[go: up one dir, main page]

0% found this document useful (0 votes)
16 views44 pages

Module 4

Uploaded by

Sayan Deep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views44 pages

Module 4

Uploaded by

Sayan Deep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

MODULE-4

Introduction to Ethical Hacking


Introduction to Ethical Hacking
Types of Hacking

We can define hacking into different categories, based on what is being hacked. These are as
follows:
1.Network Hacking, 2.Website Hacking, 3. Computer Hacking, 4.Password Hacking, 5.Email
Hacking
Foot printing and Reconnaissance
Scanning Networks

Scanning in ethical hacking is a network exploration technique used to identify the systems
connected to an organization’s network. It provides information about the accessible systems,
services, and resources on a target system. Some may refer to this type of scan as an active scan
because it can potentially disrupt services on those hosts that are susceptible. Scanning is often
used during vulnerability assessment when probing weaknesses in existing defenses.

There are two ways of scanning:


•Active Scanning
•Passive Scanning

Scanning is more than just port scanning, but it is a very important part of this process. Scanning
allows you to identify open ports on the target system and can be used for port mapping,
performing an interactive session with the operating system via those ports, or even redirecting
traffic from these open ports. There are many tasks that can be performed with a scanning tool.
Active Scanning
Active scanning is a type of network scanning technique that is used to gather information about
a target system or network. Unlike passive scanning, which only gathers information that is
readily available, active scanning actively interacts with the target system to gather information.

It involves sending requests or packets to a target system and analyzing the responses to gather
information about the target. This type of scanning is more aggressive and intrusive than passive
scanning and is often used to identify vulnerabilities and weaknesses in a target system or
network.

Passive Scanning
Passive scanning is a type of network scanning technique that is used to gather information
about a target system or network without actively interacting with the target. Unlike active
scanning, which sends requests or packets to the target and analyzes the responses, passive
scanning only gathers information that is readily available, such as information transmitted over
the network or stored in system logs.
It is used to gather information about a target system or network for a variety of purposes,
including network mapping, vulnerability assessment, and compliance testing. By analyzing
network traffic and system logs, passive scanning can provide valuable information about a
target’s infrastructure, servers, and devices, as well as the types of services and applications
that are running.
Types of network scanning for ethical hacking

Port scanning: Port scanning involves scanning a target system or network for open ports, which are
points of entry for network communication. Ethical Hackers can use port scanning to identify open ports
and determine what services or applications are running on those ports. It can help identify potential
vulnerabilities or misconfigurations that could be exploited.

There are several types of port scanning techniques used in ethical hacking to identify open, closed, or
filtered ports on a target system or network, such as:
System Hacking

System hacking is the process of exploiting vulnerabilities in electronic systems for the purpose
of gaining unauthorized access to those systems. Hackers use a variety of techniques and
methods to access electronic systems, including phishing, social engineering, and password
guessing.

Purpose of System Hacking:

Generally, the motive of the hackers behind System Hacking is gaining access to the personal
data of an individual or sensitive information belonging to an organization in order to misuse the
information and leak it which may cause a negative image of the organization in the minds of
people, Privilege Escalation, Executing malicious applications to constantly monitor the system.
3.
4.
5.

6.
Malware Threats
Sniffing
Sniffing Attack:

You might also like