muzafar mohil p.p.muxi
TRANSCRIPT
![Page 1: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/1.jpg)
ETHICAL HACKING
BY :- Muzafar Ali Mohil
dept:- (Bscs)
![Page 2: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/2.jpg)
![Page 3: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/3.jpg)
HACKER
![Page 4: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/4.jpg)
CONTENT
Overview of Hacking Why do hackers hack? Types of Hacker Level of Hackers Hackers language Ethical Hacking – Process How can protect the system? What should do after hacked? Final words
![Page 5: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/5.jpg)
OVERVIEW OF HACKING
It is Legal
Permission is obtained from the target
Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner
Also Called – Attack & Penetration Testing.
![Page 6: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/6.jpg)
HACKING VS CRACKING
Hacker The person who hack
Cracker System intruder/destroyer
HACKING WITH MALICIOUS INTENTION IS CRACKING
The basic difference is hackers do not do anything disastrous.
Cracking yield more devastating results.
Cracking is crime. Cyber crime are the results of cracking ,not hacking
![Page 7: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/7.jpg)
THE GREAT HACKER WAR
Kevin Mitnick The most famous, and undoubtedly most gifted hacker in history, made a name for himself in 1981 at the tender age of 17 by getting into a phone exchange, which allowed him to redirect subscriber calls in any way he wanted. In 1983, he achieved his first major coup - and also his first arrest - when he accessed a Pentagon computer. It was his repeated offenses that made him a target of the FBI. He was sentenced to five years in prison in the 1990s, but today he is a security consultant and owns his own company: Mitnick Security.
John Draper known as "Cap'n Crunch", Draper was one of the first hackers in history. This moniker comes from the cereal of the same name, inside of which he once discovered a toy whistle (provided as a gift to entice children to ask parents for the cereal). He discovered that he could use the whistle to hack a telephone line and get free phone calls - all that was necessary was to produce a precise tone in the receiver for the method to work. He was arrested in 1976 and sentenced to two months in prison.
![Page 8: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/8.jpg)
Why do people hack??
To make security stronger ( Ethical Hacking )
Just for fun
Show off
Hack other systems secretly & Steal important information
![Page 9: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/9.jpg)
What are the various qualities a hacker should
posses Good coder
well knowledgeable person both hard ware as well as soft ware
Should have knowledge on security system
Trusted person
![Page 10: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/10.jpg)
Types of hacker
![Page 11: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/11.jpg)
![Page 12: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/12.jpg)
Hackers language
1 -> i or l3 -> e4 -> a 7 -> t9 -> g0 -> o$ -> s| -> i or
|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x
![Page 13: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/13.jpg)
Hackers language translation
EXAMPLE:- Hacking is good
H4ck||\|g 1$ 900d
![Page 14: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/14.jpg)
Hacking - Process
Foot Printing
Scanning
Gaining Access
Maintaining Access
![Page 15: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/15.jpg)
Foot Printing
Whois Lookup
NS lookup
IP Lookup
![Page 16: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/16.jpg)
Scanning
Port scanning
Network scanning
Finger Printing
Fire walking
![Page 17: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/17.jpg)
Gaining access
Password Attacks
Social Engineering
Viruses
![Page 18: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/18.jpg)
Maintaining access
Os BackDoors
Trojans
Clearing tracks
![Page 19: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/19.jpg)
Advantages & Disadvantages
Advantages Provides security to banking and financial establishments
Prevents website defacements An evolving technique To catch a thief you have to think like a thief
Disadvantages All depends upon the trustworthiness of the ethical hacker
Hiring professionals is expensive.
![Page 20: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/20.jpg)
How can we protect the system?
Patch security hole often Encrypt important data
Ex) pgp, ssh Remove unused program Setup loghost
Backup the system often Setup firewall Setup IDS
Ex) snort
![Page 21: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/21.jpg)
What should do after hacked?
Shutdown the system Or turn off the system
Separate the system from network Restore the system with the backup
Or reinstall all programs Connect the system to the network
![Page 22: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/22.jpg)
H4cking prone areas
![Page 23: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/23.jpg)
Hacking GROWTH RATE
It is clear from the graph it is increasing day by day.
![Page 24: Muzafar mohil p.p.muxi](https://reader034.vdocuments.net/reader034/viewer/2022051616/55652867d8b42a08498b53ef/html5/thumbnails/24.jpg)
THANK YOU