SlideShare a Scribd company logo
Ethical Hacking
Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting
What is Ethical Hacking Ethical Hacking Conforming to accepted professional standards of conduct ,[object Object],[object Object],[object Object],Also Called – Attack & Penetration Testing,  White-hat hacking, Red teaming White-hat - Good Guys Black-hat – Bad guys
What is Ethical Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why – Ethical Hacking Source: CERT-India January - 2005 Defacement Statistics for Indian Websites 1131 Total 13 other 2 .edu  2 .nic.in  3 .info  13 .ac.in  48 .co.in  12 .biz  39 .net  53 .org  24 .gov.in  922 .com  No of Defacements  Domains June 01, 2004 to Dec.31, 2004
Why – Ethical Hacking Source: CERT/CC Total Number of Incidents Incidents
Why – Ethical Hacking Source: US - CERT
Why – Ethical Hacking Protection from possible External Attacks Viruses, Trojan Horses,  and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data
Ethical Hacking - Process ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preparation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Footprinting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enumeration & Fingerprinting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identification of Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identification of Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identification of Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attack – Exploit the vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Attack – Exploit the vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attack – Exploit the vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Attack – Exploit the vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Reporting ,[object Object],[object Object],[object Object],[object Object]
Ethical Hacking - Commandments ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
Masih Karimi
 
Intruders
IntrudersIntruders
Intruders
techn
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
Ehtisham Ali
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
Information Technology
 
Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities
Joel Aleburu
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
andynova
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
festival ICT 2016
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
RootedCON
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
mmubashirkhan
 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
Edureka!
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
Umang Gupta
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Falgun Rathod
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & Forensics
Priyanka Aash
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
MissStevenson1
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
kawsarahmedchoudhuryzzz
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
EC-Council
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Mohammad Affan
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
udemy course
 

What's hot (18)

Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Intruders
IntrudersIntruders
Intruders
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & Forensics
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
 

Viewers also liked

Year 2070 01_07_06
Year 2070 01_07_06Year 2070 01_07_06
Year 2070 01_07_06
Dr. Salman Iqbal
 
Hi2
Hi2Hi2
Cartoons caricature him
Cartoons caricature himCartoons caricature him
Cartoons caricature him
Dr. Salman Iqbal
 
Minneapolis bridge disaster__27_slides_
Minneapolis bridge disaster__27_slides_Minneapolis bridge disaster__27_slides_
Minneapolis bridge disaster__27_slides_
Dr. Salman Iqbal
 
Makkahin2010
Makkahin2010Makkahin2010
Makkahin2010
Dr. Salman Iqbal
 
Say n otodollar ( solution)
Say n otodollar ( solution)Say n otodollar ( solution)
Say n otodollar ( solution)
Dr. Salman Iqbal
 
Magic cat
Magic catMagic cat
Magic cat
Dr. Salman Iqbal
 

Viewers also liked (7)

Year 2070 01_07_06
Year 2070 01_07_06Year 2070 01_07_06
Year 2070 01_07_06
 
Hi2
Hi2Hi2
Hi2
 
Cartoons caricature him
Cartoons caricature himCartoons caricature him
Cartoons caricature him
 
Minneapolis bridge disaster__27_slides_
Minneapolis bridge disaster__27_slides_Minneapolis bridge disaster__27_slides_
Minneapolis bridge disaster__27_slides_
 
Makkahin2010
Makkahin2010Makkahin2010
Makkahin2010
 
Say n otodollar ( solution)
Say n otodollar ( solution)Say n otodollar ( solution)
Say n otodollar ( solution)
 
Magic cat
Magic catMagic cat
Magic cat
 

Similar to Ethical h

324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
ssuserde23af
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
champubhaiya8
 
ethical hacking
ethical hackingethical hacking
ethical hacking
Neelima Bawa
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
justyogesh
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Viraj Kansara
 
Presentation1
Presentation1Presentation1
Presentation1
Abhishek Malhotra
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
CyberIgnite.pdf
CyberIgnite.pdfCyberIgnite.pdf
CyberIgnite.pdf
GDSCPUP
 
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdfpdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
tehkotak4
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdf
MarceloCunha571649
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
Uday Verma
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
Janani S
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
martinvoelk
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
Geeks Anonymes
 
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.pptch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
asjadzaki2021
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
shahhardik27
 
Hacking
HackingHacking
Hacking
lalpethajji
 

Similar to Ethical h (20)

324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
CyberIgnite.pdf
CyberIgnite.pdfCyberIgnite.pdf
CyberIgnite.pdf
 
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdfpdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdf
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.pptch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Hacking
HackingHacking
Hacking
 

More from Dr. Salman Iqbal

Bmj pam.ppt blue final
Bmj pam.ppt blue finalBmj pam.ppt blue final
Bmj pam.ppt blue final
Dr. Salman Iqbal
 
Ancient medicine
Ancient medicineAncient medicine
Ancient medicine
Dr. Salman Iqbal
 
Recession
RecessionRecession
Recession
Dr. Salman Iqbal
 
Punishing urboss
Punishing urbossPunishing urboss
Punishing urboss
Dr. Salman Iqbal
 
Muhammd prophet of_islam_mercy_of_the_world
Muhammd prophet of_islam_mercy_of_the_worldMuhammd prophet of_islam_mercy_of_the_world
Muhammd prophet of_islam_mercy_of_the_world
Dr. Salman Iqbal
 
Memorise those brands (problem)
Memorise those brands (problem)Memorise those brands (problem)
Memorise those brands (problem)
Dr. Salman Iqbal
 
Israeli massacre
Israeli massacreIsraeli massacre
Israeli massacre
Dr. Salman Iqbal
 
Atk 08
Atk 08Atk 08
Allah rab ul-izzat kaheta hai
Allah rab ul-izzat kaheta haiAllah rab ul-izzat kaheta hai
Allah rab ul-izzat kaheta haiDr. Salman Iqbal
 
Al aqsa facts
Al aqsa factsAl aqsa facts
Al aqsa facts
Dr. Salman Iqbal
 
Tonsillitis
TonsillitisTonsillitis
Tonsillitis
Dr. Salman Iqbal
 
Role of probiotics
Role of probioticsRole of probiotics
Role of probiotics
Dr. Salman Iqbal
 
Presentation diag dilemma
Presentation diag dilemmaPresentation diag dilemma
Presentation diag dilemma
Dr. Salman Iqbal
 
Medications during pregnancy
Medications during pregnancyMedications during pregnancy
Medications during pregnancy
Dr. Salman Iqbal
 
Mdh marketing plan 2010
Mdh marketing plan 2010Mdh marketing plan 2010
Mdh marketing plan 2010
Dr. Salman Iqbal
 
Introduction
IntroductionIntroduction
Introduction
Dr. Salman Iqbal
 
Intercostal drain
Intercostal drainIntercostal drain
Intercostal drain
Dr. Salman Iqbal
 

More from Dr. Salman Iqbal (20)

Bmj pam.ppt blue final
Bmj pam.ppt blue finalBmj pam.ppt blue final
Bmj pam.ppt blue final
 
Ancient medicine
Ancient medicineAncient medicine
Ancient medicine
 
Recession
RecessionRecession
Recession
 
Punishing urboss
Punishing urbossPunishing urboss
Punishing urboss
 
Muhammd prophet of_islam_mercy_of_the_world
Muhammd prophet of_islam_mercy_of_the_worldMuhammd prophet of_islam_mercy_of_the_world
Muhammd prophet of_islam_mercy_of_the_world
 
Memorise those brands (problem)
Memorise those brands (problem)Memorise those brands (problem)
Memorise those brands (problem)
 
Israeli massacre
Israeli massacreIsraeli massacre
Israeli massacre
 
Death
DeathDeath
Death
 
Atk 08
Atk 08Atk 08
Atk 08
 
Allah rab ul-izzat kaheta hai
Allah rab ul-izzat kaheta haiAllah rab ul-izzat kaheta hai
Allah rab ul-izzat kaheta hai
 
Al aqsa facts
Al aqsa factsAl aqsa facts
Al aqsa facts
 
Tonsillitis
TonsillitisTonsillitis
Tonsillitis
 
Sticker
StickerSticker
Sticker
 
Role of probiotics
Role of probioticsRole of probiotics
Role of probiotics
 
Presentation diag dilemma
Presentation diag dilemmaPresentation diag dilemma
Presentation diag dilemma
 
Medications during pregnancy
Medications during pregnancyMedications during pregnancy
Medications during pregnancy
 
Me and my father
Me and my fatherMe and my father
Me and my father
 
Mdh marketing plan 2010
Mdh marketing plan 2010Mdh marketing plan 2010
Mdh marketing plan 2010
 
Introduction
IntroductionIntroduction
Introduction
 
Intercostal drain
Intercostal drainIntercostal drain
Intercostal drain
 

Recently uploaded

Navigating the World of Topsoil: A Guide to the Right Choice for Your Garden
Navigating the World of Topsoil: A Guide to the Right Choice for Your GardenNavigating the World of Topsoil: A Guide to the Right Choice for Your Garden
Navigating the World of Topsoil: A Guide to the Right Choice for Your Garden
nerissacampuzano
 
MISS RAIPUR 2024 - WINNER POONAM BHARTI.
MISS RAIPUR 2024 - WINNER POONAM BHARTI.MISS RAIPUR 2024 - WINNER POONAM BHARTI.
MISS RAIPUR 2024 - WINNER POONAM BHARTI.
DK PAGEANT
 
The Uttoxeter and Cheadle Voice Issue 123
The Uttoxeter and Cheadle Voice Issue 123The Uttoxeter and Cheadle Voice Issue 123
The Uttoxeter and Cheadle Voice Issue 123
Noel Sergeant
 
欧洲杯赌钱-欧洲杯赌钱比赛投注-欧洲杯赌钱比赛投注官网|【​网址​🎉ac22.net🎉​】
欧洲杯赌钱-欧洲杯赌钱比赛投注-欧洲杯赌钱比赛投注官网|【​网址​🎉ac22.net🎉​】欧洲杯赌钱-欧洲杯赌钱比赛投注-欧洲杯赌钱比赛投注官网|【​网址​🎉ac22.net🎉​】
欧洲杯赌钱-欧洲杯赌钱比赛投注-欧洲杯赌钱比赛投注官网|【​网址​🎉ac22.net🎉​】
arcosarturo900
 
一比一原版(UoL毕业证)伦敦大学毕业证如何办理
一比一原版(UoL毕业证)伦敦大学毕业证如何办理一比一原版(UoL毕业证)伦敦大学毕业证如何办理
一比一原版(UoL毕业证)伦敦大学毕业证如何办理
qghuhwa
 
美洲杯投注冠军赔率揭晓!谁将问鼎南美之王?|【​网址​🎉ac22.net🎉​】
美洲杯投注冠军赔率揭晓!谁将问鼎南美之王?|【​网址​🎉ac22.net🎉​】美洲杯投注冠军赔率揭晓!谁将问鼎南美之王?|【​网址​🎉ac22.net🎉​】
美洲杯投注冠军赔率揭晓!谁将问鼎南美之王?|【​网址​🎉ac22.net🎉​】
callottermanha18096
 
一比一原版美国俄亥俄大学毕业证(OU学位证)如何办理
一比一原版美国俄亥俄大学毕业证(OU学位证)如何办理一比一原版美国俄亥俄大学毕业证(OU学位证)如何办理
一比一原版美国俄亥俄大学毕业证(OU学位证)如何办理
mjjbdpo2
 
MISS TEEN HYDERABAD 2024 - WINNER RYKA TANDON
MISS TEEN HYDERABAD 2024 - WINNER RYKA TANDONMISS TEEN HYDERABAD 2024 - WINNER RYKA TANDON
MISS TEEN HYDERABAD 2024 - WINNER RYKA TANDON
DK PAGEANT
 
欧洲杯下注-欧洲杯下注买球网-欧洲杯下注买球网站|【​网址​🎉ac10.net🎉​】
欧洲杯下注-欧洲杯下注买球网-欧洲杯下注买球网站|【​网址​🎉ac10.net🎉​】欧洲杯下注-欧洲杯下注买球网-欧洲杯下注买球网站|【​网址​🎉ac10.net🎉​】
欧洲杯下注-欧洲杯下注买球网-欧洲杯下注买球网站|【​网址​🎉ac10.net🎉​】
brendonbrash97589
 
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
ubopub
 
Stag Elevators | Leading Home Elevator Company in India
Stag Elevators | Leading Home Elevator Company in IndiaStag Elevators | Leading Home Elevator Company in India
Stag Elevators | Leading Home Elevator Company in India
Stag Elevators
 
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
stgq9v39
 
2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】
2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】
2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】
ramaysha335
 

Recently uploaded (13)

Navigating the World of Topsoil: A Guide to the Right Choice for Your Garden
Navigating the World of Topsoil: A Guide to the Right Choice for Your GardenNavigating the World of Topsoil: A Guide to the Right Choice for Your Garden
Navigating the World of Topsoil: A Guide to the Right Choice for Your Garden
 
MISS RAIPUR 2024 - WINNER POONAM BHARTI.
MISS RAIPUR 2024 - WINNER POONAM BHARTI.MISS RAIPUR 2024 - WINNER POONAM BHARTI.
MISS RAIPUR 2024 - WINNER POONAM BHARTI.
 
The Uttoxeter and Cheadle Voice Issue 123
The Uttoxeter and Cheadle Voice Issue 123The Uttoxeter and Cheadle Voice Issue 123
The Uttoxeter and Cheadle Voice Issue 123
 
欧洲杯赌钱-欧洲杯赌钱比赛投注-欧洲杯赌钱比赛投注官网|【​网址​🎉ac22.net🎉​】
欧洲杯赌钱-欧洲杯赌钱比赛投注-欧洲杯赌钱比赛投注官网|【​网址​🎉ac22.net🎉​】欧洲杯赌钱-欧洲杯赌钱比赛投注-欧洲杯赌钱比赛投注官网|【​网址​🎉ac22.net🎉​】
欧洲杯赌钱-欧洲杯赌钱比赛投注-欧洲杯赌钱比赛投注官网|【​网址​🎉ac22.net🎉​】
 
一比一原版(UoL毕业证)伦敦大学毕业证如何办理
一比一原版(UoL毕业证)伦敦大学毕业证如何办理一比一原版(UoL毕业证)伦敦大学毕业证如何办理
一比一原版(UoL毕业证)伦敦大学毕业证如何办理
 
美洲杯投注冠军赔率揭晓!谁将问鼎南美之王?|【​网址​🎉ac22.net🎉​】
美洲杯投注冠军赔率揭晓!谁将问鼎南美之王?|【​网址​🎉ac22.net🎉​】美洲杯投注冠军赔率揭晓!谁将问鼎南美之王?|【​网址​🎉ac22.net🎉​】
美洲杯投注冠军赔率揭晓!谁将问鼎南美之王?|【​网址​🎉ac22.net🎉​】
 
一比一原版美国俄亥俄大学毕业证(OU学位证)如何办理
一比一原版美国俄亥俄大学毕业证(OU学位证)如何办理一比一原版美国俄亥俄大学毕业证(OU学位证)如何办理
一比一原版美国俄亥俄大学毕业证(OU学位证)如何办理
 
MISS TEEN HYDERABAD 2024 - WINNER RYKA TANDON
MISS TEEN HYDERABAD 2024 - WINNER RYKA TANDONMISS TEEN HYDERABAD 2024 - WINNER RYKA TANDON
MISS TEEN HYDERABAD 2024 - WINNER RYKA TANDON
 
欧洲杯下注-欧洲杯下注买球网-欧洲杯下注买球网站|【​网址​🎉ac10.net🎉​】
欧洲杯下注-欧洲杯下注买球网-欧洲杯下注买球网站|【​网址​🎉ac10.net🎉​】欧洲杯下注-欧洲杯下注买球网-欧洲杯下注买球网站|【​网址​🎉ac10.net🎉​】
欧洲杯下注-欧洲杯下注买球网-欧洲杯下注买球网站|【​网址​🎉ac10.net🎉​】
 
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
 
Stag Elevators | Leading Home Elevator Company in India
Stag Elevators | Leading Home Elevator Company in IndiaStag Elevators | Leading Home Elevator Company in India
Stag Elevators | Leading Home Elevator Company in India
 
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
 
2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】
2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】
2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】
 

Ethical h

  • 2. Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting
  • 3.
  • 4.
  • 5. Why – Ethical Hacking Source: CERT-India January - 2005 Defacement Statistics for Indian Websites 1131 Total 13 other 2 .edu 2 .nic.in 3 .info 13 .ac.in 48 .co.in 12 .biz 39 .net 53 .org 24 .gov.in 922 .com No of Defacements Domains June 01, 2004 to Dec.31, 2004
  • 6. Why – Ethical Hacking Source: CERT/CC Total Number of Incidents Incidents
  • 7. Why – Ethical Hacking Source: US - CERT
  • 8. Why – Ethical Hacking Protection from possible External Attacks Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.

Editor's Notes

  1. Red teaming – used for the first time by US government for testing its systems early 90’s Black & white hat terminology comes from the Hollywood movies where good guys wear white hats and bad guys wear black hats
  2. Other information not available