Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Ethical Hacking

An exploration of mind and matter, how their interaction influences our experience, and the impact mindfulness meditation can have on our lives.

Abhishek Choudhary

on 11 October 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Ethical Hacking

It is a process where a computer security expert, who specializes in penetration testing and in other testing methodologies tries some hacking technique to ensure the security of an organization's information systems. Let us categorize Hackers THANKS Abhishek Choudhary
Himshikha Suhag
Purnank Jain ETHICAL HACKING Its All About Ethics !! By: Abhishek Choudhary
Himshika Suhag
Purnank Jain He breaks security test security system or while working for a security company which makes security software. White Hat Black Hat It is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" Grey Hat A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. Phases Of Penetration Testing Reconnaissance Step to map out the target network and systems. The hacker will try to list all the systems on the network, then try to list all the holes available on the target systems. Methods: Social Engineering
Google Searching
Google Hacking
Ping Sweeps
Extracting info from DNS Scanning Its the process of connecting to ports to look up for the services running on them .... Further information is then gathered to determine how best to target any vulnerabilities and weaknesses in the system. 21 FTP (File Transfer Protocol)
22 SSH (Secure Shell)
23 Telnet
25 SMTP (Send Mail Transfer Protocol)
80 HTTP (HyperText Transfer Protocol)
110 POP3 (Post Office Protocol, version 3) Some Basic Ports and services running on them Vulnerabilities most important and the most dangerous step Weakness in the software or system configuration that can be exploited. Exploits Gaining control over a system It's piece of software, a chunk of data, or sequence of commands that takes advantage of vulnerability Some Common Attacks Denial Of Service (DoS) Attack Buffer Overflow (BoF) Attack Cookie Stealing Sniffing attacks Ping of Death Backdoors & Rootkits Backdoor programs are used to gain unauthorized access to system A rootkit is a stealthy type of software, often times malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. Ethical Hacking is hence used to build a system that helps prevent penetration from Hackers
Full transcript