際際滷

際際滷Share a Scribd company logo
Ethical Hacking
Pratheeba Murugesan
HACKER
AENDA
 What is Ethical Hacking?
 Who are ethical hackers?
 Every Website-A Target
 Get out of jail free card
 Kinds of Testing
 Final Report
Ethical Hacking
 Independent computer security
Professionals breaking into the
computer systems.
 Neither damage the target
systems nor steal information.
 Evaluate target systems security
and report back to owners about
the vulnerabilities found.
Ethical Hackers but not Criminal
Hackers
 Completely trustworthy.
 Strong programming and computer
networking skills.
 Learn about the system and trying to
find its weaknesses.
 Techniques of Criminal hackers-
Detection-Prevention.
 Published research papers or released
security software.
 No Ex-hackers.
Being Prepared
 What can an intruder see on the target systems?
 What can an intruder do with that information?
 Does anyone at the target notice the intruder's
attempts or successes?
1. What are you trying to protect?
2. Who are you trying to protect against?
3. How much time, effort, and money are you willing to
expend to obtain adequate protection?
Get out of Jail free card
 Security evaluation plan
1. Identify system to be tested
2. How to test?
3. Limitations on that testing
 Evaluation done under a no-holds-
barred approach.
 Clients should be aware of risks.
 Limit prior knowledge of test.
Kinds of Testing
 Remote Network
 Remote dial-up network
 Local network
 Stolen laptop computer
 Social engineering
 Physical entry
1.Total outsider
2.Semi-outsider
3.Valid user
Final Report
 Collection of all discoveries made during
evaluation.
 Specific advice on how to close the
vulnerabilities.
 Testers techniques never revealed.
 Delivered directly to an officer of the client
organization in hard-copy form.
 Steps to be followed by clients in future.
Suggestions?

More Related Content

What's hot (20)

Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
Harshit Upadhyay
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rajan Chhangani
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rajan Chhangani
hacking
hackinghacking
hacking
mayank1293
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ganesh Vadulekar
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of Hacking
Divy Singh Rathore
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Mukul Agarwal
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
justyogesh
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
SVishnupriya5
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Edureka!
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Kunal Gawade, CFE
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
kawsarahmedchoudhuryzzz
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
DEEPIKA WALIA
Career in Ethical Hacking
Career in Ethical Hacking Career in Ethical Hacking
Career in Ethical Hacking
neosphere
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
Jayanth Vinay
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of Hacking
Divy Singh Rathore
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
justyogesh
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Edureka!
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
Career in Ethical Hacking
Career in Ethical Hacking Career in Ethical Hacking
Career in Ethical Hacking
neosphere
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
Jayanth Vinay
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks

Similar to Ethical hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Greater Noida Institute Of Technology
Ethical hacking ppt_presentation_way2project_in
Ethical hacking ppt_presentation_way2project_inEthical hacking ppt_presentation_way2project_in
Ethical hacking ppt_presentation_way2project_in
muhamedwaseem09
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Being Uniq Sonu
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Shubham Garg
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
amrutharam
Ethical Hacking&Contermeasures
Ethical Hacking&ContermeasuresEthical Hacking&Contermeasures
Ethical Hacking&Contermeasures
arvind34
E thical hacking
E thical hackingE thical hacking
E thical hacking
Cookie Tuazon
Ethical Hacking, Introduction
Ethical Hacking, IntroductionEthical Hacking, Introduction
Ethical Hacking, Introduction
Rahul Nath
Ethical Hacking - An Overview
Ethical Hacking - An OverviewEthical Hacking - An Overview
Ethical Hacking - An Overview
Afaq Mansoor Khan
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
Bilal Hameed
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
kunalverma12345
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
ankit gandharkar
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
Aakash Takale
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]
SiddheshPowar
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
Pankaj Dubey
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
HarishBabuKaveri
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
DeepHaria4
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
Ethical Hacking.pptx Hacker Presentation
Ethical  Hacking.pptx Hacker PresentationEthical  Hacking.pptx Hacker Presentation
Ethical Hacking.pptx Hacker Presentation
sahilhussain2006bth
Ethical hacking ppt_presentation_way2project_in
Ethical hacking ppt_presentation_way2project_inEthical hacking ppt_presentation_way2project_in
Ethical hacking ppt_presentation_way2project_in
muhamedwaseem09
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Shubham Garg
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
amrutharam
Ethical Hacking&Contermeasures
Ethical Hacking&ContermeasuresEthical Hacking&Contermeasures
Ethical Hacking&Contermeasures
arvind34
Ethical Hacking, Introduction
Ethical Hacking, IntroductionEthical Hacking, Introduction
Ethical Hacking, Introduction
Rahul Nath
Ethical Hacking - An Overview
Ethical Hacking - An OverviewEthical Hacking - An Overview
Ethical Hacking - An Overview
Afaq Mansoor Khan
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
Bilal Hameed
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
kunalverma12345
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
ankit gandharkar
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
Aakash Takale
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]
SiddheshPowar
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
Pankaj Dubey
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
DeepHaria4
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
Ethical Hacking.pptx Hacker Presentation
Ethical  Hacking.pptx Hacker PresentationEthical  Hacking.pptx Hacker Presentation
Ethical Hacking.pptx Hacker Presentation
sahilhussain2006bth

Recently uploaded (20)

Lets make Cycling Smarter and Safer.pptx
Lets make Cycling Smarter and Safer.pptxLets make Cycling Smarter and Safer.pptx
Lets make Cycling Smarter and Safer.pptx
hapax77239
ODOO Development Company 1 pdf.pdf
ODOO Development Company     1   pdf.pdfODOO Development Company     1   pdf.pdf
ODOO Development Company 1 pdf.pdf
dela33martin33
Expert Odoo Support Services .pdf
Expert Odoo Support Services         .pdfExpert Odoo Support Services         .pdf
Expert Odoo Support Services .pdf
dela33martin33
The Best Streaming Services for Documentaries and Educational Content.pdf
The Best Streaming Services for Documentaries and Educational Content.pdfThe Best Streaming Services for Documentaries and Educational Content.pdf
The Best Streaming Services for Documentaries and Educational Content.pdf
Internet Bundle Now
15 Premium WordPress Plugins You Need to Know About
15 Premium WordPress Plugins You Need to Know About15 Premium WordPress Plugins You Need to Know About
15 Premium WordPress Plugins You Need to Know About
abu noim md toha
Cybersecurity Compliance Consulting | Ensure Regulatory Readiness
Cybersecurity Compliance Consulting | Ensure Regulatory ReadinessCybersecurity Compliance Consulting | Ensure Regulatory Readiness
Cybersecurity Compliance Consulting | Ensure Regulatory Readiness
privaxic
the impact of social media on mental health.pptx
the impact of social media on mental health.pptxthe impact of social media on mental health.pptx
the impact of social media on mental health.pptx
BeastD1
Epochalypse 2038 - Remediating the 32-bit Timestamp Risk at Global Scale (Pub...
Epochalypse 2038 - Remediating the 32-bit Timestamp Risk at Global Scale (Pub...Epochalypse 2038 - Remediating the 32-bit Timestamp Risk at Global Scale (Pub...
Epochalypse 2038 - Remediating the 32-bit Timestamp Risk at Global Scale (Pub...
treyka
Hire Odoo Developers .pdf
Hire  Odoo Developers                .pdfHire  Odoo Developers                .pdf
Hire Odoo Developers .pdf
dela33martin33
Incident Command for IT Professionals and Their Teams
Incident Command for IT Professionals and Their TeamsIncident Command for IT Professionals and Their Teams
Incident Command for IT Professionals and Their Teams
mentattechnologyente
Recipes: It's About Time | DrupalCon Atlanta 2025
Recipes: It's About Time | DrupalCon Atlanta 2025Recipes: It's About Time | DrupalCon Atlanta 2025
Recipes: It's About Time | DrupalCon Atlanta 2025
Martin Anderson-Clutz
Microsoft Azure: Empowering the Future of Cloud Technology
Microsoft Azure: Empowering the Future of Cloud TechnologyMicrosoft Azure: Empowering the Future of Cloud Technology
Microsoft Azure: Empowering the Future of Cloud Technology
cyberpoint678
Chapter-2-NSA_Network System Administration.pdf
Chapter-2-NSA_Network System Administration.pdfChapter-2-NSA_Network System Administration.pdf
Chapter-2-NSA_Network System Administration.pdf
AssefaSen
Dell EMC Club SE Unity estrategia y negocio
Dell EMC Club SE Unity estrategia y negocioDell EMC Club SE Unity estrategia y negocio
Dell EMC Club SE Unity estrategia y negocio
Fernando564134
Electrical Control Panels for Water Treatment Plants_ Controlling Water Flow ...
Electrical Control Panels for Water Treatment Plants_ Controlling Water Flow ...Electrical Control Panels for Water Treatment Plants_ Controlling Water Flow ...
Electrical Control Panels for Water Treatment Plants_ Controlling Water Flow ...
Balaji Switchgears
Odoo Customization Services .pdf
Odoo Customization Services         .pdfOdoo Customization Services         .pdf
Odoo Customization Services .pdf
dela33martin33
DB.pptx data base HNS level III 2017 yearx
DB.pptx data base HNS level III 2017 yearxDB.pptx data base HNS level III 2017 yearx
DB.pptx data base HNS level III 2017 yearx
kebimesay23
Exploring the Warhammer 40k Universe.pdf
Exploring the Warhammer 40k Universe.pdfExploring the Warhammer 40k Universe.pdf
Exploring the Warhammer 40k Universe.pdf
davidwarren322002
Odoo Service Provider .pdf
Odoo Service Provider               .pdfOdoo Service Provider               .pdf
Odoo Service Provider .pdf
dela33martin33
PresentWEFWEFWERWERWERWERREWREWation.pptx
PresentWEFWEFWERWERWERWERREWREWation.pptxPresentWEFWEFWERWERWERWERREWREWation.pptx
PresentWEFWEFWERWERWERWERREWREWation.pptx
toxicsuprit
Lets make Cycling Smarter and Safer.pptx
Lets make Cycling Smarter and Safer.pptxLets make Cycling Smarter and Safer.pptx
Lets make Cycling Smarter and Safer.pptx
hapax77239
ODOO Development Company 1 pdf.pdf
ODOO Development Company     1   pdf.pdfODOO Development Company     1   pdf.pdf
ODOO Development Company 1 pdf.pdf
dela33martin33
Expert Odoo Support Services .pdf
Expert Odoo Support Services         .pdfExpert Odoo Support Services         .pdf
Expert Odoo Support Services .pdf
dela33martin33
The Best Streaming Services for Documentaries and Educational Content.pdf
The Best Streaming Services for Documentaries and Educational Content.pdfThe Best Streaming Services for Documentaries and Educational Content.pdf
The Best Streaming Services for Documentaries and Educational Content.pdf
Internet Bundle Now
15 Premium WordPress Plugins You Need to Know About
15 Premium WordPress Plugins You Need to Know About15 Premium WordPress Plugins You Need to Know About
15 Premium WordPress Plugins You Need to Know About
abu noim md toha
Cybersecurity Compliance Consulting | Ensure Regulatory Readiness
Cybersecurity Compliance Consulting | Ensure Regulatory ReadinessCybersecurity Compliance Consulting | Ensure Regulatory Readiness
Cybersecurity Compliance Consulting | Ensure Regulatory Readiness
privaxic
the impact of social media on mental health.pptx
the impact of social media on mental health.pptxthe impact of social media on mental health.pptx
the impact of social media on mental health.pptx
BeastD1
Epochalypse 2038 - Remediating the 32-bit Timestamp Risk at Global Scale (Pub...
Epochalypse 2038 - Remediating the 32-bit Timestamp Risk at Global Scale (Pub...Epochalypse 2038 - Remediating the 32-bit Timestamp Risk at Global Scale (Pub...
Epochalypse 2038 - Remediating the 32-bit Timestamp Risk at Global Scale (Pub...
treyka
Hire Odoo Developers .pdf
Hire  Odoo Developers                .pdfHire  Odoo Developers                .pdf
Hire Odoo Developers .pdf
dela33martin33
Incident Command for IT Professionals and Their Teams
Incident Command for IT Professionals and Their TeamsIncident Command for IT Professionals and Their Teams
Incident Command for IT Professionals and Their Teams
mentattechnologyente
Recipes: It's About Time | DrupalCon Atlanta 2025
Recipes: It's About Time | DrupalCon Atlanta 2025Recipes: It's About Time | DrupalCon Atlanta 2025
Recipes: It's About Time | DrupalCon Atlanta 2025
Martin Anderson-Clutz
Microsoft Azure: Empowering the Future of Cloud Technology
Microsoft Azure: Empowering the Future of Cloud TechnologyMicrosoft Azure: Empowering the Future of Cloud Technology
Microsoft Azure: Empowering the Future of Cloud Technology
cyberpoint678
Chapter-2-NSA_Network System Administration.pdf
Chapter-2-NSA_Network System Administration.pdfChapter-2-NSA_Network System Administration.pdf
Chapter-2-NSA_Network System Administration.pdf
AssefaSen
Dell EMC Club SE Unity estrategia y negocio
Dell EMC Club SE Unity estrategia y negocioDell EMC Club SE Unity estrategia y negocio
Dell EMC Club SE Unity estrategia y negocio
Fernando564134
Electrical Control Panels for Water Treatment Plants_ Controlling Water Flow ...
Electrical Control Panels for Water Treatment Plants_ Controlling Water Flow ...Electrical Control Panels for Water Treatment Plants_ Controlling Water Flow ...
Electrical Control Panels for Water Treatment Plants_ Controlling Water Flow ...
Balaji Switchgears
Odoo Customization Services .pdf
Odoo Customization Services         .pdfOdoo Customization Services         .pdf
Odoo Customization Services .pdf
dela33martin33
DB.pptx data base HNS level III 2017 yearx
DB.pptx data base HNS level III 2017 yearxDB.pptx data base HNS level III 2017 yearx
DB.pptx data base HNS level III 2017 yearx
kebimesay23
Exploring the Warhammer 40k Universe.pdf
Exploring the Warhammer 40k Universe.pdfExploring the Warhammer 40k Universe.pdf
Exploring the Warhammer 40k Universe.pdf
davidwarren322002
Odoo Service Provider .pdf
Odoo Service Provider               .pdfOdoo Service Provider               .pdf
Odoo Service Provider .pdf
dela33martin33
PresentWEFWEFWERWERWERWERREWREWation.pptx
PresentWEFWEFWERWERWERWERREWREWation.pptxPresentWEFWEFWERWERWERWERREWREWation.pptx
PresentWEFWEFWERWERWERWERREWREWation.pptx
toxicsuprit

Ethical hacking

  • 3. AENDA What is Ethical Hacking? Who are ethical hackers? Every Website-A Target Get out of jail free card Kinds of Testing Final Report
  • 4. Ethical Hacking Independent computer security Professionals breaking into the computer systems. Neither damage the target systems nor steal information. Evaluate target systems security and report back to owners about the vulnerabilities found.
  • 5. Ethical Hackers but not Criminal Hackers Completely trustworthy. Strong programming and computer networking skills. Learn about the system and trying to find its weaknesses. Techniques of Criminal hackers- Detection-Prevention. Published research papers or released security software. No Ex-hackers.
  • 6. Being Prepared What can an intruder see on the target systems? What can an intruder do with that information? Does anyone at the target notice the intruder's attempts or successes? 1. What are you trying to protect? 2. Who are you trying to protect against? 3. How much time, effort, and money are you willing to expend to obtain adequate protection?
  • 7. Get out of Jail free card Security evaluation plan 1. Identify system to be tested 2. How to test? 3. Limitations on that testing Evaluation done under a no-holds- barred approach. Clients should be aware of risks. Limit prior knowledge of test.
  • 8. Kinds of Testing Remote Network Remote dial-up network Local network Stolen laptop computer Social engineering Physical entry 1.Total outsider 2.Semi-outsider 3.Valid user
  • 9. Final Report Collection of all discoveries made during evaluation. Specific advice on how to close the vulnerabilities. Testers techniques never revealed. Delivered directly to an officer of the client organization in hard-copy form. Steps to be followed by clients in future.