SlideShare a Scribd company logo
1 of 12
Presentation Developed By Harshit Upadhyay(Hellhacker119)
About The Presentation..
Hello In This Presentation I Harshit Upadhyay Will Be Telling You The
Basics Of Ethical Hacking And Who Is A Hacker Anyhow. This
Presentation Will Give You An Idea About What Actually And
Fundamentally Hacking Is And Why Most Of The People Consider It As
A Crime. It Will Logically Helps You In Differentiating Between A Hacker
And A Cracker. The Presentation Will Show The Real Concepts Of
Hacking, How To's And Of Course How To Be AWARE OF HACKERS.

Presentation Developed By Harshit Upadhyay(Hellhacker119)
What actually Ethical Hacking is ?
Generally describing hacking is just like describing earth. Hacking as a
matter of fact don’t have any definition.so we can say that it is a
mixture of two terms “Ethical” and “hacking” where “ethical” refers to
good purpose and “hacking” as a computer related term means
breaking or entering Into a remote computer illegally. Now by joining
the following teems we explored that ethical hacking is actually
breaking into another computer system illegally but for good or ethical
reason.

Presentation Developed By Harshit Upadhyay(Hellhacker119)
Hacking A Crime Or Not!
• Hmm.This Is The Most Prominent Question Asked By People To A
Hacker, But An Elite Hacker Will Only Give Answer As No.This Is
Because Hacking Itself Is Not A Crime But Thinking Of The People
Make It So.Hacking According To Me Is Not A Crime Its Just Made
Crime By Some Foolish People. However The Hacking Done For Bad
Purpose Is Eventually Known As Cracking. So We Will Later Detail
About Hacking And Cracking But Now It Is Good To Understand That
Hacking Is not A Crime While Cracking Is So.

Presentation Developed By Harshit Upadhyay(Hellhacker119)
Who Are Hackers And Crackers..
“Hacker”
• Hacker is a person who breaks into another computer
system illegally by penetrating the security of a user and
then using the leaked information for either a good
purpose or for a bad purpose.*
• As I said there is no perfect reason for a hacker to hack a
computer. The reason behind is in the next slide.

“Cracker”

• Cracker are the BAD guys who just to hacking for
the purpose of enjoyment and for enhancing their
knowledge of exploitation. A cracker would do
hacking for the following reasons:
• Taking revenge.
• Streanghthing his hacking abilities.
• Way to become a famous person or hacker or
criminal.
• Enjoying the knowledge which he have.

Presentation Developed By Harshit Upadhyay(Hellhacker119)
Who is a hacker and an ethical
hacker.
• The Basic Thing That Is Conveyed Is The Slide Is Simply :
Hacker : A Person Doing Hacking For Bad Purpose. Example Includes
All The Acts That Are Performed By A Cracker.
Ethical Hacker : A Person Doing Hacking For Good Purpose. Example
Are:
• For Ensuring The Security Of A System Or A Network.
• For Supporting Public And Government Bodies.
• For Decoding Or Decrypting A Encrypted Message.
• For Helping The Counter Terrorist Organization.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Importance of Ethical Hacking..
Ethical Hacking Is Extremely Important Thing In This Era Of Computers
And Robotics, One Must Know What Is Hacking How To Prevent Or
Overcome It If One Is Victim. In The Current Time Ethical Hacking Plays
A Key Role In :
• Providing Security To The Important People Or Places.
•Protecting Yourself From Becoming A Victim Of Hacking By Either
Hacking Your Email Account On A Social Networking Site Or By Sending
You A Malicious File Or Programe,etc.
•Providing Security To The Common People Who Are Not So Aware Of
This. Example Banks, Offices Etc.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Two Legends Of Hacking..
Almost Every Successful Computer Businessmen Would Be An Hacker
In Their Time. The Best Known Example Them Is About A 13 Year Boy
Of US Who With Is His Other Hacker Friend Used To Relish
Programming And Hacking. They Both Were Extremely Intelligent And
Had Perfect Skills. They Always Enjoyed Breaking Into Each Other’s
Computer And Proving Their Superiority.
Today Most Of The People Know Them As Bill Gates And Paul Allen
Founder And Co-founder Of The Microsoft Corp, Usa.Both Of Them As
Most Of You Must Be Knowing Are Practically Zillionaires.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Steps to be secure of hacking ,,:
• Protect Your Computer.(Antiviruses And Antispyware's)
• Have A Secure Password.(Complicated But Easy To Remember)
• Your Email ID And Its Password Are Your Own Confidential Information.
• If You Are A Victim Of Such A Scenario, Please Contact The Respective
Company Immediately.
• If You Are Ever Asked For Your Password In An Unsolicited Manner Or By
Someone You Do Not Believe To Be Any Representative.
• You Should Change The Security Questions And Answers Wisely.
• I Strongly Recommend You All To Never Click On A Spammy Link And Doubtful
Ad Banners!
Presentation Developed By Harshit Upadhyay(Hellhacker119)
How to do Hacking??
Now This Is Also One Of The Most Frequently Asked Question By The
People To Hacker. Everybody Viewing This Presentation Are Eager To
Know How To Hack. So Before Proceeding Let Me Tell You The Thing
That Hacking Is And Always Will Lead To A Particular Goal.So To Hack
Anything One Must Have A Goal Of What He Is Hacking, Why And Well
Plan Of How He Will Hack.
Now There Are Few Steps That I Am Going To Tell You Which Will Give
You The Basic Idea Of Hacking And After That You All Will Be Able To
Understand Hacking And Stop Asking People How To Hack.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Steps to hack a computer…
• First of all decide what you need to decide what you are actually
going to hack.
• After thinking the goal you must need to plan the attack, language
and what OS you are going to use during hacking.
• You must need to get the information about the system and owner of
the system that you are going to hack.
• Then if it is possible try to apply some brain or in the technical term
Social Engineering.
• Finally after thinking all these attack the victim but note that the
attack is for a positive purpose.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Presentation Developed By Harshit Upadhyay(Hellhacker119)

More Related Content

Similar to Ethical hacking

1861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp021861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp02
Mudit Seth
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manas Das
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manas Das
 

Similar to Ethical hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackers
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Learn Hacking
Learn HackingLearn Hacking
Learn Hacking
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
1861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp021861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp02
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Arya
AryaArya
Arya
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Ethical hacking

  • 1. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 2. About The Presentation.. Hello In This Presentation I Harshit Upadhyay Will Be Telling You The Basics Of Ethical Hacking And Who Is A Hacker Anyhow. This Presentation Will Give You An Idea About What Actually And Fundamentally Hacking Is And Why Most Of The People Consider It As A Crime. It Will Logically Helps You In Differentiating Between A Hacker And A Cracker. The Presentation Will Show The Real Concepts Of Hacking, How To's And Of Course How To Be AWARE OF HACKERS. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 3. What actually Ethical Hacking is ? Generally describing hacking is just like describing earth. Hacking as a matter of fact don’t have any definition.so we can say that it is a mixture of two terms “Ethical” and “hacking” where “ethical” refers to good purpose and “hacking” as a computer related term means breaking or entering Into a remote computer illegally. Now by joining the following teems we explored that ethical hacking is actually breaking into another computer system illegally but for good or ethical reason. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 4. Hacking A Crime Or Not! • Hmm.This Is The Most Prominent Question Asked By People To A Hacker, But An Elite Hacker Will Only Give Answer As No.This Is Because Hacking Itself Is Not A Crime But Thinking Of The People Make It So.Hacking According To Me Is Not A Crime Its Just Made Crime By Some Foolish People. However The Hacking Done For Bad Purpose Is Eventually Known As Cracking. So We Will Later Detail About Hacking And Cracking But Now It Is Good To Understand That Hacking Is not A Crime While Cracking Is So. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 5. Who Are Hackers And Crackers.. “Hacker” • Hacker is a person who breaks into another computer system illegally by penetrating the security of a user and then using the leaked information for either a good purpose or for a bad purpose.* • As I said there is no perfect reason for a hacker to hack a computer. The reason behind is in the next slide. “Cracker” • Cracker are the BAD guys who just to hacking for the purpose of enjoyment and for enhancing their knowledge of exploitation. A cracker would do hacking for the following reasons: • Taking revenge. • Streanghthing his hacking abilities. • Way to become a famous person or hacker or criminal. • Enjoying the knowledge which he have. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 6. Who is a hacker and an ethical hacker. • The Basic Thing That Is Conveyed Is The Slide Is Simply : Hacker : A Person Doing Hacking For Bad Purpose. Example Includes All The Acts That Are Performed By A Cracker. Ethical Hacker : A Person Doing Hacking For Good Purpose. Example Are: • For Ensuring The Security Of A System Or A Network. • For Supporting Public And Government Bodies. • For Decoding Or Decrypting A Encrypted Message. • For Helping The Counter Terrorist Organization. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 7. Importance of Ethical Hacking.. Ethical Hacking Is Extremely Important Thing In This Era Of Computers And Robotics, One Must Know What Is Hacking How To Prevent Or Overcome It If One Is Victim. In The Current Time Ethical Hacking Plays A Key Role In : • Providing Security To The Important People Or Places. •Protecting Yourself From Becoming A Victim Of Hacking By Either Hacking Your Email Account On A Social Networking Site Or By Sending You A Malicious File Or Programe,etc. •Providing Security To The Common People Who Are Not So Aware Of This. Example Banks, Offices Etc. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 8. Two Legends Of Hacking.. Almost Every Successful Computer Businessmen Would Be An Hacker In Their Time. The Best Known Example Them Is About A 13 Year Boy Of US Who With Is His Other Hacker Friend Used To Relish Programming And Hacking. They Both Were Extremely Intelligent And Had Perfect Skills. They Always Enjoyed Breaking Into Each Other’s Computer And Proving Their Superiority. Today Most Of The People Know Them As Bill Gates And Paul Allen Founder And Co-founder Of The Microsoft Corp, Usa.Both Of Them As Most Of You Must Be Knowing Are Practically Zillionaires. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 9. Steps to be secure of hacking ,,: • Protect Your Computer.(Antiviruses And Antispyware's) • Have A Secure Password.(Complicated But Easy To Remember) • Your Email ID And Its Password Are Your Own Confidential Information. • If You Are A Victim Of Such A Scenario, Please Contact The Respective Company Immediately. • If You Are Ever Asked For Your Password In An Unsolicited Manner Or By Someone You Do Not Believe To Be Any Representative. • You Should Change The Security Questions And Answers Wisely. • I Strongly Recommend You All To Never Click On A Spammy Link And Doubtful Ad Banners! Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 10. How to do Hacking?? Now This Is Also One Of The Most Frequently Asked Question By The People To Hacker. Everybody Viewing This Presentation Are Eager To Know How To Hack. So Before Proceeding Let Me Tell You The Thing That Hacking Is And Always Will Lead To A Particular Goal.So To Hack Anything One Must Have A Goal Of What He Is Hacking, Why And Well Plan Of How He Will Hack. Now There Are Few Steps That I Am Going To Tell You Which Will Give You The Basic Idea Of Hacking And After That You All Will Be Able To Understand Hacking And Stop Asking People How To Hack. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 11. Steps to hack a computer… • First of all decide what you need to decide what you are actually going to hack. • After thinking the goal you must need to plan the attack, language and what OS you are going to use during hacking. • You must need to get the information about the system and owner of the system that you are going to hack. • Then if it is possible try to apply some brain or in the technical term Social Engineering. • Finally after thinking all these attack the victim but note that the attack is for a positive purpose. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 12. Presentation Developed By Harshit Upadhyay(Hellhacker119)