0% found this document useful (0 votes)
29 views80 pages

Introduction To Ethical Hacking

ethical hacking

Uploaded by

newarsahil34
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views80 pages

Introduction To Ethical Hacking

ethical hacking

Uploaded by

newarsahil34
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 80

Introduction to

Ethical Hacking

Module 1
1. Information
Security

Module 1
What is Information?

Meaningful form of data


Can be called as processed data
Data has no context, info does
Computer is data
This is my computer is information

5
What is Information?

6
What is Information Security?

What will I do with your birthday?


I can definitely do with your phone number

Protecting information from unauthorized


access
Employing tools and policies
IT IS THE BASIC NEED OF EVERYONE

7
What is Information Security?

Wonder how people have realized the sensitivity of information!


Enigma Machine which was used by Germans to encrypt warfare
data.
What if someone is constantly watching you??

Security is the quality of information


Security is freedom
Security is an asset
8
What is Information Security?

9
What is Information Security?

Information is everywhere
This is the information age
Information in digital systems makes cyber security

10
What is Information Security Threats?

Threat is a constant danger to an asset


It can be a person, object or an event

Threats can be categorized and ranked

11
What is Information Security Threats?

Types of Threats

Inadvertent threats (human failure)

Physical disasters (natural disasters)

Technical failures (hardware or software)

Deliberate acts (hacking, espionage) 12


Information Security does not deal with?

Cyber warfare
Information warfare
Negative impacts of people on Internet (sexual abuse,
cyber stalking, etc.)
IoT security

13
Information Security does not deal with?

Then who deals with them?

14
2. Cyber Security

Module 1
What is Cyber Security?

Protection of cyber space against cyber threats and


cyberspace vulnerabilities
Any threats to information via the cyber space

Deals with deliberate acts


deal with physical and personal security
Threats via cyberspace, not threats for Cyberspace
16
What is Cyber Security?

17
3. Objectives of
Cyber Security

Module 1
Objectives of Cyber Security

Confidentiality: No telling to unauthorized parties

Integrity: Completeness and accuracy of data

Availability: When needed, data is available

19
Objectives of Cyber Security

Non-repudiation: I should accept I sent you the message


and you should accept you received it

Authenticity: You should actually be who you tell you are

20
3. The CIA Triad

Module 1
The CIA Triad

22
Confidentiality

Roughly but wider than privacy


Sensitive data should not reach wrong people
Sensitive data should reach right people

Measures:
Data encryption
Authentication (maybe multi-factor)
More sensitive, more physical

23
Integrity

Data should be consistent, trustworthy and accurate


Data must not change in transit
Most complex to implement

Measures:
Backups
Cryptographic measures (checksums)
Access control

24
Availability

Data should be available as and when needed


Updated software and hardware
Adequate system capacity and bandwidth

Measures:
Firewalls rules
Patch management and disaster recovery
Load balancers

25
4. What is Hacking?

Module 1
What is Hacking?

Hacking is a very wide term

Introduced in the 1960s MIT

That time was of more hardcore programming

Those were the most intelligent and advanced hackers

All started by the end of 1960s, when ARPANET was founded by the
US military.
27
What is Hacking?

There is no standard definition of hacking

Media continues to add false information about hacking

There are good hackers, and there are bad

Bad ones need to be discussed, but not learnt

Good ones are to be focused, the Ethical Hackers


28
WHO IS A HACKER?
29
WHO IS A HACKER?

Steal facebook password?


Hack a wifi?
A CS Student?
Get me unlimited coins in the game?
HACKS NASA WITH HTML?
A Terrorist?
30
WHO IS A HACKER?

31
teenage mischief into a billion-

32
WHO IS A HACKER?

Using his/her skills and knowledge to gain unauthorized


access to a software, computer, or a network
Uses his/her own tools and techniques
Is NOT always bad
Can go to prison, or earn millions
One of the most risky professions of them all

33
The quieter you become, the
more you are able to hear.

34
TYPES OF HACKERS
35
WHITE HAT HACKERS
Security Professionals, hack with
permissions
36
White Hat Hacker

The ethical hackers, also break into systems

Not to exploit them, but to help management fix them

The same thrill, same swag, but bonus money and respect

Even work with Government, cyber cells and police

37
White Hat Hacker

38
White Hat Hacker

39
White Hat Hacker

40
BLACK HAT HACKERS
Criminals, highly destructive, penetrate
to destroy and cause damage
41
Black Hat Hacker

That typical hacker you might have heard of

Use undisclosed vulnerabilities, tools and exploits

Just randomly hack systems to create havoc

Or to take revenge or fulfil personal desires

Most common desires: Financial gain, spying, revenge


42
Black Hat Hacker

43
GREY HAT HACKERS
malicious intent
44
Grey Hat Hacker

Not completely white, not completely black

Hack without permissions and authorization, sometimes report

Demand compensation/money for fix

Whether to say illegal, totally depends on the victim party

actually have any professional gain


45
Grey Hat Hacker

No image to show!

46
5. What is Ethical
Hacking?

Module 1
Ethical Hacking

Performed by a company or individual to help identify potential threats


on a computer or network

Search for any weak points that could be exploited by malicious hackers

This information is then used by the organization to improve the system


security

Very underrated and criticized, especially in India

48
Ethical Hacking

It is way more wider than we think!

HACKING IS HACKING, NO MATTER HOW YOU LOOK AT IT!!

IF YOU HACK, YOU ARE A COMPUTER CRIMINAL OR CYBER CRIMINAL!!

But actually, the cyber space is more safer as we see it because of


ethical hackers

49
WHO IS AN ETHICAL HACKER?

50
WHO IS A ETHICAL HACKER?

Security Professional
Tests the security and identifies loopholes
Creates reports and analysis
Authorized with proper permissions
Earns money and respect

51
6. Information
Warfare

Module 1
Information Warfare

Tactical and strategic use of information, to gain an advantage

In the earlier days, information was more physical


Groups of people involved, especially Government, to tackle enemies
Countries spent millions in secret intelligence and spies
Military used weapons and army power to send policy implementations

53
Information Warfare

Today, this warfare involves most of the digital media.

It has become cyber warfare

Government spends millions for IT infrastructure to attack, defend from attacks

Now it mostly revolves around terrorism

Common practices of cyber warfare:


Using viruses and malwares
Exploiting electronic communication systems and networks
Stealing info via unauthorized access 54
Information Warfare

55
7. Need for Ethical
Hackers

Module 1
Need for Ethical Hackers

There is a hack attack every 39 seconds

The average cost of a data breach in 2020 will exceed $150 million

Companies have spend $2 trillion total in 2019

$6 trillion is expected to be spent globally on cybersecurity by 2021

Cybersecurity jobs worldwide will reach 3.5 million by 2021

57
Need for Ethical Hackers

Who will prevent wastage of this money?

Who will help developers fix their bugs in production?

Who will stop those black hats and their malicious activities to damage our
cyberspace?

Who will ensure security to the companies?

Who will ensure national security?

Who will help to keep the cyber space safe and clean? 58
Careers in Ethical
Hacking

Module 1
CAREERS IN HACKING?
60
1,000,000
Ethical Hackers would be needed by 2020 in India

61
5,80,000
Average Salary

2,50,000
For a beginner/Fresher

20,00,000+
For a professional
62
150,000$
Average Salary

80,000$
For a beginner/Fresher

250,000$
For a professional
63
PROFESSIONAL CERTIFICATIONS

64
TO BECOME AN ETHICAL HACKER?

Security
Certified Ethical Hacker (CEH)
Offensive Security Certified Professional (OSCP)
CompTIA Security+, Pentest+
GIAC Penetration Tester(GPEN)
Certified Information Systems Security Professional
(CISSP)
65
TO BECOME AN ETHICAL HACKER?

Networking
Cisco Certified Network Associate (CCNA)
CompTIA Network+
Cisco Certified Network Professional (CCNP)
Cisco Certified Internetwork Expert (CCIE)
AWS Certified Solutions Architect

66
CAREERS IN ETHICAL HACKING

67
IS HACKING ILLEGAL?
68
IS HACKING ILLEGAL?

Not always
Ethical Hacking is completely LEGAL
There is a huge need for ethical hackers
Hack systems, earn money

69
GENERAL TERMINOLOGIES

Vulnerability: A weakness that can be exploited


Threat: One who exploits a vulnerability
Risk: Damage caused by exploiting the vulnerability
Asset: Which needs to be accessed after exploitation
Bug: Error, fault or flaw in a computer program that may
cause unexpected behavior

78
79
GENERAL TERMINOLOGIES

Hacker: Gains access with or without malicious intent


Cracker: Gains access to damage assets and cause harm,
always malicious

80
GENERAL TERMINOLOGIES

Infosec: Information Security/Cyber Security/Data Security


Penetration Testing: Testing and reporting the security
loopholes
Vulnerability Assessment: Testing and reporting the
security loopholes, and tells how to fix them

81
GENERAL TERMINOLOGIES

Cyber Espionage: Spying on someone to gain illicit access


to confidential information (large institutions)
Exploits: Designed to cause unexpected behaviors that an
attacker can take advantage of to perform harmful actions
Script Kiddie: Newbies/noobs so called hackers without any
skills
Zero-day: Vulnerability not known to professionals only to
be exploited by hackers
82
TO BECOME AN ETHICAL
HACKER?
83
THE PROCESS IS EASY

Learn Code Apply

84
TO BECOME AN ETHICAL HACKER?

Programming is important!
mindset
Be verbose
Logical thinking
learn it all, but know it all

85
TO BECOME AN ETHICAL HACKER?

Computer Basics: Hardware, Software, processing


methodology
Web and Internet: HTTP, DNS, Web Servers, FTP, SMTP
Networking: TCP/IP, ARP, Devices, types, Routing and
Switching
Operating Systems: Linux (Kali, Parrot, Red Hat), Windows,
Android, iOS, MAC
86
TO BECOME AN ETHICAL HACKER?

Programming:
Reverse Engineering- Assembly, C, C++
Script Writing- Python, Ruby, Perl
Web App Testing- JavaScript, PHP, SQL, JSP, Python
Shell Scripting- Bash

87
TO BECOME AN ETHICAL HACKER?

OWASP Top 10
GitHub
Bug Bounty Programs
Hacking Forums
Stack
Soft Skills
PRACTICE, PRACTICE AND PRACTICE 88
HACKING
Is an art, practised through a creative mind.

89
THANKS!
Any questions?

90

You might also like