Ethical Hacking: Click To Edit Master Subtitle Style

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 26

Ethical Hacking

Niken DwiClick to edit Master subtitle style Wahyu Cahyani ST. Mkom., CCSO., CEH Ian Harisman Moderator: Gandeva Bayu ST., CCNA

6/4/12

6/4/12

CEHv7 Outline
1 2 3 4 5
6/4/12

Footprinting and Reconnaisanc Scanning e Networks Enumeration System Hacking Trojan and Backdoors

6 7 8 9 1 0

Viruses and Worms Sniffers Social Enginineering Denial of Service Session Hijacking

CEHv7 Outline
1 1 1 2 1 3 1 4 1 5 6/4/12
Hacking Webservers Hacking Web Applications SQL Injection Hacking Wireless Networks IDS, Firewalls and Honeypots

1 6 1 7 1 8

Buffer Overflows Cryptography Penetration Testing

EC-Council Certification Program


Security5 Certified E-Business Professional EC-Council Certified Security Specialist (ECSS) EC-Council Network Security Administration Certified(ENSA) Hacker Ethical (CEH) Computer Hacking Forensic Investigator 6/4/12 (CHFI) EC-Council Disaster Recovery Professional (EDRP) EC-Council Certified Security Analyst (ECSA) EC-Council Certified

Secure Programmer (ECSP) Certified Secure Application Developer (CSAD) Licensed Penetration Tester (LPT) Master of Security Science (MSS)

EC-Council Certification Program

6/4/12

Lets Start Hacking!

6/4/12

Website Deface Attack Statistic

The top rank Attack Methods: file 6/4/12 inclusion, sql injection, webdav

Internet Crime Curent Report: IC3

6/4/12

Why Attack Are Increasing

6/4/12

Hacker Classes

6/4/12

What Does a Hacker Do?

6/4/12

Footprinting & Reconnaissance

6/4/12

Footprinting & Reconnaissance

6/4/12

Footprinting &Reconnaissance
Footprinting Methodology

6/4/12

Inter Com net pet Foot itiv Net e WHO pri DNS nti Foot Intell wo IS ng pri ige rk Foot Web nti Goo Foot nt pri E-

Footprinting & Reconnaissance

Example:

Ping EmailTracerPro SmartWhois

6/4/12

Scanning
Types of Scanning

6/4/12

Scanning

Example:

Nmap Advanced IP Scanner Amap CurrPorts Nessus

6/4/12

System Hacking: Goals


Hacking-Stage
Gaining Access

Goal
To collect enough information to gain access

Technique/Explo it Used
Password eavesdropping, brute forcing Password Cracking, known exploits

Escalating Priviliges To create a privileged user account if the user level is obtained Executing Applications Hiding Files Covering Tracks
6/4/12

To create and maintain backdoor access To hide malicious files

Trojans

Rootkits

To hide the presence Clearing logs of compromise

CLOSING

6/4/12

Top 5 IT Security Certifications for 2011


Based by scanning job boards and interviewing IT security recruiters and employers: * Vendor Certifications * CISSP: Certified Information Systems Security Professional * CEH: Certified Ethical Hacker * 6/4/12 CISM: Certified Information

Survey Result
Salaries for IT security professionals are expected to increase by more than 4% in 2011, according to a survey by Robert Half International. Data security analyst is expected to increase by 4.5% Systems security administrator is expected to jump 4.0% 6/4/12 Network security administrator,

IT Security Related Position and Salary Ranges

* Source: 6/4/12 http://www.securityweek.com/it-salary-guide-shows-increase-salaries-

Average CEH Salary Ranges by Country United States ranges from $56,930 to $82,424 Canada ranges from C$62,288 and C$74,000 (approximately $64,387 to $76,400).
6/4/12 U.K., the average salary range is

6/4/12

Daftar Pustaka

Modul CEH EC-Council

6/4/12

You might also like