Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
ETHICAL HACKING DETAILS
INDEX
 Introduction
 What is Ethical Hacking?
 Eligibility
 Ethical Hacking Tricks
 Difference between Hacking and Et...
INTRODUCTION
 Ethical hacking- also known as penetration testing or
intrusion testing or red teaming has become a major
c...
ELIGIBILITY FOR MAKING CAREER IN ETHICAL HACKING:
1. Basic knowledge of Database, Server Side Programming ( PHP or JSP
or ...
ETHICAL HACKING TRICKS
 In a large amount of technologies ,methodology and algorithms are
used by the ethical hackers. It...
 The technical difference between ethical hacking and hacking is zero
but the moral difference is substantive.
 The fact...
OBJECTIVE OF ETHICAL HACKING
 Ethical hacking offers an objective analysis of an organization’s
information security post...
METHODOLOGY OF ETHICAL HACKING
The various stages in the ethical hacking methodology
are:
 Reconnaissance
 Scanning & En...
 Reconnaissance:
This is the stage in which the hacker collects information about the
company which the personal is going...
 Gaining access:
This is the actual hacking phase in which the hacker
gains access to the system.
 Maintaining Access:
N...
To know more about Ethical Hackin
Click Here
Upcoming SlideShare
Loading in …5
×

ethical hacking details

405 views

Published on

ethical hacking details by www.oureducation.in

  • Be the first to comment

  • Be the first to like this

ethical hacking details

  1. 1. ETHICAL HACKING DETAILS
  2. 2. INDEX  Introduction  What is Ethical Hacking?  Eligibility  Ethical Hacking Tricks  Difference between Hacking and Ethical Hacking Objective of Ethical Hacking Methodology of Ethical Hacking
  3. 3. INTRODUCTION  Ethical hacking- also known as penetration testing or intrusion testing or red teaming has become a major concern for businesses and governments.  Companies are worried about the possibility of being “hacked” and potential customers are worried about maintaining control of personal information.  Ethical hacking work is legal because it is performed to increase the safety in the organization. As the GEORGE JASSON , vice – president, Comguard Networks, in an interview to diptiman Dewan elaborates on CAREER IN ETHICAL HACKING growing rapidly.
  4. 4. ELIGIBILITY FOR MAKING CAREER IN ETHICAL HACKING: 1. Basic knowledge of Database, Server Side Programming ( PHP or JSP or ASP .net) and Basic Knowledge of Networking 2. Having the certification from any institute that you are expertise in maintaining computer security
  5. 5. ETHICAL HACKING TRICKS  In a large amount of technologies ,methodology and algorithms are used by the ethical hackers. It can range from the simple Buffer Overflow Exploit to a SQL Injection.  Different approaches require different tricks and methods. It can range from C/C++ to MSF (Metaspliot Framework).
  6. 6.  The technical difference between ethical hacking and hacking is zero but the moral difference is substantive.  The fact that the ethical hacker is able to protect the system implies that he has the skills to penetrate or crash other systems and check moves by the prospective hacker to create mischief to the organization for which the ethical hacker is working for.  So, the difference between a white hat and a black hat is one of perspective.  A black hat in an organization can be the white hat for other organizations if he switches employment. Difference between Hacking and Ethical Hacking?
  7. 7. OBJECTIVE OF ETHICAL HACKING  Ethical hacking offers an objective analysis of an organization’s information security posture for organizations of any level of security expertise.  "The result of such an assessment is an actionable report with valuable remediation advice tailored to the customer's unique IT environment, capabilities, and security objectives," says Chris Rodriguez.  As organizations of all sizes and sophistication levels can benefit from objective, expert, third-party analysis, ethical hacking has become a more mainstream service in the past decade.
  8. 8. METHODOLOGY OF ETHICAL HACKING The various stages in the ethical hacking methodology are:  Reconnaissance  Scanning & Enumeration  Gaining access  Maintaining access  Clearing tracks To Know about Top Ethical Hacking Institutes in Bangalore, ClickHere
  9. 9.  Reconnaissance: This is the stage in which the hacker collects information about the company which the personal is going to hack.  Scanning & Enumeration: Scanning is the second phase in the hacking methodology in which the hacker tries to make a blue print of the target network.
  10. 10.  Gaining access: This is the actual hacking phase in which the hacker gains access to the system.  Maintaining Access: Now the hacker is inside the system by some means by password guessing or exploiting some of its vulnerabilities.  Clearing Tracks: Whenever a hacker downloads some file or installs some software, its log will be stored in the server logs. So in order to erase that hacker uses man tools.
  11. 11. To know more about Ethical Hackin Click Here

×