Ethical Hacking
Ethical Hacking
ETHICAL HACKING
Aakash jethani1, Ayush Saxena2, Shubham3, Mrs. Indu Khatri
1,2,3
Students, 4Assistant Professor(HOD)
Department of Computer Science Engineering
Bhagwan Mahaveer College Of Engineering And Management, Sonipat, India
ABSTRACT: -To present work is aimed to study the Ethical damaging the system etc.
Hacking, types of Ethical Hacking, Hackers and what rules
should they follow while doing it. So many people start 3. Grey Hat Hackers
learning hacking now-a-days for their good or bad They are blend of both black and white hackers. They do it
intensions and how we can protect us from threats. for their fun, they exploit a security weakness in a computer
system or network without taking the owner’s permission or
1. INTRODUCTION knowledge.
Whenever you listens the word hacking, you probably Types of Attacks in Hacking
associate it with sending an encrypted program to another
user, and then being able to get unauthorized access i.e. 1. Non-Technical Attacks
taking any permission on a remote computer. However, the Non-technical attacks basically it involve manipulating
name hacking was basically used to define any act of people to get their passwords, willingly or not. An example
tinkering a computer’s hardware or software other than its of this is by duping a co-worker to divulge passwords and
usernames. Another form of non-technical attack is simply
intended use, in order to upgrade it and find out how
walking into another person’s room booting the computer,
electronic devices can work electronically.
and then gathering all the information that you need – yes it
may sound like Tom Cruise and his mission impossible team,
Hackers Crackers but in actuality, these non-technical attacks are a serious part
Not illegal but depends Mainly associated in of hacking tactics.
upon in which manner stealing, breaking
2. Attacks on an Operating System
people use it. password, brute force Operating system attacks are one of the most frequent hacks
accounts, reverse performed per quota. Well, it’s simply a numbers game.
engineering. There are many computers out there and a lot of them don’t
Mainly focuses on Cracking is crime even have high level protection. There are a lot of protections
exploiting vulnerabilities because they are not in many operating systems – even the newest ones around
still have a few bugs that can be exploited. One of the way
on target system to taking permission for operating system attacks is password hacking or hacking
gaining access. into encryption mechanisms. Some hackers are just want to
Hacking is legal as it Illegal side of hacking. hack other people’s passwords just for the sheer thrill of it.
involves taking
permission on the first 3. Attacks on Applications
Applications, especially the ones online and the ones that
basic. deal with connectivity, get a lot of attacks. Examples of
which include web applications and email server software
2. TYPES OF HACKERS applications. Some of the attacks include spam mail. Spam
mail can carry code that can hack into your computer system.
1. White Hat Hackers Malware and malicious software are also another tool in the
White hat hackers are well known as ethical hacker. Their hands of a hacker when they try to attack pretty much
intension is not to harm a system; rather they try to find out everything, especially apps. These software programs include
the weakness in a opponent computer or a network system as Trojan horses, worms, spyware and any more. A lot of these
a part of penetration testing and vulnerability. It is not illegal. programs can gain entry into your computer system online
and get access.
2. Black Hat Hackers
They are also known as a cracker. They are those who hack Ethical Hacking Tools
in order to gain unauthorized, i.e. without taking permission, Hacking tools are applications designed to serve one or
access to a system and harm its operation or steal sensitive several specific purposes to hack/crack. These are used to
information. They are always illegal bas they have bad intent make complex hacking procedures, easy-to-use and
which includes stealing corporate data, violating privacy, nowadays, also offer good GUI(Graphical User Interface) to
4. Maintaining Access:
Hacker may just hack the system to show it was vulnerable
or he can be so bad that he wants to maintain or persist the
connection in the background without the knowledge of the
user. This can be done using malicious files such as Trojans,
Rootkits or many more. The goal is to maintain the access to
the target until he finishes the tasks he planned to accomplish
in that target.
5. Clearing Track:
No thief wants to get caught. An intelligent hacker always
clears all proof so that in the future, no one will get any
traces leading to him. It involves
modifying/corrupting/deleting the values of Logs, modifying
registry values and uninstalling all software that he used and
deleting all folders that he created.
2. Scanning:
Three types of scanning are involved:
* Port scanning: This phase involves scanning the victim for
the information such as open ports, Live systems, various