Presented by
JANARDHAN REDDY T
V.V. Sangha’s
RAO BAHADUR Y MAHABALESWARAPPA ENGINEERING COLLEGE
Department of Mechanical Engineering
2022-2023
Under the guidance of
Dr. Kottresh Sardar
Content
Introduction
Ethical hacking
Types of ethical hacking
Hacking process
Why do we need ethical hacking
Protect yourself :what and what not to do
Advantages and Disadvantages
Conclusion
References
Introduction
Ethical hacking also known as penetration testing or white-hat
hacking, involves the same tools, tricks, and techniques that
hackers use,but with one major difference that Ethical hacking is
legal.
Ethical Hacking
 Ethical hacking involves an
authorized attempt to gain
unauthorized access to a
computer system, application,
or data.
 Neither damage the target
systems nor steal information.
 Evaluate target systems security
and report back to owners
about the bugs found.
White Hat Hackers
Grey Hat Hackers
Black Hat Hackers
Types of Hackers
Hacking - Process
Reconnaissance is a set of
processes and techniques
used to covertly discover and
collect information about a
target system.
Reconnaissance
• Scanning is the process where
the attacker begins to actively
probe a target machine or
network for vulnerabilities that
can be exploited.
• Enumeration is the ability of the
hacker to convince some
servers to give them information
that is vital to them to make an
attack.
Scanning and Enumeration
Gaining Access
In this process, the
vulnerability is located and
you attempt to exploit it in
order to enter
into the system.
This is the actual hacking
phase in which the hacker
gains access to the system.
Maintaining Access
After gaining access, the
hacker installs some
backdoors in order to enter
into the system when he
needs access in this owned
system in future.
Clearing Tracks
This process is actually an
unethical activity. It has to
do with the deletion of
logs of all the activities that
take place during the
hacking process.
Reporting
Reporting is the last step of
finishing the ethical hacking
process. Here the Ethical
Hacker compiles a report with
his findings and the job that
was done such as the tools
used, the success rate,
vulnerabilities found, and the
exploit processes .
Why do we need ethical hacking
Breaches in
Security
Denial of
Service (DoS)
Organizational
Attacks
Trojan
Horses, and
Worms
Social
Engineering
Restricted
Data
 Wannacry Encrypted all the
data of system and asks for
money to decrypt them
back.
 Wannacry works on SMB
(Server Message Block)
 On 15 August 2017, many
government websites were
hacked by Pakistani
Hackers.
 As payback Indian hackers
also hacked many Pakistani
govt. websites
Some Recent Hacking Activities
 Recently Jio’s Database got
hacked, It was vulnerability
of their Web Server.
 With this hack Personal
details of anyone can be
seen by anyone just by
entering mobile number.
 Some months ago, a
Ransomware Virus named
WannaCry attacked over
104 countries including
India.
 Steal important
information
 Destroy enemy’s
computer network
during the war How can
kid hack?
 Kid has much of time –
Kid can search for longer
time than other people
 To make security stronger
( Ethical Hacking )
 Just for fun
 Show off
 Hack other systems
secretly
 Notify many people their
thought
Why do people hack?
Protect yourself : what and what not to do
Verify the source of contact.
Before clicking a link,
investigate it.
Always scan a file and never
click on batch files.
Always see the background
services that are running on your
device and never rely on others’
devices.
Be sure to have an antivirus
installed and set root passwords
for installation.Log out of
sessions and clean the cache.
Do not post information on
social media that can be related
to challenging questions
Use passwords that cannot be
broken by brute force or
guessing.
Consider 2-factor authentication
when possible.
Be careful of password requests
emails. Services like Heroku,
Gmail, and others will not
request to type in passwords for
additional promotion or service.
Advantages Disadvantages
 Provides security to banking
and financial establishments
 To recover the lost
information, especially in
case of lost your password .
 Helps in closing the open
holes in the system network.
 All depends upon the
trustworthiness of the ethical
hacker.
 Hiring professionals is
expensive
 The first thing we should do
is to keep ourselves
updated about those
software’s we and using for
official and reliable sources.
 Educate the employees and
the users against black hat
hacking.
In the preceding sections we
saw the methodology of
hacking, why should we
aware of hacking and same
tools which a hacker may
use.
Conclusion
Reference
 www.scribd.com
 www.wikipedia/seminartopics/ethical
haching.org
 www. Seminarsonly/ethical
hacking.com
 www.slideshare.com
 www.ethicalhacking.in
Thank You

Ethical Hacking .pptx

  • 1.
    Presented by JANARDHAN REDDYT V.V. Sangha’s RAO BAHADUR Y MAHABALESWARAPPA ENGINEERING COLLEGE Department of Mechanical Engineering 2022-2023 Under the guidance of Dr. Kottresh Sardar
  • 2.
    Content Introduction Ethical hacking Types ofethical hacking Hacking process Why do we need ethical hacking Protect yourself :what and what not to do Advantages and Disadvantages Conclusion References
  • 3.
    Introduction Ethical hacking alsoknown as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use,but with one major difference that Ethical hacking is legal.
  • 4.
    Ethical Hacking  Ethicalhacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data.  Neither damage the target systems nor steal information.  Evaluate target systems security and report back to owners about the bugs found.
  • 5.
    White Hat Hackers GreyHat Hackers Black Hat Hackers Types of Hackers
  • 6.
  • 7.
    Reconnaissance is aset of processes and techniques used to covertly discover and collect information about a target system. Reconnaissance
  • 8.
    • Scanning isthe process where the attacker begins to actively probe a target machine or network for vulnerabilities that can be exploited. • Enumeration is the ability of the hacker to convince some servers to give them information that is vital to them to make an attack. Scanning and Enumeration
  • 9.
    Gaining Access In thisprocess, the vulnerability is located and you attempt to exploit it in order to enter into the system. This is the actual hacking phase in which the hacker gains access to the system.
  • 10.
    Maintaining Access After gainingaccess, the hacker installs some backdoors in order to enter into the system when he needs access in this owned system in future.
  • 11.
    Clearing Tracks This processis actually an unethical activity. It has to do with the deletion of logs of all the activities that take place during the hacking process.
  • 12.
    Reporting Reporting is thelast step of finishing the ethical hacking process. Here the Ethical Hacker compiles a report with his findings and the job that was done such as the tools used, the success rate, vulnerabilities found, and the exploit processes .
  • 13.
    Why do weneed ethical hacking Breaches in Security Denial of Service (DoS) Organizational Attacks Trojan Horses, and Worms Social Engineering Restricted Data
  • 14.
     Wannacry Encryptedall the data of system and asks for money to decrypt them back.  Wannacry works on SMB (Server Message Block)  On 15 August 2017, many government websites were hacked by Pakistani Hackers.  As payback Indian hackers also hacked many Pakistani govt. websites Some Recent Hacking Activities  Recently Jio’s Database got hacked, It was vulnerability of their Web Server.  With this hack Personal details of anyone can be seen by anyone just by entering mobile number.  Some months ago, a Ransomware Virus named WannaCry attacked over 104 countries including India.
  • 15.
     Steal important information Destroy enemy’s computer network during the war How can kid hack?  Kid has much of time – Kid can search for longer time than other people  To make security stronger ( Ethical Hacking )  Just for fun  Show off  Hack other systems secretly  Notify many people their thought Why do people hack?
  • 16.
    Protect yourself :what and what not to do Verify the source of contact. Before clicking a link, investigate it. Always scan a file and never click on batch files. Always see the background services that are running on your device and never rely on others’ devices. Be sure to have an antivirus installed and set root passwords for installation.Log out of sessions and clean the cache. Do not post information on social media that can be related to challenging questions Use passwords that cannot be broken by brute force or guessing. Consider 2-factor authentication when possible. Be careful of password requests emails. Services like Heroku, Gmail, and others will not request to type in passwords for additional promotion or service.
  • 17.
    Advantages Disadvantages  Providessecurity to banking and financial establishments  To recover the lost information, especially in case of lost your password .  Helps in closing the open holes in the system network.  All depends upon the trustworthiness of the ethical hacker.  Hiring professionals is expensive
  • 18.
     The firstthing we should do is to keep ourselves updated about those software’s we and using for official and reliable sources.  Educate the employees and the users against black hat hacking. In the preceding sections we saw the methodology of hacking, why should we aware of hacking and same tools which a hacker may use. Conclusion
  • 19.
    Reference  www.scribd.com  www.wikipedia/seminartopics/ethical haching.org www. Seminarsonly/ethical hacking.com  www.slideshare.com  www.ethicalhacking.in
  • 20.