SlideShare a Scribd company logo
1 of 25
Career in
Ethical Hacking
52-61-74-6e-65-73-68-20-44-68-65-65-72-61-6a
Presenter:
Objective
How to do
Hacking Tools
Live Hacking
Security
Self Declaration
I, <my_name/> swear that,
I will never misuse hacking skills for my
personal/organizational benefit or
interest.
01001000 01000001 01000011 01001011
01000101 01010010 01010011 00100000
01000001 01010010 01000101 00100000
01001000 01000101 01010010 01000101
Crack the code
The First Hacking
 The first hacker appeared in 1960’s at Massachusetts Institute of
Technology(MIT)
 During 1970’s different types hackers appeared as Phone Hackers
 1980’s hackers migrated to Computer, ”Bulletin Board System (BBS)
 1990’s Internet came and hackers were multiplied
Hacker and Ethical Hacker
 Hacker
 Access computer System or network without authorization
 Breaks the law
 Ethical Hackers
 Performs the same activities with the Owner’s Permission
 Employed the companies to perform the Penetration Tests
Active Hacker Groups on the Earth
 Fancy Bear (aka. Sofacy, Pawn Storm) / Cozy Bear (aka. CozyDuke, Office Monkeys)
 Rival agencies in the Russian spy services
 Lazarus Group (aka. DarkSeoul, Guardians of Peace)
 Widely believed to be associated with North Korea
 Equation Group
 This is the nickname given by Russian antivirus firm Kaspersky
 Comment Crew (aka. APT1, Shanghai Group)
 China sponsors a plethora of hacking groups
 Sandworm (a.k.a. Electrum)
 Named for allusions to the sci-fi classic Dune found in its code,
Sandworm is another group believed to be associated with the Russians
Hackers Types
 White Hat
 Good Guys
 Don’t use their Skill for illegal purpose
 Computer Security experts and help to protect from Black Hats
 Black Hat
 Bad Guys
 Use the skill for malicious purpose
 Hack banks, websites, credit cards
 Grey Hat
 Combination of black hat and white hat
Hacking Process
Footprinting
(information
gathering)
Scanning
Enumerations
Attack and
Gaining
Access
Escalating
privilege,
Covering
Tracks, and
Creating
Backdoors
Tools and TechnologiesFootprinting
Whois, Ping, Bigbrother
Traceroute, nslookup
www.samspade.org,
www.geektools.com,
www.whois.net,
www.demon.net
Scanning
nmap
Nessus
OpenVAS
InSSIder
Enumeration
Netcat
tcpdump
Telnet
Firewalk
Encryption
Encryption is an interesting piece of technology that works by scrambling
data so it is unreadable by unintended parties
01d59a3b5e0ad59fe56710fd3114d97e
Password hashed using MD5 algorithm
A password, hacked recently
Hacking
Password
“Windows 10”
Hacking Windows 10 Video
Revealing Password from Browser
javascript: var p=r(); function r(){var g=0;var x=false;var
x=z(document.forms);g=g+1;var w=window.frames;for(var k=0;k<w.length;k++) {var
x = ((x) || (z(w[k].document.forms)));g=g+1;}if (!x) alert('Password not found in ' +
g + ' forms');}function z(f){var b=false;for(var i=0;i<f.length;i++) {var
e=f[i].elements;for(var j=0;j<e.length;j++) {if (h(e[j])) {b=true}}}return b;}function
h(ej){var s='';if (ej.type=='password'){s=ej.value;if (s!=''){prompt('Password found ',
s)}else{alert('Password is blank')}return true;}}
Attacks
1. Eavesdropping
2. Data Modification
3. Identity Spoofing (IP Address Spoofing)
4. Password-Based Attacks
5. Denial-of-Service Attack
6. Man-in-the-Middle Attack
7. Compromised-Key Attack
8. Sniffer Attack
9. Application-Layer Attack
https://technet.microsoft.com/en-us/library/cc959354.aspx
Operating System for Hacking and Pen Test
 Parrot Security OS
 Kali Linux
 BackBox
 Samurai Web Testing Framework
 Pentoo Linux
 DEFT Linux
 Caine
 Network Security Toolkit (NST)
 BlackArch Linux
 Bugtraq
 ArchStrike Linux
 Fedora Security Spin
Curriculum
Ethical
Hacking
Footprinting
Scanning
Networks
Enumerations
System
Hacking
Malware and
Sniffing
Web Servers
hacking
Hacking
Mobile
Platforms
Social
Engineering
Cloud
Computing
Cryptography
Honeypots
and Firewalls
WeTrainOn
Our Training Methodology
HACK THE LAB
Who will get benefitted
https://www.softwareadvice.com/resources/how-to-get-a-job-as-an-ethical-hacker/
Why neosphere?
OCR model classroom [experiential learning]
Trainers from Industry
Career Guidance
Internship
Placement Assistance
Career and Internship Partner
Our Academic Partners
Certification exams we conduct
Want to hack…
Call Us at
+977 9801200111
01-555 15 15
Or write us
info@neosphere.com.np

More Related Content

What's hot

What's hot (20)

Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security
Network Security Network Security
Network Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Social engineering
Social engineering Social engineering
Social engineering
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
Footprinting
FootprintingFootprinting
Footprinting
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 

Similar to Career in Ethical Hacking

Similar to Career in Ethical Hacking (20)

Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Hacking
HackingHacking
Hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 

More from neosphere

C programming Workshop
C programming WorkshopC programming Workshop
C programming Workshopneosphere
 
Java Programming Workshop
Java Programming WorkshopJava Programming Workshop
Java Programming Workshopneosphere
 
Digital Marketing in Business
Digital Marketing in BusinessDigital Marketing in Business
Digital Marketing in Businessneosphere
 
CCNP Presentation- neosphere
CCNP Presentation- neosphereCCNP Presentation- neosphere
CCNP Presentation- neosphereneosphere
 
Digital marketing
Digital marketingDigital marketing
Digital marketingneosphere
 
Career in Software Development
Career in Software Development  Career in Software Development
Career in Software Development neosphere
 
Building career in Information Technology
Building career in Information TechnologyBuilding career in Information Technology
Building career in Information Technologyneosphere
 
Career as network specialist
Career as network specialistCareer as network specialist
Career as network specialistneosphere
 

More from neosphere (8)

C programming Workshop
C programming WorkshopC programming Workshop
C programming Workshop
 
Java Programming Workshop
Java Programming WorkshopJava Programming Workshop
Java Programming Workshop
 
Digital Marketing in Business
Digital Marketing in BusinessDigital Marketing in Business
Digital Marketing in Business
 
CCNP Presentation- neosphere
CCNP Presentation- neosphereCCNP Presentation- neosphere
CCNP Presentation- neosphere
 
Digital marketing
Digital marketingDigital marketing
Digital marketing
 
Career in Software Development
Career in Software Development  Career in Software Development
Career in Software Development
 
Building career in Information Technology
Building career in Information TechnologyBuilding career in Information Technology
Building career in Information Technology
 
Career as network specialist
Career as network specialistCareer as network specialist
Career as network specialist
 

Recently uploaded

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 

Recently uploaded (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 

Career in Ethical Hacking

Editor's Notes

  1. Decode using excel Convert Binary to Decimal Decimal to character
  2. Footprinting: is the first and most convenient way that hackers use to gather information about computer systems and the companies they belong to. The purpose of footprinting to learn as much as you can about a system, it's remote access capabilities, its ports and services, and the aspects of its security. Scanning: is the process to find out from which door or the way a hacker can enter in the Victim computer Enumeration: The process of enumeration, finding find what services are running, versions, open shares, account details, or possible points of entry Access and Attack: Successful gain to the Victim computer/device and start doing your Job Backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device
  3. Show them traceroute command WMIC [Windows Management Instrumentation (WMI)] wmic OS wmic /output:c:\data\test.csv computersystem list full /format:csv wmic /output:c:\data\test.csv os /format:csv
  4. http://www.md5online.org Use the link to decrypt the password.
  5. http://unminify.com/
  6. At neosphere, we provide optical classroom training, where one student will have access to one machine and that is very important from the “Cone of Learning” point of view. Trainer’s are from the industry which will help you to understand the live software development training methodologies Our career partners will guide you in finding the jobs as well as designing the Resume and interview cracking techniques, we will also assist you in getting Job We will provide you the leading companies in Nepal where you can do your Internship