• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Hacking ppt
 

Hacking ppt

on

  • 33,551 views

 

Statistics

Views

Total Views
33,551
Views on SlideShare
33,545
Embed Views
6

Actions

Likes
24
Downloads
0
Comments
6

2 Embeds 6

http://us-w1.rockmelt.com 3
http://pinterest.com 3

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

16 of 6 previous next Post a comment

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • plz mail me this content on dreamyboy600@gmail.com
    Are you sure you want to
    Your message goes here
    Processing…
  • enable save please!!!!!!!
    Are you sure you want to
    Your message goes here
    Processing…
  • I Got The Full File, I Just Wanna Share to You Guyszz.. It's Working You Can The Download The Full File + Instructions Here : http://gg.gg/setupexe
    Are you sure you want to
    Your message goes here
    Processing…
  • good
    Are you sure you want to
    Your message goes here
    Processing…
  • 123
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Hacking ppt Hacking ppt Presentation Transcript

    • A Presentation by RITIANSpresentation on ETHICAL HACKING
      byGIRIDHAR.SRAGHU INSTITUTE OF TECHNOLOGY
    • ABSTRACT
      The explosive growth of the Internet has brought many good things :electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet. With these concerns and others, the ethical hacker can help.
      This paper describes ethical hackers: their skills, their attitudes, and how they go about helping their customers find and plug up security holes. The ethical hacking process is explained, along with many of the problems that the Global Security Analysis Lab has seen during its early years of ethical hacking for IBM clients. The term “hacker” has a dual usage in the computer industry today. Originally, the term was defined as: HACKER. A person who enjoys learning the details of computer systems and how to stretch their capabilities.
    • CONTENTS
      • What is hacking
      • Hackers are here… where are you??
      • What is a HACKER ?
      • What is ETHICAL HACKING ??
      • Who are ETHICAL HACHERS ??
      • What do ETHICAL HACKERS do??
      • Modes of ETHICAL HACKING ??
      • HACKER classes
    • Hacking is not the one which you people think of….
      It’s not the one which you play with other’s computers (organization's, Government's etc…)
      Now a days this technology has become a crime due to these aspects
      We should not miss use the technologies for such criminal aspects
      Instead we can use it in better manner like security purpose
      WHAT IS ETHICAL HACKING???
    • Hackers are here. Where are you?
      The explosive growth of the Internet has brought many good things…As with most technological advances, there is also a dark side: criminal hackers.
      The term “hacker” has a dual usage in the computer industry today. Originally, the term was defined as:
      HACKER:1. A person who enjoys learning the details of computer systems and how to stretch their capabilities…. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming.
    • What is a Hacker?
      Old School Hackers: 1960s style Stanford or MIT hackers. Do not have malicious intent, but do have lack of concern for privacy and proprietary information. They believe the Internet was designed to be an open system.
      Script Kiddies or Cyber-Punks: Between 12-30; predominantly white and male; bored in school; get caught due to bragging online; intent is to vandalize or disrupt systems.
      Professional Criminals or Crackers: Make a living by breaking into systems and selling the information.
      Coders and Virus Writers: See themselves as an elite; programming background and write code but won’t use it themselves; have their own networks called “zoos”; leave it to others to release their code into “The Wild” or Internet.
    • What is Ethical Hacking?
      Ethical hacking – defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments.”
      With the growth of the Internet, computer security has become a major concern for businesses and governments.
      In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
    • Who are Ethical Hackers?
      “One of the best ways to evaluate the intruder threat is to have an independent computer security professionals attempt to break their computer systems”
      Successful ethical hackers possess a variety of skills. First and foremost, they must be completely trustworthy.
      Ethical hackers typically have very strong programming and computer networking skills.
      They are also adept at installing and maintaining systems that use the more popular operating systems (e.g., Linux or Windows 2000) used on target systems.
      These base skills are augmented with detailed knowledge of the hardware and software provided by the more popular computer and networking hardware vendors.
    • What do Ethical Hackers do?
      An ethical hacker’s evaluation of a system’s security seeks answers to these basic questions:
      What can an intruder see on the target systems?
      What can an intruder do with that information?
      Does anyone at the target notice the intruder’s at tempts or successes?
      What are you trying to protect?
      What are you trying to protect against?
      How much time, effort, and money are you willing to expend to obtain adequate protection?
    • Modes of Ethical Hacking
      Insider attack
      Outsider attack
      Stolen equipment attack
      Physical entry
      Bypassed authentication attack (wireless access points)
      Social engineering attack
    • Hacker classes
      Black hats – highly skilled,
      malicious, destructive “crackers”
      White hats – skills used for
      defensive security analysts
      Gray hats – offensively and
      defensively; will hack for different
      reasons, depends on situation.
      Hactivism – hacking for social and political cause.
      Ethical hackers – determine what attackers can gain access to, what they will do with the information, and can they be detected.
    • ANY QUARES???