Anda di halaman 1dari 7

10

Ethical Hacking
(CEH Based)
HACKING
Learning With
Hack- Webserver, Website, Email, Wireless Network, Mobile …
Windows & Linux Based
Book Edition-1 (2013-2014)

MY OTHER COMPUTER NOTES:-


BASIC, MS-OFFICE, TALLY, DTP, WEB-DESIGNING,
HARDWARE, NETWORKING, MCITP, CCNA & OTHERS

Learning simply

Contact For any Other Computer Notes:-

E-Mail : kamleshmp@yahoo.com
Website : www.kamleshmp.webs.com
Facebook Link : www.facebook.com/kamleshmp

Created By: - Kamlesh Prajapati


1

Name:-_______________________ Batch Time:-_________

CEH Based
(Ethical Hacking)
Pg. Lecture Lecture
SYLLABUS TITLE No. Dates Days
1. Introduction of Hacking 1
2. Networking & Basics
3. Foot-printing
4. Google Hacking
5. Scanning
6. Windows Hacking
7. Linux Hacking
8. Trojans & Backdoors
9. Virus & Worms
10. Proxy Server & Packet Filtering
11. Denial of Service
12. Sniffer
13. Social Engineering
14. Physical Security
15. Steganography
16. Cryptography
17. Wireless Hacking
18. Firewall & Honeypots
19. IDS & IPS
20. Vulnerability Assessment
21. Penetration Testing
22. Session Hijacking
23. Hacking Web Servers
24. SQL Injection
25. Cross Site Scripting
26. Exploit Writing
27. Buffer Overflow
28. Reverse Engineering
29. Email Hacking
30. Incident Handling & Response
31. Bluetooth Hacking
32. Mobile Phone Hacking
33. Other Knowledge as Hacking
Created By: - KAMLESH PRAJAPATI
2

34. Hacking Resources


35. Hacking Descriptions

Note: - 1) This book is given by Mr. Kamlesh Prajapati to only Our Ethical Hacking Students
with Proper Information required to master This Subject, This Book is not for Published.
2) This book is Provide a Complete Theory & Practical Study of Your Course.
3) This Books All Practical’s is Examples of Company field.
5) Book Next Edition will release shortly

For More Ethical Hacking Practical Details Contact


Kamlesh Prajapati:-
E-Mail:- kamleshmp@yahoo.com ,
Website: - www.kamleshmp.webs.com
Facebook Account: - www.facebook.com/kamleshmp

Created By: - KAMLESH PRAJAPATI


3

INTRODUCTION TO ETHICAL HACKING

Hacking is the art of exploiting computers to get access to otherwise unauthorised information. Now
that the world is using IT systems to gather, store and manipulate important information there is also a
need to make sure that data is secure. However, no system is without its problems. Holes are often
present within security systems which, if exploited, allow hackers to gain access to this otherwise
restricted information.

Hacker is someone who seeks and exploits weaknesses in a computer system or computer network.
Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge

Hacking Start from Year 1970.

Kevin Mitnick (Black Hacker)


(born October 6, 1963)
Probably the most famous hacker out there for the main public, also the
first person to serve time in prison for committing computer crimes five
years in total. He started hacking at 12 years old, using social
engineering. In high school he picked up phreaking, and soon was
notorious in the phreaking scene. Now, in 2007, Kevin is a professional
security consultant with Mitnick Security Consulting, LLC. He also co-
authored a few books on computer security and social engineering.

Three Types of Hacker:

Black hat
A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness
or for personal gain". Black hat hackers form the stereotypical, illegal hacking groups often portrayed in
popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat
hackers break into secure networks to destroy data or make the network unusable for those who are
authorized to use the network.

White hat
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system
or while working for a security company which makes security software. The term "white hat" in
Internet slang refers to an ethical hacker.

Grey hat
A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may surf
the internet and hack into a computer system for the sole purpose of notifying the administrator that
their system has a security defect, for example. Then they may offer to correct the defect for a fee.

Created By: - KAMLESH PRAJAPATI


4

Steps of Hacking: -

Information Gating
 Port no.
 IP (Static Dynamic)
 Protocol
 Mac Address…

Scanning
 Port no. : ?
 IP (Static Dynamic) : ?
 Protocol : ?
 Mac Address : ?…

Vulnerability Intelligence
 Port no. : 110 (25 Open)
 IP (Static/Dynamic) : 56.36.35.6

Getting Access
 Installing Virus
 Installing Trojans
 Installing Malware

Covering Trackers
 Delete All Log Files
 Delete Coverage area
 Delete Session time

Created By: - KAMLESH PRAJAPATI


5

Security Principal
A principal in computer security is an entity that can be
authenticated by a computer system or network. It is referred to
as a security principal in Java and Microsoft literature.

C : Confidentiality
I : Integrator
A : Authenticity

Security Components
The Security Component creates an easy way to integrate tighter security in your application. An
interface for managing HTTP-authenticated requests can be created with Security Component.

 Authentication: It is for Verifying a Person Identity.


 Authorization: Controlling Access to resources.
 Privacy: Protecting confident-city of Information.
 Integrality: Validating that’s information was not change.
 Availability: Providing redundancy for security.
 Threat: Threat is the existing error for existing warning.
There are two types of Threat:
1. External Threat: External Threat someone outside your Network.
2. Internal Threat: Internal Threat someone inside network it creating Threat.
 Vulnerabilities & Exphorits : A Vulnerabilities a basically a wickless in either the funcinally
a security of a system protocols.
An Exphorits is a method of a log person to take the advantages of Existing of System.

Created By: - KAMLESH PRAJAPATI


6

**ETHICAL HACKING DESCRIPTIONS***


Full Forms:-

PC Personal Computer
CEH Certified Ethical Hacker

For More Ethical Hacking Practical Details Contact


Kamlesh Prajapati:-
E-Mail:- kamleshmp@yahoo.com ,
Website: - www.kamleshmp.webs.com
Facebook Account: - www.facebook.com/kamleshmp

Created By: - KAMLESH PRAJAPATI

Anda mungkin juga menyukai