SlideShare une entreprise Scribd logo
1  sur  20
HACKING
Presented by:-
Ganesh V. Vadulekar
HACKING
OVERVIEW
 What is HACKING ???
 Who are Hackers???
 What is Ethical Hacking ???
 Who are Ethical Hackers???
 Types Of Hacking
 How to Defend from Hacking???
 Consequences Of illegal Hacking
 Conclusion
 Summary
WHAT IS HACKING???
Hacking is cracking into an account or
cheating in a game without using cheat
codes. Hacking passwords requires a
program or requires finding glitches from
the website.
WHO ARE HACKER???
 Hacker is a hacker who "violates computer security for
little reason beyond maliciousness or for personal gain"
HACKERS CLASSES
 Black hats :– highly skilled,
malicious, destructive “crackers”
 White hats – skills used for
defensive security analysts
 Gray hats – offensively and
defensively; will hack for different
reasons, depends on situation.
WHAT IS ETHICAL HACKING
???
 It is Partially Legal (May vary by country law)
 Completely legal in INDIA
 Permission is obtained from the target user
 Part of an overall security program.
WHO ARE ETHICAL
HACKERS???
 Completely trustworthy.
 Strong programming and computer networking skills.
 Techniques of Criminal hackers-
Detection-Prevention.
 Ethical hackers possesses same skills, mindset and tools
of a hacker but the attacks are done in a non-destructive
manner .
 E.G. Cyber Crime investigators
TYPES OF HACKING
 Website Hacking
 Email Hacking
 Network Hacking
 Password Hacking
 Online transactions Hacking
 Computer Hacking
 Mobile Hacking
 PDA hacking
 Metropolitan system hacking
HOW TO DEFEND FROM
HACKING???
 Use Strong Passwords! (Follow Universal Code while
creation)
 Unsolicited Installation of Scripts
 Avoid Scam/Spammy Websites
 Clear the Cookies!
 Do not make any financials transactions on (http://)
 Prevent illegal farmers’ from “harvesting” your lists
 Don’t use Generic Usernames & Passwords
 Use Secure Ports
 Keep OS updated with security patches
 Never trust mails which makes an attractive offers (like
you have won 100Millions dollars/ anything else..)
WHAT TO DO AFTER
BEING HACKED?
 Shutdown the system
 Clear the memory using Cleaners (like CCleaner)
 Scan infected sections with good antivirus
 Separate the system from network (Do not use internet)
 Restore the system with the backup (If o/s problem)
 Finally, connect the system to the network
HOW ETHICAL HACKERS
DEFEND???
 Harden the servers
 Scan, test and apply patches
 Monitor logs
 Train the technical staff on security
 Serious policy and procedures!
HOW MUCH DO ETHICAL HACKERS GET
PAID?
 Globally, the hiring of ethical hackers is on the rise with
most of them working with top consulting firms.
 In the United States, an ethical hacker can make upwards
of $120,000 per annum.
 Freelance ethical hackers can expect to make $10,000
per assignment.
 Some ranges from $15,000 to $45,000 for a standalone
ethical hack.
DISTINGUISH BETWEEN HACKERS & ETHICAL
HACKERS
 Deface hacked web pages
to advertise their prowess
 Doings are Evil & Illegal
 Work is done to get
illegal information for
themselves or for
someone else
 Hired as Preventive
measure
 Doings are good & justice
 Work is Legal & to
restore the hacked the
website .
Criminal Hackers Ethical Hackers
CONSEQUENCES OF
ILLEGAL HACKING
 Thousands Of Dollars in Fines
 Imprisonment
 Seizure Of Your Computer
ANY
QUESTIONS???
CONCLUSION
 Proper Ethical Hacker Should Be Employed
 Do Not Exposed Your Passwords to Untrusted Sites
 Close Your Internet While Not in Use
 Having Basic Knowledge of Internet
SUMMARY
 What is HACKING ???
 Who are Hackers???
 What is Ethical Hacking ???
 Who are Ethical Hackers???
 Types Of Hacking
 How to Defend from Hacking???
 Consequences Of illegal Hacking
THANK YOU…

Contenu connexe

Tendances

Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 

Tendances (20)

Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
hacking
hackinghacking
hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
certified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfcertified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdf
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 

En vedette

Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 

En vedette (20)

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Hackers guide to Startup Weekend
Hackers guide to Startup WeekendHackers guide to Startup Weekend
Hackers guide to Startup Weekend
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
PPT on Ethical Hacking
PPT on Ethical HackingPPT on Ethical Hacking
PPT on Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest DisclosureOpen Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Security
SecuritySecurity
Security
 
Prominence of ethical hacking in cyber crimes
Prominence of ethical hacking in cyber crimesProminence of ethical hacking in cyber crimes
Prominence of ethical hacking in cyber crimes
 

Similaire à Ethical hacking

CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 

Similaire à Ethical hacking (20)

Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Ethical hacking

  • 3. OVERVIEW  What is HACKING ???  Who are Hackers???  What is Ethical Hacking ???  Who are Ethical Hackers???  Types Of Hacking  How to Defend from Hacking???  Consequences Of illegal Hacking  Conclusion  Summary
  • 4. WHAT IS HACKING??? Hacking is cracking into an account or cheating in a game without using cheat codes. Hacking passwords requires a program or requires finding glitches from the website.
  • 5. WHO ARE HACKER???  Hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain"
  • 6. HACKERS CLASSES  Black hats :– highly skilled, malicious, destructive “crackers”  White hats – skills used for defensive security analysts  Gray hats – offensively and defensively; will hack for different reasons, depends on situation.
  • 7. WHAT IS ETHICAL HACKING ???  It is Partially Legal (May vary by country law)  Completely legal in INDIA  Permission is obtained from the target user  Part of an overall security program.
  • 8. WHO ARE ETHICAL HACKERS???  Completely trustworthy.  Strong programming and computer networking skills.  Techniques of Criminal hackers- Detection-Prevention.  Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner .  E.G. Cyber Crime investigators
  • 9. TYPES OF HACKING  Website Hacking  Email Hacking  Network Hacking  Password Hacking  Online transactions Hacking  Computer Hacking  Mobile Hacking  PDA hacking  Metropolitan system hacking
  • 10. HOW TO DEFEND FROM HACKING???  Use Strong Passwords! (Follow Universal Code while creation)  Unsolicited Installation of Scripts  Avoid Scam/Spammy Websites  Clear the Cookies!  Do not make any financials transactions on (http://)  Prevent illegal farmers’ from “harvesting” your lists  Don’t use Generic Usernames & Passwords  Use Secure Ports  Keep OS updated with security patches  Never trust mails which makes an attractive offers (like you have won 100Millions dollars/ anything else..)
  • 11.
  • 12. WHAT TO DO AFTER BEING HACKED?  Shutdown the system  Clear the memory using Cleaners (like CCleaner)  Scan infected sections with good antivirus  Separate the system from network (Do not use internet)  Restore the system with the backup (If o/s problem)  Finally, connect the system to the network
  • 13. HOW ETHICAL HACKERS DEFEND???  Harden the servers  Scan, test and apply patches  Monitor logs  Train the technical staff on security  Serious policy and procedures!
  • 14. HOW MUCH DO ETHICAL HACKERS GET PAID?  Globally, the hiring of ethical hackers is on the rise with most of them working with top consulting firms.  In the United States, an ethical hacker can make upwards of $120,000 per annum.  Freelance ethical hackers can expect to make $10,000 per assignment.  Some ranges from $15,000 to $45,000 for a standalone ethical hack.
  • 15. DISTINGUISH BETWEEN HACKERS & ETHICAL HACKERS  Deface hacked web pages to advertise their prowess  Doings are Evil & Illegal  Work is done to get illegal information for themselves or for someone else  Hired as Preventive measure  Doings are good & justice  Work is Legal & to restore the hacked the website . Criminal Hackers Ethical Hackers
  • 16. CONSEQUENCES OF ILLEGAL HACKING  Thousands Of Dollars in Fines  Imprisonment  Seizure Of Your Computer
  • 18. CONCLUSION  Proper Ethical Hacker Should Be Employed  Do Not Exposed Your Passwords to Untrusted Sites  Close Your Internet While Not in Use  Having Basic Knowledge of Internet
  • 19. SUMMARY  What is HACKING ???  Who are Hackers???  What is Ethical Hacking ???  Who are Ethical Hackers???  Types Of Hacking  How to Defend from Hacking???  Consequences Of illegal Hacking