SlideShare a Scribd company logo
Ethical
Hacking
Contents to be study
Meaning Of Hacking-Hacker
History
Types Of Hackers
Why Hackers Hack ?
Levels Of Hacking
Process of Hacking
Is Hacking a Crime ?
Offences and Penalties under IT,
Act 2000
What is HACKING ?
Hacking is the practice of modifying the
features of a system, in order to
accomplish a goal outside of the
creator's original purpose. The person
who is consistently engaging in hacking
activities, called a hacker.
Computer hacking is the most popular
form of hacking nowadays, especially in
the field of computer security, but
hacking exists in many other forms,
such as phone hacking, brain hacking,
etc. and it's not limited to either of
them.
History Of Hacking
The First Hacker was appeared in 1960 at
the MIT's artificial intelligence lab.
During the 1970 , a different kind of
hacker appeared. ( Phone Hacker)
…John Draper
In the 1980, phearks started to migrate the
computers and the first BULLETIN BOARD
SYSTEM (BBS) appeared.
During the 1990, when the use of internet
widespread around the world, HACKERS
multiplied.
Who Is Hacker ?
An ethical hacker is a computer and
networking expert who systematically
attempts to penetrate a computer
system or network on behalf of its
owners for the purpose of finding
security vulnerabilities that a
malicious hacker could potentially
exploit.
Types Of Hackers :-
I. Script Kiddies
II. White Hat ( Normally known as
ETHICAL HACKERS)
III. Black Hat ( Also Known as
CRACKERS)
IV. Gray Hat
V. Green Hat
VI. Red Hat
VII. Blue Hat
Scr
Script Kiddies
 Young in-Experienced
Hackers.
 Copy Codes and
techniques from
Knowledgeable
Hackers.
 Use techniques for fun
purpose.
 Sometimes could be
very dangerous for the
system.
White Hat Hackers :-
These are good hackers.
Have genuine license to
hack.
Have registered police
records.
Evolves themselves in good
work.
Generally owned by the
companies for security
designing.
Have high pay scales.
Generally these are coders.
Black Hat Hackers :-
Very Dangerous
Persons.
Always motive to earn
huge profits.
Highly paid persons.
Evolves mostly in
criminal activities.
These could be coders,
admins as well as script
kidders.
Why Do Hackers Hack ?
To Gain Information.
To Promote Their Website.
To Make Statement.
The Levels Of Hacking
Script Kiddies
The Hacking Group:
Hacktivists
Black Hat Professionals
Organized Criminal Gangs:
Nation States
The Automated Tool
Process Of Hacking
1) Reconnaissance/Foot printing
2) Scanning
3) Enumeration
4) System Hacking (Follows
Enumeration)
5) Escalation of privileges
6) Covering your tracks
7) Planting backdoors (enabling
points of re-entry)
Is Ethical Hacking- A crime or not ?
No, Ethical Hacking is
not a crime……
Because ,
 Completely
Trustworthy.
 Strong
Programming
$Computer
networking skills.
 Learn about the
system and trying to
find its weaknesses.
 Published
research papers or
released security
software.
 No Ex-Hackers.
 Techniques of
Criminal Hackers-
Detection-
Preventions.
Penalties under IT Act,
2000 Hacking Of Computer System.
A. Penalty for breach of any
Privacy.
B. Punishment for Theft.
C. Punishment for criminal
Breach of trust.
D. Punishment for Trespass
Sec 66 (2) – Hacking
of Computer System.
Whoever Commits
Hacking Shall be
punished with
imprisonment up to 3
Years or fine extend up
to 2 lakh rupees or
both.
Sec 72– Plenty for breach of confidential
and Privacy.
If any person who, in pursuance of any powers
conferred under this Act, Rules or Regulations
made there under, has secured access to any
electronic record, book register,
correspondence, information, document or
other material without the consent of the
person concerned discloses such electronic
record, book, register, correspondence,
information, document, or other material to
any other person shall be punished with
imprisonment for a term which may extend to
two years , or with fine which may extend to one
lakh rupees, or with both.”
Sec.379-
Punishment for
Theft
Whoever commits theft
shall be punished with
imprisonment of either
description for a term
which may extend to
three years , or with fine,
or with both.”
Sec. 406 – Punishment
for criminal breach of
trust.
“ Whoever commits
criminal breach of trust
shall be punished with
imprisonment of either
description for a term
which may extend to
three years , or with fine,
or with both.”
Sec. 447 –
Punishment for
criminal trespass
“ Whoever commits
criminal trespass shall be
punished with
imprisonment of either
description for a term which
may extend to three months
, or with fine which may
extend to five hundred
rupees, or with both.”
Ethical Hacking

More Related Content

What's hot

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Monika Deswal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking Amol Deshmukh
 
Ppt
PptPpt
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
Divyank Jindal
 
Hacking
HackingHacking
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Vishesh Singhal
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
Yash Shukla
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Ppt
PptPpt
Ppt
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Social engineering
Social engineering Social engineering
Social engineering
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 

Viewers also liked

Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
shreya_omar
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain
 
y3dips hacking priv8 network
y3dips hacking priv8 networky3dips hacking priv8 network
y3dips hacking priv8 network
idsecconf
 
Why The Companies are using GO GREEN policy ?
Why The Companies are using GO GREEN policy ? Why The Companies are using GO GREEN policy ?
Why The Companies are using GO GREEN policy ?
DEEPIKA WALIA
 
What The Heck Is Hacking?
What The Heck Is Hacking? What The Heck Is Hacking?
What The Heck Is Hacking?
Lars Zimmermann
 
Advanced growth hacking
Advanced growth hackingAdvanced growth hacking
Advanced growth hacking
Vasil Azarov
 
CURRENT SCENARIO OF BSE
CURRENT SCENARIO OF BSECURRENT SCENARIO OF BSE
CURRENT SCENARIO OF BSE
DEEPIKA WALIA
 
CURRENT SCENARIO OF NSE
CURRENT SCENARIO OF NSECURRENT SCENARIO OF NSE
CURRENT SCENARIO OF NSE
DEEPIKA WALIA
 
Travel Hacking 101
Travel Hacking 101Travel Hacking 101
Travel Hacking 101
nbuchan1
 
Advanced Web Hacking (EUSecWest 06)
Advanced Web Hacking (EUSecWest 06)Advanced Web Hacking (EUSecWest 06)
Advanced Web Hacking (EUSecWest 06)
Shreeraj Shah
 
Hacking Journalism: Using the Internet to Save the World
Hacking Journalism: Using the Internet to Save the WorldHacking Journalism: Using the Internet to Save the World
Hacking Journalism: Using the Internet to Save the World
Daniel Schultz
 
Web Hacking Series Part 1
Web Hacking Series Part 1Web Hacking Series Part 1
Web Hacking Series Part 1
Aditya Kamat
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
Shubham Takode
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
Mohammad Yousri
 
What is E-Commerce ? and online shopping procedure via AMAZON.in
What is E-Commerce ? and online shopping procedure via AMAZON.inWhat is E-Commerce ? and online shopping procedure via AMAZON.in
What is E-Commerce ? and online shopping procedure via AMAZON.in
DEEPIKA WALIA
 
Web Hacking Intro
Web Hacking IntroWeb Hacking Intro
Web Hacking Intro
Aditya Kamat
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques Used
Siddharth Bhattacharya
 
Business economics cost analysis
Business economics   cost analysisBusiness economics   cost analysis
Business economics cost analysisRachit Walia
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
Tjylen Veselyj
 
Hacking
HackingHacking
Hacking
Shah Maryam
 

Viewers also liked (20)

Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
y3dips hacking priv8 network
y3dips hacking priv8 networky3dips hacking priv8 network
y3dips hacking priv8 network
 
Why The Companies are using GO GREEN policy ?
Why The Companies are using GO GREEN policy ? Why The Companies are using GO GREEN policy ?
Why The Companies are using GO GREEN policy ?
 
What The Heck Is Hacking?
What The Heck Is Hacking? What The Heck Is Hacking?
What The Heck Is Hacking?
 
Advanced growth hacking
Advanced growth hackingAdvanced growth hacking
Advanced growth hacking
 
CURRENT SCENARIO OF BSE
CURRENT SCENARIO OF BSECURRENT SCENARIO OF BSE
CURRENT SCENARIO OF BSE
 
CURRENT SCENARIO OF NSE
CURRENT SCENARIO OF NSECURRENT SCENARIO OF NSE
CURRENT SCENARIO OF NSE
 
Travel Hacking 101
Travel Hacking 101Travel Hacking 101
Travel Hacking 101
 
Advanced Web Hacking (EUSecWest 06)
Advanced Web Hacking (EUSecWest 06)Advanced Web Hacking (EUSecWest 06)
Advanced Web Hacking (EUSecWest 06)
 
Hacking Journalism: Using the Internet to Save the World
Hacking Journalism: Using the Internet to Save the WorldHacking Journalism: Using the Internet to Save the World
Hacking Journalism: Using the Internet to Save the World
 
Web Hacking Series Part 1
Web Hacking Series Part 1Web Hacking Series Part 1
Web Hacking Series Part 1
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
What is E-Commerce ? and online shopping procedure via AMAZON.in
What is E-Commerce ? and online shopping procedure via AMAZON.inWhat is E-Commerce ? and online shopping procedure via AMAZON.in
What is E-Commerce ? and online shopping procedure via AMAZON.in
 
Web Hacking Intro
Web Hacking IntroWeb Hacking Intro
Web Hacking Intro
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques Used
 
Business economics cost analysis
Business economics   cost analysisBusiness economics   cost analysis
Business economics cost analysis
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 
Hacking
HackingHacking
Hacking
 

Similar to Ethical Hacking

Hacking
HackingHacking
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
Sweta Kumari Barnwal
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
Sweta Kumari Barnwal
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
Hacking
HackingHacking
Hacking
mubeenm50
 
Hacking
HackingHacking
Hacking
pranav patade
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Sourabh Goyal
 
Hacking
Hacking Hacking
Hacking
Farkhanda Kiran
 
Hacking
HackingHacking
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Md Mudassir
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
shericehewat
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
Solomon Oho
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
pavankumarmangena
 
Hacking
HackingHacking
Hacking
Paidi Dinesh
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 

Similar to Ethical Hacking (20)

Hacking
HackingHacking
Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking
HackingHacking
Hacking
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 

Recently uploaded

María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 

Recently uploaded (16)

María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 

Ethical Hacking

  • 2. Contents to be study Meaning Of Hacking-Hacker History Types Of Hackers Why Hackers Hack ? Levels Of Hacking Process of Hacking Is Hacking a Crime ? Offences and Penalties under IT, Act 2000
  • 3. What is HACKING ? Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, called a hacker. Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
  • 4. History Of Hacking The First Hacker was appeared in 1960 at the MIT's artificial intelligence lab. During the 1970 , a different kind of hacker appeared. ( Phone Hacker) …John Draper
  • 5. In the 1980, phearks started to migrate the computers and the first BULLETIN BOARD SYSTEM (BBS) appeared. During the 1990, when the use of internet widespread around the world, HACKERS multiplied.
  • 6. Who Is Hacker ? An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.
  • 7. Types Of Hackers :- I. Script Kiddies II. White Hat ( Normally known as ETHICAL HACKERS) III. Black Hat ( Also Known as CRACKERS) IV. Gray Hat V. Green Hat VI. Red Hat VII. Blue Hat
  • 8. Scr Script Kiddies  Young in-Experienced Hackers.  Copy Codes and techniques from Knowledgeable Hackers.  Use techniques for fun purpose.  Sometimes could be very dangerous for the system.
  • 9. White Hat Hackers :- These are good hackers. Have genuine license to hack. Have registered police records. Evolves themselves in good work. Generally owned by the companies for security designing. Have high pay scales. Generally these are coders.
  • 10. Black Hat Hackers :- Very Dangerous Persons. Always motive to earn huge profits. Highly paid persons. Evolves mostly in criminal activities. These could be coders, admins as well as script kidders.
  • 11. Why Do Hackers Hack ? To Gain Information. To Promote Their Website. To Make Statement.
  • 12. The Levels Of Hacking Script Kiddies The Hacking Group: Hacktivists Black Hat Professionals Organized Criminal Gangs: Nation States The Automated Tool
  • 13. Process Of Hacking 1) Reconnaissance/Foot printing 2) Scanning 3) Enumeration 4) System Hacking (Follows Enumeration) 5) Escalation of privileges 6) Covering your tracks 7) Planting backdoors (enabling points of re-entry)
  • 14. Is Ethical Hacking- A crime or not ? No, Ethical Hacking is not a crime…… Because ,  Completely Trustworthy.  Strong Programming $Computer networking skills.  Learn about the system and trying to find its weaknesses.  Published research papers or released security software.  No Ex-Hackers.  Techniques of Criminal Hackers- Detection- Preventions.
  • 15. Penalties under IT Act, 2000 Hacking Of Computer System. A. Penalty for breach of any Privacy. B. Punishment for Theft. C. Punishment for criminal Breach of trust. D. Punishment for Trespass
  • 16. Sec 66 (2) – Hacking of Computer System. Whoever Commits Hacking Shall be punished with imprisonment up to 3 Years or fine extend up to 2 lakh rupees or both.
  • 17. Sec 72– Plenty for breach of confidential and Privacy. If any person who, in pursuance of any powers conferred under this Act, Rules or Regulations made there under, has secured access to any electronic record, book register, correspondence, information, document or other material without the consent of the person concerned discloses such electronic record, book, register, correspondence, information, document, or other material to any other person shall be punished with imprisonment for a term which may extend to two years , or with fine which may extend to one lakh rupees, or with both.”
  • 18. Sec.379- Punishment for Theft Whoever commits theft shall be punished with imprisonment of either description for a term which may extend to three years , or with fine, or with both.”
  • 19. Sec. 406 – Punishment for criminal breach of trust. “ Whoever commits criminal breach of trust shall be punished with imprisonment of either description for a term which may extend to three years , or with fine, or with both.”
  • 20. Sec. 447 – Punishment for criminal trespass “ Whoever commits criminal trespass shall be punished with imprisonment of either description for a term which may extend to three months , or with fine which may extend to five hundred rupees, or with both.”