SlideShare uma empresa Scribd logo
1 de 33
Submitted to
Mr Purushottam Das
Presented By
Punit Goswami
CSE 3rd Sem
Ethical Hacking
Offense as the best
defense
What is hacking ?
A little clarification…
▪ Hacking is any curiosity driven approach to finding weakness
in a system.
▪ Exploiting these weaknesses depends on the purpose of
breaching.
▪ Commonly misunderstood as a cracker.
▪ Cracker is somebody who uses the breaches and exploits in a
system only for malicious usage.
▪ Hacking is about making things do what they were not made
to do.
▪ A person who uses breaches and exploits for increasing
knowledge or breaches them for security auditing is a Hacker.
Kinds of hackers…
Because hackers too occur of kinds…
Hackers too come in types…
▪ Script Kiddie:
Knows how to use tools or methods made by experienced hackers.
Does not necessarily know or understand the background working of the tools or
methods.
Is just curious or wants to show off.
Hackers too come in types…
▪ White Hat Hackers:
Do hacking for research and defensive purposes.
Try to improve the robustness of a system by finding flaws in a security system and
fixing them.
Mostly work for or in an organization or individually.
Hackers too come in types…
▪ Black Hat Hacker:
Hackers with malicious intents while breaking into a system.
Cyber criminals who steal money, passwords, infect systems.
Practically everything that media shows about hacking and its illegal strings.
Hackers too come in types…
▪ GreyHat Hackers:
Are neither purely malicious nor completely defensive.
Their nature depends on the situation.
May not have malicious intents but would still like to break into the systems that
they are not authorized to.
Hackers too come in types…
▪ Hacktivist:
A new genre of hackers.
Use their collective knowledge and potential to protest against politically or
religiously sensitive issues.
Have become the most popular category of hackers being talked about nowadays.
The C-I-A Triad
Basic security concepts…
Basic Security Concepts
▪ Confidentiality
When information is compromised by someone not authorized to do so it is a loss of
confidentiality.
Is an important attribute.
Requires internal cohesiveness of set of data.
Research papers
Insurance records
New product Specifications
Private Information of People
Basic Security Concepts
▪ Integrity
For an information which is very sensitive, its corruption can be disastrous.
If this information is kept on an unsecured network, chances of it being corrupted,
modified or changed increases.
This loss of integrity indicates that unauthorised changes have been made to the
information.
Electronics fund transfer, Air traffic controlling, Financial accounting
Basic Security Concepts
▪ Availability
This is often the most important criteria in service oriented businesses.
When information is erased or becomes inaccessible to an authorised entity, it is loss of
availability.
Phases of
Hacking
oInformation Gathering
oScanning
oGaining Access
oReporting Vulnerability
oMaintaining Access
oCovering Tracks
InformationGathering
Scanning
GainingAccess
Reporting Vulnerability
MaintainingAccess
Covering Tracks
History of Hacking
Tracing the roots…
▪ Early 1970s: John Draper made a long distance call for free by
blowing a precise tone into a telephone that told the phone system
to open the line.
▪ Early 1980s: Milwaukee based 414s charged of 60 computer break-
ins from Memorial Sloan Kettering Cancer Centre to the Los
Alamos National Laboratory.
▪ Late 1980s: 25 year old Kevin Mitnick secretly monitors the emails
of MCI and Digital Equipment security officials.
▪ Early 1990s: AT&T long distance service made to crash on Martin Luther
King Jr. Day.
Security breach into Griffith Air Force Base Station, pewit
computers at NASA and the Korean Atomic Research Institute.
▪ Michael Shim
E-bay
Amazon
and Yahoo.
15 years old.
Methods toHacking
The different ways and paths taken during a hacking process…
System Hacking
oPassword Cracking
Use probabilities of password guesses to match with the
original passwords.
Brute Forcing
Matching all possible key combinations.
Dictionary Attacks
Using dictionary words to crack passwords.
Key logging
Tracking and spying on the inputs done on a system
through the keyboard.
System Hacking
oRootkits and RATs
Use malwares or spywares to observe and steal files containing
passwords or their hashes.
1. Application Level Rootkits
2. Kernel Level Rootkits
3. Hardware Level Rootkits
4. Boot loader Level Rootkits
SQL Injection
oSimple SQL Injection
Practical approach of bypassing login form using malicious
SQL entries.
Example:
If you put
‘or’1’=‘1
in both username and password fields of a login form
vulnerable to SQL injection, then it bypasses the login form.
SQL Injection
oUnion SQL Injection
The union operation of the SQL databases is used to find the
vulnerable column of entries.
This vulnerable column can be further used to rig out meta data
about the database.
SQL Injection
oBlind SQL Injection
It asks the database “True OR False” based questions and
determines the answer based on the applications response.
SQL Injection
oAdvanced SQL Injection
Error messages are used to extract information.
Example:
Warning: mysql_fetch_array():supplied
argument is not valid MySQL result resource
in
D:Inetpubvhostskpccvicharvibhag.orghttpdo
csadminclassesclsCollection.php on line
124
Above is a generic error message through which we can extract a
lot of information about the database.
SQL Injection
oAdvanced SQL Injection
1. Message says that the back-end is running on MySQl
2. Path stated starts with D:inetpubvhosts…
this means the Operating System is Windows based
and the web server being used is IIS.

Mais conteúdo relacionado

Mais procurados

What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical HackingMasih Karimi
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingMissStevenson1
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hackingSainath Volam
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Simplilearn
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module ankit sarode
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 

Mais procurados (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Hacking Kishor
Hacking KishorHacking Kishor
Hacking Kishor
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 

Semelhante a Ethical hacking

Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxyoufanlimboo
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfJawaidAbdulHameed
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxBhupeshDhapola2
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxGovandJamalSaeed
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security introAbhilash Ak
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 

Semelhante a Ethical hacking (20)

Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 

Último

Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 

Último (20)

Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 

Ethical hacking

  • 1.
  • 2. Submitted to Mr Purushottam Das Presented By Punit Goswami CSE 3rd Sem
  • 3. Ethical Hacking Offense as the best defense
  • 4. What is hacking ? A little clarification…
  • 5. ▪ Hacking is any curiosity driven approach to finding weakness in a system. ▪ Exploiting these weaknesses depends on the purpose of breaching. ▪ Commonly misunderstood as a cracker. ▪ Cracker is somebody who uses the breaches and exploits in a system only for malicious usage. ▪ Hacking is about making things do what they were not made to do. ▪ A person who uses breaches and exploits for increasing knowledge or breaches them for security auditing is a Hacker.
  • 6. Kinds of hackers… Because hackers too occur of kinds…
  • 7. Hackers too come in types… ▪ Script Kiddie: Knows how to use tools or methods made by experienced hackers. Does not necessarily know or understand the background working of the tools or methods. Is just curious or wants to show off.
  • 8. Hackers too come in types… ▪ White Hat Hackers: Do hacking for research and defensive purposes. Try to improve the robustness of a system by finding flaws in a security system and fixing them. Mostly work for or in an organization or individually.
  • 9. Hackers too come in types… ▪ Black Hat Hacker: Hackers with malicious intents while breaking into a system. Cyber criminals who steal money, passwords, infect systems. Practically everything that media shows about hacking and its illegal strings.
  • 10. Hackers too come in types… ▪ GreyHat Hackers: Are neither purely malicious nor completely defensive. Their nature depends on the situation. May not have malicious intents but would still like to break into the systems that they are not authorized to.
  • 11. Hackers too come in types… ▪ Hacktivist: A new genre of hackers. Use their collective knowledge and potential to protest against politically or religiously sensitive issues. Have become the most popular category of hackers being talked about nowadays.
  • 12. The C-I-A Triad Basic security concepts…
  • 13. Basic Security Concepts ▪ Confidentiality When information is compromised by someone not authorized to do so it is a loss of confidentiality. Is an important attribute. Requires internal cohesiveness of set of data. Research papers Insurance records New product Specifications Private Information of People
  • 14. Basic Security Concepts ▪ Integrity For an information which is very sensitive, its corruption can be disastrous. If this information is kept on an unsecured network, chances of it being corrupted, modified or changed increases. This loss of integrity indicates that unauthorised changes have been made to the information. Electronics fund transfer, Air traffic controlling, Financial accounting
  • 15. Basic Security Concepts ▪ Availability This is often the most important criteria in service oriented businesses. When information is erased or becomes inaccessible to an authorised entity, it is loss of availability.
  • 16. Phases of Hacking oInformation Gathering oScanning oGaining Access oReporting Vulnerability oMaintaining Access oCovering Tracks
  • 24. ▪ Early 1970s: John Draper made a long distance call for free by blowing a precise tone into a telephone that told the phone system to open the line. ▪ Early 1980s: Milwaukee based 414s charged of 60 computer break- ins from Memorial Sloan Kettering Cancer Centre to the Los Alamos National Laboratory. ▪ Late 1980s: 25 year old Kevin Mitnick secretly monitors the emails of MCI and Digital Equipment security officials.
  • 25. ▪ Early 1990s: AT&T long distance service made to crash on Martin Luther King Jr. Day. Security breach into Griffith Air Force Base Station, pewit computers at NASA and the Korean Atomic Research Institute. ▪ Michael Shim E-bay Amazon and Yahoo. 15 years old.
  • 26. Methods toHacking The different ways and paths taken during a hacking process…
  • 27. System Hacking oPassword Cracking Use probabilities of password guesses to match with the original passwords. Brute Forcing Matching all possible key combinations. Dictionary Attacks Using dictionary words to crack passwords. Key logging Tracking and spying on the inputs done on a system through the keyboard.
  • 28. System Hacking oRootkits and RATs Use malwares or spywares to observe and steal files containing passwords or their hashes. 1. Application Level Rootkits 2. Kernel Level Rootkits 3. Hardware Level Rootkits 4. Boot loader Level Rootkits
  • 29. SQL Injection oSimple SQL Injection Practical approach of bypassing login form using malicious SQL entries. Example: If you put ‘or’1’=‘1 in both username and password fields of a login form vulnerable to SQL injection, then it bypasses the login form.
  • 30. SQL Injection oUnion SQL Injection The union operation of the SQL databases is used to find the vulnerable column of entries. This vulnerable column can be further used to rig out meta data about the database.
  • 31. SQL Injection oBlind SQL Injection It asks the database “True OR False” based questions and determines the answer based on the applications response.
  • 32. SQL Injection oAdvanced SQL Injection Error messages are used to extract information. Example: Warning: mysql_fetch_array():supplied argument is not valid MySQL result resource in D:Inetpubvhostskpccvicharvibhag.orghttpdo csadminclassesclsCollection.php on line 124 Above is a generic error message through which we can extract a lot of information about the database.
  • 33. SQL Injection oAdvanced SQL Injection 1. Message says that the back-end is running on MySQl 2. Path stated starts with D:inetpubvhosts… this means the Operating System is Windows based and the web server being used is IIS.