SlideShare ist ein Scribd-Unternehmen logo
1 von 27
CONTENT
 OVERVIEW
 HACKING
 HISTORY
 HACKING PROCESS
TECHNIQUES AND
TOOLS
 ADVANTAGES AND
DISADVANTAGES
 REFERENCE
 TYPES OF HACKER
 PRECAUTIONS
 SOME FAMOUS
HACKER
Overview
Hacker
• The person who hacks. A hacker is a person intensely
interested in the arcane and recondite workings of any
computer operating system. Hackers are most often
programmers.
 Cracker
• System intruder/ destroyer
History Of Hacking
The first hacker was appeared in 1960’s at the
Massachusetts Institute Of Technology(MIT)
During the 1970’s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker
In the 1980’s, phreaks started to migrate to
computers, and the first Bulletin Board System (BBS)
appeared
During the 1990’s, when the use of internet
widespread around the world, hackers multiplied.
Hacking
 Hacker
• Access computer system or network without
authorization
• Breaks the law
 Ethical Hacker
• Performs most of the same activities but with owner’s
permission
• Employed by companies to perform Penetration Tests
Types of hacker
BLACK HAT
WHITE HAT
GREY HAT
SCRIPT KIDDIES
 A black hat hacker is a hacker who "violates computer
security for little reason beyond maliciousness or for
personal gain.
 They Work for black money(Like:- Bank Websites ,
credit card websites)
 They use their knowledge for illegal purposes.
 White hat hackers are like Ethical Hackers .
They use their skills for good purposes.
 They work for organizations for stop the illegal
activities through black hat hackers.
 Grey Hat hackers have both qualities like
black hat hackers and white hat hackers .
 They use their knowledge for bad purposes
and good purposes too.
 Script kiddies hacks into computer or
websites using the tools available on
the internet .
 They don’t have knowledge of
programming .
Advantages
 Provides security to banking and financial
establishments
 To catch a thief you have to think like a thief.
Disadvantages
 All depends upon the trustworthiness of the
ethical hacker
 Hiring professionals is expensive.
 Encrypt important data
Ex:- pgp, ssh
 Remove unused program
 Backup the system often
 Setup firewall
 Setup IDS
Ex) snort
 Shutdown the system
Or turn off the system
 Restore the system with the backup
Or reinstall all programs
 Disconnect the system to the network
Some Famous Hacker
Ian Murphy Kevin Mitnick Johan Helsinguis
Linus Torvald Mark Abene Robert Morris
REFERENCE
 www.scribd.com
 www.wikipedia/seminartopics/ethical haching.org
 www. Seminarsonly/ethical hacking.com
Ethical hacking
Ethical hacking

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Hacking
HackingHacking
Hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Hacking
HackingHacking
Hacking
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking Tools
Ethical Hacking ToolsEthical Hacking Tools
Ethical Hacking Tools
 

Andere mochten auch

Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
arpit
 
J.D. Skube, Occup. Haz in the Fire Service
J.D. Skube, Occup. Haz in the Fire ServiceJ.D. Skube, Occup. Haz in the Fire Service
J.D. Skube, Occup. Haz in the Fire Service
Jonathan Skube
 
Evaluation - Question 4
Evaluation - Question 4Evaluation - Question 4
Evaluation - Question 4
AMYDAV123
 
Professional Presentations
Professional PresentationsProfessional Presentations
Professional Presentations
Mike Kelly
 
Cader draftprotocol literature review 4 abreiviated with changes
Cader draftprotocol literature review 4 abreiviated with changesCader draftprotocol literature review 4 abreiviated with changes
Cader draftprotocol literature review 4 abreiviated with changes
Rugshana Cader
 
Profil What I Wear
Profil What I WearProfil What I Wear
Profil What I Wear
C Lair
 

Andere mochten auch (20)

Resume-Final (1) (4)
Resume-Final (1) (4)Resume-Final (1) (4)
Resume-Final (1) (4)
 
Privert ecrit aux syndicalistes
Privert ecrit aux syndicalistesPrivert ecrit aux syndicalistes
Privert ecrit aux syndicalistes
 
Macys HSQ DG ROSA
Macys HSQ DG ROSAMacys HSQ DG ROSA
Macys HSQ DG ROSA
 
Notebook
NotebookNotebook
Notebook
 
Presentacion
PresentacionPresentacion
Presentacion
 
Dtl mwc david del val v7
Dtl mwc david del val v7Dtl mwc david del val v7
Dtl mwc david del val v7
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
How to format powerpoint presentation slides
How to format powerpoint presentation slidesHow to format powerpoint presentation slides
How to format powerpoint presentation slides
 
Consulta: Bases de datos
Consulta: Bases de datosConsulta: Bases de datos
Consulta: Bases de datos
 
History of me
History of meHistory of me
History of me
 
J.D. Skube, Occup. Haz in the Fire Service
J.D. Skube, Occup. Haz in the Fire ServiceJ.D. Skube, Occup. Haz in the Fire Service
J.D. Skube, Occup. Haz in the Fire Service
 
Condicionales inglés
Condicionales inglésCondicionales inglés
Condicionales inglés
 
Cliq intro 2016
Cliq intro 2016Cliq intro 2016
Cliq intro 2016
 
Evaluation - Question 4
Evaluation - Question 4Evaluation - Question 4
Evaluation - Question 4
 
Professional Presentations
Professional PresentationsProfessional Presentations
Professional Presentations
 
Cader draftprotocol literature review 4 abreiviated with changes
Cader draftprotocol literature review 4 abreiviated with changesCader draftprotocol literature review 4 abreiviated with changes
Cader draftprotocol literature review 4 abreiviated with changes
 
Profil What I Wear
Profil What I WearProfil What I Wear
Profil What I Wear
 
Connect Magazine - July/August 2015 Issue
Connect Magazine - July/August 2015 IssueConnect Magazine - July/August 2015 Issue
Connect Magazine - July/August 2015 Issue
 
How to start learning ethical hacking
How to start learning ethical hackingHow to start learning ethical hacking
How to start learning ethical hacking
 
Selection of Images - LEMO
Selection of Images - LEMOSelection of Images - LEMO
Selection of Images - LEMO
 

Ähnlich wie Ethical hacking

Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 

Ähnlich wie Ethical hacking (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
N.vinodh
N.vinodhN.vinodh
N.vinodh
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Kürzlich hochgeladen

+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Kürzlich hochgeladen (20)

DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 

Ethical hacking

  • 1.
  • 2. CONTENT  OVERVIEW  HACKING  HISTORY  HACKING PROCESS TECHNIQUES AND TOOLS  ADVANTAGES AND DISADVANTAGES  REFERENCE  TYPES OF HACKER  PRECAUTIONS  SOME FAMOUS HACKER
  • 3. Overview Hacker • The person who hacks. A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers.  Cracker • System intruder/ destroyer
  • 4. History Of Hacking The first hacker was appeared in 1960’s at the Massachusetts Institute Of Technology(MIT) During the 1970’s, a different kind of hacker appeared: Phone Phreaker or Phone Hacker
  • 5. In the 1980’s, phreaks started to migrate to computers, and the first Bulletin Board System (BBS) appeared During the 1990’s, when the use of internet widespread around the world, hackers multiplied.
  • 6. Hacking  Hacker • Access computer system or network without authorization • Breaks the law  Ethical Hacker • Performs most of the same activities but with owner’s permission • Employed by companies to perform Penetration Tests
  • 7. Types of hacker BLACK HAT WHITE HAT GREY HAT SCRIPT KIDDIES
  • 8.
  • 9.  A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain.  They Work for black money(Like:- Bank Websites , credit card websites)  They use their knowledge for illegal purposes.
  • 10.
  • 11.  White hat hackers are like Ethical Hackers . They use their skills for good purposes.  They work for organizations for stop the illegal activities through black hat hackers.
  • 12.
  • 13.  Grey Hat hackers have both qualities like black hat hackers and white hat hackers .  They use their knowledge for bad purposes and good purposes too.
  • 14.
  • 15.  Script kiddies hacks into computer or websites using the tools available on the internet .  They don’t have knowledge of programming .
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Advantages  Provides security to banking and financial establishments  To catch a thief you have to think like a thief. Disadvantages  All depends upon the trustworthiness of the ethical hacker  Hiring professionals is expensive.
  • 22.  Encrypt important data Ex:- pgp, ssh  Remove unused program  Backup the system often  Setup firewall  Setup IDS Ex) snort
  • 23.  Shutdown the system Or turn off the system  Restore the system with the backup Or reinstall all programs  Disconnect the system to the network
  • 24. Some Famous Hacker Ian Murphy Kevin Mitnick Johan Helsinguis Linus Torvald Mark Abene Robert Morris
  • 25. REFERENCE  www.scribd.com  www.wikipedia/seminartopics/ethical haching.org  www. Seminarsonly/ethical hacking.com