SlideShare a Scribd company logo
1 of 30
TERM PAPER 
ON 
ETHICAL HACKING 
PRESENTED BY : 
PRUDHVI RAJ 
IT-1 
13501A1249
WHAT IS HACKING ? 
• Hacking is the intentional unauthorized access to 
computer systems 
– Illegal activities from harmless pranks to huge 
thefts and 
– shutdowns of services 
• Traditionally hacking refers to the hobby/profession of 
working with computers. 
• But now a days it refers to breaking into computer 
systems.
HISTORY OF HACKING 
• The first hacker was appeared in 1960’s at the Massachusetts 
Institute of Technology(MIT) . 
• During the 1970’s , a different kind of hacker appeared : Phone 
Phreaker or Phone Hacker. 
• In the 1980’s, phreaks started to migrate to computers 
and the first Bulletin Board System(BBS) appeared. 
• During the 1990’s, when the use of internet wide spread around the 
world, hackers multipiled.
ETHICAL 
HACKING
What is ethical hacking 
• BASIC MEANING : 
In simple words Ethical Hacking is testing the resources for a good cause and for the 
betterment of technology. It also means to secure the system. 
• TECHNICAL MEANING : 
Technically Ethical Hacking is done by a computer hacker who is hired by an 
organization to undertake non malicious hacking work in order to discover computer-security 
flaws. 
WHO ARE ETHICAL HACKERS??? 
• Completely trustworthy. 
• Strong programming and computer 
networking skills. 
• Technique of criminal hackers- 
Detection-Prevention. 
• Ethical hackers possess same skills , 
mind set and tools of a hacker but 
the attacks are done in a non 
destructive manner.
Hacking Process 
Footprinting 
Scanning 
Enumeration 
Escalating 
Privilege, Covering 
Tracks and 
Creating 
Backdoors 
Attack and 
Gaining 
Access
TYPES OF HACKING 
->Website hacking. ->Email hacking. 
->Network hacking. ->Password hacking. 
->online transactions hacking. ->Computer hacking. 
->Mobile hacking. ->PDA hacking. 
->Metropolitan system hacking. 
WHY DO HACKERS HACK? 
• Just for fun. 
• Hack other systems secretly. 
• Notify many people their thought. 
• Steal important information. 
• Destroy enemy’s computer network 
during the war
CONSEQUENCES OF 
ILLEGAL HACKING 
• Thousands of dollars in fines. 
• Imprisonment. 
• Seizure of your computer.
IS HACKING A CRIME??
TYPES OF HACKERS
Black hats 
•Very dangerous persons. 
•Always have motive to earn huge profits. 
•Highly paid persons. 
•Evolves themselves mostly in criminal 
activities. 
•These could be CODERS & ADMINS. 
•As well as SCRIPT KIDDIES.
White hats 
•These are good hackers. 
•Have genuine license to hack. 
•Have registered police records. 
•Evolves themselves in good works. 
•Generally owned by companies for 
security designing. 
•Have high pay scales. 
•Generally these are CODERS.
GREY HATS 
•Also known as RED HATS. 
•Perform both tasks fair and unfair. 
•Generally these are ADMINS. 
•Have little high pay than white hats. 
•Generally not so dangerous but some 
times it could be.
Advantages 
These are good hackers 
Have genuine license to hack 
Have registered police records
AGednvearnaltlya gowense :d by companies for 
security designing 
They have high salaries
YOU HAVE BEEN
WHAT TO DO AFTER 
BEING HACKED? 
• Shut down the system. 
• Clear the memory using cleaners (like C Cleaner). 
• Scan infected sections with good antivirus. 
• Separate the system from network (do not use 
internet) 
• Restore the system with the back up. (if o/s 
problem) 
• Finally , connect the system to the network.
HOW CAN BE A REAL HACKER 
• Study C/C++/Assembly language. 
• Study computer architecture. 
• Study operating system. 
• Study computer network. 
• Examine the hacking tools for a month. 
• Think the problem of a computer. 
SECURITY & COUNTER MEASURES: 
• Use of Antivirus. 
• Proper logout after proper 
use of mail id. 
• Manual opening browser. 
• Don’t open spam. 
• Password protected admin 
account.
Did you know ? 
• Social networking sites like 
‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 
60% of direct or indirect hacking incidents. 
• The average age group of hackers are aged 
between 14-24 yrs. …
Job of each hacker: 
• The White Hat Approach: 
This is a more deterministic plan 
of attack than the Black Box 
one. 
C 
y 
b 
e 
r 
c 
ri 
m 
e 
IN THE WORLD..
WORLD FAMOUS HACKERS 
Stephen wozniac Tsutomu shimomura 
Kevin mitnick Kevin poulsen
HOW TO PREVENT HACKERS 
Change your password everymonth 
Install a firewall on your computer 
Purchase or download antivirus 
software 
Install antispyware program onto your 
computer
CONCLUSION 
From a practical standpoint the security 
problem will remain as long as manufacturers 
remain committed to current system. 
Regular auditing, vigilant intrusion detection, 
good system administration practice and 
computer security awareness are all essential 
parts of an organization’s security efforts.
ANY QUERIES???
Hacking (1)

More Related Content

What's hot

What's hot (20)

ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Hackers
HackersHackers
Hackers
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Hacking
Hacking Hacking
Hacking
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Web defacement
Web defacementWeb defacement
Web defacement
 

Similar to Hacking (1)

Similar to Hacking (1) (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
hacking
hackinghacking
hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Hacking
HackingHacking
Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 

Hacking (1)

  • 1. TERM PAPER ON ETHICAL HACKING PRESENTED BY : PRUDHVI RAJ IT-1 13501A1249
  • 2.
  • 3. WHAT IS HACKING ? • Hacking is the intentional unauthorized access to computer systems – Illegal activities from harmless pranks to huge thefts and – shutdowns of services • Traditionally hacking refers to the hobby/profession of working with computers. • But now a days it refers to breaking into computer systems.
  • 4.
  • 5. HISTORY OF HACKING • The first hacker was appeared in 1960’s at the Massachusetts Institute of Technology(MIT) . • During the 1970’s , a different kind of hacker appeared : Phone Phreaker or Phone Hacker. • In the 1980’s, phreaks started to migrate to computers and the first Bulletin Board System(BBS) appeared. • During the 1990’s, when the use of internet wide spread around the world, hackers multipiled.
  • 7. What is ethical hacking • BASIC MEANING : In simple words Ethical Hacking is testing the resources for a good cause and for the betterment of technology. It also means to secure the system. • TECHNICAL MEANING : Technically Ethical Hacking is done by a computer hacker who is hired by an organization to undertake non malicious hacking work in order to discover computer-security flaws. WHO ARE ETHICAL HACKERS??? • Completely trustworthy. • Strong programming and computer networking skills. • Technique of criminal hackers- Detection-Prevention. • Ethical hackers possess same skills , mind set and tools of a hacker but the attacks are done in a non destructive manner.
  • 8. Hacking Process Footprinting Scanning Enumeration Escalating Privilege, Covering Tracks and Creating Backdoors Attack and Gaining Access
  • 9. TYPES OF HACKING ->Website hacking. ->Email hacking. ->Network hacking. ->Password hacking. ->online transactions hacking. ->Computer hacking. ->Mobile hacking. ->PDA hacking. ->Metropolitan system hacking. WHY DO HACKERS HACK? • Just for fun. • Hack other systems secretly. • Notify many people their thought. • Steal important information. • Destroy enemy’s computer network during the war
  • 10.
  • 11. CONSEQUENCES OF ILLEGAL HACKING • Thousands of dollars in fines. • Imprisonment. • Seizure of your computer.
  • 12. IS HACKING A CRIME??
  • 14. Black hats •Very dangerous persons. •Always have motive to earn huge profits. •Highly paid persons. •Evolves themselves mostly in criminal activities. •These could be CODERS & ADMINS. •As well as SCRIPT KIDDIES.
  • 15. White hats •These are good hackers. •Have genuine license to hack. •Have registered police records. •Evolves themselves in good works. •Generally owned by companies for security designing. •Have high pay scales. •Generally these are CODERS.
  • 16. GREY HATS •Also known as RED HATS. •Perform both tasks fair and unfair. •Generally these are ADMINS. •Have little high pay than white hats. •Generally not so dangerous but some times it could be.
  • 17. Advantages These are good hackers Have genuine license to hack Have registered police records
  • 18. AGednvearnaltlya gowense :d by companies for security designing They have high salaries
  • 20. WHAT TO DO AFTER BEING HACKED? • Shut down the system. • Clear the memory using cleaners (like C Cleaner). • Scan infected sections with good antivirus. • Separate the system from network (do not use internet) • Restore the system with the back up. (if o/s problem) • Finally , connect the system to the network.
  • 21. HOW CAN BE A REAL HACKER • Study C/C++/Assembly language. • Study computer architecture. • Study operating system. • Study computer network. • Examine the hacking tools for a month. • Think the problem of a computer. SECURITY & COUNTER MEASURES: • Use of Antivirus. • Proper logout after proper use of mail id. • Manual opening browser. • Don’t open spam. • Password protected admin account.
  • 22. Did you know ? • Social networking sites like ‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 60% of direct or indirect hacking incidents. • The average age group of hackers are aged between 14-24 yrs. …
  • 23. Job of each hacker: • The White Hat Approach: This is a more deterministic plan of attack than the Black Box one. C y b e r c ri m e IN THE WORLD..
  • 24. WORLD FAMOUS HACKERS Stephen wozniac Tsutomu shimomura Kevin mitnick Kevin poulsen
  • 25.
  • 26.
  • 27. HOW TO PREVENT HACKERS Change your password everymonth Install a firewall on your computer Purchase or download antivirus software Install antispyware program onto your computer
  • 28. CONCLUSION From a practical standpoint the security problem will remain as long as manufacturers remain committed to current system. Regular auditing, vigilant intrusion detection, good system administration practice and computer security awareness are all essential parts of an organization’s security efforts.