SlideShare a Scribd company logo
1 of 21
ETHICALETHICAL HACKINGHACKING
Presented By:
Manas Ranjan Das
Regd No:1121297048
Branch:ECE
1
Guided By:
Mr. Baroda Prashnna Sahoo
Dept. Of ECE
HIGHLIGHTSHIGHLIGHTS
• Introduction.
• Is hacking a crime?
• Hacking Vs Cracking.
• Why Ethical H4cking?
• Types of hackers.
• Types of Attacks.
• Security & Counter Measure.
2
INTRODUCTIONINTRODUCTION
The explosive growth of the Internet has brought many good things :
electronic commerce, easy access to vast stores of reference material,
collaborative computing, e-mail, and new avenues for advertising and
information distribution , to name a few. As with most technological
advances , there is also a dark side : criminal hackers. Governments,
companies, and private citizens around the world are anxious to be a part of
this revolution, but they are afraid that some hacker will break into their
Web server and replace their logo with pornography, read their e-mail, steal
their credit card number from an on-line shopping site, or implant software
that will secretly transmit their organization’s secrets to the open Internet.
With these concerns and others, the ethical hacker can help.
3
Is hacking a crime??Is hacking a crime??
NO NOT AT ALL
HACKING IS NOT A
CRIME 4
Hacker is a word that has two meanings:
 Traditionally, a hacker is someone who likes to
tinker with software or electronic systems. Hackers
enjoy exploring and learning how computer systems
operate. They love discovering new ways to work
electronically.
 Recently, hacker has taken on a new meaning —
someone who maliciously breaks into systems for
personal gain. Technically, these criminals are
crackers (criminal hackers).They are out for
personal gain: fame, profit, and even revenge.
5
Is hacking a crimeIs hacking a crime????
Hacking Vs CrackingHacking Vs Cracking
• Hacking with malicious intention is cracking.
• The basic difference is hackers do not do
anything disastrous.
• Cracking yield more devastating results.
• Cracking is crime.
• Cyber crime are the results of cracking ,not
hacking.
6
Why Ethical Hacking?
• It is Legal.
• Permission is obtained from the target.
• It is a part of an overall security program.
• Identify vulnerabilities visible from Internet
at particular point of time.
• Ethical hackers possesses same skills, mindset
and tools of a hacker but the attacks are
done in a non-destructive manner.
7
Types of hackersTypes of hackers
Distinction on the basis of knowledge:
 CODERS.
ADMINS.
SCRIPT KIDDES.
Distinction on the basis of legality:
WHITE HAT HACKERS.
GREY HAT HACKERS.
BLACK HAT HACKERS.
8
CODERS
• They have full
knowledge.
• They know what
exactly they are doing.
• Well aware about the
different codes.
• They have complete
idea what is going
beyond coding.
9
ADMINS
• They knows what they
are doing.
• They don’t have idea
that what exactly going
beyond codes.
• Result oriented persons
• They are not so
harmful.
10
SCRIPT KIDDESSCRIPT KIDDES
• Young in-experienced
hackers.
• Copy codes and techniques
from knowledgeable hackers
• Don’t know what’s going
beyond the coding.
• Use techniques for fun
purpose.
• Sometimes could be very
dangerous for the system.
11
WHITE HATWHITE HAT
HACKERSHACKERS
• White hat hackers are good hackers.
• They have genuine license to hack.
• They have registered police records.
• They involves themselves in good works.
• Generally owned by companies for security
designing.
• They have high pay scales.
• Generally these are coders
12
BLACK HATBLACK HAT
HACKERSHACKERS
• Black hat hackers are very dangerous persons.
• They always have motive to earn huge profit.
• These are highly paid persons.
• They evolves themselves mostly in criminal
activities.
• These could be coders, admins as well as script
kiddies.
13
GREY HATGREY HAT
HACKERSHACKERS
• Grey hat hackers are also known as red hats.
• They perform both tasks fair as well as unfair.
• Generally these are admins.
• They have little high pay than white hats.
• Generally these are not so dangerous, but
sometimes could be.
14
TYPES OF ATTACKSTYPES OF ATTACKS
 Brute force attacks.
 Buffer Overflow attacks.
 Denial of Service (DoS) attacks.
 Distributed Denial of Service (DDoS) attacks.
 Misconfigurations.
 Abuse of Trust.
 Back doors and Trojans.
15
HACKING PRONE AREASHACKING PRONE AREAS
16
17
18
SECURITY & COUNTER MEASURESECURITY & COUNTER MEASURE
• Use of anti-viruses.
• Proper logout after use of mail id.
• Manual opening browser
• Don't open spam.
• Password protected admin account.
• Always use strong password.
19
REFERENCE
• www.google.com
• www.darshangajara.wordpress.com
• www.way2project.in
20
21

More Related Content

What's hot

What's hot (20)

What is social engineering & why it is important
What is social engineering & why it is importantWhat is social engineering & why it is important
What is social engineering & why it is important
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ethics final project
ethics final projectethics final project
ethics final project
 
Basic Introduction about Cyber security & Cyber attack
Basic Introduction about Cyber security & Cyber attackBasic Introduction about Cyber security & Cyber attack
Basic Introduction about Cyber security & Cyber attack
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
 
Hackers ESP
Hackers ESPHackers ESP
Hackers ESP
 
Hacking
HackingHacking
Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Role of encryption in security vs privacy debate
Role of encryption in security vs privacy debateRole of encryption in security vs privacy debate
Role of encryption in security vs privacy debate
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
Drooger, jack cyber security
Drooger, jack   cyber securityDrooger, jack   cyber security
Drooger, jack cyber security
 
Some Perspective on Hackers
Some Perspective on HackersSome Perspective on Hackers
Some Perspective on Hackers
 
About hackers
About hackersAbout hackers
About hackers
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Hacking
HackingHacking
Hacking
 

Viewers also liked

A New Form of Dos attack in Cloud
A New Form of Dos attack in CloudA New Form of Dos attack in Cloud
A New Form of Dos attack in CloudSanoj Kumar
 
Cloud computing in medical field
Cloud computing in medical fieldCloud computing in medical field
Cloud computing in medical fieldBarani Tharan
 
Malware detection in cloud computing infrastructures
Malware detection in cloud computing infrastructuresMalware detection in cloud computing infrastructures
Malware detection in cloud computing infrastructuresieeepondy
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing Reza Pahlava
 
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)Marco Balduzzi
 
Avian flu Type A-H5N1 epidemiological model: Puerto Rico as a case study
Avian flu Type A-H5N1 epidemiological model: Puerto Rico as a case studyAvian flu Type A-H5N1 epidemiological model: Puerto Rico as a case study
Avian flu Type A-H5N1 epidemiological model: Puerto Rico as a case studyMariangeles Rivera
 
Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Marco Balduzzi
 
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...Marco Balduzzi
 
HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
 HTTP(S)-Based Clustering for Assisted Cybercrime Investigations HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
HTTP(S)-Based Clustering for Assisted Cybercrime InvestigationsMarco Balduzzi
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
 
ОО" Шоола Кол" презентация Результаты поиска Санкт-Петербург 14 октября
ОО" Шоола Кол" презентация  Результаты поиска Санкт-Петербург  14 октябряОО" Шоола Кол" презентация  Результаты поиска Санкт-Петербург  14 октября
ОО" Шоола Кол" презентация Результаты поиска Санкт-Петербург 14 октябряАсылбек Айтматов
 
Softworx Enterprise Asset Management 101 - Presentation Template
Softworx Enterprise Asset Management 101 - Presentation TemplateSoftworx Enterprise Asset Management 101 - Presentation Template
Softworx Enterprise Asset Management 101 - Presentation TemplateEnterprise Softworx Solutions
 
чынгыз айтматов Small
чынгыз айтматов Smallчынгыз айтматов Small
чынгыз айтматов SmallKamchibekova Rakia
 

Viewers also liked (20)

A New Form of Dos attack in Cloud
A New Form of Dos attack in CloudA New Form of Dos attack in Cloud
A New Form of Dos attack in Cloud
 
Cloud computing in medical field
Cloud computing in medical fieldCloud computing in medical field
Cloud computing in medical field
 
Malware detection in cloud computing infrastructures
Malware detection in cloud computing infrastructuresMalware detection in cloud computing infrastructures
Malware detection in cloud computing infrastructures
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Adauga un text
Adauga un textAdauga un text
Adauga un text
 
Possessive adjectives
Possessive adjectivesPossessive adjectives
Possessive adjectives
 
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
 
Avian flu Type A-H5N1 epidemiological model: Puerto Rico as a case study
Avian flu Type A-H5N1 epidemiological model: Puerto Rico as a case studyAvian flu Type A-H5N1 epidemiological model: Puerto Rico as a case study
Avian flu Type A-H5N1 epidemiological model: Puerto Rico as a case study
 
Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
 
Pentru tine
Pentru tinePentru tine
Pentru tine
 
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
 
HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
 HTTP(S)-Based Clustering for Assisted Cybercrime Investigations HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
 
Personal informatic
Personal informaticPersonal informatic
Personal informatic
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
 
Family tree
Family treeFamily tree
Family tree
 
ОО" Шоола Кол" презентация Результаты поиска Санкт-Петербург 14 октября
ОО" Шоола Кол" презентация  Результаты поиска Санкт-Петербург  14 октябряОО" Шоола Кол" презентация  Результаты поиска Санкт-Петербург  14 октября
ОО" Шоола Кол" презентация Результаты поиска Санкт-Петербург 14 октября
 
Softworx Enterprise Asset Management 101 - Presentation Template
Softworx Enterprise Asset Management 101 - Presentation TemplateSoftworx Enterprise Asset Management 101 - Presentation Template
Softworx Enterprise Asset Management 101 - Presentation Template
 
чынгыз айтматов Small
чынгыз айтматов Smallчынгыз айтматов Small
чынгыз айтматов Small
 
Presentation1
Presentation1Presentation1
Presentation1
 

Similar to Ethical hacking

What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
 
1861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp021861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp02Mudit Seth
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Solomon Oho
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 

Similar to Ethical hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
1861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp021861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp02
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
hackers
hackershackers
hackers
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Arya
AryaArya
Arya
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
hacking
hackinghacking
hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Hacking
HackingHacking
Hacking
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Hackers
HackersHackers
Hackers
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Ethical hacking

  • 1. ETHICALETHICAL HACKINGHACKING Presented By: Manas Ranjan Das Regd No:1121297048 Branch:ECE 1 Guided By: Mr. Baroda Prashnna Sahoo Dept. Of ECE
  • 2. HIGHLIGHTSHIGHLIGHTS • Introduction. • Is hacking a crime? • Hacking Vs Cracking. • Why Ethical H4cking? • Types of hackers. • Types of Attacks. • Security & Counter Measure. 2
  • 3. INTRODUCTIONINTRODUCTION The explosive growth of the Internet has brought many good things : electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution , to name a few. As with most technological advances , there is also a dark side : criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet. With these concerns and others, the ethical hacker can help. 3
  • 4. Is hacking a crime??Is hacking a crime?? NO NOT AT ALL HACKING IS NOT A CRIME 4
  • 5. Hacker is a word that has two meanings:  Traditionally, a hacker is someone who likes to tinker with software or electronic systems. Hackers enjoy exploring and learning how computer systems operate. They love discovering new ways to work electronically.  Recently, hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals are crackers (criminal hackers).They are out for personal gain: fame, profit, and even revenge. 5 Is hacking a crimeIs hacking a crime????
  • 6. Hacking Vs CrackingHacking Vs Cracking • Hacking with malicious intention is cracking. • The basic difference is hackers do not do anything disastrous. • Cracking yield more devastating results. • Cracking is crime. • Cyber crime are the results of cracking ,not hacking. 6
  • 7. Why Ethical Hacking? • It is Legal. • Permission is obtained from the target. • It is a part of an overall security program. • Identify vulnerabilities visible from Internet at particular point of time. • Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner. 7
  • 8. Types of hackersTypes of hackers Distinction on the basis of knowledge:  CODERS. ADMINS. SCRIPT KIDDES. Distinction on the basis of legality: WHITE HAT HACKERS. GREY HAT HACKERS. BLACK HAT HACKERS. 8
  • 9. CODERS • They have full knowledge. • They know what exactly they are doing. • Well aware about the different codes. • They have complete idea what is going beyond coding. 9
  • 10. ADMINS • They knows what they are doing. • They don’t have idea that what exactly going beyond codes. • Result oriented persons • They are not so harmful. 10
  • 11. SCRIPT KIDDESSCRIPT KIDDES • Young in-experienced hackers. • Copy codes and techniques from knowledgeable hackers • Don’t know what’s going beyond the coding. • Use techniques for fun purpose. • Sometimes could be very dangerous for the system. 11
  • 12. WHITE HATWHITE HAT HACKERSHACKERS • White hat hackers are good hackers. • They have genuine license to hack. • They have registered police records. • They involves themselves in good works. • Generally owned by companies for security designing. • They have high pay scales. • Generally these are coders 12
  • 13. BLACK HATBLACK HAT HACKERSHACKERS • Black hat hackers are very dangerous persons. • They always have motive to earn huge profit. • These are highly paid persons. • They evolves themselves mostly in criminal activities. • These could be coders, admins as well as script kiddies. 13
  • 14. GREY HATGREY HAT HACKERSHACKERS • Grey hat hackers are also known as red hats. • They perform both tasks fair as well as unfair. • Generally these are admins. • They have little high pay than white hats. • Generally these are not so dangerous, but sometimes could be. 14
  • 15. TYPES OF ATTACKSTYPES OF ATTACKS  Brute force attacks.  Buffer Overflow attacks.  Denial of Service (DoS) attacks.  Distributed Denial of Service (DDoS) attacks.  Misconfigurations.  Abuse of Trust.  Back doors and Trojans. 15
  • 16. HACKING PRONE AREASHACKING PRONE AREAS 16
  • 17. 17
  • 18. 18
  • 19. SECURITY & COUNTER MEASURESECURITY & COUNTER MEASURE • Use of anti-viruses. • Proper logout after use of mail id. • Manual opening browser • Don't open spam. • Password protected admin account. • Always use strong password. 19
  • 21. 21

Editor's Notes

  1. NO NOT