Sei sulla pagina 1di 16

A SEMINAR ON

HACKING TECHNIQUES AND PREVENTIONS


PRESENTED BY
ANKUR SEN
(REG.N.-2015024148)
M.C.A. IIND YEAR
UNDER THE GUIDANCE OF
Mr. R. K. DWIVEDI
(ASSISTANT PROFESSOR)

DEPARTMENT of COMPUTER SCIENCE and ENGINEERING


MADAN MOHAN MALAVIYA UNIVERSITY of TECHNOLOGY
Gorakhpur 273010 up india
Session 2016-17
CONTENTS
Introduction

Hacking

Types of Hackers

Methodology of Hacking

Required Skilled of an Hacker

Hacking Tools

Hacking Preventions Techniques

Advantages and Disadvantages

Conclusion

References
INTRODUCTION
The Internet is still growing and e-commerce is on its advance. The vast growth of Internet has
brought many good things thats easy access to vast stores of reference material etc. More and
more computers get connected to the Internet, wireless devices and networks are booming. Due
to the advance technology of the Internet, the government, private industry and the everyday
computer user have fears of their data or private information being comprised by a criminal
hacker .

Security

Need for security


HACKING
To catch a thief you have to think like a thief .

Hacking is unauthorized intrusion into a computer or a network. The person engaged in hacking
activities is generally referred to as a hacker. This hacker may alter system or security features to
accomplish a goal that differs from the original purpose.

Ethical hacking

Non ethical hacking


TYPES OF HACKERS
Black-hat hacker

White-hat hacker

Gray-hat hacker
REQUIRED SKILLS OF AN HACKER
There are several skills requires of an hackers :-

Microsoft :- skills in operation, configuration and management.

Linux :- knowledge of Linux/Unix; security setting, configuration, and services.

Firewalls :- configurations, and operation of intrusion detection systems.

Project Management :- leading, planning, organizing, and controlling a penetration testing


team.
METHODOLOGY OF HACKING
There are different methodology used for hacking :-

Information Gathering

Scanning & Enumeration

Gaining access
SCANNING & ENUMERATION
There are different types of enumeration :-

NetBIOS

SNMP(Simple Network Management Protocol)

DNS(Domain Name System)


GAINING ACCESS
This is the actual hacking phase in which the hacker gains access to the system.

The hacker exploits the system.

Password Cracking
Dictionary cracking

Social engineering
Nmap
TOP TEN HACKING TOOLS
Wireshark

Cain and abel

Metasploit

Burp suite

Aircrack-ng

Nessus

THC hydra

Hping3

Putty
HACKING PREVENTIONS TECHNIQUES
For avoid hacking we used different techniques :-

Security Infrastructure

Code Review

Security Patches
ADVANTAGES
Helps in closing the open holes in the system network

Provides security to banking and financial establishments

Prevents website defacements

An evolving technique
DISADVANTAGES
All depends upon the trustworthiness of the ethical hacker

Hiring professionals is expensive.


CONCLUSION
Hacking from several perspectives. With the present poor security on the internet, ethical
hacking may be the most effective way to plug security holes and prevent intrusions. On the
other hand hacking tools have also been notorious tools for crackers. So, at present the tactical
objective is to stay one step ahead of the crackers. Hacking is a tool, which if properly utilized,
can prove useful for understanding the weaknesses of a network and how they might be
exploited.
REFERENCES
International Journal of Computer Science and Information Technology Research ISSN
2348-120X (online) Vol. 2, Issue 2, pp: (183-189), Month: April-June 2014

J. Danish and A. N. Muhammad, Is Ethical Hacking Ethical? , International journal of


Engineering Science and Technology, Vol 3 No. 5, pp. 3758-3763, May 2011.

http://www.gangte.net/2013/09/top-10-best-hacking-tools.html

Smith B., Yurcik W., Doss D., Ethical Hacking: the security justification redux, IEEE
Transactions, pp. 375-379, 2002.

Potrebbero piacerti anche