SlideShare uma empresa Scribd logo
1 de 23
NOTHING IS ILLEGAL UNTIL
YOU GET CAUGHT
HACKING IS NOT A CRIME
Hacking is the practice of modifying the features of a
system, in order to accomplish a goal outside of the
creator's original purpose. The person who is
consistently engaging in hacking activities, and has
accepted hacking as a lifestyle and philosophy of their
choice, is called a hacker.
TYPES OF HACKERS
1. Black Hat Hackers
2. White Hat Hackers
3. Grey Hat Hackers
4. Script kiddies
1. Black Hat hackers always do illegal work. They
Work for black money . They hack into to Bank
Websites , credit card websites and stole
Money from accounts in bank websites.

2. They are professionals in their fields.

3. They use their knowledge for illegal purposes.
1 . White hat hackers are like Ethical Hackers .
They use their skills for good purposes.

2. They work for organizations for stop the illegal
activities through black hat hackers.
1. Grey Hat hackers have both qualities like
   black hat hackers and white hat hackers .

2. They use their knowledge for bad purposes
   and good purposes too.
1. Script kiddies hacks into computer
   or websites using the tools available
   on the internet .
2. They don’t have knowledge of
   programming .
WHAT IS ETHICAL HACKING

Independent computer security
Professionals breaking into the
computer systems.

Neither damage the target systems
nor steal information.

Evaluate target systems security and
report back to owners about the
vulnerabilities found
INTRODUCTION TO ETHICAL HACKING
  Ethical hackers
    Employed by companies to perform penetration tests


  Penetration test
    Legal attempt to break into a company’s network to find
     its weakest link
    Tester only reports findings, does not solve problems
THE ROLE OF SECURITY AND
  PENETRATION TESTS
 Hackers
   Access computer system or network without authorization

   Breaks the law; can go to prison

 Crackers
   Break into systems to steal or destroy data
   U.S. Department of Justice calls both hackers

 Ethical hacker
   Performs most of the same activities but with owner’s
    permission
BENEFITS OF ETHICAL HACKING

 1. Certified Ethical Hacker

 2. Perform hacking operation into network
    with owner’s permission

 3. Penetrate the websites and networks with
 Authorization
STEPS TO PERFORM ETHICAL
HACKING
•Information gathering

•Scanning

•Analyze System

•Prepare for attack

•Access the system

•Maintaining Access
SOME BLACK HAT HACKERS
1. Kevin Poulsen

2. Kevin d Mitnick

3. Adrain Lamo

4. George Hotz

5. Jonathan james
SOME WHITE HAT HACKERS

1. Tim berner Lee

2. Bill Gates

3. Linus Tovaldes

4. Steve Jobs

5. Steve Wozniak
Extremely high end proffesional ethical hacking presentation

Mais conteúdo relacionado

Destaque

presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking Amol Deshmukh
 
Prezi : mode d'emploi
Prezi : mode d'emploiPrezi : mode d'emploi
Prezi : mode d'emploiAureleib
 
Collaboration, Big Data and the search for the Higgs Boson
Collaboration, Big Data and the  search for the Higgs BosonCollaboration, Big Data and the  search for the Higgs Boson
Collaboration, Big Data and the search for the Higgs BosonSuma Pria Tunggal
 
Advanced penetration testing - Amarendra Godbole
Advanced penetration testing - Amarendra GodboleAdvanced penetration testing - Amarendra Godbole
Advanced penetration testing - Amarendra GodboleIndicThreads
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
Easiest way to start with Shell scripting
Easiest way to start with Shell scriptingEasiest way to start with Shell scripting
Easiest way to start with Shell scriptingAkshay Siwal
 
Vodafone beta factory - GEC 2015
Vodafone beta factory - GEC 2015Vodafone beta factory - GEC 2015
Vodafone beta factory - GEC 2015Marcello Viti
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
y3dips hacking priv8 network
y3dips hacking priv8 networky3dips hacking priv8 network
y3dips hacking priv8 networkidsecconf
 
What The Heck Is Hacking?
What The Heck Is Hacking? What The Heck Is Hacking?
What The Heck Is Hacking? Lars Zimmermann
 
Advanced growth hacking
Advanced growth hackingAdvanced growth hacking
Advanced growth hackingVasil Azarov
 
Travel Hacking 101
Travel Hacking 101Travel Hacking 101
Travel Hacking 101nbuchan1
 

Destaque (15)

Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Hacking Techniques
Hacking TechniquesHacking Techniques
Hacking Techniques
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
 
Prezi : mode d'emploi
Prezi : mode d'emploiPrezi : mode d'emploi
Prezi : mode d'emploi
 
Collaboration, Big Data and the search for the Higgs Boson
Collaboration, Big Data and the  search for the Higgs BosonCollaboration, Big Data and the  search for the Higgs Boson
Collaboration, Big Data and the search for the Higgs Boson
 
Advanced penetration testing - Amarendra Godbole
Advanced penetration testing - Amarendra GodboleAdvanced penetration testing - Amarendra Godbole
Advanced penetration testing - Amarendra Godbole
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Tor Pivoting Networks Share
Tor Pivoting Networks Share Tor Pivoting Networks Share
Tor Pivoting Networks Share
 
Easiest way to start with Shell scripting
Easiest way to start with Shell scriptingEasiest way to start with Shell scripting
Easiest way to start with Shell scripting
 
Vodafone beta factory - GEC 2015
Vodafone beta factory - GEC 2015Vodafone beta factory - GEC 2015
Vodafone beta factory - GEC 2015
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
y3dips hacking priv8 network
y3dips hacking priv8 networky3dips hacking priv8 network
y3dips hacking priv8 network
 
What The Heck Is Hacking?
What The Heck Is Hacking? What The Heck Is Hacking?
What The Heck Is Hacking?
 
Advanced growth hacking
Advanced growth hackingAdvanced growth hacking
Advanced growth hacking
 
Travel Hacking 101
Travel Hacking 101Travel Hacking 101
Travel Hacking 101
 

Mais de thetechnicalzone

Mais de thetechnicalzone (7)

AT mega8 basics
AT mega8 basicsAT mega8 basics
AT mega8 basics
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
All dos commands
All dos commandsAll dos commands
All dos commands
 
Ccna new syllabus
Ccna new syllabusCcna new syllabus
Ccna new syllabus
 
Computer harware complete notes
Computer harware complete notesComputer harware complete notes
Computer harware complete notes
 
Network engg
Network enggNetwork engg
Network engg
 
Ccna
CcnaCcna
Ccna
 

Último

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Último (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Extremely high end proffesional ethical hacking presentation

  • 1.
  • 2.
  • 3. NOTHING IS ILLEGAL UNTIL YOU GET CAUGHT
  • 4. HACKING IS NOT A CRIME
  • 5. Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.
  • 6. TYPES OF HACKERS 1. Black Hat Hackers 2. White Hat Hackers 3. Grey Hat Hackers 4. Script kiddies
  • 7.
  • 8. 1. Black Hat hackers always do illegal work. They Work for black money . They hack into to Bank Websites , credit card websites and stole Money from accounts in bank websites. 2. They are professionals in their fields. 3. They use their knowledge for illegal purposes.
  • 9.
  • 10. 1 . White hat hackers are like Ethical Hackers . They use their skills for good purposes. 2. They work for organizations for stop the illegal activities through black hat hackers.
  • 11.
  • 12. 1. Grey Hat hackers have both qualities like black hat hackers and white hat hackers . 2. They use their knowledge for bad purposes and good purposes too.
  • 13.
  • 14. 1. Script kiddies hacks into computer or websites using the tools available on the internet . 2. They don’t have knowledge of programming .
  • 15.
  • 16. WHAT IS ETHICAL HACKING Independent computer security Professionals breaking into the computer systems. Neither damage the target systems nor steal information. Evaluate target systems security and report back to owners about the vulnerabilities found
  • 17. INTRODUCTION TO ETHICAL HACKING  Ethical hackers  Employed by companies to perform penetration tests  Penetration test  Legal attempt to break into a company’s network to find its weakest link  Tester only reports findings, does not solve problems
  • 18. THE ROLE OF SECURITY AND PENETRATION TESTS  Hackers  Access computer system or network without authorization  Breaks the law; can go to prison  Crackers  Break into systems to steal or destroy data  U.S. Department of Justice calls both hackers  Ethical hacker  Performs most of the same activities but with owner’s permission
  • 19. BENEFITS OF ETHICAL HACKING 1. Certified Ethical Hacker 2. Perform hacking operation into network with owner’s permission 3. Penetrate the websites and networks with Authorization
  • 20. STEPS TO PERFORM ETHICAL HACKING •Information gathering •Scanning •Analyze System •Prepare for attack •Access the system •Maintaining Access
  • 21. SOME BLACK HAT HACKERS 1. Kevin Poulsen 2. Kevin d Mitnick 3. Adrain Lamo 4. George Hotz 5. Jonathan james
  • 22. SOME WHITE HAT HACKERS 1. Tim berner Lee 2. Bill Gates 3. Linus Tovaldes 4. Steve Jobs 5. Steve Wozniak