Beruflich Dokumente
Kultur Dokumente
SUBMITTED BY:
SUBMITTED TO: RICHA CHADHA
Dr S.L.GUPTA ROLL NO 4
Prof USM(KUK) MBA GEN(PREV)
Mrs. REETA
KIn a search for ways to reduce the fear and worry of being hacked,
organizations have come to the realization that an effective way to
evaluate security threats is to have independent security exerts
attempt to hack into their computer systems.
K An | ,
, also known as a
whitehat hacker,
hacker, or simply a whitehat
whitehat,,
is a security professional who applies
their hacking skills for defensive
purposes on behalf of the owners of
information systems.
|
|
ÄLOW CHART OÄ ETHICAL HACKING PROCESS
PLANNING
RECONNAISSANCE
ENUMERATION
VULNERABILITY ANALYSIS
EXPLOITATION
ÄINAL ANALYSIS
DELIVERABLES
INTEGRATION
J |
|
J
! ! "
!
K In order to obtain
certification, an ethical
hacker must complete a
coursework consisting of 22
modules, which range from 30
minutes to 5 hours or more,
depending on the depth of
the information provided.
5|
|Ñ
|
K .!"
K | !! !
K
( "
K
.! ,
)
6 !
, "
|
|4
||4|
PASSWORD HACKING
NETWORK HACKING
E-MAIL HACKING
WIRELESS HACKING
DoS ATTACKS
INPUT VALIDATION
PRIVACY ATTACKS
IP SPOOÄING
CRYPTOGRAPHY
VIRUSES
Ñ
Password cracking is the process of recovering secret passwords from
data that has been stored in or transmitted by a computer system. A
common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :
HASHING
GUESSING
DEÄAULT PASSWORDS
BRUTE ÄORCE
PHISHING
|
Ñ
J|
87 Generally, the path taken by an email while
J|
87
travelling from sender to receiver can be explained by following
diagram.
A denial of service (DoS) attack is an attack that clogs up so much
memory on the target system that it can not serve it's users, or it
causes the target system to crash, reboot, or otherwise deny services
to legitimate users.There are several different kinds of dos attacks
as discussed below:-
below:-
PING OÄ DEATH
TEARDROP ATTACK
LAND ATTACK
SMURÄ ATTACK
=
Ñ !)$ 9 !
A potentially damaging computer programme capable of reproducing
itself causing great harm to files or other programs without permission
or knowledge of the user.
"$!. !!87
!!87
The different types of viruses are as follows-
follows-