logging in or signing up Advance Ethical Hacking amrit12661 Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Copy Does not support media & animations WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 843 Category: Education License: All Rights Reserved Like it (1) Dislike it (0) Added: November 19, 2010 This Presentation is Public Favorites: 3 Presentation Description No description available. Comments Posting comment... Premium member Presentation Transcript ADVANCE ETHICAL HACKING AND NETWORKING : ADVANCE ETHICAL HACKING AND NETWORKING INTRODUCTION TO ETHICAL HACKING : INTRODUCTION TO ETHICAL HACKING An Ethical Hacker is an expert hired by a company to attempt to attack their network and computer system the same way a hacker would. Ethical Hackers use the same techniques and tactics as those used by illegal hackers to breach corporate security systems. Most people think of hacker as a computer vandals .But, call a real hacker a criminal and believe me ,he would do more than lose his temper .Hackers are not computer criminals .Why do most people think of hackers as criminals??The media is responsible for this erroneous assumption. How Does a Hacker Work??? : How Does a Hacker Work??? Data:-It is the collection of facts and figures. Information:-After processing data(such as formatting and printing), output data can again be perceived as information. Knowledge:-"Knowledge is of two kinds: we know a subject ourselves, or we know where we can find information upon it." Intelligence:-It is an umbrella term describing a property of the mind including related abilities, such as the capacities for abstract thought, understanding, communication, reasoning, learning, learning from past experiences, planning, and problem solving. The complexity increases from data to intelligence.it is easier to get data but quiet difficult to extract information from them and apply our intelligence upon them. DESKTOP AND SERVER SECURITY : DESKTOP AND SERVER SECURITY Window Security:- 1st level 2nd level 3rd level Registries:- The registry is the core of the operating system .If we mess with it, we may need to reinstall our operating system, so keep installing disk ready. But if we do conquer the registry, we can control the whole computer. Following are the five registries of any system HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_LOCAL_MACHINE HKEY_USER HKEYY_CURRENT_CONFIG Ports and Services Vulnerabilities in windows CORRECTIVE MEASURES MALWARES,LAN SECURITY,FIREWALL SECURITY : MALWARES,LAN SECURITY,FIREWALL SECURITY MALWARES:- Virus Worms Bot Logic bomb Spywares Trojans LAN security Removable media Floopy disk Email attachment Hacking MAC address Firewalls Packet filter Application gateway Circuit Proxy server INTERNET SECURITY : INTERNET SECURITY Finding an IP address Anonymous surfing Proxies server Email hacking Email tracing Email forging ATTACKING THE SYSTEM : ATTACKING THE SYSTEM Non technical attacks Shoulder behind attack Social engineering Pre-texting Phishing 2. Technical attack DOS attack(Denial of Service Attack) Ping of death attack Land attack SMURF attack Flood attack/DDOS attack Tear drop attack ART OF GOOGLING : ART OF GOOGLING Terminology Search engine Meta search engine 2. Basic search techniques 3. Advance search techniques The site The file type The link The cache The in title The inurl For searching any web page admin login we just use:- Inurl:adminlogin.asp or inurl:loginadmin.php etc In the same manner we use .mdb and .qls extension to find out database of any web site. CRYPTOGRAPHY : CRYPTOGRAPHY Goals Confidentiality Integrity Non-repudiation Authentication 2. Types of cryptography Secret key cryptography Public key cryptography 3. Digital signature 4. Steganography Basic of “Computer Networking” : Basic of “Computer Networking” 1.Types of networks based on physical scope:- Personal area network Local area network Home area network Campus network Wide area network Metropolitan area network 2.Models of computer networks:- OSI Model TCP/IP Model OSI MODEL : OSI MODEL TCP/IP PROTOCOL UNIT : TCP/IP PROTOCOL UNIT THANK YOU : THANK YOU Presented By:- Amrit Raj Ranjan Dept. Of Information Tech. 5th Sem. S.D.D.I.E.T You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.