SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Presentation Developed By Harshit Upadhyay(Hellhacker119)
About The Presentation..
Hello In This Presentation I Harshit Upadhyay Will Be Telling You The
Basics Of Ethical Hacking And Who Is A Hacker Anyhow. This
Presentation Will Give You An Idea About What Actually And
Fundamentally Hacking Is And Why Most Of The People Consider It As
A Crime. It Will Logically Helps You In Differentiating Between A Hacker
And A Cracker. The Presentation Will Show The Real Concepts Of
Hacking, How To's And Of Course How To Be AWARE OF HACKERS.
What actually Ethical Hacking is ?
Generally describing hacking is just like describing earth. Hacking as a
matter of fact don’t have any definition.so we can say that it is a
mixture of two terms “Ethical” and “hacking” where “ethical” refers to
good purpose and “hacking” as a computer related term means
breaking or entering Into a remote computer illegally. Now by joining
the following teems we explored that ethical hacking is actually
breaking into another computer system illegally but for good or ethical
reason.
Hacking A Crime Or Not!
• Hmm.This Is The Most Prominent Question Asked By People To A
Hacker, But An Elite Hacker Will Only Give Answer As No.This Is
Because Hacking Itself Is Not A Crime But Thinking Of The People
Make It So.Hacking According To Me Is Not A Crime Its Just Made
Crime By Some Foolish People. However The Hacking Done For Bad
Purpose Is Eventually Known As Cracking. So We Will Later Detail
About Hacking And Cracking But Now It Is Good To Understand That
Hacking Is not A Crime While Cracking Is So.
Who Are Hackers And Crackers..
“Hacker”
• Hacker is a person who breaks into another computer
system illegally by penetrating the security of a user and
then using the leaked information for either a good
purpose or for a bad purpose.*
• As I said there is no perfect reason for a hacker to hack a
computer. The reason behind is in the next slide.

“Cracker”

• Cracker are the BAD guys who just to hacking for
the purpose of enjoyment and for enhancing their
knowledge of exploitation. A cracker would do
hacking for the following reasons:
• Taking revenge.
• Streanghthing his hacking abilities.
• Way to become a famous person or hacker or
criminal.
• Enjoying the knowledge which he have.
Who is a hacker and an ethical
hacker.
• The Basic Thing That Is Conveyed Is The Slide Is Simply :
Hacker : A Person Doing Hacking For Bad Purpose. Example Includes
All The Acts That Are Performed By A Cracker.
Ethical Hacker : A Person Doing Hacking For Good Purpose. Example
Are:
• For Ensuring The Security Of A System Or A Network.
• For Supporting Public And Government Bodies.
• For Decoding Or Decrypting A Encrypted Message.
• For Helping The Counter Terrorist Organization.
Importance of Ethical Hacking..
Ethical Hacking Is Extremely Important Thing In This Era Of Computers
And Robotics, One Must Know What Is Hacking How To Prevent Or
Overcome It If One Is Victim. In The Current Time Ethical Hacking Plays
A Key Role In :
• Providing Security To The Important People Or Places.
•Protecting Yourself From Becoming A Victim Of Hacking By Either
Hacking Your Email Account On A Social Networking Site Or By Sending
You A Malicious File Or Programe,etc.
•Providing Security To The Common People Who Are Not So Aware Of
This. Example Banks, Offices Etc.
Two Legends Of Hacking..
Almost Every Successful Computer Businessmen Would Be An Hacker
In Their Time. The Best Known Example Them Is About A 13 Year Boy
Of US Who With Is His Other Hacker Friend Used To Relish
Programming And Hacking. They Both Were Extremely Intelligent And
Had Perfect Skills. They Always Enjoyed Breaking Into Each Other’s
Computer And Proving Their Superiority.
Today Most Of The People Know Them As Bill Gates And Paul Allen
Founder And Co-founder Of The Microsoft Corp, Usa.Both Of Them As
Most Of You Must Be Knowing Are Practically Zillionaires.
Steps to be secure of hacking ,,:
• Protect Your Computer.(Antiviruses And Antispyware's)
• Have A Secure Password.(Complicated But Easy To Remember)
• Your Email ID And Its Password Are Your Own Confidential Information.
• If You Are A Victim Of Such A Scenario, Please Contact The Respective
Company Immediately.
• If You Are Ever Asked For Your Password In An Unsolicited Manner Or By
Someone You Do Not Believe To Be Any Representative.
• You Should Change The Security Questions And Answers Wisely.
• I Strongly Recommend You All To Never Click On A Spammy Link And Doubtful
Ad Banners!
How to do Hacking??
Now This Is Also One Of The Most Frequently Asked Question By The
People To Hacker. Everybody Viewing This Presentation Are Eager To
Know How To Hack. So Before Proceeding Let Me Tell You The Thing
That Hacking Is And Always Will Lead To A Particular Goal.So To Hack
Anything One Must Have A Goal Of What He Is Hacking, Why And Well
Plan Of How He Will Hack.
Now There Are Few Steps That I Am Going To Tell You Which Will Give
You The Basic Idea Of Hacking And After That You All Will Be Able To
Understand Hacking And Stop Asking People How To Hack.
Steps to hack a computer…
• First of all decide what you need to decide what you are actually
going to hack.
• After thinking the goal you must need to plan the attack, language
and what OS you are going to use during hacking.
• You must need to get the information about the system and owner of
the system that you are going to hack.
• Then if it is possible try to apply some brain or in the technical term
Social Engineering.
• Finally after thinking all these attack the victim but note that the
attack is for a positive purpose.
Presentation Developed By Harshit Upadhyay(Hellhacker119)

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingNitish Kasar
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentationGeorgekutty Francis
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking Amol Deshmukh
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingSanu Subham
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayChandra Prakash
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Moduleankit sarode
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Esteban
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker PlagueLuke Perrin
 

Was ist angesagt? (20)

Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
hacking
hackinghacking
hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
 

Andere mochten auch

Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksSrikanth VNV
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 

Andere mochten auch (8)

Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Hacking
HackingHacking
Hacking
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 

Ă„hnlich wie Ethical hacking

Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its termskunalverma12345
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
E thical hacking
E thical hackingE thical hacking
E thical hackingCookie Tuazon
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605RAKESH SHARMA
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)DeepHaria4
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingS Sai Karthik
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfIndianArmy38
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfIndianArmy38
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptxambemPrashanthi
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speechtalhaabid
 

Ă„hnlich wie Ethical hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
ethics final project
ethics final projectethics final project
ethics final project
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
 
hackers
hackershackers
hackers
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Hacking
HackingHacking
Hacking
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 

KĂĽrzlich hochgeladen

WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

KĂĽrzlich hochgeladen (20)

WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Ethical hacking

  • 1. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 2. About The Presentation.. Hello In This Presentation I Harshit Upadhyay Will Be Telling You The Basics Of Ethical Hacking And Who Is A Hacker Anyhow. This Presentation Will Give You An Idea About What Actually And Fundamentally Hacking Is And Why Most Of The People Consider It As A Crime. It Will Logically Helps You In Differentiating Between A Hacker And A Cracker. The Presentation Will Show The Real Concepts Of Hacking, How To's And Of Course How To Be AWARE OF HACKERS.
  • 3. What actually Ethical Hacking is ? Generally describing hacking is just like describing earth. Hacking as a matter of fact don’t have any definition.so we can say that it is a mixture of two terms “Ethical” and “hacking” where “ethical” refers to good purpose and “hacking” as a computer related term means breaking or entering Into a remote computer illegally. Now by joining the following teems we explored that ethical hacking is actually breaking into another computer system illegally but for good or ethical reason.
  • 4. Hacking A Crime Or Not! • Hmm.This Is The Most Prominent Question Asked By People To A Hacker, But An Elite Hacker Will Only Give Answer As No.This Is Because Hacking Itself Is Not A Crime But Thinking Of The People Make It So.Hacking According To Me Is Not A Crime Its Just Made Crime By Some Foolish People. However The Hacking Done For Bad Purpose Is Eventually Known As Cracking. So We Will Later Detail About Hacking And Cracking But Now It Is Good To Understand That Hacking Is not A Crime While Cracking Is So.
  • 5. Who Are Hackers And Crackers.. “Hacker” • Hacker is a person who breaks into another computer system illegally by penetrating the security of a user and then using the leaked information for either a good purpose or for a bad purpose.* • As I said there is no perfect reason for a hacker to hack a computer. The reason behind is in the next slide. “Cracker” • Cracker are the BAD guys who just to hacking for the purpose of enjoyment and for enhancing their knowledge of exploitation. A cracker would do hacking for the following reasons: • Taking revenge. • Streanghthing his hacking abilities. • Way to become a famous person or hacker or criminal. • Enjoying the knowledge which he have.
  • 6. Who is a hacker and an ethical hacker. • The Basic Thing That Is Conveyed Is The Slide Is Simply : Hacker : A Person Doing Hacking For Bad Purpose. Example Includes All The Acts That Are Performed By A Cracker. Ethical Hacker : A Person Doing Hacking For Good Purpose. Example Are: • For Ensuring The Security Of A System Or A Network. • For Supporting Public And Government Bodies. • For Decoding Or Decrypting A Encrypted Message. • For Helping The Counter Terrorist Organization.
  • 7. Importance of Ethical Hacking.. Ethical Hacking Is Extremely Important Thing In This Era Of Computers And Robotics, One Must Know What Is Hacking How To Prevent Or Overcome It If One Is Victim. In The Current Time Ethical Hacking Plays A Key Role In : • Providing Security To The Important People Or Places. •Protecting Yourself From Becoming A Victim Of Hacking By Either Hacking Your Email Account On A Social Networking Site Or By Sending You A Malicious File Or Programe,etc. •Providing Security To The Common People Who Are Not So Aware Of This. Example Banks, Offices Etc.
  • 8. Two Legends Of Hacking.. Almost Every Successful Computer Businessmen Would Be An Hacker In Their Time. The Best Known Example Them Is About A 13 Year Boy Of US Who With Is His Other Hacker Friend Used To Relish Programming And Hacking. They Both Were Extremely Intelligent And Had Perfect Skills. They Always Enjoyed Breaking Into Each Other’s Computer And Proving Their Superiority. Today Most Of The People Know Them As Bill Gates And Paul Allen Founder And Co-founder Of The Microsoft Corp, Usa.Both Of Them As Most Of You Must Be Knowing Are Practically Zillionaires.
  • 9. Steps to be secure of hacking ,,: • Protect Your Computer.(Antiviruses And Antispyware's) • Have A Secure Password.(Complicated But Easy To Remember) • Your Email ID And Its Password Are Your Own Confidential Information. • If You Are A Victim Of Such A Scenario, Please Contact The Respective Company Immediately. • If You Are Ever Asked For Your Password In An Unsolicited Manner Or By Someone You Do Not Believe To Be Any Representative. • You Should Change The Security Questions And Answers Wisely. • I Strongly Recommend You All To Never Click On A Spammy Link And Doubtful Ad Banners!
  • 10. How to do Hacking?? Now This Is Also One Of The Most Frequently Asked Question By The People To Hacker. Everybody Viewing This Presentation Are Eager To Know How To Hack. So Before Proceeding Let Me Tell You The Thing That Hacking Is And Always Will Lead To A Particular Goal.So To Hack Anything One Must Have A Goal Of What He Is Hacking, Why And Well Plan Of How He Will Hack. Now There Are Few Steps That I Am Going To Tell You Which Will Give You The Basic Idea Of Hacking And After That You All Will Be Able To Understand Hacking And Stop Asking People How To Hack.
  • 11. Steps to hack a computer… • First of all decide what you need to decide what you are actually going to hack. • After thinking the goal you must need to plan the attack, language and what OS you are going to use during hacking. • You must need to get the information about the system and owner of the system that you are going to hack. • Then if it is possible try to apply some brain or in the technical term Social Engineering. • Finally after thinking all these attack the victim but note that the attack is for a positive purpose.
  • 12. Presentation Developed By Harshit Upadhyay(Hellhacker119)