21
ETHICAL HACKING

System Security in Ethical Hacking

Embed Size (px)

Citation preview

Page 1: System Security in Ethical Hacking

ETHICAL HACKING

Page 2: System Security in Ethical Hacking

CONTENTS

Introduction Types Of Hackers Hacking Process Certifications Hacking Language Security Types System Security Keyloggers,Anti-keyloggers Tips For Securing System Data And System Advantages Of Ethical Hacking Disadvantages Of Ethical Hacking Conclusion

Page 3: System Security in Ethical Hacking

INTRODUCTION

Ethical hacking is also known as penetrationtesting, instruction testing or red teaming It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet atparticular point of time Hacker

Cracker

Page 4: System Security in Ethical Hacking

TYPES OF HACKERS

White Hat Hacker Good guys Don’t use their skill for illegal purpose

Black Hat Hacker Bad guys Use their skill maliciously for personal gain

Grey Hat Hacker It is a combination of White hat n Black Hat

Hackers Goal of grey hat hackers is to provide

national security

Page 5: System Security in Ethical Hacking

HACKING PROCESS

Foot printing

Scanning

Enumeration

Attack and Gaining Access

Escalating Privilege, Covering

Tracks and Creating Backdoors

Page 6: System Security in Ethical Hacking

CERTIFICATIONS

The International Council of E-Commerce Consultants (EC-Council) provides a professional certification for Certified Ethical Hackers (CEH). A certified ethical hacker is an ethical hacker who has obtained the certification provided by the EC-Council.

1. Legality2. Footprint3. Scanning4. Enumeration5. System Hacking6. Trojans & Backdoors7. Sniffers8. Denial of Service 9. Social Engineering10. Session Hacking

Page 7: System Security in Ethical Hacking

HACKERS LANGUAGE

1 -> i or l3 -> e4 -> a 7 -> t9 -> g0 -> o$ -> s| -> i or I

|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x

Example:

Hacking is good

H4ck||\|g 1$ 900d

Page 8: System Security in Ethical Hacking

SECURITY TYPES

Broadly we can divide security in three divisions 1.System security

2.Data Security 3.Network Security

System security is least consider nowadays also when we have maximum number of hackers and crackers.

Page 9: System Security in Ethical Hacking

SYSTEM SECURITY

System security means securing a system from unauthorized access by the person who can physically access it.

System security is further divided into two divisions

1. System accessible Security 2. Data accessible Security

Page 10: System Security in Ethical Hacking

SYSTEM ACCESSIBLE SECURITY

System accessible security means restricting someone to access the system completely, it can be referred as OS level security.

Eg: Provide user password in the system

Page 11: System Security in Ethical Hacking

DATA ACCESSIBLE SECURITY

When we give permission to a user to access only certain files and folders in a system then it is consider as the Data Accessible Security.

We can achieve data accessible security by many ways.

Some of the ways are:- 1) Encrypting Hard disk 2) Hiding Folders 3) By locking folders

Page 12: System Security in Ethical Hacking

KEYLOGGERS, ANTI-KEYLOGGERS

Keyloggers are a software or hardware which records the screenshots or keystrokes without the knowledge of user.

Types of keyloggers: 1.SOFTWARE KEYLOGGERS 2.HARDWARE KEYLOGGERS Hardware key loggers can be detected by

carefully observing the port but to prevent system from software keyloggers, we need to install anti keyloggers.

Page 13: System Security in Ethical Hacking

KON BOOT

Page 14: System Security in Ethical Hacking

TIPS FOR SECURING SYSTEM DATA AND SYSTEM

Install and Use Anti-Virus, firewalls & Anti key logger Programs

While installing OS like Windows XP give admin password. Use Care When Reading Email with Attachments and

following links. Install and Use a Firewall Program Make Backups of Important Files and Folders Change passwords Use Care When Downloading and Installing Programs Install and Use a Hardware Firewall Install and Use a File Encryption Program and Access

Controls Safeguard your Data Real-World Warnings keep you safe online.

Page 15: System Security in Ethical Hacking

ADVANTAGES OF ETHICAL HACKING

Provides security to banking and financial establishments

Prevents website defacements An evolving technique To catch a thief you have to think like a thief

Page 16: System Security in Ethical Hacking

DISADVANTAGES OF ETHICAL HACKING

All depends upon the trustworthiness of the ethical hacker

Hiring professionals is expensive.

Page 17: System Security in Ethical Hacking

REFERENCES

Ethical Hacking –Wikipedia Ethics in ethical hacking-Idimadakala

nagaraju Need of ethical hacking in online world-Vivek

shrivastava,monika pangaria History and impact of ethical hacking-History

of computing final paper

Page 18: System Security in Ethical Hacking

Ethical hacking : A technique to enhance Information security-Gorpreet k.Juneja

Ethical hacking techniques with penetration testing-K.Bala chowdappa,S.Subba lakshmi,P.N.V.S. Pavan kumar

Ethical hacking in linux environment-Anirudhha P tekada,pravin Gurjar,Pankaj R.Inglr,DR.BB.Meshram

System security in ethical hacking-Kumar utkarsh

http://www.slideshare.com

Page 19: System Security in Ethical Hacking

CONCLUSION

We should pay maximum attention towards our system security and we can do the same by remembering this line “Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months & most importantly use SYSKEY”

Page 20: System Security in Ethical Hacking
Page 21: System Security in Ethical Hacking