SlideShare a Scribd company logo
1 of 20
1 
BY KEVIN 
CHAKRE
1. Hack Value: It is the notion among Hackers that something doing is interesting or 
worthwhile. 
2. Exploit: A piece of software that takes advantage of a bug, glitch or vulnerability 
that leads to unauthorized access, privilege escalation or denial of service on 
computer systems and networks. 
3. Vulnerability: Existence of software flaws, logic design, implementation errors 
executing bad or damaging instructions to the system. 
2
4. Target of Evaluation: It is the system, product or network that is the subject of 
security analysis or attacks. 
5. Zero Day attacks: A computer threats that tries to exploit computer application 
vulnerabilities that are undisclosed to others or undisclosed to the software 
developer. 
6. Daisy chaining: Hackers who get away with database thefts usually complete their 
task and then backtrack to cover their tracks by destroying logs etc. 
3
7. Attack: An action or an event that might compromise security. 
8. Threat: An environment or a situation that might lead to potential breach of 
security. 
9. Vulnerability Research: It is the process of discovering vulnerabilities and design 
weakness that lead an operating systems or its application to attacks or misuse. 
10. Penetration Testing: It is the method of actively evaluating the security of a system 
by simulating an attack from malicious source. 
4
 Security is a state of well being of information and infrastructure in which the 
possibility of theft, tampering of disruption of services is kept low or tolerable. 
 It relies on the five major elements of security: 
1. Confidentiality: It is the assurance that the information is easily accessible to 
only those who are authorized to have access. Confidentiality breaches may occur 
due to improper data handling or hacking attempt. 
2. Integrity: It is the trustworthiness of data and resources in terms of preventing 
improper and unauthorized changes, the assurance that the information can be 
relied upon to be sufficiently accurate for its purposes 
5
3. Availability: It is the assurance that the systems responsible for storing, 
delivering and processing information is available to authorized users when 
required. 
4. Authenticity: It refers to the characteristics of any communication or any data 
that ensures the quality of being genuine or not corrupted from the original. 
Major roles of authenticity includes that the user is claiming he or she to be. This 
is done by Biometrics. Smart cards, digital certificates etc 
5. Non-repudiation: It ensures that the party to a contract or a communication 
cannot later deny the authenticity of their signature on a document or sending the 
message that they originated. It is a way to guarantee that the sender of the 
message cannot later deny having sent the message and the recipient cannot deny 
having received the message. 6
 Level of Security in any systems can be defined by the strength of the three 
components: 
Functionality(features) 
Moving the ball towards security means 
less of other two 
Security(restrictions) Usability(GUI) 
7
 An attack vector is a path or means by which an attacker can gain access to an 
information system to perform malicious attack. 
 This attack vector can enable an attacker to take advantage of the vulnerabilities 
present in the information system to carry out a particular attack. 
 The following are the possible attack vectors by which an attacker can attack on 
information system: 
8
9
 Information Security Threats are classified into three categories: 
1. Natural Threats: such as natural disasters such as flood, earthquakes . 
2. Physical Security Threats: such as errors, misconfiguration, sabotage . 
3. Human Threats: such as internal threats-disgruntled employees and external 
threats-malicious hackers 
10
 Human Threats are classified into three categories: 
1. Network Threats: such as Sniffing, MITM attacks, Information Gathering, 
Spoofing, ARP Poisoning. 
2. Host Threats: such as Unauthorized access, Password Attacks, Privilege 
Escalations. 
3. Application Threats: Cross Site Scripting, Buffer Overflows, SQL Injections. 
11
 The Term Information Warfare or Info-War refers to the use of information and 
communicative technology to take competitive advantage over an opponent. 
1. Defensive Information Warfare: refers to all the strategies and actions to 
defend against attacks on ICT assets. 
2. Offensive Information Warfare: refers to the Information warfare that involves 
attacks against ICT assets of an opponent. 
12
 Most people do not understand between hacking and Ethical hacking. 
 These two terms can be differentiated on the basis of the intentions of the people 
who are performing hacking activity. 
 However, understanding the true intentions of hackers can be quite difficult. 
 Hacking: refers to exploitation and exploration of the computer software and 
hardware to gain unauthorized access to perform malicious attacks. 
 Ethical Hacking: refers to exploitation and exploration of the computer software 
and hardware to make it more secure and ease of use. 
13
 A hacker is a person who illegally breaks into computer system or network 
without any authorization to steal or destroy data or perform malicious activities. 
 Hackers may be motivated by a multitude of reasons: 
1. Intelligent individuals with excellent computer skills with the ability to create and 
explore into computer software and hardware. 
2. For some hackers, hacking is a hobby to see how many systems or network they 
can compromise. 
3. Their intention can either be to gain knowledge or to poke around to do illegal 
things. 
4. Some hack with malicious intent such as stealing business data, credit card 
information and social security no. 
14
1. Black Hat: Individuals with extraordinary computer skills resorting to malicious 
activities are known as crackers. 
2. White Hat: Individuals professing hacker skills and using them for defensive 
purposes are known as security consultants. 
3. Grey hat: Individuals who work both offensively and defensively at various 
times. 
4. Suicide Hackers: Individuals who aim to bring down critical infrastructure for a 
cause and are not worried about facing thirty years in jail for their actions. 
15
5. Spy Hackers 
6. State Sponsored Hacker 
7. Cyber Terrorist 
 Technical Level Of Hackers: 
1. Neophyte: Newbie in the field of Security 
2. Script Kiddies: Person depending on other hackers, skills and scripts. 
3. Elite Hackers: Also Known as 1337. Advanced level of hackers. 
16
1. Hacktivism is an act of promoting political agenda especially by defacing or 
disabling websites. 
2. It thrives in the environment where information is easily accessible. 
3. Aims at sending message through their hacking activities and gaining visibility 
for a cause. 
4. Common targets include governments, multinational corporations or any other 
entity as perceived as bad or wrong by these groups of individuals. E.g. 
Anonymous and Lulzsec 
17
18
19
Platform Knowledge 
Network Knowledge Security Knowledge 
Technical Knowledge 
Computer Expert 
Programming Knowledge 
20 
“HACKERS ARE PEOPLE TOO”

More Related Content

What's hot

Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hackingCmano Kar
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - ExplainedGunjan Panara
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataLindsey Landolfi
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical HackingMasih Karimi
 

What's hot (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Computer security
Computer securityComputer security
Computer security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 

Similar to Introduction to Ethical Hacking

GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfAnanthReddy38
 
1 introit security
1 introit security1 introit security
1 introit securityricharddxd
 
Lab 3 Explore Social Engineering TechniquesIntroductionCybers.pdf
Lab 3 Explore Social Engineering TechniquesIntroductionCybers.pdfLab 3 Explore Social Engineering TechniquesIntroductionCybers.pdf
Lab 3 Explore Social Engineering TechniquesIntroductionCybers.pdflalitaggarwal627
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.Ni
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptxDrVPadmavathiAssocia
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscapecyberprosocial
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.pptEndAlk15
 

Similar to Introduction to Ethical Hacking (20)

GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdf
 
1 introit security
1 introit security1 introit security
1 introit security
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Lab 3 Explore Social Engineering TechniquesIntroductionCybers.pdf
Lab 3 Explore Social Engineering TechniquesIntroductionCybers.pdfLab 3 Explore Social Engineering TechniquesIntroductionCybers.pdf
Lab 3 Explore Social Engineering TechniquesIntroductionCybers.pdf
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
Network security
Network securityNetwork security
Network security
 
455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 

Recently uploaded

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 

Recently uploaded (20)

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 

Introduction to Ethical Hacking

  • 1. 1 BY KEVIN CHAKRE
  • 2. 1. Hack Value: It is the notion among Hackers that something doing is interesting or worthwhile. 2. Exploit: A piece of software that takes advantage of a bug, glitch or vulnerability that leads to unauthorized access, privilege escalation or denial of service on computer systems and networks. 3. Vulnerability: Existence of software flaws, logic design, implementation errors executing bad or damaging instructions to the system. 2
  • 3. 4. Target of Evaluation: It is the system, product or network that is the subject of security analysis or attacks. 5. Zero Day attacks: A computer threats that tries to exploit computer application vulnerabilities that are undisclosed to others or undisclosed to the software developer. 6. Daisy chaining: Hackers who get away with database thefts usually complete their task and then backtrack to cover their tracks by destroying logs etc. 3
  • 4. 7. Attack: An action or an event that might compromise security. 8. Threat: An environment or a situation that might lead to potential breach of security. 9. Vulnerability Research: It is the process of discovering vulnerabilities and design weakness that lead an operating systems or its application to attacks or misuse. 10. Penetration Testing: It is the method of actively evaluating the security of a system by simulating an attack from malicious source. 4
  • 5.  Security is a state of well being of information and infrastructure in which the possibility of theft, tampering of disruption of services is kept low or tolerable.  It relies on the five major elements of security: 1. Confidentiality: It is the assurance that the information is easily accessible to only those who are authorized to have access. Confidentiality breaches may occur due to improper data handling or hacking attempt. 2. Integrity: It is the trustworthiness of data and resources in terms of preventing improper and unauthorized changes, the assurance that the information can be relied upon to be sufficiently accurate for its purposes 5
  • 6. 3. Availability: It is the assurance that the systems responsible for storing, delivering and processing information is available to authorized users when required. 4. Authenticity: It refers to the characteristics of any communication or any data that ensures the quality of being genuine or not corrupted from the original. Major roles of authenticity includes that the user is claiming he or she to be. This is done by Biometrics. Smart cards, digital certificates etc 5. Non-repudiation: It ensures that the party to a contract or a communication cannot later deny the authenticity of their signature on a document or sending the message that they originated. It is a way to guarantee that the sender of the message cannot later deny having sent the message and the recipient cannot deny having received the message. 6
  • 7.  Level of Security in any systems can be defined by the strength of the three components: Functionality(features) Moving the ball towards security means less of other two Security(restrictions) Usability(GUI) 7
  • 8.  An attack vector is a path or means by which an attacker can gain access to an information system to perform malicious attack.  This attack vector can enable an attacker to take advantage of the vulnerabilities present in the information system to carry out a particular attack.  The following are the possible attack vectors by which an attacker can attack on information system: 8
  • 9. 9
  • 10.  Information Security Threats are classified into three categories: 1. Natural Threats: such as natural disasters such as flood, earthquakes . 2. Physical Security Threats: such as errors, misconfiguration, sabotage . 3. Human Threats: such as internal threats-disgruntled employees and external threats-malicious hackers 10
  • 11.  Human Threats are classified into three categories: 1. Network Threats: such as Sniffing, MITM attacks, Information Gathering, Spoofing, ARP Poisoning. 2. Host Threats: such as Unauthorized access, Password Attacks, Privilege Escalations. 3. Application Threats: Cross Site Scripting, Buffer Overflows, SQL Injections. 11
  • 12.  The Term Information Warfare or Info-War refers to the use of information and communicative technology to take competitive advantage over an opponent. 1. Defensive Information Warfare: refers to all the strategies and actions to defend against attacks on ICT assets. 2. Offensive Information Warfare: refers to the Information warfare that involves attacks against ICT assets of an opponent. 12
  • 13.  Most people do not understand between hacking and Ethical hacking.  These two terms can be differentiated on the basis of the intentions of the people who are performing hacking activity.  However, understanding the true intentions of hackers can be quite difficult.  Hacking: refers to exploitation and exploration of the computer software and hardware to gain unauthorized access to perform malicious attacks.  Ethical Hacking: refers to exploitation and exploration of the computer software and hardware to make it more secure and ease of use. 13
  • 14.  A hacker is a person who illegally breaks into computer system or network without any authorization to steal or destroy data or perform malicious activities.  Hackers may be motivated by a multitude of reasons: 1. Intelligent individuals with excellent computer skills with the ability to create and explore into computer software and hardware. 2. For some hackers, hacking is a hobby to see how many systems or network they can compromise. 3. Their intention can either be to gain knowledge or to poke around to do illegal things. 4. Some hack with malicious intent such as stealing business data, credit card information and social security no. 14
  • 15. 1. Black Hat: Individuals with extraordinary computer skills resorting to malicious activities are known as crackers. 2. White Hat: Individuals professing hacker skills and using them for defensive purposes are known as security consultants. 3. Grey hat: Individuals who work both offensively and defensively at various times. 4. Suicide Hackers: Individuals who aim to bring down critical infrastructure for a cause and are not worried about facing thirty years in jail for their actions. 15
  • 16. 5. Spy Hackers 6. State Sponsored Hacker 7. Cyber Terrorist  Technical Level Of Hackers: 1. Neophyte: Newbie in the field of Security 2. Script Kiddies: Person depending on other hackers, skills and scripts. 3. Elite Hackers: Also Known as 1337. Advanced level of hackers. 16
  • 17. 1. Hacktivism is an act of promoting political agenda especially by defacing or disabling websites. 2. It thrives in the environment where information is easily accessible. 3. Aims at sending message through their hacking activities and gaining visibility for a cause. 4. Common targets include governments, multinational corporations or any other entity as perceived as bad or wrong by these groups of individuals. E.g. Anonymous and Lulzsec 17
  • 18. 18
  • 19. 19
  • 20. Platform Knowledge Network Knowledge Security Knowledge Technical Knowledge Computer Expert Programming Knowledge 20 “HACKERS ARE PEOPLE TOO”