0% found this document useful (0 votes)
40 views

Ethical Hacking

The document discusses the history and types of hacking, including ethical hacking. It covers the hacking process, why hackers hack, and the advantages and disadvantages of hacking. Ethical hacking is presented as a way to improve security by identifying vulnerabilities.

Uploaded by

skr.suraj26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

Ethical Hacking

The document discusses the history and types of hacking, including ethical hacking. It covers the hacking process, why hackers hack, and the advantages and disadvantages of hacking. Ethical hacking is presented as a way to improve security by identifying vulnerabilities.

Uploaded by

skr.suraj26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

AGENDA

History Of Hacking
Introduction of Ethical Hacking
Importance of Ethical Hacking
Type of Hacking
Hacking Process
Why do Hacker Hack
What should do after Hack
Advantage
Disadvantage
Conclusion
History Of Hacking

 Hacking has been a part of computing


for 40 years.
 The first computer hacker emerged at
MIT.- Hacking is began in the 1960s at
MIT, origin of the term "hacker".
 The truth hacker amongst our societies
have thirst for the knowledge.
 Boredom is never an object of challenge
for the hacker
INTRODUCTION TO ETHICAL
HACKING
INTRODUCTION
 What is hacking..?
The process of attempting to gain or successfully gaining,
unauthorized access to computer resources for the purpose of
help or secure system is called hacking.

 Who is hacker...?
Hacker is a person who bypass the systems access control by
taking advantage of security weakness left in the system.
• Ethical hacking, also known as
penetration testing or white-hat
hacking, is the practice of deliberately
and legally exploiting vulnerabilities
Definition of within a system or network to identify
weaknesses that malicious hackers
Ethical Hacking could exploit.
• Unlike malicious hacking, ethical
hacking is conducted with permission
and aims to improve cybersecurity
rather than causing harm.
IMPORTANCE IN CYBERSECURITY

Ethical hacking is vital in By proactively identifying


Ethical hacking helps
safeguarding digital assets and vulnerabilities and weaknesses,
organizations stay ahead of
ensuring the integrity, organizations can address them
emerging threats and strengthens
confidentiality, and availability of before they are exploited by
their overall security posture.
information systems. malicious actors.
TYPE OF HACKERS
White Hat
Grey Hat
Black Hat
A white hat (or a white-hat hacker, a whitehat) is an
ethical security hacker.

Ethical hacking is a term meant to imply a broader


category than just penetration testing.
White Hat
Hacker Under the owner's consent, white-hat hackers aim to
identify any vulnerabilities or security issues the
current system.

White-hat hackers may also work in teams called "


sneakers and/or hacker clubs"
White-Hat Hackers are also known as Ethical
Hackers.

These are good hackers who try to secure our data,


websites. With the rise of cyberattacks,
organizations and governments have come to
understand that they need ethical hackers.
Gray Hat Hacker
They protect databases, software from Malware,
Phishing, and SQL injection attacks.

They are certified hackers who learn hacking from


courses.
Black Hat
Hacker
 Black-Hat Hackers are those
hackers who enter the system
without taking owners’ permission.
 These hackers use vulnerabilities
as entry points.
 They hack systems illegally
 They conduct various attacks,
write malware, and damage system
security.
 They use their skills to deceive and
harm people.
Hacking
Process
1) Reconnaissance
Reconnaissance is the phase where the attacker gathers information
about a target using active or passive means. The tools that are widely
used in this process are NMAP, Hping, Maltego, and Google Dorks.

2) Scanning
It is a phase where hackers dive deeper into the system to look for
valuable data and services in a specific IP address range.

3) Gaining Access
Gaining Access also called "hacking into system".
It is the process exploiting the loopholes and vulnerabilities in order
to breaking system.
4) Maintaining Access
Once the attacker gains access into target system , he can
choose to use both the system and the resources as a
launched pad to scan and exploit other systems.

5) Covering Access
Covering Access is the final stage of hacking process its
goal is to erase evidences and digital signs which can be used
for tracking the attackers.
Why do Hacker Hack

Hack other systems


Just for fun. Show off.
secretly.

Destroy enemy's
Notify many people Steal important
computer network
their thought. information.
during the war.
What should do after Hack

Restore the system


Shutdown or turn off Separate the system with the backup or
the system. from network. reinstall all
programs.

Connect the system It can be good to call


to the network. the police
Advantage

• To catch a thief you have to think like a


thief.
• Helps in closing the open holes in the
system network.
• Provides security to banking and
financial establishments.
• Prevents website defacements.
• An evolving technique.
Disadvantage
• Massive security breach.
• Unauthorized system access on private
information.
• Privacy violation.
• Hampering system operation.
• Denial of service attacks.
• Malicious attack on the system.
Conclusion

• In the preceding sections we saw the methodology of hacking, why should


we aware of hacking and some tools which a hacker may use.
• Now we can see what can we do against hacking or to protect ourselves
from hacking.
• The first thing we should do is to keep ourselves updated about those
software's we and using for official and reliable sources.
• Educate the employees and the users against black hat hacking.
Reference
•www.google.com
•www.Wikipedia.com
• www.tutorialpoint.com
THANK YOU

You might also like