SlideShare a Scribd company logo
1 of 21
Ethical Hacking
Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting
What is Ethical Hacking Ethical Hacking Conforming to accepted professional standards of conduct ,[object Object],[object Object],[object Object],Also Called – Attack & Penetration Testing,  White-hat hacking, Red teaming White-hat - Good Guys Black-hat – Bad guys
What is Ethical Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why – Ethical Hacking Source: CERT-India January - 2005 Defacement Statistics for Indian Websites 1131 Total 13 other 2 .edu  2 .nic.in  3 .info  13 .ac.in  48 .co.in  12 .biz  39 .net  53 .org  24 .gov.in  922 .com  No of Defacements  Domains June 01, 2004 to Dec.31, 2004
Why – Ethical Hacking Source: CERT/CC Total Number of Incidents Incidents
Why – Ethical Hacking Source: US - CERT
Why – Ethical Hacking Protection from possible External Attacks Viruses, Trojan Horses,  and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data
Ethical Hacking - Process ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preparation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Footprinting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enumeration & Fingerprinting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identification of Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identification of Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identification of Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attack – Exploit the vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Attack – Exploit the vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attack – Exploit the vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Attack – Exploit the vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Reporting ,[object Object],[object Object],[object Object],[object Object]
Ethical Hacking - Commandments ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Intruders
IntrudersIntruders
Intruders
techn
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
Ehtisham Ali
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
andynova
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
festival ICT 2016
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
RootedCON
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
mmubashirkhan
 

What's hot (18)

Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Intruders
IntrudersIntruders
Intruders
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & Forensics
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
 

Viewers also liked

Viewers also liked (7)

Year 2070 01_07_06
Year 2070 01_07_06Year 2070 01_07_06
Year 2070 01_07_06
 
Hi2
Hi2Hi2
Hi2
 
Cartoons caricature him
Cartoons caricature himCartoons caricature him
Cartoons caricature him
 
Minneapolis bridge disaster__27_slides_
Minneapolis bridge disaster__27_slides_Minneapolis bridge disaster__27_slides_
Minneapolis bridge disaster__27_slides_
 
Makkahin2010
Makkahin2010Makkahin2010
Makkahin2010
 
Say n otodollar ( solution)
Say n otodollar ( solution)Say n otodollar ( solution)
Say n otodollar ( solution)
 
Magic cat
Magic catMagic cat
Magic cat
 

Similar to Ethical h

324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
ssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
ssuserde23af
 
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdfpdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
tehkotak4
 

Similar to Ethical h (20)

324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
CyberIgnite.pdf
CyberIgnite.pdfCyberIgnite.pdf
CyberIgnite.pdf
 
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdfpdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdf
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Hacking
HackingHacking
Hacking
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting Breaches
 

More from Dr. Salman Iqbal (20)

Bmj pam.ppt blue final
Bmj pam.ppt blue finalBmj pam.ppt blue final
Bmj pam.ppt blue final
 
Ancient medicine
Ancient medicineAncient medicine
Ancient medicine
 
Recession
RecessionRecession
Recession
 
Punishing urboss
Punishing urbossPunishing urboss
Punishing urboss
 
Muhammd prophet of_islam_mercy_of_the_world
Muhammd prophet of_islam_mercy_of_the_worldMuhammd prophet of_islam_mercy_of_the_world
Muhammd prophet of_islam_mercy_of_the_world
 
Memorise those brands (problem)
Memorise those brands (problem)Memorise those brands (problem)
Memorise those brands (problem)
 
Israeli massacre
Israeli massacreIsraeli massacre
Israeli massacre
 
Death
DeathDeath
Death
 
Atk 08
Atk 08Atk 08
Atk 08
 
Allah rab ul-izzat kaheta hai
Allah rab ul-izzat kaheta haiAllah rab ul-izzat kaheta hai
Allah rab ul-izzat kaheta hai
 
Al aqsa facts
Al aqsa factsAl aqsa facts
Al aqsa facts
 
Tonsillitis
TonsillitisTonsillitis
Tonsillitis
 
Sticker
StickerSticker
Sticker
 
Role of probiotics
Role of probioticsRole of probiotics
Role of probiotics
 
Presentation diag dilemma
Presentation diag dilemmaPresentation diag dilemma
Presentation diag dilemma
 
Medications during pregnancy
Medications during pregnancyMedications during pregnancy
Medications during pregnancy
 
Me and my father
Me and my fatherMe and my father
Me and my father
 
Mdh marketing plan 2010
Mdh marketing plan 2010Mdh marketing plan 2010
Mdh marketing plan 2010
 
Introduction
IntroductionIntroduction
Introduction
 
Intercostal drain
Intercostal drainIntercostal drain
Intercostal drain
 

Recently uploaded

(+27799215634) SPECIAL COURT SPELL TO HELP YOU WIN COURT CASES IN EUROPE AND USA
(+27799215634) SPECIAL COURT SPELL TO HELP YOU WIN COURT CASES IN EUROPE AND USA(+27799215634) SPECIAL COURT SPELL TO HELP YOU WIN COURT CASES IN EUROPE AND USA
(+27799215634) SPECIAL COURT SPELL TO HELP YOU WIN COURT CASES IN EUROPE AND USA
Baba Mkuru
 
☎️Looking for Abortion Pills? text +27791653574. GET Abortion Pills around Mu...
☎️Looking for Abortion Pills? text +27791653574. GET Abortion Pills around Mu...☎️Looking for Abortion Pills? text +27791653574. GET Abortion Pills around Mu...
☎️Looking for Abortion Pills? text +27791653574. GET Abortion Pills around Mu...
mikehavy0
 

Recently uploaded (15)

Take Back Control: Moving Forward with Scleroderma - Gregory Cohen
Take Back Control: Moving Forward with Scleroderma - Gregory CohenTake Back Control: Moving Forward with Scleroderma - Gregory Cohen
Take Back Control: Moving Forward with Scleroderma - Gregory Cohen
 
A case study on customer satisfaction towards First cry products.
A case study on customer satisfaction towards First cry products.A case study on customer satisfaction towards First cry products.
A case study on customer satisfaction towards First cry products.
 
Landscape Gardeners in Sussex and Surrey
Landscape Gardeners in Sussex and SurreyLandscape Gardeners in Sussex and Surrey
Landscape Gardeners in Sussex and Surrey
 
Transformative Learning Experience at Sattva Yoga Academy
Transformative Learning Experience at Sattva Yoga AcademyTransformative Learning Experience at Sattva Yoga Academy
Transformative Learning Experience at Sattva Yoga Academy
 
How Can A Life Coach Help You Deal With Self-Limiting Beliefs
How Can A Life Coach Help You Deal With Self-Limiting BeliefsHow Can A Life Coach Help You Deal With Self-Limiting Beliefs
How Can A Life Coach Help You Deal With Self-Limiting Beliefs
 
5cladba ADBBWorry-free after-sales, professional team, the safest and fastest...
5cladba ADBBWorry-free after-sales, professional team, the safest and fastest...5cladba ADBBWorry-free after-sales, professional team, the safest and fastest...
5cladba ADBBWorry-free after-sales, professional team, the safest and fastest...
 
(+27799215634) SPECIAL COURT SPELL TO HELP YOU WIN COURT CASES IN EUROPE AND USA
(+27799215634) SPECIAL COURT SPELL TO HELP YOU WIN COURT CASES IN EUROPE AND USA(+27799215634) SPECIAL COURT SPELL TO HELP YOU WIN COURT CASES IN EUROPE AND USA
(+27799215634) SPECIAL COURT SPELL TO HELP YOU WIN COURT CASES IN EUROPE AND USA
 
Penetration in to Women Tailored Wear Market dtd 14 May 24.pdf
Penetration in to Women Tailored Wear Market dtd 14 May 24.pdfPenetration in to Women Tailored Wear Market dtd 14 May 24.pdf
Penetration in to Women Tailored Wear Market dtd 14 May 24.pdf
 
☎️Looking for Abortion Pills? text +27791653574. GET Abortion Pills around Mu...
☎️Looking for Abortion Pills? text +27791653574. GET Abortion Pills around Mu...☎️Looking for Abortion Pills? text +27791653574. GET Abortion Pills around Mu...
☎️Looking for Abortion Pills? text +27791653574. GET Abortion Pills around Mu...
 
A Brief Introductory of Nuristan, By Ab.Hakim Hakimi .pdf
A Brief Introductory of Nuristan, By Ab.Hakim Hakimi .pdfA Brief Introductory of Nuristan, By Ab.Hakim Hakimi .pdf
A Brief Introductory of Nuristan, By Ab.Hakim Hakimi .pdf
 
Tokyo Presentation Final (Release -2024-).pptx
Tokyo Presentation Final (Release -2024-).pptxTokyo Presentation Final (Release -2024-).pptx
Tokyo Presentation Final (Release -2024-).pptx
 
Leadership Development: Empowering Women Leaders
Leadership Development: Empowering Women LeadersLeadership Development: Empowering Women Leaders
Leadership Development: Empowering Women Leaders
 
_What are the Latest Trends in Interior Home Design for 2024.pdf
_What are the Latest Trends in Interior Home Design for 2024.pdf_What are the Latest Trends in Interior Home Design for 2024.pdf
_What are the Latest Trends in Interior Home Design for 2024.pdf
 
Deloitte Gen Z Millennial Survey 2024_India_Full length report_.pdf
Deloitte Gen Z Millennial Survey 2024_India_Full length report_.pdfDeloitte Gen Z Millennial Survey 2024_India_Full length report_.pdf
Deloitte Gen Z Millennial Survey 2024_India_Full length report_.pdf
 
BECOMING A MASTER OF BODY LANGUAGE.docx.pdf
BECOMING A MASTER OF BODY LANGUAGE.docx.pdfBECOMING A MASTER OF BODY LANGUAGE.docx.pdf
BECOMING A MASTER OF BODY LANGUAGE.docx.pdf
 

Ethical h

  • 2. Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting
  • 3.
  • 4.
  • 5. Why – Ethical Hacking Source: CERT-India January - 2005 Defacement Statistics for Indian Websites 1131 Total 13 other 2 .edu 2 .nic.in 3 .info 13 .ac.in 48 .co.in 12 .biz 39 .net 53 .org 24 .gov.in 922 .com No of Defacements Domains June 01, 2004 to Dec.31, 2004
  • 6. Why – Ethical Hacking Source: CERT/CC Total Number of Incidents Incidents
  • 7. Why – Ethical Hacking Source: US - CERT
  • 8. Why – Ethical Hacking Protection from possible External Attacks Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.

Editor's Notes

  1. Red teaming – used for the first time by US government for testing its systems early 90’s Black & white hat terminology comes from the Hollywood movies where good guys wear white hats and bad guys wear black hats
  2. Other information not available