You are on page 1of 14

WELCOME

ETHICAL
HACKING
By
MadhaN Raj

WHAT IS SECURITY

Securityis the degree of resistance to, or


protectionfrom,harm.

It is the state of being free from danger or


threat.

Difference Between Security and Protection


Security and protection are extremely
closeconceptsthoughnotsame.
Securitymeasuresareadoptedtoincrease
thelevelofprotection
The feeling of protection arises when one
hasenoughsecuritymeasures
Security is a type of protection against
externalthreats.

Overview of Hacking
Hack

Examinesomethingveryminutely
Therapidcraftingofnewprogramorthemaking
of changes to existing, usually complicated
software

Hacker

Thepersonwhohacks

Cracker

Systemintruder/destroyer

History Of Hacking
The first hacker was appeared in 1960s at the
MassachusettsInstituteOfTechnology(MIT)
During the 1970s, a different kind of hacker
appeared:PhonePhreakerorPhoneHacker

In the 1980s, phreaks started to migrate to


computers,andthefirstBulletinBoardSystem(BBS)
appeared

During the 1990s, when the use of internet


widespreadaroundtheworld,hackersmultiplied

Hacker and Ethical Hacker


Hacker
Access computer system or network without
authorization
Breaksthelaw

EthicalHacker
Performsmostofthesameactivitiesbutwithowners
permission
EmployedbycompaniestoperformPenetrationTests

Types of Hacker
White Hat Hacker

Goodguys
Dontusetheirskillforillegalpurpose
Computer security experts and help to protect from
BlackHats.

Black Hat Hacker

Badguys
Usetheirskillmaliciouslyforpersonalgain
Hackbanks,stealcreditcardsanddefacewebsites

Grey Hat Hacker

ItisacombinationofWhitehatnBlackHatHackers
Goal of grey hat hackers is to provide national
security

Hacking Process
Footprinting

Escalating Privilege,
Covering Tracks and
Creating Backdoors

Attack and Gaining


Access

Scanning

Enumeration

Some Tools
Footprinting

Scanning

Enumeration

Whois,ping
Traceroot,nslookup

nmap
nessus
Netcat.tcpdump
Telnet,firewalk

Some Famous Hacker

Ian Murphy

Kevin Mitnick

Johan Helsinguis

Linus Torvald

Mark Abene

Robert Morris

Recent news of Hacking


Nextgenerationpatchmanagementtoolreleased-SecuniaCSI7.0
AnonymitytoolTORgainsmorethan1.2millionuserssinceNSA
PRISMScandal
Fear of NSA PRISM : Indian Government may ban US email
servicesforofficialCommunication
CISCO vulnerability allows remote attacker to take control of
WindowsSystem
NewYorkTimes.TwitterandHuffingtonPostDomainshijackedby
SyrianElectronicArmy
FBIusesAnonymousHackerstoattackforeignGovernments
PalestinianHacker,whohackedZuckerbergsFacebookAccountto
beawardedwith$12000

When solving
problems, dig at the
roots instead of just
hacking at the leaves.

ThankYou
ThankYou