Enhanced Presentation1
Enhanced Presentation1
Enhanced Presentation1
or loss.
1:Confidentiality ; Ensures that information is accessible only to those authorized to view it.
3: Availability; prevent disruptions in access, ensures that data and systems are accessible to authorized
users whenever needed.
To ensure Confidentiality,
1: Access Control
Implement role-based access.
Use multi-factor authentication (MFA).
Ethical hacking -is the practice of using hacking techniques lawfully and responsibly to
improve security. Penetration testers.
Types of Hackers
1: Black-Hat Hackers
•Hack without permission and often for malicious purposes (e.g., financial gain, data theft, or
damaging systems.
3:Gray-Hat Hackers
•Operate between black and white-hat hacking. They might exploit systems without permission.
•Sometimes, they report vulnerabilities to organizations, but they may demand a fee for the
information.
Ethical Hacking Process:
1:Reconnaissance,
Gather information about the target system, such as
IP addresses and network details, to understand its
structure.
2: Scanning,
identify potential vulnerabilities that could be
exploited.
Ethical Hacking Process:
3:Gaining Access,
Attempt to exploit identified vulnerabilities to gain access to the system.
4: Maintaining Access,
Hackers use to keep their connection to a compromised system after gaining initial access. This step
helps them further explore the system and gather more information about potential vulnerabilities.
Ethical Hacking Process:
1. Reconnaissance
Nmap, network scanning tool used to discover hosts and services on a network
Maltego, data mining tool for gathering information about targets, such as domain names and IP
addresses
Google Dorking, advanced Google search operators to find sensitive data publicly available on
the web.
WHOIS Lookup,
o To gather information about domain registration and ownership.
Shodan,
o search engine for discovering devices connected to the internet, providing insights into
vulnerable systems.
Scanning
Wireshark
o network protocol analyzer that captures and analyzes network packets
Tcpdump
o command-line network packet analyzer that captures and displays packets transmitted over a
network
Scanning
Nmap
Used for port scanning to find open ports and running services
Gobuster
•A tool for directory and file brute-forcing, useful for finding hidden directories on web servers.
Nikto
web server scanner that identifies vulnerabilities like outdated software, misconfigurations, and
default files
Scanning
OWASP ZAP
o web security scanning,
Acunetix
o web security scanning
Gaining Access
1:Metasploit Framework
o tools for exploiting vulnerabilities and gaining access to systems
3:Aircrack-ng:for assessing Wi-Fi network security, often used for cracking WEP and WPA/WPA2
encryption.
4:SQLMap: An open-source tool for detecting and exploiting SQL injection vulnerabilities in web
applications.
Metasploit (again): Can help document findings and vulnerabilities during the testing process.
Wireshark: A network protocol analyzer that can help identify potential tracking or logging
mechanisms.
common web vulnerabilities
1: SQL Injection
o Attackers can inject malicious SQL queries to access, modify, or delete data in a database
5:Directory Traversal
o Attackers manipulate URLs to access files and directories outside the intended folder,
often accessing sensitive files.
common web vulnerabilities
7:Clickjacking
o Hidden elements overlaid on legitimate buttons trick users into clicking, potentially
compromising accounts or data.
8:Command Injection
o Input is injected into commands executed by the server, allowing attackers to execute arbitrary
commands.
common web vulnerabilities
10: HTTP
o Using HTTP instead of HTTPS
o Protocol and Cipher Weaknesses: Older server versions may use outdated protocols or weak
encryption ciphers, increasing susceptibility to cryptographic attacks.