Ethical Hacking - Explained
Upcoming SlideShare
Loading in...5
×
 

Ethical Hacking - Explained

on

  • 942 views

Introduction to Ethical Hacking.

Introduction to Ethical Hacking.
Explained Very Simple : Hacking vs Ethical Hacking
Presented at TechNet 2014 : Government Polytechnic,Ahmedabad

Statistics

Views

Total Views
942
Views on SlideShare
942
Embed Views
0

Actions

Likes
1
Downloads
117
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Ethical Hacking - Explained Ethical Hacking - Explained Presentation Transcript

  • Government Polytechnic, Ahmedabad
  • Government Polytechnic, Ahmedabad
  • Communities of Categories Hackers of Hacker 1. White Hat 1.White Hat 2. Grey Hat 2.Grey Hat 3. Black Hat 3.Black Hat 4. Phreaker 4.Phreaker 5. Script Kiddies 5.Script Kiddies 6. Hactivist 6.Hacktivist Government Polytechnic, Ahmedabad Government Polytechnic, Ahmedabad
  • 1. White Hat : A white hat is the hero or good guy, especially in computing, where it refers to an Ethical Hacker or Penetration Tester who focuses on securing and protecting IT systems. Such people are Employed by Companies where these Professionals are sometimes called Tiger Teams or Red Teams. Government Polytechnic, Ahmedabad
  • 2. Grey Hat : A grey hat, refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not. They are a hybrid between white and black hat hackers. Government Polytechnic, Ahmedabad
  • 3. Black Hat : A black hat is the villain or bad guy. It refers to a hacker that breaks into networks or computers, or creates computer viruses. They are specialized in unauthorized penetration of information systems. They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Hence they should not be confused with ethical hackers. Government Polytechnic, Ahmedabad
  • 4. Phreaker : The person who acts of gaining unauthorized access to Telecommunication systems, especially to obtain Free Calls. Government Polytechnic, Ahmedabad
  • 5. Script Kiddies : Script kiddies are like amateur kids who gains illegal access to computer systems, often by using hacking programs downloaded from the internet. Their objective is to try to impress their friends. Government Polytechnic, Ahmedabad
  • 6. Hacktivist : Hacktivist is a mixture of the words Hacker and Activist. They have taken to defacing websites or computer systems for political reasons or social aim. Government Polytechnic, Ahmedabad
  • Some Malicious Hacking Strategies : As there are steps to develop any software so as Every hackers do follow some predefined rules or steps to hack into the system. 1. Information : The basic information gathering about the target system. 2. Scanning : Scanning the target system for open ports and services running on the open ports etc. 3. Gaining Access : Gaining the actual access of the particular target system by exploiting the system. 4. Maintaining Access : Keeping the access of the system. 5. Clearing Tracks : To remove the footprints if any so as to remain undetected from the victim. Government Polytechnic, Ahmedabad
  • Not all Hackers do evil work. Here's what you need to know to use your Hacking Skills to do Good. 'Ethical Hacking' Is A Form of 'Legal Hacking' That Is Done With The Permission of An Organization To Help Increase Its Security. Government Polytechnic, Ahmedabad
  • Why Do We Need Ethical Hacking Social Engineering Automated Attacks Organizational Attacks Restricted Data Accidental Breaches in Security Viruses, Trojan Horses, and Worms Government Polytechnic, Ahmedabad Government Polytechnic, Ahmedabad Denial of Service (DoS)
  • Who are CEH? : Certified Ethical Hackers are Technically Skilled IT Professionals With A Strong Desire To Solve Problems And Prevent Malicious Hackers From Causing Damage To Network Systems. Government Polytechnic, Ahmedabad
  • How To Be Ethical Hacker : One Can Become A Ethical Hacker by Getting Just A Formal Training in Ethical Hacking to Learn The Basic Fundamentals of Hacking. As You Became A Ethical Hacker You Need Motivation, Dedication, Initiative, Self-education And Tough Knowledge To Improve Your-Self As Per The New Innovations. Government Polytechnic, Ahmedabad
  • Job : There Are Lucrative Jobs Available In Government Organizations, Banks, Financial Institutions, Military Establishments And Private Companies. India will need more than 4 lakh ethical hackers by 2015. -Rediff.com Government Polytechnic, Ahmedabad
  • What to Learn : Learn Operating Systems like Windows, Mac and especially UNIX as it is regarded as the original operating system built by hackers. Evaluate your strengths and interests and gain some basic programming knowledge such as C,C++, or Java. Experience with various networking devices and networking protocols. Government Polytechnic, Ahmedabad
  • As a Ethical Hacker Keep in Mind : * Always keep learning new things. * Don’t do it just for fun. * Never do it just for money. * Keep you focus intact in your job. * Always work within the law and never try to break it. Government Polytechnic, Ahmedabad
  • “The one who can hack it, can only secure it” Always Stay connected … To The Hacker Community By Sharing Technical Information And Ideas. Government Polytechnic, Ahmedabad
  • Government Polytechnic Ahmedabad TechNet 2014 Gunjan Panara (126170307057) Vishwa Soni (126170307020) Government Polytechnic, Ahmedabad Pooja Mahida (126170307029)