0% found this document useful (0 votes)
36 views

Ethical Hacking: Bachelor of Technology (B.Tech.)

This document appears to be a seminar report on the topic of ethical hacking. It begins with an acknowledgements section and includes sections on different types of hackers, the methodology and phases of ethical hacking, reconnaissance techniques like Google searches and port scanning tools, hacking systems using techniques like password cracking and privilege escalation, maintaining access post-hacking using tools like key loggers and Trojans, and finally covering tracks to avoid detection. It discusses various hacking tools and methods used at different stages of the ethical hacking process and concludes by emphasizing the importance of security and ethical practices.

Uploaded by

mahendra goyal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

Ethical Hacking: Bachelor of Technology (B.Tech.)

This document appears to be a seminar report on the topic of ethical hacking. It begins with an acknowledgements section and includes sections on different types of hackers, the methodology and phases of ethical hacking, reconnaissance techniques like Google searches and port scanning tools, hacking systems using techniques like password cracking and privilege escalation, maintaining access post-hacking using tools like key loggers and Trojans, and finally covering tracks to avoid detection. It discusses various hacking tools and methods used at different stages of the ethical hacking process and concludes by emphasizing the importance of security and ethical practices.

Uploaded by

mahendra goyal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

ETHICAL HACKING

A Seminar Report

submitted in fulfilment of the

requirements for the award of the degree of

Bachelor of Technology (B.Tech.)


Submitted by

MEGHA GOYAL
( 13EIACS052)

Under the supervision of


Dr. Rohit Singhal & Mr. Shadab Ali

Department of Computer Science & Engineering

Institute of Engineering & Technology, Alwar (Raj.)

Rajasthan Technical University, Kota (Raj.)

April - 2017

i
ACKNOWLDGEMENT
It is with deep sense of gratitude and reverence that I express my sincere thanks to
my highly respectable supervisor Mr. Shadab Ali & Dr. Rohit Singhal . He has
played a pivotal role for my guidance, encouragement, help and useful suggestion
throughout. His untiring and painstaking efforts, methodological approach and
individual help made it possible to complete this work in time. I consider myself
very fortunate for having been associated with the supervisor like him. His affection,
guidance and scientific approach served a veritable incentive for completion of this
work.

I would like to thank our Chairman Dr. V. K. Agarwal, Executive Director Dr. Manju
Agarwal, for providing all the facilities and working environment in the Institute.

I would like to thank our Principal Prof. (Dr.) Anil Kumar Sharma for their
valuable suggestions for carrying out my Dissertation work.

I would like to express my genuine gratitude to Dr. Rohit Sighal, HOD (CSE) for
their valuable suggestions and advices in carrying out this work.

I also like to thank entire institute faculty who helped me directly or indirectly to
complete my Dissertation work. I would specially like to thank my family and
friends for their sincere interest in my work and their moral support.

Lastly, all the thanks belong to the Almighty.

Megha Goyal
13EIACS052
Department: Computer Science

ii
CANDIDATE’S DECLARATION
I hereby declare that the work presented in this seminar report titled, “Ethical Hacking”
submitted by me in the partial fulfillment of the requirement of the award of the degree of
Bachelor of Technology (B.Tech.) Submitted in the Department of Computer Science &
Engineering, Institute of Engineering & Technology, Alwar, , is an authentic record of
my project work carried out under the guidance of (Supervisors name and affiliation)

Megha Goyal

13EIACS052

iii
SUPERVISOR’S CERTIFICATE
It is to certify that the Project entitled “Ethical hacking” which is being submitted by Ms.

Megha Goyal to Institute of Engineering & Technology, Alwar in the fulfillment of

the requirement for the award of the degree of Bachelor of Technology (B.Tech.), is a record of

bonafide project work carried out by him/her under my/ our guidance and supervision. The

matter presented in this project report has not been submitted either in part or full to any

University or Institute for award of any degree.

Signature Signature
Dr. Rohit Singhal Mr. Shadab Ali

iv
TABLE OF CONTENTS
Name of Contents ............................................................................................................. Page No.

Acknowledgement ii
Candidate declaration iii
Supervisor declaration iv
List of Figures v

Abstract ...........................................................................................................................................1
1: Introduction ..............................................................................................................................3
1.1 Security ............................................................................................................................3
1.2 Integrity ............................................................................................................................3
1.3 Need for Security .............................................................................................................4
2: Hacker .......................................................................................................................................5
2.1 Types of hacker ................................................................................................................4
3: Ethical Hacking ........................................................................................................................9
3.1 Analogy with Building Robbing ......................................................................................9
3.2 Methodology of Hacking .................................................................................................9
3.3 Phases of Hacking ..........................................................................................................10
4: Reconnaissance.......................................................................................................................13
4.1 Google ............................................................................................................................13
4.2 Sam spade ......................................................................................................................14
4.3 Email tracker and Visual route ......................................................................................14
5: Scanning and Enumeration ...................................................................................................16
5.1 War dialings ...................................................................................................................16
5.2 Pinger .............................................................................................................................16
5.3 Port scanning ..................................................................................................................17
5.4 Super scan ......................................................................................................................17
5.5 Network Mapper ............................................................................................................18
5.5 Enumeration ...................................................................................................................18
6: System Hacking ......................................................................................................................20
6.1 Password cracking .........................................................................................................20
6.2 Loft Crack ......................................................................................................................21
6.3 Privilege Escalation .......................................................................................................21
6.4 Meta spoilt .....................................................................................................................22
6.5 Man in the Middle Attack ..............................................................................................22
7: Maintaining Access .................................................................................................................23
7.1 Key stroke loggers .........................................................................................................23
7.2 Trojan Horses & Backdoors...........................................................................................23
7.3 Wrappers ........................................................................................................................24
8: Elite Wrap...............................................................................................................................25
8.1 Clearing Tracks ..............................................................................................................25
8.2 Win Zapper ....................................................................................................................25

v
9. Ethical hacking tools and methods…………………………………………………………28
10.Conclusion…………………………………………………………………………………34
11: Reference ................................................................................................................................35

vi

You might also like