Ethical Hacking
Ethical Hacking
History Of Hacking
Introduction of Ethical Hacking
Importance of Ethical Hacking
Type of Hacking
Hacking Process
Why do Hacker Hack
What should do after Hack
Advantage
Disadvantage
Conclusion
History Of Hacking
Who is hacker...?
Hacker is a person who bypass the systems access control by
taking advantage of security weakness left in the system.
• Ethical hacking, also known as
penetration testing or white-hat
hacking, is the practice of deliberately
and legally exploiting vulnerabilities
Definition of within a system or network to identify
weaknesses that malicious hackers
Ethical Hacking could exploit.
• Unlike malicious hacking, ethical
hacking is conducted with permission
and aims to improve cybersecurity
rather than causing harm.
IMPORTANCE IN CYBERSECURITY
2) Scanning
It is a phase where hackers dive deeper into the system to look for
valuable data and services in a specific IP address range.
3) Gaining Access
Gaining Access also called "hacking into system".
It is the process exploiting the loopholes and vulnerabilities in order
to breaking system.
4) Maintaining Access
Once the attacker gains access into target system , he can
choose to use both the system and the resources as a
launched pad to scan and exploit other systems.
5) Covering Access
Covering Access is the final stage of hacking process its
goal is to erase evidences and digital signs which can be used
for tracking the attackers.
Why do Hacker Hack
Destroy enemy's
Notify many people Steal important
computer network
their thought. information.
during the war.
What should do after Hack