SlideShare a Scribd company logo
Ethical Hacking Skills
&
Social Engineering Techniques
Skills Required to Become a Ethical Hacker
Skills allow you to achieve your desired goals within the available time and resources. As a hacker,
you will need to develop skills that will help you get the job done. These skills include learning how
to program, use the internet, good at solving problems, and taking advantage of existing security
tools.
In this article, we will introduce you to the common programming languages and skills that you must
know as a hacker.
 Top Ethical Hacking Skills
• Excellent Computer Skills. ...
• Programming Skills. ...
• Database Skills. ...
• SQL Skills. ...
• Linux Skills. ...
• Cryptography. ...
• Social Engineering Skills. ...
• Web Applications.
1. Excellent Computer Skills
2. Programming Skills
A programming language is a language that is used to develop computer programs. The programs
developed can range from operating systems; data based applications through to networking solutions.
Why should you learn how to program?
Hackers are the problem solver and tool builders, learning how to program will help you
implement solutions to problems. It also differentiates you from script kiddies.
Writing programs as a hacker will help you to automate many tasks which would usually take
lots of time to complete.
Writing programs can also help you identify and exploit programming errors in applications that
you will be targeting.
You don’t have to reinvent the wheel all the time, and there are a number of open source
programs that are readily usable. You can customize the already existing applications and
add your methods to suit your needs.
What languages should I learn?
COMPUTER
LANGUAGES
DESCRIPTION PURPOSE
HTML
Language used to write web
pages.
Web hacking
Login forms and other data entry methods on the web use HTML forms to get data. Being able to write and interpret
HTML, makes it easy for you to identify and exploit weaknesses in the code.
JavaScript Client side scripting language
Web Hacking
JavaScript code is executed on the client browse. You can use it to read saved cookies and perform cross site scripting
etc.
PHP Server side scripting language
Web Hacking
PHP is one of the most used web programming languages. It is used to process HTML forms and performs other custom
tasks. You could write a custom application in PHP that modifies settings on a web server and makes the server
vulnerable to attacks.
SQL
Language used to communicate
with database
Web Hacking
Using SQL injection, to by-pass web application login algorithms that are weak, delete data from the database, etc.
Python
Ruby
Bash
Perl
High level programming
languages
Building tools & scripts
They come in handy when you need to develop automation tools and scripts. The knowledge gained can also be used in
understand and customization the already available tools.
C & C++ Low Level Programming
Writing exploits, shell codes, etc.
They come in handy when you need to write your own shell codes, exploits, root kits or understanding and expanding
on existing ones.
Java,CSharp
Visual Basic
VBScript
Other languages
Other uses
The usefulness of these languages depends on your scenario.
3. Database Skills
Ethical hacking requires a number of different skills to be successful. One of the most important ethical hacker skills is
the ability to work with databases.
 Hackers need to be able to understand how databases are structured and how they work in order to be able to find
security vulnerabilities.
 In addition, hackers need to be able to use database management tools in order to manipulate data and access
restricted information. Without these skills, it would be very difficult for ethical hackers to do their job.
4. SQL Skills
Ethical hacking is an increasingly popular profession that calls for a very specific set of skills. Perhaps
one of the essential ethical hacking skills required for an ethical hacker is the ability to write and
understand SQL queries.
SQL, or Structured Query Language, is a programming language specifically designed for working
with databases.
To find vulnerable information in a database, an ethical hacker needs to be able to craft SQL queries
that can extract the desired data.
5. Linux Skills
Anyone in information technology systems, such as administrators and network engineers, software
developers or engineers, and some cybersecurity professionals, should learn Linux. It's an important
skill to learn because Linux is the foundation of many servers and supercomputers.
For ethical hackers, Linux skills are essential, as they allow you to access the inner workings of a
system and identify potential vulnerabilities.
In addition, Linux skills provide you with the ability to create custom scripts and programs that can
be used to automate various tasks.
What is Social Engineering? Attacks,Techniques & Prevention
Social engineering is the art of manipulating users of a computing system into revealing
confidential information that can be used to gain unauthorized access to a computer system.
The term can also include activities
such as exploiting human kindness, greed, and curiosity to gain access to restricted access
buildings or getting the users to installing backdoor software.
How social engineering Works?
HERE,
Gather Information: This is the first stage, the learns as much as he can about the intended victim. The
information is gathered from company websites, other publications and sometimes by talking to the users
of the target system.
Plan Attack: The attackers outline how he/she intends to execute the attack
Acquire Tools: These include computer programs that an attacker will use when launching the attack.
Attack: Exploit the weaknesses in the target system.
Use acquired knowledge: Information gathered during the social engineering tactics such as pet names,
birthdates of the organization founders, etc. is used in attacks such as password guessing.
How social engineering Works?
Social Engineering attacks
Phishing: Phishing uses emails that appear to come from legitimate sources to trick people
into providing their information or clicking on malicious links and put end users into one of the
emotional states that causes them to act without thinking.
Vishing: Attackers use phone calls to trick victims into handling over data. They may pose as bank
managers or other trusted entities to supply your credentials and other important data.
Smishing: Uses SMS text messaging to get you to divulge information or click on a malicious link.
Spear Phishing: Similar to phishing but the attacker customizes the email specifically for an
individual to make the phish seem more real. They often target key employees with access to critical
and/or confidential data
Phishing
E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal
information
 In other words It is the criminally attempting to acquire sensitive information such as
•usernames
•passwords
•credit card details
Vishing & Smishing
Vishing - Phone calls made by fraudsters to steal your personal information and sensitive
information
- they communicate
• as bank officer
• referring your shopping
Tips to avoid Vishing & Smishing
 Never reveal any information over phone calls
 Call the original company like bank, shopping toll free and enquire about the call received
 Avoid picking calls from unknown numbers
 Never respond to sms received from unknowns
 Avoid clicking links received on sms
Protecting Yourself
A security aware culture can help employees identify and repel social engineering attacks 􀀀
Recognize inappropriate requests for information
 Take ownership for corporate security
 Understand risk and impact of security breeches
 Social engineering attacks are personal.
 Password management
Two factor authentication
Physical security
Understand what information you are putting on the Web for targeting at social network sites
Google, Twitter
Myspace, Facebook
Personal Blogs, LinkedIn
Safety Tips
1) Use antivirus software (AVAST, AVG…..)
2) Insert firewalls , pop up blocker (Windows, Comodo)
3) Uninstall unnecessary software (Adwares)
4) Maintain backup (Weekly/Monthly)
5) Use secure connection (HTTPS)
6) Open attachments carefully
7) Use strong passwords , don’t give personal information
unless required.
FREE AVAST ANTIVIRUS FOR ONE YEAR –
https://www.avast.com/registration-free-antivirus.php
Summary
Programming skills are essential to becoming an effective hacker.
Network skills are essential to becoming an effective hacker
SQL skills are essential to becoming an effective hacker.
Hacking tools are programs that simplify the process of identifying and exploiting weaknesses in computer
systems.
Social engineering is the art of exploiting the human elements to gain access to un-authorized resources.
Social engineers use a number of techniques to fool the users into revealing sensitive information.
Organizations must have security policies that have social engineering countermeasures.

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
Ahmed Musaad
 
Hacking
Hacking Hacking
Hacking
Farkhanda Kiran
 
HACKING
HACKINGHACKING
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Dilip Prajapati
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Sagar Verma
 
Footprinting
FootprintingFootprinting
Footprinting
Duah John
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
Prof .Pragati Khade
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hackingleminhvuong
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Edureka!
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Shivam Lohiya
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Hacking
Hacking Hacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Footprinting
FootprintingFootprinting
Footprinting
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
cyber security
cyber security cyber security
cyber security
 

Similar to Ethical hacking - Skills.pptx

What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?
Careervira
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Edureka!
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
xererenhosdominaram
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
FarhanaMariyam1
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
Best ethical hacking course online
Best ethical hacking course onlineBest ethical hacking course online
Best ethical hacking course online
Ducat
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
AnshumaanTiwari2
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptx
Infosectrain3
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
shreya_omar
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hackingBeing Uniq Sonu
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
zeus7856
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
arri2009av
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
acropolisinfotech
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
saivarun91
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
PECB
 

Similar to Ethical hacking - Skills.pptx (20)

What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Best ethical hacking course online
Best ethical hacking course onlineBest ethical hacking course online
Best ethical hacking course online
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptx
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 

Recently uploaded

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 

Recently uploaded (20)

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 

Ethical hacking - Skills.pptx

  • 1. Ethical Hacking Skills & Social Engineering Techniques
  • 2. Skills Required to Become a Ethical Hacker Skills allow you to achieve your desired goals within the available time and resources. As a hacker, you will need to develop skills that will help you get the job done. These skills include learning how to program, use the internet, good at solving problems, and taking advantage of existing security tools. In this article, we will introduce you to the common programming languages and skills that you must know as a hacker.  Top Ethical Hacking Skills • Excellent Computer Skills. ... • Programming Skills. ... • Database Skills. ... • SQL Skills. ... • Linux Skills. ... • Cryptography. ... • Social Engineering Skills. ... • Web Applications.
  • 4. 2. Programming Skills A programming language is a language that is used to develop computer programs. The programs developed can range from operating systems; data based applications through to networking solutions.
  • 5. Why should you learn how to program? Hackers are the problem solver and tool builders, learning how to program will help you implement solutions to problems. It also differentiates you from script kiddies. Writing programs as a hacker will help you to automate many tasks which would usually take lots of time to complete. Writing programs can also help you identify and exploit programming errors in applications that you will be targeting. You don’t have to reinvent the wheel all the time, and there are a number of open source programs that are readily usable. You can customize the already existing applications and add your methods to suit your needs.
  • 6. What languages should I learn? COMPUTER LANGUAGES DESCRIPTION PURPOSE HTML Language used to write web pages. Web hacking Login forms and other data entry methods on the web use HTML forms to get data. Being able to write and interpret HTML, makes it easy for you to identify and exploit weaknesses in the code. JavaScript Client side scripting language Web Hacking JavaScript code is executed on the client browse. You can use it to read saved cookies and perform cross site scripting etc. PHP Server side scripting language Web Hacking PHP is one of the most used web programming languages. It is used to process HTML forms and performs other custom tasks. You could write a custom application in PHP that modifies settings on a web server and makes the server vulnerable to attacks. SQL Language used to communicate with database Web Hacking Using SQL injection, to by-pass web application login algorithms that are weak, delete data from the database, etc. Python Ruby Bash Perl High level programming languages Building tools & scripts They come in handy when you need to develop automation tools and scripts. The knowledge gained can also be used in understand and customization the already available tools. C & C++ Low Level Programming Writing exploits, shell codes, etc. They come in handy when you need to write your own shell codes, exploits, root kits or understanding and expanding on existing ones. Java,CSharp Visual Basic VBScript Other languages Other uses The usefulness of these languages depends on your scenario.
  • 7. 3. Database Skills Ethical hacking requires a number of different skills to be successful. One of the most important ethical hacker skills is the ability to work with databases.  Hackers need to be able to understand how databases are structured and how they work in order to be able to find security vulnerabilities.  In addition, hackers need to be able to use database management tools in order to manipulate data and access restricted information. Without these skills, it would be very difficult for ethical hackers to do their job.
  • 8. 4. SQL Skills Ethical hacking is an increasingly popular profession that calls for a very specific set of skills. Perhaps one of the essential ethical hacking skills required for an ethical hacker is the ability to write and understand SQL queries. SQL, or Structured Query Language, is a programming language specifically designed for working with databases. To find vulnerable information in a database, an ethical hacker needs to be able to craft SQL queries that can extract the desired data.
  • 9. 5. Linux Skills Anyone in information technology systems, such as administrators and network engineers, software developers or engineers, and some cybersecurity professionals, should learn Linux. It's an important skill to learn because Linux is the foundation of many servers and supercomputers. For ethical hackers, Linux skills are essential, as they allow you to access the inner workings of a system and identify potential vulnerabilities. In addition, Linux skills provide you with the ability to create custom scripts and programs that can be used to automate various tasks.
  • 10. What is Social Engineering? Attacks,Techniques & Prevention Social engineering is the art of manipulating users of a computing system into revealing confidential information that can be used to gain unauthorized access to a computer system. The term can also include activities such as exploiting human kindness, greed, and curiosity to gain access to restricted access buildings or getting the users to installing backdoor software.
  • 12. HERE, Gather Information: This is the first stage, the learns as much as he can about the intended victim. The information is gathered from company websites, other publications and sometimes by talking to the users of the target system. Plan Attack: The attackers outline how he/she intends to execute the attack Acquire Tools: These include computer programs that an attacker will use when launching the attack. Attack: Exploit the weaknesses in the target system. Use acquired knowledge: Information gathered during the social engineering tactics such as pet names, birthdates of the organization founders, etc. is used in attacks such as password guessing. How social engineering Works?
  • 13. Social Engineering attacks Phishing: Phishing uses emails that appear to come from legitimate sources to trick people into providing their information or clicking on malicious links and put end users into one of the emotional states that causes them to act without thinking. Vishing: Attackers use phone calls to trick victims into handling over data. They may pose as bank managers or other trusted entities to supply your credentials and other important data. Smishing: Uses SMS text messaging to get you to divulge information or click on a malicious link. Spear Phishing: Similar to phishing but the attacker customizes the email specifically for an individual to make the phish seem more real. They often target key employees with access to critical and/or confidential data
  • 14. Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information  In other words It is the criminally attempting to acquire sensitive information such as •usernames •passwords •credit card details
  • 15. Vishing & Smishing Vishing - Phone calls made by fraudsters to steal your personal information and sensitive information - they communicate • as bank officer • referring your shopping
  • 16. Tips to avoid Vishing & Smishing  Never reveal any information over phone calls  Call the original company like bank, shopping toll free and enquire about the call received  Avoid picking calls from unknown numbers  Never respond to sms received from unknowns  Avoid clicking links received on sms
  • 17. Protecting Yourself A security aware culture can help employees identify and repel social engineering attacks 􀀀 Recognize inappropriate requests for information  Take ownership for corporate security  Understand risk and impact of security breeches  Social engineering attacks are personal.  Password management Two factor authentication Physical security Understand what information you are putting on the Web for targeting at social network sites Google, Twitter Myspace, Facebook Personal Blogs, LinkedIn
  • 18. Safety Tips 1) Use antivirus software (AVAST, AVG…..) 2) Insert firewalls , pop up blocker (Windows, Comodo) 3) Uninstall unnecessary software (Adwares) 4) Maintain backup (Weekly/Monthly) 5) Use secure connection (HTTPS) 6) Open attachments carefully 7) Use strong passwords , don’t give personal information unless required. FREE AVAST ANTIVIRUS FOR ONE YEAR – https://www.avast.com/registration-free-antivirus.php
  • 19. Summary Programming skills are essential to becoming an effective hacker. Network skills are essential to becoming an effective hacker SQL skills are essential to becoming an effective hacker. Hacking tools are programs that simplify the process of identifying and exploiting weaknesses in computer systems. Social engineering is the art of exploiting the human elements to gain access to un-authorized resources. Social engineers use a number of techniques to fool the users into revealing sensitive information. Organizations must have security policies that have social engineering countermeasures.