hands on ethical hacking n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Hands-On Ethical Hacking PowerPoint Presentation
Download Presentation
Hands-On Ethical Hacking

Loading in 2 Seconds...

play fullscreen
1 / 33

Hands-On Ethical Hacking - PowerPoint PPT Presentation


  • 342 Views
  • Uploaded on

Hands-On Ethical Hacking. By- Shehab.najjar Shehab.najjar@gmail.com. HIGHLIGHTS . What is hacking? E-mail Hacking Desktop phishing Trojans & viruses System Hacking Case study Security Flashback. Ethical Hacking is testing the resources for a good cause and for the

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Hands-On Ethical Hacking' - tyson


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
hands on ethical hacking

Hands-On Ethical Hacking

By-

Shehab.najjar

Shehab.najjar@gmail.com

highlights

HIGHLIGHTS

What is hacking?

E-mail Hacking

Desktop phishing

Trojans & viruses

System Hacking

Case study

Security

Flashback

slide3

Ethical Hacking is testing the resources for a good cause and for the

  • betterment of technology.
  • Technically Ethical Hacking means penetration
  • testing which is focused on Securing and Protecting IT Systems.

What is Ethical Hacking??

is hacking a crime
Is hacking a crime??

NO NONO..

NOT AT ALL…….

Hacking is NOT a

CRIME

slide5

Hacker is a word that has two

meanings:

  • Traditionally, a Hacker is

someone who likes to play with

Software or Electronic Systems.

Hackers enjoy Exploring and

Learning how Computer systems

operate. They love discovering new

ways.

  • Recently, Hacker has taken on a

new meaning — someone who

maliciously breaks into systems for

personal gain. Technically, these

criminals & are known as Crackers.

H4ck3r

h4cking vs cr4cking
H4CKING VS CR4CKING

HACKING WITH MALICIOUS INTENTION IS CRACKING

The basic difference is hackers do not do anything disastrous.

Cracking yield more devastating results.

Cracking is crime.

Cyber crime are the results of cracking ,not hacking

h4ck3r
H4ck3r$

Famous hackers all over D world

Nahshon Even-Chaim (born May 1971), was the first major computer hacker

Stewert Nelson from America followed Nehshon in 1972

Ankit Phadia from India is also a well known name in hackers history

Abdur zahir from Pakistan has also a good name in this world

why ethical h4cking
Why Ethical H4cking!?

It is Legal

Permission is obtained from the target

Part of an overall security program

Identify vulnerabilities visible from Internet at

particular point of time

Ethical hackers possesses same skills, mindset

and tools of a hacker but the attacks are done in

a non-destructive manner

types of h4cker
Types of H4cker$

Distinction on the basis of knowladge

  • CODERS
  • ADMINS
  • SCRIPT KIDDIES

Distinction on the basis of LEGALITY

  • WHITE HATS
  • GREY HATS
  • BLACK HATS
cod3rs
COD3RS=

Have full knowladge.

They know what exactly they are doing

Well aware about the different codes

Have complete idea what is going beyond coding.

H4ck3r at work

admins
ADMINS

Knows what they are doing.

They don’t have idea that what exactly going beyond codes.

Result oriented persons

They are not so harmful.

script kiddies
SCRIPT KIDDIES

Script kiddies or packet monkeys

Young in-experienced hackers

Copy codes and techniques from knowledgeable hackers .

Don’t know what’s going beyond the coding.

Use techniques for fun purpose.

Sometimes could be very dangerous for the system,

white hats
WHITE HATS

These are good hackers .

Have genuine license to hack.

Have registered police records

Evolves themselves in good works

Generally owned by companies for security designing

Have high pay scales.

Generally these are coders

grey hats
GREY HATS

Also known as red hats.

Perform both tasks fair as well as unfair.

Generally these are admins.

Have little high pay than white hats.

Generally not so dangerous, but sometimes could be.

black hats
BLACK HATS

very dangerous persons.

Always have motive to earn huge profit.

Highly paid persons.

Evolves themselves mostly in criminal activities.

These could be coders, admins as well as script kiddies

e mail h4cking
E-mail H4cking

CAN BE DONE BY TWO WAYS:

Open Relay Server

Web Scripts

open relay server
Open Relay Server

An Open Mail Relay is an SMTP (Simple Mail Transfer Protocol)

server configured in such a way that it allows anyone on the

Internet to send Email through it, not just mail destined ‘To’ or

‘Originating’ from known users.

An Attacker can connect the Open Relay Server via Telnet and

instruct the server to send the Email.

Open Relay Email Server requires no password to send the

Email.

open relay server contd
Open Relay Server (CONTD..)

Some of Free Anonymous Email Websites are:

Mail.Anonymizer.name (Send attachments as well)

FakEmailer.net

FakEmailer.info

Deadfake.com

web scripts
Web Scripts

Some codes are used by the user to program a page that has same features.

Commonly .php is used to code the page.

Self needed items could be imparted

desktop phishing
Desktop Phishing

Fake page is created by the user.

The page looks like same as original page.

When user log-ins on that page , automatically as per coding the password of victim comes on attackers mail-id.

After that the original page is opened as fake page is linked with the original one.

Very useful for password cracking

Can be send via mail to the victim.

viruses
VIRUSES

These are programs that are used to infect the other programs.

A virus can easily penetrate in any program & could destroy it.

A virus can be send to the victim by fake mail.

Some common known viruses are

Trojan

The brain.

CIH virus

trojans
TROJANS

These area special type of program.

Generally could be termed as virus but actually they are not.

These are used to get external command over victims computer.

Once installed on a system, the

program then has system-level access

on the target system, where it can be

destructive and insidious.

They provide remote access of victims computer.

After installation of Trojan horse into computer any information can be obtained also any file could be deleted.

One of the commonly known Trojan horse is BEAST

worms
Worms

These are special type of viruses.

They don’t infect files.

They immediately delete those file which they do not understand.

If coding of particular file is into list then it will delete it.

system windows h4cking
System &windows H4cking

Windows User Account Architecture

User account passwords are contained in the SAM in the

Hexadecimal Format called Hashes.

Cracking admin password:

Passwords may be cracked Manually or with Automated tools

such as a Brute-force method or the Rainbow Table attack.

For the 2nd time remove the password by using following command

net user username *

Then type your own password.

case study
Case Study

44% of UK businesses suffered at least one malicious security breach in 2008.

The average cost was £30,000

Several cost more than £500,000.

Loss per year

case study contd
Case Study(contd..)

H4cking prone areas

case study contd1
Case Study(contd..)

H4cking growth rate

It is clear from the graph it is increasing day by day.

security counter measures
Security & Counter Measures

Use of anti-viruses.

Proper logout after use of mail id.

Manual opening browser

don't open spam.

Password protected admin account.

flashback
Flashback

HACKING IS USING AN AUTHORISE THING IN A UN AUTHORISED MANNER

HACKIING IS ILLEGAL BUT NOT A CRIME.

TYPES OF HACKERS.

VIRUSES ,WORMS & TROJANS.

ADMIN PASSWORD HACKING

slide32

REFERENCES

KYRION DIGITAL SECURITIES

FACEBOOK

WIKIPEDIA

GOOGLE

BING.COM

BLOGSPOT.COM

FRIENDS