14
Welcome

Introduction to ethical hacking

Embed Size (px)

DESCRIPTION

Introduction to ethical hacking. what is hacking what types of hackers difference between hackers and crackers history of hacking types of hackers.

Citation preview

Page 1: Introduction to ethical hacking

Welcome

Page 2: Introduction to ethical hacking

Hacking

• What is Hack?• -To Modify or Crack a program , often in

an anauthorise manner, by changing the code itself.

• Who is hacker?• -The person who is consistently engaging

in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice is called hacker.

Page 3: Introduction to ethical hacking

What is the meaning of hacking?

Hacking is the technique of modifying the features of system. In order to accomplish a goal outside of the creator's original purpose.

Page 4: Introduction to ethical hacking

Differnce Between Hacker and Cracker?

Hacker:The person who hacks the system

Cracker:The person who destroy the system or intrude the system.

Page 5: Introduction to ethical hacking

History Of Hacking.

• The first hacker was appeared in 1960's at the Massachusetts Institute of Technology (MIT)

• During the 1970's, a different king of hacker appeared:Phone Phreaker Or Phone Hacker.

Page 6: Introduction to ethical hacking

•In the 1980's, phreaks started to migrate to computer, and the first Bulletin Board System (BBS) appeared.

•During The 1990's, When the use of internet wide spread around the world, Hackers multiplied.

Page 7: Introduction to ethical hacking

Diffrence between Hacker and ethical Hacker.

• Hacker:-The person who access the computersystem or network without authorization.• Ethical hacker:-The person who performs the sameactivities but with owenr's permission.Employed by companies to performpenetration test.

Page 8: Introduction to ethical hacking

Types of Hackers.

White Hats Srcript KiddiesBlack Hats

Spy Hackers

Grey Hats

State Sponsored HackerSuicide Hackers Cyber Terrorist

Page 9: Introduction to ethical hacking

Hacking Process

1.Footprinting

2.Scanning

3.Enumeration

4.Attack And Gaining Access

5.Escalating Privilages ,Covering Tracks &

and creating Backdoors

Page 10: Introduction to ethical hacking

Hacking Process Explanation

• Footprinting:

Footprinting is the technique of gathering

information about computer systems and the

entities they belong to.• Scanning:

Port scanning is a common technique used by a

penetration tester to find out the open doors, In technical

terminology port scanning is used to find out the

vulnerabilities in the services listing on a port.

Page 11: Introduction to ethical hacking

Enumeration:Enumeration is the first attack on target network, enumeration is the process to gather the information about a target machine by actively connecting to it.

Attack And Gaining Access:In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset.

This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack-based buffer overflows, denial of service (DoS), and session hijacking. These topics will be discussed in later chapters. Gaining access is known in the hacker world as owning the system.

Page 12: Introduction to ethical hacking

Escalating Privilages, Covering Tracks & and creating Backdoors:

Once hackers have been able to gain and maintain access, they cover their tracks to avoiddetection by security personnel, to continue to use the owned system, to remove evidence ofhacking, or to avoid legal action. Hackers try to remove all traces of the attack, such as log filesor intrusion detection system (IDS) alarms. Examples of activities during this phase of theattack include steganography, the use of tunneling protocols, and altering log files.

Page 13: Introduction to ethical hacking

Some tips to protect from Hackers!

• Keep Antivirus in PC and Keep it Up-dated.• Don't Open suspecious email's• Change Your password after some days.• Choose Cryprtic Password for accounts (use

special symbols,numbers,words)• Don't Download mobile apps from third party

websites.• Download OS updates.• Keep Anti-spyware in your computer.• Use Virtual Keyboard when online shoping.

Page 14: Introduction to ethical hacking

Thanks!

Be secure online!!!!!!

For More info: e-hacker.ddns.net