際際滷

際際滷Share a Scribd company logo
Introduction to Ethical Hacking

        By Nitish Mehta (Illuminative works)
What we do ?




2          Illuminative works
Services we Provide

                            ILLUMINAITVE
                               WORKS




                              SERVICES




      PHP and                                           APPILCATION
                  Ruby On Rails            SEO
    Frameworks                                          DEVELOPMENT




3                                  Illuminative works
Php and Its Frameworks
                      ILLUMINAITVE
                         WORKS




                           services




                            PHP and
                          Frameworks




    Wordpress   Magento                Joomla         Zend



4                                Illuminative works
ILLUMINAITVE
                                            WORKS




              SERVICES                                           TRAINING




   PHP and               Ruby On Rails
 Frameworks




APPILCATION
                             SEO                        ONLINE              OFFLINE
DEVELOPMENT
Types of training

                 TRAINING



    Courses       ONLINE                    Workshops




    Blogs         Webcast                   Webinars


6                      Illuminative works
Workshop and training on
    Application   Mobile Application development
                  Facebook application development
    development   Twitter application development



                  Ethical Hacking level -1
Ethical Hacking   Hack the Hacker (method to trackback to hacker)
                  HACKERS ON CHARITY (Coming soon )



      Website     Php
                  Wordpress
    development   Joomla



Electronics and   Electric Circuit and PCB designing.
                  Advanced 8051 Architecture, Programming &
communication      Interfacing



7                              Illuminative works
How can you learn from us?
       Series of Webinars.

       Watch webcast.

       Blogs

       Workshop

       Hack with hackers




    8                         Illuminative works
What we will discuss today ?
1.   Understanding hacker objectives

2.   Outlining the differences between ethical hackers
     and malicious hackers/crackers

3.   Examining the ethical hacking processes.

4.   Starting the ethical hacking process




 9                             Illuminative works
Who are Hackers ?
    Recently, hacker has taken on a new meaning 
        who maliciously breaks into systems for personal gain.

    Technically, these criminals are crackers
        They modify, delete, and steal critical information, often
         making other people miserable
    The good-guy (white-hat) hackers dont like being in the
     same category as the bad-guy (black-hat) hackers.




    10                                Illuminative works
Types of Hacker
    People Categorize Hacker into many different ways
    But everyone agrees that there is 3 basic type of
     hacker


         Black Hat            White Hat        Grey Hat
          Individual with     Individual      They work for
           extraordinary        Professional    defensive and
           computing skills     Hacker          offensive at their
          Does destructive    Used for        own will
           work always          Defensive
                                Purpose




    11                                    Illuminative works
Types of Ethical Hacker

  Former          Reformed crackers
                  First Hand Experienced

 Black Hats       Less credibility



                  Independent security Consultants (can

 White Hats        be group too)
                  Claim to be knowledgeable about
                   black hat activities



 Consulting       Part of ICT firms.
                  Certified professionals.

   Firms          Good credibility.


12                         Illuminative works
Steps of Hacking

                Information
                 Gathering
                    &
                 Scanning




     Covering                      System
      Tracks                       Hacking




                  Plant
                 Rootkits
                   and
                Backdoors


13                   Illuminative works
Information Gathering
    Is used to gather information as much as hacker can for
     the target

    It is also know as ratting the door knob.

    By information that a hacker has gathered he/she can
     know what type of attack to use.

    This is basic and important step in hacking

    More knowledge in this step will make other upcoming
     step easy.

    14                             Illuminative works
Scanning
    Scanning refers to pre attack phase where a hacker
     scan the network to find / gather information about
     network
    Scanning includes
        Network scan
        Port scan
        Venerability scan , ect
    A Hacker can get some high venerability which can
     give access easily.



    15                             Illuminative works
System Hacking
    Also know as gaining access
    The venerability that has been found during
     Information Gathering and scanning is been
     exploited here
    There can be many exploits with different level of
     threats
    Some of the threats that we are going to discuss are
        Sql Injection
        XXS cross site scripting
        LFI , RFI


    16                              Illuminative works
Backdoor and rootkits
    It is also called as maintaining access.
    This is done so a hacker can have all type of access
     for next time without bypassing or breaking the
     security

    For this many stuffs are used
        Trojans
        Backdoors ,rootkits
        Shells , ect




    17                           Illuminative works
Covering Tracks
    This is smallest and most important part in Hacking
    If this is not done then a Hacker can easily get track
     back.
    This is step were hacker removes all his/her identity
     or tracks
        History files :
             sh : .sh_history
            csh : .history
             ksh : .sh_history
             bash: .bash_history
             zsh : .history
        Backup Files :
            dead.letter, *.bak, *~

    18                                Illuminative works
What does Ethical Hacker do ?
    They basically ask themselves following question
        What does a hacker/ cracker sees in the target ?
            Information gathering
            Scanning
        What can he do with that vulnerability ?
            Gaining Access
            Maintaining it
            System hacking
        Has anyone already noticed the vulnerability ?
            Maintaining Access
            Footprinting



    19                               Illuminative works
What is vulnerability Research ?
    Discovering and designing vulnerability in any
     system is called vulnerability.
    It can be classified in two ways

        Threat Level
            Low
            Medium
            High


        Exploit Range
            Local
            Remote

    20                         Illuminative works
Why a Ethical hacker need to have vulnerability ?
    To identify correct network vulnerability

    Protect network form being attack

    To get information that helps to prevent security
     problems

    To gather information about virus/ worms/ Trojan

    To find weakness in n/w and inform it to admin

    To know how to recover from such attacks

    21                          Illuminative works
From were you can research ?
    There are several websites from where you can stay
     up dated and can research

        Mine favourite are
            Packet storm : www.packetstormsecurity.com
            Security focus: www.securityfocus.com
            SANS internet storm : http://isc.sans.edu
            Security magazine : www.securitymagazine.com
            Exploit-db: www.exploit-db.com




    22                                  Illuminative works
How can you conduct Ethical Hacking ?
                Talk to your client on the needs of testing




              Prepare NDA document and ask them to sign them




       Prepare a team of Ethical Hacker and create a schedule for testing




                                Conduct the test




                   Analyze the result and prepare the report




                         Deliver the report to the client


23                                           Illuminative works
Process of Ethical Hacking
                              Formulating the Plan
          specific plan                 Risk involve                 Venerability management




                                   Selecting Tools
                             Adequate               Reports on            presented to managers
Licensed/OS Tools
                           documentation           vulnerabilities          or nontechie types




                                Executing the plan
                                                 narrow your focus
     Search Internet      Narrow your scope                                Perform the attacks,
                                               with a more critical eye


24                                              Illuminative works
How many times we should do ?
    Make sure your systems are secure.
    New hacker exploits and security vulnerabilities are
     regularly uncovered
    At any time , everything can change
        Software upgrades
        Adding computer systems
        Applying patches.


    Thus regularly testing should be done.



    25                             Illuminative works
Future webinar dates
            Information Gathering & Scanning Methodologies-
 2-2-12      NitishMehta


            Google Hacking  Nitish Mehta
16-12-12



            SQL injection attacks -Nitish Mehta / Naveen Badoni
 6-1-13



            Facebook and Email Hacking- Arif Ali Khan
20-1-13



            Social Engineering-Arif Ali Khan / Nitish Mehta
 2-2-13




  26                                   Illuminative works
Q/A Round


             Thank You
                   Nitish Mehta
     (Illuminative works CEO and Founder)
          nitish@illuminativeworks.com
         Facebook.com/illuminativeworks



27                      Illuminative works

More Related Content

What's hot (20)

Hackers
HackersHackers
Hackers
guesta04f59b
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
Luke Perrin
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Kunal Gawade, CFE
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
Vanipriya Sakthivel
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
Abhilash Ak
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
talhaabid
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Mukul Agarwal
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
Nitish Kasar
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aditya Vikram Singhania
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Harshit Upadhyay
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...
Quinnipiac University
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
Amol Deshmukh
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Esteban
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
chakrekevin
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
Hafizra Mas
It
ItIt
It
Volkswagen Thane
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
Luke Perrin
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
Vanipriya Sakthivel
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
Abhilash Ak
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
talhaabid
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
Nitish Kasar
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...
Quinnipiac University
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
Amol Deshmukh
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Esteban
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
chakrekevin
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
Hafizra Mas

Similar to Introduction to hacking (20)

Cyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITWCyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITW
ChanchalHiwanj1
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
Rishab Gupta
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
Master Ethical Hacking Basics Like a Pro
Master Ethical Hacking Basics Like a ProMaster Ethical Hacking Basics Like a Pro
Master Ethical Hacking Basics Like a Pro
ayansheikh45689
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
Ethichack 2012
Ethichack 2012Ethichack 2012
Ethichack 2012
santhosh kumarRG
Hacking
HackingHacking
Hacking
Paidi Dinesh
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
Outhai SAIOUDOM
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Nitheesh Adithyan
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
Being Uniq Sonu
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
xererenhosdominaram
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
bestip
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Divyadharshini S U
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
Kalpesh Doru
Workshop content adams
Workshop content adamsWorkshop content adams
Workshop content adams
Siddharth
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
Subhoneel Datta
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
AKSHAY KHATRI
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
Cyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITWCyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITW
ChanchalHiwanj1
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
Rishab Gupta
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
Master Ethical Hacking Basics Like a Pro
Master Ethical Hacking Basics Like a ProMaster Ethical Hacking Basics Like a Pro
Master Ethical Hacking Basics Like a Pro
ayansheikh45689
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
Outhai SAIOUDOM
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
Being Uniq Sonu
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
xererenhosdominaram
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
bestip
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
Kalpesh Doru
Workshop content adams
Workshop content adamsWorkshop content adams
Workshop content adams
Siddharth
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
Subhoneel Datta
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1

Introduction to hacking

  • 1. Introduction to Ethical Hacking By Nitish Mehta (Illuminative works)
  • 2. What we do ? 2 Illuminative works
  • 3. Services we Provide ILLUMINAITVE WORKS SERVICES PHP and APPILCATION Ruby On Rails SEO Frameworks DEVELOPMENT 3 Illuminative works
  • 4. Php and Its Frameworks ILLUMINAITVE WORKS services PHP and Frameworks Wordpress Magento Joomla Zend 4 Illuminative works
  • 5. ILLUMINAITVE WORKS SERVICES TRAINING PHP and Ruby On Rails Frameworks APPILCATION SEO ONLINE OFFLINE DEVELOPMENT
  • 6. Types of training TRAINING Courses ONLINE Workshops Blogs Webcast Webinars 6 Illuminative works
  • 7. Workshop and training on Application Mobile Application development Facebook application development development Twitter application development Ethical Hacking level -1 Ethical Hacking Hack the Hacker (method to trackback to hacker) HACKERS ON CHARITY (Coming soon ) Website Php Wordpress development Joomla Electronics and Electric Circuit and PCB designing. Advanced 8051 Architecture, Programming & communication Interfacing 7 Illuminative works
  • 8. How can you learn from us? Series of Webinars. Watch webcast. Blogs Workshop Hack with hackers 8 Illuminative works
  • 9. What we will discuss today ? 1. Understanding hacker objectives 2. Outlining the differences between ethical hackers and malicious hackers/crackers 3. Examining the ethical hacking processes. 4. Starting the ethical hacking process 9 Illuminative works
  • 10. Who are Hackers ? Recently, hacker has taken on a new meaning who maliciously breaks into systems for personal gain. Technically, these criminals are crackers They modify, delete, and steal critical information, often making other people miserable The good-guy (white-hat) hackers dont like being in the same category as the bad-guy (black-hat) hackers. 10 Illuminative works
  • 11. Types of Hacker People Categorize Hacker into many different ways But everyone agrees that there is 3 basic type of hacker Black Hat White Hat Grey Hat Individual with Individual They work for extraordinary Professional defensive and computing skills Hacker offensive at their Does destructive Used for own will work always Defensive Purpose 11 Illuminative works
  • 12. Types of Ethical Hacker Former Reformed crackers First Hand Experienced Black Hats Less credibility Independent security Consultants (can White Hats be group too) Claim to be knowledgeable about black hat activities Consulting Part of ICT firms. Certified professionals. Firms Good credibility. 12 Illuminative works
  • 13. Steps of Hacking Information Gathering & Scanning Covering System Tracks Hacking Plant Rootkits and Backdoors 13 Illuminative works
  • 14. Information Gathering Is used to gather information as much as hacker can for the target It is also know as ratting the door knob. By information that a hacker has gathered he/she can know what type of attack to use. This is basic and important step in hacking More knowledge in this step will make other upcoming step easy. 14 Illuminative works
  • 15. Scanning Scanning refers to pre attack phase where a hacker scan the network to find / gather information about network Scanning includes Network scan Port scan Venerability scan , ect A Hacker can get some high venerability which can give access easily. 15 Illuminative works
  • 16. System Hacking Also know as gaining access The venerability that has been found during Information Gathering and scanning is been exploited here There can be many exploits with different level of threats Some of the threats that we are going to discuss are Sql Injection XXS cross site scripting LFI , RFI 16 Illuminative works
  • 17. Backdoor and rootkits It is also called as maintaining access. This is done so a hacker can have all type of access for next time without bypassing or breaking the security For this many stuffs are used Trojans Backdoors ,rootkits Shells , ect 17 Illuminative works
  • 18. Covering Tracks This is smallest and most important part in Hacking If this is not done then a Hacker can easily get track back. This is step were hacker removes all his/her identity or tracks History files : sh : .sh_history csh : .history ksh : .sh_history bash: .bash_history zsh : .history Backup Files : dead.letter, *.bak, *~ 18 Illuminative works
  • 19. What does Ethical Hacker do ? They basically ask themselves following question What does a hacker/ cracker sees in the target ? Information gathering Scanning What can he do with that vulnerability ? Gaining Access Maintaining it System hacking Has anyone already noticed the vulnerability ? Maintaining Access Footprinting 19 Illuminative works
  • 20. What is vulnerability Research ? Discovering and designing vulnerability in any system is called vulnerability. It can be classified in two ways Threat Level Low Medium High Exploit Range Local Remote 20 Illuminative works
  • 21. Why a Ethical hacker need to have vulnerability ? To identify correct network vulnerability Protect network form being attack To get information that helps to prevent security problems To gather information about virus/ worms/ Trojan To find weakness in n/w and inform it to admin To know how to recover from such attacks 21 Illuminative works
  • 22. From were you can research ? There are several websites from where you can stay up dated and can research Mine favourite are Packet storm : www.packetstormsecurity.com Security focus: www.securityfocus.com SANS internet storm : http://isc.sans.edu Security magazine : www.securitymagazine.com Exploit-db: www.exploit-db.com 22 Illuminative works
  • 23. How can you conduct Ethical Hacking ? Talk to your client on the needs of testing Prepare NDA document and ask them to sign them Prepare a team of Ethical Hacker and create a schedule for testing Conduct the test Analyze the result and prepare the report Deliver the report to the client 23 Illuminative works
  • 24. Process of Ethical Hacking Formulating the Plan specific plan Risk involve Venerability management Selecting Tools Adequate Reports on presented to managers Licensed/OS Tools documentation vulnerabilities or nontechie types Executing the plan narrow your focus Search Internet Narrow your scope Perform the attacks, with a more critical eye 24 Illuminative works
  • 25. How many times we should do ? Make sure your systems are secure. New hacker exploits and security vulnerabilities are regularly uncovered At any time , everything can change Software upgrades Adding computer systems Applying patches. Thus regularly testing should be done. 25 Illuminative works
  • 26. Future webinar dates Information Gathering & Scanning Methodologies- 2-2-12 NitishMehta Google Hacking Nitish Mehta 16-12-12 SQL injection attacks -Nitish Mehta / Naveen Badoni 6-1-13 Facebook and Email Hacking- Arif Ali Khan 20-1-13 Social Engineering-Arif Ali Khan / Nitish Mehta 2-2-13 26 Illuminative works
  • 27. Q/A Round Thank You Nitish Mehta (Illuminative works CEO and Founder) nitish@illuminativeworks.com Facebook.com/illuminativeworks 27 Illuminative works

Editor's Notes

  • #15: As name suggest that this phase is used to gather information