4. Content
• Introduction
• Ethical hacking
• Who are Hackers
• Why do Hackers hack
• Types of Hackers
• What should do after hack?
• Hacking Process
5. Content….
Why do we need Ethical Hacker
Required skills of an ethical hacker
What do hackers do after hacking ?
Fishing attack
Advantages
Disadvantages
Future Enhancement
Conclusion
6. Introduction
• Ethical hacking is known as
penetration testing or white
hat hacking, involves the same
tools, tricks, and techniques
that hacker use, but with one
major difference that Ethical
hacking is legal.
7. Ethical Hacking
Independent computer security Professionals
breaking into the computer system.
Neither damage the target
system nor steal information..
Evaluate target system security and report back to
owners about the bugs found.
8. Who are hackers
• A person who enjoys learning detail of
programming language or system.
• A person capable of appreciating someone
else ‘s hacking.
9. Why do hackers hack ?
Steal important
information.
1
Steal money.
2
Destroy enemy’s
computer
network during
war.
3
11. What should do after
hack?
• Shutdown or turn off the system
• Separate the system from
network
• Restore the system with the
backup or reinstall all programs.
• Connect the system to the
network
• It can be good to call police
17. Why do you need ethical hacking
• Protection from possible external attacks
18. Required skill
for an ethical
hacker
Microsoft
Linux
Firewalls
Routers
Mainframes
Network protocols
Project management
19. What do hackers do after hacking
Patch
Patch security hole
Log and hide
Clear logs and hide
themselves
Install
Install rootkit(
backdoor )
Install
Install irc related
program
21. Pink WhatsApp
Pink WhatsApp is not a new version or official
release of WhatsApp; rather, it's a deceptive
and potentially harmful scam that preys on
unsuspecting users. It typically manifests as a
message claiming to offer enhanced features or a
unique pink-colored WhatsApp theme.
22. Advantages
• To catch thief you have to think like a thief.
• Helps in closing the open holes in the system network.
• Provides security banking and financial establishment.
• Prevent website defacement.
• An evolving techniques.
24. Future
Enhancement • As it an evolving branch the scope of enhancement
in technology is immense.
• No ethical hacker can ensure the system security by
using the same technique repeatedly.
• More enhanced software’s should be used for
optimum protection.