2. CONTENT
• Hacking
• History of Hacking
• Types of Hacking
• Hackers
• Types of Hackers
• Famous Hacker
• Service of Ethical Hacking
• Disadvantages of Hacking
• Need of Hacking
• Cyber law for Hacking
• Scope of Ethical Hacking
3. WHAT IS HACKING?
• Hacking is an attempt to exploit a computer system or
a private network inside a computer. Simply put, it is
the unauthorised access to or control over computer
network security systems for some illicit purpose. To
better describe hacking, one needs to first understand
hackers. One can easily assume them to be intelligent
and highly skilled in computers.
4. HISTORY OF HACKING
• When hacking first started it was not thought of as that serious. The
hackers were not even known as hackers but as practical jokers. The
very first hack came in 1878 when the phone company, Bell Telephone,
was started. A group of teenage boys, hired to run the switchboards,
would disconnect or misdirect calls.
The first authentic computer hackers came in the 1960s. During those
times, computers were mainframes, locked away in temperature
controlled, glassed in areas. It cost a lot of money to run these
machines, so programmers had limited access to them.
5. HISTORY OF HACKING
• The smarter students, usually MIT students, had an insatiable
curiosity about how things worked. So, the smartest ones created
what they called "hacks", programming shortcuts, to complete
computing tasks more quickly. In some cases the shortcuts were better
than the original program. One of the hacks that was created in the
60s, 1969 to be exact, was created to act as an open set of rules to run
machines on the computer frontier. It was created by two employees
from the Bell Lab's think tank. The two employees were Dennis
Ritchie and Ken Thompson and the "hack" was called UNIX.
6. TYPES OF HACKING
• Ethical Hacking
• Back Door Hacking
• Website Hacking
• Network Hacking
• Password Hacking
7. ETHICAL HACKING
• Ethical hacking, also known as penetration testing or pen testing, is legally
breaking into computers and devices to test an organization's defenses. It's
among the most exciting IT jobs any person can be involved in. You are
literally getting paid to keep up with the latest technology and get to break
into computers without the threat of being arrested.
• Companies engage ethical hackers to identify vulnerabilities in their
systems. From the penetration tester's point of view, there is no downside: If
you hack in past the current defenses, you’ve given the client a chance to
close the hole before an attacker discovers it. If you don’t find anything, your
client is even happier because they now get to declare their systems “secure
enough that even paid hackers couldn’t break into it.”
8. BACKDOOR HACKING
• In the world of cybersecurity, a backdoor refers to any method by
which authorized and unauthorized users are able to get around
normal security measures and gain high level user access (aka root
access) on a computer system, network, or software application. Once
they're in, cybercriminals can use a backdoor to steal personal and
financial data, install additional malware, and hijack devices.
• A well-known backdoor example is called FinSpy. When installed on a
system, it enables the attacker to download and execute files remotely
on the system the moment it connects to the internet, irrespective of
the system's physical location. It compromises overall system security.
9. WEBSITE HACKING
• Hacking a website is nothing but getting the password to add, edit,
delete data stored in that website. After the attack done by a hacker, if
he has changed the password of that website software, then it will be
tough for the Webmaster to get it back. Hacker will insert harmful
programs by inserting malicious codes into the website. It will also
cause to the website server to be slow.
• In the past years, even Amazon and Yahoo had been attacked by the
hacker experts, but it would not affect much to them. In the last year
we had seen that, the world wide hackers are tried their level best to
make fear on the famous companies like PayPal and Facebook.
10. NETWORK HACKING
• Networking Hacking is an offensive branch of computer security
related to networks hacking and the penetration of a target via the
networking services or equipment.
• Network Hacking is generally means gathering information about
domain by using tools like Telnet , Nslookup , Ping, Tracert , Netstat ,
etc.
• It also includes OS Fingerprinting, Port Scanning and Port Surfing
using various tools.
11. PASSWORD HACKING
• Password hacking, sometimes referred to as password cracking, is a
method of recovering passwords from data transmitted by or stored on
a computer.
• A password can be a secret word, phrase or string of characters used
to gain access to secured data. An individual with no knowledge of a
password may still determine it through password hacking.
• Conversely, a dictionary attack allows hackers to employ a program
which cycles through common words. A brute force attack goes letter
by letter, whereas a dictionary attack only tries possibilities most
likely to succeed. ... For example, users tend to pick
short passwords and base their passwords off common words.
12. HACKER
• A computer hacker is a computer expert who uses their technical
knowledge to achieve a goal or overcome an obstacle, within a
computerized system by non-standard means.
• Though the term "hacker" has become associated in popular
culture with a "security hacker" – someone who utilizes their technical
know-how of bugs or exploits to break into computer systems and
access data which would otherwise be unavailable to them – hacking
can also be utilized by legitimate figures in legal situations. For
example, law enforcement agencies sometimes use hacking techniques
in order to collect evidence on criminals and other malicious actors.
13.
14. TYPES OF HACKERS
Black Hat Hackers
White Hat Hackers
Grey Hat Hackers
15. BLACK HAT HACKER
• The term “black hat” originated from Western movies, where the bad
guys wore black hats and the good guys wore white hats.
• A black-hat hacker is an individual who attempts to gain
unauthorized entry into a system or network to exploit them for
malicious reasons. The black-hat hacker does not have any permission
or authority to compromise their targets. They try to inflict damage by
compromising security systems, altering functions of websites and
networks, or shutting down systems. They often do so to steal or gain
access to passwords, financial information, and other personal data.
16. WHITE HAT HACKER
• White-hat hackers, on the other hand, are deemed to be the good guys,
working with organizations to strengthen the security of a system. A
white hat has permission to engage the targets and to compromise
them within the prescribed rules of engagement.
• White-hat hackers are often referred to as ethical hackers. This
individual specializes in ethical hacking tools, techniques, and
methodologies to secure an organization’s information systems.
• Unlike black-hat hackers, ethical hackers exploit security networks
and look for backdoors when they are legally permitted to do so.
White-hat hackers always disclose every vulnerability they find in the
company’s security system so that it can be fixed before they are being
exploited by malicious actors.Some Fortune 50 companies like
Facebook, Microsoft, and Google also use white-hat hackers.
17. GREY HAT HACKER
• Grey hats exploit networks and computer systems in the way that
black hats do, but do so without any malicious intent, disclosing all
loopholes and vulnerabilities to law enforcement agencies or
intelligence agencies.
• Usually, grey-hat hackers surf the net and hack into computer
systems to notify the administrator or the owner that their
system/network contains one or more vulnerabilities that must be
fixed immediately. Grey hats may also extort the hacked, offering to
correct the defect for a nominal fee.
18. WORLD BEST HACKER
• Kevin Mitnick is the world's authority on hacking, social engineering,
and security awareness training. In fact, the world's most used
computer-based end-user security awareness training suite bears his
name. Kevin's keynote presentations are one part magic show, one
part education, and all parts entertaining.
• Hacked into 40 major corporations, landing him on the FBI’s Most
Wanted list
• CEO and chief "white hat" hacker at one of the most advanced
boutique security firms in the world
• His Global Ghost Team has a 100 percent success rate hacking into
security systems.
19. SERVICE OF ETHICAL HACKING
• Wireless Security
• Application Security
• Network Security
20. WIRELESS SECURITY
These services provide and assess the level of security in the existing
infrastructure and network to provide instructions promising system
accessibility and uphold its integrity at the same time. Wireless security
works in three steps, which are:
• Identify vulnerabilities
• Adopt security measures
• Deploy the threats
21. APPLICATION SECURITY
• Application security is the process of making apps more secure by
finding, fixing, and enhancing the security of apps. Much of this
happens during the development phase, but it includes tools and
methods to protect apps once they are deployed.
• This is used for digging deep into and processing the cruciality and
range of challenges faces by the thick client (Java) and the thin client
(web browsers). Application security comprises of services like client-
side testing and web application testing.
22. NETWORK SECURITY
• Network security is a broad term that covers a multitude of
technologies, devices and processes. In its simplest term, it is a set of
rules and configurations designed to protect the integrity,
confidentiality and accessibility of computer networks and data using
both software and hardware technologies.
It lends information on the networks, services, system devices, and
their agreements. It also examines and surveys the applications of the
voice over Internet convention within the organization
environment. Network security’s main objective is to facilitate the
presentation of the political repercussions on its own development.
23. WHY DO WE NEED ETHICAL HACKING?
• Ethical Hacking comes handy in corporate sectors and organizations,
to fight against unlawful practices of breaching systems and to take
precautionary actions on hackers.
• Dangerous software like Trojan horses, viruses and spam email causes
disruption and disturbance in the system and storage space. Ethical
hacking provides useful here as it helps to uncover these virus attacks
against systems and in addition, lends high-level security.
• The main objective of ethical hacking is to promise safety in wireless
infrastructure which constitutes most of the current business
companies’ aims.
24. DISADVANTAGES OF HACKING
• Massive security breach.
• Unauthorized system access on private information.
• Privacy violation.
• Hampering system operation.
• Denial of service attacks.
• Malicious attack on the system.
25. NEED OF ETHICAL HACKING?
• Ethical hacking follows the guidelines of safe hacking for the efficient
working of the system. This is a complex procedure hence an ethical
hacker requires great skills in comparison to penetration testing.
• Ethical hacking has the privilege of gathering access to a company’s
network and information system. This automatically provides security
to intellectual attacks and threats like viruses. Ethical hacking, as a
result, ends up also testing the security levels of the programs and
software.
26. CYBER LAW IN INDIA FOR HACKING
• Chapter XI Section 66 of IT Act, 2000 particularly deals with the act
of hacking. Section 66(1) defines a hack as, any person, dishonestly or
fraudulently, does any act referred to in Section 43 is called
hacking, and Section 66(2) prescribes the punishment for it. Hacking
is a punishable offense in India with imprisonment up to 3 years, or
with fine up to two lakh rupees, or with both.
• Chapter IX Section 43 of IT act, 2000 prescribes a penalty for the
damage to computer or computer system. It is a common thing which
happens whenever a computer system is hacked. Black hats damage
the system that they hack and steal the information. This
enumerative provision includes a lot of activities.
27. CYBER LAW IN INDIA FOR HACKING
• Chapter XI Section 65 of the said act makes tampering with computer
source documents an offense. Section 72 of the same chapter makes
the breach of confidentiality and privacy, a punishable offense. This is
the most common aftermath of hacking.
• The Information and Technology Act, 2000 (IT Act) covers all types
of cyber crime committed in the country
including hacking. Hacking earlier used to refer to a crime under
section 43 of the IT Act but at the same time, ethical hacking or better
known as white collar hacking was considered legal.
28. SCOPE FOR ETHICAL HACKING
• Ethical hacking is generally used as penetration testing to detect
vulnerabilities, risk and identify the loopholes in a security system
and to take corrective measures against those attacks.
• Ethical hacking is a key component of risk evaluation, auditing, and
counter-frauds. The scope for the Ethical Hackers is high and it is one
of the rapidly growing careers at present as many malicious attackers
cause a threat to the business and its networks. Industries like
Information Technology and Banking Sectors hire several Ethical
hackers to protect their data and infrastructure. Also, in the upcoming
days, the demand for this profile is going to be high compared to other
profiles due to an increased threat of vulnerabilities.