3. Content
Ethical Hacking
Who are Hackers
Ethical Hackers but not Criminal Hackers
Why do Hackers Hack ?
Types of Hackers
What should do after hack ?
Hacking process
Why do We need Ethical Hacking ?
Eligibility of Ethical Hacking
Required Skills of an Ethical Hackers
Advantages
Disadvantages
Future Enhancements
Conclusion
4. Ethical Hacking
• Ethical:- Ethical meanslegal,
Hacking:-Hackingmeansremovingvulnerability
in a system, thatis, testinga system by following
all the lawsin a legal way.
• Ethical hackingalso knowsaspenetrationtesting
or white-hathacking,involvesthe same
tools,tricks,andtechniquesthathackersuse.
5. Who are Hackers
• A person whoenjoys learningdetailsof a programming
languageor system.
• A person whoenjoys actually doingthe programmingrather
than justtheorizingabout it.
• A person capableof appreciatingsomeone else’s hacking.
• A person whopicksup programmingquickly.
• A person whois anexpert ata particularprogramming
languageorsystem.
6. Ethical Hackers but not Criminal Hackers
• Completely trustworthy.
• Strong programmingandcomputer networkingskills.
• Learnabout the system andtryingto findits weakness.
• Techniquesof Criminalhackers-Detection-Prevention.
7. Why do hackers hack ?
Just for fun..
Show off.
For theft.
For revenge.
To spy.
To steal importantinformation.
To destroyenemy’s computer
networkduringthe war.
8. Types of Hackers
• BlackHat Hackers
• Grey Hat Hackers
• White HatHackers
9. Black-Hat Hackers
• A black hat hackersor crackersareindividuals
withextraordinarycomputing skills, resorting
to maliciousor destructiveactivities.
• Thatis black hathackersuse their
knowledgeandskill for their own
personal gainsprobably by hurting
others.
10. Gray-Hat Hackers
• These areindividualswho work
both offensively anddefensively
at varioustime.
• We cannotpredict their behavior
• Sometimes they use their
skills for the common good
while in some other timeshe
uses them for their personal
gains.
11. White-Hat Hackers
• White hat hackersarethose
individualsprofessinghacker
skills andusing them orfor
defensivepurposes.
• Thismeans thatthe whitehat
hackersuse their knowledge
andskill for the good of others
andfor the common good.
12. What should do after hacked ?
Shutdown orturn off the system.
Separatethe system fromnetwork.
Restorethe systemwith the backupor
reinstall all programs.
Not Connect the system to the network.
call the police.
16. Eligibility of Ethical Hacking
It isimportantto havea Bachelor’s degree..
BSC
BTech
BE
BCA ininformationTechnology or computer science to
become an ethicalhacker.
Eligibility Criteria for
certified Ethical Hacker ?
17. Required skills of an Ethical Hacker
Microsoft:- Skillsin operation , configuration and management.
Linux:- Knowledge of Linux/Unix ; security settingconfiguration and services.
Firewalls:- Configurations and operation of intrusiondetection systems.
Routers:- Knowledge of routers , routing protocols and accesscontrol lists.
Mainframes:- Knowledge of mainframes.
Network Protocols:- TCP/IP; how they functionand can be manipulated.
Project Management:Leading, planning,organizing and controlling a
penetration team.
18. Advantages
Withthis you can recover yourlost information,especially
when you forgetyour password.
Withthis wecanperform penetrationtestingso thatwe can
check the strengthof anycomputer ornetwork security.
On learning this, wecanuse itto protect our computer from
malicioushackers.
19. Disadvantages
Firstof all, afterlearningEthical Hacking,
people start doingwrongthingsin the greedof
money.
Withthis wecangetunauthorized accessto
someone’ssystem andknowtheir private
information.
Withthis we canalso do privacyviolation
If used in reverse,then anysystem operation
canalso be harmed.
20. Future Enhancements
As it anevolving branchthe scope of
enhancement in technology is immense.
NO ethicalhackercanensure the system security
by usingthe same techniquerepeatedly.
More enhancedsoftware’sshould be usedfor
optimum protection.
21. Conclusion
In the precedingsections wesaw the methodology of hacking,why should we
awareof hackingandsome tools which a hackermay use.
Nowwe cansee whatcan wedo againsthackingor to protect our selves from
hacking.
Thefirstthing we should do is to keepourselves updatedaboutthose
software’swe andusing for officialand reliable sources.
Educationthe employees andthe usersagainstblack hat hacking.