4. OverviewOverview
• Concept Of Hacking
• Difference Between Hacking & Ethical Hacking
• History Of Hacking
• Types Of Hacking
• Types Of Hacker
• Consequences
• Conclusion
5. Concept Of HackingConcept Of Hacking
• Hacking is not the one which you people think
of……
• It’s not the one which you play with other’s
computers, Facebook account (organization’s
Government’s etc…)
• Now a days this technology has become a crime
due to these aspects
• We should not miss use the technologies for such
criminal aspects
• Instead we can use it in better manner like security
purpose
6. Hacking & Ethical HackingHacking & Ethical Hacking
HackingHacking
Access computer system or network without authorization
Breaks the law
Ethical HackingEthical Hacking
•Performs most of the same activities but with owner’s permission
to perform Penetration Test
•It is Legal
•Part of an overall security program
•Identify vulnerabilities visible from Internet at Particular point of
time
•Ethical hackers possesses same skills. Mindset and tools of a
hacker but the attacks are done in a non-destructive manner
7. History Of Ethical HackingHistory Of Ethical Hacking
• The first hacker was appeared in 1960’s at the Massachusetts
Institute Of Technology(MIT)
• During the 1970’s, a different kind of hacker appeared:
Phone Phreaker or Phone Hacker
8. • In the 1980’s, phreaks started to migrate to
computers, and the first Bulletin Board System (BBS)
appeared
• During the 1990’s, when the use of internet
widespread around the world, hackers multiplied
9. Types of HackerTypes of Hacker
White Hat HackerWhite Hat Hacker
•Good guys
•Don’t use their skill for illegal purpose
•Computer security experts and help to protect from Black Hats.
BlackBlack Hat HackerHat Hacker
•Bad guys
•Use their skill maliciously for personal gain
•Hack banks, steal credit cards and deface websites
GreyGrey Hat HackerHat Hacker
•It is a combination of White hat n Black Hat Hackers
•Goal of grey hat hackers is to provide national security
10. Types of HackingTypes of Hacking
Phishing Method OR Fake Login Hack. (Working)
Key logging (Working)
Brute Force Hack.. (Working)
Cookie Steal Hack. (Not Working)
11. Some Famous HackersSome Famous Hackers
Ian Murphy Kevin Mitnick Johan Helsinguis
Linus Torvald Mark Abene Robert Morris
12. • Thousands of dollars in fines
• Imprisonment
• Seizure of your computer
ConsequencesConsequences
13. ConclusionConclusion
• Proper ethical hackers should be employed
• Do not expose your passwords to untrusted sites
• Practice using exact web address
• Close your internet while not in use
14. SummarySummary
• Hacking is of two types
• There are several types of hacking
• Ethical hacking – a legal method
• Consequences of illegal hacking