Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Ethical Hacking

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

Ethical Hacking

P. Ashok Reddy
07/06/2019

Insights Experience Accelerate


Confidential Information www.anblicks.com
Disclaim
er for educational purposes
Everything shown is to be used
only. All information exposed in this Presentation has the
goal to teach you the techniques used by hackers in
order to avoid their attacks. Please make sure before
analyzing Applications that you have the Approval of the
Owner/Author of the Applications.

Hacking is a crime and i am not responsible for the way


you use it!

Confidential Information www.anblicks.com


Agenda

• WHO IS ETHICAL HACKER?


• DIFFERENT TYPES OF HACKERS
• DIFFERENT TYPES OF HACKING TECHNIQUES
– Keyloggers
– Phishing
– Cyber Spying
– Data tampering
– Exploit
– Session hijacking

Confidential Information www.anblicks.com 3


Title

• WHO IS ETHICAL HACKER?

An ethical hacker is an information security expert who systematically


attempts to penetrate a computer system, network, application or other
computing resource on behalf of its owners and with their permission to find
security vulnerabilities that a malicious hacker could potentially exploit.

Confidential Information www.anblicks.com 4


DIFFERENT TYPES OF HACKERS

White Hat Hackers :

White Hat hackers are also known as Ethical Hackers. They never
intent to harm a system, rather they try to find out weaknesses in a
computer or a network system as a part of penetration testing and
vulnerability assessments.
Ethical hacking is not illegal and it is one of the demanding jobs
available in the IT industry. There are numerous companies that hire
ethical hackers for penetration testing and vulnerability assessments.

Confidential Information www.anblicks.com 5


DIFFERENT TYPES OF HACKERS

Black Hat Hackers :

Black Hat hackers, also known as crackers, are those who hack in order
to gain unauthorized access to a system and harm its operations or steal
sensitive information.
Black Hat hacking is always illegal because of its bad intent which
includes stealing corporate data, violating privacy, damaging the
system, blocking network communication, etc.

Confidential Information www.anblicks.com 6


DIFFERENT TYPES OF HACKERS
Grey Hat Hackers :

Grey hat hackers are a blend of both black hat and white hat hackers.
They act without malicious intent but for their fun, they exploit a security
weakness in a computer system or network without the owner’s
permission or knowledge.
Their intent is to bring the weakness to the attention of the owners and
getting appreciation or a little bounty from the owners

Confidential Information www.anblicks.com 7


DIFFERENT TYPES OF HACKING TECHNIQUES

Keyloggers :

A computer program that records every keystroke made by a user,


especially in order to gain fraudulent access to passwords and other
confidential information.

Confidential Information www.anblicks.com 8


DIFFERENT TYPES OF HACKING TECHNIQUES

Keyloggers :

Confidential Information www.anblicks.com 9


DIFFERENT TYPES OF HACKING TECHNIQUES

Phishing :

Phishing is a hacking technique using which a hacker replicates the most-


accessed sites and traps the victim by sending that spoofed link. Combined
with social engineering, it becomes one of the most commonly used and
deadliest attack vectors.

Confidential Information www.anblicks.com 10


DIFFERENT TYPES OF HACKING TECHNIQUES

Phishing :

Confidential Information www.anblicks.com 11


DIFFERENT TYPES OF HACKING TECHNIQUES

Cyber Spying :

Cyber spying, is the act or practice of obtaining secrets and information


without the permission and knowledge of the holder of the information from
individuals, competitors.

Confidential Information www.anblicks.com 12


DIFFERENT TYPES OF HACKING TECHNIQUES
Data Tampering / Parameters Tampering :

Tampering is the way of modifying the request parameters before request


submission. Tampering can be achieved by various methods and one of
the ways is the through Tamper Data. It allows tampering the data that is
sent between the client and the server as well as easy access to GET and
POSTING element's data.

Confidential Information www.anblicks.com 13


DIFFERENT TYPES OF HACKING TECHNIQUES
Data Tampering / Parameters Tampering :

< UserId = 123 < UserId = 111


Changed to UserName= xyz >
UserName = abc >

UserId UserName

111 xyz

Hacker Server Database

Confidential Information www.anblicks.com 14


DIFFERENT TYPES OF HACKING TECHNIQUES
Exploit :

An exploit is a piece of software, a chunk of data, or a sequence of


commands that takes advantage of a bug or vulnerability to cause
unintended or unanticipated behavior to occur on computer software,
hardware, or something.

Confidential Information www.anblicks.com 15


DIFFERENT TYPES OF HACKING TECHNIQUES
Exploit :

Hacker
Victim

Remote control Access

Confidential Information www.anblicks.com 16


DIFFERENT TYPES OF HACKING TECHNIQUES
Session hijacking :

Session hijacking is defined as taking over an active TCP/IP


communication session without the user's permission. ... Identity theft,
Information theft, stealing sensitive data are some of the common impacts
of session hijacking.

Confidential Information www.anblicks.com 17


DIFFERENT TYPES OF HACKING TECHNIQUES
Session hijacking :

Confidential Information www.anblicks.com 18


Thank You

Contact us,

Web: www.anblicks.com
Email: ashok.p@anblicks.com

Confidential Information www.anblicks.com 19

You might also like