SlideShare a Scribd company logo
1 of 26
FUNDAMENTALS OF
CYBERSECURITY
ACTIVITY- 1
TOPIC: TYPES OF HACKER AND
RECONNAISSANCE
Submitted by-
Lakshay NR(21bcar0309)
White
Hat
Hackers
Black
Hat
Hackers
Grey
Hat
Hackers
Types of hacker

 White Hat hackers are also known as Ethical
Hackers. They never intent to harm a system, rather
they try to find out weaknesses in a computer or a
network system as a part of penetration testing and
vulnerability assessments.
 Ethical hacking is not illegal and it is one of the
demanding jobs available in the IT industry. There
are numerous companies that hire ethical hackers for
penetration testing and vulnerability assessments.
white hat hackers uses tools like Nmap (Network
Mapper), Nessus, Nikto, Kismet,etc.
White Hat Hackers

 Black Hat hackers, also known as crackers, are those
who hack in order to gain unauthorized access to a
system and harm its operations or steal sensitive
information.
 Black Hat hacking is always illegal because of its bad
intent which includes stealing corporate data,
violating privacy, damaging the system, blocking
network communication, etc.
Black hat hackers use tools like NetStumbler,
Acunetix, Netsparker, and Intruder.
Black Hat Hackers

 Grey hat hackers are a blend of both black hat and
white hat hackers. They act without malicious intent
but for their fun, they exploit a security weakness in
a computer system or network without the owner’s
permission or knowledge.
 Their intent is to bring the weakness to the attention
of the owners and getting appreciation or a little
bounty from the owners.
Grey hat hackers use tools like Nmap, Metasploit,
Aircrack-Ng, etc
Grey Hat Hackers


Red Hat Hackers
Blue Hat Hackers
Elite Hackers
Script Kiddie
Neophyte
Hacktivist
Phreaker
Miscellaneous Hackers

Red hat hackers are again a blend of
both black hat and white hat hackers.
They are usually on the level of hacking
government agencies, top-secret
information hubs, and generally
anything that falls under the category
of sensitive information.
Red Hat Hackers
A blue hat hacker is someone outside
computer security consulting firms who is
used to bug-test a system prior to its launch.
They look for loopholes that can be exploited
and try to close these gaps. Microsoft also
uses the term BlueHat to represent a series of
security briefing events.
Blue Hat Hackers


This is a social status among hackers, which
is used to describe the most skilled. Newly
discovered exploits will circulate among
these hackers.
Elite Hackers
A script kiddie is a non-expert who breaks
into computer systems by using pre-
packaged automated tools written by others,
usually with little understanding of the
underlying concept, hence the term Kiddie.
Script Kiddie

A neophyte, "n00b", or "newbie" or "Green
Hat Hacker" is someone who is new to
hacking or phreaking and has almost no
knowledge or experience of the workings of
technology and hacking.
Neophyte


A hacktivist is a hacker who utilizes
technology to announce a social, ideological,
religious, or political message. In general,
most hacktivism involves website
defacement or denialof-service attacks
Hacktivist
A hacker who identifies and exploits
weaknesses in telephones instead of
computers.
Phreaker

RECONNAISSANCE
Footprinting is a part of a larger process known as
reconnaissance. Reconnaissance is the information-
gathering stage of ethical hacking, where you collect
data about the target system. This data can include
anything from network infrastructure to employee
contact details. The goal of reconnaissance is to identify
as many potential attack vectors as possible.
Data collected from reconnaissance may include:
Security policies. Knowing an organization’s security policies can
help you find weaknesses in their system.
Network infrastructure. A hacker needs to know what type of
network the target is using (e.g., LAN, WAN, MAN), as well as the
IP address range and subnet mask.
Employee contact details. Email addresses, phone numbers, and
social media accounts can be used to launch social engineering
attacks.
Host information. Information about specific hosts, such as
operating system type and version, can be used to find
vulnerabilities.
RECONNAISSANCE USING
GOOGLE DORKS
Google's search engine has its own built-in query language. The
following list of queries can be run to find a list of files, find
information about your competition, track people, get information
about SEO backlinks, build email lists, and of course, discover web
vulnerabilities.
Let's look at the most popular Google Dorks and what they do.
cache: this dork will show you the cached version of any website,
e.g. cache:securitytrails.com
allintext: searches for specific text contained on any web page, e.g.
allintext: hacking tools
allintitle: exactly the same as allintext, but will show pages that
contain titles with X characters, e.g. allintitle:"Security Companies"
allinurl: it can be used to fetch results whose URL contains all the
specified characters, e.g: allinurl:clientarea
filetype: used to search for any kind of file extensions, for example,
if you want to search for pdf files you can use: email security
filetype: pdf
inurl: this is exactly the same as allinurl, but it is only useful for
one single keyword, e.g. inurl:admin
intitle: used to search for various keywords inside the title.
RECONNAISSANCE USING
FTP SEARCH ENGINE
NAPALM FTP Indexer : Napalm has more than 949
million files and 14,000 FTP servers in their index. It
uses a crawler that updates their database every 2 to 4
days, giving higher priority to the most frequently
accessed servers.
RECONNAISSANCE USING IOT
SEARCH ENGINE
Shodan is the world's first search engine for Internet-
connected devices. Discover how Internet intelligence
can help you make better decisions.
FINDING DOMAINS AND SUB-
DOMAINS USING NETCRAFT
GATHERING PERSONAL INFORMATION
USING PEEKYOU
FINDING EMAIL LIST USING
HARVESTER
The harvester is a command-line tool included in kali
linux that acts as a wrapper for a variety of search
engines and is used to find email accounts, subdomain
names, virtual hosts, open ports / banners, and
employee names related to a domain from different
public sources (such as search engines and PGP key
servers).
PASSIVE FOOTPRINTING
ACTIVITY1 FCS.pptx

More Related Content

Similar to ACTIVITY1 FCS.pptx

Similar to ACTIVITY1 FCS.pptx (20)

Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speed
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
Hacking
HackingHacking
Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking
HackingHacking
Hacking
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

ACTIVITY1 FCS.pptx

  • 1. FUNDAMENTALS OF CYBERSECURITY ACTIVITY- 1 TOPIC: TYPES OF HACKER AND RECONNAISSANCE Submitted by- Lakshay NR(21bcar0309)
  • 3.  White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.  Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry. There are numerous companies that hire ethical hackers for penetration testing and vulnerability assessments. white hat hackers uses tools like Nmap (Network Mapper), Nessus, Nikto, Kismet,etc. White Hat Hackers 
  • 4.  Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information.  Black Hat hacking is always illegal because of its bad intent which includes stealing corporate data, violating privacy, damaging the system, blocking network communication, etc. Black hat hackers use tools like NetStumbler, Acunetix, Netsparker, and Intruder. Black Hat Hackers 
  • 5.  Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.  Their intent is to bring the weakness to the attention of the owners and getting appreciation or a little bounty from the owners. Grey hat hackers use tools like Nmap, Metasploit, Aircrack-Ng, etc Grey Hat Hackers 
  • 6.  Red Hat Hackers Blue Hat Hackers Elite Hackers Script Kiddie Neophyte Hacktivist Phreaker Miscellaneous Hackers
  • 7.  Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information. Red Hat Hackers
  • 8. A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events. Blue Hat Hackers 
  • 9.  This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite Hackers
  • 10. A script kiddie is a non-expert who breaks into computer systems by using pre- packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie. Script Kiddie 
  • 11. A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking. Neophyte 
  • 12.  A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof-service attacks Hacktivist
  • 13. A hacker who identifies and exploits weaknesses in telephones instead of computers. Phreaker 
  • 14.
  • 15.
  • 16. RECONNAISSANCE Footprinting is a part of a larger process known as reconnaissance. Reconnaissance is the information- gathering stage of ethical hacking, where you collect data about the target system. This data can include anything from network infrastructure to employee contact details. The goal of reconnaissance is to identify as many potential attack vectors as possible.
  • 17. Data collected from reconnaissance may include: Security policies. Knowing an organization’s security policies can help you find weaknesses in their system. Network infrastructure. A hacker needs to know what type of network the target is using (e.g., LAN, WAN, MAN), as well as the IP address range and subnet mask. Employee contact details. Email addresses, phone numbers, and social media accounts can be used to launch social engineering attacks. Host information. Information about specific hosts, such as operating system type and version, can be used to find vulnerabilities.
  • 18. RECONNAISSANCE USING GOOGLE DORKS Google's search engine has its own built-in query language. The following list of queries can be run to find a list of files, find information about your competition, track people, get information about SEO backlinks, build email lists, and of course, discover web vulnerabilities. Let's look at the most popular Google Dorks and what they do. cache: this dork will show you the cached version of any website, e.g. cache:securitytrails.com allintext: searches for specific text contained on any web page, e.g.
  • 19. allintext: hacking tools allintitle: exactly the same as allintext, but will show pages that contain titles with X characters, e.g. allintitle:"Security Companies" allinurl: it can be used to fetch results whose URL contains all the specified characters, e.g: allinurl:clientarea filetype: used to search for any kind of file extensions, for example, if you want to search for pdf files you can use: email security filetype: pdf inurl: this is exactly the same as allinurl, but it is only useful for one single keyword, e.g. inurl:admin intitle: used to search for various keywords inside the title.
  • 20. RECONNAISSANCE USING FTP SEARCH ENGINE NAPALM FTP Indexer : Napalm has more than 949 million files and 14,000 FTP servers in their index. It uses a crawler that updates their database every 2 to 4 days, giving higher priority to the most frequently accessed servers.
  • 21. RECONNAISSANCE USING IOT SEARCH ENGINE Shodan is the world's first search engine for Internet- connected devices. Discover how Internet intelligence can help you make better decisions.
  • 22. FINDING DOMAINS AND SUB- DOMAINS USING NETCRAFT
  • 24. FINDING EMAIL LIST USING HARVESTER The harvester is a command-line tool included in kali linux that acts as a wrapper for a variety of search engines and is used to find email accounts, subdomain names, virtual hosts, open ports / banners, and employee names related to a domain from different public sources (such as search engines and PGP key servers).