You are on page 1of 8

ETHICAL HACKING

By:- Anuj Kumar Singh


Roll no:- 191220012
Content

 Recap
 Honeypot
 Data captured by a honeypot
 Types of honeypot
 Conclusion
Recap

 What is hacking
 Types of hacker
 Importance of an ethical hacker
 Basic Hacking Techniques
 Ways to protect ourselves from being hacked
Honeypot

 Act as a trap
 Generally hardware or software
 Honeypots are set up to understand the activity of
the attacker
 Honeypot system look like a genuine system to
the outside world
 Attack against honeypot looks successfull
Data captured by a honeypot
 Keystrokes entered and typed by the attacker
 IP address of the attacker
 The usernames and different privileges used by
the attackers
 The type of data that the attacker had accessed,
deleted or that was altered
Types of honeypot
Conclusion

 Effective tool for observing hacker movements


 Flexible tool with different application security
 Primary value in detection and information
gathering
 Good user interface
 Easy to configure
Thank you

You might also like