SlideShare a Scribd company logo
Ethical hacking
What is the meaning of ethical ?
• being in accordance with the rules or standards for right
conduct or practice, especially the standards of a profession :
It was not considered ethical for physicians to advertise.
What is hacking?
• gain unauthorized access to data in a system or computer.
• During the 1990s, the term "hacker" originally denoted a skilled
programmer proficient in machine code and computer operating systems.
In particular, these individuals could always hack on an unsatisfactory
system to solve problems and engage in a little software company
espionage by interpreting a competitor's code.
• Unfortunately, some of these hackers also became experts at accessing
password-protected computers, files, and networks and came to known as
"crackers." Of course, an effective and dangerous "cracker" must be a good
hacker and the terms became intertwined. Hacker won out in popular use
and in the media and today refers to anyone who performs some form of
computer sabotage.
The History Of Hacking
• It all began in the 1960s at MIT, origin of the term “hacker”, where extremely skilled individuals practiced hardcore
programming in FORTRAN and other older languages. Some may ignorantly dub them “nerds” or “geeks” but these
individuals were, by far, the most intelligent, individual, and intellectually advanced people who happen to be the
pioneers and forefathers of the talented individuals that are today the true hackers. The true hackers amongst our
societies have an unquenchable thirst for knowledge. Boredom is never an object of challenge for hackers. They
have an almost anomalous ability to absorb, retain, and exert vast amounts of knowledge with regard to intricate
details. In 1969, Bell Labs employee Ken Thompson invented UNIX and permanently changed the future of the
computer industry. Then in the very early 1970s, Dennis Ritchie invented the computer programming language “C”
which was specifically invented to be used with UNIX. Programmers ceased to use assembler, while developing an
appreciation for the portability of “C.”
• Hackers used to be viewed as people who sat locked in a room all day programming nonstop, hours on end. No
one seemed to mind hackers back in the 1960s when this was the most widely excepted reputation. In fact, most
people had no idea what hacking was. The term hacker was accepted as a positive label slapped onto computer
gurus who could push computer systems beyond the defined limits. Hackers emerged out of the artificial
intelligence labs at MIT in the 1960s. A network known as ARPANET was founded by the Department of Defense
as a means to link government offices. In time, ARPANET evolved into what is today known as the Internet.
Types of hackers :-
Black hat hackers:-
• Black-hat hackers, or simply “black hats,” are the type of hacker
the popular media seems to focus on. Black-hat hackers violate
computer security for personal gain (such as stealing credit card
numbers or harvesting personal data for sale to identity thieves)
or for pure maliciousness (such as creating a botnet and using
that botnet to perform DDOS attacks against websites they don’t
like.)
• Black hats fit the widely-held stereotype that hackers are
criminals performing illegal activities for personal gain and
attacking others. They’re the computer criminals.
• A black-hat hacker who finds a new, “zero-day” security
vulnerability would sell it to criminal organizations on the black
market or use it to compromise computer systems.
• Media portrayals of black-hat hackers may be accompanied by
silly stock photos like the below one, which is intended as a
parody.
White hat hackers :-
• White-hat hackers are the opposite of the black-hat hackers. They’re the
“ethical hackers,” experts in compromising computer security systems
who use their abilities for good, ethical, and legal purposes rather than
bad, unethical, and criminal purposes.
• For example, many white-hat hackers are employed to test an
organizations’ computer security systems. The organization authorizes the
white-hat hacker to attempt to compromise their systems. The white-hat
hacker uses their knowledge of computer security systems to compromise
the organization’s systems, just as a black hat hacker would. However,
instead of using their access to steal from the organization or vandalize its
systems, the white-hat hacker reports back to the organization and
informs them of how they gained access, allowing the organization to
improve their defenses. This is known as “penetration testing,” and it’s
one example of an activity performed by white-hat hackers.
• A white-hat hacker who finds a security vulnerability would disclose it to
the developer, allowing them to patch their product and improve its
security before it’s compromised. Various organizations pay “bounties” or
award prizes for revealing such discovered vulnerabilities, compensating
white-hats for their work.
Grey hat hackers :-
• Very few things in life are clear black-and-white categories. In reality,
there’s often a gray area. A gray-hat hacker falls somewhere between a
black hat and a white hat. A gray hat doesn’t work for their own personal
gain or to cause carnage, but they may technically commit crimes and do
arguably unethical things.
• For example, a black hat hacker would compromise a computer system
without permission, stealing the data inside for their own personal gain or
vandalizing the system. A white-hat hacker would ask for permission
before testing the system’s security and alert the organization after
compromising it. A gray-hat hacker might attempt to compromise a
computer system without permission, informing the organization after the
fact and allowing them to fix the problem. While the gray-hat hacker
didn’t use their access for bad purposes, they compromised a security
system without permission, which is illegal.
• If a gray-hat hacker discovers a security flaw in a piece of software or on a
website, they may disclose the flaw publically instead of privately
disclosing the flaw to the organization and giving them time to fix it. They
wouldn’t take advantage of the flaw for their own personal gain — that
would be black-hat behavior — but the public disclosure could cause
carnage as black-hat hackers tried to take advantage of the flaw before it
was fixed.
Some other types of hackers:-
• Elite hacker
 A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers.
Elite groups such as Masters of Deceptionconferred a kind of credibility on their members.
• Script kiddie
 A script kiddie (also known as a skid or skiddie) is an unskilled hacker who breaks into computer systems by using automated tools written
by others (usually by other black hat hackers), hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an
individual lacking knowledge and experience, immature),usually with little understanding of the underlying concept.
• Neophyte
 A neophyte ("newbie", or "noob") is someone who is new to hacking or phreaking and has almost no knowledge or experience of the
workings of technology and hacking.
• Blue hat
 A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for
exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
• Hacktivist
 A hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or political message.
 Hacktivism can be divided into two main groups:
 Cyberterrorism — Activities involving website defacement or denial-of-service attacks; and,
 Freedom of information — Making information that is not public, or is public in non-machine-readable formats, accessible to the public.
Types of Data stolen from the organization:-
Effects of hacking :-
What does a hacker do?
Phase 1: Reconnaissance
Reconnaissance types
Phase 2: Scanning
Phase 3 :- Gaining Acess
Phase 4:- Maintaining Acess
Phase 5 :- Covering Tracks
Some Types of hacking:-
 Injection attack :- Injection Attacking occurs when there are flaws in your
SQL Database, SQL libraries, or even the operating system itself. Employees open
seemingly credible files with hidden commands, or “injections”, unknowingly.
In doing so, they’ve allowed hackers to gain unauthorized access to private data
such as social security numbers, credit card number or other financial data.
 Cross site scripting attack :-Cross Site Scripting, also known as an XSS
attack, occurs when an application, url “get request”, or file packet is sent to the
web browser window and bypassing the validation process. Once an XSS script is
triggered, it’s deceptive property makes users believe that the compromised page
of a specific website is legitimate.
For example, if www.example.com/abcd.html has XSS script in it, the user might
see a popup window asking for their credit card info and other sensitive info
 click jacking attack :- Click jacking, also called a UI Redress Attack, is when a
hacker uses multiple opaque layers to trick a user into clicking the top layer without them
knowing.
Thus the attacker is “hijacking” clicks that are not meant for the actual page, but for a page
where the attacker wants you to be.
For example, using a carefully crafted combination of style sheets, iframes, and text boxes, a user
can be led to believe they are typing in the password for their bank account, but are actually
typing into an invisible frame controlled by the attacker.
 social engineering attacks :- A social engineering attack is not technically
a “hack”.
It happens when you divulge private information in good faith, such as a credit card
number, through common online interactions such as email, chat, social media sites, or
virtually any website.
The problem, of course, is that you’re not getting into what you think you’re getting into.
A classic example of a social engineering attack is the “Microsoft tech support” scam.
This is when someone from a call center pretends to be a MS tech support member who
says that your computer is slow and/or infected, and can be easily fixed – at a cost, of
course.
Phishing attack :- Phishing is the attempt to acquire sensitive information such as
usernames, passwords, and credit card details (and sometimes, indirectly, money), often for
malicious reasons, by masquerading as a trustworthy entity in an electronic
communication. The word is a neologism created as a homophone of fishing due to the
similarity of using a bait in an attempt to catch a victim. Communications purporting to be from
popular social web sites, auction sites, banks, online payment processors or IT administrators
are commonly used to lure unsuspecting victims. Phishing emails may contain links to websites
that are infected with malware. Phishing is typically carried out by email spoofing or instant
messaging, and it often directs users to enter details at a fake website whose look and feel are
almost identical to the legitimate one. Phishing is an example of social engineering techniques
used to deceive users, and exploits the poor usability of current web security
technologies. Attempts to deal with the growing number of reported phishing incidents
include legislation, user training, public awareness, and technical security measures. Many
websites have now created secondary tools for applications, like maps for games, but they
should be clearly marked as to who wrote them, and users should not use the same passwords
anywhere on the internet.
The great knowledge of memory is not ignorance,it is
the illusion of knowledge……
Thank you

More Related Content

What's hot

Hackers
HackersHackers
Hackers
Mahmoud Saeed
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
ICCT foundation inc
 
Social engineering
Social engineeringSocial engineering
Social engineering
Robert Hood
 
Social engineering
Social engineeringSocial engineering
Social engineering
Vishal Kumar
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
Marin Ivezic
 
Social engineering
Social engineering Social engineering
Social engineering
Abdelhamid Limami
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
JamRivera1
 
Cybercrimes and Cybercriminals
Cybercrimes and CybercriminalsCybercrimes and Cybercriminals
Cybercrimes and Cybercriminals
Ashikur Rahman
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
James Krusic
 
Social engineering
Social engineeringSocial engineering
Social engineering
Alexander Zhuravlev
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
Nicholas Davis
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
Luke Rusten
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
Hovhannes Aghajanyan
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Cyber Agency
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
Aleksandr Yampolskiy
 
Social engineering
Social engineeringSocial engineering
Social engineering
Maulik Kotak
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
OWASP Foundation
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Neelu Tripathy
 

What's hot (19)

Hackers
HackersHackers
Hackers
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Cybercrimes and Cybercriminals
Cybercrimes and CybercriminalsCybercrimes and Cybercriminals
Cybercrimes and Cybercriminals
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 

Viewers also liked

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
vishakha bhagwat
 
Arjun it
Arjun  itArjun  it
Arjun it
Thakur Prasad
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Vivek Mohbe
 
la inspiracion de arguedas
la inspiracion de arguedasla inspiracion de arguedas
la inspiracion de arguedas
984935840
 
Texto ejemplos método kynesia
Texto ejemplos método kynesiaTexto ejemplos método kynesia
Texto ejemplos método kynesia
Víctor Guerrero Barbero
 
DFG_magasin_2011
DFG_magasin_2011DFG_magasin_2011
DFG_magasin_2011Birgitte Kj
 
Introducción a la Arquitectura de Información - Taller UX La Plata 2016
Introducción a la Arquitectura de Información - Taller UX La Plata 2016Introducción a la Arquitectura de Información - Taller UX La Plata 2016
Introducción a la Arquitectura de Información - Taller UX La Plata 2016
Nicolás Jaureguiberry
 
La lucha de josé maría arguedas
La lucha de josé maría arguedasLa lucha de josé maría arguedas
La lucha de josé maría arguedas
12tutu
 
el dolor imperdonable de mi infancia
el dolor imperdonable de mi infanciael dolor imperdonable de mi infancia
el dolor imperdonable de mi infancia
esmeraldapalomino
 
Hampesh_Resume
Hampesh_ResumeHampesh_Resume
Hampesh_Resume
Hampesh G
 
Ppt
PptPpt
V4 telecom
V4 telecomV4 telecom
Un rio profundo, entre dos mundos
Un rio profundo, entre dos mundosUn rio profundo, entre dos mundos
Un rio profundo, entre dos mundos
LuceroLezarmeMachuca
 
Cod saschiz
Cod saschizCod saschiz
Cod saschiz
Mihai Cazan
 
Sample PPT on Strategic Marketing
Sample PPT on Strategic MarketingSample PPT on Strategic Marketing
Sample PPT on Strategic Marketing
InstantAssignmentHelpAustralia
 
Windows Server 2012 R2 Software-Defined Storage
Windows Server 2012 R2 Software-Defined StorageWindows Server 2012 R2 Software-Defined Storage
Windows Server 2012 R2 Software-Defined Storage
Aidan Finn
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
Sunny Sundeep
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
aashish2cool4u
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Kunal Gawade, CFE
 

Viewers also liked (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Arjun it
Arjun  itArjun  it
Arjun it
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
la inspiracion de arguedas
la inspiracion de arguedasla inspiracion de arguedas
la inspiracion de arguedas
 
Texto ejemplos método kynesia
Texto ejemplos método kynesiaTexto ejemplos método kynesia
Texto ejemplos método kynesia
 
DFG_magasin_2011
DFG_magasin_2011DFG_magasin_2011
DFG_magasin_2011
 
Introducción a la Arquitectura de Información - Taller UX La Plata 2016
Introducción a la Arquitectura de Información - Taller UX La Plata 2016Introducción a la Arquitectura de Información - Taller UX La Plata 2016
Introducción a la Arquitectura de Información - Taller UX La Plata 2016
 
La lucha de josé maría arguedas
La lucha de josé maría arguedasLa lucha de josé maría arguedas
La lucha de josé maría arguedas
 
el dolor imperdonable de mi infancia
el dolor imperdonable de mi infanciael dolor imperdonable de mi infancia
el dolor imperdonable de mi infancia
 
Hampesh_Resume
Hampesh_ResumeHampesh_Resume
Hampesh_Resume
 
guldgrube_musko
guldgrube_muskoguldgrube_musko
guldgrube_musko
 
Ppt
PptPpt
Ppt
 
V4 telecom
V4 telecomV4 telecom
V4 telecom
 
Un rio profundo, entre dos mundos
Un rio profundo, entre dos mundosUn rio profundo, entre dos mundos
Un rio profundo, entre dos mundos
 
Cod saschiz
Cod saschizCod saschiz
Cod saschiz
 
Sample PPT on Strategic Marketing
Sample PPT on Strategic MarketingSample PPT on Strategic Marketing
Sample PPT on Strategic Marketing
 
Windows Server 2012 R2 Software-Defined Storage
Windows Server 2012 R2 Software-Defined StorageWindows Server 2012 R2 Software-Defined Storage
Windows Server 2012 R2 Software-Defined Storage
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Similar to Ethical hacking

Hacking
HackingHacking
Hacking
pranav patade
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
Alex Havaianas
 
hacking basics
hacking basicshacking basics
hacking basics
dharmesh ram
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
dharmesh ram
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
penetration Tester
 
Intro
IntroIntro
Intro
Kalkey
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
giridhar_sadasivuni
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
Solomon Oho
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
Gaurav Singh
 
Hackers final
Hackers finalHackers final
Hackers final
Mirna Hanna
 
Hackers final
Hackers finalHackers final
Hackers final
Mirna Hanna
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
Elipeta Sotabento
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
mubeenm50
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Sourabh Goyal
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
shericehewat
 
Hackers
HackersHackers
Hackers
Kifah Marwan
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 

Similar to Ethical hacking (20)

Hacking
HackingHacking
Hacking
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
hacking basics
hacking basicshacking basics
hacking basics
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking
HackingHacking
Hacking
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
Hackers final
Hackers finalHackers final
Hackers final
 
Hackers final
Hackers finalHackers final
Hackers final
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
 
Hackers
HackersHackers
Hackers
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 

Ethical hacking

  • 2. What is the meaning of ethical ? • being in accordance with the rules or standards for right conduct or practice, especially the standards of a profession : It was not considered ethical for physicians to advertise.
  • 3. What is hacking? • gain unauthorized access to data in a system or computer. • During the 1990s, the term "hacker" originally denoted a skilled programmer proficient in machine code and computer operating systems. In particular, these individuals could always hack on an unsatisfactory system to solve problems and engage in a little software company espionage by interpreting a competitor's code. • Unfortunately, some of these hackers also became experts at accessing password-protected computers, files, and networks and came to known as "crackers." Of course, an effective and dangerous "cracker" must be a good hacker and the terms became intertwined. Hacker won out in popular use and in the media and today refers to anyone who performs some form of computer sabotage.
  • 4. The History Of Hacking • It all began in the 1960s at MIT, origin of the term “hacker”, where extremely skilled individuals practiced hardcore programming in FORTRAN and other older languages. Some may ignorantly dub them “nerds” or “geeks” but these individuals were, by far, the most intelligent, individual, and intellectually advanced people who happen to be the pioneers and forefathers of the talented individuals that are today the true hackers. The true hackers amongst our societies have an unquenchable thirst for knowledge. Boredom is never an object of challenge for hackers. They have an almost anomalous ability to absorb, retain, and exert vast amounts of knowledge with regard to intricate details. In 1969, Bell Labs employee Ken Thompson invented UNIX and permanently changed the future of the computer industry. Then in the very early 1970s, Dennis Ritchie invented the computer programming language “C” which was specifically invented to be used with UNIX. Programmers ceased to use assembler, while developing an appreciation for the portability of “C.” • Hackers used to be viewed as people who sat locked in a room all day programming nonstop, hours on end. No one seemed to mind hackers back in the 1960s when this was the most widely excepted reputation. In fact, most people had no idea what hacking was. The term hacker was accepted as a positive label slapped onto computer gurus who could push computer systems beyond the defined limits. Hackers emerged out of the artificial intelligence labs at MIT in the 1960s. A network known as ARPANET was founded by the Department of Defense as a means to link government offices. In time, ARPANET evolved into what is today known as the Internet.
  • 5. Types of hackers :- Black hat hackers:- • Black-hat hackers, or simply “black hats,” are the type of hacker the popular media seems to focus on. Black-hat hackers violate computer security for personal gain (such as stealing credit card numbers or harvesting personal data for sale to identity thieves) or for pure maliciousness (such as creating a botnet and using that botnet to perform DDOS attacks against websites they don’t like.) • Black hats fit the widely-held stereotype that hackers are criminals performing illegal activities for personal gain and attacking others. They’re the computer criminals. • A black-hat hacker who finds a new, “zero-day” security vulnerability would sell it to criminal organizations on the black market or use it to compromise computer systems. • Media portrayals of black-hat hackers may be accompanied by silly stock photos like the below one, which is intended as a parody.
  • 6. White hat hackers :- • White-hat hackers are the opposite of the black-hat hackers. They’re the “ethical hackers,” experts in compromising computer security systems who use their abilities for good, ethical, and legal purposes rather than bad, unethical, and criminal purposes. • For example, many white-hat hackers are employed to test an organizations’ computer security systems. The organization authorizes the white-hat hacker to attempt to compromise their systems. The white-hat hacker uses their knowledge of computer security systems to compromise the organization’s systems, just as a black hat hacker would. However, instead of using their access to steal from the organization or vandalize its systems, the white-hat hacker reports back to the organization and informs them of how they gained access, allowing the organization to improve their defenses. This is known as “penetration testing,” and it’s one example of an activity performed by white-hat hackers. • A white-hat hacker who finds a security vulnerability would disclose it to the developer, allowing them to patch their product and improve its security before it’s compromised. Various organizations pay “bounties” or award prizes for revealing such discovered vulnerabilities, compensating white-hats for their work.
  • 7. Grey hat hackers :- • Very few things in life are clear black-and-white categories. In reality, there’s often a gray area. A gray-hat hacker falls somewhere between a black hat and a white hat. A gray hat doesn’t work for their own personal gain or to cause carnage, but they may technically commit crimes and do arguably unethical things. • For example, a black hat hacker would compromise a computer system without permission, stealing the data inside for their own personal gain or vandalizing the system. A white-hat hacker would ask for permission before testing the system’s security and alert the organization after compromising it. A gray-hat hacker might attempt to compromise a computer system without permission, informing the organization after the fact and allowing them to fix the problem. While the gray-hat hacker didn’t use their access for bad purposes, they compromised a security system without permission, which is illegal. • If a gray-hat hacker discovers a security flaw in a piece of software or on a website, they may disclose the flaw publically instead of privately disclosing the flaw to the organization and giving them time to fix it. They wouldn’t take advantage of the flaw for their own personal gain — that would be black-hat behavior — but the public disclosure could cause carnage as black-hat hackers tried to take advantage of the flaw before it was fixed.
  • 8. Some other types of hackers:- • Elite hacker  A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers. Elite groups such as Masters of Deceptionconferred a kind of credibility on their members. • Script kiddie  A script kiddie (also known as a skid or skiddie) is an unskilled hacker who breaks into computer systems by using automated tools written by others (usually by other black hat hackers), hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature),usually with little understanding of the underlying concept. • Neophyte  A neophyte ("newbie", or "noob") is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking. • Blue hat  A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events. • Hacktivist  A hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or political message.  Hacktivism can be divided into two main groups:  Cyberterrorism — Activities involving website defacement or denial-of-service attacks; and,  Freedom of information — Making information that is not public, or is public in non-machine-readable formats, accessible to the public.
  • 9. Types of Data stolen from the organization:-
  • 11. What does a hacker do?
  • 15. Phase 3 :- Gaining Acess
  • 17. Phase 5 :- Covering Tracks
  • 18. Some Types of hacking:-  Injection attack :- Injection Attacking occurs when there are flaws in your SQL Database, SQL libraries, or even the operating system itself. Employees open seemingly credible files with hidden commands, or “injections”, unknowingly. In doing so, they’ve allowed hackers to gain unauthorized access to private data such as social security numbers, credit card number or other financial data.  Cross site scripting attack :-Cross Site Scripting, also known as an XSS attack, occurs when an application, url “get request”, or file packet is sent to the web browser window and bypassing the validation process. Once an XSS script is triggered, it’s deceptive property makes users believe that the compromised page of a specific website is legitimate. For example, if www.example.com/abcd.html has XSS script in it, the user might see a popup window asking for their credit card info and other sensitive info
  • 19.  click jacking attack :- Click jacking, also called a UI Redress Attack, is when a hacker uses multiple opaque layers to trick a user into clicking the top layer without them knowing. Thus the attacker is “hijacking” clicks that are not meant for the actual page, but for a page where the attacker wants you to be. For example, using a carefully crafted combination of style sheets, iframes, and text boxes, a user can be led to believe they are typing in the password for their bank account, but are actually typing into an invisible frame controlled by the attacker.  social engineering attacks :- A social engineering attack is not technically a “hack”. It happens when you divulge private information in good faith, such as a credit card number, through common online interactions such as email, chat, social media sites, or virtually any website. The problem, of course, is that you’re not getting into what you think you’re getting into. A classic example of a social engineering attack is the “Microsoft tech support” scam. This is when someone from a call center pretends to be a MS tech support member who says that your computer is slow and/or infected, and can be easily fixed – at a cost, of course.
  • 20. Phishing attack :- Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. The word is a neologism created as a homophone of fishing due to the similarity of using a bait in an attempt to catch a victim. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting victims. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Many websites have now created secondary tools for applications, like maps for games, but they should be clearly marked as to who wrote them, and users should not use the same passwords anywhere on the internet.
  • 21. The great knowledge of memory is not ignorance,it is the illusion of knowledge…… Thank you