SlideShare a Scribd company logo
1 of 17
Ethical Hacking
Presented by :-
Aakash M Takale
Guided by :-
Prof. Dr. Steven Silverman
• Introduction
• Definition : Ethical Hacking
• Types of Hackers
• Different types of System Attacks
• What does an Ethical hacker do?
• Required skills of an Ethical hacker
• Advantages – Disadvantages
• Future Enhancements
• Conclusion
• References
Contents
Introduction
• Ethical hacking also known as penetration testing or white-hat
hacking, involves the same tools, tricks, and techniques that
hackers use, but with one major difference that Ethical
hacking is legal.
• The intent of ethical hacking is to discover vulnerabilities from
a hacker‘s viewpoint so systems can be better secured.
• Its part of an overall information risk management program
that allows for ongoing security improvements.
Definition
Eric Raymond, compiler of – The New Hacker’s Dictionary,
defines a hacker as a clever programmer. “A good hack is
clever solution to a programming problem and hacking is the
act of doing it”
Raymond lists five possible characteristics that qualify one as a
hacker, which he paraphrases here:
• A person who enjoys learning details of a programming
language or system.
• A person who enjoys actually doing the programming rather
than just theorizing about it.
• A person capable of appreciating someone else's hacking.
• A person who picks up programming quickly.
• A person who is an expert at a particular programming
language or system.
Types of Hackers
• Black-Hat Hacker
A black hat hackers or crackers are individuals with
extraordinary computing skills, resorting to malicious or
destructive activities. That is black hat hackers use their knowledge
and skill for their own personal gains probably by hurting others.
• White-Hat Hacker
White hat hackers are those individuals professing hacker
skills and using them for defensive purposes. This means that the
white hat hackers use their knowledge and skill for the good of
others and for the common good.
• Grey-Hat Hacker
These are individuals who work both offensively and
defensively various times. We cannot predict their behavior.
Sometimes they use their skills for the common good while in
some other times he uses them for their personal gains.
Different kinds of System Attacks
What does an Ethical Hacker do?
• An ethical hacker is a person doing ethical hacking that he is a security
personal who tries to penetrate into a network to find if there is some
vulnerability in the system.
• An ethical hacker will first think with a mindset of a hacker who tries to
get in to the system.
• He will first find out what an intruder can see or what others can see.
• He may also sometimes make patches for that particular vulnerability or
he may suggest some methods to prevent the vulnerability.
Required skills of an Ethical Hacker
• Microsoft – skills in operation, configuration and management.
• Linux – knowledge of Linux/Unix, security setting, configuration
and services.
• Firewalls – configurations and operation of intrusion detection
systems.
• Routers – knowledge of routers, routing protocols.
• Network Protocols – TCP/IP; how they function and can be
manipulated.
• Project Management – leading, planning, organizing and
controlling a penetration testing team.
Advantages and Disadvantages
Ethical Hacking nowadays is the backbone of a network security.
Each day its relevance is increasing, the major pros and cons of
Ethical Hacking are given below :-
 Advantages
 Provides security to banking and financial establishments.
 Prevents website defacements.
 Fighting against terrorism and national security breaches
 An evolving technique.
 Disadvantages
 The ethical hacker using the knowledge they gain to do
malicious hacking activities.
 Allowing the company's financial and banking details to be seen.
 All depends upon the trustworthiness of the ethical hacker.
 Hiring professionals is expensive.
Future Enhancements
 As it is evolving branch the scope of enhancement in
technology is immense. No ethical hacker can ensure the
system security by using same technique repeatedly. He would
have to improve, develop and explore new avenues
continuously.
 More enhanced software should be used for optimum
protection. Tools used, need to be updated regularly and more
efficient ones need to be developed.
Conclusion
Technology keeps on evolving every now and then and new
software, systems come into the market. As we all know, there is
no software or the system that can be made with zero vulnerability
so an individual must take different vulnerabilities into account
and try to construct the system which is more secure and less
penetrable. Hence to make a client’s system secure, a complete
ethical hacking is required.
References
§ Council, E. (2011, 08). Ethical Hacking and Countermeasures.
Retrieved from certifiedethicalhackerceh.blogspot:
http://certifiedethicalhackerceh.blogspot.com/2011/08/phases-of-
ethical-hacking.html
§ Palmer, C. C. (2001). Ethical Hacking. IBM Systems Journal, Vol 40,
No 3, 769-780.
§ Rouse, M. (2014). Search Security. Retrieved from Tech Target :
http://searchsecurity.techtarget.com/definition/ethical-hacker
§ Symantec. (2010). Securtiy News. Retrieved from pc tools:
http://www.pctools.com/security-news/blackhat-hacker/
Any Questions?
Thank You


More Related Content

What's hot

Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxAnshumaanTiwari2
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 

What's hot (20)

Cyber security
Cyber security Cyber security
Cyber security
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Ppt
PptPpt
Ppt
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
HACKING
HACKINGHACKING
HACKING
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cia security model
Cia security modelCia security model
Cia security model
 

Similar to EthicalHacking_AakashTakale

Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Saurabh Upadhyay
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptshreya_omar
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfJawaidAbdulHameed
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingBugRaptors
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipurcyber cure
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullahpongada123
 
Ethical Hacking Certification Course
Ethical Hacking Certification CourseEthical Hacking Certification Course
Ethical Hacking Certification CourseNovel Vista
 

Similar to EthicalHacking_AakashTakale (20)

Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Ethical hacking concept-Part 1
Ethical hacking concept-Part 1
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullah
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Certification Course
Ethical Hacking Certification CourseEthical Hacking Certification Course
Ethical Hacking Certification Course
 

EthicalHacking_AakashTakale

  • 1. Ethical Hacking Presented by :- Aakash M Takale Guided by :- Prof. Dr. Steven Silverman
  • 2. • Introduction • Definition : Ethical Hacking • Types of Hackers • Different types of System Attacks • What does an Ethical hacker do? • Required skills of an Ethical hacker • Advantages – Disadvantages • Future Enhancements • Conclusion • References Contents
  • 3. Introduction • Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. • The intent of ethical hacking is to discover vulnerabilities from a hacker‘s viewpoint so systems can be better secured. • Its part of an overall information risk management program that allows for ongoing security improvements.
  • 4. Definition Eric Raymond, compiler of – The New Hacker’s Dictionary, defines a hacker as a clever programmer. “A good hack is clever solution to a programming problem and hacking is the act of doing it”
  • 5. Raymond lists five possible characteristics that qualify one as a hacker, which he paraphrases here: • A person who enjoys learning details of a programming language or system. • A person who enjoys actually doing the programming rather than just theorizing about it. • A person capable of appreciating someone else's hacking. • A person who picks up programming quickly. • A person who is an expert at a particular programming language or system.
  • 6. Types of Hackers • Black-Hat Hacker A black hat hackers or crackers are individuals with extraordinary computing skills, resorting to malicious or destructive activities. That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others. • White-Hat Hacker White hat hackers are those individuals professing hacker skills and using them for defensive purposes. This means that the white hat hackers use their knowledge and skill for the good of others and for the common good.
  • 7. • Grey-Hat Hacker These are individuals who work both offensively and defensively various times. We cannot predict their behavior. Sometimes they use their skills for the common good while in some other times he uses them for their personal gains.
  • 8. Different kinds of System Attacks
  • 9. What does an Ethical Hacker do? • An ethical hacker is a person doing ethical hacking that he is a security personal who tries to penetrate into a network to find if there is some vulnerability in the system. • An ethical hacker will first think with a mindset of a hacker who tries to get in to the system. • He will first find out what an intruder can see or what others can see. • He may also sometimes make patches for that particular vulnerability or he may suggest some methods to prevent the vulnerability.
  • 10. Required skills of an Ethical Hacker • Microsoft – skills in operation, configuration and management. • Linux – knowledge of Linux/Unix, security setting, configuration and services. • Firewalls – configurations and operation of intrusion detection systems. • Routers – knowledge of routers, routing protocols. • Network Protocols – TCP/IP; how they function and can be manipulated. • Project Management – leading, planning, organizing and controlling a penetration testing team.
  • 11. Advantages and Disadvantages Ethical Hacking nowadays is the backbone of a network security. Each day its relevance is increasing, the major pros and cons of Ethical Hacking are given below :-  Advantages  Provides security to banking and financial establishments.  Prevents website defacements.  Fighting against terrorism and national security breaches  An evolving technique.
  • 12.  Disadvantages  The ethical hacker using the knowledge they gain to do malicious hacking activities.  Allowing the company's financial and banking details to be seen.  All depends upon the trustworthiness of the ethical hacker.  Hiring professionals is expensive.
  • 13. Future Enhancements  As it is evolving branch the scope of enhancement in technology is immense. No ethical hacker can ensure the system security by using same technique repeatedly. He would have to improve, develop and explore new avenues continuously.  More enhanced software should be used for optimum protection. Tools used, need to be updated regularly and more efficient ones need to be developed.
  • 14. Conclusion Technology keeps on evolving every now and then and new software, systems come into the market. As we all know, there is no software or the system that can be made with zero vulnerability so an individual must take different vulnerabilities into account and try to construct the system which is more secure and less penetrable. Hence to make a client’s system secure, a complete ethical hacking is required.
  • 15. References § Council, E. (2011, 08). Ethical Hacking and Countermeasures. Retrieved from certifiedethicalhackerceh.blogspot: http://certifiedethicalhackerceh.blogspot.com/2011/08/phases-of- ethical-hacking.html § Palmer, C. C. (2001). Ethical Hacking. IBM Systems Journal, Vol 40, No 3, 769-780. § Rouse, M. (2014). Search Security. Retrieved from Tech Target : http://searchsecurity.techtarget.com/definition/ethical-hacker § Symantec. (2010). Securtiy News. Retrieved from pc tools: http://www.pctools.com/security-news/blackhat-hacker/