SlideShare a Scribd company logo
1 of 14
PRESENTATION
Submitted to:
Submitted by:
Dr. Sanjay jain Vineet
Rajput Professor Dept. of CSE
BETN1CS22020
CONTENT
• INTRODUCTION
• TYPES OF HACKING
• ADVANTAGE/DISADVANTAGE
• APPLICATIONS/USES
• CONCLUSION
INTRODUCTION
• Ethical hacking involves an authorized attempt to gain unauthorized
access to a computer system, application, or data
• Carrying out an ethical hack involves duplicating actions of
malicious attackers.
• This practice helps to identify security vulnerabilities which can then
be resolved before a malicious attacker has the opportunity to exploit
them.
TYPES OF HACKING
• Website Hacking-: Hacking a website means taking unauthorized control
over a web server and its associated software such as databases and other
interfaces.
• Network Hacking-: Hacking a network means gathering information about a
network by using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with
the intent to harm the network system and hamper its operation.
• Email Hacking-: It includes getting unauthorized access on an Email account
and using it without taking the consent of its owner.
CONTINUE………..
• Ethical Hacking-: Ethical hacking involves finding weaknesses in a computer or
network system for testing purpose and finally getting them fixed.
• Password Hacking-: This is the process of recovering secret passwords from data
that has been stored in or transmitted by a computer system.
• Computer Hacking-: This is the process of stealing computer ID and password
by applying hacking methods and getting unauthorized access to a computer system.
ADVANTAGE/DISADVANTAGE
ADVANTAGE -:
• To recover lost information, especially in case you lost your password.
• To perform penetration testing to strengthen computer and network security.
• To put adequate preventative measures in place to prevent security breaches.
CONTINUE………..
DISADVANTAGE -:
• Massive security breach.
• Unauthorized system access on private information.
• Privacy violation.
• Hampering system operation.
• Malicious attack on the system.
APPLICATIONS/USES
1. Angry IP Scanner-: This is an open-source, cross-platform ethical hacking
application that can scan ports and IP addresses.
Features-:
 Analyzing local and internet networks.
 Can offer data in any format required.
 A Hacking application that is open-source and free.
 The result can be exported in any format.
CONTINUE………..
2. Nmap-: Information security experts utilize NetworkMapper (NMap), a free open
source ethical hacking application, to monitor and analyze network and
operating system security in local and remote locations.
Features-:
 Examine the security of the gadget.
 Identifying the presence of open ports on remote hosts.
 Network enumeration and mapping.
 Any network's faults can be discovered.
CONTINUE………..
3. Air crack -: Air crack is a popular ethical hacking app used by companies
worldwide. It can assist in breaking into vulnerable wireless networks.
The WPA 2 and WEP WPA encryption keys enable this utility.
Features-:
 Many cards or drivers are supported.
 Every operating system and device is supported.
 Fragmentation attacks are supported.
 WEP dictionary attacks are supported.
CONTINUE………..
4. Live Action-: One of the best ethical hacking apps available is LiveAction. Its
complete visibility tackles performance issues while also reducing
security vulnerabilities.
Features-:
 Software for network forensics that is both strong and easy to use.
 Live Action automates the gathering of network data required to assess security
alarms quickly.
 Software and integrated appliance solutions.
 Packet intelligence combines deep analysis and packet intelligence.
CONCLUSION
In today's digital landscape, ethical hacking is essential for organizations
to ensure the security and protection of their data and systems. It provides
numerous benefits and can help to prevent devastating consequences such
as data breaches and financial loss.
Ethical hacking presentation.pptx

More Related Content

Similar to Ethical hacking presentation.pptx

Final project.ppt
Final project.pptFinal project.ppt
Final project.pptshreyng
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET Journal
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and PatchingEmmanuel Udeagha B.
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Introduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf fileIntroduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf filedebmajumder741249
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxSuhailShaik16
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxAmardeepKumar621436
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfWajdiElhamzi3
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)SHUBHA CHATURVEDI
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).pptGooglePay16
 
Password sniffing
Password sniffingPassword sniffing
Password sniffingSRIMCA
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introductionjagadeesh katla
 
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptxDomain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptxInfosectrain3
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementMayur Nanotkar
 

Similar to Ethical hacking presentation.pptx (20)

Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and Patching
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Introduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf fileIntroduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf file
 
Types of attack -Part2
Types of attack -Part2Types of attack -Part2
Types of attack -Part2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdf
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
 
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptxDomain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 

Recently uploaded (20)

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 

Ethical hacking presentation.pptx

  • 1. PRESENTATION Submitted to: Submitted by: Dr. Sanjay jain Vineet Rajput Professor Dept. of CSE BETN1CS22020
  • 2.
  • 3. CONTENT • INTRODUCTION • TYPES OF HACKING • ADVANTAGE/DISADVANTAGE • APPLICATIONS/USES • CONCLUSION
  • 4. INTRODUCTION • Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data • Carrying out an ethical hack involves duplicating actions of malicious attackers. • This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.
  • 5. TYPES OF HACKING • Website Hacking-: Hacking a website means taking unauthorized control over a web server and its associated software such as databases and other interfaces. • Network Hacking-: Hacking a network means gathering information about a network by using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation. • Email Hacking-: It includes getting unauthorized access on an Email account and using it without taking the consent of its owner.
  • 6. CONTINUE……….. • Ethical Hacking-: Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed. • Password Hacking-: This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. • Computer Hacking-: This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system.
  • 7. ADVANTAGE/DISADVANTAGE ADVANTAGE -: • To recover lost information, especially in case you lost your password. • To perform penetration testing to strengthen computer and network security. • To put adequate preventative measures in place to prevent security breaches.
  • 8. CONTINUE……….. DISADVANTAGE -: • Massive security breach. • Unauthorized system access on private information. • Privacy violation. • Hampering system operation. • Malicious attack on the system.
  • 9. APPLICATIONS/USES 1. Angry IP Scanner-: This is an open-source, cross-platform ethical hacking application that can scan ports and IP addresses. Features-:  Analyzing local and internet networks.  Can offer data in any format required.  A Hacking application that is open-source and free.  The result can be exported in any format.
  • 10. CONTINUE……….. 2. Nmap-: Information security experts utilize NetworkMapper (NMap), a free open source ethical hacking application, to monitor and analyze network and operating system security in local and remote locations. Features-:  Examine the security of the gadget.  Identifying the presence of open ports on remote hosts.  Network enumeration and mapping.  Any network's faults can be discovered.
  • 11. CONTINUE……….. 3. Air crack -: Air crack is a popular ethical hacking app used by companies worldwide. It can assist in breaking into vulnerable wireless networks. The WPA 2 and WEP WPA encryption keys enable this utility. Features-:  Many cards or drivers are supported.  Every operating system and device is supported.  Fragmentation attacks are supported.  WEP dictionary attacks are supported.
  • 12. CONTINUE……….. 4. Live Action-: One of the best ethical hacking apps available is LiveAction. Its complete visibility tackles performance issues while also reducing security vulnerabilities. Features-:  Software for network forensics that is both strong and easy to use.  Live Action automates the gathering of network data required to assess security alarms quickly.  Software and integrated appliance solutions.  Packet intelligence combines deep analysis and packet intelligence.
  • 13. CONCLUSION In today's digital landscape, ethical hacking is essential for organizations to ensure the security and protection of their data and systems. It provides numerous benefits and can help to prevent devastating consequences such as data breaches and financial loss.