Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Introduction
Ethical Hacking
Who are Hackers
Why do Hackers hack
Types of Hackers
INTRODUCTION
• EXTERNAL TESTING
• WHEN THE SECURITY EXPERT TESTS THE APPLICATION FROM
OUTSIDETHE PREMISES OF THE ORGANISATION,IT IS CALLED
EXTERNAL TESTING.
HACKING PROCESS
INFO Gathering
Scanning
Gaining Access
Maintaining Access
INFO GATHERING
• WHOIS LOOKUP
• REVERSE IP LOOKUP
SCANNING
Port Scanning
Network Scanning
Finger Printing
GAINING ACCESS
Password Attacks
Social Engineering
Viruses
MAINTAINING ACCESS
Os BackDoors
Clears Tracks
WHAT DO HACKERS DO AFTER
HACKING?...
Patch Security hole
The other hackers can’t intrude
Clear logs and hide themselves
Install rootkit ( backdoor )
Install scanner program
mscan, sscan, nmap
Install exploit program
Install denial of service program
Use all of installed programs silently
WHAT SHOULD DO AFTER
HACKED?
Shutdown or turn off the system
www.google.com
www.wikipedia.org
THANK YOU