SlideShare uma empresa Scribd logo
1 de 25
Ethical Hacking
Part 1 - BASICS
./whoami
0 If You want to Hack some one First Hack Your self.
0 I am NOT a Hacker Just Learning for Security analyst.
ETHICAL HACKING
HACKING
Hacking is unauthorized use of computer and

network resources.
According to Computer Crime Research Center: “It is
act of gaining access without legal authorization to
computer or computer network.”
Hacker
0 Someone who tries to break into computer systems

for any illegal purpose.
0 Someone who maliciously breaks into systems for
personal gain. These are criminals.
TYPES OF HACKERS
 Black hat hacker.
 White hat hacker.
 Gray hat hacker.
Black Hat
0 They use their knowledge and skill set for illegal

0 activities, destructive intents.
0 E.g.-to gain money (online robbery), to take revenge.
0 Disgruntled
0 Employees is the best example of Black Hats.

Attackers
0 (Black Hat Hackers) are not at all concerned with
security
0 professionals (WhiteHathackers). Actually these
hackers Are Bad Guys!!!
White Hat
0 They use their knowledge and skill set for
0 good, constructive intents. They find out new security
0 loopholes and their solutions.
0 E.g.-Cyber Security Peoples (FBI , NYPD, US-Homeland

Security Breach)
Gray Hat
0 Individuals who works both offensively and
0 defensively at various times
0 E.g.-Third Party Security Testing in IT sectors
0 To Make a Security Stronger.
0 Just For Fun.
0 Show Off
0 Hack Other System Secretly and steal Important

information.
0 Good coder.
0 Well Knowledge about hardware and Software.
0 Should have knowledge on security System.
What is ethical hacking ?
0 Ethical hacking ,also known as penetration testing or

white-hat hacking involves the same tools, tricks, and
techniques that hackers use, i.e., by duplicating the
intent and actions of malicious hackers.
0 Ethical hacking is performed with the target’s
permission.
Who are Ethical Hackers?
An Ethical Hacker, also known as a white hat hacker, or

simply a white hat, is a security professional who applies their
hacking skills for defensive purposes on behalf of the owners
of information systems.
They are completely trustworthy.
They have strong programming and computer networking v
skills.Continuous updating of their knowledge on computer
and network security is required.
They should know the techniques of the criminals, what their
activities would be, how to detected them and how to stop
them.
Ethical Hacker Strategies
An Ethical Hacker, also known as a whitehat hacker, or
simply a whitehat, is a security professional who applies
their hacking skills for defensive purposes on behalf of
the owners of information systems.
They are completely trustworthy.
They have strong programming and computer
networking skills.
They should have more patience.
Continuous updating of their knowledge on computer
and network security is required.
They should know the techniques of the criminals, what
their activities would be, how to detected them and how
to stop them.
ETHICAL HACKING
PROCESS
1. Foot printing
2. Scanning
3. Gaining Access
4. Maintaining Access
1. Who is Lookup
2. Ns Lookup
3. IP Lookup
1. Port Scanning
2. Network Scanning
3. Finger Printing
0 Password attack
0 Social Engineering.
0 Virus
1. OS backdoors
2. Trojan
3. Clearing Track
It is clear from the graph it is increasing day
by day.
ADVANTAGES
These are good hackers.
Have genuine license to hack.

Generally owned by companies for
security designing.
Provides security to banking and financial
establishments.
Conclusions
Always security professionals are one step behind
the hackers and crackers.
Plan for the unplanned attacks.
The role of ethical hacking in security is to provide
customers with awareness of how they could be
attacked and why they are targeted.
!! For Regarding any question contact me !!
http://www.maulikkotak.webnode.com
http://www.facebook.com/maulikkotakstar
http://www.twitter.com/maulikkotakstar

Mais conteúdo relacionado

Destaque (11)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015
 
Tecnicas De Representacion De La Informacion
Tecnicas De Representacion De La InformacionTecnicas De Representacion De La Informacion
Tecnicas De Representacion De La Informacion
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Ethical Hacking Introduction

  • 2. ./whoami 0 If You want to Hack some one First Hack Your self. 0 I am NOT a Hacker Just Learning for Security analyst.
  • 4. HACKING Hacking is unauthorized use of computer and network resources. According to Computer Crime Research Center: “It is act of gaining access without legal authorization to computer or computer network.”
  • 5. Hacker 0 Someone who tries to break into computer systems for any illegal purpose. 0 Someone who maliciously breaks into systems for personal gain. These are criminals.
  • 6. TYPES OF HACKERS  Black hat hacker.  White hat hacker.  Gray hat hacker.
  • 7. Black Hat 0 They use their knowledge and skill set for illegal 0 activities, destructive intents. 0 E.g.-to gain money (online robbery), to take revenge. 0 Disgruntled 0 Employees is the best example of Black Hats. Attackers 0 (Black Hat Hackers) are not at all concerned with security 0 professionals (WhiteHathackers). Actually these hackers Are Bad Guys!!!
  • 8. White Hat 0 They use their knowledge and skill set for 0 good, constructive intents. They find out new security 0 loopholes and their solutions. 0 E.g.-Cyber Security Peoples (FBI , NYPD, US-Homeland Security Breach)
  • 9. Gray Hat 0 Individuals who works both offensively and 0 defensively at various times 0 E.g.-Third Party Security Testing in IT sectors
  • 10.
  • 11. 0 To Make a Security Stronger. 0 Just For Fun. 0 Show Off 0 Hack Other System Secretly and steal Important information.
  • 12. 0 Good coder. 0 Well Knowledge about hardware and Software. 0 Should have knowledge on security System.
  • 13. What is ethical hacking ? 0 Ethical hacking ,also known as penetration testing or white-hat hacking involves the same tools, tricks, and techniques that hackers use, i.e., by duplicating the intent and actions of malicious hackers. 0 Ethical hacking is performed with the target’s permission.
  • 14. Who are Ethical Hackers? An Ethical Hacker, also known as a white hat hacker, or simply a white hat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy. They have strong programming and computer networking v skills.Continuous updating of their knowledge on computer and network security is required. They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
  • 15. Ethical Hacker Strategies An Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy. They have strong programming and computer networking skills. They should have more patience. Continuous updating of their knowledge on computer and network security is required. They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
  • 16. ETHICAL HACKING PROCESS 1. Foot printing 2. Scanning 3. Gaining Access 4. Maintaining Access
  • 17. 1. Who is Lookup 2. Ns Lookup 3. IP Lookup
  • 18. 1. Port Scanning 2. Network Scanning 3. Finger Printing
  • 19.
  • 20. 0 Password attack 0 Social Engineering. 0 Virus
  • 21. 1. OS backdoors 2. Trojan 3. Clearing Track
  • 22. It is clear from the graph it is increasing day by day.
  • 23. ADVANTAGES These are good hackers. Have genuine license to hack. Generally owned by companies for security designing. Provides security to banking and financial establishments.
  • 24. Conclusions Always security professionals are one step behind the hackers and crackers. Plan for the unplanned attacks. The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.
  • 25. !! For Regarding any question contact me !! http://www.maulikkotak.webnode.com http://www.facebook.com/maulikkotakstar http://www.twitter.com/maulikkotakstar