SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Fundamental of Ethical Hacking by
Waseem Rauf
Points to be discuss in this session
 Objectives of this Session
 Computer/Network Security
 Hacking
 Ethical Hacking and Types of Hackers
 Cyber Crime
 Common Terminology used in the Ethical Hacking
 Kali Linux
 Virtualization ( Virtual Machine ) Concept
 How to install Kali Linux on Virtual Machine
 Kali Linux Overview and Basic Commands of Linux
 Career in Ethical Hacking
 Future Sessions Discussion and Technical talks
Objective of this Session
 The Objective of this session is to give you awareness of ethical hacking .
 Session for beginner
 Teach only useful information
 Don’t share with you any illegal information about hacking
 After attending this session, you should have solid understanding of Ethical
hacking
 Specially for those who want to start their career as a ethical hacker
I hope, you will enjoy and love this session
Why Computer Security ?
Computer systems are ubiquitous in our daily life
 Computers store and process our data and information
 Computers access and control our resources
Valuable Data Private Data Dangerous Data
The Sony Breach
 An Example: The Playstation Network (PSN) Attack
 Illegal intrusion into network around April 2011
 Severe consequences for users and companies
 Financial damage of over 24 billion dollars
Hacking
 According to cyber.laws.com, “ Computer hacking refers to the
practice of modifying or altering computer software and
hardware to accomplish a goal that is considered to be outside
of the creator’s original objective”. Those individuals who
engage in computer hacking activities are typically referred to
as “hackers.”
Ethical Hacking
 Ethical hacking is when an expert attempts to hack a computer or network
with the express written permission of the assets owner.
 Also called White Hat Hacking
 Penetration Testing
 It is legal and Permission is obtained from the target
 Part of overall Security Program
 The ethical hackers are paid to find these vulnerabilities first and make the
company aware of the risks
Types of Hackers
 Black Hat Hackers : ( Bad Guys )
 White Hat Hackers : ( Good Guys )
 Gray Hat Hackers : (Combination of Black Hat and
White Hat )
Black Hat Hackers : ( Bad Guys )
 They hack the system/network/web without owner permission
 The intention of black hat hacker is very bad
 A black hat hacker may try to steal information such as social security
numbers, credit cards, personal identifiable information, bank account
Information and much more
 They do hacking for illegal purpose
 The have excellent computing and programming skills
 They hack the system for their own benefits
 Their main goal is to do damage and to expose or steal data
White Hat Hackers : ( Good Guys )
 They hack systems with the owner permission
 Company hire white hat hackers
 They are professional hackers who works in Industry
 They are also called ethical hackers
 They work for legal purpose
 They secure network/web of the company
Gray Hat Hackers : (Combination of
Black Hat and White Hat )
 The gray hat hacker is a unique type of hacker because they are freelancers
and operate without written consent
 They are known to discover systems weaknesses, without permission but
without malicious intent
 Their goal is to bring these flaws to the attention of the system owner so
they can be corrected
Pre-Requisite
 What should we know to enter in the field of Ethical Hacking
 You should have basic and solid Understanding of Programming
 You should have basic and solid Understanding of Networking
 You should have basic and solid Understanding of Linux OS etc.
Essential Terminology
Cryptography :
 Art and Science of keeping information secure
 Penetration testing (also called pen testing) is the practice of testing or evaluating
a computer system, network or Web application to find vulnerabilities that an
attacker could exploit.
 Vulnerability : Weakness in a System ex. Hardware/Software vulnerabilities
 Exploit : A method to intrude/penetrate in a System
 Metasploit : Metasploit is one of the most powerful and widely used tools for
penetration testing
 SQL Injection : SQL injection is a code injection technique that might destroy
your database. SQL injection is one of the most common web hacking
SQL injection is the placement of malicious code in SQL statements, via web page
input.
 Brute force Attack : a simple brute-force attack may have a dictionary of all
words or commonly used passwords and cycle through those words until it gains
access to the account.
 Keylogger : A keylogger, sometimes called a keystroke logger or system monitor,
is a type of surveillance technology used to monitor and record each keystroke
typed on a specific computer's keyboard.
 Phishing attack : Phishing is the attempt to obtain sensitive
information such as usernames, passwords, and credit card details (and,
indirectly, money), often for malicious reasons, by disguising as a
trustworthy entity in an electronic communication.
 Bug bounty Program : A bug bounty program is a deal offered by many
websites and software developers by which individuals can receive
recognition and compensation for reporting bugs, especially those
pertaining to exploits and vulnerabilities
 Footprinting : It is the process of gathering data about certain target
Or Information gathering
 Cyber Crime : Crime relevant to Computer
 Cloud Computing : Internet based computing
Virtual Machines
 A Software Computer
• A Computer within a computer
• Can be used just like any other computer
 Why use VMs
• A VM is stored on a physical HDD - thus extremely versatile
• You can transfer a VM just like any other file on your computer
• You can clone/repurpose VMs very easily
 Terminology
• Host Computer
• Guest VM
 A Host Computer can host Several VMs
 A Guest VM generally resides on a single host
 A Host Computer is generally a very powerful server that is designed to run
multiple Guest VMs
 Tips : Keep resources as low as possible and Turn off VMs when you are not using
KALI LINUX
 It is an Open Source
 Linux OS
 Specially designed for Hackers
 All tools are built in relevant to Hacking
 More than 300 penetration testing tools
Download and Install Virtual Box and
Kali Linux
 Step # 1 : Download Virtual Box
 https://www.virtualbox.org/wiki/Downloads
 Step # 2 : Install Virtual Box
 Step # 3 : Download Kali Linux
 https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-
download/
 Step # 4 : Follow these steps ( Upcoming Slides )
 Default User Name is root and password is toor .
Let’s Explore Kali Linux
Tips ( How to Secure your Network )
 Always clear your browsers cookies
 Password should be strong
Career in Ethical Hacking
 Bright Career
 Information (Network/Computer/Cyber) Security is one the highest paid and
fastest growing job segment with a huge skill gap. According to
Forbes, there will be a global shortage of two million cyber security
professionals by 2019. Moreover, Info security complements all aspect of
computer science from mobile, networks, cloud, OS to web.
My next Sessions
 Mobile Application Development
 Web Designing and Development
 Introduction to Cloud Computing
 Artificial Intelligence and more ….
Contact with me on Facebook and Gmail:
waseemrauf7@gmail.com
THANK YOU
Please Subscribe my YouTube Channel for
further upcoming updates

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptRohit Yadav
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basicsMeenesh Jain
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackinganonymousrider
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Introduction to hacking
Introduction to hackingIntroduction to hacking
Introduction to hackingnitish mehta
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 

Was ist angesagt? (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to hacking
Introduction to hackingIntroduction to hacking
Introduction to hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 

Ähnlich wie Fundamental of ethical hacking

Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hackingBeing Uniq Sonu
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxSiddheshSurve10
 

Ähnlich wie Fundamental of ethical hacking (20)

ethical hacking
ethical hackingethical hacking
ethical hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
 

Kürzlich hochgeladen

Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 

Kürzlich hochgeladen (20)

Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Fundamental of ethical hacking

  • 1. Fundamental of Ethical Hacking by Waseem Rauf
  • 2. Points to be discuss in this session  Objectives of this Session  Computer/Network Security  Hacking  Ethical Hacking and Types of Hackers  Cyber Crime  Common Terminology used in the Ethical Hacking  Kali Linux  Virtualization ( Virtual Machine ) Concept  How to install Kali Linux on Virtual Machine  Kali Linux Overview and Basic Commands of Linux  Career in Ethical Hacking  Future Sessions Discussion and Technical talks
  • 3. Objective of this Session  The Objective of this session is to give you awareness of ethical hacking .  Session for beginner  Teach only useful information  Don’t share with you any illegal information about hacking  After attending this session, you should have solid understanding of Ethical hacking  Specially for those who want to start their career as a ethical hacker I hope, you will enjoy and love this session
  • 4. Why Computer Security ? Computer systems are ubiquitous in our daily life  Computers store and process our data and information  Computers access and control our resources Valuable Data Private Data Dangerous Data
  • 5. The Sony Breach  An Example: The Playstation Network (PSN) Attack  Illegal intrusion into network around April 2011  Severe consequences for users and companies  Financial damage of over 24 billion dollars
  • 6.
  • 7. Hacking  According to cyber.laws.com, “ Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective”. Those individuals who engage in computer hacking activities are typically referred to as “hackers.”
  • 8. Ethical Hacking  Ethical hacking is when an expert attempts to hack a computer or network with the express written permission of the assets owner.  Also called White Hat Hacking  Penetration Testing  It is legal and Permission is obtained from the target  Part of overall Security Program  The ethical hackers are paid to find these vulnerabilities first and make the company aware of the risks
  • 9. Types of Hackers  Black Hat Hackers : ( Bad Guys )  White Hat Hackers : ( Good Guys )  Gray Hat Hackers : (Combination of Black Hat and White Hat )
  • 10. Black Hat Hackers : ( Bad Guys )  They hack the system/network/web without owner permission  The intention of black hat hacker is very bad  A black hat hacker may try to steal information such as social security numbers, credit cards, personal identifiable information, bank account Information and much more  They do hacking for illegal purpose  The have excellent computing and programming skills  They hack the system for their own benefits  Their main goal is to do damage and to expose or steal data
  • 11. White Hat Hackers : ( Good Guys )  They hack systems with the owner permission  Company hire white hat hackers  They are professional hackers who works in Industry  They are also called ethical hackers  They work for legal purpose  They secure network/web of the company
  • 12. Gray Hat Hackers : (Combination of Black Hat and White Hat )  The gray hat hacker is a unique type of hacker because they are freelancers and operate without written consent  They are known to discover systems weaknesses, without permission but without malicious intent  Their goal is to bring these flaws to the attention of the system owner so they can be corrected
  • 13. Pre-Requisite  What should we know to enter in the field of Ethical Hacking  You should have basic and solid Understanding of Programming  You should have basic and solid Understanding of Networking  You should have basic and solid Understanding of Linux OS etc.
  • 15. Cryptography :  Art and Science of keeping information secure
  • 16.  Penetration testing (also called pen testing) is the practice of testing or evaluating a computer system, network or Web application to find vulnerabilities that an attacker could exploit.  Vulnerability : Weakness in a System ex. Hardware/Software vulnerabilities  Exploit : A method to intrude/penetrate in a System  Metasploit : Metasploit is one of the most powerful and widely used tools for penetration testing  SQL Injection : SQL injection is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking SQL injection is the placement of malicious code in SQL statements, via web page input.  Brute force Attack : a simple brute-force attack may have a dictionary of all words or commonly used passwords and cycle through those words until it gains access to the account.  Keylogger : A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
  • 17.  Phishing attack : Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.  Bug bounty Program : A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities  Footprinting : It is the process of gathering data about certain target Or Information gathering  Cyber Crime : Crime relevant to Computer  Cloud Computing : Internet based computing
  • 18. Virtual Machines  A Software Computer • A Computer within a computer • Can be used just like any other computer  Why use VMs • A VM is stored on a physical HDD - thus extremely versatile • You can transfer a VM just like any other file on your computer • You can clone/repurpose VMs very easily  Terminology • Host Computer • Guest VM
  • 19.  A Host Computer can host Several VMs  A Guest VM generally resides on a single host  A Host Computer is generally a very powerful server that is designed to run multiple Guest VMs  Tips : Keep resources as low as possible and Turn off VMs when you are not using
  • 20. KALI LINUX  It is an Open Source  Linux OS  Specially designed for Hackers  All tools are built in relevant to Hacking  More than 300 penetration testing tools
  • 21. Download and Install Virtual Box and Kali Linux  Step # 1 : Download Virtual Box  https://www.virtualbox.org/wiki/Downloads  Step # 2 : Install Virtual Box  Step # 3 : Download Kali Linux  https://www.offensive-security.com/kali-linux-vmware-virtualbox-image- download/  Step # 4 : Follow these steps ( Upcoming Slides )  Default User Name is root and password is toor .
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 33. Tips ( How to Secure your Network )  Always clear your browsers cookies  Password should be strong
  • 34. Career in Ethical Hacking  Bright Career  Information (Network/Computer/Cyber) Security is one the highest paid and fastest growing job segment with a huge skill gap. According to Forbes, there will be a global shortage of two million cyber security professionals by 2019. Moreover, Info security complements all aspect of computer science from mobile, networks, cloud, OS to web.
  • 35. My next Sessions  Mobile Application Development  Web Designing and Development  Introduction to Cloud Computing  Artificial Intelligence and more …. Contact with me on Facebook and Gmail: waseemrauf7@gmail.com
  • 36. THANK YOU Please Subscribe my YouTube Channel for further upcoming updates