Seminar
On
Ethical Hacking
Introduction
Ethical hacking also known as penetration testing or
white-hat hacking, involves the same tools, tricks, and
techniques that hackers use, but with one major difference
that Ethical hacking is legal.
Ethical hacking, is legally breaking into computers and
devices to test an organization's defenses.
Independent computer security Professionals breaking into the
computer systems.
Neither damage the target systems nor steal information.
Evaluate target systems security and report back to owners
about the vulnerabilities found.
Hackers
A person who enjoys learning details of a
programming language or system
A person who enjoys actually doing the
programming rather than just theorizing about it
A person capable of appreciating someone else's
hacking
A person who picks up programming quickly
A person who is an expert at a particular programming
language or system
Types of Hackers
Black hats
• Individuals with Extraordinary computing Skills,
resorting to malicious Or destructive activities. Also
known as ‘Crackers.’
White Hats
• Individuals professing Hacker skills and using Them
for defensive Purposes. Also known as ‘Security
Analysts’.
Grey Hats
• Individuals who work both Offensively and
defensively At various times.
Hacking Process
1.Reconnaissance –It is the principal stage where the
Hacker attempts to gather data about the objective. It
incorporates Identifying the Target, discovering the
objective’s IP Address Range, Network, and so on.
2.Scanning –In this stage, the hacker starts to
effectively test an objective machine or organization
for weaknesses that can be abused.
3.Gaining Access –In this stage, the hacker plans the
outline of the organization of the objective with the
assistance of information gathered during observation
and checking.
Hacking Process
4.Maintaining Access –It is the interaction where the
hacker has effectively gotten entrance into a
framework.
5.Clearing Tracks –This process is basically an
unethical activity.
6.Reporting –It is the last step of finishing the ethical
hacking process. In this the Ethical
Hacker aggregates a report with his discoveries and the
work that was done,
for example-weaknesses found.
Why Do We Need Ethical Hacking
Protection from possible External Attacks
Social
Engineering
Automated
Organizational Attacks
Attacks
Restricted
Data
Accidental Breaches
in Security
Denial of
Viruses, Trojan Service (DoS)
Horses,
and Worms
Required Skills of an Ethical
Hacker….
Computer expert adept at Technical domains.
In-depth knowledge about Target platforms (such as
Windows, Unix, Linux).
Exemplary knowledge in Networking and related
Hardware / software.
Knowledgeable about Security areas and related Issues
– though not
Necessarily a security Professional
Advantages
“To catch a thief you have to think like a thief”
This helps to fight against cyber terrorism and to fight against
national security breaches.
This helps to build a system that prevents any kinds of
penetration by hackers.
This offers security to banking and financial establishments.
Disadvantages
All depends upon the trustworthiness of the ethical hacker.
Hiring professionals is expensive.
Future Enhancements
As it an evolving branch the scope of enhancement in
technology is immense.
No ethical hacker can ensure the system security by using the
same technique repeatedly.
More enhanced software’s should be used for optimum
protection.
Conclusion
One of the main aim of the seminar is to make others
understand that there are so many tools through which a
hacker can get into a system.
Now we can see what can we do against hacking or to protect
ourselves from hacking.
The first thing we should do is to keep ourselves updated
about those software’s we and using for official and reliable
sources.
Thank You