WHAT IS HACKING ?
Hacking is not which you see in the Movies, Tv Shows or Webseries….
Where a particular person opens something and clicks on a button to hack
the phone or computer and shows that he is hacking something….
Like this
Hacking is nothing but to Get Private Information and Useful
Data of A Victim or Target, and to Check if the Target is
Vulnerable to attack or not.
Here Vulnerability means the capacity or the security of the
target is Low or Powerful.
Here Is The Actual Image Of A Wifi Hacking or Attack.
TYPES OF HACKERS.
There are Overall 3 Types Of Hackers to Know.
 WHITE HAT HACKERS (ETHICAL HACKERS) – These are the Most
Demanded and All Time Needed Hackers who are Hired by the
Top IT Companies for Their Security and Safety, as they work by
taking the rights from the Main Admin of the Company or
Society and hacks in a legal way.
 BLACK HAT HACKERS (UNETHICAL HACKERS) – These are the
one which are the Most Wanted Hackers and the Dangerous
Attackers in Our Society. These guys do not get any job
opportunities as they Work On Their Own By Illegally Hacking
Any System And Getting Private Data of any Computer or User
for their own purpose.
 GRAY HAT HACKERS (UNIDENTIFIED HACKERS) – These are the
most Confusing Hackers or you can say that they cannot be
identified. As these are the Combo of the Above Two Hackers.
They also work in Company’s and Legally Do Their Work and
When Out Of Work They Also Hack Illegally For Their Own
Purpose as Black Hat Hackers Do Without Getting Restricted.
WHAT IS ETHICAL HACKING ?
As Mentioned Above, Ethical Hacking is Nothing But
White Hat Hacking
Where a Hacker or a Attacker Attacks Legally on The
Victim or Target To Check If His/Her System is
Vulnerable or Not… By using some Penetration
Testing Skills. Then Capturing the Bugs and
Reporting To the Main Admin To Secure Their System
From Attackers. (Black Hat Hackers).
There are Number of Black Hat Hackers increasing Day
by Day, Who Steal Your Data and Go Away Unknown.
Like China Did …..
They Hacked Indian Citizens Important Data Just by
Sending A Simple Photo through Whatsapp Groups,
Facebook, and other Social Media Platforms…..
This Was Nothing But Steganography…. A method to
hide malicious(virus) file into a simple data like
image, audio or video.
Due To All of These Cases…. There is the Mostly Need of An Ethical
Hacker to Hire in Companies. These Ethical Hackers Also Get A Good
Amount Of Payment as per Their Post Or Job.
CHART FOR VARIOUS JOBS AND FIELDS IN ETHICAL
HACKING.
MODULES IN ETHICAL HACKING
There Are Overall 20 Modules To Learn In Ethical Hacking.
 Introduction To Ethical Hacking & Basics.
 Introduction and Training of Linux OS.
 Footprinting and Reconnaissance.
 Scanning & Networking.
 Enumeration.
 DDOS ATTACK / Denial-Of-Service Attack.
 Sniffing And Spoofing.
 Hacking into Wireless Networks.
 Cryptography.
 Steganography.
 System Hacking.
 Malwares ,Viruses and Worms.
 Social and Reverse Engineering.
 Session Hijacking.
 Hacking Web Servers.
 Hacking Web Applications.
 Introduction to Metasploit Framework.
 Android Hacking Using Metasploit Framework.
 SQL Injection.
 Cloud Computing.
Starting Into Ethical Hacking…
Objectives –
1] Need A Basic Requirements in PC/Laptop, such as RAM,
Storage Capacity.
2] The Main OS Used For Ethical Hacking and Penetration
Testing - Kali Linux.
3] Some Set Of Hardware tools such as Network Usb Adapter,
Bootable Pendrives, etc.
To Start –
1] You Need to Learn Basics of Any of these Programming Languages
like Python, Ruby, Perl or Java.
2] You Need To Learn A Course Related To Ethical Hacking with all the
above modules covered in 3 to 9 Months.
ETHICAL HACKER CERTIFICATION.
How to Become A Certified Ethical Hacker (CEH) ?
The CEH exam is a 10-hour exam where 4 Hour for 125
multiple choice questions and 6 Hour for 20 Practical
Challenges. This knowledge-based exam will test your skills
in Information Security Threats and Attack Techniques,
Exploitations, Attack Prevention, Procedures, Methodologies
and more!
The Another Exam OSCP (OFFENSIVE SECURITY
CERTIFIED PROFESSIONAL) Exam provided by EC-
Council and Partnership with Offensive Security, These
Companies Test Your Skills By Giving You Different
Challenges And Tasks.
You Need A Hard Knowledge Of Skills and Practice.. To
Attend This Exams, as these Exams Also costs Lots of
Money.
Ethical Hacking - A Need To Know.pptx

Ethical Hacking - A Need To Know.pptx

  • 2.
    WHAT IS HACKING? Hacking is not which you see in the Movies, Tv Shows or Webseries…. Where a particular person opens something and clicks on a button to hack the phone or computer and shows that he is hacking something…. Like this Hacking is nothing but to Get Private Information and Useful Data of A Victim or Target, and to Check if the Target is Vulnerable to attack or not. Here Vulnerability means the capacity or the security of the target is Low or Powerful. Here Is The Actual Image Of A Wifi Hacking or Attack.
  • 3.
    TYPES OF HACKERS. Thereare Overall 3 Types Of Hackers to Know.  WHITE HAT HACKERS (ETHICAL HACKERS) – These are the Most Demanded and All Time Needed Hackers who are Hired by the Top IT Companies for Their Security and Safety, as they work by taking the rights from the Main Admin of the Company or Society and hacks in a legal way.  BLACK HAT HACKERS (UNETHICAL HACKERS) – These are the one which are the Most Wanted Hackers and the Dangerous Attackers in Our Society. These guys do not get any job opportunities as they Work On Their Own By Illegally Hacking Any System And Getting Private Data of any Computer or User for their own purpose.  GRAY HAT HACKERS (UNIDENTIFIED HACKERS) – These are the most Confusing Hackers or you can say that they cannot be identified. As these are the Combo of the Above Two Hackers. They also work in Company’s and Legally Do Their Work and When Out Of Work They Also Hack Illegally For Their Own Purpose as Black Hat Hackers Do Without Getting Restricted.
  • 4.
    WHAT IS ETHICALHACKING ? As Mentioned Above, Ethical Hacking is Nothing But White Hat Hacking Where a Hacker or a Attacker Attacks Legally on The Victim or Target To Check If His/Her System is Vulnerable or Not… By using some Penetration Testing Skills. Then Capturing the Bugs and Reporting To the Main Admin To Secure Their System From Attackers. (Black Hat Hackers). There are Number of Black Hat Hackers increasing Day by Day, Who Steal Your Data and Go Away Unknown. Like China Did ….. They Hacked Indian Citizens Important Data Just by Sending A Simple Photo through Whatsapp Groups, Facebook, and other Social Media Platforms….. This Was Nothing But Steganography…. A method to hide malicious(virus) file into a simple data like image, audio or video. Due To All of These Cases…. There is the Mostly Need of An Ethical Hacker to Hire in Companies. These Ethical Hackers Also Get A Good Amount Of Payment as per Their Post Or Job.
  • 5.
    CHART FOR VARIOUSJOBS AND FIELDS IN ETHICAL HACKING.
  • 6.
    MODULES IN ETHICALHACKING There Are Overall 20 Modules To Learn In Ethical Hacking.  Introduction To Ethical Hacking & Basics.  Introduction and Training of Linux OS.  Footprinting and Reconnaissance.  Scanning & Networking.  Enumeration.  DDOS ATTACK / Denial-Of-Service Attack.  Sniffing And Spoofing.  Hacking into Wireless Networks.  Cryptography.  Steganography.  System Hacking.  Malwares ,Viruses and Worms.  Social and Reverse Engineering.  Session Hijacking.  Hacking Web Servers.  Hacking Web Applications.  Introduction to Metasploit Framework.  Android Hacking Using Metasploit Framework.  SQL Injection.  Cloud Computing.
  • 7.
    Starting Into EthicalHacking… Objectives – 1] Need A Basic Requirements in PC/Laptop, such as RAM, Storage Capacity. 2] The Main OS Used For Ethical Hacking and Penetration Testing - Kali Linux. 3] Some Set Of Hardware tools such as Network Usb Adapter, Bootable Pendrives, etc. To Start – 1] You Need to Learn Basics of Any of these Programming Languages like Python, Ruby, Perl or Java. 2] You Need To Learn A Course Related To Ethical Hacking with all the above modules covered in 3 to 9 Months.
  • 8.
    ETHICAL HACKER CERTIFICATION. Howto Become A Certified Ethical Hacker (CEH) ? The CEH exam is a 10-hour exam where 4 Hour for 125 multiple choice questions and 6 Hour for 20 Practical Challenges. This knowledge-based exam will test your skills in Information Security Threats and Attack Techniques, Exploitations, Attack Prevention, Procedures, Methodologies and more! The Another Exam OSCP (OFFENSIVE SECURITY CERTIFIED PROFESSIONAL) Exam provided by EC- Council and Partnership with Offensive Security, These Companies Test Your Skills By Giving You Different Challenges And Tasks. You Need A Hard Knowledge Of Skills and Practice.. To Attend This Exams, as these Exams Also costs Lots of Money.