ECCouncil 312-50v8 Braindumps - PowerPoint PPT Presentation

View by Category
About This Presentation
Title:

ECCouncil 312-50v8 Braindumps

Description:

Get all the program details for EC-Council's Certified Ethical Hacking program. – PowerPoint PPT presentation

Number of Views:143
Updated: 13 April 2015
Slides: 29
Provided by: passiteasy

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: ECCouncil 312-50v8 Braindumps


1
ETHICAL HACKING
2
http//www.passiteasy.com/eccouncil/312-50v8-exam-
quesions-dumps.html
3
http//www.passiteasy.com/eccouncil/312-50v8-exam-
quesions-dumps.html
4

HACKER
5
CONTENT
  • Overview of Hacking
  • Why do hackers hack?
  • Types of Hacker
  • Level of Hackers
  • Hackers language
  • Ethical Hacking Process
  • How can protect the system?
  • What should do after hacked?
  • Final words

6
OVERVIEW OF HACKING
  • It is Legal
  • Permission is obtained from the target
  • Ethical hackers possesses same skills, mindset
    and tools of a hacker but the attacks are done in
    a non-destructive manner
  • Also Called Attack Penetration Testing.

7
HACKING VS CRACKING
  • Hacker
  • The person who hack
  • Cracker
  • System intruder/destroyer
  • HACKING WITH MALICIOUS INTENTION IS CRACKING
  • The basic difference is hackers do not do
    anything disastrous.
  • Cracking yield more devastating results.
  • Cracking is crime.
  • Cyber crime are the results of cracking ,not
    hacking

8
THE GREAT HACKER WAR
  • Kevin Mitnick The most famous, and undoubtedly
    most gifted hacker in history, made a name for
    himself in 1981 at the tender age of 17 by
    getting into a phone exchange, which allowed him
    to redirect subscriber calls in any way he
    wanted. In 1983, he achieved his first major coup
    - and also his first arrest - when he accessed a
    Pentagon computer. It was his repeated offenses
    that made him a target of the FBI. He was
    sentenced to five years in prison in the 1990s,
    but today he is a security consultant and owns
    his own company Mitnick Security.
  • John Draper known as "Cap'n Crunch", Draper was
    one of the first hackers in history. This moniker
    comes from the cereal of the same name, inside of
    which he once discovered a toy whistle (provided
    as a gift to entice children to ask parents for
    the cereal). He discovered that he could use the
    whistle to hack a telephone line and get free
    phone calls - all that was necessary was to
    produce a precise tone in the receiver for the
    method to work. He was arrested in 1976 and
    sentenced to two months in prison.
  • Kevin Poulsen -The current editor-in-chief of
    Wired was formerly known for rather different
    activities. In 1983, when he too was only 17
    years old, he made his first intrusions into
    different networks, resulting in a few run-ins
    with the US legal system. He continued with his
    illegal activities until his arrest by the FBI in
    April 1991. In 1994 he was sentenced to four
    years in prison.
  • Adrian Lamo Lamo has certainly driven the highest
    number of network administrators insane. From
    Microsoft to Yahoo!, going through Sun
    Microsystems, MacDonald's, Cingular, AOL or even
    the New York Times, he is credited with all types
    of intrusions and corporate security system
    violations. He has bypassed protections with
    disconcerting simplicity during a broadcast of
    the NBC Nightly News, the host asked him to prove
    his talents in front of the camera, and he
    responded by gaining access to the company's
    internal network in less than five minutes. Today
    he is an expert in security and enjoys full
    freedom of movement, after being under the
    surveillance of US authorities for many years.

9
Why do people hack??
  • To make security stronger ( Ethical Hacking )
  • Just for fun
  • Show off
  • Hack other systems secretly Steal important
    information

10
What are the various qualities a hacker should
posses
  • Good coder
  • well knowledgeable person both hard ware as well
    as soft ware
  • Should have knowledge on security
  • system
  • Trusted person

11
Types of hacker
12
Label of hacker
13
Hackers language
  • 1 -gt i or l
  • 3 -gt e
  • 4 -gt a
  • 7 -gt t
  • 9 -gt g
  • 0 -gt o
  • -gt s
  • -gt i or
  • \ -gt n
  • \/ -gt m
  • s -gt z
  • z -gt s
  • f -gt ph
  • ph -gt f
  • x -gt ck
  • ck -gt x

14
Hackers language translation
  • EXAMPLE-
  • Hacking is good
  • H4ck\g 1 900d

15
Hacking - Process
  • Foot Printing
  • Scanning
  • Gaining Access
  • Maintaining Access

16
Foot Printing
  • Whois Lookup
  • NS lookup
  • IP Lookup

17
Scanning
  • Port scanning
  • Network scanning
  • Finger Printing
  • Fire walking

18
Scanning
19
Gaining access
  • Password Attacks
  • Social Engineering
  • Viruses

20
Maintaining access
  • Os BackDoors
  • Trojans
  • Clearing tracks

21
Advantages Disadvantages
  • Advantages
  • Provides security to banking and financial
    establishments
  • Prevents website defacements
  • An evolving technique
  • To catch a thief you have to think like a thief
  • Disadvantages
  • All depends upon the trustworthiness of the
    ethical hacker
  • Hiring professionals is expensive.

22
How can we protect the system?
  • Patch security hole often
  • Encrypt important data
  • Ex) pgp, ssh
  • Do not run unused daemon
  • Remove unused program
  • Setup loghost
  • Backup the system often
  • Setup firewall
  • Setup IDS
  • Ex) snort

23
What should do after hacked?
  • Shutdown the system
  • Or turn off the system
  • Separate the system from network
  • Restore the system with the backup
  • Or reinstall all programs
  • Connect the system to the network

24
H4cking prone areas
25
Hacking GROWTH RATE
It is clear from the graph it is increasing day
by day.
26
Please give your suggestions and feedbacksAny
question ?
27
THANK YOU
28
http//www.passiteasy.com/eccouncil/312-50v8-exam-
quesions-dumps.html
About PowerShow.com