Ethical Hacking-1
Ethical Hacking-1
Ethical Hacking-1
PRESENTATION MADE BY
SHEHROZA
WHAT IS ETHICAL HACKING
Shehroza shiraz
ETHICAL HACKING METHODOLOGY
Phishing involves sending deceptive emails or messages to trick individuals into revealing sensitive information
like passwords or financial data. These messages often appear legitimate but are actually designed to steal
information. SQL Injection is a technique where attackers manipulate input fields on websites or applications to
execute malicious SQL queries. This can give them unauthorized access to a database, exposing or altering
data.Social engineering relies on psychological manipulation to trick people into divulging confidential
information or performing actions that compromise security. This can include impersonation, pretexting, or baiting
vermeet
Password cracking involves attempting to guess or crack a user's password through various methods, such as
dictionary attacks, brute force attacks, or rainbow table attacks. A buffer overflow occurs when an attacker exploits
a software vulnerability by sending more data to a program's buffer than it can handle, potentially allowing them to
execute malicious code or crash the system.These techniques are used by hackers to gain unauthorized access,
steal data, or compromise the security of computer systems and networks. It's important to be aware of these
methods to better protect yourself and your systems from potential threats
mujeeb
TOOLS AND SOFTWARE
Wireshark: Wireshark is a network protocol analyzer (sniffer) that allows security professionals to capture and analyze
network traffic. It can help identify security vulnerabilities, monitor network activity, and troubleshoot network issues.
Nmap (Network Mapper): Nmap is a powerful open-source tool used for network discovery and security auditing. It
scans networks to identify open ports, services, and potential vulnerabilities on remote hosts. It's commonly used for
network reconnaissance.
Metasploit: Metasploit is a penetration testing framework that provides tools for developing, testing, and executing
exploits against known vulnerabilities in systems. It's used by ethical hackers and security researchers to assess the
security of systems.
Burp Suite: Burp Suite is a web application security testing tool used to discover and exploit vulnerabilities in web
applications. It includes features for scanning, crawling, and manipulating web traffic to identify security issues.
Snort: Snort is an open-source intrusion detection and prevention system (IDS/IPS). It monitors network traffic in real-
time and can alert administrators to suspicious or potentially malicious activity based on predefined rules.
These tools are valuable for ethical hackers and cybersecurity professionals to assess and enhance the security of
computer systems and networks. Please note that ethical hacking should always be conducted with proper authorization
and in compliance with legal and ethical standards.
Arham
CASE STUDIES
Basirat Zehra
LIMITATIONS OF ETHICAL
HACKING
Ethical hackers, while playing a crucial role in improving cybersecurity, have several limitations:
Authorization Requirements: Ethical hackers must obtain proper authorization to conduct security assessments. Without it, their actions could
be illegal, leading to legal consequences.
Scope Limitations: Security assessments are often scoped, meaning they may not cover every aspect of an organization's infrastructure. This
limitation could leave potential vulnerabilities undiscovered.
False Sense of Security: Organizations might become overly reliant on ethical hacking assessments, assuming that they are entirely secure once
vulnerabilities are patched. In reality, new vulnerabilities can emerge at any time.
Limited Knowledge: Ethical hackers have a finite knowledge base and skill set. They may not be aware of every possible vulnerability or
attack vector, and attackers with different backgrounds and motivations may discover unique vulnerabilities.5. *Resource Constraints:* Ethical
hackers may have limited time and resources for assessments. Comprehensive testing can be challenging, especially in complex environments.
Limited Perspective: Ethical hackers may not have a deep understanding of an organization's specific business processes, which can limit their
ability to identify vulnerabilities that are unique to the organization's operations.
Limited Impact Assessment: Ethical hackers may focus primarily on technical vulnerabilities and not assess the overall impact of a breach on
an organization's operations, reputation, or regulatory compliance.
Coordination Challenges: Coordinating with organizations and stakeholders can be challenging, especially when dealing with multiple teams,
departments, or decision-makers.
Ethical Hackers are the people who try to get unauthorised access to a computer system for Good cause, i.e. without violating any law of the
Land.
subhash
CHALLENGES FACED BY ETHICAL
HACKER
Gap in Training Material and Real World Scenarios: In Real-world scenarios,
ethical hackers find it more difficult to compromise the system than in the virtual lab
scenarios in which they learned it.
Anonymity of Hackers: The ethical hackers tasked to track and hack malicious
hackers find it difficult to crack down anonymity protocols such as TOR & No-Log
VPNs, etc.
Legal Boundaries: They have to stay within their predefined boundaries while
attempting unauthorised access, they can not afford to cause any damage to the system.
Low Pay: Roles like Ethical Hacker require an understanding of various technologies,
frameworks, tools & operating systems, yet in developing countries, they are paid less
than an average software engineer. This makes it difficult to continue in this domain.
Other challenges include the high cost of training materials, expensive certifications,
lack of formal education in ethical hacking, etc