Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
HARIKESH YADAV
CLASS – X
SHISHU NIKETAN H.S.SCHOOL
Contents
2. Legal Limits
3. Extreme Care
Who are Ethical Hackers?
Application Servers
Network Security
Wireless Security
Phases of Hacking
1. Reconnaissance
2. Scanning
3. Gaining Access
4. Maintaining Access
5. Clearing Tracks
Reconnaissance
Information Gathering
Sniffing the Network
Social Engineering
Types:
Active Reconnaissance – probing the network
Risky, raises suspicion
Passive Reconnaissance – without the target’s
knowledge
Social Engineering, Dumpster Diving
Scanning
To avoid detection
To continue using owned system
To remove evidence of hacking
To avoid legal action
Examples:
Removing log files
Removing IDS alarms
Steganography
Ethical Hackers’ OS
Conclusion
• http://www.cert.org
• http://www.eccouncil.org
• http://www.ethicalhacker.net
• http://www.astalavista.com
• http://hack-o-crack.blogspot.in
• http://www.offensive-security.org
Any Queries??