SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Ethical Hacking
Gaurav Yadav
Indian Institute of Information Technology Sonepat
Gaurav Yadav IIITS
Contents
Gaurav Yadav IIITS
• Introduction to Hacking
• The Evolution of Hacking
• Types of Hackers
• Understanding Ethical Hacking
• Law and Ethics
• Why Ethical Hacking?
• Types of Ethical Hacking
• Industry Perspective of Ethical Hacking
• Certifications for Ethical Hacking
Introduction to Hacking
Gaurav Yadav IIITS
• Hacking is the act of identifying security vulnerabilities in networks, computer
systems or electronic gadgets and exploiting them. For example – gaining
unauthorized access to someone’s Wi-Fi.
• Hacking requires creative thinking, persistent learning, and a lot of patience.
The Evolution of Hacking
Gaurav Yadav IIITS
• The birth of hacking took place at MIT in 1969.
• Earlier hacking was done just to improve performance by manipulating
software and hardware.
• In 1971 John Draper hacked a phone system.
• In 1983 Fred Cohen developed a virus.
• And further, more malwares were created and more hacking activities took
place.
Types of Hackers
Gaurav Yadav IIITS
• Black Hat Hackers (Crackers): They gain unauthorized system access. Data Theft,
Ransom, Defamation are their major reasons.
• Grey Hat Hackers: They often gain unauthorized system access, and report the
vulnerabilities to the owners, for a little fee. But if the owner doesn’t comply, they
make the vulnerabilities public.
• White Hat Hackers (Ethical Hackers): They gain authorized system access when the
owner allows them. They intend to secure computer networks or systems.
Understanding Ethical Hacking
Gaurav Yadav IIITS
Cybersecurity
Ethical
Hacking
• Ethical hacking is an essential part of
Cybersecurity.
• Ethical hacking is the act of finding security
loopholes in computer systems, networks, or
other electronic gadgets such as IoT Devices, by
the permission of the owner.
Law and Ethics
Gaurav Yadav IIITS
• All Ethical hackers are aware of laws and they know how the laws will impact their
work.
• Trust is the most import thing between an ethical hacker and the client.
• Going beyond the test limits can make clients to take legal action against ethical
hackers.
Why Ethical Hacking?
Gaurav Yadav IIITS
• To know weaknesses of the security architecture.
• For better preparation against cyberattacks.
• For better reaction to an ongoing cyberattack.
• For an understanding of the hacker’s point of view.
• For ensuring safety and privacy standards.
• In the ever-growing $150 billion* cybersecurity industry, ethical hacking is an
in-demand and rapidly growing career option.
*https://www.mordorintelligence.com/industry-reports/cyber-security-market
Types of Ethical Hacking
Gaurav Yadav IIITS
1. System Hacking : It involves gaining access into computers on a network by means of malware,
etc. For example – Privilege escalation in an operating system.
2. Wireless Network Hacking : It involves gaining access into private unsecured networks. For
Example – Hacking an unsecured Wi-Fi.
3. Web Application Hacking : It involves hacking into websites. It involves attacks like XSS, RCE,
IDORs, CSRF, Path Traversal, etc.
4. Web Server Hacking : It involves hacking into dedicated web servers of websites and altering
the content. For example - SQLi attacks.
5. Social Engineering : It involves the usage of social skills to lure people to provide sensitive
information. For example – Phone Phishing.
Industry Perspective of Ethical Hacking
Gaurav Yadav IIITS
• Companies either hire employ teams or launch public/private
VDPs(Vulnerability Disclosure Programs) to maintain security standards.
Platforms like Hackerone, Bugcrowd, Intigriti offer bug bounties on
behalf of several tech companies for a valid bug report.
• Ethical hacking reduces losses extensively.
Certifications for Ethical Hacking
Gaurav Yadav IIITS
• Cybersecurity giants like Cisco, Palo Alto Networks, etc. approve people based on
practical exams, and certify them accordingly.
• Certifications represent practical learning and an individual’s skillset.
• Certifications help in career upliftment.
• Some of the most popular certifications are OSCP, CompTIA Security+, CISSP,
CEH, etc.
References
Gaurav Yadav IIITS
1. https://www.eccouncil.org/ethical-hacking/
2. https://us.norton.com/internetsecurity-emerging-threats.html
3. https://www.kaspersky.co.in/enterprise-security/threat-management-defense-solution
4. https://www.guru99.com/ethical-hacking-tutorials.html
5. https://www.mordorintelligence.com/industry-reports/cyber-security-market
Gaurav Yadav IIITS
“Is hacking ever acceptable? It depends on the motive”
~ Charlie Brooker

Weitere ähnliche Inhalte

Was ist angesagt?

Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingNitish Kasar
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speechtalhaabid
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Moduleankit sarode
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To HackingRaghav Bisht
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical HackingVanipriya Sakthivel
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 

Was ist angesagt? (20)

Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Ähnlich wie Ethical hacking

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfuzair
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptxjohnnymaaza
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2Ishaq Shinwari
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Introduction of ethical hacking.........
Introduction of ethical hacking.........Introduction of ethical hacking.........
Introduction of ethical hacking.........AalyanAbid
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptxInfosectrain3
 
Etical hacking
Etical hackingEtical hacking
Etical hackingtalhaabid
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi SamridhiJain48
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Mohammad Affan
 

Ähnlich wie Ethical hacking (20)

Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Hacking
HackingHacking
Hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Introduction of ethical hacking.........
Introduction of ethical hacking.........Introduction of ethical hacking.........
Introduction of ethical hacking.........
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
 
Hacking
HackingHacking
Hacking
 
Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
 

Kürzlich hochgeladen

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 

Kürzlich hochgeladen (20)

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 

Ethical hacking

  • 1. Ethical Hacking Gaurav Yadav Indian Institute of Information Technology Sonepat Gaurav Yadav IIITS
  • 2. Contents Gaurav Yadav IIITS • Introduction to Hacking • The Evolution of Hacking • Types of Hackers • Understanding Ethical Hacking • Law and Ethics • Why Ethical Hacking? • Types of Ethical Hacking • Industry Perspective of Ethical Hacking • Certifications for Ethical Hacking
  • 3. Introduction to Hacking Gaurav Yadav IIITS • Hacking is the act of identifying security vulnerabilities in networks, computer systems or electronic gadgets and exploiting them. For example – gaining unauthorized access to someone’s Wi-Fi. • Hacking requires creative thinking, persistent learning, and a lot of patience.
  • 4. The Evolution of Hacking Gaurav Yadav IIITS • The birth of hacking took place at MIT in 1969. • Earlier hacking was done just to improve performance by manipulating software and hardware. • In 1971 John Draper hacked a phone system. • In 1983 Fred Cohen developed a virus. • And further, more malwares were created and more hacking activities took place.
  • 5. Types of Hackers Gaurav Yadav IIITS • Black Hat Hackers (Crackers): They gain unauthorized system access. Data Theft, Ransom, Defamation are their major reasons. • Grey Hat Hackers: They often gain unauthorized system access, and report the vulnerabilities to the owners, for a little fee. But if the owner doesn’t comply, they make the vulnerabilities public. • White Hat Hackers (Ethical Hackers): They gain authorized system access when the owner allows them. They intend to secure computer networks or systems.
  • 6. Understanding Ethical Hacking Gaurav Yadav IIITS Cybersecurity Ethical Hacking • Ethical hacking is an essential part of Cybersecurity. • Ethical hacking is the act of finding security loopholes in computer systems, networks, or other electronic gadgets such as IoT Devices, by the permission of the owner.
  • 7. Law and Ethics Gaurav Yadav IIITS • All Ethical hackers are aware of laws and they know how the laws will impact their work. • Trust is the most import thing between an ethical hacker and the client. • Going beyond the test limits can make clients to take legal action against ethical hackers.
  • 8. Why Ethical Hacking? Gaurav Yadav IIITS • To know weaknesses of the security architecture. • For better preparation against cyberattacks. • For better reaction to an ongoing cyberattack. • For an understanding of the hacker’s point of view. • For ensuring safety and privacy standards. • In the ever-growing $150 billion* cybersecurity industry, ethical hacking is an in-demand and rapidly growing career option. *https://www.mordorintelligence.com/industry-reports/cyber-security-market
  • 9. Types of Ethical Hacking Gaurav Yadav IIITS 1. System Hacking : It involves gaining access into computers on a network by means of malware, etc. For example – Privilege escalation in an operating system. 2. Wireless Network Hacking : It involves gaining access into private unsecured networks. For Example – Hacking an unsecured Wi-Fi. 3. Web Application Hacking : It involves hacking into websites. It involves attacks like XSS, RCE, IDORs, CSRF, Path Traversal, etc. 4. Web Server Hacking : It involves hacking into dedicated web servers of websites and altering the content. For example - SQLi attacks. 5. Social Engineering : It involves the usage of social skills to lure people to provide sensitive information. For example – Phone Phishing.
  • 10. Industry Perspective of Ethical Hacking Gaurav Yadav IIITS • Companies either hire employ teams or launch public/private VDPs(Vulnerability Disclosure Programs) to maintain security standards. Platforms like Hackerone, Bugcrowd, Intigriti offer bug bounties on behalf of several tech companies for a valid bug report. • Ethical hacking reduces losses extensively.
  • 11. Certifications for Ethical Hacking Gaurav Yadav IIITS • Cybersecurity giants like Cisco, Palo Alto Networks, etc. approve people based on practical exams, and certify them accordingly. • Certifications represent practical learning and an individual’s skillset. • Certifications help in career upliftment. • Some of the most popular certifications are OSCP, CompTIA Security+, CISSP, CEH, etc.
  • 12. References Gaurav Yadav IIITS 1. https://www.eccouncil.org/ethical-hacking/ 2. https://us.norton.com/internetsecurity-emerging-threats.html 3. https://www.kaspersky.co.in/enterprise-security/threat-management-defense-solution 4. https://www.guru99.com/ethical-hacking-tutorials.html 5. https://www.mordorintelligence.com/industry-reports/cyber-security-market
  • 13. Gaurav Yadav IIITS “Is hacking ever acceptable? It depends on the motive” ~ Charlie Brooker