22dit073 PPT
22dit073 PPT
Types of attacks in
Ethical Hacking
Presented By:
22DIT073
Guided By:
Prof. Shital Sharma
Introduction to
Ethical Hacking
Ethical hacking is the practice of legally and
responsibly penetrating computer systems and
networks to identify vulnerabilities that could be
exploited by malicious actors. This knowledge is
used to strengthen security and protect organizations
from potential cyber threats.
Types of Attacks in Ethical Hacking
Passive Attacks Active Attacks Social Engineering
Gather information Involve directly interacting Manipulate people into
without directly interacting with the target system, like revealing sensitive
with the target system, exploiting vulnerabilities information or performing
such as reconnaissance or launching denial- of- actions that compromise
and scanning. service attacks. security.
Reconnaissance Attacks
1 Information 2 Footprinting
Gathering Gather information
Collect data about about an
the target system, organization's
including network infrastructure,
details, open ports, employees, and
and running online presence.
services.
3 Vulnerability Identification
Analyze the collected data to identify potential
weaknesses in the target system.
Scanning and Enumeration
Attacks
1 Port Scanning
Identify open ports and running services on the
target system.
2 Vulnerability Scanning
Scan the target system for known
vulnerabilities and potential entry points.
3 Enumeration
Gather detailed information about the target
system, such as user accounts, shared
resources, and system configurations.
Vulnerability Exploitation
Attacks
Exploit Development Privilege Escalation
Create custom code or use Gain higher levels of access
existing exploits to take and control within the target
advantage of vulnerabilities in system.
the target system.
Phishing
Trick users into revealing sensitive information or performing actions
that compromise security.
Pretexting
Fabricate a plausible scenario to gain the trust of the target and extract
sensitive information.
Baiting
Leave physical media (e.g., USB drives) containing malware in a public
area to be discovered and used by the target.
Wireless Attacks
Attack Description