SlideShare a Scribd company logo
Ethical Hacking
Gaurav Yadav
Indian Institute of Information Technology Sonepat
Gaurav Yadav IIITS
Contents
Gaurav Yadav IIITS
• Introduction to Hacking
• The Evolution of Hacking
• Types of Hackers
• Understanding Ethical Hacking
• Law and Ethics
• Why Ethical Hacking?
• Types of Ethical Hacking
• Industry Perspective of Ethical Hacking
• Certifications for Ethical Hacking
Introduction to Hacking
Gaurav Yadav IIITS
• Hacking is the act of identifying security vulnerabilities in networks, computer
systems or electronic gadgets and exploiting them. For example – gaining
unauthorized access to someone’s Wi-Fi.
• Hacking requires creative thinking, persistent learning, and a lot of patience.
The Evolution of Hacking
Gaurav Yadav IIITS
• The birth of hacking took place at MIT in 1969.
• Earlier hacking was done just to improve performance by manipulating
software and hardware.
• In 1971 John Draper hacked a phone system.
• In 1983 Fred Cohen developed a virus.
• And further, more malwares were created and more hacking activities took
place.
Types of Hackers
Gaurav Yadav IIITS
• Black Hat Hackers (Crackers): They gain unauthorized system access. Data Theft,
Ransom, Defamation are their major reasons.
• Grey Hat Hackers: They often gain unauthorized system access, and report the
vulnerabilities to the owners, for a little fee. But if the owner doesn’t comply, they
make the vulnerabilities public.
• White Hat Hackers (Ethical Hackers): They gain authorized system access when the
owner allows them. They intend to secure computer networks or systems.
Understanding Ethical Hacking
Gaurav Yadav IIITS
Cybersecurity
Ethical
Hacking
• Ethical hacking is an essential part of
Cybersecurity.
• Ethical hacking is the act of finding security
loopholes in computer systems, networks, or
other electronic gadgets such as IoT Devices, by
the permission of the owner.
Law and Ethics
Gaurav Yadav IIITS
• All Ethical hackers are aware of laws and they know how the laws will impact their
work.
• Trust is the most import thing between an ethical hacker and the client.
• Going beyond the test limits can make clients to take legal action against ethical
hackers.
Why Ethical Hacking?
Gaurav Yadav IIITS
• To know weaknesses of the security architecture.
• For better preparation against cyberattacks.
• For better reaction to an ongoing cyberattack.
• For an understanding of the hacker’s point of view.
• For ensuring safety and privacy standards.
• In the ever-growing $150 billion* cybersecurity industry, ethical hacking is an
in-demand and rapidly growing career option.
*https://www.mordorintelligence.com/industry-reports/cyber-security-market
Types of Ethical Hacking
Gaurav Yadav IIITS
1. System Hacking : It involves gaining access into computers on a network by means of malware,
etc. For example – Privilege escalation in an operating system.
2. Wireless Network Hacking : It involves gaining access into private unsecured networks. For
Example – Hacking an unsecured Wi-Fi.
3. Web Application Hacking : It involves hacking into websites. It involves attacks like XSS, RCE,
IDORs, CSRF, Path Traversal, etc.
4. Web Server Hacking : It involves hacking into dedicated web servers of websites and altering
the content. For example - SQLi attacks.
5. Social Engineering : It involves the usage of social skills to lure people to provide sensitive
information. For example – Phone Phishing.
Industry Perspective of Ethical Hacking
Gaurav Yadav IIITS
• Companies either hire employ teams or launch public/private
VDPs(Vulnerability Disclosure Programs) to maintain security standards.
Platforms like Hackerone, Bugcrowd, Intigriti offer bug bounties on
behalf of several tech companies for a valid bug report.
• Ethical hacking reduces losses extensively.
Certifications for Ethical Hacking
Gaurav Yadav IIITS
• Cybersecurity giants like Cisco, Palo Alto Networks, etc. approve people based on
practical exams, and certify them accordingly.
• Certifications represent practical learning and an individual’s skillset.
• Certifications help in career upliftment.
• Some of the most popular certifications are OSCP, CompTIA Security+, CISSP,
CEH, etc.
References
Gaurav Yadav IIITS
1. https://www.eccouncil.org/ethical-hacking/
2. https://us.norton.com/internetsecurity-emerging-threats.html
3. https://www.kaspersky.co.in/enterprise-security/threat-management-defense-solution
4. https://www.guru99.com/ethical-hacking-tutorials.html
5. https://www.mordorintelligence.com/industry-reports/cyber-security-market
Gaurav Yadav IIITS
“Is hacking ever acceptable? It depends on the motive”
~ Charlie Brooker

More Related Content

What's hot

Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rajan Chhangani
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
Online
 
hacking
hackinghacking
hacking
mayank1293
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
Nitish Kasar
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speechtalhaabid
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
ankit sarode
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
shinigami-99
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
Raghav Bisht
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Kunal Gawade, CFE
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
Vanipriya Sakthivel
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 

What's hot (20)

Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Similar to Ethical hacking

Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
ambemPrashanthi
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
Cyber security
Cyber securityCyber security
Cyber security
TanmoyMaitra
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
uzair
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
johnnymaaza
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
ankit gandharkar
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2
Ishaq Shinwari
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
Introduction of ethical hacking.........
Introduction of ethical hacking.........Introduction of ethical hacking.........
Introduction of ethical hacking.........
AalyanAbid
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
chakrekevin
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Infosectrain3
 
Etical hacking
Etical hackingEtical hacking
Etical hackingtalhaabid
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
ritik shukla
 
Hacking
HackingHacking
Hacking
ritik shukla
 
Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi
SamridhiJain48
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Mohammad Affan
 

Similar to Ethical hacking (20)

Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Hacking
HackingHacking
Hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Introduction of ethical hacking.........
Introduction of ethical hacking.........Introduction of ethical hacking.........
Introduction of ethical hacking.........
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
 
Hacking
HackingHacking
Hacking
 
Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
 

Recently uploaded

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 

Recently uploaded (20)

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 

Ethical hacking

  • 1. Ethical Hacking Gaurav Yadav Indian Institute of Information Technology Sonepat Gaurav Yadav IIITS
  • 2. Contents Gaurav Yadav IIITS • Introduction to Hacking • The Evolution of Hacking • Types of Hackers • Understanding Ethical Hacking • Law and Ethics • Why Ethical Hacking? • Types of Ethical Hacking • Industry Perspective of Ethical Hacking • Certifications for Ethical Hacking
  • 3. Introduction to Hacking Gaurav Yadav IIITS • Hacking is the act of identifying security vulnerabilities in networks, computer systems or electronic gadgets and exploiting them. For example – gaining unauthorized access to someone’s Wi-Fi. • Hacking requires creative thinking, persistent learning, and a lot of patience.
  • 4. The Evolution of Hacking Gaurav Yadav IIITS • The birth of hacking took place at MIT in 1969. • Earlier hacking was done just to improve performance by manipulating software and hardware. • In 1971 John Draper hacked a phone system. • In 1983 Fred Cohen developed a virus. • And further, more malwares were created and more hacking activities took place.
  • 5. Types of Hackers Gaurav Yadav IIITS • Black Hat Hackers (Crackers): They gain unauthorized system access. Data Theft, Ransom, Defamation are their major reasons. • Grey Hat Hackers: They often gain unauthorized system access, and report the vulnerabilities to the owners, for a little fee. But if the owner doesn’t comply, they make the vulnerabilities public. • White Hat Hackers (Ethical Hackers): They gain authorized system access when the owner allows them. They intend to secure computer networks or systems.
  • 6. Understanding Ethical Hacking Gaurav Yadav IIITS Cybersecurity Ethical Hacking • Ethical hacking is an essential part of Cybersecurity. • Ethical hacking is the act of finding security loopholes in computer systems, networks, or other electronic gadgets such as IoT Devices, by the permission of the owner.
  • 7. Law and Ethics Gaurav Yadav IIITS • All Ethical hackers are aware of laws and they know how the laws will impact their work. • Trust is the most import thing between an ethical hacker and the client. • Going beyond the test limits can make clients to take legal action against ethical hackers.
  • 8. Why Ethical Hacking? Gaurav Yadav IIITS • To know weaknesses of the security architecture. • For better preparation against cyberattacks. • For better reaction to an ongoing cyberattack. • For an understanding of the hacker’s point of view. • For ensuring safety and privacy standards. • In the ever-growing $150 billion* cybersecurity industry, ethical hacking is an in-demand and rapidly growing career option. *https://www.mordorintelligence.com/industry-reports/cyber-security-market
  • 9. Types of Ethical Hacking Gaurav Yadav IIITS 1. System Hacking : It involves gaining access into computers on a network by means of malware, etc. For example – Privilege escalation in an operating system. 2. Wireless Network Hacking : It involves gaining access into private unsecured networks. For Example – Hacking an unsecured Wi-Fi. 3. Web Application Hacking : It involves hacking into websites. It involves attacks like XSS, RCE, IDORs, CSRF, Path Traversal, etc. 4. Web Server Hacking : It involves hacking into dedicated web servers of websites and altering the content. For example - SQLi attacks. 5. Social Engineering : It involves the usage of social skills to lure people to provide sensitive information. For example – Phone Phishing.
  • 10. Industry Perspective of Ethical Hacking Gaurav Yadav IIITS • Companies either hire employ teams or launch public/private VDPs(Vulnerability Disclosure Programs) to maintain security standards. Platforms like Hackerone, Bugcrowd, Intigriti offer bug bounties on behalf of several tech companies for a valid bug report. • Ethical hacking reduces losses extensively.
  • 11. Certifications for Ethical Hacking Gaurav Yadav IIITS • Cybersecurity giants like Cisco, Palo Alto Networks, etc. approve people based on practical exams, and certify them accordingly. • Certifications represent practical learning and an individual’s skillset. • Certifications help in career upliftment. • Some of the most popular certifications are OSCP, CompTIA Security+, CISSP, CEH, etc.
  • 12. References Gaurav Yadav IIITS 1. https://www.eccouncil.org/ethical-hacking/ 2. https://us.norton.com/internetsecurity-emerging-threats.html 3. https://www.kaspersky.co.in/enterprise-security/threat-management-defense-solution 4. https://www.guru99.com/ethical-hacking-tutorials.html 5. https://www.mordorintelligence.com/industry-reports/cyber-security-market
  • 13. Gaurav Yadav IIITS “Is hacking ever acceptable? It depends on the motive” ~ Charlie Brooker