Intro To Ethical Hacking
Intro To Ethical Hacking
Bachelor
Of
Computer Application
Under the supervisor of
Ms. Bhawna Sharma
By
Kanak Sharma
20-BCA-16
i
DECLARATION
Kanak Sharma
Date- ________ 20-BCA-16
ii
CERTIFICATE
iii
ACKNOWLEDGEMENT
First of all, I thank my Lord and God who has made me what I have
been. I thank him for the Salvation he has given me and also for
making me know the right way to go and be in the Kingdom of God.
Place
Shimla
iv
About the company: Thinknext Technologies
v
Table of Contents
vi
LIST OF FIGURES
4. Scanning Methodology 18
5. Network Mapping 21
6. NMap 24
vii
Introduction
The countries are always alert about each other’s movements even
in cyberspace. With even small conflicts, many use their
intelligence team to hack into the country’s server for information.
1
Chapter 1:
Ethical Hacking
Hacker
Types of Hackers
• White Hat hackers are also known as Ethical Hackers. They never
intent to harm a system, rather they try to find out weaknesses in
a computer or a network system as a part of penetration testing
and vulnerability assessments.
•Black Hat hackers, also known as crackers, are those who hack
in order to gain unauthorized access to a system and harm its
operations or steal sensitive information.
2
• Black Hat hacking is always illegal because of its bad intent
which includes stealing corporate data, violating privacy,
damaging the system, blocking network communication, etc.
• Grey hat hackers are a blend of both black hat and white hat
hackers. They act without malicious intent but for their fun, they
exploit a security weakness in a computer system or network
without the owner's permission or knowledge.
• Email Hacking
• Social engineering
• System hacking
• Software Hacking
3
Ethical Hacking Terminologies
4
Fig. 1.1 – DDOS Attack
5
Career in Ethical Hacking
1) Network administrator/manager
2) Security investigator
3) Penetration tester
7) IT security administrator/consultant/manager
6
Chapter 2:
Kali Linux
Key Features: -
• Free of cost
• Multi-language support
7
Professionals that use Kali Linux
8
by a Black Hat Hacker to compromise an organization or
individual.
• Grey Hat Hackers- Grey Hat Hackers, lie in between
White Hat and Black Hat Hackers. They will utilize Kali Linux
in the same methods as the two listed above.
4) USB Boot Disc- Utilizing Kali Linux’s ISO, a boot disc can be
created to either run Kali Linux on a machine without actually
installing it or for Forensic purposes.
9
5) Windows 10 (App)- Kali Linux can now natively run on
Windows 10, via the Command Line. Not all features work yet as
this is still in beta mode.
10
Chapter 3:
11
• Port 3389- Remote Desktop. Utilized to exploit various
vulnerabilities in remote desktop protocols, as well as weak
user authentication. Remote desktop vulnerabilities are
commonly used in real world attacks, with the last example
being the BlueKeep vulnerability.
12
2) Operating System:
3) Essential Tools:
13
Chapter 4:
14
Phases of Ethical Hacking
15
Scanning
Types of Scanning:
• Network Scanning
• Port Scanning
• Vulnerability Scanning
• Free IP Scanner
• IP Address Manager
• PRTG Network Monitor
16
• Angry IP Scanner
• IP Scanner by Spiceworks
• Network Scanner
• Advanced IP Scanner
• IP Range Scanner
• ZenNMAP
• Netdiscover
• Nessus
• Nikto
• OpenVAS
• Angry IP scanner
• Nmap
• Qualys FreeScan
Port Scanning
17
valuable for testing network security and the strength of the
system's firewall. Due to this functionality, it is also a popular
reconnaissance tool for attackers seeking a weak point of access
to break into a computer.
3) Unicornscan ip
18
Chapter 5:
Network Mapping
19
• Advanced IP Scanner A suite of network exploration
tools, including a port scanner as well as an IP scanner, that
has more than 53 million users. Installs on Windows.
• Angry IP Scanner A free network address monitoring
utility that includes IP management functions and a port
scanning service. Available for Windows, macOS, and Linux.
• Free IP Scanner by Eusing this tool searches a network,
working through each IP address in a given range, reporting
on whether or not that address is in use. It can also be used
as a port scanner. Runs on Windows.
• NetCat A network data management utility that has IP
address usage detection and a port scanning option. This is
an old utility but there are many clones available for
Windows, macOS, and Linux.
• LanSweeper IP Scanner. This is a network device
discovery tool that reports on attributes of discovered
equipment, including the IP addresses assigned to them.
Installs on Windows.
• MyLanViewer Network/IP Scanner A network scanner
that reconciles discovered IP addresses to DHCP records.
Runs on Windows.
• Slitheris Network Discovery This tool delivers detailed
information on every device connected to the network. This
includes IP address information. Installs on Windows.
20
Open Source Network Mapping For Linux
• Nmap
• EtherApe
• Netdiscover
• Masshandra
• OpenNMS
• Nwdiag
• Bruteshark
• Nagios Core
21
Chapter 6:
Penetration Testing
22
Types of Pen Testing
Nmap
Features in NMap
25
NETWORK PENETRATION TESTING
26