01 - Introduction To Ethical Hacking
01 - Introduction To Ethical Hacking
By Sandeep Kumar
Insta @admirerr_20
I want to thank you and congratulate you for downloading the Notes, “Hacking
Society: Be where the world is going.”
LinkedIn: https://www.linkedin.com/company/66766392/
Instagram: https://www.instagram.com/hackittech/
Facebook: https://www.facebook.com/hackittech.officials
Twitter: https://www.twitter.com/hackit_tech
Telegram: https://t.me/hackittech
By Sandeep Kumar
Insta @admirerr_20
What is Hacking
Ethical Hacking
By Sandeep Kumar
Insta @admirerr_20
Why?
* To uncover vulnerabilities
Type of Hackers
Black hat
Black hats are hackers who use their knowledge and skills to
discover and exploit security vulnerabilities for financial
gain or malicious reasons. Their activities can cause major
damage to their targets and their systems. Black hats are
usually involved with criminal activities such as stealing
personal and financial information or shutting down
websites and networks.
By Sandeep Kumar
Insta @admirerr_20
White hat
White hats are ethical hackers who use their knowledge and
skills to improve security of a system by discovering
vulnerabilities before black hats do. They pretty much use
the same methods and tools black hats do, but unlike black
hats, white hats have a permission of the system owner to use
those methods.
Grey hat
Grey hats are hackers who are not as bad as black hats, but
also not as ethical as white hats. They might help black hats
in their endeavors, but they also might help in discovering
vulnerabilities or checking the limitations of a system.
Suicide hackers
Script kiddies
Script kiddies are hackers who are new to hacking and don’t
have much knowledge or skills to perform hacks. Instead,
they use tools and scripts developed by more experienced
hackers.
By Sandeep Kumar
Insta @admirerr_20
Cyber terrorists
Hacktivists
By Sandeep Kumar
Insta @admirerr_20
Terminologies
By Sandeep Kumar
Insta @admirerr_20
Brute force attack − A brute force attack is an automated and
the simplest kind of method to gain access to a system or
website. It tries different combination of usernames and
passwords, over and over again, until it gets in.
By Sandeep Kumar
Insta @admirerr_20
DDoS − Distributed denial of service attack.
By Sandeep Kumar
Insta @admirerr_20
Logic bomb − A virus secreted into a system that triggers a
malicious action when certain conditions are met. The most
common version is the time bomb.
By Sandeep Kumar
Insta @admirerr_20
Rootkit − Rootkit is a stealthy type of software, typically
malicious, designed to hide the existence of certain processes
or programs from normal methods of detection and enable
continued privileged access to a computer.
By Sandeep Kumar
Insta @admirerr_20
entity without the consumer's consent, or that asserts control
over a computer without the consumer's knowledge.
By Sandeep Kumar
Insta @admirerr_20
Worms − A worm is a self-replicating virus that does not
alter files but resides in active memory and duplicates itself.
By Sandeep Kumar
Insta @admirerr_20
Phases of Hacking
By Sandeep Kumar
Insta @admirerr_20
Scanning:- It involves taking the information discovered
during reconnaissance and using it to examine the network.
Tools that a hacker may employ during the scanning phase
can include dialers, port scanners, network mappers,
sweepers, and vulnerability scanners. Hackers are seeking
any information that can help them perpetrate attack such
as computer names, IP addresses, and user accounts.
By Sandeep Kumar
Insta @admirerr_20
Maintaining Access:- Once a hacker has gained access, they
want to keep that access for future exploitation and attacks.
Sometimes, hackers harden the system from other hackers or
security personnel by securing their exclusive access with
backdoors, rootkits, and Trojans. Once the hacker owns the
system, they can use it as a base to launch additional
attacks. In this case, the owned system is sometimes referred
to as a zombie system.
By Sandeep Kumar
Insta @admirerr_20
Security Policies
Access Control Policy
By Sandeep Kumar
Insta @admirerr_20
Information protection policy is a document which provides guidelines
to users on the processing, storage and transmission of sensitive
information. Main goal is to ensure information is appropriately
protected from modification or disclosure. ... It should define sensitivity
levels of information.
Physical security
Is the protection of personnel, hardware, software, networks and data
from physical actions and events that could cause serious loss or
damage to an enterprise, agency or institution. This includes protection
from fire, flood, natural disasters, burglary, theft, vandalism and
terrorism.
1. Security Controls
Physical
Technical
Administrative
By Sandeep Kumar
Insta @admirerr_20
These three broad categories define the main objectives of proper
security implementation. Within these controls are sub-categories that
further detail the controls and how to implement them.
2. Physical Controls
3. Technical Controls
Encryption
Smart cards
Network authentication
Access control lists (ACLs)
File integrity auditing software
By Sandeep Kumar
Insta @admirerr_20
4. Administrative Controls
Penetration Testing
• Penetration Testing is a method of evaluating the security of an
information system or network by simulating an attack to
• find vulnerability
• Security Measures
Need?
1)Identification of threats
By Sandeep Kumar
Insta @admirerr_20
Types of Pentesting:
By Sandeep Kumar
Insta @admirerr_20
Advantages of Black Box Penetration Testing
White box penetration testing examines the code coverage and does
data flow testing, path testing, loop testing, etc.
By Sandeep Kumar
Insta @admirerr_20
Advantages of White Box Penetration Testing
It ensures that all logical decisions have been verified along with
their true and false value.
It finds the design errors that may have occurred because of the
difference between logical flow of the program and the actual
execution.
As the tester does not require the access of source code, it is non-
intrusive and unbiased
By Sandeep Kumar
Insta @admirerr_20
Standards and Compliances
2) ISO/IEC 27001:2013
By Sandeep Kumar
Insta @admirerr_20
• SECTION 66 B – Smuggling goods
• SECTION 71 - Misrepresentation
By Sandeep Kumar
Insta @admirerr_20
Hello Everyone I hope you like the course content … but the thing is if you want to do
something great you need to learn more and more everyday … This training is totally FREE
of Cost the only thing I want from you guys is your time and efforts towards this training.
I wish you the best in your future endeavors, Happy Hacking
By Sandeep Kumar
Insta @admirerr_20