C|EH)  exam Code 312-50 No. Of questions : 150 Exam Duration : 4 hours Passing Score  : 70% Prometric and vue
C|EH Modules
EC-Council Certified Ethical Hacker www.eccouncil.org ISBN 0-9729362-1-1
Ec-Council Topics Covered Introduction to Ethical Hacking Hacking Laws Foot printing Google hacking Scanning Enumeration System Hacking Trojans and Backdoors Viruses and worms Sniffers Social Engineering
Ec-Council (Cont.) Phishing Hacking Email Accounts Denial-of-service Session Hijacking Hacking Web servers Web Application vulnerabilities Web base password cracking Sql Injection Hacking wireless networks Physical Security
Ec-Council (Cont.) Linux Hacking Evading IDS, Firewalls and detecting honey pots Buffer overflows Cryptography Penetration testing

More Related Content

PPTX
Powerpoint
PDF
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
PPT
Sit presentation
PPTX
PDF
The Secret Of Hacking Trial Pages
PPTX
Hacking
PPTX
Sit presentation - Hacking
PPTX
Powerpoint
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Sit presentation
The Secret Of Hacking Trial Pages
Hacking
Sit presentation - Hacking

What's hot (20)

PDF
Countering the Cyber Espionage Threat from China
DOCX
Ethical hacking
PPTX
Personal Data Security in a Digital World
PDF
5 biggest cyber attacks and most famous hackers
PDF
How private is your privacy?
PPT
Cybercrime and IT ACT
PPSX
Famous hackers
PDF
File000145
PPT
Cybercrime
DOCX
Top 5 notorous Hackers
PPTX
Hacking and Hackers
PDF
Hacked Revealed: Penetration Profession
DOCX
Chapter 8.legal. opportunities
PPT
Polinter11
PPTX
[Exposicion] Computer and Internet Crime
PPTX
Hacking Vs Cracking in Computer Networks
PPTX
Types Of Computer Crime
PDF
Warrantless governmental surveillance through the use of emerging technology ...
Countering the Cyber Espionage Threat from China
Ethical hacking
Personal Data Security in a Digital World
5 biggest cyber attacks and most famous hackers
How private is your privacy?
Cybercrime and IT ACT
Famous hackers
File000145
Cybercrime
Top 5 notorous Hackers
Hacking and Hackers
Hacked Revealed: Penetration Profession
Chapter 8.legal. opportunities
Polinter11
[Exposicion] Computer and Internet Crime
Hacking Vs Cracking in Computer Networks
Types Of Computer Crime
Warrantless governmental surveillance through the use of emerging technology ...
Ad

Viewers also liked (20)

PPT
Ethical Hacking Course in Sector 14 Gurgaon | Ethical Hacking Training in Gur...
PPTX
5 Network Security Threats Facing Businesses Today
PPT
Network Security
PPTX
Raid(redundant array of independent disks).
PDF
הגדרות פרטיות בפייסבוק
PPT
Pr-Casekimara
PPT
TNM классификация рака легкого (6 редакция)
PPTX
Speak your Voice: IS Conference 9.16.10
DOCX
PPT
ניהול סימניות בגוגל כרום
PPTX
Monavie Presentation
PPTX
model's
PDF
Internet explorer 8 איפוס דפדפן
PDF
The Power of Integrating Social and Traditional PR
PPS
Image Academy Link
PPTX
Iceberg, Dead Ahead - Lessons From Aviation Disasters
DOCX
Baik pulih
PDF
Otchet
PDF
Helistin Dvd Ja Netti - Uuden Sukupolven Apu Lasta Odottaville
PDF
Alterra Business Consulting LinkedIn activity
Ethical Hacking Course in Sector 14 Gurgaon | Ethical Hacking Training in Gur...
5 Network Security Threats Facing Businesses Today
Network Security
Raid(redundant array of independent disks).
הגדרות פרטיות בפייסבוק
Pr-Casekimara
TNM классификация рака легкого (6 редакция)
Speak your Voice: IS Conference 9.16.10
ניהול סימניות בגוגל כרום
Monavie Presentation
model's
Internet explorer 8 איפוס דפדפן
The Power of Integrating Social and Traditional PR
Image Academy Link
Iceberg, Dead Ahead - Lessons From Aviation Disasters
Baik pulih
Otchet
Helistin Dvd Ja Netti - Uuden Sukupolven Apu Lasta Odottaville
Alterra Business Consulting LinkedIn activity
Ad

Similar to C|EH Introduction (20)

PDF
Report on Hacking
PPT
Hacking And Its Prevention
PPT
Ethical hacking presentation_october_2006
PPT
Course on Ehtical Hacking - Introduction
PPTX
Hacking
PDF
Unit ii-hackers and cyber crimes
PDF
Hackers and cyber crimes
PPTX
Is hacking good or bad
PDF
Cyberlaw and Cybercrime
DOCX
Report on hacking crime and workable solution
PPTX
Professional Practices PPT Slide on Chapter 5: Crime
PPTX
PP Lec15n16 Sp2020.pptx
PPT
Hackers Izyani
PPT
Power Point Hacker
PDF
Unit 1 Information Security Sharad Institute
PPTX
Hacking (cs192 report )
PPTX
Evolution of Hacking- Ronit Chakraborty .pptx
PPTX
Historical genesis and evolution of cyber crimes new
PPT
Chapter 3 Computer Crimes
PPT
L Scope
Report on Hacking
Hacking And Its Prevention
Ethical hacking presentation_october_2006
Course on Ehtical Hacking - Introduction
Hacking
Unit ii-hackers and cyber crimes
Hackers and cyber crimes
Is hacking good or bad
Cyberlaw and Cybercrime
Report on hacking crime and workable solution
Professional Practices PPT Slide on Chapter 5: Crime
PP Lec15n16 Sp2020.pptx
Hackers Izyani
Power Point Hacker
Unit 1 Information Security Sharad Institute
Hacking (cs192 report )
Evolution of Hacking- Ronit Chakraborty .pptx
Historical genesis and evolution of cyber crimes new
Chapter 3 Computer Crimes
L Scope

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
KodekX | Application Modernization Development
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Chapter 3 Spatial Domain Image Processing.pdf
GamePlan Trading System Review: Professional Trader's Honest Take
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
Unlocking AI with Model Context Protocol (MCP)
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
Advanced Soft Computing BINUS July 2025.pdf
KodekX | Application Modernization Development
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

C|EH Introduction

  • 1. Ethical Hacking Presented By R. Sunil Kumar
  • 2. Overview History of Internet History of Hacking Ethical Hacking EC-Council : C|EH C|EH Modules
  • 3. Brief History of Internet 1969  - The Advanced Research Projects Agency (ARPA) create the ARPANET, the forerunner of the Internet. The first four nodes (networks) of ARPANET consisted of the University of California Los Angeles, University of California Santa Barbara, University of Utah and the Stanford Research Institute. 1983  - The Internet is founded by splitting the Arpanet into separate military and civilian networks. 1983  - FidoNet is developed by Tom Jennings. FidoNet will become the most widespread information exchange network in the world for the next 10 years, until the Internet takes over. 1989  - the WWW is developed at CERN labs, in Switzerland. 1990  - The Arpanet is dismantled.
  • 4. Advantages of Internet Sharing Information Collection of Information News Searching Jobs Advertisement Communication Entertainment Online Education Online Results Online Airlines and Railway Schedules Online Medical Advice
  • 5. Disadvantages of Internet Theft of Personal information Spamming Viruses & Worms Security Problems Immorality Wastage of times chatting, playing games etc
  • 8. Hackers are here. Where are you? The explosive growth of the Internet has brought many good things…As with most technological advances, there is also a dark side: criminal hackers. HACKER noun. 1. A person who enjoys learning the details of computer systems and how to stretch their capabilities…. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming. Hacking : The rapid crafting of a new program or making changes to the existing, usually complicated software
  • 9. Hacker Classes Black Hats: Individuals who have extraordinary computing skills resorting to malicious or destructive purposes. White Hats: individuals professing hacking skills and using them for defensive purposes. Also known as security professionals Gray Hats: Individuals who work both offensively and defensively at various times. Suicide Hackers: individuals who aim to bring down the critical infrastructures for a “cause” .
  • 10. Hacker Classes Script Kiddies or Cyber-Punks: Between 12-30; predominantly white and male; bored in school; get caught due to bragging online; intent is to vandalize or disrupt systems. Professional Criminals or Crackers: Make a living by breaking into systems and selling the information. Coders and Virus Writers: See themselves as an elite; programming background and write code but won’t use it themselves; have their own networks called “zoos”; leave it to others to release their code into “The Wild” or Internet. ( www.tlc.discovery.com )
  • 11. Time Line and Major Events
  • 12. 1960s: The Dawn of Hacking MIT becomes home to the first computer hackers, who begin altering software and hardware to make it work better and/or faster. 1970s: Phone Phreaks and Cap'n Crunch: One phreak, John Draper (aka "Cap'n Crunch"), discovers a toy whistle inside Cap'n Crunch cereal gives 2600-hertz signal, and can access AT&T's long-distance switching system. Draper builds a "blue box" used with whistle allows phreaks to make free calls. Steve Wozniak and Steve Jobs, future founders of Apple Computer, make and sell blue boxes. 1980s: Hacker Message Boards and Groups Hacking groups form; such as Legion of Doom (US), Chaos Computer Club (Germany). 1983: Kids' Games Movie "War Games" introduces public to hacking.
  • 13. 1984: Hacker Zines Hacker magazine 2600 publication; online zine Phrack. 1986: Congress passes Computer Fraud and Abuse Act; crime to break into computer systems. 1 988: The Morris Worm Robert T. Morris, Jr., launches self-replicating worm on Arpanet. 1989: The Germans , the KGB and Kevin Mitnick. German Hackers arrested for breaking into U.S. computers; sold information to Soviet KGB ( Komitet Gosudarstvennoy Bezopasnosti) . Hacker "The Mentor“ arrested; publishes Hacker's Manifesto. 1990 : Kevin Mitnick convicted; first person convicted under law against gaining access to interstate network for criminal purposes.
  • 14. 1990s: Why Buy a Car When You Can Hack One? Radio station call-in contest; hacker-fugitive Kevin Poulsen and friends crack phone; they allegedly get two Porsches, $20,000 cash, vacation trips; Poulsen now a freelance journalist covering computer crime. First Def Con hacking conference in Las Vegas 1995: The Mitnick Takedown: Arrested again; charged with stealing 20,000 credit card numbers. 1995: Russian Hackers Siphon $10 million from Citibank; Vladimir Levin, leader. 1999 hackers attack Pentagon, MIT, FBI web sites. damage through attacks on government and military computer systems has been calculated at between $1.5 and $1.8 Billion for 1999 1999: E-commerce company attacked; blackmail threats followed by 8 million credit card numbers stolen.
  • 15. 2000 May: The  ILOVEYOU  worm, also known as VBS/Loveletter and Love Bug worm, is a computer worm written in VBScript. It infected millions of computers worldwide within a few hours of its release. September: teenage hacker  Jonathan James  becomes first juvenile to serve jail time for hacking. 2001 Microsoft becomes the prominent victim of a new type of hack that attacks the  domain name server . In these denial-of-service attacks, the DNS paths that take users to Microsoft's Web sites are corrupted. August:  Code Red worm , infects tens of thousands of machines.
  • 16. 2002 August: Researcher  Chris Paget  publishes a paper describing " shatter attacks ", detailing how Windows' unauthenticated  messaging system  can be used to take over a machine. The paper raises questions about how securable Windows could ever be. October: The  International Information Systems Security Certification Consortium  - (ISC)2 - confers its 10,000th  CISSP  certification. 2003 March:  CULT OF THE DEAD COW  and  Hacktivismo  are given permission by the  United States Department of Commerce  to export software utilizing strong encryption. December 18:  Milford Man  pleas guilty to hacking.
  • 17. 2004 March:  Myron Tereshchuk  is arrested for attempting to extort $17 million from  Micropatent . July: North Korea claims to have trained 500 hackers who successfully crack South Korean, Japanese, and their allies' computer systems. [18] 2005 September 13 :  Cameron Lacroix  is sentenced to 11 months for gaining access to  T-Mobile USA's  network and exploiting  Paris Hilton's   Sidekick . [19] November 3 :  Jeanson James Ancheta , whom prosecutors say was a member of the "Botmaster Underground", a group of  script kiddies  mostly noted for their excessive use of  bot attacks  and propagating vast amounts of  spam , was taken into custody after being lured to FBI offices in Los Angeles. [20]
  • 18. 2006 May: Jeanson James Ancheta receives a 57 month prison sentence,  [6]  and is ordered to pay damages amounting to $15,000.00 to the Naval Air Warfare Center in China Lake and the Defense Information Systems Agency, for damage done due to DDoS attacks and hacking. Ancheta also had to forfeit his gains to the government, which include $60,000 in cash, a BMW, and computer equipment  [7] . May: Largest Defacement in Web History is performed by the  Turkish  hacker  iSKORPiTX  who successfully hacked 21,549 websites in one shot.  [8] October: Jesus Oquendo releases Asteroid, a SIP Denial of Service testing tool. It broke all versions of Asterisk until 1.2.13. Asteroid is also known to affect certain SIP Softphones, SIP Phones and possibly other products using the SIP protocol. It was used in  Henning Schulzrinne 's Columbia University seminars. See MITRE CVE-2006-5444 and CVE-2006-5445
  • 19. 2007 May 17:  Estonia  recovers from massive denial-of-service attack [21] June 13: FBI Operation Bot Roast finds over 1 million botnet victims June 21: A  spear phishing  incident at the  Office of the Secretary of Defense  steals sensitive U.S. defense information, leading to significant changes in identity and message-source verification at OSD. August 11:  United Nations  website hacked by Turkish Hacker Kerem125 October 7:  Trend Micro  website successfully hacked by Turkish hacker Janizary(a.k.a Utku) November 29: FBI Operation Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictments
  • 20. 2008 January 18:  Project Chanology  Anon attacks Scientology website servers around the world. Private documents are stolen from Scientology computers and distributed over the Internet. March 7: Around 20 Chinese hackers claim to have gained access to the world's most sensitive sites, including  The Pentagon . They operate from a bare apartment on a Chinese island.
  • 21. 2009 April 1: Conficker worm has infiltrated billions of PCs worldwide including many government-level top-security computer networks.
  • 23. What is Ethical Hacking? Ethical hacking – defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems, operating environments.” With the growth of the Internet, computer security has become a major concern for businesses and governments. In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
  • 24. Who are Ethical Hackers? “ One of the best ways to evaluate the intruder threat is to have an independent computer security professionals attempt to break their computer systems” Successful ethical hackers possess a variety of skills. First and foremost, they must be completely trustworthy. Ethical hackers typically have very strong programming and computer networking skills. They are also adept at installing and maintaining systems that use the more popular operating systems (e.g., Linux , Unix, Windows ) used on target systems. These base skills are augmented with detailed knowledge of the hardware and software provided by the more popular computer and networking hardware vendors.
  • 25. Ethical Hacker classes Former Black hats – Reformed hackers, first-hand experience, lesser credibility perceived W hite hats – Individual security consultants, knowledgeable about black hats Consulting Firms – Part of ICT firms, good credentials
  • 26. What do Ethical Hackers do? An ethical hacker’s evaluation of a system’s security seeks answers to these basic questions: What can an intruder see on the target systems? What can an intruder do with that information? Does anyone at the target notice the intruder’s at tempts or successes? What are you trying to protect? What are you trying to protect against? How much time, effort, and money are you willing to expend to obtain adequate protection?
  • 27. Required Skills of an Ethical Hacker Routers: knowledge of routers, routing protocols, and access control lists Windows: skills in operation, configuration and management. Linux: knowledge of Linux/Unix; security setting, configuration, and services. Firewalls & IDS & IPS: configurations, and operation of IDS and IPS. Mainframes Network Protocols: TCP/IP; how they function and can be manipulated. Project Management: knowledge of leading, planning, organizing, and controlling a penetration testing team. (Source: http://www.examcram.com )
  • 28. Approaches to Ethical Hacking Remote network Remote dial-up network Local network Stolen Equipment Physical entry Social engineering (Source: http://www.examcram.com )
  • 29. Anatomy of an attack: Reconnaissance – attacker gathers information; can include social engineering. Scanning – searches for open ports (port scan) probes target for vulnerabilities. Gaining access – attacker exploits vulnerabilities to get inside system; used for spoofing IP. Maintaining access – creates backdoor through use of Trojans; once attacker gains access makes sure he/she can get back in. Covering tracks – deletes files, hides files, and erases log files. So that attacker cannot be detected or penalized. (Source: www.eccouncil.org )
  • 30. How Much Do Ethical Hackers Get Paid? Globally, the hiring of ethical hackers is on the rise with most of them working with top consulting firms. In the United States, an ethical hacker can make upwards of $120,000 per annum. Freelance ethical hackers can expect to make $10,000 per assignment. Some ranges from $15,000 to $45,000 for a standalone ethical hack.
  • 31. Ec-Council: Certified Ethical Hacker
  • 32. EC-COUNCIL International council of electronic commerce consultants Most successful and rapidly growing IT security and certification providers Standardized the concept of “Ethical Hacking” EC-Council was the first to provide certification standards for these “Ethical Hackers” EC-Council has trained more than 60,000 IT professionals, with over 20,000 earning a certification
  • 33. EC-Council has certified IT professionals from the following organizations as CEH: Novell, Canon, Hewlett Packard, US Air Force Reserve, US Embassy, Verizon, PFIZER, HDFC Bank, University of Memphis, Microsoft Corporation, Worldcom, Trusecure, US Department of Defense, Fedex, Dunlop, British Telecom, Cisco, Supreme Court of the Philippines, United Nations, Ministry of Defense, UK, Nortel Networks, MCI, Check Point Software, KPMG, Fleet International, Cingular Wireless, Columbia Daily Tribune, Johnson & Johnson, Marriott Hotel, Tucson Electric Power Company, Singapore Police Force
  • 34. (Cont.) PriceWaterhouseCoopers, SAP, Coca-Cola Corporation, Quantum Research, US Military, IBM Global Services, UPS, American Express, FBI, Citibank Corporation, Boehringer Ingelheim, Wipro, New York City Dept Of IT & Telecom – DoITT, United States Marine Corps, Reserve Bank of India, US Air Force, EDS, Bell Canada, SONY, Kodak, Ontario Provincial Police, Harris Corporation, Xerox, Philips Electronics, U.S. Army, Schering, Accenture, Bank One, SAIC, Fujitsu, Deutsche Bank
  • 35. Certified Ethical Hacker (C|EH) Training EC-Council Academy http://www.eccouncil.org Five-day Course (C|EH) exam Code 312-50 No. Of questions : 150 Exam Duration : 4 hours Passing Score : 70% Prometric and vue
  • 37. EC-Council Certified Ethical Hacker www.eccouncil.org ISBN 0-9729362-1-1
  • 38. Ec-Council Topics Covered Introduction to Ethical Hacking Hacking Laws Foot printing Google hacking Scanning Enumeration System Hacking Trojans and Backdoors Viruses and worms Sniffers Social Engineering
  • 39. Ec-Council (Cont.) Phishing Hacking Email Accounts Denial-of-service Session Hijacking Hacking Web servers Web Application vulnerabilities Web base password cracking Sql Injection Hacking wireless networks Physical Security
  • 40. Ec-Council (Cont.) Linux Hacking Evading IDS, Firewalls and detecting honey pots Buffer overflows Cryptography Penetration testing