Introduction to Ethical Hacking pdf file

debmajumder741249 2,014 views 31 slides Feb 29, 2024
Slide 1
Slide 1 of 31
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31

About This Presentation

learning purpose


Slide Content

Introduction to Ethical Hacking
©Great Learning. All Rights Reserved. Unauthorized use or distribution prohibited

What is Hacking?
©Great Learning. All Rights Reserved. Unauthorized use or distribution prohibited

What is Hacking ?
Ethical Hackingisthe protection of inter-connectedsystems,
includinghardware, softwareanddata, fromcyberattacks.
White Hat HackerGrey Hat HackerBlack Hat Hacker

Computer Security Threats
•Computer Virus
•Computer Worm
•Scareware
•Key logger
•Adware
•Malware
•Backdoor
•Trojan
•Ransomware
•Spyware

Goals of ethical Hacking
•Protect the privacy of an Organization
•Transparently report all the identified bugs/weaknesses/vulnerabilities to
t
he organization.
•Inform the vendors about the security measures and patches.

Skills Required by Ethical Hackers
Operating
Systems
Programming
Languages
Networking

Tools Used by Ethical Hackers

Process of Ethical Hacking
Reconnaissance
Maintaining Access
Scanning
Gaining Access
Reporting
Clearing Tracks

Reconnaissance
Thisisthefirststepof hacking. Itisalso calledasFoot printingand
informationgathering phase.Thisisthepreparatoryphasewhere
wecollect asmuchas informationas possible about these the
target.Weusually collectinformationabout three groups:
•Network
•Host
•PeopleI

Scanning
Three typesofscanningareinvolved:
Portscanning: This phaseinvolvesscanning thetarget forthe
informationlikeopenports,livesystems,variousservices running
onthe host.
VulnerabilityScanning: Checking thetarget fortheweakness or
vulnerabilitieswhichcanbeexploited.Usuallydonewiththe helpof
automatedtools.
NetworkMapping: Finding thetopology of network, routers,
firewallsserversifany,and hostinformationand drawinganetwork
diagramwiththeavailable information.Thismap mayserveasa
valuablepiece ofinformation.Thismap mayserve asavaluable
pieceof informationthroughout the hackingprocess.

Clearing Tracks
Nothiefwantstoget caught.Anintelligenthacker always clearsall
the evidencesothatinlaterpointoftime,no onewillfind anytraces
leadingtohim.Thisinvolvesmodifying/corrupting/deleting the
values oflogs,modifyingregistryvaluesand uninstallingallthe
applications he used and deletingallfoldershecreated.

Demonstration
©Great Learning. All Rights Reserved. Unauthorized use or distribution prohibited

Ethical Hacking Across Domains
Atit’score,Ethical Hacking occupiesaprominentroleinvarious
verticalssuchas:
•WebA

•MobileA

•Andma

Web Application Domain
TwoMajorCategories:
•Clients

•Servers

Allattackscanbecategorizedintro3majorattacks:
•ParameterT
ampering
•Unvalidatedi
nputs
•DirectoryT
Attacks

Web Application Domain
ClientDatabaseServer Application Server
example.com
Attacker

Web Application Domain
login Name: <script>alert("You are hacked")</script> Login Password:
login Name: 'Union select * from users'
Login Password:
login Name: <iframe src="....org"></iframe>
Login Password:

Common Web Application attacks
•InjectionF eg.SQLinjection,HTMLinjection,etc.
•Crosss
Scriptingeg.Reflected,Stored,etc.
•WebS
Attackseg.DNSCachePoising,Fileuploadsetc.

Web Application Domain
login: <script>alert(document.cookie)</script>
password:
subscribe:
email: <script>code to mail him user information</script>

Hacking Methodology
•WebF –GatheringInformation
•Vulnerability S
canners– w3af,Acunetix
•Identify E
Points andAttacksurface

Example : SQL injections
Victim
Attacker
Server
Select * from users where user_id=‘admin’ and
password=‘shadow’
Select * from users where user_id=‘blah’ or 1= 1-- and password=‘anything’

Mobile Domain
TheMobile Devicehas becomeaninseparable part oflifetoday.
Theattackersareeasilyabletocompromisethemobilenetwork
becauseofvariousvulnerabilities,themajority oftheattacksare
because ofthe untrusted apps.Themainoperatingsystemsused
are:
•Android
•IOS
•Windows
•Blackberry

©Great Learning. All Rights Reserved. Unauthorized use or distribution prohibited
Example: Android
Libraries
Applications
Application Framework
Linux Kernel
Android Runtime

Types of Android Attacks
•UntrustedAPKs
•SMS
•Email
•Spying
•App s

•Rooting

Example: Tap Jacking

Network Domain
Anetworkisanattempt togain unauthorised accesstoan
organisation’s network,withtheobjective ofstealing dataorperform
othermaliciousactivity.Therearetwomaintypesof networkattacks:
•Passive:A
gainaccesstoanetworkandcan monitor or
stealsensitiveinformation,but withoutmakingany changetodata,
leavingitintact.
•Active:A
not only gainunauthorisedaccessbutalsomodify
data,eitherdeleting, encryptingorotherwiseharmingit.

Types of Network Attacks
Endpointattacks–gainingunauthorisedaccesstouserdevices,
servers orotherendpoints,typicallycompromisingthem by infecting
themwithmalware.
Malwareattacks–infectingITresourceswithmalware,allowing
attackerstocompromisesystems,steal dataanddo damage.These
alsoincluderansomwareattacks.
Vulnerabilities, exploitsandattacks–exploiting vulnerabilitiesin
softwareusedintheorganization,togainunauthorisedaccess,
compromiseorsabotagesystems.
Advanced persistentthreats–Thesearecomplexmulti-layeredthreats,
whichincludenetworkattacksbutalsootherattacktypes.

Ransomware
The WannaCryransomwareattackwasaMay2017worldwide
cyberattackby the WannaCryransomware cyrptoworm,which
targetedcomputers running the Microsoft Windowsoperating
systemby encrypting data anddemanding ransompaymentsinthe
Bitcoincryptocurrency.

Example : DDOS attack

Other Domains
•CloudC
•IOT
•Blockc

•Edge C

Demonstration –SQL injection
©Great Learning. All Rights Reserved. Unauthorized use or distribution prohibited

©Great Learning. All Rights Reserved. Unauthorized use or distribution prohibited
Tags