This document discusses ethical hacking. It begins by defining ethical hacking as using the same tools and techniques as hackers, but legally through penetration testing or white hat hacking. It describes different types of hackers like white hat, black hat, and grey hat hackers. It also lists required skills for an ethical hacker like networking protocol and firewall knowledge. The document provides examples of famous ethical hackers from India and around the world, as well as summaries of some major cyber attacks throughout history. It concludes that ethical hacking is important for protection from external attacks and that keeping systems updated and educating users are important defenses.
2. Content
Introduction
Who are Hackers
Why do Hackers hack
Types of Hackers
Why Do You Need Ethical Hacking
Required Skills Of An Ethical Hacker
Conclusion
References
3. Introduction
Ethical hacking also known as
penetration testing or white-hat hacking,
involves the same tools, tricks, and
techniques that hackers use,but with one
major difference that Ethical hacking is
legal.
4. Who are Hackers?
Aperson who enjoys learning details
of a programming language or system.
Aperson who enjoys actually
doing the programming rather than
just theorizing about it.
Aperson capable of
appreciating someone else's
hacking.
Aperson who picks up programming quickly.
Aperson who is an expert at a
particular programming language or
system.
5. Why do hackers hack ?
Just for fun.
Show off.
Hack other systems secretly.
Notify many people their thought.
Steal important information.
Destroy enemy’s computer network
during the war.
6. Grey-Hat Hackers
These are individuals who work both offensively and
defensively at various times.
We cannot predict their behavior.
Sometimes they use their skills for the common good
while in some other times he uses them for their
personal gains.
Black Hat Hacker
A black hat hackers or crackers are
individuals with extraordinary
computing skills, resorting to
malicious or destructive activities.
That is black hat hackers use their knowledge
and skill for their own personal gains probably
by hurting others
White Hat Hacker
White hat hackers are those individuals
professing hacker skills and using them for
defensive purposes.
This means that the white hat hackers use their
knowledge and skill for the good of
others and for the common good.
7. Top Three Ethical Hacker Of India
1. Rahul Tyagi :
Rahul Tyagi completed his post graduate with major in computer
science from LPU and has conducted more than a hundred training
session globally in 5 years. He also provide his service to cyber
security and Anti hacking organization in India. He is currently
working as Vice president at Lucideus.
2. Trishneet Arora :
Trishneet Arora is hacking hero is an Indian author, cyber
security expert, and entrepreneur. Arora has written books on cyber
security, ethical hacking and web defence. He is the founder and
CEO of TAC Security, an IT security company.
3. Sai Sathish
Sai sathish is an Young entrepreneur, founder and CEO of Indian
servers. He trained thousands of college students and professionals
all over the world. He helped government to improve security and
safe transactions and forensic investigator by doing pentesting on
government sites and rewarded by IAS officers.
8. World's 3 Most Famous Hackers
1. Gary McKinnon
Gary McKinnon, a Scottish systems administrator has been
accused of the biggest military computer hacking exercise of all
times by the US government
2. Robert Tappan Morris
Robert Tappan Morris is an American computer scientist, known for
creating the first computer worm on the Internet called the Morris Worm
in 1988.
He became the first person convicted under the Computer Fraud and
Abuse Act.
3. Kevin David Mitnick
Kevin David Mitnick is a computer security consultant, author, and
hacker. In the late 20th century, he was convicted of various computer-
related crimes.
When he was 12 years old, Mitnick used social engineering to bypass the
punchcard system used in the Los Angeles bus system.
9. Top 10 most notorious cyber attacks in history
1. MafiaBoy causes $1 billion dollars in damages (2000):
2. Google China hit by cyber attack (2009):
3. Teen hacks NASA and US Defense Department(1999)
4. Phone lines blocked to win Porsche (1995)
5. Hacker targets Scientology (2008):
6. Solar Sunrise (1998):
7. The Melissa virus (1999)
8. Internet attacked (2002):
9. Hacker steals tens of million of credit card details (2009):
10.Robert Tappan Morris and the Morris Worm (1988):
10. Accidental
Breaches in
Security Denial of
Service (DoS)
Restricted
Data
Why do you need Ethical hacking
Protection from possible External Attacks
Viruses, Trojan
Horses,
and Worms
Social
Engineering
Automated
AttacksOrganizational
Attacks
11. Required Skills of an Ethical Hacker
Microsoft: skills in operation, configuration and management.
Linux: knowledge of Linux/Unix; security setting,
configuration, and services.
Firewalls: configurations, and operation of intrusion detection
systems.
Routers: knowledge of routers, routing protocols, and access
control lists
Mainframes : knowledge of mainframes
Network Protocols: TCP/IP; how they function and can be
manipulated.
Project Management: leading, planning, organizing, and
controlling a penetration testing team.
12. Conclusion
In the preceding sections we saw the methodology of hacking,
why should we aware of hacking and some tools which a
hacker may use.
Now we can see what can we do against hacking or to protect
ourselves from hacking.
The first thing we should do is to keep ourselves updated
about those software’s we and using for official and reliable
sources.
Educate the employees and the users against black hat hacking.