1 / 28

ECCouncil : 312-50v8 - Certified Ethical Hacker v8

Get all the program details for EC-Council's Certified Ethical Hacking program.http://www.passiteasy.com/eccouncil/312-50v8-exam-quesions-dumps.html

Shamoon
Download Presentation

ECCouncil : 312-50v8 - Certified Ethical Hacker v8

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ETHICAL HACKING

  2. http://www.passiteasy.com/eccouncil/312-50v8-exam-quesions-dumps.htmlhttp://www.passiteasy.com/eccouncil/312-50v8-exam-quesions-dumps.html

  3. http://www.passiteasy.com/eccouncil/312-50v8-exam-quesions-dumps.htmlhttp://www.passiteasy.com/eccouncil/312-50v8-exam-quesions-dumps.html

  4. HACKER

  5. CONTENT • Overview of Hacking • Why do hackers hack? • Types of Hacker • Level of Hackers • Hackers language • Ethical Hacking – Process • How can protect the system? • What should do after hacked? • Final words

  6. OVERVIEW OF HACKING • It is Legal • Permission is obtained from the target • Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner • Also Called – Attack & Penetration Testing.

  7. HACKING VS CRACKING • Hacker • The person who hack • Cracker • System intruder/destroyer • HACKING WITH MALICIOUS INTENTION IS CRACKING • The basic difference is hackers do not do anything disastrous. • Cracking yield more devastating results. • Cracking is crime. • Cyber crime are the results of cracking ,not hacking

  8. THE GREAT HACKER WAR • Kevin Mitnick The most famous, and undoubtedly most gifted hacker in history, made a name for himself in 1981 at the tender age of 17 by getting into a phone exchange, which allowed him to redirect subscriber calls in any way he wanted. In 1983, he achieved his first major coup - and also his first arrest - when he accessed a Pentagon computer. It was his repeated offenses that made him a target of the FBI. He was sentenced to five years in prison in the 1990s, but today he is a security consultant and owns his own company: Mitnick Security. • John Draper known as "Cap'n Crunch", Draper was one of the first hackers in history. This moniker comes from the cereal of the same name, inside of which he once discovered a toy whistle (provided as a gift to entice children to ask parents for the cereal). He discovered that he could use the whistle to hack a telephone line and get free phone calls - all that was necessary was to produce a precise tone in the receiver for the method to work. He was arrested in 1976 and sentenced to two months in prison. • Kevin Poulsen :-The current editor-in-chief of Wired was formerly known for rather different activities. In 1983, when he too was only 17 years old, he made his first intrusions into different networks, resulting in a few run-ins with the US legal system. He continued with his illegal activities until his arrest by the FBI in April 1991. In 1994 he was sentenced to four years in prison. • Adrian LamoLamo has certainly driven the highest number of network administrators insane. From Microsoft to Yahoo!, going through Sun Microsystems, MacDonald's, Cingular, AOL or even the New York Times, he is credited with all types of intrusions and corporate security system violations. He has bypassed protections with disconcerting simplicity: during a broadcast of the NBC Nightly News, the host asked him to prove his talents in front of the camera, and he responded by gaining access to the company's internal network in less than five minutes. Today he is an expert in security and enjoys full freedom of movement, after being under the surveillance of US authorities for many years.

  9. Why do people hack?? • To make security stronger ( Ethical Hacking ) • Just for fun • Show off • Hack other systems secretly & Steal important information

  10. What are the various qualities a hacker should posses • Good coder • well knowledgeable person both hard ware as well as soft ware • Should have knowledge on security system • Trusted person

  11. Types of hacker

  12. Label of hacker

  13. Hackers language 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or |\| -> n |\/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x

  14. Hackers language translation EXAMPLE:- Hacking is good H4ck||\|g 1$ 900d

  15. Hacking - Process • Foot Printing • Scanning • Gaining Access • Maintaining Access

  16. Foot Printing • Whois Lookup • NS lookup • IP Lookup

  17. Scanning • Port scanning • Network scanning • Finger Printing • Fire walking

  18. Scanning

  19. Gaining access • Password Attacks • Social Engineering • Viruses

  20. Maintaining access • Os BackDoors • Trojans • Clearing tracks

  21. Advantages & Disadvantages Advantages • Provides security to banking and financial establishments • Prevents website defacements • An evolving technique • To catch a thief you have to think like a thief Disadvantages • All depends upon the trustworthiness of the ethical hacker • Hiring professionals is expensive.

  22. How can we protect the system? • Patch security hole often • Encrypt important data • Ex) pgp, ssh • Do not run unused daemon • Remove unused program • Setup loghost • Backup the system often • Setup firewall • Setup IDS • Ex) snort

  23. What should do after hacked? • Shutdown the system • Or turn off the system • Separate the system from network • Restore the system with the backup • Or reinstall all programs • Connect the system to the network

  24. H4cking prone areas

  25. Hacking GROWTH RATE It is clear from the graph it is increasing day by day.

  26. Please give your suggestions and feedbacksAny question ?

  27. THANK YOU

  28. http://www.passiteasy.com/eccouncil/312-50v8-exam-quesions-dumps.htmlhttp://www.passiteasy.com/eccouncil/312-50v8-exam-quesions-dumps.html

More Related