welcome
Ethical hacking
What is hacking?
History of hacking?
Types of hackers.
Hacking methods.
Process of Ethical hacking.
The pros of ethical hacking.
The cons of ethical hacking.
What is hacking?
 It is unconventional way of using
 a system beyond the original
  intentions of the manufacturer.

Hacking is not limited to computers.
What is ethical hacking?
It is the use of programming skills
 to determine vulnerabilities in
 computer systems.

It is also known as the intrusion testing,
 penetration testing or red teaming.
History of hacking.
the first hackers appeared in the 1960's
  at the Massachusetts Institute of
  Technology (MIT).

During the 1970's, a different kind
 of hacker appeared: the perhaps or
 phone hackers.
History of hacking.
In the 1980's, phreaks started to migrate
 to computers, and the first Bulletin Board
 Systems(BBS) appeared.

During the 1990's, when the use of the
 internet widespread around the world,
 hackers multiplied.
Types of hackers
White Hat hackers also referred as
 Ethical hacker.

Black Hat hackers also referred as
 cracker.

Grey Hat hackers also referred as
 Skilled Hacker.
Hacking Methods
Phishing Method.
Brute Force Hack.
Fake Login Hack.
Cookie Steal Hack.
Web Mail Hack
Process of Ethical hacking.
Preparation.
Foot printing.
Enumeration and fingerprinting.
Identification of vulnerabilities.
Attack-exploit the vulnerabilities.
The pros of ethical hacking .
It enables you to find out the problem.

Helps you build up a risk management
 program.

Helps you to think like the enemy
The cons of ethical hacking.
It provides only a snapshot of what is
 happening.

Losing data.

Being given a false sense of security.
End.
Testing is an essential part of any data
 security program.
An ethical hack can reduce the potential
 exposure of the company to criminal
 hackers.
 “It takes a Thief to Catch a Thief”.
The periodic ethical hacking and review
 exercise would enhance the security and
 mitigate possible loopholes being exploited.
Quries??
visit me at memywld.blogspot.com



THANK YOU.
HAVE A NICE DAY.

ethical hacking

  • 1.
  • 2.
  • 3.
    What is hacking? Historyof hacking? Types of hackers. Hacking methods. Process of Ethical hacking. The pros of ethical hacking. The cons of ethical hacking.
  • 4.
    What is hacking? It is unconventional way of using a system beyond the original intentions of the manufacturer. Hacking is not limited to computers.
  • 5.
    What is ethicalhacking? It is the use of programming skills to determine vulnerabilities in computer systems. It is also known as the intrusion testing, penetration testing or red teaming.
  • 6.
    History of hacking. thefirst hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT). During the 1970's, a different kind of hacker appeared: the perhaps or phone hackers.
  • 7.
    History of hacking. Inthe 1980's, phreaks started to migrate to computers, and the first Bulletin Board Systems(BBS) appeared. During the 1990's, when the use of the internet widespread around the world, hackers multiplied.
  • 8.
    Types of hackers WhiteHat hackers also referred as Ethical hacker. Black Hat hackers also referred as cracker. Grey Hat hackers also referred as Skilled Hacker.
  • 9.
    Hacking Methods Phishing Method. BruteForce Hack. Fake Login Hack. Cookie Steal Hack. Web Mail Hack
  • 10.
    Process of Ethicalhacking. Preparation. Foot printing. Enumeration and fingerprinting. Identification of vulnerabilities. Attack-exploit the vulnerabilities.
  • 11.
    The pros ofethical hacking . It enables you to find out the problem. Helps you build up a risk management program. Helps you to think like the enemy
  • 12.
    The cons ofethical hacking. It provides only a snapshot of what is happening. Losing data. Being given a false sense of security.
  • 13.
    End. Testing is anessential part of any data security program. An ethical hack can reduce the potential exposure of the company to criminal hackers.  “It takes a Thief to Catch a Thief”. The periodic ethical hacking and review exercise would enhance the security and mitigate possible loopholes being exploited.
  • 14.
  • 15.
    visit me atmemywld.blogspot.com THANK YOU. HAVE A NICE DAY.