secure shell - a presentation on ethical hacking
DESCRIPTION
Ethical Hacking Presentation By Prashant Bhende and Nitish KasarTRANSCRIPT
![Page 1: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/1.jpg)
![Page 2: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/2.jpg)
Seminar onEthical Hacking
SECURE SHELL
BY
Mr. NITISH KASAR
AND
MR.PRASHANT BHENDE
![Page 3: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/3.jpg)
WARNING – This Seminar is intended for educational purpose . We are not responsible for any misuse of
techniques taught in this seminar
![Page 4: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/4.jpg)
What is Hacking
Who is Hacker
![Page 5: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/5.jpg)
Hacking is derived from word Hack. Hack sense to "something try to break”
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose
Hacking is a Art of Finding Vulnerability inApplicationSystemNetwork
And can compromise them to get access over the system and the network.
What is Hacking ?
![Page 6: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/6.jpg)
A Hacker is who An enthusiastic and skillful computer programmer or user.A person who uses computers to gain unauthorized access to data.
Hacker is aware of every weak and part of security related to computer or network
Who is Hacker ?
![Page 7: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/7.jpg)
T y p e s o f H a c k e r :
Black Hat Grey Hat White Hat
![Page 8: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/8.jpg)
White Hat Hacker: - Use Their Hacking Skills and Knowledge for Good Purpose - Identifies a security weakness in a computer system or network
but doesn’t takes malicious advantage of it
- They are also known as “Ethical Hacker”.
Black Hat Hacker:- Use Their Hacking Skills and Knowledge for Malicious Purpose- Identifies a security weakness in a computer system or network and
exposes it to other hackers or public without notifying to the Victim- They are also known as “Crackers”.
Grey Hat Hackers: - Grey hat hackers are those guys who use their skills for both
ethical and unethical Purpose
![Page 9: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/9.jpg)
Other Types of HackerElite Hacker
Hacktivist
Whacker
Phreaker
Script Kiddies
![Page 10: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/10.jpg)
Script Kiddies: Those guys who actually don’t know
anything about hacking process, they use tools which available on the internet for free for attack
Phreakers: A phreaker are those guys who focuses on
communication systems to steal card num., make free phone calls, and get access illegally to communication devices.
Whackers: Whackers uses their skills to hack
wireless networks.
![Page 11: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/11.jpg)
Hactivist: These kind of hackers compromise
systems with some political or social reasons.
Elite Hackers: These kinds of hackers are the most skilled among other types of
hackers. They have thorough knowledge of computer systems, programming languages. They Know what there are getting into.
![Page 12: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/12.jpg)
Need of Ethical Hacking
![Page 13: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/13.jpg)
![Page 14: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/14.jpg)
![Page 15: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/15.jpg)
Phishing attack Punjab National Bank Customers
![Page 16: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/16.jpg)
Recent Facebook Scam
![Page 17: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/17.jpg)
Need of Ethical Hacking ? ?
• To make the Cyberspace more secure.
• Respond to Cyber Crimes • To explore various threats that a system could have and ultimately report it to the concerned authorities.
![Page 18: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/18.jpg)
Basic Steps of Hacking
Foot Printing
Scanning
Gaining Access
Maintain Access
Covering Tracks
![Page 19: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/19.jpg)
Terminologies you should about
• Vulnerability: It is Weakness of any programming code like buffer overflow, that helps to hack any systems or network.
• Exploit: It is piece of malicious code that takes advantages of un-patched vulnerability in Program.
• Payload : After exploiting a vulnerability in software application , payload assists further to maintain connection with attacked system.
![Page 20: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/20.jpg)
Terminologies you should about
Virus
Worms
Trojans
Key loggers
Spywares
![Page 21: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/21.jpg)
![Page 22: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/22.jpg)
Career in Hacking • According to Nasscom, demand for ethical hackers is estimated at over 77,000 in India every year.
•Against this, India is producing only 20,000-25,000 ethical hackers.
![Page 23: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/23.jpg)
Career in Hacking:
![Page 24: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/24.jpg)
Secure Shell Level-1
Course Duration:30 days
1.Introduction to Ethics of Hacking
2.Networking basics
3.Introduction to Linux
4.Windows hacking
5.Footprinting
6.Scanning
7.Proxy basics
8.DOS Attacks
9.Google hacking
10.Malwares
11.Cryptography
12.Stegnography
13.Firewall
14.Pentration Methodologies
15.Email hacking and security
16.Social Engineering
17.Online safety
![Page 25: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/25.jpg)
Certificate for Participation. Tool kit. E-books. Cyber laws documents. Tutorial books. Operating system.
Secure Shell level-1
![Page 26: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/26.jpg)
How to make a SECURE Password
UPPERCASE , lowercase lettersLength Should be more than 12 charactersShould contain at least 2 numbersShould contain Special SymbolLetters Replaced with Special Symbol e.g. s, S = $ ; a = @; I, I= !Whitespaces Phrases e.g.
![Page 27: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/27.jpg)
![Page 28: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/28.jpg)
Question ???..............
![Page 29: Secure Shell - a Presentation on Ethical Hacking](https://reader036.vdocuments.net/reader036/viewer/2022062405/55758706d8b42ae7708b4705/html5/thumbnails/29.jpg)
THANK YOU !!!