SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Overview of Hacking.
Hacker.
Types of Hacker .
Why do Hacker hacks?
How do Hacker hacks?
Hacker’s language.
Ethical Hacking and it’s Process.
Skills of an Ethical Hackers.
Prevention of Hacking.
What should do after Hacked ?
The term “Hack” was first used by US university staff
in mid-1960s.
When eBay was first attacked in Feb-2000 it’s
server was bombarded with fake request for web
pages & overloaded the site.
A group of teenagers once hacked into AOL and stole
credit cards to buy Video Games.
In 1998,teenagers hack into Bell Atlantic phone
Hack:

Eric Raymond compiler of the “The new
Hacker’s Dictionary", defines a hacker as a
claver programmer.
A ‘good hack’ is a clever solution to a
programming problem.
Hacking:

Hacking is act of doing it.
Cracker :
A person who enjoys learning
language or system.
A person who
actually doing the
programming rather then just
about
it.
A person capable of appreciating some once
else’s Hacking.
Black hat
Hackers

White hat
Hackers.

Grey hat
Hackers.
A black hat is the villain or bad guys.
Use computer to attack systems for profit, for
revenge, or for political mitigations.
Black hat hackers always do Illegal work.
They work for black money.
They are professional in their field.
They use their knowledge for illegal purpose.
Kevin Poulsen
Kevin d mitnick
Adrain Lamo
Georje Hotz
Jonathan James
White hat hackers like Ethical hackers. They use
their skills for good purposes.
They work for organizations for stop the illegal
activities through Black Hat Hackers.
They works to ensure the security of an
Ankit Fadia
Tim Berner Lee
Bill Gates
Linus Tovaldes
Steve Jobes
Steve wozniak
To make Security Stronger (Ethical Hacking).
Just for fun.
Show off.
Hack other System secretly.
Notify many people their thoughts.
Steel important information.
Destroy enemy’s computer network during war.
E-mail Hacking.
System Hacking.
Network Hacking.
Trojans Horses.
Website Hacking.
Software Hacking.
1 ->i or l
3 ->e
4 ->a
7 ->t
9 ->g
0 ->o
$ ->s
L ->i or I

|| ->n
|V| ->m
S ->z
Z ->s
f ->ph
Ph ->f
EX:1 d1d n0t h4ck th1s p4g3, 1t w4s I1k3 th1s wh3n
1 h4ck3d 1n.(Encrypted )

I did not hack this page, it was this when I
It is legal.
Permission is obtained from the target.
Also called – Attack & penetration testing, white hat
hacking.
Part of an overall security program.
Perform most of the same activities but with owner’s
permission.
CEH
The Certified Ethical Hacker(CEH) is a
professional certification provided by the
International Council of E-commerce
consultants(EC-Council).
Information gathering
Scanning
Analyse system
Prepare for attack
Access the system
Maintaining Access
Good Coder.
Well knowledgeable person both hard ware as well as
software like:
Routers
Microsoft
Linux
Firewalls
Network protocols
Should have knowledge on security system.
Shutdown the system
Or turn off the system.
Separate the system from network
Restore the system with the backup
Or reinstall all programs.
Connect the system to the network
Ethical hacking by chandra prakash upadhyay

Weitere ähnliche Inhalte

Was ist angesagt?

National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness programNeel Kamal
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in TeluguSravani Reddy
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all timePRESENTATIONSFORESL
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationLaura Platt
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker PlagueLuke Perrin
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Moduleankit sarode
 

Was ist angesagt? (20)

National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all time
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
Hacking Hacking
Hacking
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
hacking
hackinghacking
hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Ähnlich wie Ethical hacking by chandra prakash upadhyay

Ähnlich wie Ethical hacking by chandra prakash upadhyay (20)

Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking
HackingHacking
Hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Hacker culture
Hacker cultureHacker culture
Hacker culture
 
Hacking
Hacking Hacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
 

Kürzlich hochgeladen

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Ethical hacking by chandra prakash upadhyay

  • 1.
  • 2. Overview of Hacking. Hacker. Types of Hacker . Why do Hacker hacks? How do Hacker hacks? Hacker’s language. Ethical Hacking and it’s Process. Skills of an Ethical Hackers. Prevention of Hacking. What should do after Hacked ?
  • 3. The term “Hack” was first used by US university staff in mid-1960s. When eBay was first attacked in Feb-2000 it’s server was bombarded with fake request for web pages & overloaded the site. A group of teenagers once hacked into AOL and stole credit cards to buy Video Games. In 1998,teenagers hack into Bell Atlantic phone
  • 4. Hack: Eric Raymond compiler of the “The new Hacker’s Dictionary", defines a hacker as a claver programmer. A ‘good hack’ is a clever solution to a programming problem. Hacking: Hacking is act of doing it. Cracker :
  • 5. A person who enjoys learning language or system. A person who actually doing the programming rather then just about it. A person capable of appreciating some once else’s Hacking.
  • 7. A black hat is the villain or bad guys. Use computer to attack systems for profit, for revenge, or for political mitigations. Black hat hackers always do Illegal work. They work for black money. They are professional in their field. They use their knowledge for illegal purpose.
  • 8. Kevin Poulsen Kevin d mitnick Adrain Lamo Georje Hotz Jonathan James
  • 9. White hat hackers like Ethical hackers. They use their skills for good purposes. They work for organizations for stop the illegal activities through Black Hat Hackers. They works to ensure the security of an
  • 10. Ankit Fadia Tim Berner Lee Bill Gates Linus Tovaldes Steve Jobes Steve wozniak
  • 11. To make Security Stronger (Ethical Hacking). Just for fun. Show off. Hack other System secretly. Notify many people their thoughts. Steel important information. Destroy enemy’s computer network during war.
  • 12. E-mail Hacking. System Hacking. Network Hacking. Trojans Horses. Website Hacking. Software Hacking.
  • 13. 1 ->i or l 3 ->e 4 ->a 7 ->t 9 ->g 0 ->o $ ->s L ->i or I || ->n |V| ->m S ->z Z ->s f ->ph Ph ->f
  • 14. EX:1 d1d n0t h4ck th1s p4g3, 1t w4s I1k3 th1s wh3n 1 h4ck3d 1n.(Encrypted ) I did not hack this page, it was this when I
  • 15.
  • 16. It is legal. Permission is obtained from the target. Also called – Attack & penetration testing, white hat hacking. Part of an overall security program. Perform most of the same activities but with owner’s permission.
  • 17. CEH
  • 18. The Certified Ethical Hacker(CEH) is a professional certification provided by the International Council of E-commerce consultants(EC-Council).
  • 19.
  • 20. Information gathering Scanning Analyse system Prepare for attack Access the system Maintaining Access
  • 21. Good Coder. Well knowledgeable person both hard ware as well as software like: Routers Microsoft Linux Firewalls Network protocols Should have knowledge on security system.
  • 22. Shutdown the system Or turn off the system. Separate the system from network Restore the system with the backup Or reinstall all programs. Connect the system to the network