seminar ppt
TRANSCRIPT
![Page 1: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/1.jpg)
ETHICAL HACKING
![Page 2: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/2.jpg)
TABLE OF CONTENTSINTRODUCTION
HACKING
ETHICAL HACKING
METHODOLOGY OF ETHICAL HACKING
ETHICAL HACKING TOOLS
ADVANTAGES & DISADVANTAGES
FUTURE ENHANCEMENTS
CONCLUSIONS
REFERENCES
![Page 3: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/3.jpg)
INTRODUCTION
Ethical hacking
Security
Tools employed are same.
Ethical hackers do not damage system.
![Page 4: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/4.jpg)
HACKERA clever programmer.
CHARACTERISTICS OF HACKER One who:
Enjoys programming .
Appreciating someone else's hacking.
Expert.
![Page 5: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/5.jpg)
TYPES OF HACKERS
BLACK HAT HACKER
WHITE HAT HACKER
GREY HAT HACKER
![Page 6: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/6.jpg)
Fig1: Library of congress webpage before attack
ILLUSTRATION OF HACKING
![Page 7: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/7.jpg)
Fig 2: Library of congress webpage after attack
![Page 8: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/8.jpg)
FLOWCHART FOR HACKING
Fig 3: General hacking
![Page 9: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/9.jpg)
ETHICAL HACKING Vulnerabilities existing.
SKILLS FOR ETHICAL HACKERMicrosoft
Linux
Firewalls
Network Protocols
Routers
Patience
![Page 10: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/10.jpg)
ETHICAL HACKING
COMMANDMENTS
Working ethically.
Respecting privacy.
Not crashing your systems.
![Page 11: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/11.jpg)
METHODOLOGY OF HACKINGReconnaissance
Scanning
Enumeration
Gaining access
Maintaining access
Clearing Tracks
![Page 12: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/12.jpg)
ETHICAL HACKING TOOLSSamspade
Fig 4: Samspade GUI
![Page 13: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/13.jpg)
Email Tracker and Visual Route
Fig 5: Email Tracker GUI
![Page 14: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/14.jpg)
Visual Route: displays location using IP address.
Fig 6: Visual Route GUI
![Page 15: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/15.jpg)
ADVANTAGES
To catch thief.
To close open holes.
Provides security.
DISADVANTAGESDepends on trustworthiness.
Expensive.
![Page 16: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/16.jpg)
FUTURE ENHANCEMENTSEmploy new techniques.
Tools should be updated.
![Page 17: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/17.jpg)
CONCLUSIONSGet updated about softwares.
Educate against black hat hacking.
Firewalls and other security measures.
The password should be made strong.
![Page 18: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/18.jpg)
REFERENCES1. C.C PALMER IBM SYSTEMS JOURNAL, VOL 40, NO 3,
2001
2.Computer Security Education and Research- 1540-
7993/06/$20.00 © 2006 IEEE-IEEE Security and
Privacy
3.About Penetration Testing-1540-7993/07/$25.00 ©
2007 IEEE- IEEE Security and Privacy
![Page 19: Seminar Ppt](https://reader033.vdocuments.net/reader033/viewer/2022051411/54488b35b1af9f374e8b4a52/html5/thumbnails/19.jpg)
QUERIES ?
THANK YOU