Sei sulla pagina 1di 24

INTEGRAL UNIVERSITY LUCKNOW

Ethical Hacking
By
Jayashwa Singh Chauhan

BCA 2nd Year


Group-B
History Of Hacking

The first hacker was appeared in 1960s at the


Massachusetts Institute Of Technology(MIT)
During the 1970s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker

During the 1990s, when the use of internet


widespread around the world, hackers multiplied

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 2


What is Hacking?

Process of breaking into systems for:


Personal or Commercial Gains
Malicious Intent Causing sever damage to
Information & Assets
Accessing computer system or network
without authorization.

INTEGRAL UNIVERSITY LUCKNOW 3


Introduction to Ethical Hacking

It is Legal
Permission is obtained from the target
Part of an overall security program
Identify vulnerabilities visible from Internet at
particular point of time
Ethical hackers possesses same skills,
mindset and tools of a hacker but the attacks
are done in a non-destructive manner

INTEGRAL UNIVERSITY LUCKNOW 4


5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 5
Who is a hacker?

Hackers are developers.


Hackers are those geeks and scientists who provide
IT solutions to real life problems.
Hackers think beyond the boundaries

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 6


Why Ethical Hacking

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 7


Hacker Classes

White Hat Hacker


Good guys
Dont use their skill for illegal purpose
Computer security experts and help to protect from Black Hats.

Black Hat Hacker


Bad guys
Use their skill maliciously for personal gain
Hack banks, steal credit cards and deface websites

Grey Hat Hacker


It is a combination of White hat n Black Hat Hackers
Goal of grey hat hackers is to provide national security

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 8


Hacking Process

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 9


Footprinting

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 10


Enumeration

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 11


Identification of Vulnerabilities, Gaining Access

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 12


5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 13
Creator of Dendroid
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 14
What is Social Engineering?

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 15


Factors that Make Companies
Vulnerable to Attacks

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 16


Why Social Engineering is Effective?

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 17


Phases in a Social Engineering Attack

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 18


Types of Social Engineering

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 19


Computer-Based Social Engineering: Pop-Ups

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 20


Computer-Based Social Engineering: Phishing

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 21


Mobile-Based Social Engineering : Publishing Malicious Apps

5/16/17 09:59:31 AM INTEGRAL UNIVERSITY LUCKNOW 22


Social Engineering Countermeasures

5/16/17 09:59:31 AM INTEGRAL UNIVERSITY LUCKNOW 23


Thank You

24

Potrebbero piacerti anche