SlideShare a Scribd company logo
1 of 19
Ethical Hacking Skills
&
Social Engineering Techniques
Skills Required to Become a Ethical Hacker
Skills allow you to achieve your desired goals within the available time and resources. As a hacker,
you will need to develop skills that will help you get the job done. These skills include learning how
to program, use the internet, good at solving problems, and taking advantage of existing security
tools.
In this article, we will introduce you to the common programming languages and skills that you must
know as a hacker.
 Top Ethical Hacking Skills
• Excellent Computer Skills. ...
• Programming Skills. ...
• Database Skills. ...
• SQL Skills. ...
• Linux Skills. ...
• Cryptography. ...
• Social Engineering Skills. ...
• Web Applications.
1. Excellent Computer Skills
2. Programming Skills
A programming language is a language that is used to develop computer programs. The programs
developed can range from operating systems; data based applications through to networking solutions.
Why should you learn how to program?
Hackers are the problem solver and tool builders, learning how to program will help you
implement solutions to problems. It also differentiates you from script kiddies.
Writing programs as a hacker will help you to automate many tasks which would usually take
lots of time to complete.
Writing programs can also help you identify and exploit programming errors in applications that
you will be targeting.
You don’t have to reinvent the wheel all the time, and there are a number of open source
programs that are readily usable. You can customize the already existing applications and
add your methods to suit your needs.
What languages should I learn?
COMPUTER
LANGUAGES
DESCRIPTION PURPOSE
HTML
Language used to write web
pages.
Web hacking
Login forms and other data entry methods on the web use HTML forms to get data. Being able to write and interpret
HTML, makes it easy for you to identify and exploit weaknesses in the code.
JavaScript Client side scripting language
Web Hacking
JavaScript code is executed on the client browse. You can use it to read saved cookies and perform cross site scripting
etc.
PHP Server side scripting language
Web Hacking
PHP is one of the most used web programming languages. It is used to process HTML forms and performs other custom
tasks. You could write a custom application in PHP that modifies settings on a web server and makes the server
vulnerable to attacks.
SQL
Language used to communicate
with database
Web Hacking
Using SQL injection, to by-pass web application login algorithms that are weak, delete data from the database, etc.
Python
Ruby
Bash
Perl
High level programming
languages
Building tools & scripts
They come in handy when you need to develop automation tools and scripts. The knowledge gained can also be used in
understand and customization the already available tools.
C & C++ Low Level Programming
Writing exploits, shell codes, etc.
They come in handy when you need to write your own shell codes, exploits, root kits or understanding and expanding
on existing ones.
Java,CSharp
Visual Basic
VBScript
Other languages
Other uses
The usefulness of these languages depends on your scenario.
3. Database Skills
Ethical hacking requires a number of different skills to be successful. One of the most important ethical hacker skills is
the ability to work with databases.
 Hackers need to be able to understand how databases are structured and how they work in order to be able to find
security vulnerabilities.
 In addition, hackers need to be able to use database management tools in order to manipulate data and access
restricted information. Without these skills, it would be very difficult for ethical hackers to do their job.
4. SQL Skills
Ethical hacking is an increasingly popular profession that calls for a very specific set of skills. Perhaps
one of the essential ethical hacking skills required for an ethical hacker is the ability to write and
understand SQL queries.
SQL, or Structured Query Language, is a programming language specifically designed for working
with databases.
To find vulnerable information in a database, an ethical hacker needs to be able to craft SQL queries
that can extract the desired data.
5. Linux Skills
Anyone in information technology systems, such as administrators and network engineers, software
developers or engineers, and some cybersecurity professionals, should learn Linux. It's an important
skill to learn because Linux is the foundation of many servers and supercomputers.
For ethical hackers, Linux skills are essential, as they allow you to access the inner workings of a
system and identify potential vulnerabilities.
In addition, Linux skills provide you with the ability to create custom scripts and programs that can
be used to automate various tasks.
What is Social Engineering? Attacks,Techniques & Prevention
Social engineering is the art of manipulating users of a computing system into revealing
confidential information that can be used to gain unauthorized access to a computer system.
The term can also include activities
such as exploiting human kindness, greed, and curiosity to gain access to restricted access
buildings or getting the users to installing backdoor software.
How social engineering Works?
HERE,
Gather Information: This is the first stage, the learns as much as he can about the intended victim. The
information is gathered from company websites, other publications and sometimes by talking to the users
of the target system.
Plan Attack: The attackers outline how he/she intends to execute the attack
Acquire Tools: These include computer programs that an attacker will use when launching the attack.
Attack: Exploit the weaknesses in the target system.
Use acquired knowledge: Information gathered during the social engineering tactics such as pet names,
birthdates of the organization founders, etc. is used in attacks such as password guessing.
How social engineering Works?
Social Engineering attacks
Phishing: Phishing uses emails that appear to come from legitimate sources to trick people
into providing their information or clicking on malicious links and put end users into one of the
emotional states that causes them to act without thinking.
Vishing: Attackers use phone calls to trick victims into handling over data. They may pose as bank
managers or other trusted entities to supply your credentials and other important data.
Smishing: Uses SMS text messaging to get you to divulge information or click on a malicious link.
Spear Phishing: Similar to phishing but the attacker customizes the email specifically for an
individual to make the phish seem more real. They often target key employees with access to critical
and/or confidential data
Phishing
E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal
information
 In other words It is the criminally attempting to acquire sensitive information such as
•usernames
•passwords
•credit card details
Vishing & Smishing
Vishing - Phone calls made by fraudsters to steal your personal information and sensitive
information
- they communicate
• as bank officer
• referring your shopping
Tips to avoid Vishing & Smishing
 Never reveal any information over phone calls
 Call the original company like bank, shopping toll free and enquire about the call received
 Avoid picking calls from unknown numbers
 Never respond to sms received from unknowns
 Avoid clicking links received on sms
Protecting Yourself
A security aware culture can help employees identify and repel social engineering attacks 􀀀
Recognize inappropriate requests for information
 Take ownership for corporate security
 Understand risk and impact of security breeches
 Social engineering attacks are personal.
 Password management
Two factor authentication
Physical security
Understand what information you are putting on the Web for targeting at social network sites
Google, Twitter
Myspace, Facebook
Personal Blogs, LinkedIn
Safety Tips
1) Use antivirus software (AVAST, AVG…..)
2) Insert firewalls , pop up blocker (Windows, Comodo)
3) Uninstall unnecessary software (Adwares)
4) Maintain backup (Weekly/Monthly)
5) Use secure connection (HTTPS)
6) Open attachments carefully
7) Use strong passwords , don’t give personal information
unless required.
FREE AVAST ANTIVIRUS FOR ONE YEAR –
https://www.avast.com/registration-free-antivirus.php
Summary
Programming skills are essential to becoming an effective hacker.
Network skills are essential to becoming an effective hacker
SQL skills are essential to becoming an effective hacker.
Hacking tools are programs that simplify the process of identifying and exploiting weaknesses in computer
systems.
Social engineering is the art of exploiting the human elements to gain access to un-authorized resources.
Social engineers use a number of techniques to fool the users into revealing sensitive information.
Organizations must have security policies that have social engineering countermeasures.

More Related Content

What's hot

General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of CybersecurityBenoit Callebaut
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostInfosec
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsB R SOFTECH PVT LTD
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trendsHadeel Sadiq Obaid
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityNowSecure
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber SecurityPrashant Sharma
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 

What's hot (20)

General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of Cybersecurity
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
cyber crime
cyber crimecyber crime
cyber crime
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Ethical hacking - Skills.pptx

What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?Careervira
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Edureka!
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Best ethical hacking course online
Best ethical hacking course onlineBest ethical hacking course online
Best ethical hacking course onlineDucat
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxAnshumaanTiwari2
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxInfosectrain3
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptshreya_omar
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hackingBeing Uniq Sonu
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfarri2009av
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing AttacksPECB
 

Similar to Ethical hacking - Skills.pptx (20)

What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Best ethical hacking course online
Best ethical hacking course onlineBest ethical hacking course online
Best ethical hacking course online
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptx
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Ethical hacking - Skills.pptx

  • 1. Ethical Hacking Skills & Social Engineering Techniques
  • 2. Skills Required to Become a Ethical Hacker Skills allow you to achieve your desired goals within the available time and resources. As a hacker, you will need to develop skills that will help you get the job done. These skills include learning how to program, use the internet, good at solving problems, and taking advantage of existing security tools. In this article, we will introduce you to the common programming languages and skills that you must know as a hacker.  Top Ethical Hacking Skills • Excellent Computer Skills. ... • Programming Skills. ... • Database Skills. ... • SQL Skills. ... • Linux Skills. ... • Cryptography. ... • Social Engineering Skills. ... • Web Applications.
  • 4. 2. Programming Skills A programming language is a language that is used to develop computer programs. The programs developed can range from operating systems; data based applications through to networking solutions.
  • 5. Why should you learn how to program? Hackers are the problem solver and tool builders, learning how to program will help you implement solutions to problems. It also differentiates you from script kiddies. Writing programs as a hacker will help you to automate many tasks which would usually take lots of time to complete. Writing programs can also help you identify and exploit programming errors in applications that you will be targeting. You don’t have to reinvent the wheel all the time, and there are a number of open source programs that are readily usable. You can customize the already existing applications and add your methods to suit your needs.
  • 6. What languages should I learn? COMPUTER LANGUAGES DESCRIPTION PURPOSE HTML Language used to write web pages. Web hacking Login forms and other data entry methods on the web use HTML forms to get data. Being able to write and interpret HTML, makes it easy for you to identify and exploit weaknesses in the code. JavaScript Client side scripting language Web Hacking JavaScript code is executed on the client browse. You can use it to read saved cookies and perform cross site scripting etc. PHP Server side scripting language Web Hacking PHP is one of the most used web programming languages. It is used to process HTML forms and performs other custom tasks. You could write a custom application in PHP that modifies settings on a web server and makes the server vulnerable to attacks. SQL Language used to communicate with database Web Hacking Using SQL injection, to by-pass web application login algorithms that are weak, delete data from the database, etc. Python Ruby Bash Perl High level programming languages Building tools & scripts They come in handy when you need to develop automation tools and scripts. The knowledge gained can also be used in understand and customization the already available tools. C & C++ Low Level Programming Writing exploits, shell codes, etc. They come in handy when you need to write your own shell codes, exploits, root kits or understanding and expanding on existing ones. Java,CSharp Visual Basic VBScript Other languages Other uses The usefulness of these languages depends on your scenario.
  • 7. 3. Database Skills Ethical hacking requires a number of different skills to be successful. One of the most important ethical hacker skills is the ability to work with databases.  Hackers need to be able to understand how databases are structured and how they work in order to be able to find security vulnerabilities.  In addition, hackers need to be able to use database management tools in order to manipulate data and access restricted information. Without these skills, it would be very difficult for ethical hackers to do their job.
  • 8. 4. SQL Skills Ethical hacking is an increasingly popular profession that calls for a very specific set of skills. Perhaps one of the essential ethical hacking skills required for an ethical hacker is the ability to write and understand SQL queries. SQL, or Structured Query Language, is a programming language specifically designed for working with databases. To find vulnerable information in a database, an ethical hacker needs to be able to craft SQL queries that can extract the desired data.
  • 9. 5. Linux Skills Anyone in information technology systems, such as administrators and network engineers, software developers or engineers, and some cybersecurity professionals, should learn Linux. It's an important skill to learn because Linux is the foundation of many servers and supercomputers. For ethical hackers, Linux skills are essential, as they allow you to access the inner workings of a system and identify potential vulnerabilities. In addition, Linux skills provide you with the ability to create custom scripts and programs that can be used to automate various tasks.
  • 10. What is Social Engineering? Attacks,Techniques & Prevention Social engineering is the art of manipulating users of a computing system into revealing confidential information that can be used to gain unauthorized access to a computer system. The term can also include activities such as exploiting human kindness, greed, and curiosity to gain access to restricted access buildings or getting the users to installing backdoor software.
  • 12. HERE, Gather Information: This is the first stage, the learns as much as he can about the intended victim. The information is gathered from company websites, other publications and sometimes by talking to the users of the target system. Plan Attack: The attackers outline how he/she intends to execute the attack Acquire Tools: These include computer programs that an attacker will use when launching the attack. Attack: Exploit the weaknesses in the target system. Use acquired knowledge: Information gathered during the social engineering tactics such as pet names, birthdates of the organization founders, etc. is used in attacks such as password guessing. How social engineering Works?
  • 13. Social Engineering attacks Phishing: Phishing uses emails that appear to come from legitimate sources to trick people into providing their information or clicking on malicious links and put end users into one of the emotional states that causes them to act without thinking. Vishing: Attackers use phone calls to trick victims into handling over data. They may pose as bank managers or other trusted entities to supply your credentials and other important data. Smishing: Uses SMS text messaging to get you to divulge information or click on a malicious link. Spear Phishing: Similar to phishing but the attacker customizes the email specifically for an individual to make the phish seem more real. They often target key employees with access to critical and/or confidential data
  • 14. Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information  In other words It is the criminally attempting to acquire sensitive information such as •usernames •passwords •credit card details
  • 15. Vishing & Smishing Vishing - Phone calls made by fraudsters to steal your personal information and sensitive information - they communicate • as bank officer • referring your shopping
  • 16. Tips to avoid Vishing & Smishing  Never reveal any information over phone calls  Call the original company like bank, shopping toll free and enquire about the call received  Avoid picking calls from unknown numbers  Never respond to sms received from unknowns  Avoid clicking links received on sms
  • 17. Protecting Yourself A security aware culture can help employees identify and repel social engineering attacks 􀀀 Recognize inappropriate requests for information  Take ownership for corporate security  Understand risk and impact of security breeches  Social engineering attacks are personal.  Password management Two factor authentication Physical security Understand what information you are putting on the Web for targeting at social network sites Google, Twitter Myspace, Facebook Personal Blogs, LinkedIn
  • 18. Safety Tips 1) Use antivirus software (AVAST, AVG…..) 2) Insert firewalls , pop up blocker (Windows, Comodo) 3) Uninstall unnecessary software (Adwares) 4) Maintain backup (Weekly/Monthly) 5) Use secure connection (HTTPS) 6) Open attachments carefully 7) Use strong passwords , don’t give personal information unless required. FREE AVAST ANTIVIRUS FOR ONE YEAR – https://www.avast.com/registration-free-antivirus.php
  • 19. Summary Programming skills are essential to becoming an effective hacker. Network skills are essential to becoming an effective hacker SQL skills are essential to becoming an effective hacker. Hacking tools are programs that simplify the process of identifying and exploiting weaknesses in computer systems. Social engineering is the art of exploiting the human elements to gain access to un-authorized resources. Social engineers use a number of techniques to fool the users into revealing sensitive information. Organizations must have security policies that have social engineering countermeasures.