You are on page 1of 10

An

IT Act Seminar
On
ETHICAL HACKING
submitted
in partial fulfilment
for the award of the Degree of
Bachelor of Technology
in Department of Computer Science & Engineering

Session 2014-15
Submitted to:
Ms. Neha Sharma

Submitted By:
Name : Juhi Kanjani
Roll No.-11EGCCS024
Semester:VIII

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


GLOBAL COLLEGE OF TECHNOLOGY, JAIPUR

What Is Ethical Hacking?


Ethical hacking defined as a methodology adopted by
ethical hackers to discover the vulnerabilities existing in
information systems operating environments.
Ethical hacking is also known as penetration testing, intrusion
testing or red teaming.
Need Of Security
Concerns : Security
Confidentiality
Integrity
Availability

Hackers & Their Types


Hacker is a person intensely interested in the arcane and recondite workings of any
computer operating system. Hacker is a term used by some to mean "a clever
programmer" and by others, especially those in popular media, to mean "someone
who tries to break into computer systems.
TYPES OF HACKERS
Black-Hat Hacker: A black hat hackers or crackers are individuals with extraordinary
computing skills, resorting to malicious or destructive activities. That is black hat
hackers use their knowledge and skill for their own personal gains probably by
hurting others.
White-Hat Hacker: White hat hackers are those individuals professing hacker skills
and using them for defensive purposes. This means that the white hat hackers use their
knowledge and skill for the good of others and for the common good.
Grey-Hat Hackers: These are individuals who work both offensively and defensively
at various times. We cannot predict their behaviour. Sometimes they use their skills
for the common good while in some other times they use them for their personal
gains.

Ethical Hacking
WorkingCommandments
ethically
Respecting privacy

Not crashing your systems

5 Methodology of Hacking:
Reconnaissance
Scanning & Enumeration
Gaining access
Maintaining access
Clearing tracks

Gaining Access

This is the actual hacking phase in which the hacker gains access to the
system. The hacker will make use of all the information he collected in the
pre-attacking phases

Password Cracking
Cracking
Dictionary cracking
Brute force cracking
Hybrid cracking

Social Engineering
Privilege escalation

vantages & Disadvantag


Advantages
Provides security to banking and financial establishments
Prevents website defacements
An evolving technique
To catch a thief you have to think like a thief

Disadvantages

All depends upon the trustworthiness of the ethical hacker

Hiring professionals is expensive.

Ethical Hacking Tools


& Methods
Samspade: Samspade is a simple tool which provides us information about a
particular host.This tool is very much helpful in finding the addresses, phone
numbers.
Email Tracker : Email tracker is a software which helps us to find from which server
does the mail actually came from. Every message we receive will have a header
associated with it. The email tracker use this header information for find the location.
Visual Route: The visual route GUI have a world map drawn to it. The software will
locate the position of the server in that world map.
War Dialing: The war dialers is a hacking tool which is now illegal and easier to find
out. War dialing is the practice of dialing all the phone numbers in a range in order to
find those that will answer with a modem

Pingers: Pingers are yet another category of scanning


tools
which makes use of the Internet Control Message
Protocol(ICMP) packets for scanning.
Port Scanning : A port scan is a method used by hackers to
determine what ports are open or in use on a system or
network.
Super Scan: SuperScan is a powerful TCP port scanner, that
includes a variety of additional networking tools like ping,
traceroute, HTTP HEAD, WHOIS and more.
Nmap: Nmap ("Network Mapper") is a free and open source
utility for network exploration or security auditing.

Conclusi
on

The study of Ethical Hacking is very useful for the following genres:
Student
A student should understand that no software is made with zero
vulnerabilities. So while they are studying they should study the various
possibilities and should study how to prevent that because they are the
professionals of tomorrow.
Professionals
Professionals should understand that business is directly related to
security. So they should make new software with vulnerabilities as less as
possible. If they are not aware of these then they wont be cautious enough
in security matters.
Users
The software is meant for the use of its users. Even if the software menders
make the software with high security options with out the help of users it
can never be successful.

Thank
You ..!!!

You might also like