SlideShare a Scribd company logo
1 of 21
ETHICALETHICAL HACKINGHACKING
Presented By:
Manas Ranjan Das
Regd No:1121297048
Branch:ECE
1
Guided By:
Mr. Baroda Prashnna Sahoo
Dept. Of ECE
HIGHLIGHTSHIGHLIGHTS
• Introduction.
• Is hacking a crime?
• Hacking Vs Cracking.
• Why Ethical H4cking?
• Types of hackers.
• Types of Attacks.
• Security & Counter Measure.
2
INTRODUCTIONINTRODUCTION
The explosive growth of the Internet has brought many good things :
electronic commerce, easy access to vast stores of reference material,
collaborative computing, e-mail, and new avenues for advertising and
information distribution , to name a few. As with most technological
advances , there is also a dark side : criminal hackers. Governments,
companies, and private citizens around the world are anxious to be a part of
this revolution, but they are afraid that some hacker will break into their
Web server and replace their logo with pornography, read their e-mail, steal
their credit card number from an on-line shopping site, or implant software
that will secretly transmit their organization’s secrets to the open Internet.
With these concerns and others, the ethical hacker can help.
3
Is hacking a crime??Is hacking a crime??
NO NOT AT ALL
HACKING IS NOT A
CRIME 4
Hacker is a word that has two meanings:
 Traditionally, a hacker is someone who likes to
tinker with software or electronic systems. Hackers
enjoy exploring and learning how computer systems
operate. They love discovering new ways to work
electronically.
 Recently, hacker has taken on a new meaning —
someone who maliciously breaks into systems for
personal gain. Technically, these criminals are
crackers (criminal hackers).They are out for
personal gain: fame, profit, and even revenge.
5
Is hacking a crimeIs hacking a crime????
Hacking Vs CrackingHacking Vs Cracking
• Hacking with malicious intention is cracking.
• The basic difference is hackers do not do
anything disastrous.
• Cracking yield more devastating results.
• Cracking is crime.
• Cyber crime are the results of cracking ,not
hacking.
6
Why Ethical Hacking?
• It is Legal.
• Permission is obtained from the target.
• It is a part of an overall security program.
• Identify vulnerabilities visible from Internet
at particular point of time.
• Ethical hackers possesses same skills, mindset
and tools of a hacker but the attacks are
done in a non-destructive manner.
7
Types of hackersTypes of hackers
Distinction on the basis of knowledge:
 CODERS.
ADMINS.
SCRIPT KIDDES.
Distinction on the basis of legality:
WHITE HAT HACKERS.
GREY HAT HACKERS.
BLACK HAT HACKERS.
8
CODERS
• They have full
knowledge.
• They know what
exactly they are doing.
• Well aware about the
different codes.
• They have complete
idea what is going
beyond coding.
9
ADMINS
• They knows what they
are doing.
• They don’t have idea
that what exactly going
beyond codes.
• Result oriented persons
• They are not so
harmful.
10
SCRIPT KIDDESSCRIPT KIDDES
• Young in-experienced
hackers.
• Copy codes and techniques
from knowledgeable hackers
• Don’t know what’s going
beyond the coding.
• Use techniques for fun
purpose.
• Sometimes could be very
dangerous for the system.
11
WHITE HATWHITE HAT
HACKERSHACKERS
• White hat hackers are good hackers.
• They have genuine license to hack.
• They have registered police records.
• They involves themselves in good works.
• Generally owned by companies for security
designing.
• They have high pay scales.
• Generally these are coders
12
BLACK HATBLACK HAT
HACKERSHACKERS
• Black hat hackers are very dangerous persons.
• They always have motive to earn huge profit.
• These are highly paid persons.
• They evolves themselves mostly in criminal
activities.
• These could be coders, admins as well as script
kiddies.
13
GREY HATGREY HAT
HACKERSHACKERS
• Grey hat hackers are also known as red hats.
• They perform both tasks fair as well as unfair.
• Generally these are admins.
• They have little high pay than white hats.
• Generally these are not so dangerous, but
sometimes could be.
14
TYPES OF ATTACKSTYPES OF ATTACKS
 Brute force attacks.
 Buffer Overflow attacks.
 Denial of Service (DoS) attacks.
 Distributed Denial of Service (DDoS) attacks.
 Misconfigurations.
 Abuse of Trust.
 Back doors and Trojans.
15
HACKING PRONE AREASHACKING PRONE AREAS
16
17
18
SECURITY & COUNTER MEASURESECURITY & COUNTER MEASURE
• Use of anti-viruses.
• Proper logout after use of mail id.
• Manual opening browser
• Don't open spam.
• Password protected admin account.
• Always use strong password.
19
REFERENCE
• www.google.com
• www.darshangajara.wordpress.com
• www.way2project.in
20
21

More Related Content

What's hot

Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingjustyogesh
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptshreya_omar
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - ExplainedGunjan Panara
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...Intellipaat
 

What's hot (20)

Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hackers
HackersHackers
Hackers
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Viewers also liked

Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hackingAmanpreet Singh
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Erectile Dysfunction Symptoms And Treatment
Erectile Dysfunction Symptoms And TreatmentErectile Dysfunction Symptoms And Treatment
Erectile Dysfunction Symptoms And TreatmentManas Das
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 

Viewers also liked (10)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hacking
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Erectile Dysfunction Symptoms And Treatment
Erectile Dysfunction Symptoms And TreatmentErectile Dysfunction Symptoms And Treatment
Erectile Dysfunction Symptoms And Treatment
 
Hacking
HackingHacking
Hacking
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 

Similar to Ethical hacking

Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)DeepHaria4
 
1861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp021861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp02Mudit Seth
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack SlideCikgu Syam
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 

Similar to Ethical hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
10 types of_hackers
10 types of_hackers10 types of_hackers
10 types of_hackers
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
1861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp021861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp02
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
hackers
hackershackers
hackers
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Arya
AryaArya
Arya
 
hacking
hackinghacking
hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Hacking
HackingHacking
Hacking
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Ethical hacking

  • 1. ETHICALETHICAL HACKINGHACKING Presented By: Manas Ranjan Das Regd No:1121297048 Branch:ECE 1 Guided By: Mr. Baroda Prashnna Sahoo Dept. Of ECE
  • 2. HIGHLIGHTSHIGHLIGHTS • Introduction. • Is hacking a crime? • Hacking Vs Cracking. • Why Ethical H4cking? • Types of hackers. • Types of Attacks. • Security & Counter Measure. 2
  • 3. INTRODUCTIONINTRODUCTION The explosive growth of the Internet has brought many good things : electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution , to name a few. As with most technological advances , there is also a dark side : criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet. With these concerns and others, the ethical hacker can help. 3
  • 4. Is hacking a crime??Is hacking a crime?? NO NOT AT ALL HACKING IS NOT A CRIME 4
  • 5. Hacker is a word that has two meanings:  Traditionally, a hacker is someone who likes to tinker with software or electronic systems. Hackers enjoy exploring and learning how computer systems operate. They love discovering new ways to work electronically.  Recently, hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals are crackers (criminal hackers).They are out for personal gain: fame, profit, and even revenge. 5 Is hacking a crimeIs hacking a crime????
  • 6. Hacking Vs CrackingHacking Vs Cracking • Hacking with malicious intention is cracking. • The basic difference is hackers do not do anything disastrous. • Cracking yield more devastating results. • Cracking is crime. • Cyber crime are the results of cracking ,not hacking. 6
  • 7. Why Ethical Hacking? • It is Legal. • Permission is obtained from the target. • It is a part of an overall security program. • Identify vulnerabilities visible from Internet at particular point of time. • Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner. 7
  • 8. Types of hackersTypes of hackers Distinction on the basis of knowledge:  CODERS. ADMINS. SCRIPT KIDDES. Distinction on the basis of legality: WHITE HAT HACKERS. GREY HAT HACKERS. BLACK HAT HACKERS. 8
  • 9. CODERS • They have full knowledge. • They know what exactly they are doing. • Well aware about the different codes. • They have complete idea what is going beyond coding. 9
  • 10. ADMINS • They knows what they are doing. • They don’t have idea that what exactly going beyond codes. • Result oriented persons • They are not so harmful. 10
  • 11. SCRIPT KIDDESSCRIPT KIDDES • Young in-experienced hackers. • Copy codes and techniques from knowledgeable hackers • Don’t know what’s going beyond the coding. • Use techniques for fun purpose. • Sometimes could be very dangerous for the system. 11
  • 12. WHITE HATWHITE HAT HACKERSHACKERS • White hat hackers are good hackers. • They have genuine license to hack. • They have registered police records. • They involves themselves in good works. • Generally owned by companies for security designing. • They have high pay scales. • Generally these are coders 12
  • 13. BLACK HATBLACK HAT HACKERSHACKERS • Black hat hackers are very dangerous persons. • They always have motive to earn huge profit. • These are highly paid persons. • They evolves themselves mostly in criminal activities. • These could be coders, admins as well as script kiddies. 13
  • 14. GREY HATGREY HAT HACKERSHACKERS • Grey hat hackers are also known as red hats. • They perform both tasks fair as well as unfair. • Generally these are admins. • They have little high pay than white hats. • Generally these are not so dangerous, but sometimes could be. 14
  • 15. TYPES OF ATTACKSTYPES OF ATTACKS  Brute force attacks.  Buffer Overflow attacks.  Denial of Service (DoS) attacks.  Distributed Denial of Service (DDoS) attacks.  Misconfigurations.  Abuse of Trust.  Back doors and Trojans. 15
  • 16. HACKING PRONE AREASHACKING PRONE AREAS 16
  • 17. 17
  • 18. 18
  • 19. SECURITY & COUNTER MEASURESECURITY & COUNTER MEASURE • Use of anti-viruses. • Proper logout after use of mail id. • Manual opening browser • Don't open spam. • Password protected admin account. • Always use strong password. 19
  • 21. 21

Editor's Notes

  1. NO NOT