SlideShare ist ein Scribd-Unternehmen logo
1 von 24
KNOW ABOUT : 
WHAT IS HACKING? 
HACKERS 
TYPES OF HACKING 
WHAT IS ETHICAL HACKING? 
DIFFERENT LEVELS IN HACKERS
What is Hacking? 
 Hacking is simply 
. 
 It is the act of breaking in to a computer 
system and is a criminal offence under the 
computer misuse. 
 
.
Types Of Hacking : 
• : 
- It include stealing passwords (which hackers 
then use or sell) 
- Performing industrial espionage 
- causing harm (as disgruntled employees) 
- committing simple misuse.
• : 
- Rogue access points (APs) are unsecured 
wireless access points that outsiders can easily 
breech. (Local hackers often advertise rogue 
APs to each other.) 
- Rogue APs are most often connected by well-meaning 
but ignorant employees.
• : 
- Hackers can gain access to a network by 
exploiting back doors administrative 
shortcuts, configuration errors, easily 
deciphered passwords, and unsecured dial-ups. 
- With the aid of computerized searchers 
(bots), hackers can probably find any 
weakness in your network.
• : 
- Viruses and worms are self-replicating 
programs or code fragments that attach 
themselves to other programs (viruses) or 
machines (worms). 
- Both attempt to shut down networks by 
flooding them with massive amounts of bogus 
traffic, usually through e-mail.
• : 
-Trojan horses, which are attached to other 
programs, are the leading cause of all break-ins. 
- When a user downloads and activates a 
Trojan horse, the hacked software (SW) kicks 
off a virus, password gobbler, or remote-control 
SW that gives the hacker control of the 
PC.
• : 
- DoS attacks give hackers a way to bring down 
a network without gaining internal access. 
- DoS attacks work by flooding the access 
routers with bogus traffic (which can be e-mail 
or Transmission Control Protocol, TCP, 
packets). 
- Distributed DoSs are coordinated DoS attacks 
from multiple sources. DDoS is more difficult 
to block because it uses multiple, changing, 
source IP addresses.
• 
: 
are people who just like to break 
stuff. They usually exploit any target of 
opportunity. 
are hobbyists or professionals who 
break passwords and develop Trojan horses or 
other SW (called warez). They either use the 
SW themselves (for bragging rights) or sell it 
for profit.
are hacker wannabes. They 
have no real hacker skills, so they buy or 
download warez, which they launch. 
Other attackers include disgruntled employees, 
terrorists, political operatives, or anyone else 
who feels slighted, exploited, ripped off, or 
unloved.
• : 
- Sniffing refers to the act of intercepting TCP 
packets. This interception can happen through 
simple eavesdropping or something more 
sinister. 
- Spoofing is the act of sending an illegitimate 
packet with an expected acknowledgment 
(ACK), which a hacker can guess, predict, or 
obtain by snooping.
- 
. However, 
hackers have also developed new skills that 
allow them to break into more complex 
systems. 
- Hacking typically involves compromising the 
security of networks, breaking the security of 
application software, or creating malicious 
programs such as viruses.
- Most popular forms of network hacking are 
denial of service (DoS) attacks and mail bombs. 
- DoS attacks are designed to swamp a 
computer network, causing it to crash. 
- Mail bombs act in a similar fashion, but attack 
the network's mail servers. 
-Web server are bombarded with fake requests 
for Web pages, which overloads the site and 
caused it to crash.
- Network hackers also try to break into secure 
areas to find sensitive data. Once a network is 
hacked, files can be removed, stolen, or erased. 
- Application hackers break security on 
application software-software including word 
processing and graphics programs-in order to 
get it for free.
- One way they gain access to software that 
requires a serial number for installation is by 
setting up a serial number generator that will 
try millions of different combinations until a 
match is found. 
- Application hackers also sometimes attack 
the program itself in an attempt to remove 
certain security features.
-Hackers that create viruses, logic bombs, 
worms, and Trojan horses are involved in 
perhaps the most malicious hacking activities. 
-A virus is a program that has the potential to 
attack and corrupt computer files by attaching 
itself to a file to replicate itself. 
- It can also cause a computer to crash by 
utilizing all of the computer's resources.
What is ethical hacking ? 
Ethical hacking is where 
. 
Ex. : A bank may pay a hacker to hack their 
systems to see if it is hackable. If he gets in, 
then they know there is potential for other 
people to hack in, and usually they will work 
with this ethical hacker to patch these holes. If 
he doesn't get in, then they pray that nobody is 
better at hacking than him.
A hacker looks at it this 
way. The RFC says to load an instruction into 
memory, use 8 bits of data, and two bits of 
instruction, then a hacker looks at this and 
wonders, and tries to pass more no. of bits . 
- As results sooner or later the computer will 
not be able to deal with the amount of data 
being passed in a manner it understands & the 
computer will not know how to interpret the 
instructions.
When a computer does not know what to do 
next, it gives up and passes control to the 
SYSTEM, which is all powerful. 
This is a very basic description of a buffer 
overflow. 
Once this happens, the hacker has 
administrative control and can now start 
passing commands to the computer that it will 
follow without question.
Different levels in hackers 
• There are three levels of hackers. 
spend all their time trying to 
break the system, to prove it can be broke, so 
they can get the manufacturer to address the 
problem and fix it. 
do same thing, but perhaps will try 
to gain from their new way of breaking the 
system. They may expect payment for finding a 
way to break the system, & they may even try 
to get financial gain from their knowledge or 
silence.
- want to take the knowledge of how 
to break a system and use it for financial gain. 
They may use it to hack systems or write code 
that allows others to hack systems, and sell 
that code.
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical Hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
hacking
hackinghacking
hacking
 
Hacking
HackingHacking
Hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 

Andere mochten auch (7)

Hackers guide to Startup Weekend
Hackers guide to Startup WeekendHackers guide to Startup Weekend
Hackers guide to Startup Weekend
 
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest DisclosureOpen Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwonThe basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber security
Cyber securityCyber security
Cyber security
 

Ähnlich wie Introduction to Ethical Hacking (Basics)

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
 

Ähnlich wie Introduction to Ethical Hacking (Basics) (20)

Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Security threats
Security threatsSecurity threats
Security threats
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking
HackingHacking
Hacking
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Introduction to Ethical Hacking (Basics)

  • 1.
  • 2. KNOW ABOUT : WHAT IS HACKING? HACKERS TYPES OF HACKING WHAT IS ETHICAL HACKING? DIFFERENT LEVELS IN HACKERS
  • 3. What is Hacking?  Hacking is simply .  It is the act of breaking in to a computer system and is a criminal offence under the computer misuse.  .
  • 4. Types Of Hacking : • : - It include stealing passwords (which hackers then use or sell) - Performing industrial espionage - causing harm (as disgruntled employees) - committing simple misuse.
  • 5. • : - Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) - Rogue APs are most often connected by well-meaning but ignorant employees.
  • 6. • : - Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. - With the aid of computerized searchers (bots), hackers can probably find any weakness in your network.
  • 7. • : - Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). - Both attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.
  • 8. • : -Trojan horses, which are attached to other programs, are the leading cause of all break-ins. - When a user downloads and activates a Trojan horse, the hacked software (SW) kicks off a virus, password gobbler, or remote-control SW that gives the hacker control of the PC.
  • 9. • : - DoS attacks give hackers a way to bring down a network without gaining internal access. - DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets). - Distributed DoSs are coordinated DoS attacks from multiple sources. DDoS is more difficult to block because it uses multiple, changing, source IP addresses.
  • 10. • : are people who just like to break stuff. They usually exploit any target of opportunity. are hobbyists or professionals who break passwords and develop Trojan horses or other SW (called warez). They either use the SW themselves (for bragging rights) or sell it for profit.
  • 11. are hacker wannabes. They have no real hacker skills, so they buy or download warez, which they launch. Other attackers include disgruntled employees, terrorists, political operatives, or anyone else who feels slighted, exploited, ripped off, or unloved.
  • 12. • : - Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister. - Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.
  • 13. - . However, hackers have also developed new skills that allow them to break into more complex systems. - Hacking typically involves compromising the security of networks, breaking the security of application software, or creating malicious programs such as viruses.
  • 14. - Most popular forms of network hacking are denial of service (DoS) attacks and mail bombs. - DoS attacks are designed to swamp a computer network, causing it to crash. - Mail bombs act in a similar fashion, but attack the network's mail servers. -Web server are bombarded with fake requests for Web pages, which overloads the site and caused it to crash.
  • 15. - Network hackers also try to break into secure areas to find sensitive data. Once a network is hacked, files can be removed, stolen, or erased. - Application hackers break security on application software-software including word processing and graphics programs-in order to get it for free.
  • 16. - One way they gain access to software that requires a serial number for installation is by setting up a serial number generator that will try millions of different combinations until a match is found. - Application hackers also sometimes attack the program itself in an attempt to remove certain security features.
  • 17. -Hackers that create viruses, logic bombs, worms, and Trojan horses are involved in perhaps the most malicious hacking activities. -A virus is a program that has the potential to attack and corrupt computer files by attaching itself to a file to replicate itself. - It can also cause a computer to crash by utilizing all of the computer's resources.
  • 18. What is ethical hacking ? Ethical hacking is where . Ex. : A bank may pay a hacker to hack their systems to see if it is hackable. If he gets in, then they know there is potential for other people to hack in, and usually they will work with this ethical hacker to patch these holes. If he doesn't get in, then they pray that nobody is better at hacking than him.
  • 19. A hacker looks at it this way. The RFC says to load an instruction into memory, use 8 bits of data, and two bits of instruction, then a hacker looks at this and wonders, and tries to pass more no. of bits . - As results sooner or later the computer will not be able to deal with the amount of data being passed in a manner it understands & the computer will not know how to interpret the instructions.
  • 20. When a computer does not know what to do next, it gives up and passes control to the SYSTEM, which is all powerful. This is a very basic description of a buffer overflow. Once this happens, the hacker has administrative control and can now start passing commands to the computer that it will follow without question.
  • 21. Different levels in hackers • There are three levels of hackers. spend all their time trying to break the system, to prove it can be broke, so they can get the manufacturer to address the problem and fix it. do same thing, but perhaps will try to gain from their new way of breaking the system. They may expect payment for finding a way to break the system, & they may even try to get financial gain from their knowledge or silence.
  • 22. - want to take the knowledge of how to break a system and use it for financial gain. They may use it to hack systems or write code that allows others to hack systems, and sell that code.