Sei sulla pagina 1di 27

B.S.

A College of Engineering & Technology, Mathura


Estb. & Governed by Shri Agrawal Shiksha Mandal (Regd.), Mathura

An Industrial Training / Internship Assessment Presentation


On
“ETHICAL HACKING”
“INTERNSHALA”

Under the Guidance Submitted By:


SARVESH AGRAWAL GURUSHARAN UPADHYAY &
VERMA MUKUL
Designation
FOUNDER & CEO B.Tech (CSE) 3rd Sem,
1806510027
1806510062
Date:2 NOV 2019

Department of Computer Science & Applications.


CERTIFICATE
ETHICAL HACKING
CONTENT

 Introduction
 Ethical Hacking
 Who are Hackers
 Why do Hackers hack
 Types of Hackers
INTRODUCTION

• Ethical hacking also known as penetration


testing or white-hat hacking, involves the same
tools, tricks, and techniques that hackers use,but
with one major difference that Ethical hacking is
legal.
WHY DO HACKERS HACK ?

Just for fun.


Show off.
Hack other systems secretly.
Steal important information.
Destroy enemy’s computer network during the war.
TYPES OF HACKERS

 Black Hat Hacker


 White Hat Hacker
 Grey Hat Hacker
BLACK-HAT HACKER

 A black hat hackers or


crackers are individuals
with extraordinary
computing skills,
resorting to malicious or
destructive activities.

 Black hat hackers use their


knowledge and skill for their own
personal gains probably by hurting
others
WHITE-HAT HACKER

 White hat hackers are those


individuals professing hacker
skills and using them for
defensive purposes.

 This means that the white hat


hackers use their knowledge
•and skill for the good of
others and for the common
good.
GREY-HAT HACKERS

 These are individuals who work both


offensively and defensively at various
times.

 We cannot predict their behavior.

 Sometimes they use their skills for the


common good while in some other times
he uses them for their personal gains.
SECURITY TESTING

• BASED ON LEVEL OF ASSISTANCE PROVIDED BY THE


ORGANISATION.TESTINGS ARE OF THREE TYPES:-
1.WHITE BOX TESTING
• 2.BLACK BOX TESTING
• 3.GREY BOX TESTING
WHITE BOX TESTING

• THE SECURITY EXPERT


GETS COMPLETE
ASSISTANCE FROM THE
ORGANISATION
BLACK BOX TESTING

• THE SECURITY EXPERT IS


GIVEN NO ASSISTANCE
GREY BOX TESTING

• THE SECURITY EXPERT IS


GIVEN PARTIAL ASSISTANCE.

• GREY BOX TESING IS


PREFERRED-
• LESS EFFORT REQUIRED
• GIVES A FEELING OF HOW A
HACKER WITH MINIMAL
KNOWLEDGE CAN HARM THE
ORGANISATION.
SECURITY TESTING

• ON THE BASIS OF THE LOCATION OF THE SECURITY EXPERT-


• 1.INTERNAL TESTING
• 2.EXTERNAL TESTING
INTERNAL TESTING
• WHEN THE SECURITY EXPERT TESTS THE APPLICATION FROM
INSIDE THE PREMISES OF THE ORGANISATION,IT IS CALLED
INTERNAL TESTING.

• EXTERNAL TESTING
• WHEN THE SECURITY EXPERT TESTS THE APPLICATION FROM
OUTSIDETHE PREMISES OF THE ORGANISATION,IT IS CALLED
EXTERNAL TESTING.
HACKING PROCESS

 INFO Gathering
 Scanning
 Gaining Access
 Maintaining Access
INFO GATHERING

• WHOIS LOOKUP

• REVERSE IP LOOKUP
SCANNING

 Port Scanning
 Network Scanning
 Finger Printing
GAINING ACCESS

 Password Attacks
 Social Engineering
 Viruses
MAINTAINING ACCESS

 Os BackDoors
 Clears Tracks
WHAT DO HACKERS DO AFTER
HACKING?...
 Patch Security hole
 The other hackers can’t intrude
 Clear logs and hide themselves
 Install rootkit ( backdoor )
 Install scanner program
 mscan, sscan, nmap
 Install exploit program
 Install denial of service program
 Use all of installed programs silently
WHAT SHOULD DO AFTER
HACKED?
 Shutdown or turn off the system

 Separate the system from network

 Restore the system with the backup or reinstall all programs

 Connect the system to the network

 It can be good to call the police


REFERENCES

 www.google.com
 www.wikipedia.org
THANK YOU

Potrebbero piacerti anche