Академический Документы
Профессиональный Документы
Культура Документы
Presented By:
MUKUL AGARWAL
MCA [LE]
TCA1305077
Powerpoint Templates
MAY
Page2014
1
CoNTENT
• Overview of Hacking
• Types of Hacker
• Why do Hackers hack ?
• Hacker’s Language
• Hackers’ language
• What is Ethical Hacking
• Why do we need Ethical Hacking
• Methodology of Ethical Hacking
• History of cryptography
• Ethical Hacking Tools
• Some Cases of Hacking
• Skills of an Ethical Hacker
• References
Powerpoint Templates
Page 2 2
oVERVIEW oF HACKING
• Hack
– the rapid crafting of a new program or the
making of changes to existing, usually
complicated software
• Hacker
– The person who hacks
• Cracker
– System destroyer
Powerpoint Templates
Page 3 3
TYPES oF HACKER
White Hat Hackers:
A White Hat who specializes in penetration testing and in
other testing methodologies to ensure the security of an
organization's information systems.
Black Hat Hackers:
A Black Hat is the villain or bad guy, especially in a western
movie in which such a character would wear a black hat in
contrast to the hero's white hat.
Gray Hat Hackers:
A Grey Hat, in the hacking community, refers to a skilled
hacker whose activities fall somewhere between white and
black hat hackers on a variety of spectra.
Powerpoint Templates
Page 4 3
WHY Do PEoPLE HACK
To make security stronger ( Ethical
Hacking )
Just for fun
Show off
Hack other systems secretly
Notify many people their thought
Steal important information
Destroy enemy’s computer network
during the war.
Powerpoint Templates
Page 5
HACKER’S LANGuAGE
1 -> i or l |\| -> n
3 -> e |\/| -> m
4 -> a s -> z
7 -> t z -> s
9 -> g f -> ph
0 -> o ph -> f
$ -> s x -> ck
| -> i or l ck -> x
Powerpoint Templates
Page 6
HACKER’S LANGuAGE TRANSLATIoN
• Ex:
– 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3
th1s wh3n 1 h4ck3d 1n
Powerpoint Templates
Page 7
What is Ethical hacking
• It is Legal
• Permission is obtained from the target
• Part of an overall security program
• Identify vulnerabilities visible from Internet at particular
point of time
• Ethical hackers possesses same skills, mindset and tools
of a hacker but the attacks are done in a non-destructive
manner
• Also Called – Attack & Penetration Testing
Powerpoint Templates
Page 8
Why Do WE nEED Ethical hacking
Social
Engineering
Automated
Organizational Attacks
Attacks
Restricted
Data
Accidental
Breaches in
Security Denial of
Viruses, Trojan Service (DoS)
Horses,
and Worms
Powerpoint Templates
Page 10
1. REconnaissancE
Powerpoint Templates
Page 11
2. scanning
Powerpoint Templates
Page 12
EnuMERation
Powerpoint Templates
Page 13
3. gaining accEss
Powerpoint Templates
Page 14
4. Maintaining access
Powerpoint Templates
Page 15
5. covering tracks
Powerpoint Templates
Page 16
History of cryptograpHy
• Cryptanalysis studies the process of breaking
encryption algorithms
• When a new encryption algorithm is
developed, cryptanalysts study it and try to
break it
– Or prove that it is impractical to break it
(taking much time and many resources)
Powerpoint Templates 17
Page 17
enigMa
• Used by the
Germans during
World War II
– Replaced letters
as they were
typed
– Substitutions
were computed
using a key and a
set of switches.
Powerpoint Templates 18
Page 18
steganograpHy
• The process of hiding data in plain view in
pictures, graphics, or text
– Example: changing colors slightly to
encode individual bits in an image
• The image on the left contains the image on
the right hidden in it.
Powerpoint Templates 19
Page 19
syMMetric cryptograpHy
algoritHMs
• Symmetric algorithms have one key that
encrypts and decrypts data
• Advantages
– Symmetric algorithms are fast
– They are difficult to break if a large key size
is used
– Only one key needed
Powerpoint Templates 20
Page 20
syMMetric cryptograpHy
• One key encrypts and decrypts data
Powerpoint Templates 21
Page 21
ETHICAL HACKING TOOLS
• Samspade
Samspade is a simple tool which provides us information
about a particular host. This tool is very much helpful in finding
the addresses, phone numbers etc
Powerpoint Templates
Page 22
SOmE CASES Of HACKING
• Sony - Around 77 million users of Sony’s Play station network
could have had their information stolen by hackers in April 2011.
• RSA Security - In March 2011, RSA Security was hacked when a
spoof email containing an infected Excel spread sheet tricked
employees into allowing hackers to access the system.
• InfraGard Atlanta - As an FBI partner, you would imagine
InfraGard Atlanta to have the most up-to-date Internet security
available. However, in June 2011 the company was hacked and
180 usernames and passwords were stolen.
• Gmail - The Gmail accounts of Chinese human activists were
hacked, suggesting that the Chinese government masterminded
this attack, especially because of the widespread restrictions within
the country.
Powerpoint Templates
Page 23
SKILLS Of AN ETHICAL HACKEr
• Routers - knowledge of routers, routing
protocols and access control lists.
• Microsoft - skills in operation ,
configuration and management.
• Linux - knowledge of Linux/Unix; security
setting, configuration, and services.
• Firewalls - configuration, & operation of
intrusion detection systems.
Powerpoint Templates
Page 24
rEfErENCES
en.wikipedia.org/
howstuffworks.com/
slideshare.net/
authorstream.com/
123seminarsonly.com/
Powerpoint Templates
Page 25 23
THANK YOU
Powerpoint Templates
Page 26