SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Presented By
Paidi Dinesh
Sri Sivani College Of Engineering
Batch-1
Ethical Hacking
&
Cyber Security
Content
 Introduction
 Ethical Hacking
 Hackers
 Types of Hackers
 Phases Of Hacking
 Why do We need Ethical Hacking
 Required Skills of an Ethical Hacker
Content…
 What do hackers do after Hacking?
 Advantages
 Disadvantages
 Future Enhancement
 Conclusion
Introduction
 Hacking has been a part of computing for almost
five decades and it is a very broad discipline, which
covers a wide range of topics.
 The first known event of hacking had taken place
in 1960 at MIT and at the same time, the term
"Hacker" was originated.
Basic Skills To Become an
Ethical Hacker
 Os Architecture
 Networking
 Servers
 Linux
Ethical Hacking
 Hacking is usually legal as long as it is being done
to find vulnerabilities in a computer or network
system to find the weaknesses, Exploits, bugs and
for providing more security with a person’s or an
organization’s authorized permission legally. This
sort of hacking is called as Ethical Hacking.
Hackers
 In general words a person who can access the data
or information by using some confidential tricks
and techniques on their targets either by legally or
illegally is known as Hackers.
 A Hacker is any skilled computer expert that uses
their technical knowledge to overcome a problem.
 While "hacker" can refer to any skilled , the term
has become associated in popular culture with a
"security hacker", someone who, with their
technical knowledge, uses bugs or exploits to break
into computer systems.
Types of Hackers
 Black Hat Hacker
 White Hat Hacker
 Grey Hat Hacker
Black-Hat Hacker
 A Black hat hackers is also called as crackers who steals the
data or information illegally by performing malicious attacks
like introducing viruses , Trojans etc.
 Those are individuals with extraordinary computing
skills, resorting to malicious or destructive activities.
 That is black hat hackers use their knowledge and skill for
their own personal gains probably by hurting others.
White-Hat Hacker
 White hat hackers are those
individuals professional hacker
skills and using them for
defensive purposes.
 This means that the white hat
hackers use their knowledge and
skill for the good of others hand
for the common good.
Grey-Hat Hackers
 These are individuals who work both offensively and
defensively at various times.
 We cannot predict their behavior as they behave based on the
situations
 Sometimes they use their skills for the common good while in
some other times he uses them for their personal gains.
Phases Of Hacking
 Foot Printing
 Scanning
 Gaining Access
 Maintaining Access
 Foot Printing
 Scanning
 Gaining Access
 Maintaining Access
 Foot Printing or Reconnaissance
 Scanning
 Gaining Access
 Maintaining Access
 Covering Tracks
Reconnaissance
 Whois look up
 NS lookup
 IP lookup
Tor Browser(Access To The Dark)
Used For Annonymity
Usually named as onion router
Uses a Technique called Onion Routing
Tor Onion Router Structure
Types Of Web-Dark Web
The hidden-Wiki
Scanning
 Port Scanning
 Network Scanning
 Fire Walking
Software Used For
PortScanning
Gaining Access
 Password Attacks
 Social Engineering
 Viruses
Password Attacks
 Brute Force attack
 Dictionary Attack
 Key logger
 Rainbow table attack
 Malware , Offline Cracking & Guessing
 Phishing
 Social engineering
Man in the Middle Attack
Some Worst Passwords
Social Engineering
Social Engineering
Phishing
Viruses
Maintaining Access
 OS Back Doors
 Trojans
 Web Defacing
Covering Tracks
 Using Of Proxy Servers
 Using of Virtual Proxy Networks
 Using Tor Browser
Why Do We Need Ethical HackingWhy Do We Need Ethical Hacking
Viruses, Trojan
Horses,
and Worms
Social
Engineering
Automated
Attacks
Accidental
Breaches in
Security Denial of
Service (DoS)
Organizational
Attacks
Restricted
Data
Protection from possible External Attacks
Required Skills of an Ethical Hacker
 Microsoft: skills in operation, configuration and
management.
 Linux: knowledge of Linux/Unix; security setting,
configuration, and services.
 Firewalls: configurations, and operation of intrusion
detection systems.
 Microsoft: skills in operation, configuration and
management.
 Linux: knowledge of Linux/Unix; security setting,
configuration, and services.
 Firewalls: configurations, and operation of intrusion
detection systems.
Required Skills of an Ethical
Hacker….
 Routers: knowledge of routers, routing protocols, and
access control lists
 Mainframes
 Network Protocols: TCP/IP; how they function and can
be manipulated.
 Project Management: leading, planning, organizing, and
controlling a penetration testing team.
What do hackers do after hacking?...
 Patch Security hole
 The other hackers can’t intrude
 Clear logs and hide themselves
 Install Root kit ( backdoor )
 The hacker who hacked the system can use the
system later
 It contains Trojan virus, and so on
Advantages
 ‘’To catch a thief you have to think like a thief”
 Helps in closing the open holes in the system network
 Provides security to banking and financial
establishments
 Prevents website defacements
 An evolving techniques are widely used
Disadvantages
 All depends upon the trustworthiness of the Ethical
hacker
 Hiring the Professionals is very Expensive.
 
Future Enhancements
 As it an evolving branch the scope of enhancement
in technology is immense.
 No ethical hacker can ensure the system security by
using the same technique repeatedly.
 High quality software’s should be used for
optimum protection.
Career-Path
Conclusion
 The first thing we should do is to keep ourselves
updated about those software’s for what we are
using for official and reliable sources.
 Educate the employees and the users against black
hat hacking.
 Every person should have some awareness in
defense from hacking.
References
 https://www.wikipedia.com/
 https://www.quora.com/
 https://www.hackingloops.com/
 https://www.instructables.com/
 https://www.webopedia.com/
 https://www.lifewire.com/
 https://www.Computerhope.com/
Thanks

Weitere ähnliche Inhalte

Was ist angesagt?

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 

Was ist angesagt? (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
HACKING
HACKINGHACKING
HACKING
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
SACON - Threat hunting (Chandra Prakash)
SACON - Threat hunting (Chandra Prakash)SACON - Threat hunting (Chandra Prakash)
SACON - Threat hunting (Chandra Prakash)
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue Team
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Red teaming probably isn't for you
Red teaming probably isn't for youRed teaming probably isn't for you
Red teaming probably isn't for you
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Spoofing
SpoofingSpoofing
Spoofing
 
Secure Coding and Threat Modeling
Secure Coding and Threat ModelingSecure Coding and Threat Modeling
Secure Coding and Threat Modeling
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Ähnlich wie Hacking

CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
Being Uniq Sonu
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 

Ähnlich wie Hacking (20)

CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 

Kürzlich hochgeladen

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Kürzlich hochgeladen (20)

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 

Hacking

  • 1. Presented By Paidi Dinesh Sri Sivani College Of Engineering Batch-1 Ethical Hacking & Cyber Security
  • 2. Content  Introduction  Ethical Hacking  Hackers  Types of Hackers  Phases Of Hacking  Why do We need Ethical Hacking  Required Skills of an Ethical Hacker
  • 3. Content…  What do hackers do after Hacking?  Advantages  Disadvantages  Future Enhancement  Conclusion
  • 4. Introduction  Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics.  The first known event of hacking had taken place in 1960 at MIT and at the same time, the term "Hacker" was originated.
  • 5. Basic Skills To Become an Ethical Hacker  Os Architecture  Networking  Servers  Linux
  • 6. Ethical Hacking  Hacking is usually legal as long as it is being done to find vulnerabilities in a computer or network system to find the weaknesses, Exploits, bugs and for providing more security with a person’s or an organization’s authorized permission legally. This sort of hacking is called as Ethical Hacking.
  • 7. Hackers  In general words a person who can access the data or information by using some confidential tricks and techniques on their targets either by legally or illegally is known as Hackers.  A Hacker is any skilled computer expert that uses their technical knowledge to overcome a problem.  While "hacker" can refer to any skilled , the term has become associated in popular culture with a "security hacker", someone who, with their technical knowledge, uses bugs or exploits to break into computer systems.
  • 8. Types of Hackers  Black Hat Hacker  White Hat Hacker  Grey Hat Hacker
  • 9. Black-Hat Hacker  A Black hat hackers is also called as crackers who steals the data or information illegally by performing malicious attacks like introducing viruses , Trojans etc.  Those are individuals with extraordinary computing skills, resorting to malicious or destructive activities.  That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others.
  • 10. White-Hat Hacker  White hat hackers are those individuals professional hacker skills and using them for defensive purposes.  This means that the white hat hackers use their knowledge and skill for the good of others hand for the common good.
  • 11. Grey-Hat Hackers  These are individuals who work both offensively and defensively at various times.  We cannot predict their behavior as they behave based on the situations  Sometimes they use their skills for the common good while in some other times he uses them for their personal gains.
  • 12. Phases Of Hacking  Foot Printing  Scanning  Gaining Access  Maintaining Access  Foot Printing  Scanning  Gaining Access  Maintaining Access  Foot Printing or Reconnaissance  Scanning  Gaining Access  Maintaining Access  Covering Tracks
  • 13. Reconnaissance  Whois look up  NS lookup  IP lookup
  • 14. Tor Browser(Access To The Dark) Used For Annonymity Usually named as onion router Uses a Technique called Onion Routing
  • 15. Tor Onion Router Structure
  • 18. Scanning  Port Scanning  Network Scanning  Fire Walking
  • 20.
  • 21. Gaining Access  Password Attacks  Social Engineering  Viruses
  • 22. Password Attacks  Brute Force attack  Dictionary Attack  Key logger  Rainbow table attack  Malware , Offline Cracking & Guessing  Phishing  Social engineering
  • 23. Man in the Middle Attack
  • 29. Maintaining Access  OS Back Doors  Trojans  Web Defacing
  • 30. Covering Tracks  Using Of Proxy Servers  Using of Virtual Proxy Networks  Using Tor Browser
  • 31. Why Do We Need Ethical HackingWhy Do We Need Ethical Hacking Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data Protection from possible External Attacks
  • 32. Required Skills of an Ethical Hacker  Microsoft: skills in operation, configuration and management.  Linux: knowledge of Linux/Unix; security setting, configuration, and services.  Firewalls: configurations, and operation of intrusion detection systems.  Microsoft: skills in operation, configuration and management.  Linux: knowledge of Linux/Unix; security setting, configuration, and services.  Firewalls: configurations, and operation of intrusion detection systems.
  • 33. Required Skills of an Ethical Hacker….  Routers: knowledge of routers, routing protocols, and access control lists  Mainframes  Network Protocols: TCP/IP; how they function and can be manipulated.  Project Management: leading, planning, organizing, and controlling a penetration testing team.
  • 34. What do hackers do after hacking?...  Patch Security hole  The other hackers can’t intrude  Clear logs and hide themselves  Install Root kit ( backdoor )  The hacker who hacked the system can use the system later  It contains Trojan virus, and so on
  • 35. Advantages  ‘’To catch a thief you have to think like a thief”  Helps in closing the open holes in the system network  Provides security to banking and financial establishments  Prevents website defacements  An evolving techniques are widely used
  • 36. Disadvantages  All depends upon the trustworthiness of the Ethical hacker  Hiring the Professionals is very Expensive.
  • 37.   Future Enhancements  As it an evolving branch the scope of enhancement in technology is immense.  No ethical hacker can ensure the system security by using the same technique repeatedly.  High quality software’s should be used for optimum protection.
  • 39. Conclusion  The first thing we should do is to keep ourselves updated about those software’s for what we are using for official and reliable sources.  Educate the employees and the users against black hat hacking.  Every person should have some awareness in defense from hacking.
  • 40. References  https://www.wikipedia.com/  https://www.quora.com/  https://www.hackingloops.com/  https://www.instructables.com/  https://www.webopedia.com/  https://www.lifewire.com/  https://www.Computerhope.com/