Вы находитесь на странице: 1из 66

By Dev Patel (Cute-Devil)

(B.C.A,CCSE,CISEH,CPT,DWD,Hard A+)
Total Data Breach Since 2013
Total Cyber Attack By Year
Total Loss In Cash In 12 Months
Report
99% Out of 100% Systems
Digital World Growth Past 12 Month
Hacker 'Favorite Target
Website And Server Hack By Islamic State
Live Attack In Real World
JoBs In ThIs FiElD
Growth In Job Posting
Salary By Job
15 Top-Paying Certifications
INTRODUCTION
TO
ETHICAL HACKING

By Dev Patel (Cute-Devil)


(B.C.A,CCSE,CISEH,CPT,DWD,Hard A+)
Hackers
What is Hacking ?

 Hacking is the art of finding solutions to


real life problems.
 The word “ Hack “ is not directly
related to computers.
Hacking and Computers

 The concept of hacking entered the


computer culture at the MIT University in
the 1960s.
 There are two kinds of students
1.Tools
2.Hackers
1. Tools

 A ``tool'' is someone who attends class in the


college regularly
 is always to be found in the library when no
class is meeting,
 Always Try to get Excellent grades in the
examination.
 Sole Aim: get placed in high paying Company
2. Hacker

 A ``hacker'' is the opposite: someone who


never goes to class,
 who in fact sleeps all day,
 and who spends the night pursuing
recreational activities rather than studying
text books.
What does this have to do with computers?
Originally, nothing.
Hackers vs Tools

 There are standards for success as a


hacker, just as grades form a standard
for success as a tool.
 Overall Hackers are more successful
in life and they emerge as a leader in
their field.
Computer Hackers

 Hackers are developers.


 Hackers are those geeks and scientists
who provide IT solutions to real life
problems.
 Hackers think beyond the boundaries
Hackers

 Development of Science <><> Hackers


Misconception

 What about those who break into


systems?
 Are they hacker?
 The answer is no.
Who is Responsible for
misconception

 Media is the root cause of all


this misconception.
 Lack of Awareness among common
students and people.
Crackers

 One who breaks into systems illegally


are crackers.
 They are bad guys or gals
Hacker vs Cracker

 Qualities of cracker Lots of knowledge Bad


ethics
Cyber criminals
 Three stages of Hacking any Remote
Computer
1. Planning and preparing the attack
2. Gathering information for the attack
3. Executing the attack
Preparing the attack

 Steps performed by a good hacker in this


stage:
1. Decide which computer they want to hack
2. Then they will find the IP address of the -
remote computer.
3. Find the exact geographical Location of
the computer.
4. Hide their own IP address and identity
on internet
Finding remote computer

 Lets say a Hacker decides to break into


the computer of one of his facebook
friends.
 Then his first step will be to find
the IP address of his friend
computer.
 So lets discuss what are the possible
ways of finding the IP address of any
remote computer.
Finding Remote Computer’s IP
Address

1. Sending the link of www.whatstheirip.com


2. Through Instant messaging software
3. Through IRC Chat
4. Through your website
MSN , Yahoo , g-talk
3. If you are chatting on other messengers like MSN, YAHOO etc. then the
following indirect connection exists between your system and your friend’s
system:

Your System------Chat Server---- Friend’s System

Friend’s System---------Chat Server------- Your System

Thus in this case, you first have to establish a direct connection with your
friend’s computer by either sending him a file or by using the call
feature.
Then, goto MSDOS or the command line and type:

C:\>netstat -n

This command will give you the IP Address of your friend’s computer.
Instant Messanger
1. Ask your friend to come online and chat with you.

2. Case I: If you are chatting on ICQ, then the following connection


exists between your system and your friend’s system:

Your System------DIRECT CONNECTION---- Friend’s System

Friend’s System---------DIRECT CONNECTION------- Your System

Now, goto MSDOS or the command line and type:

C:\>netstat -n

This command will give you the IP Address of your friend’s computer.
Getting IP from Website

 One can easily log the IP Addresses of all


visitors to their website by using simply
JAVA applets or JavaScript code.
 By using PHP scripts it is
possible to determine user’s O.S
and Browser’s.
 Same can be used to determine the
exact geographical location of
the visitors.
Counter Measures

 Do not accept File transfers or calls from


unknown people.

 Chat online ONLY after logging on through a Proxy


Server.

 Don’t click on any suspicious link.


Finding Exact Location

 Once you get the IP address of


Remote computer try to perform IP
lookup
 Popular sites for IP Look Up
 1. www.ipmango.com
 2. www.whois.com
Hiding your IP Address

 Proxy Servers: Definition:


A Proxy Server acts as a buffer between you and the Internet, hence it protects
your identity.

Working:

Case 1: Your System------Proxy Server---- Friend’s System

Case 2: Your System-----Proxy------Chat Server---- Friend’s


System

Good Proxy Servers:

 Wingate & WinProxy (For Windows Platform)


 Squid (For Unix Platforms)
Proxy Bouncing

Definition:

Proxy Bouncing is the phenomenon wherein you connect to several proxy


servers and then connect to the actual destination.

Working:

YOUR SYSTEM-------- PROXY 1--------- PROXY 2---------- PROXY 3


---------------- PROXY 4---------- PROXY 5---------- Destination

Tools:

 MultiProxy
Onion Routing: Using Tor
Network

 download it from
http://torproject.org
DOS
Commands

1.nslookup
2.net view
3.net use
4.net user
5.ping
6.tracert
7.arp
8.route
9.nbtstat
10.netstat
11.ipconfig
Ping

This command will allow you to know if


the host
you pinging is alive, which means if it is up
at the time of executing the “ping”
command
.
syntax :
ping www.thehackbook.com or
OBS: Keep in mind that if the host you
pinging is blocking ICMP packets, then the
result will be host down.
nslookup

This command has many


functionalities. One is for resolving
DNS into IP.

syntax:
nslookup www.thehackbook.com
tracert

 This command will give you the hops


that a packet will travel to reach its
final destination.
 OBS: This command is good to know
the route a packet takes before it
goes to the target box.
 CODE
tracert x.x.x.x (x is the IP address)
 or
 tracert www.thehackbook.com
arp

 Address Resolution Protocol


 This command will show you the arp
table. This is good to know if someone
is doing arp poisoning in your LAN.
comman
d arp -a
netstat

 This command will show you connection to


your box.
 CODE
netsta
t
or
 CODE
netstat -a (this will show you all the
listening ports and connection with DNS
names) netstat -n (this will show you all
the open connection with IP addresses)
netstat -an (this will combined both of
the above)
Gathering Information about
remote computer
 Recap of first step i.e. preparation of
attack
 Hiding the IP using proxy bouncing
 Tracing IP address using Neotrace, and
online databases, Visual Route.
 Now change your MAC address
before starting Information
Gathering step. software :-
MacAddressChanger
Information Gathering

 Typically during the information Gathering


step attacker aims to determine the
following information about the target
system.
1.Network Topology
2.List of open ports
3.List of services
4.Determine the operating system
5.User Information
Gathering Information

 It is Possible to gather all these information


using various techniques like
1.Network Reconnaissance
- Ping sweeping and Traceroute
2.Port Scanning
3.Daemon Banner Grabbing and
Port Enumeration
4.ICMP scanning
5.OS detection using OS Finger printing
6.Sniffing
Scanning Using nmap

 C:\program files\nmap>nmap –sP


thehackbook.com

nmap sends ICMP echo request to thehackbook


.com

 To Carry out UDP probing: C:\program


files\nmap>nmap –PU thehackbook.com
C:\program files\nmap>nmap –PN
thehackbook.com
OS Detection

 C:\program files\nmap>nmap
–O www.google.com
 C:\program files\nmap>nmap –A
www. google.com
 Os detection using websites: use PHP
script to detect visitors OS and browser
Executing the Attack

 DOS Attacks : Such an attack clogs up so


much bandwidth on the target system that it
cannot serve even legitimate users.
 ATTACKER-----Infinite/ Malicious Data-----
VICTIM
Target Network gets choked or cannot handle
the malicious data and hence crashes.

As a result, even legitimate clients/ people


cannot connect to the target network.
Types of DOS Attacks

1.Ping of Death
2.Teardrop attacks
3.SYN flood attacks
4.Land Attacks
5.Smurf Attacks
6.UDP flood Attacks
7.DDOS Attacks
8.Modem-disconnect
Attack
Trojan Attacks

 Trojans act as RATs or Remote


Administration Tools that allow remote
control and remote access to the
attacker.

Tools:

 Netbus, Girlfriend, Back Orrifice and


many others
Sniffers Attack
Definition:

Sniffers are tools that can capture all data packets being sent
across the entire network in the raw form.

Working: ATTACKER-----Uses sniffer for spying----- VICTIM

 Threats:

Password Stealing, IP Violation, Spying etc.

Tools:

 Tcpdump, Ethereal, Dsniff , wireshark and many more.


Social Networking Websites
Hacking
 There is no way to hack some one’s gmail
account, orkut account, Facebook account,
or yahoo account by breaking into servers.
 Generally there are two ways of hacking
these accounts
1.By finding the password of account
2. By resetting the password
There is no any other way of hacking
some one’s profile on social networking
websites.
Finding passwords

 Social Enginnering
 Password guessing
 Phishing attacks
 Key Loggers
 Sniffing attacks
 Man in the middle attack
 Tab Nabbing- Latest kind of phishing
attack
Phshing Attack

 Fake login
page: Demo.
 www.facebook.thehackbook.co
m
 www.gmail.thehackbook.com
Resetting the password

 It is possible for an attacker to find out


the answer of secret questions available
on gmail or yahoo account for password
resetting.
 Attacker can find it by means of
social engineering.
Recovering the deleted data

 When you delete a file , it first goes to the


recycle bin. After you empty the recycle bin,
then file still remains on the hard disk .
 Microsoft windows will only delete the link
between the operating system & the deleted
file.
 This means that the file will not be
accessible through windows & MS DOS.
 The file will still remains on the hard disk
and will be available until windows
overwrites it with a new file.
Email Forging

Definition:

Email Forging is the art of sending an


email from the victim’s email account
without knowing the password.

Working:

 ATTACKER-----Sends Forged email----- FROM


VICTIM
tHe cOuRcE OuTlInE
 01. Introduction to Ethical Hacking
 02. Footprinting and Reconnaissance
 03. Scanning Networks
 04. Enumeration
 05. System Hacking
 06. Malware Threats
 07. Sniffing
 08. Social Engineering
 09. Denial-of-Service
 10. Session Hijacking
 11. Hacking Web Servers
 12. Hacking Web Applications
 13. SQL Injection
 14. Hacking Wireless Networks
 15. Hacking Mobile Platforms
 16. Evading IDS, Firewalls, and Honeypots
 17. Cryptography
ThAnKs FoR CoMiNg

Вам также может понравиться