ethical hacking by chandra prakash upadhyay

23
Ethical Hacking PRESENTED BY- :Chandra Prakash Upadhyay :ROLL NO- 019

Upload: chandra-prakash

Post on 10-May-2015

2.426 views

Category:

Technology


9 download

TRANSCRIPT

Page 1: Ethical hacking by chandra prakash upadhyay

Ethical Hacking

PRESENTED BY- :Chandra Prakash Upadhyay :ROLL NO- 019

Page 2: Ethical hacking by chandra prakash upadhyay

Overview of Hacking. Hacker. Types of Hacker . Why do Hacker hacks? How do Hacker hacks? Hacker’s language. Ethical Hacking and it’s

Process. Skills of an Ethical Hackers. Prevention of Hacking. What should do after Hacked

?

Contents :

Page 3: Ethical hacking by chandra prakash upadhyay

The term “Hack” was first used by US university staff in mid-1960s.

When eBay was first attacked in Feb-2000 it’s server was bombarded with fake request for web pages & overloaded the site.

A group of teenagers once hacked into AOL and stole credit cards to buy Video Games.

In 1998,teenagers hack into Bell Atlantic phone system; disable communication at airport disables runway lights.

In 2000, viruses named ”I love you” & ”LOVE BUG” damaged roughly up to 10 billions of computers.

Overview of Hacking.

Page 4: Ethical hacking by chandra prakash upadhyay

Hack:

Eric Raymond compiler of the “The new Hacker’s Dictionary", defines a hacker as a claver programmer.

A ‘good hack’ is a clever solution to a programming problem.

Hacking:

Hacking is act of doing it. Cracker :

System intruder/destroyer.

Page 5: Ethical hacking by chandra prakash upadhyay

Hacking .

A person who enjoys learning detail of a programming language or system.

A person who enjoys actually doing the programming rather then just theorizing about it.

A person capable of appreciating some once else’s Hacking.

A person who picks up programming quickly. A person who is expert at a particular programming

language system.

Page 6: Ethical hacking by chandra prakash upadhyay

Types of Hackers

Black hat Hackers

Grey hat Hackers.

White hat Hackers.

Page 7: Ethical hacking by chandra prakash upadhyay

A black hat is the villain or bad guys. Use computer to attack systems for profit, for

revenge, or for political mitigations. Black hat hackers always do Illegal work. They work for black money. They are professional in their field. They use their knowledge for illegal purpose.

Black Hat Hackers

Page 8: Ethical hacking by chandra prakash upadhyay

Kevin Poulsen Kevin d mitnick Adrain Lamo Georje Hotz Jonathan James

Some Black Hat Hackers

Page 9: Ethical hacking by chandra prakash upadhyay

White hat hackers like Ethical hackers. They use their skills for good purposes.

They work for organizations for stop the illegal activities through Black Hat Hackers.

They works to ensure the security of an organization’s information system.

White Hat Hackers

Page 10: Ethical hacking by chandra prakash upadhyay

Ankit Fadia Tim Berner Lee Bill Gates Linus Tovaldes Steve Jobes Steve wozniak

Some White Hat Hackers

Page 11: Ethical hacking by chandra prakash upadhyay

Why Do Hackers Hack

To make Security Stronger (Ethical Hacking). Just for fun. Show off. Hack other System secretly. Notify many people their thoughts. Steel important information. Destroy enemy’s computer network during war.

Page 12: Ethical hacking by chandra prakash upadhyay

E-mail Hacking. System Hacking. Network Hacking. Trojans Horses. Website Hacking. Software Hacking.

How Do Hackers Hack

Page 13: Ethical hacking by chandra prakash upadhyay

1 ->i or l 3 ->e 4 ->a 7 ->t 9 ->g 0 ->o $ ->s L ->i or I

Hackers Language

|\| ->n |V| ->m S ->z Z ->s f ->ph Ph ->f

Page 14: Ethical hacking by chandra prakash upadhyay

EX:- 1 d1d n0t h4ck th1s p4g3, 1t w4s I1k3 th1s

wh3n 1 h4ck3d 1n.(Encrypted )

I did not hack this page, it was this when I hacked in.(Decrypted)

Hackers Language Translation

Page 15: Ethical hacking by chandra prakash upadhyay
Page 16: Ethical hacking by chandra prakash upadhyay

It is legal. Permission is obtained from the target. Also called – Attack & penetration testing, white hat

hacking. Part of an overall security program. Perform most of the same activities but with owner’s

permission. Ethical hackers processes same skills, mind set and tools of

a hackers but the attacks are done in non-destructive manner.

What is Ethical Hacking?

Page 17: Ethical hacking by chandra prakash upadhyay

I am a hacker. I am a CEH.

CEH ?

Page 18: Ethical hacking by chandra prakash upadhyay

The Certified Ethical Hacker(CEH) is a professional certification provided by the International Council of E-commerce consultants(EC-Council).

Certified Ethical Hacker

Page 19: Ethical hacking by chandra prakash upadhyay
Page 20: Ethical hacking by chandra prakash upadhyay

Information gathering Scanning Analyse system Prepare for attack Access the system Maintaining Access

Process Of Ethical Hacking

Page 21: Ethical hacking by chandra prakash upadhyay

Good Coder. Well knowledgeable person both hard ware as well as software

like: Routers Microsoft Linux Firewalls Network protocols

Should have knowledge on security system. Trusted person.

What Are The Various Qualities A Hacker Should have ?

Page 22: Ethical hacking by chandra prakash upadhyay

Shutdown the system Or turn off the system.

Separate the system from network Restore the system with the backup

Or reinstall all programs. Connect the system to the network

What Should Do After Hacked?

Page 23: Ethical hacking by chandra prakash upadhyay

Thank You ! ! !