SlideShare ist ein Scribd-Unternehmen logo
1 von 16
WELCOMEWELCOMEEveryone
Ethical HackingEthical Hacking
A technological threat
By Team
Our Team MembersOur Team Members
OverviewOverview
• Concept Of Hacking
• Difference Between Hacking & Ethical Hacking
• History Of Hacking
• Types Of Hacking
• Types Of Hacker
• Consequences
• Conclusion
Concept Of HackingConcept Of Hacking
• Hacking is not the one which you people think
of……
• It’s not the one which you play with other’s
computers, Facebook account (organization’s
Government’s etc…)
• Now a days this technology has become a crime
due to these aspects
• We should not miss use the technologies for such
criminal aspects
• Instead we can use it in better manner like security
purpose
Hacking & Ethical HackingHacking & Ethical Hacking
HackingHacking
Access computer system or network without authorization
Breaks the law
Ethical HackingEthical Hacking
•Performs most of the same activities but with owner’s permission
to perform Penetration Test
•It is Legal
•Part of an overall security program
•Identify vulnerabilities visible from Internet at Particular point of
time
•Ethical hackers possesses same skills. Mindset and tools of a
hacker but the attacks are done in a non-destructive manner
History Of Ethical HackingHistory Of Ethical Hacking
• The first hacker was appeared in 1960’s at the Massachusetts
Institute Of Technology(MIT)
• During the 1970’s, a different kind of hacker appeared:
Phone Phreaker or Phone Hacker
• In the 1980’s, phreaks started to migrate to
computers, and the first Bulletin Board System (BBS)
appeared
• During the 1990’s, when the use of internet
widespread around the world, hackers multiplied
Types of HackerTypes of Hacker
White Hat HackerWhite Hat Hacker
•Good guys
•Don’t use their skill for illegal purpose
•Computer security experts and help to protect from Black Hats.
BlackBlack Hat HackerHat Hacker
•Bad guys
•Use their skill maliciously for personal gain
•Hack banks, steal credit cards and deface websites
GreyGrey Hat HackerHat Hacker
•It is a combination of White hat n Black Hat Hackers
•Goal of grey hat hackers is to provide national security
Types of HackingTypes of Hacking
 Phishing Method OR Fake Login Hack. (Working)
 Key logging (Working)
 Brute Force Hack.. (Working)
 Cookie Steal Hack. (Not Working)
Some Famous HackersSome Famous Hackers
Ian Murphy Kevin Mitnick Johan Helsinguis
Linus Torvald Mark Abene Robert Morris
• Thousands of dollars in fines
• Imprisonment
• Seizure of your computer
ConsequencesConsequences
ConclusionConclusion
• Proper ethical hackers should be employed
• Do not expose your passwords to untrusted sites
• Practice using exact web address
• Close your internet while not in use
SummarySummary
• Hacking is of two types
• There are several types of hacking
• Ethical hacking – a legal method
• Consequences of illegal hacking
Thank YouThank You
Your Questions Please ?Your Questions Please ?

Weitere ähnliche Inhalte

Was ist angesagt?

Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
Chandra Prakash
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
Amol Deshmukh
 

Was ist angesagt? (20)

What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all time
 
The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 

Ähnlich wie Ethical hacking-presentation-updated(1by )Rasheed

Ähnlich wie Ethical hacking-presentation-updated(1by )Rasheed (20)

Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
hacking
hackinghacking
hacking
 
Hacking 2018
Hacking 2018Hacking 2018
Hacking 2018
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptxLearn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
 
Cybercrimes and Cybercriminals
Cybercrimes and CybercriminalsCybercrimes and Cybercriminals
Cybercrimes and Cybercriminals
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
 

Kürzlich hochgeladen

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 

Kürzlich hochgeladen (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 

Ethical hacking-presentation-updated(1by )Rasheed

  • 2. Ethical HackingEthical Hacking A technological threat By Team
  • 3. Our Team MembersOur Team Members
  • 4. OverviewOverview • Concept Of Hacking • Difference Between Hacking & Ethical Hacking • History Of Hacking • Types Of Hacking • Types Of Hacker • Consequences • Conclusion
  • 5. Concept Of HackingConcept Of Hacking • Hacking is not the one which you people think of…… • It’s not the one which you play with other’s computers, Facebook account (organization’s Government’s etc…) • Now a days this technology has become a crime due to these aspects • We should not miss use the technologies for such criminal aspects • Instead we can use it in better manner like security purpose
  • 6. Hacking & Ethical HackingHacking & Ethical Hacking HackingHacking Access computer system or network without authorization Breaks the law Ethical HackingEthical Hacking •Performs most of the same activities but with owner’s permission to perform Penetration Test •It is Legal •Part of an overall security program •Identify vulnerabilities visible from Internet at Particular point of time •Ethical hackers possesses same skills. Mindset and tools of a hacker but the attacks are done in a non-destructive manner
  • 7. History Of Ethical HackingHistory Of Ethical Hacking • The first hacker was appeared in 1960’s at the Massachusetts Institute Of Technology(MIT) • During the 1970’s, a different kind of hacker appeared: Phone Phreaker or Phone Hacker
  • 8. • In the 1980’s, phreaks started to migrate to computers, and the first Bulletin Board System (BBS) appeared • During the 1990’s, when the use of internet widespread around the world, hackers multiplied
  • 9. Types of HackerTypes of Hacker White Hat HackerWhite Hat Hacker •Good guys •Don’t use their skill for illegal purpose •Computer security experts and help to protect from Black Hats. BlackBlack Hat HackerHat Hacker •Bad guys •Use their skill maliciously for personal gain •Hack banks, steal credit cards and deface websites GreyGrey Hat HackerHat Hacker •It is a combination of White hat n Black Hat Hackers •Goal of grey hat hackers is to provide national security
  • 10. Types of HackingTypes of Hacking  Phishing Method OR Fake Login Hack. (Working)  Key logging (Working)  Brute Force Hack.. (Working)  Cookie Steal Hack. (Not Working)
  • 11. Some Famous HackersSome Famous Hackers Ian Murphy Kevin Mitnick Johan Helsinguis Linus Torvald Mark Abene Robert Morris
  • 12. • Thousands of dollars in fines • Imprisonment • Seizure of your computer ConsequencesConsequences
  • 13. ConclusionConclusion • Proper ethical hackers should be employed • Do not expose your passwords to untrusted sites • Practice using exact web address • Close your internet while not in use
  • 14. SummarySummary • Hacking is of two types • There are several types of hacking • Ethical hacking – a legal method • Consequences of illegal hacking
  • 16. Your Questions Please ?Your Questions Please ?