SlideShare une entreprise Scribd logo
1  sur  25
Ethical Hacking
Part 1 - BASICS
./whoami
0 If You want to Hack some one First Hack Your self.
0 I am NOT a Hacker Just Learning for Security analyst.
ETHICAL HACKING
HACKING
Hacking is unauthorized use of computer and

network resources.
According to Computer Crime Research Center: “It is
act of gaining access without legal authorization to
computer or computer network.”
Hacker
0 Someone who tries to break into computer systems

for any illegal purpose.
0 Someone who maliciously breaks into systems for
personal gain. These are criminals.
TYPES OF HACKERS
 Black hat hacker.
 White hat hacker.
 Gray hat hacker.
Black Hat
0 They use their knowledge and skill set for illegal

0 activities, destructive intents.
0 E.g.-to gain money (online robbery), to take revenge.
0 Disgruntled
0 Employees is the best example of Black Hats.

Attackers
0 (Black Hat Hackers) are not at all concerned with
security
0 professionals (WhiteHathackers). Actually these
hackers Are Bad Guys!!!
White Hat
0 They use their knowledge and skill set for
0 good, constructive intents. They find out new security
0 loopholes and their solutions.
0 E.g.-Cyber Security Peoples (FBI , NYPD, US-Homeland

Security Breach)
Gray Hat
0 Individuals who works both offensively and
0 defensively at various times
0 E.g.-Third Party Security Testing in IT sectors
0 To Make a Security Stronger.
0 Just For Fun.
0 Show Off
0 Hack Other System Secretly and steal Important

information.
0 Good coder.
0 Well Knowledge about hardware and Software.
0 Should have knowledge on security System.
What is ethical hacking ?
0 Ethical hacking ,also known as penetration testing or

white-hat hacking involves the same tools, tricks, and
techniques that hackers use, i.e., by duplicating the
intent and actions of malicious hackers.
0 Ethical hacking is performed with the target’s
permission.
Who are Ethical Hackers?
An Ethical Hacker, also known as a white hat hacker, or

simply a white hat, is a security professional who applies their
hacking skills for defensive purposes on behalf of the owners
of information systems.
They are completely trustworthy.
They have strong programming and computer networking v
skills.Continuous updating of their knowledge on computer
and network security is required.
They should know the techniques of the criminals, what their
activities would be, how to detected them and how to stop
them.
Ethical Hacker Strategies
An Ethical Hacker, also known as a whitehat hacker, or
simply a whitehat, is a security professional who applies
their hacking skills for defensive purposes on behalf of
the owners of information systems.
They are completely trustworthy.
They have strong programming and computer
networking skills.
They should have more patience.
Continuous updating of their knowledge on computer
and network security is required.
They should know the techniques of the criminals, what
their activities would be, how to detected them and how
to stop them.
ETHICAL HACKING
PROCESS
1. Foot printing
2. Scanning
3. Gaining Access
4. Maintaining Access
1. Who is Lookup
2. Ns Lookup
3. IP Lookup
1. Port Scanning
2. Network Scanning
3. Finger Printing
0 Password attack
0 Social Engineering.
0 Virus
1. OS backdoors
2. Trojan
3. Clearing Track
It is clear from the graph it is increasing day
by day.
ADVANTAGES
These are good hackers.
Have genuine license to hack.

Generally owned by companies for
security designing.
Provides security to banking and financial
establishments.
Conclusions
Always security professionals are one step behind
the hackers and crackers.
Plan for the unplanned attacks.
The role of ethical hacking in security is to provide
customers with awareness of how they could be
attacked and why they are targeted.
!! For Regarding any question contact me !!
http://www.maulikkotak.webnode.com
http://www.facebook.com/maulikkotakstar
http://www.twitter.com/maulikkotakstar

Contenu connexe

En vedette (11)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015
 
Tecnicas De Representacion De La Informacion
Tecnicas De Representacion De La InformacionTecnicas De Representacion De La Informacion
Tecnicas De Representacion De La Informacion
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Dernier

The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
Krashi Coaching
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Dernier (20)

An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
IPL Online Quiz by Pragya; Question Set.
IPL Online Quiz by Pragya; Question Set.IPL Online Quiz by Pragya; Question Set.
IPL Online Quiz by Pragya; Question Set.
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
 
Implanted Devices - VP Shunts: EMGuidewire's Radiology Reading Room
Implanted Devices - VP Shunts: EMGuidewire's Radiology Reading RoomImplanted Devices - VP Shunts: EMGuidewire's Radiology Reading Room
Implanted Devices - VP Shunts: EMGuidewire's Radiology Reading Room
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Benefits and Challenges of OER by Shweta Babel.pptx
Benefits and Challenges of OER by Shweta Babel.pptxBenefits and Challenges of OER by Shweta Babel.pptx
Benefits and Challenges of OER by Shweta Babel.pptx
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 

Ethical Hacking Introduction

  • 2. ./whoami 0 If You want to Hack some one First Hack Your self. 0 I am NOT a Hacker Just Learning for Security analyst.
  • 4. HACKING Hacking is unauthorized use of computer and network resources. According to Computer Crime Research Center: “It is act of gaining access without legal authorization to computer or computer network.”
  • 5. Hacker 0 Someone who tries to break into computer systems for any illegal purpose. 0 Someone who maliciously breaks into systems for personal gain. These are criminals.
  • 6. TYPES OF HACKERS  Black hat hacker.  White hat hacker.  Gray hat hacker.
  • 7. Black Hat 0 They use their knowledge and skill set for illegal 0 activities, destructive intents. 0 E.g.-to gain money (online robbery), to take revenge. 0 Disgruntled 0 Employees is the best example of Black Hats. Attackers 0 (Black Hat Hackers) are not at all concerned with security 0 professionals (WhiteHathackers). Actually these hackers Are Bad Guys!!!
  • 8. White Hat 0 They use their knowledge and skill set for 0 good, constructive intents. They find out new security 0 loopholes and their solutions. 0 E.g.-Cyber Security Peoples (FBI , NYPD, US-Homeland Security Breach)
  • 9. Gray Hat 0 Individuals who works both offensively and 0 defensively at various times 0 E.g.-Third Party Security Testing in IT sectors
  • 10.
  • 11. 0 To Make a Security Stronger. 0 Just For Fun. 0 Show Off 0 Hack Other System Secretly and steal Important information.
  • 12. 0 Good coder. 0 Well Knowledge about hardware and Software. 0 Should have knowledge on security System.
  • 13. What is ethical hacking ? 0 Ethical hacking ,also known as penetration testing or white-hat hacking involves the same tools, tricks, and techniques that hackers use, i.e., by duplicating the intent and actions of malicious hackers. 0 Ethical hacking is performed with the target’s permission.
  • 14. Who are Ethical Hackers? An Ethical Hacker, also known as a white hat hacker, or simply a white hat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy. They have strong programming and computer networking v skills.Continuous updating of their knowledge on computer and network security is required. They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
  • 15. Ethical Hacker Strategies An Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy. They have strong programming and computer networking skills. They should have more patience. Continuous updating of their knowledge on computer and network security is required. They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
  • 16. ETHICAL HACKING PROCESS 1. Foot printing 2. Scanning 3. Gaining Access 4. Maintaining Access
  • 17. 1. Who is Lookup 2. Ns Lookup 3. IP Lookup
  • 18. 1. Port Scanning 2. Network Scanning 3. Finger Printing
  • 19.
  • 20. 0 Password attack 0 Social Engineering. 0 Virus
  • 21. 1. OS backdoors 2. Trojan 3. Clearing Track
  • 22. It is clear from the graph it is increasing day by day.
  • 23. ADVANTAGES These are good hackers. Have genuine license to hack. Generally owned by companies for security designing. Provides security to banking and financial establishments.
  • 24. Conclusions Always security professionals are one step behind the hackers and crackers. Plan for the unplanned attacks. The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.
  • 25. !! For Regarding any question contact me !! http://www.maulikkotak.webnode.com http://www.facebook.com/maulikkotakstar http://www.twitter.com/maulikkotakstar