SlideShare a Scribd company logo
1 of 11
ETHICAL HACKING DETAILS
INDEX
 Introduction
 What is Ethical Hacking?
 Eligibility
 Ethical Hacking Tricks
 Difference between Hacking and Ethical Hacking
Objective of Ethical Hacking
Methodology of Ethical Hacking
INTRODUCTION
 Ethical hacking- also known as penetration testing or
intrusion testing or red teaming has become a major
concern for businesses and governments.
 Companies are worried about the possibility of being
“hacked” and potential customers are worried about
maintaining control of personal information.
 Ethical hacking work is legal because it is performed to
increase the safety in the organization. As the GEORGE
JASSON , vice – president, Comguard Networks, in an
interview to diptiman Dewan elaborates on CAREER IN
ETHICAL HACKING growing rapidly.
ELIGIBILITY FOR MAKING CAREER IN ETHICAL HACKING:
1. Basic knowledge of Database, Server Side Programming ( PHP or JSP
or ASP .net) and Basic Knowledge of Networking
2. Having the certification from any institute that you are expertise in
maintaining computer security
ETHICAL HACKING TRICKS
 In a large amount of technologies ,methodology and algorithms are
used by the ethical hackers. It can range from the simple Buffer
Overflow Exploit to a SQL Injection.
 Different approaches require different tricks and methods. It can
range from C/C++ to MSF (Metaspliot Framework).
 The technical difference between ethical hacking and hacking is zero
but the moral difference is substantive.
 The fact that the ethical hacker is able to protect the system implies that
he has the skills to penetrate or crash other systems and check moves
by the prospective hacker to create mischief to the organization for
which the ethical hacker is working for.
 So, the difference between a white hat and a black hat is one of
perspective.
 A black hat in an organization can be the white hat for other
organizations if he switches employment.
Difference between Hacking and Ethical Hacking?
OBJECTIVE OF ETHICAL HACKING
 Ethical hacking offers an objective analysis of an organization’s
information security posture for organizations of any level of
security expertise.
 "The result of such an assessment is an actionable report with
valuable remediation advice tailored to the customer's unique
IT environment, capabilities, and security objectives," says
Chris Rodriguez.
 As organizations of all sizes and sophistication levels can
benefit from objective, expert, third-party analysis, ethical
hacking has become a more mainstream service in the past
decade.
METHODOLOGY OF ETHICAL HACKING
The various stages in the ethical hacking methodology
are:
 Reconnaissance
 Scanning & Enumeration
 Gaining access
 Maintaining access
 Clearing tracks
To Know about Top Ethical Hacking Institutes in Bangalore, ClickHere
 Reconnaissance:
This is the stage in which the hacker collects information about the
company which the personal is going to hack.
 Scanning & Enumeration:
Scanning is the second phase in the hacking methodology in which the
hacker tries to make a blue print of the target network.
 Gaining access:
This is the actual hacking phase in which the hacker
gains access to the system.
 Maintaining Access:
Now the hacker is inside the system by some means by
password guessing or exploiting some of its
vulnerabilities.
 Clearing Tracks:
Whenever a hacker downloads some file or installs some
software, its log will be stored in the server logs. So in
order to erase that hacker uses man tools.
To know more about Ethical Hackin
Click Here

More Related Content

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 

Featured (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

ethical hacking details

  • 2. INDEX  Introduction  What is Ethical Hacking?  Eligibility  Ethical Hacking Tricks  Difference between Hacking and Ethical Hacking Objective of Ethical Hacking Methodology of Ethical Hacking
  • 3. INTRODUCTION  Ethical hacking- also known as penetration testing or intrusion testing or red teaming has become a major concern for businesses and governments.  Companies are worried about the possibility of being “hacked” and potential customers are worried about maintaining control of personal information.  Ethical hacking work is legal because it is performed to increase the safety in the organization. As the GEORGE JASSON , vice – president, Comguard Networks, in an interview to diptiman Dewan elaborates on CAREER IN ETHICAL HACKING growing rapidly.
  • 4. ELIGIBILITY FOR MAKING CAREER IN ETHICAL HACKING: 1. Basic knowledge of Database, Server Side Programming ( PHP or JSP or ASP .net) and Basic Knowledge of Networking 2. Having the certification from any institute that you are expertise in maintaining computer security
  • 5. ETHICAL HACKING TRICKS  In a large amount of technologies ,methodology and algorithms are used by the ethical hackers. It can range from the simple Buffer Overflow Exploit to a SQL Injection.  Different approaches require different tricks and methods. It can range from C/C++ to MSF (Metaspliot Framework).
  • 6.  The technical difference between ethical hacking and hacking is zero but the moral difference is substantive.  The fact that the ethical hacker is able to protect the system implies that he has the skills to penetrate or crash other systems and check moves by the prospective hacker to create mischief to the organization for which the ethical hacker is working for.  So, the difference between a white hat and a black hat is one of perspective.  A black hat in an organization can be the white hat for other organizations if he switches employment. Difference between Hacking and Ethical Hacking?
  • 7. OBJECTIVE OF ETHICAL HACKING  Ethical hacking offers an objective analysis of an organization’s information security posture for organizations of any level of security expertise.  "The result of such an assessment is an actionable report with valuable remediation advice tailored to the customer's unique IT environment, capabilities, and security objectives," says Chris Rodriguez.  As organizations of all sizes and sophistication levels can benefit from objective, expert, third-party analysis, ethical hacking has become a more mainstream service in the past decade.
  • 8. METHODOLOGY OF ETHICAL HACKING The various stages in the ethical hacking methodology are:  Reconnaissance  Scanning & Enumeration  Gaining access  Maintaining access  Clearing tracks To Know about Top Ethical Hacking Institutes in Bangalore, ClickHere
  • 9.  Reconnaissance: This is the stage in which the hacker collects information about the company which the personal is going to hack.  Scanning & Enumeration: Scanning is the second phase in the hacking methodology in which the hacker tries to make a blue print of the target network.
  • 10.  Gaining access: This is the actual hacking phase in which the hacker gains access to the system.  Maintaining Access: Now the hacker is inside the system by some means by password guessing or exploiting some of its vulnerabilities.  Clearing Tracks: Whenever a hacker downloads some file or installs some software, its log will be stored in the server logs. So in order to erase that hacker uses man tools.
  • 11. To know more about Ethical Hackin Click Here