SlideShare une entreprise Scribd logo
1  sur  36
Fundamental of Ethical Hacking by
Waseem Rauf
Points to be discuss in this session
 Objectives of this Session
 Computer/Network Security
 Hacking
 Ethical Hacking and Types of Hackers
 Cyber Crime
 Common Terminology used in the Ethical Hacking
 Kali Linux
 Virtualization ( Virtual Machine ) Concept
 How to install Kali Linux on Virtual Machine
 Kali Linux Overview and Basic Commands of Linux
 Career in Ethical Hacking
 Future Sessions Discussion and Technical talks
Objective of this Session
 The Objective of this session is to give you awareness of ethical hacking .
 Session for beginner
 Teach only useful information
 Don’t share with you any illegal information about hacking
 After attending this session, you should have solid understanding of Ethical
hacking
 Specially for those who want to start their career as a ethical hacker
I hope, you will enjoy and love this session
Why Computer Security ?
Computer systems are ubiquitous in our daily life
 Computers store and process our data and information
 Computers access and control our resources
Valuable Data Private Data Dangerous Data
The Sony Breach
 An Example: The Playstation Network (PSN) Attack
 Illegal intrusion into network around April 2011
 Severe consequences for users and companies
 Financial damage of over 24 billion dollars
Hacking
 According to cyber.laws.com, “ Computer hacking refers to the
practice of modifying or altering computer software and
hardware to accomplish a goal that is considered to be outside
of the creator’s original objective”. Those individuals who
engage in computer hacking activities are typically referred to
as “hackers.”
Ethical Hacking
 Ethical hacking is when an expert attempts to hack a computer or network
with the express written permission of the assets owner.
 Also called White Hat Hacking
 Penetration Testing
 It is legal and Permission is obtained from the target
 Part of overall Security Program
 The ethical hackers are paid to find these vulnerabilities first and make the
company aware of the risks
Types of Hackers
 Black Hat Hackers : ( Bad Guys )
 White Hat Hackers : ( Good Guys )
 Gray Hat Hackers : (Combination of Black Hat and
White Hat )
Black Hat Hackers : ( Bad Guys )
 They hack the system/network/web without owner permission
 The intention of black hat hacker is very bad
 A black hat hacker may try to steal information such as social security
numbers, credit cards, personal identifiable information, bank account
Information and much more
 They do hacking for illegal purpose
 The have excellent computing and programming skills
 They hack the system for their own benefits
 Their main goal is to do damage and to expose or steal data
White Hat Hackers : ( Good Guys )
 They hack systems with the owner permission
 Company hire white hat hackers
 They are professional hackers who works in Industry
 They are also called ethical hackers
 They work for legal purpose
 They secure network/web of the company
Gray Hat Hackers : (Combination of
Black Hat and White Hat )
 The gray hat hacker is a unique type of hacker because they are freelancers
and operate without written consent
 They are known to discover systems weaknesses, without permission but
without malicious intent
 Their goal is to bring these flaws to the attention of the system owner so
they can be corrected
Pre-Requisite
 What should we know to enter in the field of Ethical Hacking
 You should have basic and solid Understanding of Programming
 You should have basic and solid Understanding of Networking
 You should have basic and solid Understanding of Linux OS etc.
Essential Terminology
Cryptography :
 Art and Science of keeping information secure
 Penetration testing (also called pen testing) is the practice of testing or evaluating
a computer system, network or Web application to find vulnerabilities that an
attacker could exploit.
 Vulnerability : Weakness in a System ex. Hardware/Software vulnerabilities
 Exploit : A method to intrude/penetrate in a System
 Metasploit : Metasploit is one of the most powerful and widely used tools for
penetration testing
 SQL Injection : SQL injection is a code injection technique that might destroy
your database. SQL injection is one of the most common web hacking
SQL injection is the placement of malicious code in SQL statements, via web page
input.
 Brute force Attack : a simple brute-force attack may have a dictionary of all
words or commonly used passwords and cycle through those words until it gains
access to the account.
 Keylogger : A keylogger, sometimes called a keystroke logger or system monitor,
is a type of surveillance technology used to monitor and record each keystroke
typed on a specific computer's keyboard.
 Phishing attack : Phishing is the attempt to obtain sensitive
information such as usernames, passwords, and credit card details (and,
indirectly, money), often for malicious reasons, by disguising as a
trustworthy entity in an electronic communication.
 Bug bounty Program : A bug bounty program is a deal offered by many
websites and software developers by which individuals can receive
recognition and compensation for reporting bugs, especially those
pertaining to exploits and vulnerabilities
 Footprinting : It is the process of gathering data about certain target
Or Information gathering
 Cyber Crime : Crime relevant to Computer
 Cloud Computing : Internet based computing
Virtual Machines
 A Software Computer
• A Computer within a computer
• Can be used just like any other computer
 Why use VMs
• A VM is stored on a physical HDD - thus extremely versatile
• You can transfer a VM just like any other file on your computer
• You can clone/repurpose VMs very easily
 Terminology
• Host Computer
• Guest VM
 A Host Computer can host Several VMs
 A Guest VM generally resides on a single host
 A Host Computer is generally a very powerful server that is designed to run
multiple Guest VMs
 Tips : Keep resources as low as possible and Turn off VMs when you are not using
KALI LINUX
 It is an Open Source
 Linux OS
 Specially designed for Hackers
 All tools are built in relevant to Hacking
 More than 300 penetration testing tools
Download and Install Virtual Box and
Kali Linux
 Step # 1 : Download Virtual Box
 https://www.virtualbox.org/wiki/Downloads
 Step # 2 : Install Virtual Box
 Step # 3 : Download Kali Linux
 https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-
download/
 Step # 4 : Follow these steps ( Upcoming Slides )
 Default User Name is root and password is toor .
Let’s Explore Kali Linux
Tips ( How to Secure your Network )
 Always clear your browsers cookies
 Password should be strong
Career in Ethical Hacking
 Bright Career
 Information (Network/Computer/Cyber) Security is one the highest paid and
fastest growing job segment with a huge skill gap. According to
Forbes, there will be a global shortage of two million cyber security
professionals by 2019. Moreover, Info security complements all aspect of
computer science from mobile, networks, cloud, OS to web.
My next Sessions
 Mobile Application Development
 Web Designing and Development
 Introduction to Cloud Computing
 Artificial Intelligence and more ….
Contact with me on Facebook and Gmail:
waseemrauf7@gmail.com
THANK YOU
Please Subscribe my YouTube Channel for
further upcoming updates

Contenu connexe

Tendances

Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptRohit Yadav
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basicsMeenesh Jain
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackinganonymousrider
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Introduction to hacking
Introduction to hackingIntroduction to hacking
Introduction to hackingnitish mehta
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 

Tendances (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to hacking
Introduction to hackingIntroduction to hacking
Introduction to hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 

Similaire à Fundamental of ethical hacking

Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hackingBeing Uniq Sonu
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxSiddheshSurve10
 

Similaire à Fundamental of ethical hacking (20)

ethical hacking
ethical hackingethical hacking
ethical hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
 

Dernier

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Dernier (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Fundamental of ethical hacking

  • 1. Fundamental of Ethical Hacking by Waseem Rauf
  • 2. Points to be discuss in this session  Objectives of this Session  Computer/Network Security  Hacking  Ethical Hacking and Types of Hackers  Cyber Crime  Common Terminology used in the Ethical Hacking  Kali Linux  Virtualization ( Virtual Machine ) Concept  How to install Kali Linux on Virtual Machine  Kali Linux Overview and Basic Commands of Linux  Career in Ethical Hacking  Future Sessions Discussion and Technical talks
  • 3. Objective of this Session  The Objective of this session is to give you awareness of ethical hacking .  Session for beginner  Teach only useful information  Don’t share with you any illegal information about hacking  After attending this session, you should have solid understanding of Ethical hacking  Specially for those who want to start their career as a ethical hacker I hope, you will enjoy and love this session
  • 4. Why Computer Security ? Computer systems are ubiquitous in our daily life  Computers store and process our data and information  Computers access and control our resources Valuable Data Private Data Dangerous Data
  • 5. The Sony Breach  An Example: The Playstation Network (PSN) Attack  Illegal intrusion into network around April 2011  Severe consequences for users and companies  Financial damage of over 24 billion dollars
  • 6.
  • 7. Hacking  According to cyber.laws.com, “ Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective”. Those individuals who engage in computer hacking activities are typically referred to as “hackers.”
  • 8. Ethical Hacking  Ethical hacking is when an expert attempts to hack a computer or network with the express written permission of the assets owner.  Also called White Hat Hacking  Penetration Testing  It is legal and Permission is obtained from the target  Part of overall Security Program  The ethical hackers are paid to find these vulnerabilities first and make the company aware of the risks
  • 9. Types of Hackers  Black Hat Hackers : ( Bad Guys )  White Hat Hackers : ( Good Guys )  Gray Hat Hackers : (Combination of Black Hat and White Hat )
  • 10. Black Hat Hackers : ( Bad Guys )  They hack the system/network/web without owner permission  The intention of black hat hacker is very bad  A black hat hacker may try to steal information such as social security numbers, credit cards, personal identifiable information, bank account Information and much more  They do hacking for illegal purpose  The have excellent computing and programming skills  They hack the system for their own benefits  Their main goal is to do damage and to expose or steal data
  • 11. White Hat Hackers : ( Good Guys )  They hack systems with the owner permission  Company hire white hat hackers  They are professional hackers who works in Industry  They are also called ethical hackers  They work for legal purpose  They secure network/web of the company
  • 12. Gray Hat Hackers : (Combination of Black Hat and White Hat )  The gray hat hacker is a unique type of hacker because they are freelancers and operate without written consent  They are known to discover systems weaknesses, without permission but without malicious intent  Their goal is to bring these flaws to the attention of the system owner so they can be corrected
  • 13. Pre-Requisite  What should we know to enter in the field of Ethical Hacking  You should have basic and solid Understanding of Programming  You should have basic and solid Understanding of Networking  You should have basic and solid Understanding of Linux OS etc.
  • 15. Cryptography :  Art and Science of keeping information secure
  • 16.  Penetration testing (also called pen testing) is the practice of testing or evaluating a computer system, network or Web application to find vulnerabilities that an attacker could exploit.  Vulnerability : Weakness in a System ex. Hardware/Software vulnerabilities  Exploit : A method to intrude/penetrate in a System  Metasploit : Metasploit is one of the most powerful and widely used tools for penetration testing  SQL Injection : SQL injection is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking SQL injection is the placement of malicious code in SQL statements, via web page input.  Brute force Attack : a simple brute-force attack may have a dictionary of all words or commonly used passwords and cycle through those words until it gains access to the account.  Keylogger : A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
  • 17.  Phishing attack : Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.  Bug bounty Program : A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities  Footprinting : It is the process of gathering data about certain target Or Information gathering  Cyber Crime : Crime relevant to Computer  Cloud Computing : Internet based computing
  • 18. Virtual Machines  A Software Computer • A Computer within a computer • Can be used just like any other computer  Why use VMs • A VM is stored on a physical HDD - thus extremely versatile • You can transfer a VM just like any other file on your computer • You can clone/repurpose VMs very easily  Terminology • Host Computer • Guest VM
  • 19.  A Host Computer can host Several VMs  A Guest VM generally resides on a single host  A Host Computer is generally a very powerful server that is designed to run multiple Guest VMs  Tips : Keep resources as low as possible and Turn off VMs when you are not using
  • 20. KALI LINUX  It is an Open Source  Linux OS  Specially designed for Hackers  All tools are built in relevant to Hacking  More than 300 penetration testing tools
  • 21. Download and Install Virtual Box and Kali Linux  Step # 1 : Download Virtual Box  https://www.virtualbox.org/wiki/Downloads  Step # 2 : Install Virtual Box  Step # 3 : Download Kali Linux  https://www.offensive-security.com/kali-linux-vmware-virtualbox-image- download/  Step # 4 : Follow these steps ( Upcoming Slides )  Default User Name is root and password is toor .
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 33. Tips ( How to Secure your Network )  Always clear your browsers cookies  Password should be strong
  • 34. Career in Ethical Hacking  Bright Career  Information (Network/Computer/Cyber) Security is one the highest paid and fastest growing job segment with a huge skill gap. According to Forbes, there will be a global shortage of two million cyber security professionals by 2019. Moreover, Info security complements all aspect of computer science from mobile, networks, cloud, OS to web.
  • 35. My next Sessions  Mobile Application Development  Web Designing and Development  Introduction to Cloud Computing  Artificial Intelligence and more …. Contact with me on Facebook and Gmail: waseemrauf7@gmail.com
  • 36. THANK YOU Please Subscribe my YouTube Channel for further upcoming updates