SlideShare une entreprise Scribd logo
1  sur  25
Ethical Hacking
Part 1 - BASICS
./whoami
0 If You want to Hack some one First Hack Your self.
0 I am NOT a Hacker Just Learning for Security analyst.
ETHICAL HACKING
HACKING
Hacking is unauthorized use of computer and

network resources.
According to Computer Crime Research Center: “It is
act of gaining access without legal authorization to
computer or computer network.”
Hacker
0 Someone who tries to break into computer systems

for any illegal purpose.
0 Someone who maliciously breaks into systems for
personal gain. These are criminals.
TYPES OF HACKERS
 Black hat hacker.
 White hat hacker.
 Gray hat hacker.
Black Hat
0 They use their knowledge and skill set for illegal

0 activities, destructive intents.
0 E.g.-to gain money (online robbery), to take revenge.
0 Disgruntled
0 Employees is the best example of Black Hats.

Attackers
0 (Black Hat Hackers) are not at all concerned with
security
0 professionals (WhiteHathackers). Actually these
hackers Are Bad Guys!!!
White Hat
0 They use their knowledge and skill set for
0 good, constructive intents. They find out new security
0 loopholes and their solutions.
0 E.g.-Cyber Security Peoples (FBI , NYPD, US-Homeland

Security Breach)
Gray Hat
0 Individuals who works both offensively and
0 defensively at various times
0 E.g.-Third Party Security Testing in IT sectors
0 To Make a Security Stronger.
0 Just For Fun.
0 Show Off
0 Hack Other System Secretly and steal Important

information.
0 Good coder.
0 Well Knowledge about hardware and Software.
0 Should have knowledge on security System.
What is ethical hacking ?
0 Ethical hacking ,also known as penetration testing or

white-hat hacking involves the same tools, tricks, and
techniques that hackers use, i.e., by duplicating the
intent and actions of malicious hackers.
0 Ethical hacking is performed with the target’s
permission.
Who are Ethical Hackers?
An Ethical Hacker, also known as a white hat hacker, or

simply a white hat, is a security professional who applies their
hacking skills for defensive purposes on behalf of the owners
of information systems.
They are completely trustworthy.
They have strong programming and computer networking v
skills.Continuous updating of their knowledge on computer
and network security is required.
They should know the techniques of the criminals, what their
activities would be, how to detected them and how to stop
them.
Ethical Hacker Strategies
An Ethical Hacker, also known as a whitehat hacker, or
simply a whitehat, is a security professional who applies
their hacking skills for defensive purposes on behalf of
the owners of information systems.
They are completely trustworthy.
They have strong programming and computer
networking skills.
They should have more patience.
Continuous updating of their knowledge on computer
and network security is required.
They should know the techniques of the criminals, what
their activities would be, how to detected them and how
to stop them.
ETHICAL HACKING
PROCESS
1. Foot printing
2. Scanning
3. Gaining Access
4. Maintaining Access
1. Who is Lookup
2. Ns Lookup
3. IP Lookup
1. Port Scanning
2. Network Scanning
3. Finger Printing
0 Password attack
0 Social Engineering.
0 Virus
1. OS backdoors
2. Trojan
3. Clearing Track
It is clear from the graph it is increasing day
by day.
ADVANTAGES
These are good hackers.
Have genuine license to hack.

Generally owned by companies for
security designing.
Provides security to banking and financial
establishments.
Conclusions
Always security professionals are one step behind
the hackers and crackers.
Plan for the unplanned attacks.
The role of ethical hacking in security is to provide
customers with awareness of how they could be
attacked and why they are targeted.
!! For Regarding any question contact me !!
http://www.maulikkotak.webnode.com
http://www.facebook.com/maulikkotakstar
http://www.twitter.com/maulikkotakstar

Contenu connexe

En vedette (11)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015
 
Tecnicas De Representacion De La Informacion
Tecnicas De Representacion De La InformacionTecnicas De Representacion De La Informacion
Tecnicas De Representacion De La Informacion
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Dernier

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 

Dernier (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

Ethical Hacking Introduction

  • 2. ./whoami 0 If You want to Hack some one First Hack Your self. 0 I am NOT a Hacker Just Learning for Security analyst.
  • 4. HACKING Hacking is unauthorized use of computer and network resources. According to Computer Crime Research Center: “It is act of gaining access without legal authorization to computer or computer network.”
  • 5. Hacker 0 Someone who tries to break into computer systems for any illegal purpose. 0 Someone who maliciously breaks into systems for personal gain. These are criminals.
  • 6. TYPES OF HACKERS  Black hat hacker.  White hat hacker.  Gray hat hacker.
  • 7. Black Hat 0 They use their knowledge and skill set for illegal 0 activities, destructive intents. 0 E.g.-to gain money (online robbery), to take revenge. 0 Disgruntled 0 Employees is the best example of Black Hats. Attackers 0 (Black Hat Hackers) are not at all concerned with security 0 professionals (WhiteHathackers). Actually these hackers Are Bad Guys!!!
  • 8. White Hat 0 They use their knowledge and skill set for 0 good, constructive intents. They find out new security 0 loopholes and their solutions. 0 E.g.-Cyber Security Peoples (FBI , NYPD, US-Homeland Security Breach)
  • 9. Gray Hat 0 Individuals who works both offensively and 0 defensively at various times 0 E.g.-Third Party Security Testing in IT sectors
  • 10.
  • 11. 0 To Make a Security Stronger. 0 Just For Fun. 0 Show Off 0 Hack Other System Secretly and steal Important information.
  • 12. 0 Good coder. 0 Well Knowledge about hardware and Software. 0 Should have knowledge on security System.
  • 13. What is ethical hacking ? 0 Ethical hacking ,also known as penetration testing or white-hat hacking involves the same tools, tricks, and techniques that hackers use, i.e., by duplicating the intent and actions of malicious hackers. 0 Ethical hacking is performed with the target’s permission.
  • 14. Who are Ethical Hackers? An Ethical Hacker, also known as a white hat hacker, or simply a white hat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy. They have strong programming and computer networking v skills.Continuous updating of their knowledge on computer and network security is required. They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
  • 15. Ethical Hacker Strategies An Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy. They have strong programming and computer networking skills. They should have more patience. Continuous updating of their knowledge on computer and network security is required. They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
  • 16. ETHICAL HACKING PROCESS 1. Foot printing 2. Scanning 3. Gaining Access 4. Maintaining Access
  • 17. 1. Who is Lookup 2. Ns Lookup 3. IP Lookup
  • 18. 1. Port Scanning 2. Network Scanning 3. Finger Printing
  • 19.
  • 20. 0 Password attack 0 Social Engineering. 0 Virus
  • 21. 1. OS backdoors 2. Trojan 3. Clearing Track
  • 22. It is clear from the graph it is increasing day by day.
  • 23. ADVANTAGES These are good hackers. Have genuine license to hack. Generally owned by companies for security designing. Provides security to banking and financial establishments.
  • 24. Conclusions Always security professionals are one step behind the hackers and crackers. Plan for the unplanned attacks. The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.
  • 25. !! For Regarding any question contact me !! http://www.maulikkotak.webnode.com http://www.facebook.com/maulikkotakstar http://www.twitter.com/maulikkotakstar