SlideShare a Scribd company logo
1 of 14
Ethical Hacking
Presented By :- Aman Kumar
Content
 Introduction
 Who are Hackers
 Why do Hackers hack
 Types of Hackers
 Why Do You Need Ethical Hacking
 Required Skills Of An Ethical Hacker
 Conclusion
 References
Introduction
Ethical hacking also known as
penetration testing or white-hat hacking,
involves the same tools, tricks, and
techniques that hackers use,but with one
major difference that Ethical hacking is
legal.
Who are Hackers?
 Aperson who enjoys learning details
of a programming language or system.
 Aperson who enjoys actually
doing the programming rather than
just theorizing about it.
 Aperson capable of
appreciating someone else's
hacking.
 Aperson who picks up programming quickly.
 Aperson who is an expert at a
particular programming language or
system.
Why do hackers hack ?
Just for fun.
Show off.
Hack other systems secretly.
Notify many people their thought.
Steal important information.
Destroy enemy’s computer network
during the war.
Grey-Hat Hackers
These are individuals who work both offensively and
defensively at various times.
We cannot predict their behavior.
Sometimes they use their skills for the common good
while in some other times he uses them for their
personal gains.
Black Hat Hacker
 A black hat hackers or crackers are
individuals with extraordinary
computing skills, resorting to
malicious or destructive activities.
 That is black hat hackers use their knowledge
and skill for their own personal gains probably
by hurting others
White Hat Hacker
 White hat hackers are those individuals
professing hacker skills and using them for
defensive purposes.
 This means that the white hat hackers use their
knowledge and skill for the good of
others and for the common good.
Top Three Ethical Hacker Of India
1. Rahul Tyagi :
Rahul Tyagi completed his post graduate with major in computer
science from LPU and has conducted more than a hundred training
session globally in 5 years. He also provide his service to cyber
security and Anti hacking organization in India. He is currently
working as Vice president at Lucideus.
2. Trishneet Arora :
Trishneet Arora is hacking hero is an Indian author, cyber
security expert, and entrepreneur. Arora has written books on cyber
security, ethical hacking and web defence. He is the founder and
CEO of TAC Security, an IT security company.
3. Sai Sathish
Sai sathish is an Young entrepreneur, founder and CEO of Indian
servers. He trained thousands of college students and professionals
all over the world. He helped government to improve security and
safe transactions and forensic investigator by doing pentesting on
government sites and rewarded by IAS officers.
World's 3 Most Famous Hackers
1. Gary McKinnon
Gary McKinnon, a Scottish systems administrator has been
accused of the biggest military computer hacking exercise of all
times by the US government
2. Robert Tappan Morris
Robert Tappan Morris is an American computer scientist, known for
creating the first computer worm on the Internet called the Morris Worm
in 1988.
He became the first person convicted under the Computer Fraud and
Abuse Act.
3. Kevin David Mitnick
Kevin David Mitnick is a computer security consultant, author, and
hacker. In the late 20th century, he was convicted of various computer-
related crimes.
When he was 12 years old, Mitnick used social engineering to bypass the
punchcard system used in the Los Angeles bus system.
Top 10 most notorious cyber attacks in history
1. MafiaBoy causes $1 billion dollars in damages (2000):
2. Google China hit by cyber attack (2009):
3. Teen hacks NASA and US Defense Department(1999)
4. Phone lines blocked to win Porsche (1995)
5. Hacker targets Scientology (2008):
6. Solar Sunrise (1998):
7. The Melissa virus (1999)
8. Internet attacked (2002):
9. Hacker steals tens of million of credit card details (2009):
10.Robert Tappan Morris and the Morris Worm (1988):
Accidental
Breaches in
Security Denial of
Service (DoS)
Restricted
Data
Why do you need Ethical hacking
Protection from possible External Attacks
Viruses, Trojan
Horses,
and Worms
Social
Engineering
Automated
AttacksOrganizational
Attacks
Required Skills of an Ethical Hacker
 Microsoft: skills in operation, configuration and management.
 Linux: knowledge of Linux/Unix; security setting,
configuration, and services.
 Firewalls: configurations, and operation of intrusion detection
systems.
 Routers: knowledge of routers, routing protocols, and access
control lists
 Mainframes : knowledge of mainframes
 Network Protocols: TCP/IP; how they function and can be
manipulated.
 Project Management: leading, planning, organizing, and
controlling a penetration testing team.
Conclusion
 In the preceding sections we saw the methodology of hacking,
why should we aware of hacking and some tools which a
hacker may use.
 Now we can see what can we do against hacking or to protect
ourselves from hacking.
 The first thing we should do is to keep ourselves updated
about those software’s we and using for official and reliable
sources.
 Educate the employees and the users against black hat hacking.
References
 www.google.com
 www.wikipedia.org
 Officialamankr.blogspot.com
Thank You

More Related Content

What's hot (20)

Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Capture The Flag
Capture The FlagCapture The Flag
Capture The Flag
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Introduction of CTF and CGC
Introduction of CTF and CGCIntroduction of CTF and CGC
Introduction of CTF and CGC
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Similar to Ethical hacking (20)

Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
N.vinodh
N.vinodhN.vinodh
N.vinodh
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 

Recently uploaded (20)

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 

Ethical hacking

  • 2. Content  Introduction  Who are Hackers  Why do Hackers hack  Types of Hackers  Why Do You Need Ethical Hacking  Required Skills Of An Ethical Hacker  Conclusion  References
  • 3. Introduction Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use,but with one major difference that Ethical hacking is legal.
  • 4. Who are Hackers?  Aperson who enjoys learning details of a programming language or system.  Aperson who enjoys actually doing the programming rather than just theorizing about it.  Aperson capable of appreciating someone else's hacking.  Aperson who picks up programming quickly.  Aperson who is an expert at a particular programming language or system.
  • 5. Why do hackers hack ? Just for fun. Show off. Hack other systems secretly. Notify many people their thought. Steal important information. Destroy enemy’s computer network during the war.
  • 6. Grey-Hat Hackers These are individuals who work both offensively and defensively at various times. We cannot predict their behavior. Sometimes they use their skills for the common good while in some other times he uses them for their personal gains. Black Hat Hacker  A black hat hackers or crackers are individuals with extraordinary computing skills, resorting to malicious or destructive activities.  That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others White Hat Hacker  White hat hackers are those individuals professing hacker skills and using them for defensive purposes.  This means that the white hat hackers use their knowledge and skill for the good of others and for the common good.
  • 7. Top Three Ethical Hacker Of India 1. Rahul Tyagi : Rahul Tyagi completed his post graduate with major in computer science from LPU and has conducted more than a hundred training session globally in 5 years. He also provide his service to cyber security and Anti hacking organization in India. He is currently working as Vice president at Lucideus. 2. Trishneet Arora : Trishneet Arora is hacking hero is an Indian author, cyber security expert, and entrepreneur. Arora has written books on cyber security, ethical hacking and web defence. He is the founder and CEO of TAC Security, an IT security company. 3. Sai Sathish Sai sathish is an Young entrepreneur, founder and CEO of Indian servers. He trained thousands of college students and professionals all over the world. He helped government to improve security and safe transactions and forensic investigator by doing pentesting on government sites and rewarded by IAS officers.
  • 8. World's 3 Most Famous Hackers 1. Gary McKinnon Gary McKinnon, a Scottish systems administrator has been accused of the biggest military computer hacking exercise of all times by the US government 2. Robert Tappan Morris Robert Tappan Morris is an American computer scientist, known for creating the first computer worm on the Internet called the Morris Worm in 1988. He became the first person convicted under the Computer Fraud and Abuse Act. 3. Kevin David Mitnick Kevin David Mitnick is a computer security consultant, author, and hacker. In the late 20th century, he was convicted of various computer- related crimes. When he was 12 years old, Mitnick used social engineering to bypass the punchcard system used in the Los Angeles bus system.
  • 9. Top 10 most notorious cyber attacks in history 1. MafiaBoy causes $1 billion dollars in damages (2000): 2. Google China hit by cyber attack (2009): 3. Teen hacks NASA and US Defense Department(1999) 4. Phone lines blocked to win Porsche (1995) 5. Hacker targets Scientology (2008): 6. Solar Sunrise (1998): 7. The Melissa virus (1999) 8. Internet attacked (2002): 9. Hacker steals tens of million of credit card details (2009): 10.Robert Tappan Morris and the Morris Worm (1988):
  • 10. Accidental Breaches in Security Denial of Service (DoS) Restricted Data Why do you need Ethical hacking Protection from possible External Attacks Viruses, Trojan Horses, and Worms Social Engineering Automated AttacksOrganizational Attacks
  • 11. Required Skills of an Ethical Hacker  Microsoft: skills in operation, configuration and management.  Linux: knowledge of Linux/Unix; security setting, configuration, and services.  Firewalls: configurations, and operation of intrusion detection systems.  Routers: knowledge of routers, routing protocols, and access control lists  Mainframes : knowledge of mainframes  Network Protocols: TCP/IP; how they function and can be manipulated.  Project Management: leading, planning, organizing, and controlling a penetration testing team.
  • 12. Conclusion  In the preceding sections we saw the methodology of hacking, why should we aware of hacking and some tools which a hacker may use.  Now we can see what can we do against hacking or to protect ourselves from hacking.  The first thing we should do is to keep ourselves updated about those software’s we and using for official and reliable sources.  Educate the employees and the users against black hat hacking.