SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Welcome
Hacking 
• What is Hack? 
• -To Modify or Crack a program , often in 
an anauthorise manner, by changing the 
code itself. 
• Who is hacker? 
• -The person who is consistently engaging 
in hacking activities, and has accepted 
hacking as a lifestyle and philosophy of 
their choice is called hacker.
What is the meaning of 
hacking? 
Hacking is the technique of modifying 
the features of system. In order to 
accomplish a goal outside of the 
creator's original purpose.
Differnce Between Hacker and Cracker? 
Hacker: 
The person who 
hacks the 
system 
Cracker: 
The person who 
destroy the 
system or intrude 
the system.
History Of Hacking. 
• The first hacker was 
appeared in 1960's at 
the Massachusetts 
Institute of 
Technology (MIT) 
• During the 1970's, a 
different king of 
hacker 
appeared:Phone 
Phreaker Or Phone 
Hacker.
•In the 1980's, phreaks started to migrate to 
computer, and the first Bulletin Board System 
(BBS) appeared. 
•During The 1990's, When the use of internet 
wide spread around the world, Hackers 
multiplied.
Diffrence between Hacker and 
ethical Hacker. 
• Hacker:- 
The person who access the computer 
system or network without authorization. 
• Ethical hacker:- 
The person who performs the same 
activities but with owenr's permission. 
Employed by companies to perform 
penetration test.
Types of Hackers. 
White Hats Black Hats Srcript Kiddies 
Spy Hackers 
Grey Hats 
Suicide Hackers Cyber Terrorist State Sponsored Hacker
Hacking Process 
1.Footprinting 
2.Scanning 
4.Attack And Gaining Access 
3.Enumeration 
5.Escalating Privilages , 
Covering Tracks & 
and creating Backdoors
Hacking Process Explanation 
• Footprinting: 
Footprinting is the technique of gathering 
information about computer systems and the 
entities they belong to. 
• Scanning: 
Port scanning is a common technique used by a 
penetration tester to find out the open doors, In technical 
terminology port scanning is used to find out the 
vulnerabilities in the services listing on a port.
Enumeration: 
Enumeration is the first attack on target network, enumeration is the 
process to gather the information about a target machine by actively 
connecting to it. 
Attack And Gaining Access: 
In computer and computer networks an attack is any attempt to 
destroy, expose, alter, disable, steal or gain unauthorized access to 
or make unauthorized use of an asset. 
This is the phase where the real hacking takes place. Vulnerabilities 
discovered during the reconnaissance and scanning phase are now 
exploited to gain access. The method of connection the hacker 
uses for an exploit can be a local area network (LAN, either wired or 
wireless), local access to a PC, the Internet, or offline. Examples 
include stack-based buffer overflows, denial of service (DoS), and 
session hijacking. These topics will be discussed in later chapters. 
Gaining access is known in the hacker world as owning the system.
Escalating Privilages, Covering Tracks & and creating Backdoors: 
Once hackers have been able to gain and maintain access, they 
cover their tracks to avoid 
detection by security personnel, to continue to use the owned 
system, to remove evidence of 
hacking, or to avoid legal action. Hackers try to remove all traces of 
the attack, such as log files 
or intrusion detection system (IDS) alarms. Examples of activities 
during this phase of the 
attack include steganography, the use of tunneling protocols, and 
altering log files.
Some tips to protect from Hackers! 
• Keep Antivirus in PC and Keep it Up-dated. 
• Don't Open suspecious email's 
• Change Your password after some days. 
• Choose Cryprtic Password for accounts (use 
special symbols,numbers,words) 
• Don't Download mobile apps from third party 
websites. 
• Download OS updates. 
• Keep Anti-spyware in your computer. 
• Use Virtual Keyboard when online shoping.
Thanks! 
Be secure online!!!!!! 
For More info: e-hacker.ddns.net

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Hacking
Hacking Hacking
Hacking
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Threat landscape 4.0
Threat landscape 4.0Threat landscape 4.0
Threat landscape 4.0
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Andere mochten auch

Zeal for Life Presentation
Zeal for Life PresentationZeal for Life Presentation
Zeal for Life Presentation
jonsale
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
yanizaki
 

Andere mochten auch (17)

Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009
Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009
Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
On taxonomies of code and how to hack it
On taxonomies of code and how to hack itOn taxonomies of code and how to hack it
On taxonomies of code and how to hack it
 
God’s eye - Technology
God’s eye - TechnologyGod’s eye - Technology
God’s eye - Technology
 
Zeal for Life Presentation
Zeal for Life PresentationZeal for Life Presentation
Zeal for Life Presentation
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Hack programming language
Hack programming languageHack programming language
Hack programming language
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
30 Brilliant marketing growth hack cards.
30 Brilliant marketing growth hack cards.30 Brilliant marketing growth hack cards.
30 Brilliant marketing growth hack cards.
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
10 Event Technology Trends to Watch in 2016
10 Event Technology Trends to Watch in 201610 Event Technology Trends to Watch in 2016
10 Event Technology Trends to Watch in 2016
 
Publishing Production: From the Desktop to the Cloud
Publishing Production: From the Desktop to the CloudPublishing Production: From the Desktop to the Cloud
Publishing Production: From the Desktop to the Cloud
 
31 Best Growth Hacking Resources
31 Best Growth Hacking Resources31 Best Growth Hacking Resources
31 Best Growth Hacking Resources
 

Ähnlich wie Introduction to ethical hacking

Ähnlich wie Introduction to ethical hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Introduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf fileIntroduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf file
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Introduction to ethical hacking

  • 2. Hacking • What is Hack? • -To Modify or Crack a program , often in an anauthorise manner, by changing the code itself. • Who is hacker? • -The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice is called hacker.
  • 3. What is the meaning of hacking? Hacking is the technique of modifying the features of system. In order to accomplish a goal outside of the creator's original purpose.
  • 4. Differnce Between Hacker and Cracker? Hacker: The person who hacks the system Cracker: The person who destroy the system or intrude the system.
  • 5. History Of Hacking. • The first hacker was appeared in 1960's at the Massachusetts Institute of Technology (MIT) • During the 1970's, a different king of hacker appeared:Phone Phreaker Or Phone Hacker.
  • 6. •In the 1980's, phreaks started to migrate to computer, and the first Bulletin Board System (BBS) appeared. •During The 1990's, When the use of internet wide spread around the world, Hackers multiplied.
  • 7. Diffrence between Hacker and ethical Hacker. • Hacker:- The person who access the computer system or network without authorization. • Ethical hacker:- The person who performs the same activities but with owenr's permission. Employed by companies to perform penetration test.
  • 8. Types of Hackers. White Hats Black Hats Srcript Kiddies Spy Hackers Grey Hats Suicide Hackers Cyber Terrorist State Sponsored Hacker
  • 9. Hacking Process 1.Footprinting 2.Scanning 4.Attack And Gaining Access 3.Enumeration 5.Escalating Privilages , Covering Tracks & and creating Backdoors
  • 10. Hacking Process Explanation • Footprinting: Footprinting is the technique of gathering information about computer systems and the entities they belong to. • Scanning: Port scanning is a common technique used by a penetration tester to find out the open doors, In technical terminology port scanning is used to find out the vulnerabilities in the services listing on a port.
  • 11. Enumeration: Enumeration is the first attack on target network, enumeration is the process to gather the information about a target machine by actively connecting to it. Attack And Gaining Access: In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack-based buffer overflows, denial of service (DoS), and session hijacking. These topics will be discussed in later chapters. Gaining access is known in the hacker world as owning the system.
  • 12. Escalating Privilages, Covering Tracks & and creating Backdoors: Once hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action. Hackers try to remove all traces of the attack, such as log files or intrusion detection system (IDS) alarms. Examples of activities during this phase of the attack include steganography, the use of tunneling protocols, and altering log files.
  • 13. Some tips to protect from Hackers! • Keep Antivirus in PC and Keep it Up-dated. • Don't Open suspecious email's • Change Your password after some days. • Choose Cryprtic Password for accounts (use special symbols,numbers,words) • Don't Download mobile apps from third party websites. • Download OS updates. • Keep Anti-spyware in your computer. • Use Virtual Keyboard when online shoping.
  • 14. Thanks! Be secure online!!!!!! For More info: e-hacker.ddns.net