SlideShare a Scribd company logo
CONTENT
 OVERVIEW
 HACKING
 HISTORY
 HACKING PROCESS
TECHNIQUES AND
TOOLS
 ADVANTAGES AND
DISADVANTAGES
 REFERENCE
 TYPES OF HACKER
 PRECAUTIONS
 SOME FAMOUS
HACKER
Overview
Hacker
• The person who hacks. A hacker is a person intensely
interested in the arcane and recondite workings of any
computer operating system. Hackers are most often
programmers.
 Cracker
• System intruder/ destroyer
History Of Hacking
The first hacker was appeared in 1960’s at the
Massachusetts Institute Of Technology(MIT)
During the 1970’s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker
In the 1980’s, phreaks started to migrate to
computers, and the first Bulletin Board System (BBS)
appeared
During the 1990’s, when the use of internet
widespread around the world, hackers multiplied.
Hacking
 Hacker
• Access computer system or network without
authorization
• Breaks the law
 Ethical Hacker
• Performs most of the same activities but with owner’s
permission
• Employed by companies to perform Penetration Tests
Types of hacker
BLACK HAT
WHITE HAT
GREY HAT
SCRIPT KIDDIES
 A black hat hacker is a hacker who "violates computer
security for little reason beyond maliciousness or for
personal gain.
 They Work for black money(Like:- Bank Websites ,
credit card websites)
 They use their knowledge for illegal purposes.
 White hat hackers are like Ethical Hackers .
They use their skills for good purposes.
 They work for organizations for stop the illegal
activities through black hat hackers.
 Grey Hat hackers have both qualities like
black hat hackers and white hat hackers .
 They use their knowledge for bad purposes
and good purposes too.
 Script kiddies hacks into computer or
websites using the tools available on
the internet .
 They don’t have knowledge of
programming .
Advantages
 Provides security to banking and financial
establishments
 To catch a thief you have to think like a thief.
Disadvantages
 All depends upon the trustworthiness of the
ethical hacker
 Hiring professionals is expensive.
 Encrypt important data
Ex:- pgp, ssh
 Remove unused program
 Backup the system often
 Setup firewall
 Setup IDS
Ex) snort
 Shutdown the system
Or turn off the system
 Restore the system with the backup
Or reinstall all programs
 Disconnect the system to the network
Some Famous Hacker
Ian Murphy Kevin Mitnick Johan Helsinguis
Linus Torvald Mark Abene Robert Morris
REFERENCE
 www.scribd.com
 www.wikipedia/seminartopics/ethical haching.org
 www. Seminarsonly/ethical hacking.com
Ethical hacking
Ethical hacking

More Related Content

What's hot

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
pavankumarmangena
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Samip Shah
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Devendra Yadav
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Hacking
HackingHacking
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
Laura Platt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rishabha Garg
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
Mukund Kumar Bharti
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
 
Hacking
HackingHacking
Hacking
Arpit Verma
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
Srikanth VNV
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rohit Trimukhe
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
infosavvy
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
A Raheem Ansari
 
Hacking
HackingHacking
Hacking
zubair112233
 
Ethical Hacking Tools
Ethical Hacking ToolsEthical Hacking Tools
Ethical Hacking Tools
Multisoft Virtual Academy
 

What's hot (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Hacking
HackingHacking
Hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Hacking
HackingHacking
Hacking
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking Tools
Ethical Hacking ToolsEthical Hacking Tools
Ethical Hacking Tools
 

Viewers also liked

Privert ecrit aux syndicalistes
Privert ecrit aux syndicalistesPrivert ecrit aux syndicalistes
Privert ecrit aux syndicalistes
Radio Télévision Caraibes
 
Notebook
NotebookNotebook
Notebook
Rome3624
 
Presentacion
PresentacionPresentacion
Presentacion
paquimates76
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPFarpit
 
How to format powerpoint presentation slides
How to format powerpoint presentation slidesHow to format powerpoint presentation slides
How to format powerpoint presentation slides
mikejeffs
 
Consulta: Bases de datos
Consulta: Bases de datosConsulta: Bases de datos
Consulta: Bases de datos
Diana Barco
 
History of me
History of meHistory of me
History of me
awoti
 
J.D. Skube, Occup. Haz in the Fire Service
J.D. Skube, Occup. Haz in the Fire ServiceJ.D. Skube, Occup. Haz in the Fire Service
J.D. Skube, Occup. Haz in the Fire ServiceJonathan Skube
 
Condicionales inglés
Condicionales inglésCondicionales inglés
Condicionales inglés
Nerea Ontalva
 
Cliq intro 2016
Cliq intro 2016Cliq intro 2016
Cliq intro 2016
Editor NHM
 
Evaluation - Question 4
Evaluation - Question 4Evaluation - Question 4
Evaluation - Question 4AMYDAV123
 
Professional Presentations
Professional PresentationsProfessional Presentations
Professional PresentationsMike Kelly
 
Cader draftprotocol literature review 4 abreiviated with changes
Cader draftprotocol literature review 4 abreiviated with changesCader draftprotocol literature review 4 abreiviated with changes
Cader draftprotocol literature review 4 abreiviated with changesRugshana Cader
 
Profil What I Wear
Profil What I WearProfil What I Wear
Profil What I WearC Lair
 
Connect Magazine - July/August 2015 Issue
Connect Magazine - July/August 2015 IssueConnect Magazine - July/August 2015 Issue
Connect Magazine - July/August 2015 Issue
Anna Dunn
 
How to start learning ethical hacking
How to start learning ethical hackingHow to start learning ethical hacking
How to start learning ethical hacking
Swati Sharma
 
Selection of Images - LEMO
Selection of Images - LEMOSelection of Images - LEMO
Selection of Images - LEMO
jxshbrown
 

Viewers also liked (20)

Resume-Final (1) (4)
Resume-Final (1) (4)Resume-Final (1) (4)
Resume-Final (1) (4)
 
Privert ecrit aux syndicalistes
Privert ecrit aux syndicalistesPrivert ecrit aux syndicalistes
Privert ecrit aux syndicalistes
 
Macys HSQ DG ROSA
Macys HSQ DG ROSAMacys HSQ DG ROSA
Macys HSQ DG ROSA
 
Notebook
NotebookNotebook
Notebook
 
Presentacion
PresentacionPresentacion
Presentacion
 
Dtl mwc david del val v7
Dtl mwc david del val v7Dtl mwc david del val v7
Dtl mwc david del val v7
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
How to format powerpoint presentation slides
How to format powerpoint presentation slidesHow to format powerpoint presentation slides
How to format powerpoint presentation slides
 
Consulta: Bases de datos
Consulta: Bases de datosConsulta: Bases de datos
Consulta: Bases de datos
 
History of me
History of meHistory of me
History of me
 
J.D. Skube, Occup. Haz in the Fire Service
J.D. Skube, Occup. Haz in the Fire ServiceJ.D. Skube, Occup. Haz in the Fire Service
J.D. Skube, Occup. Haz in the Fire Service
 
Condicionales inglés
Condicionales inglésCondicionales inglés
Condicionales inglés
 
Cliq intro 2016
Cliq intro 2016Cliq intro 2016
Cliq intro 2016
 
Evaluation - Question 4
Evaluation - Question 4Evaluation - Question 4
Evaluation - Question 4
 
Professional Presentations
Professional PresentationsProfessional Presentations
Professional Presentations
 
Cader draftprotocol literature review 4 abreiviated with changes
Cader draftprotocol literature review 4 abreiviated with changesCader draftprotocol literature review 4 abreiviated with changes
Cader draftprotocol literature review 4 abreiviated with changes
 
Profil What I Wear
Profil What I WearProfil What I Wear
Profil What I Wear
 
Connect Magazine - July/August 2015 Issue
Connect Magazine - July/August 2015 IssueConnect Magazine - July/August 2015 Issue
Connect Magazine - July/August 2015 Issue
 
How to start learning ethical hacking
How to start learning ethical hackingHow to start learning ethical hacking
How to start learning ethical hacking
 
Selection of Images - LEMO
Selection of Images - LEMOSelection of Images - LEMO
Selection of Images - LEMO
 

Similar to Ethical hacking

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rishab garg
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Hacking
HackingHacking
Hacking
HackingHacking
Hacking
Yhannah
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aryan Saxena
 
hacking
hackinghacking
hacking
mayank1293
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
Hacking
HackingHacking
Hacking
mubeenm50
 
Hacking
HackingHacking
Hacking
HackingHacking
Hacking
Paidi Dinesh
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
Akashy Kale
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
N.vinodh
N.vinodhN.vinodh
N.vinodh
vinodhkn
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
Hacking
HackingHacking
Hacking
NishaPariyar
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
arohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 

Similar to Ethical hacking (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
N.vinodh
N.vinodhN.vinodh
N.vinodh
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 

Recently uploaded (20)

一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 

Ethical hacking

  • 1.
  • 2. CONTENT  OVERVIEW  HACKING  HISTORY  HACKING PROCESS TECHNIQUES AND TOOLS  ADVANTAGES AND DISADVANTAGES  REFERENCE  TYPES OF HACKER  PRECAUTIONS  SOME FAMOUS HACKER
  • 3. Overview Hacker • The person who hacks. A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers.  Cracker • System intruder/ destroyer
  • 4. History Of Hacking The first hacker was appeared in 1960’s at the Massachusetts Institute Of Technology(MIT) During the 1970’s, a different kind of hacker appeared: Phone Phreaker or Phone Hacker
  • 5. In the 1980’s, phreaks started to migrate to computers, and the first Bulletin Board System (BBS) appeared During the 1990’s, when the use of internet widespread around the world, hackers multiplied.
  • 6. Hacking  Hacker • Access computer system or network without authorization • Breaks the law  Ethical Hacker • Performs most of the same activities but with owner’s permission • Employed by companies to perform Penetration Tests
  • 7. Types of hacker BLACK HAT WHITE HAT GREY HAT SCRIPT KIDDIES
  • 8.
  • 9.  A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain.  They Work for black money(Like:- Bank Websites , credit card websites)  They use their knowledge for illegal purposes.
  • 10.
  • 11.  White hat hackers are like Ethical Hackers . They use their skills for good purposes.  They work for organizations for stop the illegal activities through black hat hackers.
  • 12.
  • 13.  Grey Hat hackers have both qualities like black hat hackers and white hat hackers .  They use their knowledge for bad purposes and good purposes too.
  • 14.
  • 15.  Script kiddies hacks into computer or websites using the tools available on the internet .  They don’t have knowledge of programming .
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Advantages  Provides security to banking and financial establishments  To catch a thief you have to think like a thief. Disadvantages  All depends upon the trustworthiness of the ethical hacker  Hiring professionals is expensive.
  • 22.  Encrypt important data Ex:- pgp, ssh  Remove unused program  Backup the system often  Setup firewall  Setup IDS Ex) snort
  • 23.  Shutdown the system Or turn off the system  Restore the system with the backup Or reinstall all programs  Disconnect the system to the network
  • 24. Some Famous Hacker Ian Murphy Kevin Mitnick Johan Helsinguis Linus Torvald Mark Abene Robert Morris
  • 25. REFERENCE  www.scribd.com  www.wikipedia/seminartopics/ethical haching.org  www. Seminarsonly/ethical hacking.com