0% found this document useful (0 votes)
22 views

Lecture 15

Uploaded by

Khawar Zulfiqar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Lecture 15

Uploaded by

Khawar Zulfiqar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Ethical Hacking

Introduction
Ethical hacking also known as
penetration testing or white-hat hacking,
involves the same tools, tricks, and
techniques that hackers use,but with one
major difference that Ethical hacking is
legal.
Ethical Hacking
 Independent computer security Professionals breaking into the
computer systems.
 Neither damage the target systems nor steal information.
 Evaluate target systems security
and report back to owners
about the bugs found.
Who are Hackers?
 A person who enjoys learning details
of a programming language or system.

 A person who enjoys actually


doing the programming rather than
just theorizing about it.

 A person capable of
appreciating someone else's
hacking.

 A person who picks up


programming quickly.

 A person who is an expert at a


particular programming language or
system.
Why do hackers hack ?
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify many people their thought.
 Steal important information.
 Destroy enemy’s computer network
during the war.
Ethical Hackers but not Criminal Hackers
Completely trustworthy.
Strong programming and computer networking
skills.
Learn about the system and trying to find its
weaknesses.
Techniques of Criminal hackers-Detection-
Prevention.
Types of Hackers
 Black Hat Hacker
 White Hat Hacker
 Grey Hat Hacker
Black-Hat Hacker
 A black hat hackers or
crackers are individuals with
extraordinary computing skills,
resorting to malicious or
destructive activities.

 That is black hat hackers use their


knowledge and skill for their own
personal gains probably by hurting others.
White-Hat Hacker
 White hat hackers are
those individuals professing
hacker skills and using them
for defensive purposes.

 This means that the white hat


hackers use their
knowledge
and skill for the good of
others and for the common
good.
Grey-Hat Hackers
 These are individuals who work
both offensively and defensively
at various times.

 We cannot predict their behavior.

 Sometimes they use their skills


for the common good while in
some other times he uses
them for their personal gains.
What should do after hacked?
 Shutdown or turn off the system

 Separate the system from network

 Restore the system with the backup


or reinstall all programs

 Connect the system to the network

 It can be good to call the police


Hacking Process
Foot Printing
Scanning
Gaining Access
Maintaining Access
Foot Printing
Whois lookup
NS lookup
IP lookup
Scanning
Port Scanning
Network Scanning
Finger Printing
Fire Walking
Gaining
Access
Password Attacks
Social Engineering
Viruses
Maintaining Access
Os BackDoors
Trojans
Clears Tracks
Why do you need Ethical
hacking
Protection from possible External Attacks
Social
Engineering

Automated
Organizational Attacks
Attacks

Restricted
Data

Accidental
Breaches in
Security Denial of
Viruses, Trojan Service (DoS)
Horses,
and Worms
Required Skills of an Ethical Hacker
 Microsoft: skills in operation, configuration and management.

 Linux: knowledge of Linux/Unix; security


setting, configuration, and services.

 Firewalls: configurations, and operation of intrusion


detection systems.
Required Skills of an Ethical Hacker….
 Routers: knowledge of routers, routing protocols, and
access
control lists

 Mainframes : knowledge of mainframes

 Network Protocols: TCP/IP; how they function and can


be manipulated.

 Project Management: leading, planning, organizing,


and controlling a penetration testing team.
What do hackers do after
hacking?...
 Patch Security hole
 The other hackers can’t intrude
 Clear logs and hide themselves
 Install rootkit ( backdoor )
 The hacker who hacked the system can use the
system later
 It contains trojan virus, and so on

 Install irc related program


 identd, irc, bitchx, eggdrop, bnc
What do hackers do after
hacking?
 Install scanner program
 mscan, sscan, nmap
 Install exploit program
 Install denial of service program
 Use all of installed programs silently
Advantages
 To catch a thief you have to think like a thief.

 Helps in closing the open holes in the system network.

 Provides security to banking and financial establishments.

 Prevents website defacements.

 An evolving technique.
Disadvantages
 All depends upon the trustworthiness of the ethical hacker

 Hiring professionals is expensive.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy