SlideShare a Scribd company logo
Introduction to Ethical Hacking (Basics)
KNOW ABOUT : 
WHAT IS HACKING? 
HACKERS 
TYPES OF HACKING 
WHAT IS ETHICAL HACKING? 
DIFFERENT LEVELS IN HACKERS
What is Hacking? 
 Hacking is simply 
. 
 It is the act of breaking in to a computer 
system and is a criminal offence under the 
computer misuse. 
 
.
Types Of Hacking : 
• : 
- It include stealing passwords (which hackers 
then use or sell) 
- Performing industrial espionage 
- causing harm (as disgruntled employees) 
- committing simple misuse.
• : 
- Rogue access points (APs) are unsecured 
wireless access points that outsiders can easily 
breech. (Local hackers often advertise rogue 
APs to each other.) 
- Rogue APs are most often connected by well-meaning 
but ignorant employees.
• : 
- Hackers can gain access to a network by 
exploiting back doors administrative 
shortcuts, configuration errors, easily 
deciphered passwords, and unsecured dial-ups. 
- With the aid of computerized searchers 
(bots), hackers can probably find any 
weakness in your network.
• : 
- Viruses and worms are self-replicating 
programs or code fragments that attach 
themselves to other programs (viruses) or 
machines (worms). 
- Both attempt to shut down networks by 
flooding them with massive amounts of bogus 
traffic, usually through e-mail.
• : 
-Trojan horses, which are attached to other 
programs, are the leading cause of all break-ins. 
- When a user downloads and activates a 
Trojan horse, the hacked software (SW) kicks 
off a virus, password gobbler, or remote-control 
SW that gives the hacker control of the 
PC.
• : 
- DoS attacks give hackers a way to bring down 
a network without gaining internal access. 
- DoS attacks work by flooding the access 
routers with bogus traffic (which can be e-mail 
or Transmission Control Protocol, TCP, 
packets). 
- Distributed DoSs are coordinated DoS attacks 
from multiple sources. DDoS is more difficult 
to block because it uses multiple, changing, 
source IP addresses.
• 
: 
are people who just like to break 
stuff. They usually exploit any target of 
opportunity. 
are hobbyists or professionals who 
break passwords and develop Trojan horses or 
other SW (called warez). They either use the 
SW themselves (for bragging rights) or sell it 
for profit.
are hacker wannabes. They 
have no real hacker skills, so they buy or 
download warez, which they launch. 
Other attackers include disgruntled employees, 
terrorists, political operatives, or anyone else 
who feels slighted, exploited, ripped off, or 
unloved.
• : 
- Sniffing refers to the act of intercepting TCP 
packets. This interception can happen through 
simple eavesdropping or something more 
sinister. 
- Spoofing is the act of sending an illegitimate 
packet with an expected acknowledgment 
(ACK), which a hacker can guess, predict, or 
obtain by snooping.
- 
. However, 
hackers have also developed new skills that 
allow them to break into more complex 
systems. 
- Hacking typically involves compromising the 
security of networks, breaking the security of 
application software, or creating malicious 
programs such as viruses.
- Most popular forms of network hacking are 
denial of service (DoS) attacks and mail bombs. 
- DoS attacks are designed to swamp a 
computer network, causing it to crash. 
- Mail bombs act in a similar fashion, but attack 
the network's mail servers. 
-Web server are bombarded with fake requests 
for Web pages, which overloads the site and 
caused it to crash.
- Network hackers also try to break into secure 
areas to find sensitive data. Once a network is 
hacked, files can be removed, stolen, or erased. 
- Application hackers break security on 
application software-software including word 
processing and graphics programs-in order to 
get it for free.
- One way they gain access to software that 
requires a serial number for installation is by 
setting up a serial number generator that will 
try millions of different combinations until a 
match is found. 
- Application hackers also sometimes attack 
the program itself in an attempt to remove 
certain security features.
-Hackers that create viruses, logic bombs, 
worms, and Trojan horses are involved in 
perhaps the most malicious hacking activities. 
-A virus is a program that has the potential to 
attack and corrupt computer files by attaching 
itself to a file to replicate itself. 
- It can also cause a computer to crash by 
utilizing all of the computer's resources.
What is ethical hacking ? 
Ethical hacking is where 
. 
Ex. : A bank may pay a hacker to hack their 
systems to see if it is hackable. If he gets in, 
then they know there is potential for other 
people to hack in, and usually they will work 
with this ethical hacker to patch these holes. If 
he doesn't get in, then they pray that nobody is 
better at hacking than him.
A hacker looks at it this 
way. The RFC says to load an instruction into 
memory, use 8 bits of data, and two bits of 
instruction, then a hacker looks at this and 
wonders, and tries to pass more no. of bits . 
- As results sooner or later the computer will 
not be able to deal with the amount of data 
being passed in a manner it understands & the 
computer will not know how to interpret the 
instructions.
When a computer does not know what to do 
next, it gives up and passes control to the 
SYSTEM, which is all powerful. 
This is a very basic description of a buffer 
overflow. 
Once this happens, the hacker has 
administrative control and can now start 
passing commands to the computer that it will 
follow without question.
Different levels in hackers 
• There are three levels of hackers. 
spend all their time trying to 
break the system, to prove it can be broke, so 
they can get the manufacturer to address the 
problem and fix it. 
do same thing, but perhaps will try 
to gain from their new way of breaking the 
system. They may expect payment for finding a 
way to break the system, & they may even try 
to get financial gain from their knowledge or 
silence.
- want to take the knowledge of how 
to break a system and use it for financial gain. 
They may use it to hack systems or write code 
that allows others to hack systems, and sell 
that code.
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)

More Related Content

What's hot (20)

Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
HACKING
HACKINGHACKING
HACKING
D's Surti
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ganesh Vadulekar
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aditya Vikram Singhania
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Tharindu Kalubowila
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
Nitish Kasar
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
Sravani Reddy
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
Mukund Kumar Bharti
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical Hacking
Vamshi TG
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
mubeenm50
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
hacking
hackinghacking
hacking
mayank1293
 
Hacking
HackingHacking
Hacking
Arpit Verma
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
Nitish Kasar
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
Sravani Reddy
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical Hacking
Vamshi TG
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
mubeenm50
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 

Viewers also liked (7)

Hackers guide to Startup Weekend
Hackers guide to Startup WeekendHackers guide to Startup Weekend
Hackers guide to Startup Weekend
Brad Oyler
 
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest DisclosureOpen Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
Ethisphere
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwonThe basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
Kenneth Kwon
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Hackers guide to Startup Weekend
Hackers guide to Startup WeekendHackers guide to Startup Weekend
Hackers guide to Startup Weekend
Brad Oyler
 
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest DisclosureOpen Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
Ethisphere
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwonThe basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
Kenneth Kwon
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 

Similar to Introduction to Ethical Hacking (Basics) (20)

Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
Klaus Drosch
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
Hacking
HackingHacking
Hacking
powerpointking1
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
aashish2cool4u
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
Gaurav Mishra
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Prabhat kumar Suman
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
MadhuKumar114889
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
dharmesh ram
 
hacking basics
hacking basicshacking basics
hacking basics
dharmesh ram
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Security threats
Security threatsSecurity threats
Security threats
Integral university, India
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
cyber-security for companies and private
cyber-security for companies and privatecyber-security for companies and private
cyber-security for companies and private
szydlowskiromulo
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
 
Hacking
HackingHacking
Hacking
blues_mfi
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
Klaus Drosch
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
Gaurav Mishra
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
cyber-security for companies and private
cyber-security for companies and privatecyber-security for companies and private
cyber-security for companies and private
szydlowskiromulo
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 

Recently uploaded (20)

How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdfBiophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
PKLI-Institute of Nursing and Allied Health Sciences Lahore , Pakistan.
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
Unit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdfUnit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdf
KanchanPatil34
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACYUNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
DR.PRISCILLA MARY J
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
apa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdfapa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdf
Ishika Ghosh
 
How to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of saleHow to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of sale
Celine George
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
Unit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdfUnit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdf
KanchanPatil34
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACYUNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
DR.PRISCILLA MARY J
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
apa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdfapa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdf
Ishika Ghosh
 
How to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of saleHow to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of sale
Celine George
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 

Introduction to Ethical Hacking (Basics)

  • 2. KNOW ABOUT : WHAT IS HACKING? HACKERS TYPES OF HACKING WHAT IS ETHICAL HACKING? DIFFERENT LEVELS IN HACKERS
  • 3. What is Hacking?  Hacking is simply .  It is the act of breaking in to a computer system and is a criminal offence under the computer misuse.  .
  • 4. Types Of Hacking : • : - It include stealing passwords (which hackers then use or sell) - Performing industrial espionage - causing harm (as disgruntled employees) - committing simple misuse.
  • 5. • : - Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) - Rogue APs are most often connected by well-meaning but ignorant employees.
  • 6. • : - Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. - With the aid of computerized searchers (bots), hackers can probably find any weakness in your network.
  • 7. • : - Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). - Both attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.
  • 8. • : -Trojan horses, which are attached to other programs, are the leading cause of all break-ins. - When a user downloads and activates a Trojan horse, the hacked software (SW) kicks off a virus, password gobbler, or remote-control SW that gives the hacker control of the PC.
  • 9. • : - DoS attacks give hackers a way to bring down a network without gaining internal access. - DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets). - Distributed DoSs are coordinated DoS attacks from multiple sources. DDoS is more difficult to block because it uses multiple, changing, source IP addresses.
  • 10. • : are people who just like to break stuff. They usually exploit any target of opportunity. are hobbyists or professionals who break passwords and develop Trojan horses or other SW (called warez). They either use the SW themselves (for bragging rights) or sell it for profit.
  • 11. are hacker wannabes. They have no real hacker skills, so they buy or download warez, which they launch. Other attackers include disgruntled employees, terrorists, political operatives, or anyone else who feels slighted, exploited, ripped off, or unloved.
  • 12. • : - Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister. - Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.
  • 13. - . However, hackers have also developed new skills that allow them to break into more complex systems. - Hacking typically involves compromising the security of networks, breaking the security of application software, or creating malicious programs such as viruses.
  • 14. - Most popular forms of network hacking are denial of service (DoS) attacks and mail bombs. - DoS attacks are designed to swamp a computer network, causing it to crash. - Mail bombs act in a similar fashion, but attack the network's mail servers. -Web server are bombarded with fake requests for Web pages, which overloads the site and caused it to crash.
  • 15. - Network hackers also try to break into secure areas to find sensitive data. Once a network is hacked, files can be removed, stolen, or erased. - Application hackers break security on application software-software including word processing and graphics programs-in order to get it for free.
  • 16. - One way they gain access to software that requires a serial number for installation is by setting up a serial number generator that will try millions of different combinations until a match is found. - Application hackers also sometimes attack the program itself in an attempt to remove certain security features.
  • 17. -Hackers that create viruses, logic bombs, worms, and Trojan horses are involved in perhaps the most malicious hacking activities. -A virus is a program that has the potential to attack and corrupt computer files by attaching itself to a file to replicate itself. - It can also cause a computer to crash by utilizing all of the computer's resources.
  • 18. What is ethical hacking ? Ethical hacking is where . Ex. : A bank may pay a hacker to hack their systems to see if it is hackable. If he gets in, then they know there is potential for other people to hack in, and usually they will work with this ethical hacker to patch these holes. If he doesn't get in, then they pray that nobody is better at hacking than him.
  • 19. A hacker looks at it this way. The RFC says to load an instruction into memory, use 8 bits of data, and two bits of instruction, then a hacker looks at this and wonders, and tries to pass more no. of bits . - As results sooner or later the computer will not be able to deal with the amount of data being passed in a manner it understands & the computer will not know how to interpret the instructions.
  • 20. When a computer does not know what to do next, it gives up and passes control to the SYSTEM, which is all powerful. This is a very basic description of a buffer overflow. Once this happens, the hacker has administrative control and can now start passing commands to the computer that it will follow without question.
  • 21. Different levels in hackers • There are three levels of hackers. spend all their time trying to break the system, to prove it can be broke, so they can get the manufacturer to address the problem and fix it. do same thing, but perhaps will try to gain from their new way of breaking the system. They may expect payment for finding a way to break the system, & they may even try to get financial gain from their knowledge or silence.
  • 22. - want to take the knowledge of how to break a system and use it for financial gain. They may use it to hack systems or write code that allows others to hack systems, and sell that code.