SlideShare a Scribd company logo
HACKING
Presented by:-
Ganesh V. Vadulekar
HACKING
OVERVIEW
 What is HACKING ???
 Who are Hackers???
 What is Ethical Hacking ???
 Who are Ethical Hackers???
 Types Of Hacking
 How to Defend from Hacking???
 Consequences Of illegal Hacking
 Conclusion
 Summary
WHAT IS HACKING???
Hacking is cracking into an account or
cheating in a game without using cheat
codes. Hacking passwords requires a
program or requires finding glitches from
the website.
WHO ARE HACKER???
 Hacker is a hacker who "violates computer security for
little reason beyond maliciousness or for personal gain"
HACKERS CLASSES
 Black hats :– highly skilled,
malicious, destructive “crackers”
 White hats – skills used for
defensive security analysts
 Gray hats – offensively and
defensively; will hack for different
reasons, depends on situation.
WHAT IS ETHICAL HACKING
???
 It is Partially Legal (May vary by country law)
 Completely legal in INDIA
 Permission is obtained from the target user
 Part of an overall security program.
WHO ARE ETHICAL
HACKERS???
 Completely trustworthy.
 Strong programming and computer networking skills.
 Techniques of Criminal hackers-
Detection-Prevention.
 Ethical hackers possesses same skills, mindset and tools
of a hacker but the attacks are done in a non-destructive
manner .
 E.G. Cyber Crime investigators
TYPES OF HACKING
 Website Hacking
 Email Hacking
 Network Hacking
 Password Hacking
 Online transactions Hacking
 Computer Hacking
 Mobile Hacking
 PDA hacking
 Metropolitan system hacking
HOW TO DEFEND FROM
HACKING???
 Use Strong Passwords! (Follow Universal Code while
creation)
 Unsolicited Installation of Scripts
 Avoid Scam/Spammy Websites
 Clear the Cookies!
 Do not make any financials transactions on (http://)
 Prevent illegal farmers’ from “harvesting” your lists
 Don’t use Generic Usernames & Passwords
 Use Secure Ports
 Keep OS updated with security patches
 Never trust mails which makes an attractive offers (like
you have won 100Millions dollars/ anything else..)
Ethical hacking
WHAT TO DO AFTER
BEING HACKED?
 Shutdown the system
 Clear the memory using Cleaners (like CCleaner)
 Scan infected sections with good antivirus
 Separate the system from network (Do not use internet)
 Restore the system with the backup (If o/s problem)
 Finally, connect the system to the network
HOW ETHICAL HACKERS
DEFEND???
 Harden the servers
 Scan, test and apply patches
 Monitor logs
 Train the technical staff on security
 Serious policy and procedures!
HOW MUCH DO ETHICAL HACKERS GET
PAID?
 Globally, the hiring of ethical hackers is on the rise with
most of them working with top consulting firms.
 In the United States, an ethical hacker can make upwards
of $120,000 per annum.
 Freelance ethical hackers can expect to make $10,000
per assignment.
 Some ranges from $15,000 to $45,000 for a standalone
ethical hack.
DISTINGUISH BETWEEN HACKERS & ETHICAL
HACKERS
 Deface hacked web pages
to advertise their prowess
 Doings are Evil & Illegal
 Work is done to get
illegal information for
themselves or for
someone else
 Hired as Preventive
measure
 Doings are good & justice
 Work is Legal & to
restore the hacked the
website .
Criminal Hackers Ethical Hackers
CONSEQUENCES OF
ILLEGAL HACKING
 Thousands Of Dollars in Fines
 Imprisonment
 Seizure Of Your Computer
ANY
QUESTIONS???
CONCLUSION
 Proper Ethical Hacker Should Be Employed
 Do Not Exposed Your Passwords to Untrusted Sites
 Close Your Internet While Not in Use
 Having Basic Knowledge of Internet
SUMMARY
 What is HACKING ???
 Who are Hackers???
 What is Ethical Hacking ???
 Who are Ethical Hackers???
 Types Of Hacking
 How to Defend from Hacking???
 Consequences Of illegal Hacking
THANK YOU…

More Related Content

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sayantan Sur
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aditya Vikram Singhania
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Cyber security
Cyber securityCyber security
Cyber security
Sapna Patil
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
Deepak Upadhyay
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
ADGP, Public Grivences, Bangalore
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
Lokender Yadav
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
sumit dimri
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
Sweta Leena Panda
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
PranjalShah18
 
Hacking
HackingHacking
Hacking
pranav patade
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
Ashish prashar
 

Viewers also liked (20)

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
giridhar_sadasivuni
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
Mercury Solutions Limited
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Neel Kamal
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
SensePost
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 
Hackers guide to Startup Weekend
Hackers guide to Startup WeekendHackers guide to Startup Weekend
Hackers guide to Startup Weekend
Brad Oyler
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Harshit Upadhyay
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Damisetty Bala Naga Rama Sesha Sai
 
PPT on Ethical Hacking
PPT on Ethical HackingPPT on Ethical Hacking
PPT on Ethical Hacking
Vishnu Kumar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
arohan6
 
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest DisclosureOpen Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
Ethisphere
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Viraj Kansara
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
Mercury Solutions Limited
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Neel Kamal
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
SensePost
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 
Hackers guide to Startup Weekend
Hackers guide to Startup WeekendHackers guide to Startup Weekend
Hackers guide to Startup Weekend
Brad Oyler
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
 
PPT on Ethical Hacking
PPT on Ethical HackingPPT on Ethical Hacking
PPT on Ethical Hacking
Vishnu Kumar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
arohan6
 
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest DisclosureOpen Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
Ethisphere
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain
 

Similar to Ethical hacking (20)

Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
Subhoneel Datta
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
Hacking
HackingHacking
Hacking
NishaPariyar
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
cyber cure
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
Cookie Tuazon
 
Jaishreeethicalhackingppt-171011183223.pptx
Jaishreeethicalhackingppt-171011183223.pptxJaishreeethicalhackingppt-171011183223.pptx
Jaishreeethicalhackingppt-171011183223.pptx
jaiswalanita056588
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
Cyber Security by sapna verma PowerPoint.pptx
Cyber Security by sapna verma PowerPoint.pptxCyber Security by sapna verma PowerPoint.pptx
Cyber Security by sapna verma PowerPoint.pptx
expertcomputer4
 
this ppt is based on ethica l hacking _
this ppt is based on ethica  l hacking _this ppt is based on ethica  l hacking _
this ppt is based on ethica l hacking _
SantoshChintawar
 
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptxJshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
atulkumaratulkumar18
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
ambemPrashanthi
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
SiddheshSurve10
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
HarishBabuKaveri
 
Hacking
HackingHacking
Hacking
ritik shukla
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
ritik shukla
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
Subhoneel Datta
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
cyber cure
 
Jaishreeethicalhackingppt-171011183223.pptx
Jaishreeethicalhackingppt-171011183223.pptxJaishreeethicalhackingppt-171011183223.pptx
Jaishreeethicalhackingppt-171011183223.pptx
jaiswalanita056588
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
Cyber Security by sapna verma PowerPoint.pptx
Cyber Security by sapna verma PowerPoint.pptxCyber Security by sapna verma PowerPoint.pptx
Cyber Security by sapna verma PowerPoint.pptx
expertcomputer4
 
this ppt is based on ethica l hacking _
this ppt is based on ethica  l hacking _this ppt is based on ethica  l hacking _
this ppt is based on ethica l hacking _
SantoshChintawar
 
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptxJshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
atulkumaratulkumar18
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
SiddheshSurve10
 

Recently uploaded (20)

Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 

Ethical hacking

  • 3. OVERVIEW  What is HACKING ???  Who are Hackers???  What is Ethical Hacking ???  Who are Ethical Hackers???  Types Of Hacking  How to Defend from Hacking???  Consequences Of illegal Hacking  Conclusion  Summary
  • 4. WHAT IS HACKING??? Hacking is cracking into an account or cheating in a game without using cheat codes. Hacking passwords requires a program or requires finding glitches from the website.
  • 5. WHO ARE HACKER???  Hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain"
  • 6. HACKERS CLASSES  Black hats :– highly skilled, malicious, destructive “crackers”  White hats – skills used for defensive security analysts  Gray hats – offensively and defensively; will hack for different reasons, depends on situation.
  • 7. WHAT IS ETHICAL HACKING ???  It is Partially Legal (May vary by country law)  Completely legal in INDIA  Permission is obtained from the target user  Part of an overall security program.
  • 8. WHO ARE ETHICAL HACKERS???  Completely trustworthy.  Strong programming and computer networking skills.  Techniques of Criminal hackers- Detection-Prevention.  Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner .  E.G. Cyber Crime investigators
  • 9. TYPES OF HACKING  Website Hacking  Email Hacking  Network Hacking  Password Hacking  Online transactions Hacking  Computer Hacking  Mobile Hacking  PDA hacking  Metropolitan system hacking
  • 10. HOW TO DEFEND FROM HACKING???  Use Strong Passwords! (Follow Universal Code while creation)  Unsolicited Installation of Scripts  Avoid Scam/Spammy Websites  Clear the Cookies!  Do not make any financials transactions on (http://)  Prevent illegal farmers’ from “harvesting” your lists  Don’t use Generic Usernames & Passwords  Use Secure Ports  Keep OS updated with security patches  Never trust mails which makes an attractive offers (like you have won 100Millions dollars/ anything else..)
  • 12. WHAT TO DO AFTER BEING HACKED?  Shutdown the system  Clear the memory using Cleaners (like CCleaner)  Scan infected sections with good antivirus  Separate the system from network (Do not use internet)  Restore the system with the backup (If o/s problem)  Finally, connect the system to the network
  • 13. HOW ETHICAL HACKERS DEFEND???  Harden the servers  Scan, test and apply patches  Monitor logs  Train the technical staff on security  Serious policy and procedures!
  • 14. HOW MUCH DO ETHICAL HACKERS GET PAID?  Globally, the hiring of ethical hackers is on the rise with most of them working with top consulting firms.  In the United States, an ethical hacker can make upwards of $120,000 per annum.  Freelance ethical hackers can expect to make $10,000 per assignment.  Some ranges from $15,000 to $45,000 for a standalone ethical hack.
  • 15. DISTINGUISH BETWEEN HACKERS & ETHICAL HACKERS  Deface hacked web pages to advertise their prowess  Doings are Evil & Illegal  Work is done to get illegal information for themselves or for someone else  Hired as Preventive measure  Doings are good & justice  Work is Legal & to restore the hacked the website . Criminal Hackers Ethical Hackers
  • 16. CONSEQUENCES OF ILLEGAL HACKING  Thousands Of Dollars in Fines  Imprisonment  Seizure Of Your Computer
  • 18. CONCLUSION  Proper Ethical Hacker Should Be Employed  Do Not Exposed Your Passwords to Untrusted Sites  Close Your Internet While Not in Use  Having Basic Knowledge of Internet
  • 19. SUMMARY  What is HACKING ???  Who are Hackers???  What is Ethical Hacking ???  Who are Ethical Hackers???  Types Of Hacking  How to Defend from Hacking???  Consequences Of illegal Hacking