Ethical Hacking
Afaq Mansoor Khan
Content
● Introduction
● Ethical Hackers
● What do Ethical Hackers do?
● Ethical Hacking Process
● Why do We need Ethical Hacking
● Required Skills
● Advantages
● Disadvantages
● Conclusion
Introduction
● Ethical hacking also known as penetration testing or white-hat hacking, involves
the same tools, tricks, and techniques that hackers use, but with one major
difference that Ethical hacking is legal.
● It focuses on authorized attempts to gain unauthorized access to systems and
find vulnerabilities. Ethical hacking is done with the legal permission of a
company to test and increase the security of its systems and networks.
What do Ethical Hackers do?
● Independent computer security Professionals breaking into the computer
systems.
● Neither damage the target systems nor steal information.
● Evaluate target systems security and report back to owners about the bugs
found
● They use their skills to improve the security of networks, systems, and
applications, utilizing different methods to exploit computer systems and
discover vulnerabilities.
Ethical Hacking Process
● Foot Printing
○ NS lookup
○ IP lookup
● Scanning
○ Port Scanning
○ Network Scanning
● Gaining Access
○ Password Attacks
○ Social Engineering
● Maintaining Access
○ Os BackDoors
○ Trojans
Why do we need Ethical Hacking?
Why are Ethical Hackers in Demand?
● The world is changing — technology is growing, organizations are expanding,
and malicious attacks are increasing.
● However, there is still a lack of professional ethical hackers who can think
critically and have problem-solving skills. Governments and organizations need
experts who are familiar with ethical hacking methods to secure networks and
data.
● An ethical hacker should have the ability to resolve issues before it becomes a
danger, and provide the best security practices.
Required Skills
● Good programming skills (HTML, JSP, Java, Python)
● Be able to resolve problems related to asset security.
● Deep understanding of operating systems, firewalls, and file systems.
● Knowledge about databases and their operations.
● You should understand what is ethically right and what is ethically wrong. Basic
knowledge of networking is also a must.
Advantages
● To catch a thief you have to think like a thief.
● Helps in closing the open holes in the system network.
● Provides security to banking and financial establishments.
● Prevents website defacements.
● An evolving technique.
Disadvantages
● All depends upon the trustworthiness of the ethical hacker
● Hiring professionals is expensive.
Carrier Opportunities
● Security Analyst
● IT Security Administrator
● Cyber Defense Analyst
● System Security Administrator
● Information Security Manager
● Cybersecurity Consultant
● Security Compliance Analyst
Conclusion
● In the preceding sections we saw the methodology of hacking, why should we
aware of hacking and some tools which a hacker may use.
● Now we can see what can we do against hacking or to protect ourselves from
hacking.
● The first thing we should do is to keep ourselves updated about those
software’s we and using for official and reliable sources.
● Educate the employees and the users against black hat hacking.
References
● https://www.tutorialspoint.com/
● https://www.wikipedia.org/
Thank You!

Ethical Hacking - An Overview

  • 1.
  • 2.
    Content ● Introduction ● EthicalHackers ● What do Ethical Hackers do? ● Ethical Hacking Process ● Why do We need Ethical Hacking ● Required Skills ● Advantages ● Disadvantages ● Conclusion
  • 3.
    Introduction ● Ethical hackingalso known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. ● It focuses on authorized attempts to gain unauthorized access to systems and find vulnerabilities. Ethical hacking is done with the legal permission of a company to test and increase the security of its systems and networks.
  • 4.
    What do EthicalHackers do? ● Independent computer security Professionals breaking into the computer systems. ● Neither damage the target systems nor steal information. ● Evaluate target systems security and report back to owners about the bugs found ● They use their skills to improve the security of networks, systems, and applications, utilizing different methods to exploit computer systems and discover vulnerabilities.
  • 5.
    Ethical Hacking Process ●Foot Printing ○ NS lookup ○ IP lookup ● Scanning ○ Port Scanning ○ Network Scanning ● Gaining Access ○ Password Attacks ○ Social Engineering ● Maintaining Access ○ Os BackDoors ○ Trojans
  • 6.
    Why do weneed Ethical Hacking?
  • 7.
    Why are EthicalHackers in Demand? ● The world is changing — technology is growing, organizations are expanding, and malicious attacks are increasing. ● However, there is still a lack of professional ethical hackers who can think critically and have problem-solving skills. Governments and organizations need experts who are familiar with ethical hacking methods to secure networks and data. ● An ethical hacker should have the ability to resolve issues before it becomes a danger, and provide the best security practices.
  • 8.
    Required Skills ● Goodprogramming skills (HTML, JSP, Java, Python) ● Be able to resolve problems related to asset security. ● Deep understanding of operating systems, firewalls, and file systems. ● Knowledge about databases and their operations. ● You should understand what is ethically right and what is ethically wrong. Basic knowledge of networking is also a must.
  • 9.
    Advantages ● To catcha thief you have to think like a thief. ● Helps in closing the open holes in the system network. ● Provides security to banking and financial establishments. ● Prevents website defacements. ● An evolving technique.
  • 10.
    Disadvantages ● All dependsupon the trustworthiness of the ethical hacker ● Hiring professionals is expensive.
  • 11.
    Carrier Opportunities ● SecurityAnalyst ● IT Security Administrator ● Cyber Defense Analyst ● System Security Administrator ● Information Security Manager ● Cybersecurity Consultant ● Security Compliance Analyst
  • 12.
    Conclusion ● In thepreceding sections we saw the methodology of hacking, why should we aware of hacking and some tools which a hacker may use. ● Now we can see what can we do against hacking or to protect ourselves from hacking. ● The first thing we should do is to keep ourselves updated about those software’s we and using for official and reliable sources. ● Educate the employees and the users against black hat hacking.
  • 13.
  • 14.