2. Content
Introduction
Ethical Hacking
Hackers
Types of Hackers
Phases Of Hacking
Why do We need Ethical Hacking
Required Skills of an Ethical Hacker
3. Content…
What do hackers do after Hacking?
Advantages
Disadvantages
Future Enhancement
Conclusion
4. Introduction
Hacking has been a part of computing for almost
five decades and it is a very broad discipline, which
covers a wide range of topics.
The first known event of hacking had taken place
in 1960 at MIT and at the same time, the term
"Hacker" was originated.
5. Basic Skills To Become an
Ethical Hacker
Os Architecture
Networking
Servers
Linux
6. Ethical Hacking
Hacking is usually legal as long as it is being done
to find vulnerabilities in a computer or network
system to find the weaknesses, Exploits, bugs and
for providing more security with a person’s or an
organization’s authorized permission legally. This
sort of hacking is called as Ethical Hacking.
7. Hackers
In general words a person who can access the data
or information by using some confidential tricks
and techniques on their targets either by legally or
illegally is known as Hackers.
A Hacker is any skilled computer expert that uses
their technical knowledge to overcome a problem.
While "hacker" can refer to any skilled , the term
has become associated in popular culture with a
"security hacker", someone who, with their
technical knowledge, uses bugs or exploits to break
into computer systems.
9. Black-Hat Hacker
A Black hat hackers is also called as crackers who steals the
data or information illegally by performing malicious attacks
like introducing viruses , Trojans etc.
Those are individuals with extraordinary computing
skills, resorting to malicious or destructive activities.
That is black hat hackers use their knowledge and skill for
their own personal gains probably by hurting others.
10. White-Hat Hacker
White hat hackers are those
individuals professional hacker
skills and using them for
defensive purposes.
This means that the white hat
hackers use their knowledge and
skill for the good of others hand
for the common good.
11. Grey-Hat Hackers
These are individuals who work both offensively and
defensively at various times.
We cannot predict their behavior as they behave based on the
situations
Sometimes they use their skills for the common good while in
some other times he uses them for their personal gains.
30. Covering Tracks
Using Of Proxy Servers
Using of Virtual Proxy Networks
Using Tor Browser
31. Why Do We Need Ethical HackingWhy Do We Need Ethical Hacking
Viruses, Trojan
Horses,
and Worms
Social
Engineering
Automated
Attacks
Accidental
Breaches in
Security Denial of
Service (DoS)
Organizational
Attacks
Restricted
Data
Protection from possible External Attacks
32. Required Skills of an Ethical Hacker
Microsoft: skills in operation, configuration and
management.
Linux: knowledge of Linux/Unix; security setting,
configuration, and services.
Firewalls: configurations, and operation of intrusion
detection systems.
Microsoft: skills in operation, configuration and
management.
Linux: knowledge of Linux/Unix; security setting,
configuration, and services.
Firewalls: configurations, and operation of intrusion
detection systems.
33. Required Skills of an Ethical
Hacker….
Routers: knowledge of routers, routing protocols, and
access control lists
Mainframes
Network Protocols: TCP/IP; how they function and can
be manipulated.
Project Management: leading, planning, organizing, and
controlling a penetration testing team.
34. What do hackers do after hacking?...
Patch Security hole
The other hackers can’t intrude
Clear logs and hide themselves
Install Root kit ( backdoor )
The hacker who hacked the system can use the
system later
It contains Trojan virus, and so on
35. Advantages
‘’To catch a thief you have to think like a thief”
Helps in closing the open holes in the system network
Provides security to banking and financial
establishments
Prevents website defacements
An evolving techniques are widely used
36. Disadvantages
All depends upon the trustworthiness of the Ethical
hacker
Hiring the Professionals is very Expensive.
37.
Future Enhancements
As it an evolving branch the scope of enhancement
in technology is immense.
No ethical hacker can ensure the system security by
using the same technique repeatedly.
High quality software’s should be used for
optimum protection.
39. Conclusion
The first thing we should do is to keep ourselves
updated about those software’s for what we are
using for official and reliable sources.
Educate the employees and the users against black
hat hacking.
Every person should have some awareness in
defense from hacking.