Advance Ethical Hacking

Views:
 
Category: Education
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

ADVANCE ETHICAL HACKING AND NETWORKING : 

ADVANCE ETHICAL HACKING AND NETWORKING

INTRODUCTION TO ETHICAL HACKING : 

INTRODUCTION TO ETHICAL HACKING An Ethical Hacker is an expert hired by a company to attempt to attack their network and computer system the same way a hacker would. Ethical Hackers use the same techniques and tactics as those used by illegal hackers to breach corporate security systems. Most people think of hacker as a computer vandals .But, call a real hacker a criminal and believe me ,he would do more than lose his temper .Hackers are not computer criminals .Why do most people think of hackers as criminals??The media is responsible for this erroneous assumption.

How Does a Hacker Work??? : 

How Does a Hacker Work??? Data:-It is the collection of facts and figures. Information:-After processing data(such as formatting and printing), output data can again be perceived as information. Knowledge:-"Knowledge is of two kinds: we know a subject ourselves, or we know where we can find information upon it." Intelligence:-It is an umbrella term describing a property of the mind including related abilities, such as the capacities for abstract thought, understanding, communication, reasoning, learning, learning from past experiences, planning, and problem solving. The complexity increases from data to intelligence.it is easier to get data but quiet difficult to extract information from them and apply our intelligence upon them.

DESKTOP AND SERVER SECURITY : 

DESKTOP AND SERVER SECURITY Window Security:- 1st level 2nd level 3rd level Registries:- The registry is the core of the operating system .If we mess with it, we may need to reinstall our operating system, so keep installing disk ready. But if we do conquer the registry, we can control the whole computer. Following are the five registries of any system HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_LOCAL_MACHINE HKEY_USER HKEYY_CURRENT_CONFIG Ports and Services Vulnerabilities in windows CORRECTIVE MEASURES

MALWARES,LAN SECURITY,FIREWALL SECURITY : 

MALWARES,LAN SECURITY,FIREWALL SECURITY MALWARES:- Virus Worms Bot Logic bomb Spywares Trojans LAN security Removable media Floopy disk Email attachment Hacking MAC address Firewalls Packet filter Application gateway Circuit Proxy server

INTERNET SECURITY : 

INTERNET SECURITY Finding an IP address Anonymous surfing Proxies server Email hacking Email tracing Email forging

ATTACKING THE SYSTEM : 

ATTACKING THE SYSTEM Non technical attacks Shoulder behind attack Social engineering Pre-texting Phishing 2. Technical attack DOS attack(Denial of Service Attack) Ping of death attack Land attack SMURF attack Flood attack/DDOS attack Tear drop attack

ART OF GOOGLING : 

ART OF GOOGLING Terminology Search engine Meta search engine 2. Basic search techniques 3. Advance search techniques The site The file type The link The cache The in title The inurl For searching any web page admin login we just use:- Inurl:adminlogin.asp or inurl:loginadmin.php etc In the same manner we use .mdb and .qls extension to find out database of any web site.

CRYPTOGRAPHY : 

CRYPTOGRAPHY Goals Confidentiality Integrity Non-repudiation Authentication 2. Types of cryptography Secret key cryptography Public key cryptography 3. Digital signature 4. Steganography

Basic of “Computer Networking” : 

Basic of “Computer Networking” 1.Types of networks based on physical scope:- Personal area network Local area network Home area network Campus network Wide area network Metropolitan area network 2.Models of computer networks:- OSI Model TCP/IP Model

OSI MODEL : 

OSI MODEL

TCP/IP PROTOCOL UNIT : 

TCP/IP PROTOCOL UNIT

THANK YOU : 

THANK YOU Presented By:- Amrit Raj Ranjan Dept. Of Information Tech. 5th Sem. S.D.D.I.E.T

authorStream Live Help