Nothing is illegal until you get caught... if you need more help or to download it for personal purpose please mail us or visit in our site
For else detail please log onto https://www.thetechnicalzone.com and mail us at thetechnicalzone@gmail.com
5. Hacking is the practice of modifying the features of a
system, in order to accomplish a goal outside of the
creator's original purpose. The person who is
consistently engaging in hacking activities, and has
accepted hacking as a lifestyle and philosophy of their
choice, is called a hacker.
6. TYPES OF HACKERS
1. Black Hat Hackers
2. White Hat Hackers
3. Grey Hat Hackers
4. Script kiddies
7.
8. 1. Black Hat hackers always do illegal work. They
Work for black money . They hack into to Bank
Websites , credit card websites and stole
Money from accounts in bank websites.
2. They are professionals in their fields.
3. They use their knowledge for illegal purposes.
9.
10. 1 . White hat hackers are like Ethical Hackers .
They use their skills for good purposes.
2. They work for organizations for stop the illegal
activities through black hat hackers.
11.
12. 1. Grey Hat hackers have both qualities like
black hat hackers and white hat hackers .
2. They use their knowledge for bad purposes
and good purposes too.
13.
14. 1. Script kiddies hacks into computer
or websites using the tools available
on the internet .
2. They don’t have knowledge of
programming .
15.
16. WHAT IS ETHICAL HACKING
Independent computer security
Professionals breaking into the
computer systems.
Neither damage the target systems
nor steal information.
Evaluate target systems security and
report back to owners about the
vulnerabilities found
17. INTRODUCTION TO ETHICAL HACKING
Ethical hackers
Employed by companies to perform penetration tests
Penetration test
Legal attempt to break into a company’s network to find
its weakest link
Tester only reports findings, does not solve problems
18. THE ROLE OF SECURITY AND
PENETRATION TESTS
Hackers
Access computer system or network without authorization
Breaks the law; can go to prison
Crackers
Break into systems to steal or destroy data
U.S. Department of Justice calls both hackers
Ethical hacker
Performs most of the same activities but with owner’s
permission
19. BENEFITS OF ETHICAL HACKING
1. Certified Ethical Hacker
2. Perform hacking operation into network
with owner’s permission
3. Penetrate the websites and networks with
Authorization
20. STEPS TO PERFORM ETHICAL
HACKING
•Information gathering
•Scanning
•Analyze System
•Prepare for attack
•Access the system
•Maintaining Access
21. SOME BLACK HAT HACKERS
1. Kevin Poulsen
2. Kevin d Mitnick
3. Adrain Lamo
4. George Hotz
5. Jonathan james
22. SOME WHITE HAT HACKERS
1. Tim berner Lee
2. Bill Gates
3. Linus Tovaldes
4. Steve Jobs
5. Steve Wozniak