UPDALOAD hari
UPDALOAD hari
Powered by
Manoj Kumar
Koravangi
Founder & CEO
www.awetecks.com | www.skillsuprise.com
Leading Software Development Company
Leading Ed-Tech
Certified
Ethical Hacker
DSP Officers Training
(Andhra Pradesh)
Best Service Provider In Education
At The Global Business & Education Awards 2023
I like your way of teaching sir because But now this training gave me the Sir explanation is very good that it
Anyone with zero knowledge can also confidence that I have ability of makes easy to understand the concept
understand your teaching. developing websites
03 Data Science
04 Blockchain
06 UI/UX Development
07 App Development
Areas of Expertise
08 Internet of Things - IoT
09 Cloud Computing
10 Software Testing
11 Digital Marketing
12 Product Management
14 Enterpreneurship
15 www.reallygreatsite.com
Business Analytics
37%
NASSCOM predicts that
3 million cybersecurity
professionals
Job Roles
• Ethical Hacker • Security Consultant
• Cyber security analyst • Security auditor
• Security Engineer • Network security Engineer
• Security Analyst • Malware Analyst
• Soc analyst • Vulnerability Assessor
• Penetration Tester • Network Administrator
Growth of Cyber
security
Everyone
All the businesses is investing
are going online in across the globe
by connecting
Technology
to remove the barriers of businesses being limited to a geographic coverage
Things happening over the internet in 1 minute
Internet is a place of Billions of
Users Data
Internet Usage
Traditional Wars
Information Warfare
When a war is started by destroying an organization, company or
the government by destroying the information systems
Ie computers, satellites, networks etc
To Secure companies and individuals from hackers,
Companies are hiring ethical hackers
Roadmap
1
Roadmap
1 2 3
1. Learn the fundamentals
• Learn how websites, servers, networking devices work
• how they communicate to share information
• Tools used by hackers
• Techniques used by hackers
• Steps followed by hackers
• Rules and regulations
• How to protect ourselves from hackers
2. Get Certified
• Certificates are the major means of identifying
individual talents.
• They prove that you learned skills with industry
standards.
2. Web technologies
3. Programming languages
4. Networking
5. Creative thinking
Operating Systems
Should i learn IOS
Windows OS
to hack microsoft ?
IOS
Operating Systems
• Different companies use different operating systems
• Servers and systems run over different operating systems in different companies based on
their needs and concerns.
• You need to adapt to different working environments and operating systems
• To understand the working of the servers, communication devices and be able to easily
hack into it
Web Technologies
The languages and tools that are used to build websites are called web technologies
Web Technologies
• Websites are the major means of online presence of businesses.
Front end
Functionalities Backend Logics Data Operations
Programming Languages
• PHP • Java Script • Ruby • Bash
• SQL • Python • Perl • C/C++
Is Programming Mandatory ?
A beginners Mis-conception
• The skills of an ethical hacker should not be limited to the above list.
Being an ethical hacker, To beat a hacker you must think like a hacker.
The more knowledgeable you are, the more advantageous it will be for you.
What is Hacking ?
Accessing computer systems, mobiles, networks,
websites or any devices without permission
Hall
Kitchen
Bed Room Master Bed Room
Hall
Kitchen
Bed Room Master Bed Room
Hall
Kitchen
Bed Room Master Bed Room
Hall
Kitchen
Bed Room Master Bed Room
Hall
Kitchen
9999
9999
House Laptop / Smartphone
Thief Hacker
Taking away valuable resources stealing valuable resources
without permission without permission from
computing devices
Stealing Hacking
A breakable entry point in the A breakable entry point in the
house that allowed thief to system that allows hackers to
enter inside it enter inside it or gain access to it
Hacker
A person who uses his technical skills such as
programming, computing, networking to gain
Un-authorized access to devices, networks and
servers etc
As Per Indian IT Act 2000
An activity is termed as hacking. If
7. Elite hackers
8. Script kiddies
3 Most Important
Types of Hackers
Black Hat Hackers
• They are the bad guys.
• They hack professional games & information of the people .
• These guys are essentially criminals
• They practice un ethical hacking.
White Hat Hackers
• They are the good guys.
• They help organizations and individuals in testing and
strengthening the security of the systems, websites, network’s
• They are also called as security professionals or ethical hackers
• They practice ethical hacking
Grey Hat Hackers
• They are partly white hats and black hats.
• They work for personal gain.
• They shift from white hat to black hat and vice versa based on
their needs and situations.
1 Information gathering
2 Vulnerability analysis
5 Clearing traces
Information Gathering
• Gathering as much information as possible about the target
• The target might be a website, system company, organization or even a human being
Information Gathering
• The basic working of various features of the website
Free Food
Get Refund
Information Gathering
• The basic working of various features of the website
Hi sir do you have any rooms for rent? I’m sorry I’m living with my family we don’t
have any rooms for rent
Passive Information Gathering
Maltego
• Open Source Intelligence Tool (OSINT)
• 4 Editions of Maltego
Describe during installation process
Vulnerability Analysis
■It is analysing the information gathered about the target
■We should analyse the information to find number of vulnerabilities present
in the target
■To figure out the possible ways to enter into the systems
House Theft
ZAP (Zed Attack Proxy)
• Formerly known as OWASP Zap
• Open source web application security scanner
Penetration testing & Gaining Access
• It is analyzing the information gathered about the target to gain access
• We should analyze the information to find the easiest ways possible to enter into
the systems
Kitchen Hall
Burpsuite
• Web application penetration testing tool
Privilege Escalation
• The process of transforming oneself from a normal user into an admin
Electric fencing
■KGF
Garuda’s Palace
KGF Tunnel
Garuda’s Palace
Privilege Escalation
Clearing traces
Clearing Traces
• Clears all traces ie digital footprints like ip address, comments , likes
Black Bo Testing
6 Weeks Online Training Program
What is Linux ?
• Linux is an operating system
• In fact, one of the most popular platforms on the planet
• Just like Windows, iOS, and Mac OS, Linux is an operating system and Android is powered by Linux.
Why Linux ?
• Linux is open source
• The freedom to run the program, for any purpose.
Back Boxmake
Testing Grey Box Testing
• You can read the source code and change it to it do what you wish.
• The freedom to redistribute copies so you can help your neighbor.
• You can share copies of your modified versions to others.
Linux is an operating system that is by the people, for the people. These are also a main factor in why
many people choose Linux. Its about freedom and freedom of use and freedom of choice.
Distributions
• These versions are called distributions (or, in the short form, “distros”).
1. Kali Linux
2. BackBox
3. Parrot Security
4. DEFT Linux
5. Samurai Web Testing Framework
6. Network Security Toolkit
7. BlackArch Linux
Grey Box Testing
8. Cyborg Hawk Linux
9. Gnack Track
10. NodeZero
• It is also designed to provide vulnerability assessment and mitigation, computer forensics and anonymous
Web browsing
• This OS is known for being highly customisable and for its strong community support.
In terms of GPU, it requires a graphical card, While it does not need a graphical acceleration, hence no
2.
as it needs graphical acceleration. graphic card is needed.
It requires about 20 GB free space for
3. While it requires about 16 GB free space for installation.
installation.
Its interface follows the Gnome desktop While its interface is built the Ubuntu-Matte-Desktop-
4.
interface. Environment.
It does not have pre-installed compilers and While it comes pre-installed with a bunch of compilers and
5. Grey Box Testing
IDEs. IDEs.
6. It has a simpler user interface. While it has a much better user interface.
It has heavyweight requirements and is a bit
7. While it is very lightweight and doesn’t lag much.
laggy.
While it has all the tools that are available in Kali and also
8. It has all basic tools needed for hacking.
adds its own tools. Ex. AnonSurf, Wifiphisher, Airgeddon.
www.acertifiedethicalhacker.com Copyright © AWETECKS All rights reserved
6 Weeks Online Training Program
•/boot/: Kali Linux kernel and other files required for its early boot process
•/run/: volatile runtime data that does not persist across reboots (not yet included in the FHS)
•/usr/: applications (this directory is further subdivided into bin, sbin, lib according to the same logic as in the root directory)
Furthermore,
•/var/: variable data handled by daemons. This includes log files, queues, spools, and caches.
User :
• A user is the owner of the file.
• By default, the person who created a file becomes its owner.
• Hence, a user is also sometimes called an owner.
Group
• A user- group can contain multiple users.
• All users belonging to a group will have the same access permissions to the file.
Suppose you have a project where a number of people require access to a file. Instead of manually assigning
permissions to each user, you could add all users to a group, and assign group permission to file such that only this
group members and no one else can read or modify the files.
Other
• Any other user who has access to a file. This person has neither created the file, nor he belongs to a usergroup
who could own the file.
www.acertifiedethicalhacker.com Copyright © AWETECKS All rights reserved
6 Weeks Online Training Program
User Denotations
u user/owner
g group
o other
a all
Read: This permission give you the authority to open and read a file. Read permission on a directory gives you the
ability to lists its content.
Write: The write permission gives you the authority to modify the contents of a file.
• The write permission on a directory gives you the authority to add, remove and rename files stored in the directory.
• Consider a scenario where you have to write permission on file but do not have write permission on the directory
where the file is stored. You will be able to modify the file contents. But you will not be able to rename, move or
remove the file from the directory.
Execute:
• In Windows, an executable program usually has an extension ".exe" and which you can easily run.
• In Linux, you cannot run a program unless the execute permission is set.
• If the execute permission is not set, you might still be able to see/modify the program code(provided read & write
permissions are set), but not run it.
User Denotations
Operator Description
+ Adds a permission to a file or
directory
- Removes the permission
= Sets the permission and
overrides the permissions set
earlier
• In the symbolic mode, you can modify permissions of a specific owner. It makes use of mathematical symbols
to modify the file permissions.
Add User
• adduser username
Delete User
• userdel username
Create group
• sudo groupadd groupname
Delete a group
• sudo groupdel groupname Grey Box Testing
@manojkoravangi