ethical hacking

17
ETHICAL HACKING HarshaVardhan Brahmandam III B.Tech, Computer Science, N.B.K.R.I.S.T Vidyanagar, Kota Mandal, S.P.S.R.Nellore District, Andhra Pradesh-524413, India Email: [email protected]

Upload: being-gamer

Post on 08-Aug-2015

100 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Ethical hacking

ETHICAL HACKING

HarshaVardhan Brahmandam

III B.Tech, Computer Science, N.B.K.R.I.S.T

Vidyanagar, Kota Mandal, S.P.S.R.Nellore District, Andhra Pradesh-524413, India

Email: [email protected]

Page 2: Ethical hacking

Contents

1. Introduction to hacking

2. Classification of hackers

3. Types of attacks

4. Types of hacking

5. Kali Linux1. Hacking methods

1. Tools provided in Kali Linux

6. Ethical hacking through Kali Linux

7. Advantages & Disadvantages

8. Conclusion

9. Summary

Page 3: Ethical hacking

INTRODUCTION TO HACKING

Page 4: Ethical hacking

CLASSIFICATION OF HACKERS

Hackers

Classification of “HATS” based on Intention

Black Hat White Hat Grey Hat

Qualification

Computer Science Technician Script

Kiddies

Page 5: Ethical hacking

TYPES OF ATTACKS

DoS

Trojan Horse

Virus

Phishing

Worm

Logic Bomb

Page 6: Ethical hacking

TYPES OF HACKING

Hacking

Website Hacking• Vulnerable loopholes

• Collapses the information• Make changes in the information

Page 7: Ethical hacking

Kali Linux

Hacking

Ethical Hacking

Tools

Page 8: Ethical hacking

HACKING METHODS

INFORMATION GATHERING

VULNERABILITY ANALYSIS

WIRELESS ATTACKS

WEB APPLICATIONS ATTACKS

STRESS TESTING

SNIFFING & SPOOFING

PASSWORD ATTACKS

HARDWARE HACKING

Page 9: Ethical hacking

TOOLS PROVIDED IN KALI LINUX

TOOLS

….

….

Page 10: Ethical hacking

ETHICAL HACKING THOUGH KALI LINUX

Ethical hacking

What can an intruder see on

the target systems ?

What are you trying to protect ?

What can an intruder do with that information

?

Page 11: Ethical hacking

DISADVANTAGES

ADVANTAGES

Page 12: Ethical hacking

ADVANTAGES

• Understanding the terms of security.• Protection himself/herself for external attacks.

• Ethical hackers are majorly hired by multinational companies.• Self Employment

• Exposing over self to the latest technology.

Page 13: Ethical hacking

DISADVANTAGES

• Every ethical hacker is a real time hacker.• Could also a full time offensive hacker.• Internet is always under surveillance.

• prison.• could lead to legal charges.

Page 14: Ethical hacking

CONCLUSION

One should know their level of security.Privacy is essential to every individual.Security should be given more priority.

Terms & Conditions should be noticed before confirming an action across the internet.

Proper ethical hackers should be employed.

Page 15: Ethical hacking

SUMMARY

• Hacking is of two types

• There are several types of hacking

• Hacking through Kali Linux

• Ethical hacking – a legal method

• Consequences of illegal hacking

Page 16: Ethical hacking
Page 17: Ethical hacking

Any queries