You are on page 1of 14

CEH

PENETRATION TESTING AND ETHICAL HACKING


ETHICS OF HACKING

• EC-council of COE.
TYPES OF HACKERS

Black Hat Hackers


White Hat Hackers
Gray Hat Hackers
Hacktivist
Suicidal Hacker
Script Kiddie
Cyber Terrorist
HACKING PHASES

• Reconnaissance or Footprinting
• Scanning
• Gaining Access
• Maintaining Access
• Clean Tracks
FOOTPRINTING

ACTIVE FOOTPRINTING PASSIVE FOOTPRINTING


SCANNING
GAINING ACCESS
MAINTAINING ACCESS
CLEANING TRACKS
SOME TERMINOLOGIES

• System Hacking • SQL injection and types


• Mobile Hacking • Vulnerability
• Social Engineering • Cryptography
• Phishing
NMAP

• Services
• Scanning a single IP
nmap 192.168.1.1
• Scanning a host
nmap www.xyz.com
PORT CHECKED IN FREE SCAN

21 – FTP 443 – SSL/TLS (HTTPS)


22 – SSH 445 – MICROSOFT (SMB)
23 – TELNET 3389 – REMOTE (RDP)
25 – SMTP
80 – HTTP
110 – MAIL (POP3)
143 – MAIL (IMAP)
WIRESHARK

It is a verification tool used to analyze


data from a different prespective, and to
customize tools for specific output results.
e.g., hping3 –su 192.168.92.131
This will show every things.
To verify result goto wireshark and type
Ip.dst = 192.168.92.131
THANK YOU

You might also like