SlideShare a Scribd company logo
Career in
Ethical Hacking
52-61-74-6e-65-73-68-20-44-68-65-65-72-61-6a
Presenter:
Objective
How to do
Hacking Tools
Live Hacking
Security
Self Declaration
I, <my_name/> swear that,
I will never misuse hacking skills for my
personal/organizational benefit or
interest.
01001000 01000001 01000011 01001011
01000101 01010010 01010011 00100000
01000001 01010010 01000101 00100000
01001000 01000101 01010010 01000101
Crack the code
The First Hacking
 The first hacker appeared in 1960’s at Massachusetts Institute of
Technology(MIT)
 During 1970’s different types hackers appeared as Phone Hackers
 1980’s hackers migrated to Computer, ”Bulletin Board System (BBS)
 1990’s Internet came and hackers were multiplied
Hacker and Ethical Hacker
 Hacker
 Access computer System or network without authorization
 Breaks the law
 Ethical Hackers
 Performs the same activities with the Owner’s Permission
 Employed the companies to perform the Penetration Tests
Active Hacker Groups on the Earth
 Fancy Bear (aka. Sofacy, Pawn Storm) / Cozy Bear (aka. CozyDuke, Office Monkeys)
 Rival agencies in the Russian spy services
 Lazarus Group (aka. DarkSeoul, Guardians of Peace)
 Widely believed to be associated with North Korea
 Equation Group
 This is the nickname given by Russian antivirus firm Kaspersky
 Comment Crew (aka. APT1, Shanghai Group)
 China sponsors a plethora of hacking groups
 Sandworm (a.k.a. Electrum)
 Named for allusions to the sci-fi classic Dune found in its code,
Sandworm is another group believed to be associated with the Russians
Hackers Types
 White Hat
 Good Guys
 Don’t use their Skill for illegal purpose
 Computer Security experts and help to protect from Black Hats
 Black Hat
 Bad Guys
 Use the skill for malicious purpose
 Hack banks, websites, credit cards
 Grey Hat
 Combination of black hat and white hat
Hacking Process
Footprinting
(information
gathering)
Scanning
Enumerations
Attack and
Gaining
Access
Escalating
privilege,
Covering
Tracks, and
Creating
Backdoors
Tools and TechnologiesFootprinting
Whois, Ping, Bigbrother
Traceroute, nslookup
www.samspade.org,
www.geektools.com,
www.whois.net,
www.demon.net
Scanning
nmap
Nessus
OpenVAS
InSSIder
Enumeration
Netcat
tcpdump
Telnet
Firewalk
Encryption
Encryption is an interesting piece of technology that works by scrambling
data so it is unreadable by unintended parties
01d59a3b5e0ad59fe56710fd3114d97e
Password hashed using MD5 algorithm
A password, hacked recently
Hacking
Password
“Windows 10”
Hacking Windows 10 Video
Revealing Password from Browser
javascript: var p=r(); function r(){var g=0;var x=false;var
x=z(document.forms);g=g+1;var w=window.frames;for(var k=0;k<w.length;k++) {var
x = ((x) || (z(w[k].document.forms)));g=g+1;}if (!x) alert('Password not found in ' +
g + ' forms');}function z(f){var b=false;for(var i=0;i<f.length;i++) {var
e=f[i].elements;for(var j=0;j<e.length;j++) {if (h(e[j])) {b=true}}}return b;}function
h(ej){var s='';if (ej.type=='password'){s=ej.value;if (s!=''){prompt('Password found ',
s)}else{alert('Password is blank')}return true;}}
Attacks
1. Eavesdropping
2. Data Modification
3. Identity Spoofing (IP Address Spoofing)
4. Password-Based Attacks
5. Denial-of-Service Attack
6. Man-in-the-Middle Attack
7. Compromised-Key Attack
8. Sniffer Attack
9. Application-Layer Attack
https://technet.microsoft.com/en-us/library/cc959354.aspx
Operating System for Hacking and Pen Test
 Parrot Security OS
 Kali Linux
 BackBox
 Samurai Web Testing Framework
 Pentoo Linux
 DEFT Linux
 Caine
 Network Security Toolkit (NST)
 BlackArch Linux
 Bugtraq
 ArchStrike Linux
 Fedora Security Spin
Curriculum
Ethical
Hacking
Footprinting
Scanning
Networks
Enumerations
System
Hacking
Malware and
Sniffing
Web Servers
hacking
Hacking
Mobile
Platforms
Social
Engineering
Cloud
Computing
Cryptography
Honeypots
and Firewalls
WeTrainOn
Our Training Methodology
HACK THE LAB
Who will get benefitted
https://www.softwareadvice.com/resources/how-to-get-a-job-as-an-ethical-hacker/
Why neosphere?
OCR model classroom [experiential learning]
Trainers from Industry
Career Guidance
Internship
Placement Assistance
Career and Internship Partner
Our Academic Partners
Certification exams we conduct
Want to hack…
Call Us at
+977 9801200111
01-555 15 15
Or write us
info@neosphere.com.np

More Related Content

What's hot (20)

PPT
Penetration Testing Basics
Rick Wanner
 
PPT
Introduction to Cyber Security
Stephen Lahanas
 
PPTX
system Security
Gaurav Mishra
 
PPTX
Hacking
pranav patade
 
PPT
Cyber Crime and Security
Dipesh Waghela
 
PPTX
Phishing
SaurabhKantSahu1
 
PPTX
Cyber security
Dr. Kishor Nikam
 
PPT
Trojan horse
Gaurang Rathod
 
PPTX
Cyber security
Manjushree Mashal
 
PPTX
System hacking
CAS
 
PPTX
Information security
AishaIshaq4
 
PPTX
Types of malware
techexpert2345
 
PPTX
Cyber security
vishakha bhagwat
 
PPTX
cyber security presentation.pptx
kishore golla
 
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
PPTX
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
 
PPTX
Ethical Hacking
Tharindu Kalubowila
 
PPTX
Phishing attack seminar presentation
AniketPandit18
 
PPTX
MALWARE AND ITS TYPES
daniyalqureshi712
 
Penetration Testing Basics
Rick Wanner
 
Introduction to Cyber Security
Stephen Lahanas
 
system Security
Gaurav Mishra
 
Hacking
pranav patade
 
Cyber Crime and Security
Dipesh Waghela
 
Cyber security
Dr. Kishor Nikam
 
Trojan horse
Gaurang Rathod
 
Cyber security
Manjushree Mashal
 
System hacking
CAS
 
Information security
AishaIshaq4
 
Types of malware
techexpert2345
 
Cyber security
vishakha bhagwat
 
cyber security presentation.pptx
kishore golla
 
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
 
Ethical Hacking
Tharindu Kalubowila
 
Phishing attack seminar presentation
AniketPandit18
 
MALWARE AND ITS TYPES
daniyalqureshi712
 

Similar to Career in Ethical Hacking (20)

PPTX
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Sunipa Bera
 
PPT
Hacking
Paidi Dinesh
 
PPTX
Ethical hacking : Its methodologies and tools
chrizjohn896
 
PPTX
Ethical Hacking Redefined
Pawan Patil
 
PPTX
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
PPTX
Cse ethical hacking ppt
shreya_omar
 
PPTX
CSE-Ethical-Hacking-ppt.pptx
AnshumaanTiwari2
 
PPTX
Ethical Hacking.pptx
MadhuKumar114889
 
PPTX
Ethical hacking
Anumadil1
 
PPTX
Ethical hacking
Rishabha Garg
 
PPTX
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
atulkumaratulkumar18
 
RTF
Hacking and its types
Rishab Gupta
 
PPTX
Ethical Hacking.pptx Hacker Presentation
sahilhussain2006bth
 
PPTX
Hacking
VipinYadav257
 
PPTX
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
PPTX
Ethical-Hacking-ppt.pptx
MaheshDhope1
 
PPTX
Summer training in jaipur
cyber cure
 
PPTX
Ethical Hacking.pptx
achint20
 
PPTX
my new HACKING
BABATUNDE OLANREWAJU GEORGE
 
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Sunipa Bera
 
Hacking
Paidi Dinesh
 
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Ethical Hacking Redefined
Pawan Patil
 
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Cse ethical hacking ppt
shreya_omar
 
CSE-Ethical-Hacking-ppt.pptx
AnshumaanTiwari2
 
Ethical Hacking.pptx
MadhuKumar114889
 
Ethical hacking
Anumadil1
 
Ethical hacking
Rishabha Garg
 
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
atulkumaratulkumar18
 
Hacking and its types
Rishab Gupta
 
Ethical Hacking.pptx Hacker Presentation
sahilhussain2006bth
 
Hacking
VipinYadav257
 
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Ethical-Hacking-ppt.pptx
MaheshDhope1
 
Summer training in jaipur
cyber cure
 
Ethical Hacking.pptx
achint20
 

More from neosphere (8)

PDF
C programming Workshop
neosphere
 
PDF
Java Programming Workshop
neosphere
 
PDF
Digital Marketing in Business
neosphere
 
PDF
CCNP Presentation- neosphere
neosphere
 
PDF
Digital marketing
neosphere
 
PDF
Career in Software Development
neosphere
 
PDF
Building career in Information Technology
neosphere
 
PPTX
Career as network specialist
neosphere
 
C programming Workshop
neosphere
 
Java Programming Workshop
neosphere
 
Digital Marketing in Business
neosphere
 
CCNP Presentation- neosphere
neosphere
 
Digital marketing
neosphere
 
Career in Software Development
neosphere
 
Building career in Information Technology
neosphere
 
Career as network specialist
neosphere
 

Recently uploaded (20)

PPTX
10CLA Term 3 Week 4 Study Techniques.pptx
mansk2
 
PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
ENGLISH 8 WEEK 3 Q1 - Analyzing the linguistic, historical, andor biographica...
OliverOllet
 
PDF
John Keats introduction and list of his important works
vatsalacpr
 
PPTX
Cybersecurity: How to Protect your Digital World from Hackers
vaidikpanda4
 
PPTX
Applied-Statistics-1.pptx hardiba zalaaa
hardizala899
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
FAMILY HEALTH NURSING CARE - UNIT 5 - CHN 1 - GNM 1ST YEAR.pptx
Priyanshu Anand
 
PDF
EXCRETION-STRUCTURE OF NEPHRON,URINE FORMATION
raviralanaresh2
 
PPTX
Introduction to Probability(basic) .pptx
purohitanuj034
 
PPTX
I INCLUDED THIS TOPIC IS INTELLIGENCE DEFINITION, MEANING, INDIVIDUAL DIFFERE...
parmarjuli1412
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PDF
Stepwise procedure (Manually Submitted & Un Attended) Medical Devices Cases
MUHAMMAD SOHAIL
 
PPTX
The Future of Artificial Intelligence Opportunities and Risks Ahead
vaghelajayendra784
 
PPTX
THE JEHOVAH’S WITNESSES’ ENCRYPTED SATANIC CULT
Claude LaCombe
 
PPT
DRUGS USED IN THERAPY OF SHOCK, Shock Therapy, Treatment or management of shock
Rajshri Ghogare
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
10CLA Term 3 Week 4 Study Techniques.pptx
mansk2
 
Virus sequence retrieval from NCBI database
yamunaK13
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
ENGLISH 8 WEEK 3 Q1 - Analyzing the linguistic, historical, andor biographica...
OliverOllet
 
John Keats introduction and list of his important works
vatsalacpr
 
Cybersecurity: How to Protect your Digital World from Hackers
vaidikpanda4
 
Applied-Statistics-1.pptx hardiba zalaaa
hardizala899
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
FAMILY HEALTH NURSING CARE - UNIT 5 - CHN 1 - GNM 1ST YEAR.pptx
Priyanshu Anand
 
EXCRETION-STRUCTURE OF NEPHRON,URINE FORMATION
raviralanaresh2
 
Introduction to Probability(basic) .pptx
purohitanuj034
 
I INCLUDED THIS TOPIC IS INTELLIGENCE DEFINITION, MEANING, INDIVIDUAL DIFFERE...
parmarjuli1412
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Stepwise procedure (Manually Submitted & Un Attended) Medical Devices Cases
MUHAMMAD SOHAIL
 
The Future of Artificial Intelligence Opportunities and Risks Ahead
vaghelajayendra784
 
THE JEHOVAH’S WITNESSES’ ENCRYPTED SATANIC CULT
Claude LaCombe
 
DRUGS USED IN THERAPY OF SHOCK, Shock Therapy, Treatment or management of shock
Rajshri Ghogare
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 

Career in Ethical Hacking

Editor's Notes

  • #5: Decode using excel Convert Binary to Decimal Decimal to character
  • #10: Footprinting: is the first and most convenient way that hackers use to gather information about computer systems and the companies they belong to. The purpose of footprinting to learn as much as you can about a system, it's remote access capabilities, its ports and services, and the aspects of its security. Scanning: is the process to find out from which door or the way a hacker can enter in the Victim computer Enumeration: The process of enumeration, finding find what services are running, versions, open shares, account details, or possible points of entry Access and Attack: Successful gain to the Victim computer/device and start doing your Job Backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device
  • #11: Show them traceroute command WMIC [Windows Management Instrumentation (WMI)] wmic OS wmic /output:c:\data\test.csv computersystem list full /format:csv wmic /output:c:\data\test.csv os /format:csv
  • #12: http://www.md5online.org Use the link to decrypt the password.
  • #15: http://unminify.com/
  • #22: At neosphere, we provide optical classroom training, where one student will have access to one machine and that is very important from the “Cone of Learning” point of view. Trainer’s are from the industry which will help you to understand the live software development training methodologies Our career partners will guide you in finding the jobs as well as designing the Resume and interview cracking techniques, we will also assist you in getting Job We will provide you the leading companies in Nepal where you can do your Internship