0% found this document useful (0 votes)
223 views12 pages

Ethical Hacking

The document discusses a seminar on ethical hacking. It defines ethical hacking as legally testing a system's security by using the same techniques as hackers, without causing damage. It outlines the hacking process and different types of hackers, such as white hats who use skills defensively and black hats who resort to malicious activities. The document explains why ethical hacking is needed to protect organizations from security breaches. It also covers the skills required of an ethical hacker and the advantages and disadvantages of ethical hacking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
223 views12 pages

Ethical Hacking

The document discusses a seminar on ethical hacking. It defines ethical hacking as legally testing a system's security by using the same techniques as hackers, without causing damage. It outlines the hacking process and different types of hackers, such as white hats who use skills defensively and black hats who resort to malicious activities. The document explains why ethical hacking is needed to protect organizations from security breaches. It also covers the skills required of an ethical hacker and the advantages and disadvantages of ethical hacking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Seminar

On
Ethical Hacking
Introduction
 Ethical hacking also known as penetration testing or
white-hat hacking, involves the same tools, tricks, and
techniques that hackers use, but with one major difference
that Ethical hacking is legal.
 Ethical hacking, is legally breaking into computers and
devices to test an organization's defenses.
 Independent computer security Professionals breaking into the
computer systems.
 Neither damage the target systems nor steal information.
 Evaluate target systems security and report back to owners
about the vulnerabilities found.
Hackers
 A person who enjoys learning details of a
programming language or system
 A person who enjoys actually doing the
programming rather than just theorizing about it
 A person capable of appreciating someone else's
hacking
 A person who picks up programming quickly
 A person who is an expert at a particular programming
language or system
Types of Hackers
 Black hats
• Individuals with Extraordinary computing Skills,
resorting to malicious Or destructive activities. Also
known as ‘Crackers.’
 White Hats

• Individuals professing Hacker skills and using Them


for defensive Purposes. Also known as ‘Security
Analysts’.
 Grey Hats

• Individuals who work both Offensively and


defensively At various times.
Hacking Process
 1.Reconnaissance –It is the principal stage where the
Hacker attempts to gather data about the objective. It
incorporates Identifying the Target, discovering the
objective’s IP Address Range, Network, and so on.
 2.Scanning –In this stage, the hacker starts to

effectively test an objective machine or organization


for weaknesses that can be abused.
 3.Gaining Access –In this stage, the hacker plans the

outline of the organization of the objective with the


assistance of information gathered during observation
and checking.
Hacking Process
 4.Maintaining Access –It is the interaction where the
hacker has effectively gotten entrance into a
framework.
 5.Clearing Tracks –This process is basically an

unethical activity.
 6.Reporting –It is the last step of finishing the ethical

hacking process. In this the Ethical


 Hacker aggregates a report with his discoveries and the

work that was done,


 for example-weaknesses found.
Why Do We Need Ethical Hacking
Protection from possible External Attacks

Social
Engineering

Automated
Organizational Attacks
Attacks

Restricted
Data

Accidental Breaches
in Security
Denial of
Viruses, Trojan Service (DoS)
Horses,
and Worms
Required Skills of an Ethical
Hacker….
 Computer expert adept at Technical domains.
 In-depth knowledge about Target platforms (such as

Windows, Unix, Linux).


 Exemplary knowledge in Networking and related

Hardware / software.
 Knowledgeable about Security areas and related Issues

– though not
 Necessarily a security Professional
Advantages
 “To catch a thief you have to think like a thief”
 This helps to fight against cyber terrorism and to fight against
national security breaches.
 This helps to build a system that prevents any kinds of
penetration by hackers.
 This offers security to banking and financial establishments.

Disadvantages
 All depends upon the trustworthiness of the ethical hacker.
 Hiring professionals is expensive.
 Future Enhancements
 As it an evolving branch the scope of enhancement in
technology is immense.

 No ethical hacker can ensure the system security by using the


same technique repeatedly.

 More enhanced software’s should be used for optimum


protection.
Conclusion
 One of the main aim of the seminar is to make others
understand that there are so many tools through which a
hacker can get into a system.

 Now we can see what can we do against hacking or to protect


ourselves from hacking.

 The first thing we should do is to keep ourselves updated


about those software’s we and using for official and reliable
sources.
Thank You

You might also like