SlideShare a Scribd company logo
1 of 27
CONTENT
 OVERVIEW
 HACKING
 HISTORY
 HACKING PROCESS
TECHNIQUES AND
TOOLS
 ADVANTAGES AND
DISADVANTAGES
 REFERENCE
 TYPES OF HACKER
 PRECAUTIONS
 SOME FAMOUS
HACKER
Overview
Hacker
• The person who hacks. A hacker is a person intensely
interested in the arcane and recondite workings of any
computer operating system. Hackers are most often
programmers.
 Cracker
• System intruder/ destroyer
History Of Hacking
The first hacker was appeared in 1960’s at the
Massachusetts Institute Of Technology(MIT)
During the 1970’s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker
In the 1980’s, phreaks started to migrate to
computers, and the first Bulletin Board System (BBS)
appeared
During the 1990’s, when the use of internet
widespread around the world, hackers multiplied.
Hacking
 Hacker
• Access computer system or network without
authorization
• Breaks the law
 Ethical Hacker
• Performs most of the same activities but with owner’s
permission
• Employed by companies to perform Penetration Tests
Types of hacker
BLACK HAT
WHITE HAT
GREY HAT
SCRIPT KIDDIES
 A black hat hacker is a hacker who "violates computer
security for little reason beyond maliciousness or for
personal gain.
 They Work for black money(Like:- Bank Websites ,
credit card websites)
 They use their knowledge for illegal purposes.
 White hat hackers are like Ethical Hackers .
They use their skills for good purposes.
 They work for organizations for stop the illegal
activities through black hat hackers.
 Grey Hat hackers have both qualities like
black hat hackers and white hat hackers .
 They use their knowledge for bad purposes
and good purposes too.
 Script kiddies hacks into computer or
websites using the tools available on
the internet .
 They don’t have knowledge of
programming .
Advantages
 Provides security to banking and financial
establishments
 To catch a thief you have to think like a thief.
Disadvantages
 All depends upon the trustworthiness of the
ethical hacker
 Hiring professionals is expensive.
 Encrypt important data
Ex:- pgp, ssh
 Remove unused program
 Backup the system often
 Setup firewall
 Setup IDS
Ex) snort
 Shutdown the system
Or turn off the system
 Restore the system with the backup
Or reinstall all programs
 Disconnect the system to the network
Some Famous Hacker
Ian Murphy Kevin Mitnick Johan Helsinguis
Linus Torvald Mark Abene Robert Morris
REFERENCE
 www.scribd.com
 www.wikipedia/seminartopics/ethical haching.org
 www. Seminarsonly/ethical hacking.com
Ethical hacking
Ethical hacking

More Related Content

What's hot (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Hacking
HackingHacking
Hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Hacking
HackingHacking
Hacking
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking Tools
Ethical Hacking ToolsEthical Hacking Tools
Ethical Hacking Tools
 

Viewers also liked

Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPFarpit
 
How to format powerpoint presentation slides
How to format powerpoint presentation slidesHow to format powerpoint presentation slides
How to format powerpoint presentation slidesmikejeffs
 
Consulta: Bases de datos
Consulta: Bases de datosConsulta: Bases de datos
Consulta: Bases de datosDiana Barco
 
History of me
History of meHistory of me
History of meawoti
 
J.D. Skube, Occup. Haz in the Fire Service
J.D. Skube, Occup. Haz in the Fire ServiceJ.D. Skube, Occup. Haz in the Fire Service
J.D. Skube, Occup. Haz in the Fire ServiceJonathan Skube
 
Condicionales inglés
Condicionales inglésCondicionales inglés
Condicionales inglésNerea Ontalva
 
Cliq intro 2016
Cliq intro 2016Cliq intro 2016
Cliq intro 2016Editor NHM
 
Evaluation - Question 4
Evaluation - Question 4Evaluation - Question 4
Evaluation - Question 4AMYDAV123
 
Professional Presentations
Professional PresentationsProfessional Presentations
Professional PresentationsMike Kelly
 
Cader draftprotocol literature review 4 abreiviated with changes
Cader draftprotocol literature review 4 abreiviated with changesCader draftprotocol literature review 4 abreiviated with changes
Cader draftprotocol literature review 4 abreiviated with changesRugshana Cader
 
Profil What I Wear
Profil What I WearProfil What I Wear
Profil What I WearC Lair
 
Connect Magazine - July/August 2015 Issue
Connect Magazine - July/August 2015 IssueConnect Magazine - July/August 2015 Issue
Connect Magazine - July/August 2015 IssueAnna Dunn
 
How to start learning ethical hacking
How to start learning ethical hackingHow to start learning ethical hacking
How to start learning ethical hackingSwati Sharma
 
Selection of Images - LEMO
Selection of Images - LEMOSelection of Images - LEMO
Selection of Images - LEMOjxshbrown
 

Viewers also liked (20)

Resume-Final (1) (4)
Resume-Final (1) (4)Resume-Final (1) (4)
Resume-Final (1) (4)
 
Privert ecrit aux syndicalistes
Privert ecrit aux syndicalistesPrivert ecrit aux syndicalistes
Privert ecrit aux syndicalistes
 
Macys HSQ DG ROSA
Macys HSQ DG ROSAMacys HSQ DG ROSA
Macys HSQ DG ROSA
 
Notebook
NotebookNotebook
Notebook
 
Presentacion
PresentacionPresentacion
Presentacion
 
Dtl mwc david del val v7
Dtl mwc david del val v7Dtl mwc david del val v7
Dtl mwc david del val v7
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
How to format powerpoint presentation slides
How to format powerpoint presentation slidesHow to format powerpoint presentation slides
How to format powerpoint presentation slides
 
Consulta: Bases de datos
Consulta: Bases de datosConsulta: Bases de datos
Consulta: Bases de datos
 
History of me
History of meHistory of me
History of me
 
J.D. Skube, Occup. Haz in the Fire Service
J.D. Skube, Occup. Haz in the Fire ServiceJ.D. Skube, Occup. Haz in the Fire Service
J.D. Skube, Occup. Haz in the Fire Service
 
Condicionales inglés
Condicionales inglésCondicionales inglés
Condicionales inglés
 
Cliq intro 2016
Cliq intro 2016Cliq intro 2016
Cliq intro 2016
 
Evaluation - Question 4
Evaluation - Question 4Evaluation - Question 4
Evaluation - Question 4
 
Professional Presentations
Professional PresentationsProfessional Presentations
Professional Presentations
 
Cader draftprotocol literature review 4 abreiviated with changes
Cader draftprotocol literature review 4 abreiviated with changesCader draftprotocol literature review 4 abreiviated with changes
Cader draftprotocol literature review 4 abreiviated with changes
 
Profil What I Wear
Profil What I WearProfil What I Wear
Profil What I Wear
 
Connect Magazine - July/August 2015 Issue
Connect Magazine - July/August 2015 IssueConnect Magazine - July/August 2015 Issue
Connect Magazine - July/August 2015 Issue
 
How to start learning ethical hacking
How to start learning ethical hackingHow to start learning ethical hacking
How to start learning ethical hacking
 
Selection of Images - LEMO
Selection of Images - LEMOSelection of Images - LEMO
Selection of Images - LEMO
 

Similar to Ethical hacking

Similar to Ethical hacking (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
N.vinodh
N.vinodhN.vinodh
N.vinodh
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

Ethical hacking

  • 1.
  • 2. CONTENT  OVERVIEW  HACKING  HISTORY  HACKING PROCESS TECHNIQUES AND TOOLS  ADVANTAGES AND DISADVANTAGES  REFERENCE  TYPES OF HACKER  PRECAUTIONS  SOME FAMOUS HACKER
  • 3. Overview Hacker • The person who hacks. A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers.  Cracker • System intruder/ destroyer
  • 4. History Of Hacking The first hacker was appeared in 1960’s at the Massachusetts Institute Of Technology(MIT) During the 1970’s, a different kind of hacker appeared: Phone Phreaker or Phone Hacker
  • 5. In the 1980’s, phreaks started to migrate to computers, and the first Bulletin Board System (BBS) appeared During the 1990’s, when the use of internet widespread around the world, hackers multiplied.
  • 6. Hacking  Hacker • Access computer system or network without authorization • Breaks the law  Ethical Hacker • Performs most of the same activities but with owner’s permission • Employed by companies to perform Penetration Tests
  • 7. Types of hacker BLACK HAT WHITE HAT GREY HAT SCRIPT KIDDIES
  • 8.
  • 9.  A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain.  They Work for black money(Like:- Bank Websites , credit card websites)  They use their knowledge for illegal purposes.
  • 10.
  • 11.  White hat hackers are like Ethical Hackers . They use their skills for good purposes.  They work for organizations for stop the illegal activities through black hat hackers.
  • 12.
  • 13.  Grey Hat hackers have both qualities like black hat hackers and white hat hackers .  They use their knowledge for bad purposes and good purposes too.
  • 14.
  • 15.  Script kiddies hacks into computer or websites using the tools available on the internet .  They don’t have knowledge of programming .
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Advantages  Provides security to banking and financial establishments  To catch a thief you have to think like a thief. Disadvantages  All depends upon the trustworthiness of the ethical hacker  Hiring professionals is expensive.
  • 22.  Encrypt important data Ex:- pgp, ssh  Remove unused program  Backup the system often  Setup firewall  Setup IDS Ex) snort
  • 23.  Shutdown the system Or turn off the system  Restore the system with the backup Or reinstall all programs  Disconnect the system to the network
  • 24. Some Famous Hacker Ian Murphy Kevin Mitnick Johan Helsinguis Linus Torvald Mark Abene Robert Morris
  • 25. REFERENCE  www.scribd.com  www.wikipedia/seminartopics/ethical haching.org  www. Seminarsonly/ethical hacking.com