This document discusses hackers and ethical hacking. It defines hackers as computer enthusiasts who use their skills for both legal and illegal purposes. Ethical hackers are employed by companies to test security vulnerabilities, while black-hat and grey-hat hackers engage in unauthorized hacking activities. The document outlines different types of hackers and their roles, as well as tools used in ethical hacking like Sam Spade to gather host information. The conclusion emphasizes the importance of understanding hacking techniques to strengthen security and prevent unauthorized access.
You all can infer what would be in the PPT from the title itself. In this PPT it is not told directly how to hack. Just a brief info of hacking and cyber security is given. How can one save himself/herself from becoming a victim of cybercrime? How to hack is given in my next PPT?
You all can infer what would be in the PPT from the title itself. In this PPT it is not told directly how to hack. Just a brief info of hacking and cyber security is given. How can one save himself/herself from becoming a victim of cybercrime? How to hack is given in my next PPT?
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...Intellipaat
In this session on White Hat vs Black Hat vs Grey Hat, you will learn what are White hat, grey hat, and black hat hackers, the difference between Black Hat, White Hat, Grey Hat, Cybersecurity, how to get started. This is a must-watch session for everyone who wishes to learn cybersecurity and make a career in it.
In this video we will try to explain the hackers and there basic difference and approach of different type of hackers. If you Interested to view the video then link of video or other documents below
➤YouTube Video:
↻ https://youtu.be/BHvzR2JkFvE
➤Research paper we follow:
↻ https://www.researchgate.net/publication/336242801_White_Hat_and_Black_Hat_-_The_thin_line_of_ethicsedited
➤Self Research paper:
↻ https://drive.google.com/file/d/14PbVExgT90zi_9UuublQWi2Yg7JcWdE3/view?usp=sharing
-----------------------------------------------------------------------------
************
Contact Me
************
https://www.youtube.com/bilalteach
bilalteach111@gmail.com
#bilalteach
*************************************************************************************
Different type of hackers
Ethical Hacking Concepts and Scopes, Threats and Attack Vectors, Information Assurance, Threat Modelling
Enterprise Information Security Architecture, Vulnerability
Assessment and Penetration Testing
Types of Social Engineering, Insider Attack, Preventing Insider
Threats, Social Engineering Targets and Defence Strategies
Hacking" is the word that shakes everyone whenever it is said or heard by someone. Everyone born in this world with attitude wants to be a Hacker. But it is not a job of a new born baby or an old grown lady. A Hacker needs a brilliant mind to hack anything. His skills should be so powerful that no other hacker can hack him. A Hacker doesn't need software to hack. There are many rules that he should learn to become an Ethical Hacker. These rules include knowledge of HTML, JavaScript, Computer Tricks, and Cracking & Breaking etc.
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...Intellipaat
In this session on White Hat vs Black Hat vs Grey Hat, you will learn what are White hat, grey hat, and black hat hackers, the difference between Black Hat, White Hat, Grey Hat, Cybersecurity, how to get started. This is a must-watch session for everyone who wishes to learn cybersecurity and make a career in it.
In this video we will try to explain the hackers and there basic difference and approach of different type of hackers. If you Interested to view the video then link of video or other documents below
➤YouTube Video:
↻ https://youtu.be/BHvzR2JkFvE
➤Research paper we follow:
↻ https://www.researchgate.net/publication/336242801_White_Hat_and_Black_Hat_-_The_thin_line_of_ethicsedited
➤Self Research paper:
↻ https://drive.google.com/file/d/14PbVExgT90zi_9UuublQWi2Yg7JcWdE3/view?usp=sharing
-----------------------------------------------------------------------------
************
Contact Me
************
https://www.youtube.com/bilalteach
bilalteach111@gmail.com
#bilalteach
*************************************************************************************
Different type of hackers
Ethical Hacking Concepts and Scopes, Threats and Attack Vectors, Information Assurance, Threat Modelling
Enterprise Information Security Architecture, Vulnerability
Assessment and Penetration Testing
Types of Social Engineering, Insider Attack, Preventing Insider
Threats, Social Engineering Targets and Defence Strategies
Hacking" is the word that shakes everyone whenever it is said or heard by someone. Everyone born in this world with attitude wants to be a Hacker. But it is not a job of a new born baby or an old grown lady. A Hacker needs a brilliant mind to hack anything. His skills should be so powerful that no other hacker can hack him. A Hacker doesn't need software to hack. There are many rules that he should learn to become an Ethical Hacker. These rules include knowledge of HTML, JavaScript, Computer Tricks, and Cracking & Breaking etc.
Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. Ethical hacking is performed with the target’s permission. The intent of ethical hacking is to discover vulnerabilities from a hacker’s viewpoint so systems can be better secured. Its part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors’ claims about the security of their products are legitimate.
I published a paper on "Ethical Hacking And Hacking Attacks". The purpose of the paper is to tell that what is hacking, who are hackers, their types and some hacking attacks performed by them. In the paper I also discussed that how these attacks are performed.
3. CONTENT
Introduction
Who Is An Hacker
Types Of Hackers
Roll Of Hackers
Ethical Hacking Tools
Conclusion
4. INTRODUCTION
The term “hack” was first used by US university
staff in mid-1960s .
Ethical hackers: Employed by companies to
perform Legal attempt to break into a company’s
network to find its weakest link. Ethical hackers are
typically have very strong programming and
computer networking skill.
Who Is an Hacker?
Hackers: are actually computer enthusiasts who
know a lot about computers and computer networks
and use this knowledge with a criminal intent.
5. Hacking, Is the act of gaining access
without legal authorization to a computer
or computer network or network
resources.
Ethical hacking: Is the use of hacking
knowledge to attempt to enter a
network to find its loopholes and back
doors.
6. TYPE OF HACKERS
Black-Hat Hackers: They engage in their
activities with bad intention and
perform illegal activities such as
defacing websites and destroying data.
They make changes in the loop and
as some time they delete it
for fun only. They are bad guys. They
are also called crackers.
7. White-Hat Hackers: Use their skills &
knowledge for good purpose .They helps in
finding the loop holes in the security of a
system/network/server. They are generally
called ethical hackers or penetration testers.
They are good guys.
Grey-Hat Hackers: Do not categorize their work
as good or bad. its comes in between
white and black hat, they also not have
authorization to bypass the security
mechanism of a system/server/network,
but they do it.
8. Roll of Hacker
Ethical hackers are motivated by different reasons, but
their purpose is usually the same as that of crackers:
Find out the frequent weaknesses in the security of target
systems.
Hackers: Access computer system or network without
authorization Breaks the law; can go to prison.
Ethical hacker, Performs most of the same activities but
with owner’s permission
9. Ethical hacking tools:
Ethical hackers utilize and have developed variety of tools
intrude into different kinds of systems and to evaluate the
security levels. The nature of these tools differs widely.
Sam spade:
Sam spade is a simple tool which provides information
about a particular host. This tool is very much helpful in
finding the addresses, phone number etc.
10. Conclusion
One of the main aim of these research is to make
others understand that, there are so many tools
through which a hacker can get into a system. Its
various perspectives.
Student
A student should understand that no software is
made with zero Vulnerability. So while they are
studying they should study the various possibilities
and should study how to prevent that because they
are the professionals of tomorrow