SlideShare a Scribd company logo
1 of 23
Hacking is identifying weakness in computers system or networks to exploit its weakness to gain
access.
Example of Hacking: Using password cracking algorithm to gain access to a system.
Hackers are usually skilled computer programmers with knowledge of Hackers are usually skilled
computer programmers with knowledge of computer security.
Hackers are classified according to the intent of their actions. The following list classifies hackers
according to their intent.
Hacking
Advantages
• To recover lost information, especially in
case you lost your password.
• To perform penetration testing to strengthen
computer and network security.
• To put adequate preventative measures in
place to prevent security breaches.
• To have a computer system that prevents
malicious hackers from gaining access.
Disadvantages
• Massive security breach.
• Unauthorized system access on private information.
• Privacy violation.
• Hampering system operation.
• Denial of service attacks.
• Malicious attack on the system
Purpose
• Just for fun
• Show-off
• Steal important information
• Damaging the system
• Hampering privacy
• Money extortion
• System security testing
• To break policy compliance
01
02
03
06
04
05
Websites Hacking
Hacking a website means taking unauthorized
control over a web server and its associated
software such as database and other interference
Network Hacking
Hacking a Network means gathering information
about Network by using tools like Telnet, NS
Lookup, Ping, Tracert, Netstat, etc with the intent
to harm the network system and hamper its
operation.
E- mail Hacking
It includes getting unauthorized access on an Email
account and using it without taking the consent of its
owner..
Computer Hacking
This is the process of stealing computer ID and password
by applying hacking methods and getting unauthorized
access to a computer system.
Password Hacking
This is the process of recovering secret passwords
from data that has been stored in or transmitted
by a computer system.
Ethical Hacking
Ethical hacking involves finding weaknesses in a
computer or network system for testing purpose and
finally getting them fixed.
Types of Hacking
White Hat Grey Hat Black Hat
• They never intent to harm a
system, rather they try to find
out weaknesses in a computer
or a network system as a part of
penetration testing and
vulnerability assessments.
• Ethical hacking is not illegal .
• Grey hat hackers are a blend of
both black hat and white hat
hackers.
• They act without malicious intent
but for their fun, they exploit a
security weakness in a computer
system or network without the
owner’s permission or
knowledge.
• those who hack in order to
gain unauthorized access to a
system and harm its
operations or steal sensitive
information.
• Black Hat hacking is always
illegal .
Types of Hackers
Red Hat hackers
Blue Hat hacker
Elite Hackers
Script Kiddie
Miscellaneous Hackers
Types of
Hackers
Neophyte Hacktivist
Miscellaneous Hackers
An ethical hacker must be a computer systems expert and needs to have very strong programming
and computer networking skills.
An ethical hacker needs to have a lot of patience, persistence, and perseverance to try again and
again and wait for the required result.
Often referred to as “ethical hackers”, white-hat hackers make the choice the use their knowledge and abilities for good,
instead of evil.
In some cases, white-hat hackers are paid employees or contractors that are hired to work for companies as security
experts. This type of white-hat hackers is usually referred to as a penetration tester, whose job it is to find vulnerabilities
in the computer infrastructure by hacking into it.
Typically, white-hat hackers use the exact same hacking techniques that a black-hat hacker would; however, the main
difference between the two is that white-hats hack into computer systems with explicit permission from the system’s
owner, making the process legal.
Essentially, white-hat hackers test security systems that are already in place to see where they can be improved.
 Malicious
 Most common hackers related to recent cybercrime news.
 Look for vulnerabilities.
• Individual PC
• Organization
• Bank System
 Use loopholes and hack into network to get access to personal, business and financial information.
 Agenda: Mostly monetary, but not always.
 Illegal actions with bad intention.
White Hat
• Quality Content
• Guest blogging
• Link Baiting
• Improving Content
• Redesigning Websites
• Researching and Analyzing
• Rewriting
• Internal Linking
Black Hat
• Hidden Text
• Keyword Stuffing
• Duplicate Content
• Link Farming
• Doorway Page
• Cloaking
• Parasites Hosting
• Scraping
Difference between White Hat and Black Hat SEO
Password guessing and cracking Session Hijacking
Techniques of Hacking
Network traffic
Sniffing
Denial of Services
Attacks
SQL Injection
Exploit buffer overflow
Vulnerabilities
Techniques
Session Spoofing
Reconnaissance
Ethical Hacking- Process
Reporting
Scanning
Maintaining Access
Gaining Access
Clearing Tracks
Raspberry Pi 3
Tools used for Ethical Hacking
Rubber Ducky
LAN Turtle
Wifi- Pineapple
• There’s no way around it: black hat hackers are criminals, and with damages mounting and these crimes
gaining increased attention, it won’t be long before cyber criminals are fully lumped in with your run-of-the-
mill criminals ranging from pickpockets and burglars to white collar fraudsters in the eyes of the public.
• Breaking the law, after all, is breaking the law, no matter how comfortable and convenient the internet has
made some of those illegal activities.But just because someone once dabbled (or more than dabbled) in black
hat hacking doesn’t mean he or she has to be considered a criminal for life.
• People with hacking skills – even those with black hat hacking pasts, like infamous Anonymous hacker Hector
Monsegur – are being fervently sought by businesses and organizations who want to put those skills to use in
securing their own networks and systems.
• Hackers using their powers for good to try and break into target systems in order to better secure those systems
are considered white hat hackers or ethical hackers, and with an ethical hacker
You need to stay as a White Hat Hacker which means you need to work within given boundaries.
Never intrude or attack any computer or network without a required permission from the authorities.
As a final note, it is highly recommended that you refrain from engaging yourself in black hat
hacking which may spoil your entire career.
Vivek
Ramachandran
Ankit Fadia
Sunny Vaghela
Trishneet Arora
List of Top 4 Ethical Hackers in India
Ethical Hackers
George Hotz
DVD- Jon
Gray
McKin
John Wu
Mudge
Barnaby Jack
Top 6 greatest Hacker in the World
Most Wanted Black Hat Hackers in FBI
Fu j ie Wan g
H o s s e i n P a r v a r
I g o r O l e g o v i n c h
Tu r a s h e v
Maksim Viktorovich
Yakubets
1 Anuj Kumar
2 Akshaan Raj
3 Milennium Adhayage
4 Sunipa Bera
-Geeksforgeek -hackersearth
-codechef
Biblography

More Related Content

Similar to hackers.pptx (20)

Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Hacking
HackingHacking
Hacking
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Hacking
HackingHacking
Hacking
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Final ethical hacking
Final ethical hackingFinal ethical hacking
Final ethical hacking
 
Web defacement
Web defacementWeb defacement
Web defacement
 
Hacking
HackingHacking
Hacking
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 

More from Sunipa Bera

Ds stack & queue
Ds   stack & queueDs   stack & queue
Ds stack & queueSunipa Bera
 
Constructor and Destructor
Constructor and DestructorConstructor and Destructor
Constructor and DestructorSunipa Bera
 
Proposition & Logical Operations
Proposition & Logical OperationsProposition & Logical Operations
Proposition & Logical OperationsSunipa Bera
 
Integral Calculas
Integral CalculasIntegral Calculas
Integral CalculasSunipa Bera
 
Basic concept of Engineering Mechanics
Basic concept of Engineering MechanicsBasic concept of Engineering Mechanics
Basic concept of Engineering MechanicsSunipa Bera
 
Biogeographical zones of India
Biogeographical zones of IndiaBiogeographical zones of India
Biogeographical zones of IndiaSunipa Bera
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application SecuritySunipa Bera
 
Types of Ecosystem
Types of EcosystemTypes of Ecosystem
Types of EcosystemSunipa Bera
 
Elementary transformation
Elementary transformationElementary transformation
Elementary transformationSunipa Bera
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional IntelligenceSunipa Bera
 
7 cs of effective communication
7 cs of effective communication 7 cs of effective communication
7 cs of effective communication Sunipa Bera
 
Basics of microprocessor
Basics of microprocessorBasics of microprocessor
Basics of microprocessorSunipa Bera
 
Functioning of computer
Functioning of computerFunctioning of computer
Functioning of computerSunipa Bera
 
INDIAN ISLAND STUDIES
INDIAN ISLAND STUDIESINDIAN ISLAND STUDIES
INDIAN ISLAND STUDIESSunipa Bera
 
GO GREEN - GO ECOFRIENDLY
GO GREEN - GO ECOFRIENDLYGO GREEN - GO ECOFRIENDLY
GO GREEN - GO ECOFRIENDLYSunipa Bera
 
INDIA AND HERITAGE
INDIA AND HERITAGEINDIA AND HERITAGE
INDIA AND HERITAGESunipa Bera
 
Happy birthday.rtf
Happy birthday.rtfHappy birthday.rtf
Happy birthday.rtfSunipa Bera
 

More from Sunipa Bera (20)

Ds stack & queue
Ds   stack & queueDs   stack & queue
Ds stack & queue
 
System tThreats
System tThreatsSystem tThreats
System tThreats
 
Constructor and Destructor
Constructor and DestructorConstructor and Destructor
Constructor and Destructor
 
Proposition & Logical Operations
Proposition & Logical OperationsProposition & Logical Operations
Proposition & Logical Operations
 
Integral Calculas
Integral CalculasIntegral Calculas
Integral Calculas
 
Basic concept of Engineering Mechanics
Basic concept of Engineering MechanicsBasic concept of Engineering Mechanics
Basic concept of Engineering Mechanics
 
Biogeographical zones of India
Biogeographical zones of IndiaBiogeographical zones of India
Biogeographical zones of India
 
Inflation
InflationInflation
Inflation
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
 
Types of Ecosystem
Types of EcosystemTypes of Ecosystem
Types of Ecosystem
 
Elementary transformation
Elementary transformationElementary transformation
Elementary transformation
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional Intelligence
 
SKYDRIVE
SKYDRIVESKYDRIVE
SKYDRIVE
 
7 cs of effective communication
7 cs of effective communication 7 cs of effective communication
7 cs of effective communication
 
Basics of microprocessor
Basics of microprocessorBasics of microprocessor
Basics of microprocessor
 
Functioning of computer
Functioning of computerFunctioning of computer
Functioning of computer
 
INDIAN ISLAND STUDIES
INDIAN ISLAND STUDIESINDIAN ISLAND STUDIES
INDIAN ISLAND STUDIES
 
GO GREEN - GO ECOFRIENDLY
GO GREEN - GO ECOFRIENDLYGO GREEN - GO ECOFRIENDLY
GO GREEN - GO ECOFRIENDLY
 
INDIA AND HERITAGE
INDIA AND HERITAGEINDIA AND HERITAGE
INDIA AND HERITAGE
 
Happy birthday.rtf
Happy birthday.rtfHappy birthday.rtf
Happy birthday.rtf
 

Recently uploaded

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

hackers.pptx

  • 1.
  • 2. Hacking is identifying weakness in computers system or networks to exploit its weakness to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system. Hackers are usually skilled computer programmers with knowledge of Hackers are usually skilled computer programmers with knowledge of computer security. Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.
  • 3. Hacking Advantages • To recover lost information, especially in case you lost your password. • To perform penetration testing to strengthen computer and network security. • To put adequate preventative measures in place to prevent security breaches. • To have a computer system that prevents malicious hackers from gaining access. Disadvantages • Massive security breach. • Unauthorized system access on private information. • Privacy violation. • Hampering system operation. • Denial of service attacks. • Malicious attack on the system Purpose • Just for fun • Show-off • Steal important information • Damaging the system • Hampering privacy • Money extortion • System security testing • To break policy compliance
  • 4. 01 02 03 06 04 05 Websites Hacking Hacking a website means taking unauthorized control over a web server and its associated software such as database and other interference Network Hacking Hacking a Network means gathering information about Network by using tools like Telnet, NS Lookup, Ping, Tracert, Netstat, etc with the intent to harm the network system and hamper its operation. E- mail Hacking It includes getting unauthorized access on an Email account and using it without taking the consent of its owner.. Computer Hacking This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system. Password Hacking This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. Ethical Hacking Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed. Types of Hacking
  • 5. White Hat Grey Hat Black Hat • They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments. • Ethical hacking is not illegal . • Grey hat hackers are a blend of both black hat and white hat hackers. • They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge. • those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information. • Black Hat hacking is always illegal . Types of Hackers
  • 6. Red Hat hackers Blue Hat hacker Elite Hackers Script Kiddie Miscellaneous Hackers
  • 8. An ethical hacker must be a computer systems expert and needs to have very strong programming and computer networking skills. An ethical hacker needs to have a lot of patience, persistence, and perseverance to try again and again and wait for the required result.
  • 9. Often referred to as “ethical hackers”, white-hat hackers make the choice the use their knowledge and abilities for good, instead of evil. In some cases, white-hat hackers are paid employees or contractors that are hired to work for companies as security experts. This type of white-hat hackers is usually referred to as a penetration tester, whose job it is to find vulnerabilities in the computer infrastructure by hacking into it. Typically, white-hat hackers use the exact same hacking techniques that a black-hat hacker would; however, the main difference between the two is that white-hats hack into computer systems with explicit permission from the system’s owner, making the process legal. Essentially, white-hat hackers test security systems that are already in place to see where they can be improved.
  • 10.  Malicious  Most common hackers related to recent cybercrime news.  Look for vulnerabilities. • Individual PC • Organization • Bank System  Use loopholes and hack into network to get access to personal, business and financial information.  Agenda: Mostly monetary, but not always.  Illegal actions with bad intention.
  • 11. White Hat • Quality Content • Guest blogging • Link Baiting • Improving Content • Redesigning Websites • Researching and Analyzing • Rewriting • Internal Linking Black Hat • Hidden Text • Keyword Stuffing • Duplicate Content • Link Farming • Doorway Page • Cloaking • Parasites Hosting • Scraping Difference between White Hat and Black Hat SEO
  • 12. Password guessing and cracking Session Hijacking Techniques of Hacking
  • 13. Network traffic Sniffing Denial of Services Attacks SQL Injection Exploit buffer overflow Vulnerabilities Techniques Session Spoofing
  • 15. Raspberry Pi 3 Tools used for Ethical Hacking Rubber Ducky LAN Turtle Wifi- Pineapple
  • 16. • There’s no way around it: black hat hackers are criminals, and with damages mounting and these crimes gaining increased attention, it won’t be long before cyber criminals are fully lumped in with your run-of-the- mill criminals ranging from pickpockets and burglars to white collar fraudsters in the eyes of the public. • Breaking the law, after all, is breaking the law, no matter how comfortable and convenient the internet has made some of those illegal activities.But just because someone once dabbled (or more than dabbled) in black hat hacking doesn’t mean he or she has to be considered a criminal for life. • People with hacking skills – even those with black hat hacking pasts, like infamous Anonymous hacker Hector Monsegur – are being fervently sought by businesses and organizations who want to put those skills to use in securing their own networks and systems. • Hackers using their powers for good to try and break into target systems in order to better secure those systems are considered white hat hackers or ethical hackers, and with an ethical hacker
  • 17. You need to stay as a White Hat Hacker which means you need to work within given boundaries. Never intrude or attack any computer or network without a required permission from the authorities. As a final note, it is highly recommended that you refrain from engaging yourself in black hat hacking which may spoil your entire career.
  • 18. Vivek Ramachandran Ankit Fadia Sunny Vaghela Trishneet Arora List of Top 4 Ethical Hackers in India Ethical Hackers
  • 19. George Hotz DVD- Jon Gray McKin John Wu Mudge Barnaby Jack Top 6 greatest Hacker in the World
  • 20. Most Wanted Black Hat Hackers in FBI Fu j ie Wan g H o s s e i n P a r v a r I g o r O l e g o v i n c h Tu r a s h e v Maksim Viktorovich Yakubets
  • 21. 1 Anuj Kumar 2 Akshaan Raj 3 Milennium Adhayage 4 Sunipa Bera
  • 22.