SlideShare uma empresa Scribd logo
1 de 13
Ethical Hacking
Gaurav Yadav
Indian Institute of Information Technology Sonepat
Gaurav Yadav IIITS
Contents
Gaurav Yadav IIITS
• Introduction to Hacking
• The Evolution of Hacking
• Types of Hackers
• Understanding Ethical Hacking
• Law and Ethics
• Why Ethical Hacking?
• Types of Ethical Hacking
• Industry Perspective of Ethical Hacking
• Certifications for Ethical Hacking
Introduction to Hacking
Gaurav Yadav IIITS
• Hacking is the act of identifying security vulnerabilities in networks, computer
systems or electronic gadgets and exploiting them. For example – gaining
unauthorized access to someone’s Wi-Fi.
• Hacking requires creative thinking, persistent learning, and a lot of patience.
The Evolution of Hacking
Gaurav Yadav IIITS
• The birth of hacking took place at MIT in 1969.
• Earlier hacking was done just to improve performance by manipulating
software and hardware.
• In 1971 John Draper hacked a phone system.
• In 1983 Fred Cohen developed a virus.
• And further, more malwares were created and more hacking activities took
place.
Types of Hackers
Gaurav Yadav IIITS
• Black Hat Hackers (Crackers): They gain unauthorized system access. Data Theft,
Ransom, Defamation are their major reasons.
• Grey Hat Hackers: They often gain unauthorized system access, and report the
vulnerabilities to the owners, for a little fee. But if the owner doesn’t comply, they
make the vulnerabilities public.
• White Hat Hackers (Ethical Hackers): They gain authorized system access when the
owner allows them. They intend to secure computer networks or systems.
Understanding Ethical Hacking
Gaurav Yadav IIITS
Cybersecurity
Ethical
Hacking
• Ethical hacking is an essential part of
Cybersecurity.
• Ethical hacking is the act of finding security
loopholes in computer systems, networks, or
other electronic gadgets such as IoT Devices, by
the permission of the owner.
Law and Ethics
Gaurav Yadav IIITS
• All Ethical hackers are aware of laws and they know how the laws will impact their
work.
• Trust is the most import thing between an ethical hacker and the client.
• Going beyond the test limits can make clients to take legal action against ethical
hackers.
Why Ethical Hacking?
Gaurav Yadav IIITS
• To know weaknesses of the security architecture.
• For better preparation against cyberattacks.
• For better reaction to an ongoing cyberattack.
• For an understanding of the hacker’s point of view.
• For ensuring safety and privacy standards.
• In the ever-growing $150 billion* cybersecurity industry, ethical hacking is an
in-demand and rapidly growing career option.
*https://www.mordorintelligence.com/industry-reports/cyber-security-market
Types of Ethical Hacking
Gaurav Yadav IIITS
1. System Hacking : It involves gaining access into computers on a network by means of malware,
etc. For example – Privilege escalation in an operating system.
2. Wireless Network Hacking : It involves gaining access into private unsecured networks. For
Example – Hacking an unsecured Wi-Fi.
3. Web Application Hacking : It involves hacking into websites. It involves attacks like XSS, RCE,
IDORs, CSRF, Path Traversal, etc.
4. Web Server Hacking : It involves hacking into dedicated web servers of websites and altering
the content. For example - SQLi attacks.
5. Social Engineering : It involves the usage of social skills to lure people to provide sensitive
information. For example – Phone Phishing.
Industry Perspective of Ethical Hacking
Gaurav Yadav IIITS
• Companies either hire employ teams or launch public/private
VDPs(Vulnerability Disclosure Programs) to maintain security standards.
Platforms like Hackerone, Bugcrowd, Intigriti offer bug bounties on
behalf of several tech companies for a valid bug report.
• Ethical hacking reduces losses extensively.
Certifications for Ethical Hacking
Gaurav Yadav IIITS
• Cybersecurity giants like Cisco, Palo Alto Networks, etc. approve people based on
practical exams, and certify them accordingly.
• Certifications represent practical learning and an individual’s skillset.
• Certifications help in career upliftment.
• Some of the most popular certifications are OSCP, CompTIA Security+, CISSP,
CEH, etc.
References
Gaurav Yadav IIITS
1. https://www.eccouncil.org/ethical-hacking/
2. https://us.norton.com/internetsecurity-emerging-threats.html
3. https://www.kaspersky.co.in/enterprise-security/threat-management-defense-solution
4. https://www.guru99.com/ethical-hacking-tutorials.html
5. https://www.mordorintelligence.com/industry-reports/cyber-security-market
Gaurav Yadav IIITS
“Is hacking ever acceptable? It depends on the motive”
~ Charlie Brooker

Mais conteúdo relacionado

Mais procurados

Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingNitish Kasar
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speechtalhaabid
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Moduleankit sarode
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To HackingRaghav Bisht
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical HackingVanipriya Sakthivel
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 

Mais procurados (20)

Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Semelhante a Ethical hacking

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfuzair
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptxjohnnymaaza
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2Ishaq Shinwari
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Introduction of ethical hacking.........
Introduction of ethical hacking.........Introduction of ethical hacking.........
Introduction of ethical hacking.........AalyanAbid
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptxInfosectrain3
 
Etical hacking
Etical hackingEtical hacking
Etical hackingtalhaabid
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi SamridhiJain48
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Mohammad Affan
 

Semelhante a Ethical hacking (20)

Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Hacking
HackingHacking
Hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Introduction of ethical hacking.........
Introduction of ethical hacking.........Introduction of ethical hacking.........
Introduction of ethical hacking.........
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
 
Hacking
HackingHacking
Hacking
 
Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
 

Último

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 

Último (20)

(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Ethical hacking

  • 1. Ethical Hacking Gaurav Yadav Indian Institute of Information Technology Sonepat Gaurav Yadav IIITS
  • 2. Contents Gaurav Yadav IIITS • Introduction to Hacking • The Evolution of Hacking • Types of Hackers • Understanding Ethical Hacking • Law and Ethics • Why Ethical Hacking? • Types of Ethical Hacking • Industry Perspective of Ethical Hacking • Certifications for Ethical Hacking
  • 3. Introduction to Hacking Gaurav Yadav IIITS • Hacking is the act of identifying security vulnerabilities in networks, computer systems or electronic gadgets and exploiting them. For example – gaining unauthorized access to someone’s Wi-Fi. • Hacking requires creative thinking, persistent learning, and a lot of patience.
  • 4. The Evolution of Hacking Gaurav Yadav IIITS • The birth of hacking took place at MIT in 1969. • Earlier hacking was done just to improve performance by manipulating software and hardware. • In 1971 John Draper hacked a phone system. • In 1983 Fred Cohen developed a virus. • And further, more malwares were created and more hacking activities took place.
  • 5. Types of Hackers Gaurav Yadav IIITS • Black Hat Hackers (Crackers): They gain unauthorized system access. Data Theft, Ransom, Defamation are their major reasons. • Grey Hat Hackers: They often gain unauthorized system access, and report the vulnerabilities to the owners, for a little fee. But if the owner doesn’t comply, they make the vulnerabilities public. • White Hat Hackers (Ethical Hackers): They gain authorized system access when the owner allows them. They intend to secure computer networks or systems.
  • 6. Understanding Ethical Hacking Gaurav Yadav IIITS Cybersecurity Ethical Hacking • Ethical hacking is an essential part of Cybersecurity. • Ethical hacking is the act of finding security loopholes in computer systems, networks, or other electronic gadgets such as IoT Devices, by the permission of the owner.
  • 7. Law and Ethics Gaurav Yadav IIITS • All Ethical hackers are aware of laws and they know how the laws will impact their work. • Trust is the most import thing between an ethical hacker and the client. • Going beyond the test limits can make clients to take legal action against ethical hackers.
  • 8. Why Ethical Hacking? Gaurav Yadav IIITS • To know weaknesses of the security architecture. • For better preparation against cyberattacks. • For better reaction to an ongoing cyberattack. • For an understanding of the hacker’s point of view. • For ensuring safety and privacy standards. • In the ever-growing $150 billion* cybersecurity industry, ethical hacking is an in-demand and rapidly growing career option. *https://www.mordorintelligence.com/industry-reports/cyber-security-market
  • 9. Types of Ethical Hacking Gaurav Yadav IIITS 1. System Hacking : It involves gaining access into computers on a network by means of malware, etc. For example – Privilege escalation in an operating system. 2. Wireless Network Hacking : It involves gaining access into private unsecured networks. For Example – Hacking an unsecured Wi-Fi. 3. Web Application Hacking : It involves hacking into websites. It involves attacks like XSS, RCE, IDORs, CSRF, Path Traversal, etc. 4. Web Server Hacking : It involves hacking into dedicated web servers of websites and altering the content. For example - SQLi attacks. 5. Social Engineering : It involves the usage of social skills to lure people to provide sensitive information. For example – Phone Phishing.
  • 10. Industry Perspective of Ethical Hacking Gaurav Yadav IIITS • Companies either hire employ teams or launch public/private VDPs(Vulnerability Disclosure Programs) to maintain security standards. Platforms like Hackerone, Bugcrowd, Intigriti offer bug bounties on behalf of several tech companies for a valid bug report. • Ethical hacking reduces losses extensively.
  • 11. Certifications for Ethical Hacking Gaurav Yadav IIITS • Cybersecurity giants like Cisco, Palo Alto Networks, etc. approve people based on practical exams, and certify them accordingly. • Certifications represent practical learning and an individual’s skillset. • Certifications help in career upliftment. • Some of the most popular certifications are OSCP, CompTIA Security+, CISSP, CEH, etc.
  • 12. References Gaurav Yadav IIITS 1. https://www.eccouncil.org/ethical-hacking/ 2. https://us.norton.com/internetsecurity-emerging-threats.html 3. https://www.kaspersky.co.in/enterprise-security/threat-management-defense-solution 4. https://www.guru99.com/ethical-hacking-tutorials.html 5. https://www.mordorintelligence.com/industry-reports/cyber-security-market
  • 13. Gaurav Yadav IIITS “Is hacking ever acceptable? It depends on the motive” ~ Charlie Brooker