SlideShare une entreprise Scribd logo
1  sur  16
Designed by,
RITWICK MUKHERJEE
INTRODUCTION
 Hacking is the art of finding solutions in real life
problems.
 In 1960 at MIT the first known event of hacking had
taken place, at the same time the term “HACKER” was
originated.
Hacking is usually done to gain unauthorized access to
a system either a network to harm the systems or steal
sensitive informations.
1
TYPES OF HACKERS
White Hat Hackers, also known as “ethical hackers”, may help
companies and governments find holes in their networks and security by first
hacking into them. They hack into the systems to discover the liabilities
before the bad guys do.
Grey Hat Hackers, find themselves somewhere in the middle on the
spectrum between helping others and self-gain. Technically, this kind of
hacking is done without permission, so even if there is no malicious intent,
it’s still considered illegal.
Black Hat Hackers, are the criminals of the online world. They are in
it for often selfish reasons, exploiting individuals for money, prestige or
incriminating information.
2
TYPES OF HACKING
Website Hacking, means taking unauthorized control over a web server
and it’s associated software such as databases and other interfaces.
Network Hacking, means gathering information about a network tools
like Telnet, NS lookup, Ping, Tracert, Netstat etc. with the intent to harm the
network system and hamper it’s operation.
Email Hacking, means getting unauthorized access on an email account
and using it without taking the consent of it’s owner.
Password Hacking, process of recovering secret passwords from data
that has been stored in or transmitted by a computer system.
Computer Hacking, is the process of stealing computer ID and
password by applying hacking methods and getting unauthorized access to a
system. 3
WHAT IS ETHICAL HACKING ?
Apart from testing duties, ethical hackers are associated with other
responsibilities. The main idea is to replicate a malicious hacker at work
and instead of exploiting the vulnerabilities for malicious purposes, seek
countermeasures to shore up the system’s defences.
4
WHY IT IS IMPORTANT ?
The Internet is home to seemingly infinite amounts of confidential and
personal information. As a result of this mass storage of information, the
system needs to be constantly updated and enforced to prevent black
hats from retrieving such valuable data. Ethical hacking is used to
identify current weaknesses of a system to ensure that the Internet is
used in a safe and private manner.
5
IS IT LEGAL ?
Yes, Ethical Hacking is legal because an Ethical hacker is a computer and
networking expert who systematically attempts to penetrate a computer
system or network on behalf of its owners for the purpose of finding security
vulnerabilities that a malicious hacker could potentially exploit.
Stay Legal !
It's important never to engage in "black hat" hacking--that is, intruding
or attacking anyone's network without their full permission. Engaging in
illegal activities, even if it doesn't lead to a conviction, will likely kill
your ethical hacking career.
6
SKILLSET REQUIRED
 First and foremost write programmes in many programming
languages like C, C++, Perl, Python, and Ruby.
 Knowledge of a variety of operating systems (Microsoft
Windows, various versions of Linux, etc) is critical.
 Experience with various network devices, including switches,
routers and firewalls is also important.
 An ethical hacker also should have a basic understanding of
TCP/IP protocols such as SMTP, ICMP and HTTP.
 For those working with web applications, Microsoft .NET and
PHP are vital.
7
FIVE PHASES OF HACKING
1. RECONNAISSANCE, is the primary
phase where the Hacker tries to collect as
much information as possible about the
target. It includes Identifying the Target,
finding out the target's IP Address Range,
Network, DNS records, etc.
2. SCANNING, involves taking the
information found when reconnaissance
and using it to examine the network. Tools
that a hacker may employ during the
scanning phase can include diallers, port
scanners, network mappers, sweepers.
8
3. GAINING ACCESS, is to design the
blueprint of the network of the target with
the help of data collected during phase 1
and 2. Vulnerabilities discovered during the
reconnaissance and scanning phase are
now exploited to gain access.
4. MAINTAINING ACCESS, Once a hacker
has gained access, they want to keep that
access for future exploitation and attacks.
5. CLEARING TRACKS, Once hackers
have been able to gain and maintain
access, they clear their tracks to avoid
detection by security personnel to remove
evidence of hacking.
FIVE PHASES OF HACKING
9
ADVANTAGES
 To recover lost information, especially in case anyone lost their
password.
 To perform penetration testing to strengthen computer and
network security.
 To put adequate preventive measures in place to prevent
security breaches.
 To have a computer system that prevents malicious hackers
from gaining access.
10
DISADVANTAGES
 Massive security breach.
 Unauthorized system access on private information.
 Privacy violation.
 Hampering system operation.
 Denial or service attacks.
 Malicious attack on the system.
11
CARRER OPPORTUNITIES
Financial Institutions.
IT and ITES companies.
All online businesses and organizations.
Consultancies.
Government.
Diplomatic set ups.
Security installations.
Security agencies.
Defence organizations.
Telecommunication sector.
Immigration services.
Aviation industry.
Hotels.
Forensic Laboratories.
12
THREE FAMOUS HACKERS
Jonathan James Albert GonzalezAdrian Lamo
13
CONCLUSION
Hacking is a good computing skill that can be used for good or bad intention.
Remember if there is reason to do the hack there is also many ways to
prevent it. Always remember to,
 Using antivirus, such as Quickheal, Kaspersky, Norton etc.
 Proper logout after using any type of online accounts.
 Avoid spam.
14
Ethical hacking

Contenu connexe

Tendances

Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingBugRaptors
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hackingmsaksida
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingAmine SAIGHI
 

Tendances (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
HACKING
HACKINGHACKING
HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Similaire à Ethical hacking

Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical HackingMasih Karimi
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGNathan Mathis
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
 

Similaire à Ethical hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
N.vinodh
N.vinodhN.vinodh
N.vinodh
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive CheatsheetEthical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive Cheatsheet
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 

Dernier

Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benonimasabamasaba
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 

Dernier (20)

Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 

Ethical hacking

  • 2. INTRODUCTION  Hacking is the art of finding solutions in real life problems.  In 1960 at MIT the first known event of hacking had taken place, at the same time the term “HACKER” was originated. Hacking is usually done to gain unauthorized access to a system either a network to harm the systems or steal sensitive informations. 1
  • 3. TYPES OF HACKERS White Hat Hackers, also known as “ethical hackers”, may help companies and governments find holes in their networks and security by first hacking into them. They hack into the systems to discover the liabilities before the bad guys do. Grey Hat Hackers, find themselves somewhere in the middle on the spectrum between helping others and self-gain. Technically, this kind of hacking is done without permission, so even if there is no malicious intent, it’s still considered illegal. Black Hat Hackers, are the criminals of the online world. They are in it for often selfish reasons, exploiting individuals for money, prestige or incriminating information. 2
  • 4. TYPES OF HACKING Website Hacking, means taking unauthorized control over a web server and it’s associated software such as databases and other interfaces. Network Hacking, means gathering information about a network tools like Telnet, NS lookup, Ping, Tracert, Netstat etc. with the intent to harm the network system and hamper it’s operation. Email Hacking, means getting unauthorized access on an email account and using it without taking the consent of it’s owner. Password Hacking, process of recovering secret passwords from data that has been stored in or transmitted by a computer system. Computer Hacking, is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a system. 3
  • 5. WHAT IS ETHICAL HACKING ? Apart from testing duties, ethical hackers are associated with other responsibilities. The main idea is to replicate a malicious hacker at work and instead of exploiting the vulnerabilities for malicious purposes, seek countermeasures to shore up the system’s defences. 4
  • 6. WHY IT IS IMPORTANT ? The Internet is home to seemingly infinite amounts of confidential and personal information. As a result of this mass storage of information, the system needs to be constantly updated and enforced to prevent black hats from retrieving such valuable data. Ethical hacking is used to identify current weaknesses of a system to ensure that the Internet is used in a safe and private manner. 5
  • 7. IS IT LEGAL ? Yes, Ethical Hacking is legal because an Ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit. Stay Legal ! It's important never to engage in "black hat" hacking--that is, intruding or attacking anyone's network without their full permission. Engaging in illegal activities, even if it doesn't lead to a conviction, will likely kill your ethical hacking career. 6
  • 8. SKILLSET REQUIRED  First and foremost write programmes in many programming languages like C, C++, Perl, Python, and Ruby.  Knowledge of a variety of operating systems (Microsoft Windows, various versions of Linux, etc) is critical.  Experience with various network devices, including switches, routers and firewalls is also important.  An ethical hacker also should have a basic understanding of TCP/IP protocols such as SMTP, ICMP and HTTP.  For those working with web applications, Microsoft .NET and PHP are vital. 7
  • 9. FIVE PHASES OF HACKING 1. RECONNAISSANCE, is the primary phase where the Hacker tries to collect as much information as possible about the target. It includes Identifying the Target, finding out the target's IP Address Range, Network, DNS records, etc. 2. SCANNING, involves taking the information found when reconnaissance and using it to examine the network. Tools that a hacker may employ during the scanning phase can include diallers, port scanners, network mappers, sweepers. 8
  • 10. 3. GAINING ACCESS, is to design the blueprint of the network of the target with the help of data collected during phase 1 and 2. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. 4. MAINTAINING ACCESS, Once a hacker has gained access, they want to keep that access for future exploitation and attacks. 5. CLEARING TRACKS, Once hackers have been able to gain and maintain access, they clear their tracks to avoid detection by security personnel to remove evidence of hacking. FIVE PHASES OF HACKING 9
  • 11. ADVANTAGES  To recover lost information, especially in case anyone lost their password.  To perform penetration testing to strengthen computer and network security.  To put adequate preventive measures in place to prevent security breaches.  To have a computer system that prevents malicious hackers from gaining access. 10
  • 12. DISADVANTAGES  Massive security breach.  Unauthorized system access on private information.  Privacy violation.  Hampering system operation.  Denial or service attacks.  Malicious attack on the system. 11
  • 13. CARRER OPPORTUNITIES Financial Institutions. IT and ITES companies. All online businesses and organizations. Consultancies. Government. Diplomatic set ups. Security installations. Security agencies. Defence organizations. Telecommunication sector. Immigration services. Aviation industry. Hotels. Forensic Laboratories. 12
  • 14. THREE FAMOUS HACKERS Jonathan James Albert GonzalezAdrian Lamo 13
  • 15. CONCLUSION Hacking is a good computing skill that can be used for good or bad intention. Remember if there is reason to do the hack there is also many ways to prevent it. Always remember to,  Using antivirus, such as Quickheal, Kaspersky, Norton etc.  Proper logout after using any type of online accounts.  Avoid spam. 14