SlideShare a Scribd company logo
1 of 23
DEPT OF COMPUTER APPLICATION
GOVT KPG COLLEGE JAGDALPUR
Submitted To:
Pro Ajay Singh (HOD)
Dept Comp. Application
Govt KPG College, Jagdalpur
Submitted By:
ManojVerma
TOPIC:
ETHICALHACKING
ETHICAL HACKING Presented by:-
Manoj Verma
Content
 Ethical Hacking
 Who are Hackers
 Ethical Hackers but not Criminal Hackers
 Why do Hackers Hack ?
 Types of Hackers
 What should do after hack ?
 Hacking process
 Why do We need Ethical Hacking ?
 Eligibility of Ethical Hacking
 Required Skills of an Ethical Hackers
 Advantages
 Disadvantages
 Future Enhancements
 Conclusion
Ethical Hacking
• Ethical:- Ethical meanslegal,
Hacking:-Hackingmeansremovingvulnerability
in a system, thatis, testinga system by following
all the lawsin a legal way.
• Ethical hackingalso knowsaspenetrationtesting
or white-hathacking,involvesthe same
tools,tricks,andtechniquesthathackersuse.
Who are Hackers
• A person whoenjoys learningdetailsof a programming
languageor system.
• A person whoenjoys actually doingthe programmingrather
than justtheorizingabout it.
• A person capableof appreciatingsomeone else’s hacking.
• A person whopicksup programmingquickly.
• A person whois anexpert ata particularprogramming
languageorsystem.
Ethical Hackers but not Criminal Hackers
• Completely trustworthy.
• Strong programmingandcomputer networkingskills.
• Learnabout the system andtryingto findits weakness.
• Techniquesof Criminalhackers-Detection-Prevention.
Why do hackers hack ?
 Just for fun..
 Show off.
 For theft.
 For revenge.
 To spy.
 To steal importantinformation.
 To destroyenemy’s computer
networkduringthe war.
Types of Hackers
• BlackHat Hackers
• Grey Hat Hackers
• White HatHackers
Black-Hat Hackers
• A black hat hackersor crackersareindividuals
withextraordinarycomputing skills, resorting
to maliciousor destructiveactivities.
• Thatis black hathackersuse their
knowledgeandskill for their own
personal gainsprobably by hurting
others.
Gray-Hat Hackers
• These areindividualswho work
both offensively anddefensively
at varioustime.
• We cannotpredict their behavior
• Sometimes they use their
skills for the common good
while in some other timeshe
uses them for their personal
gains.
White-Hat Hackers
• White hat hackersarethose
individualsprofessinghacker
skills andusing them orfor
defensivepurposes.
• Thismeans thatthe whitehat
hackersuse their knowledge
andskill for the good of others
andfor the common good.
What should do after hacked ?
 Shutdown orturn off the system.
 Separatethe system fromnetwork.
 Restorethe systemwith the backupor
reinstall all programs.
 Not Connect the system to the network.
 call the police.
Hacking Process
Foot
printing
Scanning
Gaining
Access
Maintaining
Clearing
Track
Foot Printing Scanning Gaining Access
Maintaining
Access
Clearing Track
Protection frompossible External Attacks
Why do you need Ethical Hacking ?
Eligibility of Ethical Hacking
 It isimportantto havea Bachelor’s degree..
 BSC
 BTech
 BE
 BCA ininformationTechnology or computer science to
become an ethicalhacker.
Eligibility Criteria for
certified Ethical Hacker ?
Required skills of an Ethical Hacker
 Microsoft:- Skillsin operation , configuration and management.
 Linux:- Knowledge of Linux/Unix ; security settingconfiguration and services.
 Firewalls:- Configurations and operation of intrusiondetection systems.
 Routers:- Knowledge of routers , routing protocols and accesscontrol lists.
 Mainframes:- Knowledge of mainframes.
 Network Protocols:- TCP/IP; how they functionand can be manipulated.
 Project Management:Leading, planning,organizing and controlling a
penetration team.
Advantages
 Withthis you can recover yourlost information,especially
when you forgetyour password.
 Withthis wecanperform penetrationtestingso thatwe can
check the strengthof anycomputer ornetwork security.
 On learning this, wecanuse itto protect our computer from
malicioushackers.
Disadvantages
 Firstof all, afterlearningEthical Hacking,
people start doingwrongthingsin the greedof
money.
 Withthis wecangetunauthorized accessto
someone’ssystem andknowtheir private
information.
 Withthis we canalso do privacyviolation
 If used in reverse,then anysystem operation
canalso be harmed.
Future Enhancements
 As it anevolving branchthe scope of
enhancement in technology is immense.
 NO ethicalhackercanensure the system security
by usingthe same techniquerepeatedly.
 More enhancedsoftware’sshould be usedfor
optimum protection.
Conclusion
 In the precedingsections wesaw the methodology of hacking,why should we
awareof hackingandsome tools which a hackermay use.
 Nowwe cansee whatcan wedo againsthackingor to protect our selves from
hacking.
 Thefirstthing we should do is to keepourselves updatedaboutthose
software’swe andusing for officialand reliable sources.
 Educationthe employees andthe usersagainstblack hat hacking.
References
• WWW.google.com
• WWW.Wikipedia.com
• WWW.tutorialspoint.com
Google
THANK YOU

More Related Content

Similar to Ethical Hacking.pptx

EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
Aakash Takale
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 

Similar to Ethical Hacking.pptx (20)

Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical Hacking - An Overview
Ethical Hacking - An OverviewEthical Hacking - An Overview
Ethical Hacking - An Overview
 
Ethical Hacking : Understanding the Basics
Ethical Hacking : Understanding the BasicsEthical Hacking : Understanding the Basics
Ethical Hacking : Understanding the Basics
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
A Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical HackingA Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical Hacking
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
 
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptxDomain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethichack 2012
Ethichack 2012Ethichack 2012
Ethichack 2012
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 

Ethical Hacking.pptx

  • 1. DEPT OF COMPUTER APPLICATION GOVT KPG COLLEGE JAGDALPUR Submitted To: Pro Ajay Singh (HOD) Dept Comp. Application Govt KPG College, Jagdalpur Submitted By: ManojVerma TOPIC: ETHICALHACKING
  • 2. ETHICAL HACKING Presented by:- Manoj Verma
  • 3. Content  Ethical Hacking  Who are Hackers  Ethical Hackers but not Criminal Hackers  Why do Hackers Hack ?  Types of Hackers  What should do after hack ?  Hacking process  Why do We need Ethical Hacking ?  Eligibility of Ethical Hacking  Required Skills of an Ethical Hackers  Advantages  Disadvantages  Future Enhancements  Conclusion
  • 4. Ethical Hacking • Ethical:- Ethical meanslegal, Hacking:-Hackingmeansremovingvulnerability in a system, thatis, testinga system by following all the lawsin a legal way. • Ethical hackingalso knowsaspenetrationtesting or white-hathacking,involvesthe same tools,tricks,andtechniquesthathackersuse.
  • 5. Who are Hackers • A person whoenjoys learningdetailsof a programming languageor system. • A person whoenjoys actually doingthe programmingrather than justtheorizingabout it. • A person capableof appreciatingsomeone else’s hacking. • A person whopicksup programmingquickly. • A person whois anexpert ata particularprogramming languageorsystem.
  • 6. Ethical Hackers but not Criminal Hackers • Completely trustworthy. • Strong programmingandcomputer networkingskills. • Learnabout the system andtryingto findits weakness. • Techniquesof Criminalhackers-Detection-Prevention.
  • 7. Why do hackers hack ?  Just for fun..  Show off.  For theft.  For revenge.  To spy.  To steal importantinformation.  To destroyenemy’s computer networkduringthe war.
  • 8. Types of Hackers • BlackHat Hackers • Grey Hat Hackers • White HatHackers
  • 9. Black-Hat Hackers • A black hat hackersor crackersareindividuals withextraordinarycomputing skills, resorting to maliciousor destructiveactivities. • Thatis black hathackersuse their knowledgeandskill for their own personal gainsprobably by hurting others.
  • 10. Gray-Hat Hackers • These areindividualswho work both offensively anddefensively at varioustime. • We cannotpredict their behavior • Sometimes they use their skills for the common good while in some other timeshe uses them for their personal gains.
  • 11. White-Hat Hackers • White hat hackersarethose individualsprofessinghacker skills andusing them orfor defensivepurposes. • Thismeans thatthe whitehat hackersuse their knowledge andskill for the good of others andfor the common good.
  • 12. What should do after hacked ?  Shutdown orturn off the system.  Separatethe system fromnetwork.  Restorethe systemwith the backupor reinstall all programs.  Not Connect the system to the network.  call the police.
  • 14. Foot Printing Scanning Gaining Access Maintaining Access Clearing Track
  • 15. Protection frompossible External Attacks Why do you need Ethical Hacking ?
  • 16. Eligibility of Ethical Hacking  It isimportantto havea Bachelor’s degree..  BSC  BTech  BE  BCA ininformationTechnology or computer science to become an ethicalhacker. Eligibility Criteria for certified Ethical Hacker ?
  • 17. Required skills of an Ethical Hacker  Microsoft:- Skillsin operation , configuration and management.  Linux:- Knowledge of Linux/Unix ; security settingconfiguration and services.  Firewalls:- Configurations and operation of intrusiondetection systems.  Routers:- Knowledge of routers , routing protocols and accesscontrol lists.  Mainframes:- Knowledge of mainframes.  Network Protocols:- TCP/IP; how they functionand can be manipulated.  Project Management:Leading, planning,organizing and controlling a penetration team.
  • 18. Advantages  Withthis you can recover yourlost information,especially when you forgetyour password.  Withthis wecanperform penetrationtestingso thatwe can check the strengthof anycomputer ornetwork security.  On learning this, wecanuse itto protect our computer from malicioushackers.
  • 19. Disadvantages  Firstof all, afterlearningEthical Hacking, people start doingwrongthingsin the greedof money.  Withthis wecangetunauthorized accessto someone’ssystem andknowtheir private information.  Withthis we canalso do privacyviolation  If used in reverse,then anysystem operation canalso be harmed.
  • 20. Future Enhancements  As it anevolving branchthe scope of enhancement in technology is immense.  NO ethicalhackercanensure the system security by usingthe same techniquerepeatedly.  More enhancedsoftware’sshould be usedfor optimum protection.
  • 21. Conclusion  In the precedingsections wesaw the methodology of hacking,why should we awareof hackingandsome tools which a hackermay use.  Nowwe cansee whatcan wedo againsthackingor to protect our selves from hacking.  Thefirstthing we should do is to keepourselves updatedaboutthose software’swe andusing for officialand reliable sources.  Educationthe employees andthe usersagainstblack hat hacking.