hacking and ethical hacking

23
HACKING & ETHICAL HACKING PRESENTED BY :- AYUSH KUMAR 10th

Transcript of hacking and ethical hacking

HACKING & ETHICAL HACKING

PRESENTED BY :- AYUSH KUMAR 10th

HACKER

CONTENT

• Overview of Hacking

•Why do hackers hack?

• Types of Hacker

• Level of Hackers

• Hackers language

• Ethical Hacking – Process

• How can protect the system?

•What should do after hacked?

• Final words

OVERVIEW OF HACKING

It is Legal

Permission is obtained from the target

Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner

Also Called – Attack & Penetration Testing.

HACKING VS CRACKING

• Hacker• The person who hack

• Cracker• System intruder/destroyer

HACKING WITH MALICIOUS INTENTION IS CRACKING

The basic difference is hackers do not do anything disastrous.

Cracking yield more devastating results.

Cracking is crime.

Cyber crime are the results of cracking ,not hacking

WHY DO PEOPLE HACK??

• To make security stronger ( Ethical Hacking )

• Just for fun

• Show off

• Hack other systems secretly & Steal important information

WHAT ARE THE VARIOUS QUALITIES A HACKER SHOULD

POSSES

• Good coder

• well knowledgeable person both hardware as well as software

• Should have knowledge on security system

Trusted person

TYPES OF HACKER

BLACK HAT HACK

ER

WHITE HAT HACK

ER

GRAYHAT

HACKER

LABEL OF HACKER

CODER

SCRIPT KIDDING

HACKERS LANGUAGE

1 -> i or l

3 -> e

4 -> a

7 -> t

9 -> g

0 -> o

$ -> s

| -> i or

|\| -> n

|\/| -> m

s -> z

z -> s

f -> ph

ph -> f

x -> ck

ck -> x

HACKERS LANGUAGE TRANSLATION

EXAMPLE:-

Hacking is good

H4ck||\|g 1$ 900d

HACKING - PROCESS

• Foot Printing

• Scanning

•Gaining Access

•Maintaining Access

FOOT PRINTING

•Whois Lookup

•NS lookup

• IP Lookup

SCANNING

Port scanning

Network scanning

Finger Printing

Fire walking

SCANNING

GAINING ACCESS

Password Attacks

Social Engineering

Viruses

MAINTAINING ACCESS

Os BackDoors

Trojans

Clearing tracks

ADVANTAGES & DISADVANTAGES

Advantages

• Provides security to banking and financial establishments

• Prevents website defacements

• An evolving technique

• To catch a thief you have to think like a thief

Disadvantages

• All depends upon the trustworthiness of the ethical hacker

• Hiring professionals is expensive.

HOW CAN WE PROTECT THE SYSTEM?

Patch security hole often

Encrypt important data

Ex) pgp, ssh

Do not run unused daemon

Remove unused program

Setup loghost

• Backup the system often

Setup firewall

Setup IDS

Ex) snort

WHAT SHOULD DO AFTER HACKED?

• Shutdown the system

• Or turn off the system

• Separate the system from network

• Restore the system with the backup

• Or reinstall all programs

• Connect the system to the network

H4CKING PRONE AREAS

HACKING GROWTH RATE

It is clear from the graph it is increasing day by day.