Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Introduction To Hacking

Introduction to ethical hacking.

  • Be the first to comment

Introduction To Hacking

  1. 1. INTRODUCTION TO HACKING & SECURITY BY : RAGHAV BISHT
  2. 2. What is Hacking ?  Process to bypass the security mechanisms.  Doing something awesome.  Unauthorized use of computer and network.  Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.  Hacking is the process of exploiting vulnerabilities to gain unauthorized access to systems or resources.
  3. 3. Who are hackers ?  Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems."
  4. 4. Types of Hackers  White Hat  IT professional  Administrators  Black Hat  Crackers  Grey Hat
  5. 5. Hackers Hierarchy  Elite hackers  Script kiddie  Neophyte  Hacktivist  Green hat hackers
  6. 6. Understanding the need to hack your own system  Basis for Ethical Hacking.  To catch a thief, think like a thief
  7. 7. Overall goals an an ethical hacker  Hack your systems in a nondestructive fashion.  Enumerate vulnerabilities and , if necessary, prove to management that vulnerabilities exit and can be exploited.  Apply result to remove the vulnerabilities and better secure your systems.
  8. 8. What is computer Security ?  Security is process not product.  The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible, Use to minimize the security threads (vulnerability + exploit)
  9. 9. How to become best hacker ?  Books Says :  Windows Knowledge + Linux + Unix  Networking Knowledge + Creative thinking + expert in pen test  IT Professional & SecurityAnalyst Says :  Programming is key to success  Raghav Bisht Says :  “ If you can understand the system,You can hack it.”
  10. 10. Hackers Keywords  RAT : Remote administration tool  DDOS : Distributed denial of service  FUD : Fully undetectable  SQL : Structured query language  XSS : Cross site scripting  Skid : Script kiddie  Malware : Malicious software  SSH : Secure shell  VPN :Virtual private network  VPS :Virtual private service
  11. 11. Hacking Terms  If you are a newbie in hacking then you need to learn some things.There are some terms that every hacker should know about them.  Algorithm  ANSI Bomb  Back Door  Bot and Botnet  Buffer Overflow  Cracker  DDoS  Deface  DOX  Worm  Zero Day Exploit
  12. 12. Cont…  Encryption  Exploit  FUD  Keylogger  Malware  Packet  Phreaking  Proxy  RainbowTable  Rootkit (ring3 ring0)  Reverse Engineering  Shell  Spoof  Trojan
  13. 13. International Hacking & Security Certifications  CEH ( Certified Ethical Hacker )  CHFI ( Computer hacking forensic investigator )  ECSA ( EC – Council Certified Security Analyst )  CISA ( Certified Information System Auditor )  CISSP ( Certified Info Sys Security Professional )

    Be the first to comment

    Login to see the comments

  • sippy12

    Jan. 15, 2015
  • DanashekarChitra

    Dec. 20, 2020

Introduction to ethical hacking.

Views

Total views

2,878

On Slideshare

0

From embeds

0

Number of embeds

105

Actions

Downloads

93

Shares

0

Comments

0

Likes

2

×