Ethical Hacking Using Kali Linux PDF

Summary

This document introduces ethical hacking using Kali Linux for educational purposes. It discusses cyber attacks, their types, and security measures. The document also includes practical exercises and examples through screenshots.

Full Transcript

2 Unit Two: on Ethical Hacking Using iz Kali Linux or H ht ig Br 1 Cyber Attack on...

2 Unit Two: on Ethical Hacking Using iz Kali Linux or H ht ig Br 1 Cyber Attack on iz or While Adam was watching TV with his family, a news report came on about a famous bank that had been hit by a serious cyber attack, H which led to its bankruptcy. Curious about what this meant, Adam decided to ask his computer science teacher the next day about what a cyber attack is and how people can protect themselves from it. Here’s how their conversation went: ht Teacher: “Cyber attack ​​ is one of the most dangerous and common electronic threats in light of the circumstances we live in. We rely heavily on electronic devices in various fields, and hackers seek ig to access these devices to carry out their illegal actions. This type of attack often targets computers.” Adam: “So, what is a cyber attack?” Br Teacher: “It is any attempt by individuals or groups to penetrate, sabotage, or obtain information from computer systems or networks illegally, and the matter can amount to an attempt to destroy the infrastructure of institutions.” Adam: “How can I protect myself and my friends from these attacks?” 40 Teacher: “There are several ways to stay safe. First, avoid opening suspicious messages or clicking on unfamiliar links. Hackers often send fake messages to trick you into giving away personal information, like your passwords.” For example, be careful with messages that ask for your personal on information. Imagine you get a message saying, ‘Hello Adam, I’m from Facebook and there was a problem with your login. Please send me your login details so I can fix it.’ This is a trick to steal your information. On a larger scale, protecting institutions is more complex because hackers might target their servers and iz data in many different ways.” Activity 1: or These messages arrived in Adam’s email. Which of these messages might be a way to hack Adam’s device? H 1 New Messages To : Adam cc : bcc : Subject : Congratulations! You’ve Won the Jackpot! ht Congrats! You’ve won the grand prize of $1,000,000! Click the link below to confirm your email and log in to start the process ig of receiving your prize. Click here to confirm Best regards, Br The Grand Prix Team Send 41 2 New Messages To : Adam cc : bcc : Subject : Assignment Reminder on Hello, I just wanted to remind you about the assignment that’s due next Monday. Please make sure to start working on it before the deadline. iz Best regards, Teacher William Send or H 3 New Messages To : Adam cc : bcc : ht Subject : Invitation to the Cybersecurity Conference Dear Valued Customer, We are excited to invite you to our Virtual Cybersecurity ig Conference on July 20. The conference will cover the latest updates and developments in the field of cybersecurity. To register, please click the link below: Br Click here to register Best regards, The Internet Security Team Send 42 Common Types of Cyber Attacks: 1 Malicious Software (Viruses): These are harmful programs from unknown or untrusted sources. They can include spyware or viruses that damage your system. Malicious software might on stop certain functions from working or completely disable your device. 2 Cyber Attack through Information Escalation: This is one of the most dangerous and widespread threats. It involves sending iz fraudulent messages via email that appear to be from a reliable source, tricking the victim to carry out unethical actions such as stealing credit card information or login data for social media 3 accounts. or Cyber Attack through Ransomware: These attacks involve malicious programs in which the hacker encrypts the victim’s H files and demands a ransom for decryption or threatens to publish the data. Note: The hacker does not actually possess the victim’s data ht but uses the threat of data exposure to extort the ransom. Cyber Attack via Man-in-the-Middle (MitM) Attack: Also known ig 4 as cyber-middle attacks, this type of attack involves the hacker intercepting communication between the victim and the Internet. This can be accomplished either by connecting Br the victim to an insecure network set up by the hacker or through malicious programs that grant the hacker access to the victim’s data. 43 Activity 2: In this activity, we will learn how to keep Windows updated to ensure device security and protect it from cyber threats. Companies work diligently to address security vulnerabilities and safeguard their systems against hackers. Microsoft provides on security updates for its systems on a monthly basis. 1 Click the Start button on the taskbar. iz or H ht 2 Click the Settings icon to open the Windows settings. ig Br 44 3 Click Update & Security. on iz 4 or Click Check for updates. H ht ig Br 45 5 Wait for the update to complete. on iz 6 or To install the update, click Restart now. H ht ig Br 46 7 Amazing! The update is complete, and your device is now more secure. on iz Activity 3: or In this activity, we will learn how to scan your computer using the H Avast Free Antivirus tool to ensure it is free of viruses. 1 Go to the search box on the taskbar, type Microsoft Store to search for the online store where you can download computer ht programs, and then click on the store. ig Br 47 2 In the search box, type the name of the program you will use to scan the computer for viruses: Avast Free Antivirus. on iz 3 or Click the search icon. H ht ig Br 48 4 Click Install. on iz 5 or Wait for the download to finish. A message will appear requesting permission for the program to make changes to the computer. Click OK. H ht ig Br 49 6 Go to the Start menu, where the application will appear at the top of the list, and click on it. on iz 7 or If the program requests a restart, click RESTART NOW. H Note: This step can be skipped if the program does not request a restart. ht ig Br 50 on iz 8 or Click RUN SMART SCAN. H ht ig Br 51 9 Wait for the scan to complete. If any viruses are detected, click RESOLVE ALL. on iz or H ht ig Br 52 10 After removing the viruses, click NEXT. on iz or H ht My device is ig now virus-free. Br 53 Hackers Who is a hacker? A hacker is an individual with expertise in software and networks who discovers vulnerabilities in systems and exploits them. The nature of their activities—whether ethical on or unethical—depends on the type of hacker they are. There are three classifications of hackers: 1 White Hat Hacker: Also known as an ethical hacker, this iz individual aims to protect devices from hacking by identifying vulnerabilities in electronic systems. Upon discovering these vulnerabilities, they inform the legal owner and assist in 2 or finding appropriate solutions. Black Hat Hacker: Also known as an unethical hacker, this individual engages in malicious activities such as stealing H data, blackmail, sabotage, or causing chaos within systems. 3 Gray Hat Hacker: Also known as a gray hacker, this person operates without a clear direction. They may engage in ht illegal activities with the intention of doing good, or commit immoral actions without intending to cause harm. While gray hat hackers possess the same skills as other types, their ig ethical stance and motives vary. Note: Creating strong passwords is one of Br the most important defenses against hacking personal accounts. 54 Activity 4: In this activity, we will explore a tool designed to create strong passwords that are nearly impossible for hackers to guess. 1 Open the following link in your preferred browser: on https://delinea.com/resources/password-generator-it-tool The password generator window will appear. Choose the settings that suit your needs. iz or H ht 2 Click GENERATE RANDOM PASSWORD. ig Lesson 2 Br Introduction to Ethical Hacking and Kali Linux 55

Use Quizgecko on...
Browser
Browser