Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Transcript of Ethical Hacking
Purnank Jain ETHICAL HACKING Its All About Ethics !! By: Abhishek Choudhary
Purnank Jain He breaks security test security system or while working for a security company which makes security software. White Hat Black Hat It is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" Grey Hat A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. Phases Of Penetration Testing Reconnaissance Step to map out the target network and systems. The hacker will try to list all the systems on the network, then try to list all the holes available on the target systems. Methods: Social Engineering
Extracting info from DNS Scanning Its the process of connecting to ports to look up for the services running on them .... Further information is then gathered to determine how best to target any vulnerabilities and weaknesses in the system. 21 FTP (File Transfer Protocol)
22 SSH (Secure Shell)
25 SMTP (Send Mail Transfer Protocol)
80 HTTP (HyperText Transfer Protocol)
110 POP3 (Post Office Protocol, version 3) Some Basic Ports and services running on them Vulnerabilities most important and the most dangerous step Weakness in the software or system configuration that can be exploited. Exploits Gaining control over a system It's piece of software, a chunk of data, or sequence of commands that takes advantage of vulnerability Some Common Attacks Denial Of Service (DoS) Attack Buffer Overflow (BoF) Attack Cookie Stealing Sniffing attacks Ping of Death Backdoors & Rootkits Backdoor programs are used to gain unauthorized access to system A rootkit is a stealthy type of software, often times malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. Ethical Hacking is hence used to build a system that helps prevent penetration from Hackers