SlideShare a Scribd company logo
1 of 22
ETHICAL HACKING AND EMAIL
SCRAPPING ON OPEN PORTS
Presented By:- Sourabh Ruhil
A501132520016
Btech(AIML)
Sem 5
Guides:
Dr. Rajesh Tyagi Dr. Anil
Mishra
Professor Professor
Amity School of Engineering and
Technology
CONTENT
• Introduction
• Ethical Hacking
• Using kali Linux
• Who are Hackers
• Port Scanning
• Types of Hackers
• Hacking Process
• Why do We need Ethical Hacking
• Required Skills of an Ethical
Hacker
• Email Scrapping
• Advantages
• Disadvantages
• Future Enhancements
• Conclusion
INTRODUCTION
• Ethical hacking also known as penetration testing or white-hat hacking,
involves the same tools, tricks, and techniques that hackers use,but with
one major difference that Ethical hacking is legal.
ETHICAL HACKING
• Independent computer security Professionals breaking into the computer
systems.
• Neither damage the target systems nor steal information.
• Evaluate target systems security and report back to owners about the bugs
found.
WHO ARE HACKERS?
 A person who enjoys learning details of a
programming language or system.
 A person who enjoys actually doing the
programming rather than just theorizing about it.
 A person capable of appreciating someone else's
hacking.
 A person who picks up programming quickly.
 A person who is an expert at a particular
programming language or system.
PORT SCANNING :
• port scan is a common technique hackers use to discover
open doors or weak points in a network. A port scan attack
helps cyber criminals find open ports and figure out whether
they are receiving or sending data. It can also reveal
whether active security devices like firewalls are being used
by an organization.
When hackers send a message to a port, the response they
receive determines whether the port is being used and if
there are any potential weaknesses that could be exploited.
TYPES OF HACKERS
• Black Hat Hacker
• White Hat Hacker
• Grey Hat Hacker
BLACK-HAT HACKER
• A black hat hackers or crackers are individuals with extraordinary
computing skills, resorting to malicious or destructive activities.
• That is black hat hackers use their knowledge and skill for their own
personal gains probably by hurting others.
WHITE-HAT HACKER
• White hat hackers are those individuals professing hacker skills and using
them for defensive purposes.
• This means that the white hat hackers use their knowledge and skill for the
good of others and for the common good.
GREY-HAT HACKERS
• These are individuals who work both offensively and defensively at various
times.
• We cannot predict their behavior.
• Sometimes they use their skills for the common good while in some other
times he uses them for their personal gains.
HACKING PROCESS
• Foot Printing
• Scanning
• Gaining Access
• Maintaining Access
FOOT PRINTING
• Whois lookup
• NS lookup
• IP lookup
SCANNING
• Port Scanning
• Network Scanning
• Finger Printing
• Fire Walking
GAINING ACCESS
• Password Attacks
• Social Engineering
• Viruses
MAINTAINING ACCESS
• Os BackDoors
• Trojans
• Clears Tracks
WHY DO YOU NEED ETHICAL HACKING
• Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks
Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks
Restricted Data Protection from possible External Attacks
REQUIRED SKILLS OF AN ETHICAL HACKER
• Microsoft: skills in operation, configuration and management.
• Linux: knowledge of Linux/Unix; security setting, configuration, and
services.
• Firewalls: configurations, and operation of intrusion detection systems.
EMAIL SCRAPPING
• Email scraping is a method of obtaining email information by
automatically extracting the necessary data from another source.
• The information that you receive can be either publicly available
or private, depending on authorization settings and how it’s
stored.
•
ADVANTAGES
• To catch a thief you have to think like a thief.
• Helps in closing the open holes in the system network.
• Provides security to banking and financial establishments.
• Prevents website defacements.
• An evolving technique.
DISADVANTAGES
• All depends upon the trustworthiness of the ethical hacker
• Hiring professionals is expensive.
CONCLUSION
• In the preceding sections we saw the methodology of hacking, why should
we aware of hacking and some tools which a hacker may use.
• Now we can see what can we do against hacking or to protect ourselves
from hacking.
• The first thing we should do is to keep ourselves updated about those
software’s we and using for official and reliable sources.
• Educate the employees and the users against black hat hacking.
REFERENCES
• www.google.com
• www.wikipedia.org
• www.tutorialspoint.com

More Related Content

Similar to sourabh_sipPPT.pptx

Similar to sourabh_sipPPT.pptx (20)

Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Hacking
HackingHacking
Hacking
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical_Hacking
Ethical_HackingEthical_Hacking
Ethical_Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Session Slide
Session SlideSession Slide
Session Slide
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
hacking ,bluetooth
hacking ,bluetoothhacking ,bluetooth
hacking ,bluetooth
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Hacking
HackingHacking
Hacking
 
Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
 

Recently uploaded

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

sourabh_sipPPT.pptx

  • 1. ETHICAL HACKING AND EMAIL SCRAPPING ON OPEN PORTS Presented By:- Sourabh Ruhil A501132520016 Btech(AIML) Sem 5 Guides: Dr. Rajesh Tyagi Dr. Anil Mishra Professor Professor Amity School of Engineering and Technology
  • 2. CONTENT • Introduction • Ethical Hacking • Using kali Linux • Who are Hackers • Port Scanning • Types of Hackers • Hacking Process • Why do We need Ethical Hacking • Required Skills of an Ethical Hacker • Email Scrapping • Advantages • Disadvantages • Future Enhancements • Conclusion
  • 3. INTRODUCTION • Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use,but with one major difference that Ethical hacking is legal.
  • 4. ETHICAL HACKING • Independent computer security Professionals breaking into the computer systems. • Neither damage the target systems nor steal information. • Evaluate target systems security and report back to owners about the bugs found.
  • 5. WHO ARE HACKERS?  A person who enjoys learning details of a programming language or system.  A person who enjoys actually doing the programming rather than just theorizing about it.  A person capable of appreciating someone else's hacking.  A person who picks up programming quickly.  A person who is an expert at a particular programming language or system.
  • 6. PORT SCANNING : • port scan is a common technique hackers use to discover open doors or weak points in a network. A port scan attack helps cyber criminals find open ports and figure out whether they are receiving or sending data. It can also reveal whether active security devices like firewalls are being used by an organization. When hackers send a message to a port, the response they receive determines whether the port is being used and if there are any potential weaknesses that could be exploited.
  • 7. TYPES OF HACKERS • Black Hat Hacker • White Hat Hacker • Grey Hat Hacker
  • 8. BLACK-HAT HACKER • A black hat hackers or crackers are individuals with extraordinary computing skills, resorting to malicious or destructive activities. • That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others.
  • 9. WHITE-HAT HACKER • White hat hackers are those individuals professing hacker skills and using them for defensive purposes. • This means that the white hat hackers use their knowledge and skill for the good of others and for the common good.
  • 10. GREY-HAT HACKERS • These are individuals who work both offensively and defensively at various times. • We cannot predict their behavior. • Sometimes they use their skills for the common good while in some other times he uses them for their personal gains.
  • 11. HACKING PROCESS • Foot Printing • Scanning • Gaining Access • Maintaining Access
  • 12. FOOT PRINTING • Whois lookup • NS lookup • IP lookup
  • 13. SCANNING • Port Scanning • Network Scanning • Finger Printing • Fire Walking
  • 14. GAINING ACCESS • Password Attacks • Social Engineering • Viruses
  • 15. MAINTAINING ACCESS • Os BackDoors • Trojans • Clears Tracks
  • 16. WHY DO YOU NEED ETHICAL HACKING • Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data Protection from possible External Attacks
  • 17. REQUIRED SKILLS OF AN ETHICAL HACKER • Microsoft: skills in operation, configuration and management. • Linux: knowledge of Linux/Unix; security setting, configuration, and services. • Firewalls: configurations, and operation of intrusion detection systems.
  • 18. EMAIL SCRAPPING • Email scraping is a method of obtaining email information by automatically extracting the necessary data from another source. • The information that you receive can be either publicly available or private, depending on authorization settings and how it’s stored. •
  • 19. ADVANTAGES • To catch a thief you have to think like a thief. • Helps in closing the open holes in the system network. • Provides security to banking and financial establishments. • Prevents website defacements. • An evolving technique.
  • 20. DISADVANTAGES • All depends upon the trustworthiness of the ethical hacker • Hiring professionals is expensive.
  • 21. CONCLUSION • In the preceding sections we saw the methodology of hacking, why should we aware of hacking and some tools which a hacker may use. • Now we can see what can we do against hacking or to protect ourselves from hacking. • The first thing we should do is to keep ourselves updated about those software’s we and using for official and reliable sources. • Educate the employees and the users against black hat hacking.