Ethical Hacking: Bachelor of Technology (B.Tech.)
Ethical Hacking: Bachelor of Technology (B.Tech.)
A Seminar Report
MEGHA GOYAL
( 13EIACS052)
April - 2017
i
ACKNOWLDGEMENT
It is with deep sense of gratitude and reverence that I express my sincere thanks to
my highly respectable supervisor Mr. Shadab Ali & Dr. Rohit Singhal . He has
played a pivotal role for my guidance, encouragement, help and useful suggestion
throughout. His untiring and painstaking efforts, methodological approach and
individual help made it possible to complete this work in time. I consider myself
very fortunate for having been associated with the supervisor like him. His affection,
guidance and scientific approach served a veritable incentive for completion of this
work.
I would like to thank our Chairman Dr. V. K. Agarwal, Executive Director Dr. Manju
Agarwal, for providing all the facilities and working environment in the Institute.
I would like to thank our Principal Prof. (Dr.) Anil Kumar Sharma for their
valuable suggestions for carrying out my Dissertation work.
I would like to express my genuine gratitude to Dr. Rohit Sighal, HOD (CSE) for
their valuable suggestions and advices in carrying out this work.
I also like to thank entire institute faculty who helped me directly or indirectly to
complete my Dissertation work. I would specially like to thank my family and
friends for their sincere interest in my work and their moral support.
Megha Goyal
13EIACS052
Department: Computer Science
ii
CANDIDATE’S DECLARATION
I hereby declare that the work presented in this seminar report titled, “Ethical Hacking”
submitted by me in the partial fulfillment of the requirement of the award of the degree of
Bachelor of Technology (B.Tech.) Submitted in the Department of Computer Science &
Engineering, Institute of Engineering & Technology, Alwar, , is an authentic record of
my project work carried out under the guidance of (Supervisors name and affiliation)
Megha Goyal
13EIACS052
iii
SUPERVISOR’S CERTIFICATE
It is to certify that the Project entitled “Ethical hacking” which is being submitted by Ms.
the requirement for the award of the degree of Bachelor of Technology (B.Tech.), is a record of
bonafide project work carried out by him/her under my/ our guidance and supervision. The
matter presented in this project report has not been submitted either in part or full to any
Signature Signature
Dr. Rohit Singhal Mr. Shadab Ali
iv
TABLE OF CONTENTS
Name of Contents ............................................................................................................. Page No.
Acknowledgement ii
Candidate declaration iii
Supervisor declaration iv
List of Figures v
Abstract ...........................................................................................................................................1
1: Introduction ..............................................................................................................................3
1.1 Security ............................................................................................................................3
1.2 Integrity ............................................................................................................................3
1.3 Need for Security .............................................................................................................4
2: Hacker .......................................................................................................................................5
2.1 Types of hacker ................................................................................................................4
3: Ethical Hacking ........................................................................................................................9
3.1 Analogy with Building Robbing ......................................................................................9
3.2 Methodology of Hacking .................................................................................................9
3.3 Phases of Hacking ..........................................................................................................10
4: Reconnaissance.......................................................................................................................13
4.1 Google ............................................................................................................................13
4.2 Sam spade ......................................................................................................................14
4.3 Email tracker and Visual route ......................................................................................14
5: Scanning and Enumeration ...................................................................................................16
5.1 War dialings ...................................................................................................................16
5.2 Pinger .............................................................................................................................16
5.3 Port scanning ..................................................................................................................17
5.4 Super scan ......................................................................................................................17
5.5 Network Mapper ............................................................................................................18
5.5 Enumeration ...................................................................................................................18
6: System Hacking ......................................................................................................................20
6.1 Password cracking .........................................................................................................20
6.2 Loft Crack ......................................................................................................................21
6.3 Privilege Escalation .......................................................................................................21
6.4 Meta spoilt .....................................................................................................................22
6.5 Man in the Middle Attack ..............................................................................................22
7: Maintaining Access .................................................................................................................23
7.1 Key stroke loggers .........................................................................................................23
7.2 Trojan Horses & Backdoors...........................................................................................23
7.3 Wrappers ........................................................................................................................24
8: Elite Wrap...............................................................................................................................25
8.1 Clearing Tracks ..............................................................................................................25
8.2 Win Zapper ....................................................................................................................25
v
9. Ethical hacking tools and methods…………………………………………………………28
10.Conclusion…………………………………………………………………………………34
11: Reference ................................................................................................................................35
vi