0
Government Polytechnic, Ahmedabad
Government Polytechnic, Ahmedabad
Communities of
Categories
Hackers
of Hacker
1. White Hat
1.White Hat
2. Grey Hat
2.Grey Hat
3. Black Hat
3.Black Hat
4. Ph...
1. White Hat :
A white hat is the hero or good guy, especially in
computing, where it refers to an Ethical Hacker or
Penet...
2. Grey Hat :
A
grey
hat,
refers to a skilled
hacker
who
sometimes acts
legally,
sometimes
in
good will, and
sometimes not...
3. Black Hat : A black hat is the villain or bad guy. It
refers to a hacker that breaks into networks or
computers, or cre...
4. Phreaker :
The person
who
acts
of
gaining
unauthorized
access
to
Telecommunication
systems, especially
to obtain Free C...
5. Script Kiddies :
Script kiddies are
like amateur kids
who gains illegal
access
to
computer
systems, often by
using
hack...
6.
Hacktivist
:
Hacktivist
is
a
mixture
of
the
words Hacker and
Activist.
They have taken to
defacing websites
or
computer...
Some Malicious Hacking Strategies :
As there are steps to develop any software so as Every hackers do
follow some predefin...
Not all Hackers do evil work.
Here's what you need to know to use your
Hacking Skills to do Good.

'Ethical Hacking' Is A ...
Why Do We Need Ethical Hacking
Social
Engineering
Automated
Attacks

Organizational
Attacks

Restricted
Data
Accidental
Br...
Who are CEH? :
Certified
Ethical
Hackers
are
Technically Skilled IT Professionals With
A Strong Desire To Solve Problems A...
How To Be Ethical Hacker :
One Can Become A Ethical Hacker by
Getting Just A Formal Training in Ethical
Hacking to Learn T...
Job :
There Are Lucrative
Jobs Available In
Government
Organizations,
Banks,
Financial
Institutions,
Military
Establishmen...
What to Learn :
Learn
Operating
Systems like Windows,
Mac and especially
UNIX as it is regarded
as
the
original
operating ...
As a Ethical Hacker Keep in Mind :
* Always keep learning new things.

* Don’t do it just for fun.
* Never do it just for ...
“The one who can hack it, can only
secure it”
Always Stay connected …
To The Hacker Community By Sharing Technical
Informa...
Government Polytechnic
Ahmedabad

TechNet 2014
Gunjan Panara
(126170307057)

Vishwa Soni
(126170307020)

Government Polyte...
Ethical Hacking - Explained
Upcoming SlideShare
Loading in...5
×

Ethical Hacking - Explained

3,007

Published on

Introduction to Ethical Hacking.
Explained Very Simple : Hacking vs Ethical Hacking
Presented at TechNet 2014 : Government Polytechnic,Ahmedabad

Published in: Technology, News & Politics
0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,007
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
359
Comments
0
Likes
4
Embeds 0
No embeds

No notes for slide

Transcript of "Ethical Hacking - Explained"

  1. 1. Government Polytechnic, Ahmedabad
  2. 2. Government Polytechnic, Ahmedabad
  3. 3. Communities of Categories Hackers of Hacker 1. White Hat 1.White Hat 2. Grey Hat 2.Grey Hat 3. Black Hat 3.Black Hat 4. Phreaker 4.Phreaker 5. Script Kiddies 5.Script Kiddies 6. Hactivist 6.Hacktivist Government Polytechnic, Ahmedabad Government Polytechnic, Ahmedabad
  4. 4. 1. White Hat : A white hat is the hero or good guy, especially in computing, where it refers to an Ethical Hacker or Penetration Tester who focuses on securing and protecting IT systems. Such people are Employed by Companies where these Professionals are sometimes called Tiger Teams or Red Teams. Government Polytechnic, Ahmedabad
  5. 5. 2. Grey Hat : A grey hat, refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not. They are a hybrid between white and black hat hackers. Government Polytechnic, Ahmedabad
  6. 6. 3. Black Hat : A black hat is the villain or bad guy. It refers to a hacker that breaks into networks or computers, or creates computer viruses. They are specialized in unauthorized penetration of information systems. They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Hence they should not be confused with ethical hackers. Government Polytechnic, Ahmedabad
  7. 7. 4. Phreaker : The person who acts of gaining unauthorized access to Telecommunication systems, especially to obtain Free Calls. Government Polytechnic, Ahmedabad
  8. 8. 5. Script Kiddies : Script kiddies are like amateur kids who gains illegal access to computer systems, often by using hacking programs downloaded from the internet. Their objective is to try to impress their friends. Government Polytechnic, Ahmedabad
  9. 9. 6. Hacktivist : Hacktivist is a mixture of the words Hacker and Activist. They have taken to defacing websites or computer systems for political reasons or social aim. Government Polytechnic, Ahmedabad
  10. 10. Some Malicious Hacking Strategies : As there are steps to develop any software so as Every hackers do follow some predefined rules or steps to hack into the system. 1. Information : The basic information gathering about the target system. 2. Scanning : Scanning the target system for open ports and services running on the open ports etc. 3. Gaining Access : Gaining the actual access of the particular target system by exploiting the system. 4. Maintaining Access : Keeping the access of the system. 5. Clearing Tracks : To remove the footprints if any so as to remain undetected from the victim. Government Polytechnic, Ahmedabad
  11. 11. Not all Hackers do evil work. Here's what you need to know to use your Hacking Skills to do Good. 'Ethical Hacking' Is A Form of 'Legal Hacking' That Is Done With The Permission of An Organization To Help Increase Its Security. Government Polytechnic, Ahmedabad
  12. 12. Why Do We Need Ethical Hacking Social Engineering Automated Attacks Organizational Attacks Restricted Data Accidental Breaches in Security Viruses, Trojan Horses, and Worms Government Polytechnic, Ahmedabad Government Polytechnic, Ahmedabad Denial of Service (DoS)
  13. 13. Who are CEH? : Certified Ethical Hackers are Technically Skilled IT Professionals With A Strong Desire To Solve Problems And Prevent Malicious Hackers From Causing Damage To Network Systems. Government Polytechnic, Ahmedabad
  14. 14. How To Be Ethical Hacker : One Can Become A Ethical Hacker by Getting Just A Formal Training in Ethical Hacking to Learn The Basic Fundamentals of Hacking. As You Became A Ethical Hacker You Need Motivation, Dedication, Initiative, Self-education And Tough Knowledge To Improve Your-Self As Per The New Innovations. Government Polytechnic, Ahmedabad
  15. 15. Job : There Are Lucrative Jobs Available In Government Organizations, Banks, Financial Institutions, Military Establishments And Private Companies. India will need more than 4 lakh ethical hackers by 2015. -Rediff.com Government Polytechnic, Ahmedabad
  16. 16. What to Learn : Learn Operating Systems like Windows, Mac and especially UNIX as it is regarded as the original operating system built by hackers. Evaluate your strengths and interests and gain some basic programming knowledge such as C,C++, or Java. Experience with various networking devices and networking protocols. Government Polytechnic, Ahmedabad
  17. 17. As a Ethical Hacker Keep in Mind : * Always keep learning new things. * Don’t do it just for fun. * Never do it just for money. * Keep you focus intact in your job. * Always work within the law and never try to break it. Government Polytechnic, Ahmedabad
  18. 18. “The one who can hack it, can only secure it” Always Stay connected … To The Hacker Community By Sharing Technical Information And Ideas. Government Polytechnic, Ahmedabad
  19. 19. Government Polytechnic Ahmedabad TechNet 2014 Gunjan Panara (126170307057) Vishwa Soni (126170307020) Government Polytechnic, Ahmedabad Pooja Mahida (126170307029)
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×