SlideShare une entreprise Scribd logo
1  sur  149
Ethical Hacking   By Bharat Thakkar
Old School Hackers:  History of Hacking
Old School Hackers: History of Hacking  ,[object Object],[object Object],[object Object],[object Object]
Old School Hackers: History of Hacking  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Old School Hackers: History of Hacking  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Old School Hackers: History of Hacking  ,[object Object],[object Object],[object Object],[object Object]
Old School Hackers: History of Hacking  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Old School Hackers: History of Hacking  ,[object Object],[object Object],[object Object],[object Object]
A Brief History of Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Brief History of Hacking ,[object Object],[object Object],[object Object],[object Object]
Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis Mark Abene Linus Torvalds Robert Morris
Ethical Hacking
Hackers are here. Where are you?   ,[object Object],[object Object],[object Object]
What is Hacking ? ,[object Object],[object Object]
What is Cracking ,[object Object],[object Object]
Misunderstanding Hacking ,[object Object]
Why do People Hack or Crack ,[object Object],[object Object]
What is a Hacker? ,[object Object],[object Object]
What is a Hacker? ,[object Object],[object Object]
Hacker and Ethical hacker ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HACKER DEFINITIONS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Ethical Hacking?   ,[object Object],[object Object]
What is Ethical Hacking?   ,[object Object]
Who are Ethical Hackers?   ,[object Object],[object Object]
Who are Ethical Hackers?   ,[object Object],[object Object],[object Object]
What do Ethical Hackers do?   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What you can do legally as an ethical hacker
What You Can Do Legally ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Is Port Scanning Legal? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Laws ,[object Object],[object Object],[object Object],[object Object]
IT Act, 2000 ,[object Object],[object Object]
Objectives of the IT Act ,[object Object],[object Object],[object Object],[object Object]
Extent of application ,[object Object]
Cybercrime provisions under IT Act,2000   Offences & Relevant   Sections under IT  Act Tampering with Computer source documents  Sec.65 Hacking with Computer systems, Data alteration  Sec.66 Publishing obscene information  Sec.67 Un-authorized access to protected system  Sec.70  Breach of Confidentiality and Privacy  Sec.72 Publishing false digital signature certificates  Sec.73
TYPES OF CYBER CRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Crime against property Crime against Government Crime against persons
What you cannot do as an ethical hacker
What You Cannot Do Legally ,[object Object],[object Object],[object Object],[object Object],[object Object]
What You Cannot Do Legally ,[object Object],[object Object],[object Object],[object Object]
Learning Competencies
Required Skills of an Ethical Hacker ,[object Object],[object Object],[object Object],(Source:  http://www.examcram.com )
Required Skills of an Ethical Hacker ,[object Object],[object Object],[object Object],[object Object],(Source:  http://www.examcram.com )
Modes of Ethical Hacking   By Bharat Thakkar
Modes of Ethical Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],(Source:  http://www.examcram.com )
Anatomy of an Attack ,[object Object],[object Object],[object Object]
Anatomy of an Attack ,[object Object],[object Object]
Classes of Hackers ,[object Object],[object Object],[object Object]
Hactivism
Hactivism ,[object Object],[object Object]
Hactivism ,[object Object]
Hactivism ,[object Object]
Hactivism ,[object Object]
HACKER MOTIVATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TYPICAL HACKER ATTACKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some Statistics ,[object Object],[object Object],[object Object],[object Object]
How to Become a Hacker
How to Become a Hacker ,[object Object]
How to Become a Hacker ,[object Object]
Be Curious ,[object Object]
Read Everything in Sight ,[object Object]
Experiment ,[object Object]
Make Backups ,[object Object]
Don't Limit Yourself ,[object Object]
Don't Limit Yourself ,[object Object]
Get Some Real Tools ,[object Object]
Get Some Real Tools ,[object Object]
Learn to Program ,[object Object]
Learn to Program ,[object Object]
Learn to Program ,[object Object]
Learn to Type ,[object Object]
Use Real Operating Systems ,[object Object]
Talk to People ,[object Object]
Do Some Projects ,[object Object]
Learn to Really Use the Internet ,[object Object]
Learn to Really Use the Internet ,[object Object]
Ethical Hacking  How TO By Bharat Thakkar
How To ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hacking Tools:  Footprinting and Reconnaissance
What is FootPrinting ,[object Object]
What is FootPrinting ,[object Object]
What is FootPrinting ,[object Object]
Whois
Sam Spade
Nslookup
Traceroute
Hacking Tools:  Scanning and Enumeration
Scanning and Enumeration ,[object Object]
Scanning and Enumeration ,[object Object],[object Object]
Scanning and Enumeration ,[object Object]
Scanning and Enumeration ,[object Object],[object Object]
nmap
NMapWin
SuperScan
IP Scanner
Hyena
Retina
Hacking Tools:  System Hacking
System Hacking ,[object Object]
System Hacking ,[object Object]
System Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object]
telnet
Snadboy
Password Cracking with LOphtcrack
Keylogger
Hacking Tools:  Trojans and Backdoors
Trojans and Backdoors ,[object Object]
NetBus
Game Creates Backdoor for NetBus
SubSeven
Hacking Tools:  Sniffers
Sniffers ,[object Object],[object Object],[object Object]
Spoofing a MAC address Original Configuration
Spoofed Mac
Ethereal
Iris
Snort
Hacking Tools:  Web Based Password Cracking
Cain and Abel
Cain and Abel (Cont.)
Legion
Brutus
Hacking Tools:  Covering Tracks
ImageHide
ClearLogs
Hacking Tools:  Google Hacking and SQL Injection
Google Hacking
Google Cheat Sheet
SQL Injection ,[object Object],[object Object],[object Object],[object Object]
Common Database Query
Problem: Unvalidated Input
Piggybacking Queries with UNION
Phreaking
What is Phreaking ,[object Object]
Why Phreak ,[object Object]
Boxes and what they do ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Boxes and what they do ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Boxes and what they do ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Boxes and what they do ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hacker Challenge Websites
hackr http://www.hackr.org/mainpage.php
Hackthissite.org http://www.hackthissite.org
Hackits http://www.hackits.de/challenge/
Additional Web Sites
Legion of Ethical Hacking
Hacker Highschool http://www.hackerhighschool.org/
johnny.ihackstuff.com/
HappyHacker.org
Foundstone
Insecure.org
Thankyou Bharat Thakkar Email : bharatthakkar61@gmail.com Cell : +91-93769 22853 Cell : +91-90169 86926

Contenu connexe

Tendances

Tendances (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Similaire à Course on Ehtical Hacking - Introduction

Similaire à Course on Ehtical Hacking - Introduction (20)

Hacking
HackingHacking
Hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Hacking
HackingHacking
Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Chase Bank Hacking
Chase Bank HackingChase Bank Hacking
Chase Bank Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 

Dernier

Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 

Dernier (20)

Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 

Course on Ehtical Hacking - Introduction

Notes de l'éditeur

  1. In UK and Germany, Using or writing real hacking tools like Nessus, Metasploit, Hydra, Amap, John, other exploits are fairly telltale illegal Some people against this idea claim that “If you own a crow bar, a favored tool for breaking through locked doors, that’s fine. If you own a baseball bat, a wonderful tool which many put to use bashing in people’s skulls, that’s fine. Own a piece of software that can port scan, and you break the law.”
  2. - Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist . A hacktivist uses the same tools and techniques as a hacker , but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message on the home page of a Web site that gets a lot of traffic or which embodies a point-of-view that is being opposed. Or one might launch a denial-of-service attack to disrupt traffic to a particular site. A recent demonstration of hacktivism followed the death of a Chinese airman when his jet fighter collided with a U.S. surveillance plane in April 2001. Chinese and American hacktivists from both countries hacked Web sites and used them as "blackboards" for their statements. Whether hacktivism is a crime may be debated. Opponents argue that hacktivism causes damage in a forum where there is already ample opportunity for nondisruptive free speech. Others insist that such an act is the equivalent of a protest and is therefore protected as a form of free speech.