SlideShare a Scribd company logo
1 of 15
Hacking
Hacking is the act of identifying and then exploiting weaknesses in a computer system or network,
usually to gain unauthorized access to personal or organizational data
Ethical Hacking
• Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks,
and techniques that hackers use, but with one major difference that Ethical hacking is legal.
Independent computer security Professionals breaking into the computer systems. Neither damage
the target systems nor steal information. Evaluate target systems security and report back to owners
about the vulnerabilities found.
Types Of Hackers
1. Black Hat Hacker
2. White Hat Hacker
3. Grey Hat Hacker
Black Hat Hacker
• A black hat hackers are individuals with extraordinary computing
skills, resorting to malicious or destructive activities.
• That is black hat hackers use their knowledge and skill for their own
personal gains probably by hurting others.
White Hat Hacker
• White hat hackers are those individuals professing hacker skills and
using them for defensive purposes.
• This means that the white hat hackers use their knowledge and skill
for the good of others and for the common good.
Grey Hat Hackers
• These are individuals who work both offensively and defensively at
various times.
• We cannot predict their behavior.
• Sometimes they use their skills for the common good while in some
other times he uses them for their personal gains.
Types of Ethical Hacking
1
Infrastructure Testing
Assessing network security, checking for
vulnerabilities in important applications, and
identifying gaps in configuration management.
2
Web Application Testing
Checking for web application vulnerabilities
such as SQL injection, cross-site scripting,
improper error handling, and input validation
issues.
3
Wireless Network Testing
Detecting vulnerabilities in wireless networks,
compatibility of securities policies, and improper
configurations in hardware or software.
HACKING PROCESS
1. Foot printing and Reconnaissance
• Footprinting (also known as reconnaissance) is the technique used for gathering information about
computer systems
2. Scanning Networks
• Network scanning is a procedure for identifying active hot s on a network, either for the purpose of
attacking them or for network security assessment.
3. Gaining access
• Gaining access is the most important phase of an attack in terms of potential damage. Attackers
need not always gain acdamo the system to cause damage
4. Maintain access
• Once an attacker gains access to the target system, the attacker can choose to use both the
system and its resources, and further use the system as a launch pad to scan and exploit other
systems, or to keep a low profile and continue exploiting
5 . Clear track and logs
• An attacker would like to destroy evidence of his/her presence and activities for various reasons
such as maintaining access and evading punitive action. Erasing evidence of a compromise is
a requirement for any attacker who would like to remain obscure. This is one of the best methods to
evade trace back
TYPES OF ATTACKS
• Operating System a attack
• Dos attack (denial-of-service)
• DDos attack (distributed denial-of-service)
• Spoofing attack
• Password attack
• Application attack
• Identity attack
Tools Used in Ethical Hacking
nMap
A popular tool for network
exploration, management, and
security auditing.
Burp Suite
A comprehensive tool for web
application security testing that
includes multiple utilities, such
as a web proxy, scanner, and
intruder.
Metasploit
Metasploit is a popular
framework for developing and
executing exploits, it is used to
carry out penetration testing,
and vulnerability research.
Aircrack-ng
Aircrack-ng is a wireless
network security crack tool,
designed to detect and attack
weaknesses in wireless
networks.
WHY DO WE NEED ETHICAL HACKING
What we learn in Ethical Hacking
• Enumeration
• System Hacking
• Trojans and Backdoors
• Viruses and Worms
• Sniffers
• Social Engineering
• Denial of Service
• Session Hijacking
• Hacking Web Servers
• Hacking Web Applications
• SQL Injection
• Hacking Wireless Networks
• Hacking Mobile Platforms
• Evading IDS, Firewalls, and Honey pots
• Buffer Overflow
• Cryptography
• Penetration Testing
VULNERABILITY ??
• Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack.
* A vulnerability may also refer to any type of weakness in a computer system itself, in a set of
procedures, or in anything that leaves information security exposed to a threat.
Top 10 vulnerability's
A1-Injection . A2-Broken Authentication and Session Management. A3-Cross-Site Scripting (XSS)
A4-Insecure Direct Object References. A5-Security Misconfiguration. A6-Sensitive Data Exposure
A7-Missing Function Level Access Control. A8-Cross-Site Request Forgery (CSRF)
A9-Using Components with Known Vulnerabilities. A10-Unvalidated Redirects and Forwards
Bug Bounty.?
• A bug bounty is IT jargon for a reward given for finding and reporting a bug in a particular
software product. Many IT companies offer these types of incentives to drive product improvement
and get more interaction from end users or clients.
• A bug bounty is a reward provided by a company to someone who reports a bug in their software
product. Rewards can range from $25 to $50000’s of dollars depending on the severity of the
vulnerability.
• TOP 3 WEBSITES THAT PROVIDE BUG BOUNTY…..
→ www.openbugbounty.com
→ www.bugcrowd.com
→ www.hackerone.com
→ HALL OF FAME!!
→ GIFTS & REWARD
Advantages Disadvantages
→ Helps in closing the open holes in the system
network
→ Provides security to banking and financial
establishments
→ Prevents website defacements
→An evolving technique
→ All depends upon the trustworthiness of the
ethical hacker
→ Hiring professionals is expensive.
→As it an evolving branch the scope of
enhancement in technology is immense.
→ No ethical hacker can ensure the system
security by using the same technique repeatedl
‘
Conclusion
Ethical hacking is a crucial part of any security program, therefore it is
essential to understand both the benefits and limitations of its application. By
keeping up to date with the new tools and functionalities, ethical hacking can
help ensure that cybersecurity is always one step ahead of cybercrime.

More Related Content

Similar to Ethical Hacking justvamshi .pptx

Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerShivamSharma909
 
Vulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfVulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfMithunJV
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).pptGooglePay16
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 

Similar to Ethical Hacking justvamshi .pptx (20)

Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
Computer security
Computer securityComputer security
Computer security
 
Vulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfVulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Types of attack -Part2
Types of attack -Part2Types of attack -Part2
Types of attack -Part2
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 

Recently uploaded

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Ethical Hacking justvamshi .pptx

  • 1. Hacking Hacking is the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data Ethical Hacking • Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. Independent computer security Professionals breaking into the computer systems. Neither damage the target systems nor steal information. Evaluate target systems security and report back to owners about the vulnerabilities found.
  • 2. Types Of Hackers 1. Black Hat Hacker 2. White Hat Hacker 3. Grey Hat Hacker
  • 3. Black Hat Hacker • A black hat hackers are individuals with extraordinary computing skills, resorting to malicious or destructive activities. • That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others.
  • 4. White Hat Hacker • White hat hackers are those individuals professing hacker skills and using them for defensive purposes. • This means that the white hat hackers use their knowledge and skill for the good of others and for the common good.
  • 5. Grey Hat Hackers • These are individuals who work both offensively and defensively at various times. • We cannot predict their behavior. • Sometimes they use their skills for the common good while in some other times he uses them for their personal gains.
  • 6. Types of Ethical Hacking 1 Infrastructure Testing Assessing network security, checking for vulnerabilities in important applications, and identifying gaps in configuration management. 2 Web Application Testing Checking for web application vulnerabilities such as SQL injection, cross-site scripting, improper error handling, and input validation issues. 3 Wireless Network Testing Detecting vulnerabilities in wireless networks, compatibility of securities policies, and improper configurations in hardware or software.
  • 7. HACKING PROCESS 1. Foot printing and Reconnaissance • Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems 2. Scanning Networks • Network scanning is a procedure for identifying active hot s on a network, either for the purpose of attacking them or for network security assessment. 3. Gaining access • Gaining access is the most important phase of an attack in terms of potential damage. Attackers need not always gain acdamo the system to cause damage 4. Maintain access • Once an attacker gains access to the target system, the attacker can choose to use both the system and its resources, and further use the system as a launch pad to scan and exploit other systems, or to keep a low profile and continue exploiting 5 . Clear track and logs • An attacker would like to destroy evidence of his/her presence and activities for various reasons such as maintaining access and evading punitive action. Erasing evidence of a compromise is a requirement for any attacker who would like to remain obscure. This is one of the best methods to evade trace back
  • 8. TYPES OF ATTACKS • Operating System a attack • Dos attack (denial-of-service) • DDos attack (distributed denial-of-service) • Spoofing attack • Password attack • Application attack • Identity attack
  • 9. Tools Used in Ethical Hacking nMap A popular tool for network exploration, management, and security auditing. Burp Suite A comprehensive tool for web application security testing that includes multiple utilities, such as a web proxy, scanner, and intruder. Metasploit Metasploit is a popular framework for developing and executing exploits, it is used to carry out penetration testing, and vulnerability research. Aircrack-ng Aircrack-ng is a wireless network security crack tool, designed to detect and attack weaknesses in wireless networks.
  • 10. WHY DO WE NEED ETHICAL HACKING
  • 11. What we learn in Ethical Hacking • Enumeration • System Hacking • Trojans and Backdoors • Viruses and Worms • Sniffers • Social Engineering • Denial of Service • Session Hijacking • Hacking Web Servers • Hacking Web Applications • SQL Injection • Hacking Wireless Networks • Hacking Mobile Platforms • Evading IDS, Firewalls, and Honey pots • Buffer Overflow • Cryptography • Penetration Testing
  • 12. VULNERABILITY ?? • Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack. * A vulnerability may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves information security exposed to a threat. Top 10 vulnerability's A1-Injection . A2-Broken Authentication and Session Management. A3-Cross-Site Scripting (XSS) A4-Insecure Direct Object References. A5-Security Misconfiguration. A6-Sensitive Data Exposure A7-Missing Function Level Access Control. A8-Cross-Site Request Forgery (CSRF) A9-Using Components with Known Vulnerabilities. A10-Unvalidated Redirects and Forwards
  • 13. Bug Bounty.? • A bug bounty is IT jargon for a reward given for finding and reporting a bug in a particular software product. Many IT companies offer these types of incentives to drive product improvement and get more interaction from end users or clients. • A bug bounty is a reward provided by a company to someone who reports a bug in their software product. Rewards can range from $25 to $50000’s of dollars depending on the severity of the vulnerability. • TOP 3 WEBSITES THAT PROVIDE BUG BOUNTY….. → www.openbugbounty.com → www.bugcrowd.com → www.hackerone.com → HALL OF FAME!! → GIFTS & REWARD
  • 14. Advantages Disadvantages → Helps in closing the open holes in the system network → Provides security to banking and financial establishments → Prevents website defacements →An evolving technique → All depends upon the trustworthiness of the ethical hacker → Hiring professionals is expensive. →As it an evolving branch the scope of enhancement in technology is immense. → No ethical hacker can ensure the system security by using the same technique repeatedl ‘
  • 15. Conclusion Ethical hacking is a crucial part of any security program, therefore it is essential to understand both the benefits and limitations of its application. By keeping up to date with the new tools and functionalities, ethical hacking can help ensure that cybersecurity is always one step ahead of cybercrime.