SlideShare a Scribd company logo
DEPT OF COMPUTER APPLICATION
GOVT KPG COLLEGE JAGDALPUR
Submitted To:
Pro Ajay Singh (HOD)
Dept Comp. Application
Govt KPG College, Jagdalpur
Submitted By:
ManojVerma
TOPIC:
ETHICALHACKING
ETHICAL HACKING Presented by:-
Manoj Verma
Content
 Ethical Hacking
 Who are Hackers
 Ethical Hackers but not Criminal Hackers
 Why do Hackers Hack ?
 Types of Hackers
 What should do after hack ?
 Hacking process
 Why do We need Ethical Hacking ?
 Eligibility of Ethical Hacking
 Required Skills of an Ethical Hackers
 Advantages
 Disadvantages
 Future Enhancements
 Conclusion
Ethical Hacking
• Ethical:- Ethical meanslegal,
Hacking:-Hackingmeansremovingvulnerability
in a system, thatis, testinga system by following
all the lawsin a legal way.
• Ethical hackingalso knowsaspenetrationtesting
or white-hathacking,involvesthe same
tools,tricks,andtechniquesthathackersuse.
Who are Hackers
• A person whoenjoys learningdetailsof a programming
languageor system.
• A person whoenjoys actually doingthe programmingrather
than justtheorizingabout it.
• A person capableof appreciatingsomeone else’s hacking.
• A person whopicksup programmingquickly.
• A person whois anexpert ata particularprogramming
languageorsystem.
Ethical Hackers but not Criminal Hackers
• Completely trustworthy.
• Strong programmingandcomputer networkingskills.
• Learnabout the system andtryingto findits weakness.
• Techniquesof Criminalhackers-Detection-Prevention.
Why do hackers hack ?
 Just for fun..
 Show off.
 For theft.
 For revenge.
 To spy.
 To steal importantinformation.
 To destroyenemy’s computer
networkduringthe war.
Types of Hackers
• BlackHat Hackers
• Grey Hat Hackers
• White HatHackers
Black-Hat Hackers
• A black hat hackersor crackersareindividuals
withextraordinarycomputing skills, resorting
to maliciousor destructiveactivities.
• Thatis black hathackersuse their
knowledgeandskill for their own
personal gainsprobably by hurting
others.
Gray-Hat Hackers
• These areindividualswho work
both offensively anddefensively
at varioustime.
• We cannotpredict their behavior
• Sometimes they use their
skills for the common good
while in some other timeshe
uses them for their personal
gains.
White-Hat Hackers
• White hat hackersarethose
individualsprofessinghacker
skills andusing them orfor
defensivepurposes.
• Thismeans thatthe whitehat
hackersuse their knowledge
andskill for the good of others
andfor the common good.
What should do after hacked ?
 Shutdown orturn off the system.
 Separatethe system fromnetwork.
 Restorethe systemwith the backupor
reinstall all programs.
 Not Connect the system to the network.
 call the police.
Hacking Process
Foot
printing
Scanning
Gaining
Access
Maintaining
Clearing
Track
Foot Printing Scanning Gaining Access
Maintaining
Access
Clearing Track
Protection frompossible External Attacks
Why do you need Ethical Hacking ?
Eligibility of Ethical Hacking
 It isimportantto havea Bachelor’s degree..
 BSC
 BTech
 BE
 BCA ininformationTechnology or computer science to
become an ethicalhacker.
Eligibility Criteria for
certified Ethical Hacker ?
Required skills of an Ethical Hacker
 Microsoft:- Skillsin operation , configuration and management.
 Linux:- Knowledge of Linux/Unix ; security settingconfiguration and services.
 Firewalls:- Configurations and operation of intrusiondetection systems.
 Routers:- Knowledge of routers , routing protocols and accesscontrol lists.
 Mainframes:- Knowledge of mainframes.
 Network Protocols:- TCP/IP; how they functionand can be manipulated.
 Project Management:Leading, planning,organizing and controlling a
penetration team.
Advantages
 Withthis you can recover yourlost information,especially
when you forgetyour password.
 Withthis wecanperform penetrationtestingso thatwe can
check the strengthof anycomputer ornetwork security.
 On learning this, wecanuse itto protect our computer from
malicioushackers.
Disadvantages
 Firstof all, afterlearningEthical Hacking,
people start doingwrongthingsin the greedof
money.
 Withthis wecangetunauthorized accessto
someone’ssystem andknowtheir private
information.
 Withthis we canalso do privacyviolation
 If used in reverse,then anysystem operation
canalso be harmed.
Future Enhancements
 As it anevolving branchthe scope of
enhancement in technology is immense.
 NO ethicalhackercanensure the system security
by usingthe same techniquerepeatedly.
 More enhancedsoftware’sshould be usedfor
optimum protection.
Conclusion
 In the precedingsections wesaw the methodology of hacking,why should we
awareof hackingandsome tools which a hackermay use.
 Nowwe cansee whatcan wedo againsthackingor to protect our selves from
hacking.
 Thefirstthing we should do is to keepourselves updatedaboutthose
software’swe andusing for officialand reliable sources.
 Educationthe employees andthe usersagainstblack hat hacking.
References
• WWW.google.com
• WWW.Wikipedia.com
• WWW.tutorialspoint.com
Google
THANK YOU

More Related Content

Similar to Ethical Hacking.pptx

Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
Aakash Takale
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
MaheshDhope1
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
AnshumaanTiwari2
 
ethical hacking
ethical hackingethical hacking
ethical hacking
samprada123
 
Ethical Hacking - An Overview
Ethical Hacking - An OverviewEthical Hacking - An Overview
Ethical Hacking - An Overview
Afaq Mansoor Khan
 
Ethical Hacking : Understanding the Basics
Ethical Hacking : Understanding the BasicsEthical Hacking : Understanding the Basics
Ethical Hacking : Understanding the Basics
offensoSEOwork
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
ambemPrashanthi
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
A Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical HackingA Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical Hacking
Srashti Jain
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
Firojali Laskar
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
shreya_omar
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
Nigam Dave
 
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptxDomain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Infosectrain3
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
Akhilesh Patel
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
Ethichack 2012
Ethichack 2012Ethichack 2012
Ethichack 2012
santhosh kumarRG
 

Similar to Ethical Hacking.pptx (20)

Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical Hacking - An Overview
Ethical Hacking - An OverviewEthical Hacking - An Overview
Ethical Hacking - An Overview
 
Ethical Hacking : Understanding the Basics
Ethical Hacking : Understanding the BasicsEthical Hacking : Understanding the Basics
Ethical Hacking : Understanding the Basics
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
A Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical HackingA Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical Hacking
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
 
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptxDomain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethichack 2012
Ethichack 2012Ethichack 2012
Ethichack 2012
 

Recently uploaded

How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 

Recently uploaded (20)

How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 

Ethical Hacking.pptx

  • 1. DEPT OF COMPUTER APPLICATION GOVT KPG COLLEGE JAGDALPUR Submitted To: Pro Ajay Singh (HOD) Dept Comp. Application Govt KPG College, Jagdalpur Submitted By: ManojVerma TOPIC: ETHICALHACKING
  • 2. ETHICAL HACKING Presented by:- Manoj Verma
  • 3. Content  Ethical Hacking  Who are Hackers  Ethical Hackers but not Criminal Hackers  Why do Hackers Hack ?  Types of Hackers  What should do after hack ?  Hacking process  Why do We need Ethical Hacking ?  Eligibility of Ethical Hacking  Required Skills of an Ethical Hackers  Advantages  Disadvantages  Future Enhancements  Conclusion
  • 4. Ethical Hacking • Ethical:- Ethical meanslegal, Hacking:-Hackingmeansremovingvulnerability in a system, thatis, testinga system by following all the lawsin a legal way. • Ethical hackingalso knowsaspenetrationtesting or white-hathacking,involvesthe same tools,tricks,andtechniquesthathackersuse.
  • 5. Who are Hackers • A person whoenjoys learningdetailsof a programming languageor system. • A person whoenjoys actually doingthe programmingrather than justtheorizingabout it. • A person capableof appreciatingsomeone else’s hacking. • A person whopicksup programmingquickly. • A person whois anexpert ata particularprogramming languageorsystem.
  • 6. Ethical Hackers but not Criminal Hackers • Completely trustworthy. • Strong programmingandcomputer networkingskills. • Learnabout the system andtryingto findits weakness. • Techniquesof Criminalhackers-Detection-Prevention.
  • 7. Why do hackers hack ?  Just for fun..  Show off.  For theft.  For revenge.  To spy.  To steal importantinformation.  To destroyenemy’s computer networkduringthe war.
  • 8. Types of Hackers • BlackHat Hackers • Grey Hat Hackers • White HatHackers
  • 9. Black-Hat Hackers • A black hat hackersor crackersareindividuals withextraordinarycomputing skills, resorting to maliciousor destructiveactivities. • Thatis black hathackersuse their knowledgeandskill for their own personal gainsprobably by hurting others.
  • 10. Gray-Hat Hackers • These areindividualswho work both offensively anddefensively at varioustime. • We cannotpredict their behavior • Sometimes they use their skills for the common good while in some other timeshe uses them for their personal gains.
  • 11. White-Hat Hackers • White hat hackersarethose individualsprofessinghacker skills andusing them orfor defensivepurposes. • Thismeans thatthe whitehat hackersuse their knowledge andskill for the good of others andfor the common good.
  • 12. What should do after hacked ?  Shutdown orturn off the system.  Separatethe system fromnetwork.  Restorethe systemwith the backupor reinstall all programs.  Not Connect the system to the network.  call the police.
  • 14. Foot Printing Scanning Gaining Access Maintaining Access Clearing Track
  • 15. Protection frompossible External Attacks Why do you need Ethical Hacking ?
  • 16. Eligibility of Ethical Hacking  It isimportantto havea Bachelor’s degree..  BSC  BTech  BE  BCA ininformationTechnology or computer science to become an ethicalhacker. Eligibility Criteria for certified Ethical Hacker ?
  • 17. Required skills of an Ethical Hacker  Microsoft:- Skillsin operation , configuration and management.  Linux:- Knowledge of Linux/Unix ; security settingconfiguration and services.  Firewalls:- Configurations and operation of intrusiondetection systems.  Routers:- Knowledge of routers , routing protocols and accesscontrol lists.  Mainframes:- Knowledge of mainframes.  Network Protocols:- TCP/IP; how they functionand can be manipulated.  Project Management:Leading, planning,organizing and controlling a penetration team.
  • 18. Advantages  Withthis you can recover yourlost information,especially when you forgetyour password.  Withthis wecanperform penetrationtestingso thatwe can check the strengthof anycomputer ornetwork security.  On learning this, wecanuse itto protect our computer from malicioushackers.
  • 19. Disadvantages  Firstof all, afterlearningEthical Hacking, people start doingwrongthingsin the greedof money.  Withthis wecangetunauthorized accessto someone’ssystem andknowtheir private information.  Withthis we canalso do privacyviolation  If used in reverse,then anysystem operation canalso be harmed.
  • 20. Future Enhancements  As it anevolving branchthe scope of enhancement in technology is immense.  NO ethicalhackercanensure the system security by usingthe same techniquerepeatedly.  More enhancedsoftware’sshould be usedfor optimum protection.
  • 21. Conclusion  In the precedingsections wesaw the methodology of hacking,why should we awareof hackingandsome tools which a hackermay use.  Nowwe cansee whatcan wedo againsthackingor to protect our selves from hacking.  Thefirstthing we should do is to keepourselves updatedaboutthose software’swe andusing for officialand reliable sources.  Educationthe employees andthe usersagainstblack hat hacking.