This document presents information on ethical hacking. It discusses the types of ethical hacking including white hat, grey hat, and black hat hackers. The ethical hacking process is described including reconnaissance, scanning and enumeration, gaining access, maintaining access, clearing tracks, and reporting. Reasons for needing ethical hacking are provided such as security breaches and denial of service attacks. Tips are given on how to protect yourself from hacking. Advantages include strengthening security, while disadvantages include cost. The conclusion emphasizes the importance of staying updated on software and educating users to be aware of hacking techniques.
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Ethical Hacking .pptx
1. Presented by
JANARDHAN REDDY T
V.V. Sangha’s
RAO BAHADUR Y MAHABALESWARAPPA ENGINEERING COLLEGE
Department of Mechanical Engineering
2022-2023
Under the guidance of
Dr. Kottresh Sardar
2. Content
Introduction
Ethical hacking
Types of ethical hacking
Hacking process
Why do we need ethical hacking
Protect yourself :what and what not to do
Advantages and Disadvantages
Conclusion
References
3. Introduction
Ethical hacking also known as penetration testing or white-hat
hacking, involves the same tools, tricks, and techniques that
hackers use,but with one major difference that Ethical hacking is
legal.
4. Ethical Hacking
Ethical hacking involves an
authorized attempt to gain
unauthorized access to a
computer system, application,
or data.
Neither damage the target
systems nor steal information.
Evaluate target systems security
and report back to owners
about the bugs found.
7. Reconnaissance is a set of
processes and techniques
used to covertly discover and
collect information about a
target system.
Reconnaissance
8. • Scanning is the process where
the attacker begins to actively
probe a target machine or
network for vulnerabilities that
can be exploited.
• Enumeration is the ability of the
hacker to convince some
servers to give them information
that is vital to them to make an
attack.
Scanning and Enumeration
9. Gaining Access
In this process, the
vulnerability is located and
you attempt to exploit it in
order to enter
into the system.
This is the actual hacking
phase in which the hacker
gains access to the system.
10. Maintaining Access
After gaining access, the
hacker installs some
backdoors in order to enter
into the system when he
needs access in this owned
system in future.
11. Clearing Tracks
This process is actually an
unethical activity. It has to
do with the deletion of
logs of all the activities that
take place during the
hacking process.
12. Reporting
Reporting is the last step of
finishing the ethical hacking
process. Here the Ethical
Hacker compiles a report with
his findings and the job that
was done such as the tools
used, the success rate,
vulnerabilities found, and the
exploit processes .
13. Why do we need ethical hacking
Breaches in
Security
Denial of
Service (DoS)
Organizational
Attacks
Trojan
Horses, and
Worms
Social
Engineering
Restricted
Data
14. Wannacry Encrypted all the
data of system and asks for
money to decrypt them
back.
Wannacry works on SMB
(Server Message Block)
On 15 August 2017, many
government websites were
hacked by Pakistani
Hackers.
As payback Indian hackers
also hacked many Pakistani
govt. websites
Some Recent Hacking Activities
Recently Jio’s Database got
hacked, It was vulnerability
of their Web Server.
With this hack Personal
details of anyone can be
seen by anyone just by
entering mobile number.
Some months ago, a
Ransomware Virus named
WannaCry attacked over
104 countries including
India.
15. Steal important
information
Destroy enemy’s
computer network
during the war How can
kid hack?
Kid has much of time –
Kid can search for longer
time than other people
To make security stronger
( Ethical Hacking )
Just for fun
Show off
Hack other systems
secretly
Notify many people their
thought
Why do people hack?
16. Protect yourself : what and what not to do
Verify the source of contact.
Before clicking a link,
investigate it.
Always scan a file and never
click on batch files.
Always see the background
services that are running on your
device and never rely on others’
devices.
Be sure to have an antivirus
installed and set root passwords
for installation.Log out of
sessions and clean the cache.
Do not post information on
social media that can be related
to challenging questions
Use passwords that cannot be
broken by brute force or
guessing.
Consider 2-factor authentication
when possible.
Be careful of password requests
emails. Services like Heroku,
Gmail, and others will not
request to type in passwords for
additional promotion or service.
17. Advantages Disadvantages
Provides security to banking
and financial establishments
To recover the lost
information, especially in
case of lost your password .
Helps in closing the open
holes in the system network.
All depends upon the
trustworthiness of the ethical
hacker.
Hiring professionals is
expensive
18. The first thing we should do
is to keep ourselves
updated about those
software’s we and using for
official and reliable sources.
Educate the employees and
the users against black hat
hacking.
In the preceding sections we
saw the methodology of
hacking, why should we
aware of hacking and same
tools which a hacker may
use.
Conclusion