Ethical Hacking Introduction

2,141 views
1,792 views

Published on

Hi this is Maulik Kotak.about Ethical Hacking and information Security all the introduction with full description its easy to learning from any one i am not a Hacker but learning Hacking as Security Purpose and Share this Knowledge.

0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,141
On SlideShare
0
From Embeds
0
Number of Embeds
370
Actions
Shares
0
Downloads
130
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Ethical Hacking Introduction

  1. 1. Ethical Hacking Part 1 - BASICS
  2. 2. ./whoami 0 If You want to Hack some one First Hack Your self. 0 I am NOT a Hacker Just Learning for Security analyst.
  3. 3. ETHICAL HACKING
  4. 4. HACKING Hacking is unauthorized use of computer and network resources. According to Computer Crime Research Center: “It is act of gaining access without legal authorization to computer or computer network.”
  5. 5. Hacker 0 Someone who tries to break into computer systems for any illegal purpose. 0 Someone who maliciously breaks into systems for personal gain. These are criminals.
  6. 6. TYPES OF HACKERS  Black hat hacker.  White hat hacker.  Gray hat hacker.
  7. 7. Black Hat 0 They use their knowledge and skill set for illegal 0 activities, destructive intents. 0 E.g.-to gain money (online robbery), to take revenge. 0 Disgruntled 0 Employees is the best example of Black Hats. Attackers 0 (Black Hat Hackers) are not at all concerned with security 0 professionals (WhiteHathackers). Actually these hackers Are Bad Guys!!!
  8. 8. White Hat 0 They use their knowledge and skill set for 0 good, constructive intents. They find out new security 0 loopholes and their solutions. 0 E.g.-Cyber Security Peoples (FBI , NYPD, US-Homeland Security Breach)
  9. 9. Gray Hat 0 Individuals who works both offensively and 0 defensively at various times 0 E.g.-Third Party Security Testing in IT sectors
  10. 10. 0 To Make a Security Stronger. 0 Just For Fun. 0 Show Off 0 Hack Other System Secretly and steal Important information.
  11. 11. 0 Good coder. 0 Well Knowledge about hardware and Software. 0 Should have knowledge on security System.
  12. 12. What is ethical hacking ? 0 Ethical hacking ,also known as penetration testing or white-hat hacking involves the same tools, tricks, and techniques that hackers use, i.e., by duplicating the intent and actions of malicious hackers. 0 Ethical hacking is performed with the target’s permission.
  13. 13. Who are Ethical Hackers? An Ethical Hacker, also known as a white hat hacker, or simply a white hat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy. They have strong programming and computer networking v skills.Continuous updating of their knowledge on computer and network security is required. They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
  14. 14. Ethical Hacker Strategies An Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. They are completely trustworthy. They have strong programming and computer networking skills. They should have more patience. Continuous updating of their knowledge on computer and network security is required. They should know the techniques of the criminals, what their activities would be, how to detected them and how to stop them.
  15. 15. ETHICAL HACKING PROCESS 1. Foot printing 2. Scanning 3. Gaining Access 4. Maintaining Access
  16. 16. 1. Who is Lookup 2. Ns Lookup 3. IP Lookup
  17. 17. 1. Port Scanning 2. Network Scanning 3. Finger Printing
  18. 18. 0 Password attack 0 Social Engineering. 0 Virus
  19. 19. 1. OS backdoors 2. Trojan 3. Clearing Track
  20. 20. It is clear from the graph it is increasing day by day.
  21. 21. ADVANTAGES These are good hackers. Have genuine license to hack. Generally owned by companies for security designing. Provides security to banking and financial establishments.
  22. 22. Conclusions Always security professionals are one step behind the hackers and crackers. Plan for the unplanned attacks. The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.
  23. 23. !! For Regarding any question contact me !! http://www.maulikkotak.webnode.com http://www.facebook.com/maulikkotakstar http://www.twitter.com/maulikkotakstar

×